2008 Oct 29, 9:40Cool game concept: "The Unfinished Swan is a first-person painting game set in an entirely white world. Players can splatter paint to help them find their way through an unusual garden."
via:swannman game design videogame art 3d xna 2008 Oct 28, 9:01
sequelguy posted a photo:
Immediately after Sarah took this photo, a truck pulled into the empty parking spot and the driver jumped out to apologize for messing up the photo. The driver was a zombie.
seattle tree nature gasworkspark sarahtookthisphoto 2008 Oct 25, 6:51
Windows allows for application protocols in which, through the registry, you specify a URL scheme and a command line to
have that URL passed to your application. Its an easy way to hook a webbrowser up to your application. Anyone can read the doc above and then walk through the registry and pick out the application
protocols but just from that info you can't tell what the application expects these URLs to look like. I did a bit of research on some of the application protocols I've seen which is listed below.
Good places to look for information on URI schemes: Wikipedia URI scheme, and ESW Wiki
UriSchemes.
Some Application Protocols and associated documentation.
Scheme
|
Name
|
Notes
|
search-ms
|
Windows Search Protocol
|
The search-ms application protocol is a convention for querying the Windows Search index. The protocol enables applications, like Microsoft Windows Explorer, to query the index with
parameter-value arguments, including property arguments, previously saved searches, Advanced Query Syntax, Natural Query Syntax, and language code identifiers (LCIDs) for both the Indexer and
the query itself. See the MSDN docs for search-ms for more info.
Example: search-ms:query=food
|
Explorer.AssocProtocol.search-ms
|
OneNote
|
OneNote Protocol
|
From the OneNote help: /hyperlink "pagetarget" - Starts OneNote and opens the page specified by the pagetarget parameter. To obtain the hyperlink for any page in a OneNote
notebook, right-click its page tab and then click Copy Hyperlink to this Page.
Example: onenote:///\\GUMMO\Users\davris\Documents\OneNote%20Notebooks\OneNote%202007%20Guide\Getting%20Started%20with%20OneNote.one#section-id={692F45F5-A42A-415B-8C0D-39A10E88A30F}&end
|
callto
|
Callto Protocol
|
ESW Wiki Info on callto
Skype callto info
NetMeeting callto info
Example: callto://+12125551234
|
itpc
|
iTunes Podcast
|
Tells iTunes to subscribe to an indicated podcast. iTunes documentation.
C:\Program Files\iTunes\iTunes.exe /url "%1"
Example: itpc:http://www.npr.org/rss/podcast.php?id=35
|
iTunes.AssocProtocol.itpc
|
pcast
|
iTunes.AssocProtocol.pcast
|
Magnet
|
Magnet URI
|
Magnet URL scheme described by Wikipedia. Magnet URLs identify a resource by a hash of that resource so that when used in P2P
scenarios no central authority is necessary to create URIs for a resource.
|
mailto
|
Mail Protocol
|
RFC 2368 - Mailto URL Scheme.
Mailto Syntax
Opens mail programs with new message with some parameters filled in, such as the to, from, subject, and body.
Example: mailto:?to=david.risney@gmail.com&subject=test&body=Test of mailto
syntax
|
WindowsMail.Url.Mailto
|
MMS
|
mms Protocol
|
MSDN describes associated protocols.
Wikipedia describes MMS.
"C:\Program Files\Windows Media Player\wmplayer.exe" "%L"
Also appears to be related to MMS cellphone messages: MMS IETF Draft.
|
WMP11.AssocProtocol.MMS
|
secondlife
|
[SecondLife]
|
Opens SecondLife to the specified location, user, etc.
SecondLife Wiki description of the URL scheme.
"C:\Program Files\SecondLife\SecondLife.exe" -set SystemLanguage en-us -url "%1"
Example: secondlife://ahern/128/128/128
|
skype
|
Skype Protocol
|
Open Skype to call a user or phone number.
Skype's documentation
Wikipedia summary of skype URL scheme
"C:\Program Files\Skype\Phone\Skype.exe" "/uri:%l"
Example: skype:+14035551111?call
|
skype-plugin
|
Skype Plugin Protocol Handler
|
Something to do with adding plugins to skype? Maybe.
"C:\Program Files\Skype\Plugin Manager\skypePM.exe" "/uri:%1"
|
svn
|
SVN Protocol
|
Opens TortoiseSVN to browse the repository URL specified in the URL.
C:\Program Files\TortoiseSVN\bin\TortoiseProc.exe /command:repobrowser /path:"%1"
|
svn+ssh
|
tsvn
|
webcal
|
Webcal Protocol
|
Wikipedia describes webcal URL scheme.
Webcal URL scheme description.
A URL that starts with webcal:// points to an Internet location that contains a calendar in iCalendar format.
"C:\Program Files\Windows Calendar\wincal.exe" /webcal "%1"
Example: webcal://www.lightstalkers.org/LS.ics
|
WindowsCalendar.UrlWebcal.1
|
zune
|
Zune Protocol
|
Provides access to some Zune operations such as podcast subscription (via Zune Insider).
"c:\Program Files\Zune\Zune.exe" -link:"%1"
Example: zune://subscribe/?name=http://feeds.feedburner.com/wallstrip.
|
feed
|
Outlook Add RSS Feed
|
Identify a resource that is a feed such as Atom or RSS. Implemented by Outlook to add the indicated feed to Outlook.
Feed URI scheme pre-draft document
"C:\PROGRA~2\MICROS~1\Office12\OUTLOOK.EXE" /share "%1"
|
im
|
IM Protocol
|
RFC 3860 IM URI scheme description
Like mailto but for instant messaging clients.
Registered by Office Communicator but I was unable to get it to work as described in RFC 3860.
"C:\Program Files (x86)\Microsoft Office Communicator\Communicator.exe" "%1"
|
tel
|
Tel Protocol
|
RFC 5341 - tel URI scheme IANA assignment
RFC 3966 - tel URI scheme description
Call phone numbers via the tel URI scheme. Implemented by Office Communicator.
"C:\Program Files (x86)\Microsoft Office Communicator\Communicator.exe" "%1"
|
(Updated 2008-10-27: Added feed, im, and tel from Office Communicator)
technical application protocol shell url windows 2008 Oct 23, 11:27Informative and humorous video on the topic of printer tracking dots. "Most color laser printers and color copiers are designed to print invisible tracking codes across every single printed page of
their output. These codes reveal which machine produced a document and, in some cases, when the document was printed or copied."
humor video security privacy eff printer 2008 Oct 23, 10:34Geoffrey K. Pullum of Language Log defines 'nerdview': "It is a simple problem that afflicts us all: people with any kind of technical knowledge of a domain tend to get hopelessly (and unwittingly)
stuck in a frame of reference that relates to their view of the issue, and their trade's technical parlance, not that of the ordinary humans with whom they so signally fail to engage... The
phenomenon - we could call it nerdview - is widespread." Woo, go year-month-day, go!
nerdview language date programming nerd writing 2008 Oct 15, 2:53Stylish blog that looks like it has interesting cultural and business related articles and links (not just weird/humorous).
blog web advertising monthly design culture business 2008 Oct 15, 2:50VJ who does live illustrations on her Wacom tablet that's projected onto walls or crowds while DJ plays music: "An illustrator by training, Shantell's VJing style is to illustrate the music being
played, mesmerizing the crowd with the line art drawn in time to the beat. She originates from London where she received a degree in graphic design at Central Saint Martins College of Art and Design.
Moving to Tokyo in 2004, she began working as an illustrator and soon, the VJing scene found her."
music dj art vj wacom 2008 Oct 14, 11:14Similar in concept to the Pirate Bay suggestion of encrypting all TCP/IP connections if both server and client support it: "Obfuscated TCP is a transport layer protocol that adds opportunistic
encryption. It's designed to hamper and detect large-scale wiretapping and corruption of TCP traffic on the Internet."
internet tcp encryption security google privacy opensource cryptography network ssl 2008 Oct 13, 10:53"This is an FAQ (Frequently Asked Questions list) for the 2008 United States Presidential Election. I need to disclose up front that I am an Obama supporter. However, with the exception of the very
last question, this FAQ is designed as a collection of factual information (such as the latest poll results) and of analysis that is as objective as possible."
via:kris.kowal politics election obama mccain 2008 Sep 16, 4:25I'd seen the previous year's Feltron Annual Report but not the rest of the portfolio. Great stuff.
blog art visualization statistics data portfolio design 2008 Sep 8, 6:51Neil prints out brain cross sections from an MRI and pastes them onto a set of wooden cubes forming a model of his brain. "Last month I took a left-right MRI scan, reconstructed it, and rerendered
top-bottom and front-back scans... Another method to visualize a complex 3D object is to build a model. The dimensions of the MRI data cuboid are almost exactly 3x4x5. Accordingly, I obtained 60
one-inch cubes ... arranged them appropriately, varnished the 94 outside faces, printed nine carefully selected cross-sections and their mirror images, sliced the prints into 266 squares and glued
them to the correct internal faces."
art design brain toy model wood 2008 Sep 8, 11:40"Up and Then Down: The lives of elevators. by Nick Paumgarten". A story on elevators, the people behind them, elevator mishaps, etc. Interesting article.
article elevator history design newyorker 2008 Sep 1, 9:35
sequelguy posted a photo:
Humorous modified sign: "Stop for me its the law" changed to "... its the claw" with a claw added to the stick figures arm.
seattle washington alki watersign 2008 Aug 29, 10:44Cool 30's Soviet Union tourist brochure logos and designs. "Intourist was renowned as the official state travel agency of the Soviet Union. It was founded in 1929 by Joseph Stalin and was responsible
for managing the great majority of foreigners' access to, and travel within, the Soviet Union. It grew into one of the largest tourism organizations in the world, with a network embracing banks,
hotels, and money exchanges. Some of the best Intourist labels and brochures produced during the 1930's were designed by A. Selensky. Some of the labels in this set are signed by him, including a
rare constructivist style travel brochure I have included as well."
flickr photo propaganda graphic russia history design 2008 Aug 29, 8:37"Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like
the National Security Agency." Described fixes all require significant changes to the software and probably hardware doing the routing. Ugh
wired article security internet bgp hack networking defcon 2008 Aug 26, 10:03"A new system devised by Carnegie Mellon University researchers aims to thwart man-in-the-middle (MitM) attacks by providing a way to verify the authenticity of self-signed certificates. The system,
which is called Perspectives, uses a distributed network of "notary" servers to evaluate the public key of a target destination so that its validity can be ascertained."
security ssl pki certificate man-in-the-middle 2008 Aug 14, 4:52"French street artist ZEVS ... now also has a home in the art world and had his first exhibition in Asia: Postcapitalism Kidnapping at Hong Kong-based gallery Art Statements, documenting how ZEVS
cleverly distorts the logos of big brands. For PingMag, he explains their visual power."
graffiti culture art cultural-disobediance interview streetart guerilla