Kategorie: Tim’s Weblog
-
The programmer as (starving) artist
Robin ‚Roblimo‘ Miller on NewsForge: „Writing software is fascinating, even somewhat addictive. People in the writing business are familiar with the phenomenon of „compulsive writers“ who write not for money but because that’s what they do. […] The free software movement is full of compulsive programmers.“
-
RESTful Error Handling
Ethan Cerami: „A major element of web services is planning for when things go wrong, and propagating error messages back to client applications. However, unlike SOAP, REST-based web services do not have a well-defined convention for returning error messages. In fact, after surveying a number of REST-based web services in the wild, there appear to…
-
Inference in Topic Maps using tolog
Fascinating – Topic Map Inference rules in tolog: „The parent-of rule parent-of($A, $B) :- { parenthood($B : child, $A : mother, $F : father) | parenthood($B : child, $M : mother, $A : father) }. What this rule says is that A is the parent-of B if A is either the mother or father of…
-
Oracle on the „keep-it-simple“ spirit of PHP
The Oracle Technology Network has a friendly article on PHP: „Remember the heady days of HTML version 1.0 to version 2.0, when mastering a new Web language was as simple as looking at the code behind a Web site? Remember the ease of learning that came with basic HTML? Remember being able to hack out…
-
Security-aware PHP programming
David Sklar: PHP and the OWASP Top Ten Security Vulnerabilities John Coggeshall at ONLamp.com: ONLamp.com: PHP Security, Part 1, Part 2, and Part 3. Clancy Malcolm at ONLamp.com: Ten Security Checks for PHP, Part 1, and Part 2. Jordan Dimov at PHPAdvisory.com: On the Security of PHP (Part 1) Quite old: Shaun Clowes‘ A Study…
-
Babeldoc
Babeldoc seems to have a sound concept. Excerpts from their Whitepaper (PDF): „Babeldoc is based around the concept of pipeline processing. Pipeline processing is where an input document is subjected to a linear succession of processing. The document is successively transformed into useful information. Examples of this might be to convert a purchase order document…
-
SiteMesh
SiteMesh sounds like a good idea (found this through PHP-Mesh): „SiteMesh intercepts requests to any static or dynamically generated HTML page requested through the web-server, parses the page, obtains properties and data from the content and generates an appropriate final page with modifications to the original. This is based upon the well-known GangOfFour Decorator design…
-
Connecting XUL Applications with PHP
phpPatterns: „So, you have looked at XUL and think it’s pretty cool stuff. But, you hate programming with javascript and are stuggling to leverage the power of your favorite scripting language, PHP. There are ways around this, but the minefield of the Gecko security model is a little to much work to figure out. Well,…
-
Blogs, homepages and privacy
Andy Oram points to a fascinating Swedish court decision: „Mrs Lindqvist also described the work done by her colleagues and their hobbies in mildly humorous terms. In several cases their family circumstances, their telephone number and other information were given. She also mentioned that one of her colleagues had injured her foot and was working…
-
The unpublished book on Microsoft insecurity
Jason Coombs on Bugtraq: „I wrote an information security book last year under contract with Microsoft Press. The book was never published — among other things it explains truthfully the poor security condition of Windows and offers detailed instructions and advice for defending against Microsoft’s bad business practices and incorrect security decisions. URLs for the…