Tags: mission

22

sparkline

I commissioned an oil painting of Barbra Streisand’s cloned dogs

There’s something deliciously appropriate about using a painting cloning service to clone a photograph of some cloned dogs.

“Did you just order an oil painting of Barbra Streisand’s dogs?” is the most Simon and Natalie thing ever.

Although this comes close:

I took it to the framing store and asked if they could do something with “an air of existential dread”… and they nailed it too!

An exercise in progressive enhancement - DEV Community 👩‍💻👨‍💻

Hui-Jing talks through her process of building a to-do app on Glitch using a progressive enhancement mindset:

I found that HTML out-of-the-box takes care of a lot of things when it comes to collecting user inputs from the front-end, which resulted in much less code required. This is not to say client-side Javascript is bad, because the experience was smoother (and faster) when I used it for updating content.

194028 – Add limits to the amount of JavaScript that can be loaded by a website

Now this is a feature request I can get behind!

A user must provide permission to enable geolocation, or notifications, or camera access, so why not also require permission for megabytes of JavaScript that will block the main thread?

Without limits, there is no incentive for a JavaScript developer to keep their codebase small and dependencies minimal. It’s easy to add another framework, and that framework adds another framework, and the next thing you know you’re loading tens of megabytes of data just to display a couple hundred kilobytes of content.

I’m serious about this. It’s is an excellent proposal for WebKit, similar to the never-slow mode proposed by Alex for Chromium.

PushAPI without Notifications | Seblog

Remember when I wrote about using push without notifications? Sebastiaan has written up the details of the experiment he conducted at Indie Web Camp Berlin.

Thinking about permissions on the web | Sally Lait

Sally takes a long hard look at permissions on the web. It’s a fascinating topic because of all the parties involved—browsers, developers, and users.

In order to do permissions well, I think there are two key areas to think about - what’s actually being requested, and how it’s being requested.

Is a site being intrusive with what they can potentially learn about me (say, wanting my precise location when it’s unnecessary)? Or is it being intrusive in terms of how they interact with me (popping up a lot of notifications and preventing me from quickly completing my intended task)? If one of those angles doesn’t work well, then regardless of whether the other is acceptable to someone, they’re likely to start opting out and harbouring negative feelings.

Three Missions | Field Notes

Okay, I think I’m going to have to get this pack of three notebooks: Mercury, Gemini, and Apollo.

New Privacy Rules Could Make This Woman One of Tech’s Most Important Regulators - The New York Times

It’s kind of surreal to see a profile in the New York Times of my sister-in-law. Then again, she is Ireland’s data protection commissioner, and what with Facebook, Twitter, and Google all being based in Ireland, and with GDPR looming, her work is more important than ever.

By the way, this article has 26 tracking scripts. I don’t recall providing consent for any of them.

A techie’s rough guide to GDPR — Cennydd Bowles

In this excerpt from his forthcoming book, Cennydd gives an overview of what GDPR will bring to the web. This legislation is like a charter of user’s rights, and things don’t look good for the surveillance kings of online advertising:

The black box will be forced open, and people will find it’s full of snakes.

IF Data Permissions Catalogue

A collection of interface patterns for granting or denying permissions.

How a Couple of Guys Built the Most Ambitious Alien Outreach Project Ever | Science | Smithsonian

One might think sending messages to other stars would be a massive, expensive job. No. It isn’t. The Cosmic Call was essentially a crowdfunded hobby project.

Designing digital services that are accountable, understood, and trusted (OSCON 2016 talk)

Software is politics, because software is power.

The transcript of a tremendous talk by Richard Pope.

Lunar Missions Ltd

We’re going back to the moon. With a robot. So we can take sublunarean samples.

You can help fund it on Kickstarter.

Installable Webapps: Extend the Sandbox by Boris Smus

This a great proposal: well-researched and explained, it tackles the tricky subject of balancing security and access to native APIs.

Far too many ideas around installable websites focus on imitating native behaviour in a cargo-cult kind of way, whereas this acknowledges addressability (with URLs) as a killer feature of the web …a beautiful baby that we definitely don’t want to throw out with the bathwater.

Planning Notices in Brighton « Phil Lucas

I wish to cover the entire Brighton Pavilion in Bakelite for my own amusement.

Solita: This is rude

Let’s be polite. Especially when starting relationships.

The Perpetual, Invisible Window Into Your Gmail Inbox - Waxy.org

Andy sounds a cautionary note: the password anti-pattern may be dying, but OAuth permission-granting shouldn’t be blasé. This is why granular permissions are so important.

Clean up ALL Your Applications Privacy Settings in 2 Minutes

A one-stop-shop with links to the authentication settings of various online services. Take the time to do a little Spring cleaning.

Don't Give Your Account Passwords Away, a Mission on PMOG

A PMOG mission where players learn about the password anti-pattern.