This is for third-party libraries used by SurvLoop which don't have an existing Packagist package.
SurvLoop is a Laravel-based engine for websites dominated by the collection and publication of open data. This is a database design and survey generation system, though it will increasingly be a flexible tool to solve many web-based problems.
This package is a container for copies of third-party code which is otherwise challenging to easily install and integrate with each SurvLoop installation. It is required and included by the master SurvLoop package.
parallax.js v1.5.0 (http://pixelcog.github.io/parallax.js/) @copyright 2016 PixelCog, Inc. @license MIT (https://github.com/pixelcog/parallax.js/blob/master/LICENSE)
popper.js v1.12.9 (https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js) Copyright (C) Federico Zivolo 2017 Distributed under the MIT License (license terms are at http://opensource.org/licenses/MIT)
TypeWatch 2.2.1 Examples/Docs: github.com/dennyferra/TypeWatch Copyright(c) 2014 Denny Ferrassoli - dennyferra.com Charles Christolini Dual licensed under the MIT and GPL licenses: http://www.opensource.org/licenses/mit-license.php http://www.gnu.org/licenses/gpl.html
KMZ data for U.S. States
Please help educate me on best practices for sharing code in this community. I could be happy to replace this entire repository with a better solution some day. Please report any issue you find in the issues page.
We want to ensure that SurvLoop is a secure HTTP open data platform for everyone. If you've discovered a security vulnerability in the SurvLoop software or SurvLoop.org, we appreciate your help in disclosing it to us in a responsible manner.
Publicly disclosing a vulnerability can put the entire community at risk. If you've discovered a security concern, please email us at wikiworldorder at protonmail.com. We'll work with you to make sure that we understand the scope of the issue, and that we fully address your concern. We consider correspondence sent to wikiworldorder at protonmail.com our highest priority, and work to address any issues that arise as quickly as possible.
After a security vulnerability has been corrected, a release will be deployed as soon as possible.