Facebook Timeline Cover Dimensions & Template

Posted on April 30, 2012 by Jimmy K. in Resources.

Facebook Timeline Cover Dimensions The dimensions of Facebook Timeline covers is 851 pixels by 314 pixels. I know… it’s strange, but it’s best to not question the Facebook machine. Template, you say? I’m very meticulous regarding my Facebook and I like to tweak my Timeline over and over until it’s absolutely perfect. To combat this [...]


jQuery: AjaxRequest.js has been updated!

Posted on April 11, 2012 by Jimmy K. in Articles, Resources.

Ajax lets you make HTTP requests without having to reload the entire page and can be implemented in a variety of ways to improve the user experience. The most abundant use of Ajax that I’ve noticed is it’s use in chat applications. There is a method of creating Ajax requests using JavaScript alone, but the [...]


How-to: Set up Google Apps for your domain.

Posted on April 5, 2012 by Jimmy K. in Articles, Resources, Tutorials.

Step 1: Sign up for Google Apps. By signing up for the free version of Google Apps, you are allowed to create up to 10 accounts without paying anything. Ignore the shouts for the $5 Google Apps Business plan – we just want the free stuff. Here is the link for the free version of [...]


Free Animated Loading Icons

Posted on March 12, 2012 by Jimmy K. in Resources.

I created some loading icons for my projects and liked them so much that I thought I would share them with the rest of the internet. So… here ya go! This set contains 11 animated icons in both GIF and SWF format. I originally built them in Flash at 200×200-pixels each, but plan on recreating [...]


Protect yourself online with PeerBlock.

Posted on May 18, 2011 by Jimmy K. in Articles, Resources.

The Internet contains an unlimited number of websites and pages. While most websites are harmless and their primary focus is to share information, some websites are malicious and will stop at nothing to acquire your personal information or cause harm to your computer. These websites actively spread viruses and malicious programs in an attempt to [...]