AJAX

AJAX can at times be an excellent tool for User Interface Design

[SOLVED] How to Fix $.ajax() Not Working ie 8, ie 9 and ie 10

  jQuery is an great tool to use for making ajax calls. As usual MS Internet Explorer has to make things that would otherwise be standard — difficult. Setting aside any rants about how much hair one can pull out in the days it takes to accomplish something that should have been easy, here is what… Read more [SOLVED] How to Fix $.ajax() Not Working ie 8, ie 9 and ie 10

CORS; How To Set HTTP Response Header on IIS Windows Server 2012 R2 to Access-Control-Allow-Origin

When attempting to make an AJAX call are you getting the following error? XMLHttpRequest cannot load (then some path to the remote site). No ‘Access-Control-Allow-Origin’ header is present on the requested resource. Origin ‘http://yourAjaxCallingSite.com’ is therefore not allowed access. This means the Server hosting the resource is not set up to be CORS compliant. If… Read more CORS; How To Set HTTP Response Header on IIS Windows Server 2012 R2 to Access-Control-Allow-Origin

Screen shot of the up and comming CPI Data Panel

I havn’t posted in few weeks because I have been very busy with several projects. One of the projects I am particularly excited about the CPI panel. The Cpi panel is new “back end” for LoveFineArt.com. IT used to be that each and every product would take about 20 minuets to enter. With this new… Read more Screen shot of the up and comming CPI Data Panel

Dynamically Change the onClick, onChange (or other) Value of an Element

If you are implementing AJAX, you will likely run into the need to change the functionality of a button dynamically. There is not a whole lot out there on how to quickly accomplish this so here is a simple explanation. Typically, you have an element such as an “input”, “a” or “select (options)” that has… Read more Dynamically Change the onClick, onChange (or other) Value of an Element

How to Protect Against SQL Injection

One of the most common web security problems is SQL Injection. As the name implies, SQL injections works by introducing malicious SQL code where it doesn’t belong. Since it is SQL code you could probably guess that the attacker “injects” his poison via database queries. Web developers often pass some sort of variable to their… Read more How to Protect Against SQL Injection

What is AJAX

Asynchronous Put the “A” in AJAX The key word is asynchronous. “1.  A process in a multitasking system whose execution can proceed independently, “in the background”. Other processes may be started before the asynchronous process has finished.”—Dictionary.com Most web pages are rather “choppy” because they need to “refresh” themselves, which is a nice way of… Read more What is AJAX