search for: uzanto

Displaying 4 results from an estimated 4 matches for "uzanto".

2006 Jan 08
2
Replacing an html chunk with a different html chunk
...ing one chunk of HTML with another? Or removing a specific chunk of HTML? These tasks come up just as often. 1)Am I correct that Prototype doesn''t solve this problem? 2)If so, what''s the best way to do this? Regards, ----^-------^------^--------^-------^ Jon Boutelle Principal, Uzanto Consulting Mountain View, CA Office Phone:650-564-0000 skype id: jboutelle www.uzanto.com www.jonathanboutelle.com www.themindcanvas.com ----^-------^------^--------^-------^
2006 Jan 12
0
re: Good OOP and JS books / tutorials?
...wbies who have an OO background: http://www.multitask.com.au/people/dion/ Of course, the real ugly truths about javascript are a less friendly, but a nonetheless important read http://www.quirksmode.org/blog/ http://www.crockford.com/ ----^-------^------^--------^-------^ Jon Boutelle Principal, Uzanto Consulting Mountain View, CA Office Phone:650-564-0000 Cell Phone :510-708-9825 skype id: jboutelle www.uzanto.com www.jonathanboutelle.com www.themindcanvas.com ----^-------^------^--------^-------^
2006 Jan 08
0
RE: Replacing an html chunk with a different htmlchunk
...ing one chunk of HTML with another? Or removing a specific chunk of HTML? These tasks come up just as often. 1)Am I correct that Prototype doesn''t solve this problem? 2)If so, what''s the best way to do this? Regards, ----^-------^------^--------^-------^ Jon Boutelle Principal, Uzanto Consulting Mountain View, CA Office Phone:650-564-0000 skype id: jboutelle www.uzanto.com www.jonathanboutelle.com www.themindcanvas.com ----^-------^------^--------^-------^ _______________________________________________ Rails-spinoffs mailing list Rails-spinoffs-1W37MKcQCpIf0INCOvqR/iCwEArCW2h...
2007 Mar 01
9
Virtualisation
I'm building a new server at home to handle most of my internal requirements (mail, news, dns, dhcp, backups being the biggies). I also want it to host a couple of virtual servers which are allowed incoming connections from the internet (mail gateway, web server, ssh server); these are virtual so if a hacker _can_ break in then they're limited as to what they can see. At present the