search page 7 - Dave's Blog

Search
My timeline on Mastodon

(via LEGO Life of George Combines Real LEGO Play With an iPhone...

2011 Nov 17, 3:27


(via LEGO Life of George Combines Real LEGO Play With an iPhone App)

PermalinkComments

“The Big Head by San Francisco artist Dan Rosenfeld is an...

2011 Nov 15, 11:54


The Big Head by San Francisco artist Dan Rosenfeld is an oversize video conferencing helmet that displays an enlarged version of the wearer’s face on a 24″ monitor at the front of the helmet. Rosenfeld debuted the helmet at this year’s Halloween” (via The Big Head, A Giant Videoconferencing Helmet by Dan Rosenfeld)

PermalinkCommentshumor halloween big-head video

(via Still Alive by Jonathan Coulton, Featuring Sara Quin)

2011 Nov 15, 11:52


(via Still Alive by Jonathan Coulton, Featuring Sara Quin)

PermalinkCommentsmusic jonathan-coulton sara-quin still-alive portal game video

"The application/opensearchdescription xml media type" - Frank Ellermann

2011 Nov 14, 1:26PermalinkCommentstechnical mime mime-type opensearch xml ietf

A The New York Times ‘Vows’ series entry parody from Jena...

2011 Nov 14, 12:40


A The New York Times ‘Vows’ series entry parody from Jena Friedman.

PermalinkCommentshumor video youtube jena-friedman new-york-times

David Risney - Google Profile

2011 Jul 1, 5:52Hooking up my authorship tags: http://googlewebmastercentral.blogspot.com/2011/06/authorship-markup-and-web-search.htmlPermalinkCommentsprofile me

SRU: Search/Retrieval via URL -- SRU, CQL and ZeeRex (Standards, Library of Congress)

2011 Apr 18, 4:27"SRU is a standard XML-focused search protocol for Internet search queries, utilizing CQL (Contextual Query Language), a standard syntax for representing queries."PermalinkCommentsstandards search library metadata xml uri technical library-of-congress

Internet probe can track you down to within 690 metres - tech - 05 April 2011 - New Scientist

2011 Apr 8, 2:07"On average their method gets to within 690 metres of the target and can be as close as 100 metres – good enough to identify the target computer's location to within a few streets.", "When a landmark machine and the target computer have shared a router, the researchers can compare how long a packet takes to reach each machine from the router; converted into an estimate of distance, this time difference narrows the search down further."PermalinkCommentstechnical internet privacy geo geolocation security

[whatwg] Proposal for IsSearchProviderInstalled / AddSearchProvider

2011 Feb 23, 2:17Proposal to standardize on the function to add search providers in user agents.PermalinkCommentstechnical search-provider browser webbrowser web whatwg

An Analysis of Browser Domain-Isolation Bugs

2010 Oct 28, 7:49PermalinkCommentsdavid-ross security browser research web webbrowser technical todo system:filetype:pdf system:media:document

Google Launches 'The Google' For Older Adults | The Onion - America's Finest News Source

2010 Sep 8, 4:11Unfortunately it looks like TheGoogle.com is not available...PermalinkCommentshumor google search technical

Telltale Games times 'Back to the Future' project - Game Hunters: In search of video games and interactive awesomeness - USATODAY.com

2010 Sep 1, 12:42Christopher Lloyd will voice Doc Brown in the Back to the Future game series
PermalinkCommentsgame videogame backtothefuture bttf christopher-lloyd

Windows 7 Accelerator Platform COM / C# Interop

2010 Aug 20, 11:20

For a new project I'm working on involving IE's installed Accelerators and OpenSearch search providers via the Windows 7 Accelerator Platform, I've created a C#/COM interop class for those APIs.

Download the osinterop.cs interop file here.

PermalinkCommentstechnical accelerator csharp com

Gamers beat algorithms at finding protein structures

2010 Aug 4, 2:29Using games for good! Foldit players are solving real biochemistry problems. "Scientists have turned to games for a variety of reasons, having studied virtual epidemics and tracked online communities and behavior, or simply used games to drum up excitement for the science. But this may be the first time that the gamers played an active role in producing the results, having solved problems in protein structure through the Foldit game."PermalinkCommentsvideogame game biology science research

Porn pranksters have a field day with YouTube injection flaw

2010 Jul 5, 4:23Cross-site scripting attack on YouTube over the weekend: "That turned out to be as simple as using two script tags in a row (<script><script>fun scripting stuff goes here!), as noted by F-Secure researcher Mikko H. Hypponen on Twitter—the first of the two tags would get stripped, and the second was allowed through."PermalinkCommentstechnical youtube security cross-site-scripting javascript

Schneier on Security: Alerting Users that Applications are Using Cameras, Microphones, Etc.

2010 May 24, 6:26"What You See is What They Get: Protecting users from unwanted use of microphones, cameras, and other sensors," by Jon Howell and Stuart Schechter.

"We introduce the sensor-access widget, a graphical user interface element that resides within an application's display. The widget provides an animated representation of the personal data being collected by its corresponding sensor, calling attention to the application's attempt to collect the data."

Not sure how well that scales...PermalinkCommentstechnical security privacy research

The Emperor’s New APIs: On the (In)Secure Usage of New Client-side Primitives

2010 May 6, 7:43Covers case studies of insecure usage of HTML5 cross-document messaging and web storage.PermalinkCommentshtml html5 web browser security technical webstorage research facebook google system:filetype:pdf system:media:document

Mastering Windows Search using Advanced Query Syntax

2010 Mar 28, 4:29Some interesting queries for Windows search like size:>50MB, broadcastdate:2005, datetaken:6/12/2006.PermalinkCommentswindows search syntax win7 howto technical

Twitter / Mark Pilgrim: Google "rich snippets" add ...

2010 Mar 12, 2:32Google's indexer now examines HTML5 microdata and they provide a tool to test out your pages microdataPermalinkCommentshtml html5 google search microformats metadata rdf technical

A Practical Attack to De-Anonymize Social Network Users

2010 Mar 8, 1:50Paper suggests history stealing to find what popular social networking site groups a visitor to your web site belongs to and stats on how easy it is to then uniquely identify the visitor on the popular social networking site.PermalinkCommentssecurity privacy social social-network paper research web browser css technical system:filetype:pdf system:media:document
Older EntriesNewer Entries Creative Commons License Some rights reserved.