On Mon, 1 Mar 2010, ben turner wrote:
I'm implementing the structured clone algorithm and this part bothers me
a little bit:
- If input is a host object (e.g. a DOM node)
Return the null value.
Seems like this has the potential to confuse web programmers somewhat.
If I were to
On Wed, Mar 24, 2010 at 2:33 PM, Ian Hickson i...@hixie.ch wrote:
On Tue, 23 Mar 2010, Anne van Kesteren wrote:
We (Opera) would prefer this too. I.e. to not impose details of the
protocol on the API.
If we're exposing nothing from the protocol, does that mean we shouldn't
be exposing that
On Mon, 29 Mar 2010, Jonas Sicking wrote:
We could throw an exception, but that would make migrating from this
not being supported to this being supported later a lot harder (you'd
have to catch exceptions and then remove the nodes, rather than just
doing null checks in the worker). I
On Mon, Mar 29, 2010 at 02:04:22PM -0700, Daniel Cheng wrote:
I'm still trying to use the DnD for a real-world use, and keep hitting
problems. This is the HTML 5 draft at 7.9.4 Drag-and-drop processing
model:
From this point until the end of the drag-and-drop operation,
On Tue, Mar 30, 2010 at 12:20 AM, Ian Hickson i...@hixie.ch wrote:
On Mon, 29 Mar 2010, Jonas Sicking wrote:
We could throw an exception, but that would make migrating from this
not being supported to this being supported later a lot harder (you'd
have to catch exceptions and then remove
On Tue, Mar 30, 2010 at 12:38 AM, Stef Epardaud s...@epardaud.fr wrote:
On Mon, Mar 29, 2010 at 02:04:22PM -0700, Daniel Cheng wrote:
I'm still trying to use the DnD for a real-world use, and keep
hitting
problems. This is the HTML 5 draft at 7.9.4 Drag-and-drop processing
On Tue, Mar 30, 2010 at 01:31:15AM -0700, Daniel Cheng wrote:
But then it's up to the developer to detect that the keys weren't
pressed before (implement keydown events themselves), which is less
practical.
If you're copying the behavior of file managers, isn't it simply a
On Tue, 30 Mar 2010 09:19:33 +0300, Jonas Sicking jo...@sicking.cc wrote:
On Wed, Mar 24, 2010 at 2:33 PM, Ian Hickson i...@hixie.ch wrote:
On Tue, 23 Mar 2010, Anne van Kesteren wrote:
We (Opera) would prefer this too. I.e. to not impose details of the
protocol on the API.
If we're
On Tue, Mar 30, 2010 at 02:33:07AM -0700, Daniel Cheng wrote:
But what was the rationale for preventing key events while doing DnD?
I'm not 100% sure, but I'm assume it's so that the process of dragging and
dropping doesn't trigger unrelated mouse / keyboard listeners.
Unrelated
Forgive my ignorance, I Am Not A Lawyer, but what are the consequences
of a submarine patent on Theora and/or Vorbis? If a browser supports
it in good faith, and subsequently a troll successfully introduces a
patent challenge, would the consequence not be that the codec would
simply be dropped
On Tue, Mar 30, 2010 at 1:51 AM, Niklas Beischer n...@opera.com wrote:
On Tue, 30 Mar 2010 09:19:33 +0300, Jonas Sicking jo...@sicking.cc wrote:
On Wed, Mar 24, 2010 at 2:33 PM, Ian Hickson i...@hixie.ch wrote:
On Tue, 23 Mar 2010, Anne van Kesteren wrote:
We (Opera) would prefer this too.
Eoin Kilfeather wrote:
Forgive my ignorance, I Am Not A Lawyer,
Neither am I..
In fact a court would surely allow a reasonable time for transition.
If it's got as far as a court then it probably already cost you a
significant chunk of money.
Rob
On Tue, Mar 30, 2010 at 6:58 AM, Eoin Kilfeather ekilfeat...@dmc.dit.ie wrote:
Forgive my ignorance, I Am Not A Lawyer, but what are the consequences
of a submarine patent on Theora and/or Vorbis? If a browser supports
it in good faith, and subsequently a troll successfully introduces a
patent
Isn't the concept of a submarine patent also possible against a
patented algorithm?
Perry
Hi everyone,
In attempting to use localStorage at work, we ran into some major
security issues. Primary among those are the guidelines we have in place
regarding personalized user data. The short story is that personalized
data cannot be stored on disk unless it's encrypted using a
Most companies that have such policies enforce them with software that
encrypts your home directory (or entire hard drive). Since most (all?)
browsers store such data within a users home directory, that should be
sufficient for the specific case you're mentioning. (Well, except
for expiration.)
On Tue, Mar 30, 2010 at 2:54 AM, Stef Epardaud s...@epardaud.fr wrote:
On Tue, Mar 30, 2010 at 02:33:07AM -0700, Daniel Cheng wrote:
But what was the rationale for preventing key events while doing
DnD?
I'm not 100% sure, but I'm assume it's so that the process of dragging
and
On Tue, Mar 30, 2010 at 12:19 PM, Jeremy Orlow jor...@chromium.org wrote:
Lastly, we really should not be creating new APIs that are synchronous that
involve multiple top level windows (like LocalStorage and this API you're
proposing). It makes it very difficult to achieve isolation and
://lists.whatwg.org/pipermail/whatwg-whatwg.org/attachmen
ts/20100330/161836e3/attachment.html
--
___
whatwg mailing list
whatwg@lists.whatwg.org
http://lists.whatwg.org/listinfo.cgi/whatwg-whatwg.org
End of whatwg Digest, Vol
Nicholas is almost certainly discussing the case where the service
provider requires any data stored on a customer's computer to be
encrypted, not the provider's own computers. (e.g., this could be a
Yahoo! policy that data stored on Yahoo! users' computers must be
encrypted).
Hence they cannot
On Mar 30, 2010, at 7:38 AM, Henri Sivonen wrote:
The spec says about location.reload():
Navigate the browsing context to the document's current address
with replacement enabled. The source browsing context must be the
browsing context being navigated.
It appears that this is what WebKit
Yes, that's precisely what I'm talking about. It seems to me that this will end
up being a pretty common pattern (encrypting/decrypting data stored locally).
The idea behind letting the key to be defined by the developer is to allow any
usage that developers deem appropriate for the situation.
On Mon, Mar 29, 2010 at 9:50 AM, narendra sisodiya
narendra.sisod...@gmail.com wrote:
Thanks a lot, what about server-sent, websocket ?
At the same time I am thinking for using webshare command too.
alias webshare='python -c import SimpleHTTPServer;SimpleHTTPServer.test()'
this command will
The spec says
When a form-associated element has a form attribute and the ID of any
of the form elements in the Document changes, then the user agent must
reset the form owner of that form-associated element.
However it does not seem to reset the form owner if a form element
with an ID is added
On Tue, Mar 30, 2010 at 3:09 PM, Ian Hickson i...@hixie.ch wrote:
On Tue, 30 Mar 2010, Jonas Sicking wrote:
I agree that people are less likely to depend on exceptions. The
problem is feature detection so that you can use the new feature
(sending DOM nodes) in new clients without failing
On Tue, 2010-03-30 at 23:44 +0200, Christoph Päper wrote:
If you think about various syntax variants of wiki systems they’ve got one
thing in common that makes them preferable to direct HTML input: easy links!
(Local ones at least, whatever that means.) The best known example is
probably
Hi!
Trying to fix some bugs for Workers, I've got some questions about close()
method on
WorkerGlobalScopehttp://www.whatwg.org/specs/web-workers/current-work/#workerglobalscope
.
In particular, the spec seems to imply that after calling close() inside the
worker, the JS does not get terminated
I certainly can't argue against a focus on JS crypto. :) What I'd like to do is
eliminate what I believe will be a repeated pattern for developers in the
future. It would be really nice if, in addition to having access to crypto
functions, there was an area where I could stick data that would
On 3/30/10 9:58 AM, Eoin Kilfeather wrote:
If a browser supports it in good faith, and subsequently a troll successfully
introduces a
patent challenge, would the consequence not be that the codec would
simply be dropped with the next maintenance release of the browser?
IANAL, but as I
On 3/30/10 10:38 AM, Henri Sivonen wrote:
This makes me wonder: If the two engines with the largest market
share both take steps to enable document.open()ed docs to be
reloaded, is the behavior needed for optimal Web compatibility?
At one point, yes. I don't recall many bug reports about this
On 3/30/10 11:43 AM, Perry Smith wrote:
Isn't the concept of a submarine patent also possible against a
patented algorithm?
Yes, but since Apple already ships other H.264 decoders it already has
exposure to whatever patents could come up against it. So from their
point of view, the marginal
I'll note that the spec gives the UA an significant amount of latitude about
its behavior after close() is called:
User agents may invoke the kill a worker #kill-a-worker processing model
on a worker at any time, e.g. in response to user requests, in response to
CPU quota management, or when a
Boris Zbarsky wrote:
On 3/30/10 11:43 AM, Perry Smith wrote:
Isn't the concept of a submarine patent also possible against a
patented algorithm?
Yes, but since Apple already ships other H.264 decoders it already has
exposure to whatever patents could come up against it. So from their
point
On Tue, Mar 30, 2010 at 5:58 PM, Drew Wilson atwil...@google.com wrote:
I'll note that the spec gives the UA an significant amount of latitude
about its behavior after close() is called:
User agents may invoke the kill a worker#127b1baa1cefaebf_kill-a-worker
processing model on a worker at
On 3/30/10 10:22 AM, Jonas Sicking wrote:
Making it implementation dependent is likely to lead to website
incompatibilities. Such as:
ws = new WebSocket(...);
ws.onopen = function() {
ws.send(someString);
if (ws.bufferedAmount X) {
doStuff();
Can bufferedAmount not change due to
35 matches
Mail list logo