SEARCH KEYWORD -- WIRELESS MOUSE



  What can CSS :has pseudo class be used for?

CSS's :has is a pseudo-class representing an element if any of the selectors passed as parameters matching at least one element. From the name, it's also easy to understand how it matches elements. The syntax is pretty easy as well: :has([some-selector]) With this pseudo class, it can do lots of things which previously would be challenging or need tweaking the DOM elements with JavaScript. This post will demonstrate what :has can be used for. Introduction Below are a few simple ex...

   CSS,:HAS,:NOT,PSEUDO CLASS     2022-09-18 01:40:54

  Steve Jobs's prediction about wireless,iPad and App Store in 1983

1983 was still a year uncultivated. That year, Apple released the first personal computer Apple Lisa with graphical user interface in the world, TCP/IP was released less than two years, the Internet was basically still a wasteland. General people had few knowledge about computer. Steve Jobs still needed to start with "What is the computer" in his speech. Today, we have become accustomed to social networking, smart phones and mobile Internet, it was really unbelievable at that time. That ye...

   Steve Jobs, record,Apple,prediction     2012-10-03 04:37:17

  Java code to retrieve Bing background image path

When Microsoft presented their search engine Bing, this new design gave us some surprise, especially its background images, they are very beautiful and it will change every day. But   unfortunately we cannot save the image onto our PC by right clicking the mouse.  After some research on its source code, I found a feasible but not so sophisticated way to achieve this, we can retrieve the image path from the source code and then use this path we can download the image. This is just to sh...

   Java,Bing,Background image path,URL,Download,Save     2012-05-02 10:51:51

  How to use Chome dev tool to find event handler bound to an element

As a front end developer, there is frequent need to debug JS code and sometimes need to find out what event handler has been bound to a HTML element. In this post, we will show how to find out the click event handler bound to a HTML element, this same applies to other events as well. Nowadays, a web application is usually very complicated and there are lots of JS codes which makes it difficult to find out what click event handler has been bound to a HTML element, especially when the JS source co...

   JAVASCRIPT,CHROME,CHROME DEV TOOL,EVENT LISTENER     2019-08-17 22:14:36

  Shortcut keys in Sublime Text 3(Animated demo)

Sublime Text 3 is a light weight code editor which supports lots of languages. It has lots of shortcuts and plugins easing work of programmers. In this post, we will introduce some shortcuts supported in Sublime Text 3 and show how powerful they are. 1. Select sibling matching(equal) word (Ctrl + D) Put the cursor on one word, press Ctrl + D to select the word, then press Ctrl and following by pressing D, it will select next matching word. The number of Ds pressed will mean number of matching wo...

   TIPS,SHORTCUT KEY,SUBLIME TEXT     2016-04-28 02:41:28

  What Is the Best VoIP Service Provider For Your Organization?

If you own an organization or a business and are looking for the most effective VoIP service provider, this is just the right place for you. You will get to know the best VoIP service provider for your needs. When VoIP services are the topic, there is no one like cNumber. cNumber is the best and a well-reputed name for VoIP services for most users and provides a lot of benefits for your business or firm. cNumber – Just The Perfect VoIP Service Provider With the cNumber cloud voice over IP ...

   VOIP     2020-07-14 11:06:38

  Building Security onto Your Mobile Application

Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...

   Web Application Development Company, iPhone App Development Company     2015-08-21 07:22:32

  7 revolutionary electronic products

Electronic products can be seen everywhere in our lives. There are several revolutionary electronic products which affect people's life deeply. The following are seven representative electronic products.1. Motorola DynaTACIt is the ancestor of cellphone. DynaTAC is a series of cellular telephones manufactured by Motorola, Inc. from 1983 to 1994. The first model, the 8000x, received FCC certification in 1983,and became the first cell phone to be offered commercially. It weighs 2.5 pounds and can ...

   Electronic products,iPod,ATARI,DynaTAC     2012-07-31 14:27:33

  Remove browse button from input type=file

In Web 2.0 era, many websites will ask the user to upload their avatar when creating their profile. In HTML, the input control we should use is input="file". This is a file control provided by the browser vendor and it should be ran in a sandbox for security consideration. Browsers don't provide ways to choose file from local and upload to the remote server without the input="file" control.  There is one annoying part about the input="file", which is a default button named "Choose File" or...

   file,html,browse,remove browse button     2015-07-12 05:17:51

  Encrypting and decrypting PGP file or text on MacOS

When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...

   TUTORIAL,ENCRYPTION,DECRYPTION,PGP,GPG     2020-10-29 05:06:09