WikiWorldOrder/SurvLoop-Libraries
SurvLoop is a Laravel-based engine for websites dominated by the collection and publication of open data. This is a database design and survey generation system, though it will increasingly be a flexible tool to solve many web-based problems.
This package is a container for copies of third-party code which is otherwise challenging to easily install and integrate with each SurvLoop installation. It is required and included by the master SurvLoop package.
Table of Contents
Documentation: Included Libraries
parallax.js v1.5.0 (http://pixelcog.github.io/parallax.js/) @copyright 2016 PixelCog, Inc. @license MIT (https://github.com/pixelcog/parallax.js/blob/master/LICENSE)
popper.js v1.12.9 (https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js) Copyright (C) Federico Zivolo 2017 Distributed under the MIT License (license terms are at http://opensource.org/licenses/MIT)
TypeWatch 2.2.1 Examples/Docs: github.com/dennyferra/TypeWatch Copyright(c) 2014 Denny Ferrassoli - dennyferra.com Charles Christolini Dual licensed under the MIT and GPL licenses: http://www.opensource.org/licenses/mit-license.php http://www.gnu.org/licenses/gpl.html
Copy To Clipboard http://stackoverflow.com/questions/22581345/click-button-copy-to-clipboard-using-jquery
KMZ data for U.S. States
https://blogs.dropbox.com/tech/2012/04/zxcvbn-realistic-password-strength-estimation/
Change Logs
Contribution Guidelines
Please help educate me on best practices for sharing code in this community. I could be happy to replace this entire repository with a better solution some day. Please report any issue you find in the issues page.
Reporting a Security Vulnerability
We want to ensure that SurvLoop is a secure HTTP open data platform for everyone. If you've discovered a security vulnerability in the SurvLoop software or SurvLoop.org, we appreciate your help in disclosing it to us in a responsible manner.
Publicly disclosing a vulnerability can put the entire community at risk. If you've discovered a security concern, please email us at wikiworldorder at protonmail.com. We'll work with you to make sure that we understand the scope of the issue, and that we fully address your concern. We consider correspondence sent to wikiworldorder at protonmail.com our highest priority, and work to address any issues that arise as quickly as possible.
After a security vulnerability has been corrected, a release will be deployed as soon as possible.