design page 2 - Dave's Blog

Search
My timeline on Mastodon

A Dad’s Plea To Developers Of iPad Apps For Children (smashingmagazine.com)

2012 Mar 12, 7:02

Set of issues run into by children using iPad apps.  Should be generally appropriate though:

Designing apps for children is extremely hard. Not only is quality, age-appropriate content hard to create, but designing the flow and interaction of these apps is made more difficult because designers must refrain from implementing advanced gestures, which would only confuse and frustrate kids (and, by extension, their parents). Yet all apps can and should adhere to certain basics. Hopefully, the four guidelines discussed here can become fixtures of all children’s apps.

PermalinkCommentstechnical ui ipad design children programming

URI Empty Path Segments Matter

2011 Nov 23, 11:00

Shortly after joining the Internet Explorer team I got a bug from a PM on a popular Microsoft web server product that I'll leave unnamed (from now on UWS). The bug said that IE was handling empty path segments incorrectly by not removing them before resolving dotted path segments. For example UWS would do the following:

A.1. http://example.com/a/b//../
A.2. http://example.com/a/b/../
A.3. http://example.com/a/
In step 1 they are given a URI with dotted path segment and an empty path segment. In step 2 they remove the empty path segment, and in step 3 they resolve the dotted path segment. Whereas, given the same initial URI, IE would do the following:
B.1. http://example.com/a/b//../
B.2. http://example.com/a/b/
IE simply resolves the dotted path segment against the empty path segment and removes them both. So, how did I resolve this bug? As "By Design" of course!

The URI RFC allows path segments of zero length and does not assign them any special meaning. So generic user agents that intend to work on the web must not treat an empty path segment any different from a path segment with some text in it. In the case above IE is doing the correct thing.

That's the case for generic user agents, however servers may decide that a URI with an empty path segment returns the same resource as a the same URI without that empty path segment. Essentially they can decide to ignore empty path segments. Both IIS and Apache work this way and thus return the same resource for the following URIs:

http://exmaple.com/foo//bar///baz
http://example.com/foo/bar/baz
The issue for UWS is that it removes empty path segments before resolving dotted path segments. It must follow normal URI procedure before applying its own additional rules for empty path segments. Not doing that means they end up violating URI equivalency rules: URIs (A.1) and (B.2) are equivalent but UWS will not return the same resource for them.
PermalinkCommentsuser agent url ie uri technical web browser

The Canonical Link Relation

2011 Jul 1, 10:15"This specification defines the canonical link relation -- an element which designates the preferred version of content/URI from a set of duplicate or near duplicate pages."PermalinkCommentslink uri url html rel technical standard rfc canonical

Use of the "X-" Prefix in Application Protocols

2011 Jul 1, 10:12" Historically, protocol designers and implementers distinguished
between "standard" and "non-standard" parameters by prefixing the
latter with the string "X-". On balance, this "X-" convention has
more costs than benefits, although it can be appropriate in certain
circumstances."PermalinkCommentsprefix technical standrad rfc uri url x-

THE FIFTY-NINE-STORY CRISIS, The New Yorker, 5/29/95, pp 45-53

2011 Jun 5, 4:56"What's an engineer's worst nightmare? To realize that the supports he designed for a skyscraper like Citicorp Center are flawed---and hurricane season is approaching."PermalinkCommentsarticle history design business engineering

Experiences from an IPv6-Only Network

2011 Apr 30, 4:05"This document discusses our experiences from moving a small number of users to an IPv6-only network, with access to the IPv4-only parts of the Internet via a NAT64 device. The document covers practical experiences as well as road blocks and opportunities for this type of a network setup. The document also makes some recommendations about where such networks are applicable and what should be taken into account in the network design. The document also discusses further work that is needed to make IPv6-only networking applicable in all environments."PermalinkCommentsinternet ip ipv6 ipv4 nat technical reference

Skynet meets the Swarm: how the Berkeley Overmind won the 2010 StarCraft AI competition

2011 Jan 19, 9:05
PermalinkCommentsgame programming design ai starcraft

Reviewing the winners of the Design Julian Assange's Next Hairstyle competition. - Boing Boing

2011 Jan 19, 7:44Lol at Team Rocket Julian Assange.
PermalinkCommentsjulian-assange humor image photo photoshop

Notabilia – Visualizing Deletion Discussions on Wikipedia

2011 Jan 10, 9:41PermalinkCommentswikipedia visualization infographics design analysis humor

http://elsloganero.wordpress.com/

2010 Dec 1, 7:19PermalinkCommentsdesign image humor

lcamtuf's blog: HTTP cookies, or how not to design protocols

2010 Nov 8, 3:34On crappy aspects of HTTP cookie design.PermalinkCommentshttp web browser history technical cookie header networking protocol security programming via:mattb

Conserve Water, or the Fish Will Die - Design - GOOD

2010 Sep 15, 10:51That's an idea... Makes me feel really bad for the fish... I guess that's the point.
PermalinkCommentswater design fish

CYRIAK'S AMAZING VIDEO BLOG

2010 Aug 3, 3:04
And if you think the following video is weird, take a look at everything else on this person's blog...
PermalinkCommentscyriak video weird humor design art animation

15 Clever, Witty Illustrations - My Modern Metropolis

2010 Mar 12, 8:58Various sometimes entertaining or humorous tshirt designs available from purchase all from Chow Hon Lam. I enjoy the ginger bread men shirt
PermalinkCommentsshirt humor tshirt design purchase gift

iPhone Dev Center: iPhone Application Programming Guide: The Core Application Design

2010 Mar 11, 4:26The iPhone application lifecycle.PermalinkCommentsiphone apple development technical sdk reference

Protecting Browsers from Extension Vulnerabilities

2010 Feb 27, 10:06A web browser add-on security research paper that describes the Google Chrome security model. "We propose a new browser extension system that improves security by using least privilege, privilege separation,
and strong isolation. Our system limits the misdeeds an attacker can perform through an extension vulnerability.
Our design has been adopted as the Google Chrome extension system."PermalinkCommentssecurity design google chrome firefox addon plugin web browser technical research adam-barth system:filetype:pdf system:media:document

Flavorwire » Re-assembly Required: Artists on IKEA

2010 Feb 22, 7:34Art created from IKEA products.PermalinkCommentsart design ikea hack

Augmented (hyper)Reality: Domestic Robocop on Vimeo

2010 Feb 22, 7:11Video of an artist's conception of our future augmented reality. I like the addition of the video artifacts and the slightly out of sync overlay. I take issue with the sort of video artifacts and the 'level of advertising'. Maybe they had the advertising supported AR goggles...PermalinkCommentsaugmented-reality gui 3d advertising art design video

What Web Designers need to know about EPUB | Nimbupani Designs

2010 Feb 21, 2:58Basics of the EPUB format.PermalinkCommentsepub book ebook html css xhtml technical

Revised Font Stack | A Way Back

2010 Feb 5, 8:00Font stats on Mac and PC respectively.PermalinkCommentsfont statistics html css web design typography via:kris.kowal
Older EntriesNewer Entries Creative Commons License Some rights reserved.