Netalia Just for Developers

Total Page:16

File Type:pdf, Size:1020Kb

Netalia Just for Developers netalia just for developers HTML5 CSS3 y JavaScript Marino Posadas ADVERTENCIA LEGAL Todos los derechos de esta obra están reservados a Marino Posadas y netalia. El editor prohibe cualquier tipo de fijación, reproducción, transforma- ción o distribución de esta obra, ya sea mediante venta, alquiler o cual- quier otra forma de cesión de uso o comunicación pública de la misma, total o parcialmente, por cualquier sistema o en cualquier soporte, ya sea por fotocopia, medio mecánico o electrónico, incluido el tratamiento informático de la misma, en cualquier lugar del mundo. La vulneración de cualesquiera de estos derechos podrá ser consi- derada como una actividad penal tipificada en los artículos 270 y si- guientes del Código Penal. La protección de esta obra se extiende al mundo entero, de acuerdo con las leyes y convenios internacionales. © Marino Posadas, 2012 © netalia, S.L. 2012 HTML5, CSS 3 y JavaScript Autor: Marino Posadas Responsable editorial: Paco Marín Diseño de cubierta: Silvia Gil Maquetación: Silvia Gil Editado por netalia http://www.netalia.es - http://www.dnmplus.net @netalia_es Editado en formato digital e impreso. Impreso Precio: 29,50€ ISBN: 978-84-939296-2-6 Edición impresa en Navarra por Ulzama Digital Precio: 9,95€ ISBN: 978-84-939296-1-9 A Juan José García y Javier García, con la promesa de que jamás les obligaré a leer nada mío. A mis sobrinos A Milagros… siempre. «Hay solo dos clases de lenguajes de programación: aquellos de los que la gente está siempre quejándose y aquellos que nadie usa» Bjarne Stroustrup «Los proveedores de software están intentando hacer sus productos más amigables para el usuario. Su mejor aproximación hasta el momen- to ha sido tomar sus antiguos folletos y estampar las palabras ‘amigable para el usuario’ en la portada» Bill Gates Agradecimientos A Paco Marín, de Netalia, por animarme siempre en estas empresas. A mis compañeros del grupo de MVP de Microsoft en España, con Cristina González Herrero a la cabeza, y los componentes del DPE y di- vulgación en Microsoft: Alfonso Rodríguez, José Bonnín, David Carmona, David Salgado y todos los demás. A Paul Cotton de la W3C, por sus palabras y ánimos en la entrevista que nos concedió en su visita a Madrid. A mis seguidores de Twitter, Facebook y otras redes sociales. Siempre son una motivación para continuar la tarea. Y a las empresas colaboradoras y amigas o que han mostrado interés en este proyecto, como Alhambra-Eidos, Aula MCT, CAS Training, DanySoft, MegaTraining, Ceticsa, MSL, Desfufor, GadeSoft. ¡Que siga- mos mucho tiempo en la brecha! índice 1. Introducción . 13 Objetivos de la W3C . .14 Objetivos de esta obra . .14 Las Herramien tas . .14 HTML 5: La n ueva propuesta . .15 El World Wide Web Con sortium . .16 Están dares, HTML y la W3C . .16 El lapso de tiempo desde el último están dar . .17 El problema de las fechas de termin ación . .18 Los n avegadores y el están dar: IE10 como objetivo . .19 Nuevas reglas del juego . .20 Los n avegadores an tiguos . .21 Los objetivos del están dar en la práctica . .22 Motores de JavaScript . .23 Librerías y Len guajes que compilan a JavaScript . .24 ¿Por qué n o esperar a que el están dar esté termin ado? . .25 El sueño de un a Web Semán tica . .26 Los Iden tificadores un iformes de recursos (URI vs. URL) . .27 URI y Semán tica . .27 Especificacion es y pruebas de laboratorio . .29 Los test . 29 Los sitios altern ativos de pruebas de con formidad . .30 Los sitios oficiales . .31 Las aplicacion es web y el n uevo modelo de aplicacion es en Win dows8 . .32 A plicacion es Win dows 8 . .33 El n uevo modelo de aplicacion es Win dows 8 . .34 La posición de Silverlight y Flash en Win dows 8 . .35 Win JS y los con troles "de fábrica" . .35 La división gran ular de JavaScript . .38 Ejecución y soporte del están dar . .39 Los motores Chakra y los dos con textos de ejecución . .40 Hablan do sobre el están dar: la opin ión de un protagon ista . .41 En trevista con Paul Cotton . .41 Referen cias . .52 Referen cias de la Web Semán tica . .52 2. Herramientas y depuración . .55 Las herramien tas de los n avegadores . .55 Herramien tas y depuración . .55 La herramien ta de desarrollo de In tern et Explorer (F12) . .56 Fiddler . .59 Version es de Fiddler y herramien tas añadidas . .60 A rquitectura de Fiddler . .62 Comparativa de capacidades de análisis de tráfico de red entre F12/IE y Fiddler 63 Generación de informes . .64 Otras extensiones de Fiddler . .66 Fiddler como complemento de navegadores . .66 FireBug para FireFox . .67 Vistas 3D de cualquier página . .69 Las herramientas de desarrolladores de Google Chrome . .70 Opera . .72 Safari . .74 El soporte de HTML 5 en Visual Studio . .75 El nuevo soporte de HTML 5 en Visual Studio 2012 . .76 Page Inspector . .78 Soporte de Hojas de Estilo . .80 Soporte de JavaScript . .84 Microsoft Expression Blend para Visual Studio 2012 . .87 Plantillas disponibles . .88 Referencias . .93 3. HTML 5: nuevas etiquetas . .95 El problema de la WHA TWG . .95 El marco de trabajo y los objetivos . .96 Compatibilidad hacia atrás . .97 Sintaxis general . .98 El tipo de documento: DOCTYPE . .99 Codificación de Caracteres (Encoding) . .100 HTML5: Los nuevos elementos . .101 Cambios genéricos para todos los elementos: A tributos globales . .103 Las nuevas etiquetas, por categorías . .105 Etiquetas estructurales o semánticas . .105 Etiqueta <Section> . .106 <section> y la noción de esquema de un documento . .108 Etiqueta <article> . ..
Recommended publications
  • Internet Explorer 9 Previewed 17 March 2010, by Lin Edwards
    Internet Explorer 9 previewed 17 March 2010, by Lin Edwards translation necessary. This will improve performance because there is a massive difference in speed between compiled and interpreted code. This, and the speed gain by using the GPU, was demonstrated at the conference with a display of increasing numbers of spinning three-dimensional icons, which the IE9 preview could handle far better than any other browser. Since less of the first core of CPU is being used, the display is much faster, and will also allow developers to create a new class of Web applications. Another change in the new browser is an emphasis on browser interoperability, so that programs (PhysOrg.com) -- Microsoft has released the written for IE9 should run properly on other preview version of Internet Explorer 9, which has browsers as well. Hachamovitch said that as HTML5 integration, background compiled Internet Explorer supports more of the markups Javascript, and scalable vector graphics (SVG) used by websites, their Acid score will improve. capability. (This is a test run by W3C, the official Internet standards body.) The preview browser engine The preview code for the Internet browser’s scored 55 out of 100, which is a significant rendering engine was revealed at Microsoft’s improvement on the previous version’s score of 20. MIX10 developer conference in Las Vegas yesterday. The major goals for the new engine are It is not yet known when the new browser will be support for the emerging Web standards such as released as a beta or final version. Meanwhile, the SVG and HTML5, and greater speed.
    [Show full text]
  • WSJ 2010. Microsoft Quashed Effort to Boost Online Privacy.Pdf
    http://online.wsj.com/article/SB10001424052748703467304575383530439838568.html?mod=WSJ_hpp_LEADSecondNewsCollection#pr... WHAT THEY KNOW AUGUST 2, 2010 Microsoft Quashed Effort to Boost Online Privacy By NICK WINGFIELD The online habits of most people who use the world's dominant Web browser are an open book to advertisers. That wasn't the plan at first. In early 2008, Microsoft Corp.'s product planners for the Internet Explorer 8.0 browser intended to give users a simple, effective way to avoid being tracked online. They wanted to design the software to automatically thwart common tracking tools, unless a user deliberately switched to settings affording less privacy. That triggered heated debate inside Microsoft. As the leading maker of Web browsers, the gateway software to the Internet, Microsoft must balance conflicting interests: helping people surf the Web with its browser to keep their mouse clicks private, and helping advertisers who want to see those clicks. In the end, the product planners lost a key part of the debate. The winners: executives who argued that giving automatic privacy to consumers would make it tougher for Microsoft to profit from selling online ads. Microsoft built its browser so that users must deliberately turn on privacy settings every time they start up the software. Microsoft's original privacy plans for the new Explorer were "industry-leading" and technically superior to privacy features in earlier browsers, says Simon Davies, a privacy-rights advocate in the U.K. whom Microsoft consulted while forming its browser privacy plans. Most users of the final product aren't even aware its privacy settings are available, he says.
    [Show full text]
  • Windchill Web Browser Comparison Technical Brief
    Windchill Web Browser Comparison Technical Brief Contents About This Document ........................................................................................... 2 Supported Releases and Products ................................................................................................ 2 Audience ........................................................................................................................................ 2 Challenge ............................................................................................................... 2 Solution ................................................................................................................. 4 The Role of the Web Browser in Windchill 10.0 ............................................................................ 4 Key Characteristics of the Web Browser for Windchill 10.0 .......................................................... 5 Web Browser Release Date ..................................................................................................... 7 Windchill 10.0 Web Browser Support ....................................................................................... 7 Windows Platform Support for Web Browsers ......................................................................... 7 Creo Elements/Pro 5.0, Pro/ENGINEER Wildfire 4.0, and Windchill Workgroup Manager Support ..................................................................................................................................... 7 Performance ............................................................................................................................
    [Show full text]
  • HTML5 WEBSOCKETS Brad Drysdale Director of Technlogy KAAZING!
    HTML5 WEBSOCKETS Brad Drysdale Director of Technlogy KAAZING! 1! Kaazing. Connect. Everything. WebSockets The Web Communication Revolution Brad Drysdale 2! Director of Technology - Kaazing Next Generation Web-based… Single Trader Desktop 3! Next Generation Web-based… Single Trader Desktop 4! Next Generation Web-based… Single Trader Desktop Real-time Gambling 5! Next Generation Web-based… Smart Metering IPTV On-line Gaming Single Trader Desktop Social Networking Real-time Gambling eComm Monitoring/Dashboards 6! Reaching the Masses… W W W 7! Going big… Extending your business across the Web means $$$ 8! Yet you say… “I can already do this today” 9! Hang on… Can you really? 10! Is your proposed solution… • Low Latency, Real-time Data ? • Bandwidth Efficient ? • Open Standards ? • Require Plugins ? (Note: IE10) • Platform Neutral ? • Seamless support for Mobile/Tablet OS ? • Cloud Ready ? • Future Proofed ? • Web Scale ? 11! Is your proposed solution… • Low Latency, Real-time Data ? • Bandwidth Efficient ? • Open Standards ? • Require Plugins ? (Note: IE10) • Platform Neutral ? • Seamless support for Mobile/Tablet OS ? • Cloud Ready ? • Future Proofed ? • Web Scale ? • Truly Web Competitive ??? 12! Here we go… So what’s new… 13! Here we go… Here’s how you get Web Competitive 14! Welcome HTML5 • HTML5 is the next set of W3C HTML standards • Offers new and enhanced features as building blocks for next generation RIAs • Industry standard backed by Google, Apple, Mozilla, Microsoft, Cisco, etc • Many of the browser vendors have already implemented
    [Show full text]
  • Distributed Geo-Services Based on Wireless GIS - a Case Study for Post-Quake Rescue Information System
    TECHNISCHE UNIVERSITÄT MÜNCHEN Lehrstuhl für Kartographie Distributed geo-services based on Wireless GIS - a case study for post-quake rescue information system Yimei Liu Vollständiger Abdruck der von der Fakultät für Bauingenieur-und Vermessungswesen der Technischen Universität München zur Erlangung des akademischen Grades eines Doktor-Ingenieurs (Dr.-Ing.) genehmigten Dissertation. Vorsitzender: Univ. -Prof. Dr.-Ing. Thomas Wunderlich Prüfer der Dissertation: 1. Univ.-Prof. Dr.-Ing. Liqiu Meng 2. Univ.-Prof. Dr.-Ing. Matthäus Schilcher Die Dissertation wurde am 06.06.2011 bei der Technischen Universität München eingereicht und durch die Fakultät für Bauingenieur-und Vermessungswesen am 21.07.2011 angenommen. 2 Abstract With the continuous evolution and extension of wireless communication technology, geographic information system has been developed from desktop to mobile, from wired to wireless environment. The research and development of wireless GIS have made capture, query, and transmission of geo-data more simple, open and standardized. The distributed geo-services based on web and/or wireless web supported by a large number of middleware vendors have particularly rich research contents and wide applications. Many open source GIS software programs have emerged in the recent decade and benefited countless users worldwide. The open source means geographic information can be exchanged and applied without any commercial purpose. It has become a development trend in Wireless GIS application. A useful application of Wireless GIS is the handling of natural disasters such as earthquakes. Earthquakes frequently strike us, particularly in the current period of crustal activity. With the changing environment, other natural disasters related to climate, such as floods and hurricanes are also continuously threatening people’s lives and properties.
    [Show full text]
  • Redmondmag.Com
    Project4 6/18/08 11:56 AM Page 1 Project6 10/16/08 11:14 AM Page 1 1108red_Cover.v3 10/15/08 2:56 PM Page 1 Microsoft Thinks Different with IE8 NOVEMBER 2008 REDMONDMAG.COM Readers’Readers’ ChoiceChoice AwardsAwards 20082008 This year, we honor our three-time winners. +Paul Maritz: The Microsoft Menace Readers Wonder If Chrome Gets Them Home Can the Cisco Kid Lasso Microsoft? How Software Can Save You Gas Project8 7/3/08 12:42 PM Page 1 Project8 7/3/08 12:44 PM Page 2 %" ) %" "' $ $ ! '"% #$"$ &$ '$ %### $ # %$ # " + " # $,* $ " %! $ ## !" $")$ $ $ !$$ %$ %#$") #$"# " # $, "&", #)#$# " " # $ #! !$$ # '" "# "% !($)* ' &" $ #$ !" " !" " $ %#$") $ &"! !"#$! ! $% "#$ ! %)" &$ $$ % !,# $ #! #(# &%&##$ '#$&$ #!$!% ! !,# $ # $)$%$ ! *&# (% ! % $%!# %$ ""%! $!%(# &$ $$ % )% $!%(# $ %## ! + #%$ #$#' $!%(# &$ $$ % )% $!%(# $ %## ! + #%$ #$#' 1108red_TOC2.v7 10/15/08 5:06 PM Page 2 Redmond NOVEMBER 2008 The Independent Voice of the Microsoft IT Community Contents COVER STORY REDMOND REPORT 11 Maritz: VMware’s 2008 Readers’ Choice Answer to Microsoft? The virtualization giant’s Awards: new CEO on competing with Redmond. Introducing 12 Cisco and VMware Collaborate on Next- Redmond’s Gen Data Center The companies’ new Triple Crown products could change the virtualization game. Readers love some products so much that they keep voting them Readers’ Choice winners again and again. To recognize the dynasties TIPS & TRICKS in our annual competition, Redmond is introducing the “Triple Crown,” a brand-new 15 Professor award for products that have won (at least) Powershell: three Readers’ Choice honors in a row. Get Smart and Get -Out Page 30 15 QuickTip: Next, Next, Repeat 16 Windows Advisor: Disk Cleanup Disaster FEATURES Waiting to Happen; POP3 Errors in Exchange 45 The Unlikely Contender 51 Remote Tools that Can Networking giant Cisco goes after Help You Save Gas COLUMNS Microsoft’s supremacy in the Besides carpooling and riding a collaboration-software market.
    [Show full text]
  • Microsoft a History of Anticompetitive Behavior and Consumer Harm
    March 31, 2009 Microsoft A History of Anticompetitive Behavior and Consumer Harm March 31, 2009 TABLE OF CONTENTS I. INTRODUCTION ...............................................................................................................1 II. MICROSOFT’S HISTORY OF ANTICOMPETITIVE CONDUCT .................................3 A. Microsoft’s Campaign To Destroy DR-DOS ..........................................................3 B. Microsoft’s Anticompetitive Per Processor License Fees .......................................5 C. Microsoft’s Retaliation And Price Discrimination Against IBM ............................6 D. Microsoft’s Organized Collective Boycott Against Intel ........................................7 E. Microsoft’s Elimination Of Word Perfect ...............................................................7 F. Microsoft’s Deceptive WISE Software Program.....................................................9 G. Microsoft’s Elimination Of Netscape ....................................................................10 H. Microsoft’s Attempts To Extinguish Java .............................................................14 I. Microsoft’s Elimination Of Rival Media Players ..................................................16 J. Microsoft’s Campaign Against Rival Server Operating Systems..........................18 III. MICROSOFT CONTINUES TO ENGAGE IN ANTICOMPETITIVE CONDUCT ......19 A. Microsoft’s Failure To Comply With The Final Judgment ...................................20 B. Microsoft’s Campaign of Patent FUD against Linux
    [Show full text]
  • Writing Secure Code (Vista).Pdf
    MICROSOFT LICENSE TERMS MICROSOFT EBOOK These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them. They apply to the licensed content named above, which includes the media on which you received it, if any. By using the licensed content, you accept these terms. If you do not accept them, do not use the licensed content. If you comply with these license terms, you have the rights below. 1. OVERVIEW. Licensed Content. The licensed content includes the eBook and associated media. License Model. The licensed content is licensed on a per user per device basis. 2. INSTALLATION AND USE RIGHTS. a. General. One user may install and use one copy of the licensed content on a single computer. b. Portable Device. You may install an additional copy of the licensed content on a portable device for the exclusive use of the primary user of the first copy of the licensed content. 3. SCOPE OF LICENSE. The licensed content is licensed, not sold. This agreement only gives you some rights to use the licensed content. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the licensed content only as expressly permitted in this agreement. You agree Not to make copies of the licensed content; Not to distribute, rent, lease, lend, reproduce, transit, adapt, modify, link to, post, forward, make derivative works based upon, disseminate, publish or sublicense the licensed content or combine the licensed content with
    [Show full text]
  • Microsoft Unveils New Privacy Feature for IE 7 December 2010, by JORDAN ROBERTSON , AP Technology Writer
    Microsoft unveils new privacy feature for IE 7 December 2010, By JORDAN ROBERTSON , AP Technology Writer Requiring users to sort out which sites are good and bad puts the onus on the wrong people, said Anup Ghosh, founder and chief scientist of Invincea, which makes software that works with Internet Explorer to improve security. "With this kind of 'do not track' list, the industry is not held accountable for not tracking. It's the user that's responsible. They kind of got it backward," he said. "Users aren't equipped to make these kinds of decisions, nor do they want to." Microsoft's Dean Hachamovitch, Corporate Vice A familiar refrain among security and privacy President of Internet Explorer, speaks at the Internet professionals is that Internet users by and large Explorer 9 Beta launch event in San Francisco in don't fully appreciate the extent to which sites September 2010. Microsoft unveiled increased privacy harvest their personal information. options Tuesday for the upcoming version of its popular Web browser Internet Explorer 9 including the ability to Visiting a modern website is less like a handshake prevent tracking by third-party websites. between two friends than it is glad-handing a room full of strangers. Unless you have tinkered with your security settings, in most browsers, you implicitly give any site you visit permission for it and all of its An upcoming version of Microsoft Corp.'s Internet advertising partners to track you. The tracking Explorer browser will let users add lists of sites that happens silently, and your browsing habits are sold they don't want tracking them, a peace offering and analyzed by advertising firms looking for ways amid uproar over the sneaky ways that websites to show you more relevant ads.
    [Show full text]
  • A Systematic Approach to Uncover GUI Logic Flaws for Web Security
    A Systematic Approach to Uncover GUI Logic Flaws for Web Security Shuo Chen Jose Meseguer Ralf Sasse Helen Wang Yi-Min Wang December 13, 2006 Technical Report MSR-TR-2006-182 Microsoft Research Microsoft Corporation One Microsoft Way Redmond, WA 98052 -0- A Systematic Approach to Uncover GUI Logic Flaws for Web Security Shuo Chen †, José Meseguer ‡, Ralf Sasse † ‡, Helen J. Wang †, Yi-Min Wang † † Microsoft Research ‡ University of Illinois at Urbana-Champaign {shuochen,helenw,ymwang}@microsoft.com {meseguer,rsasse}@cs.uiuc.edu Abstract To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic bugs in GUI design/implementation. Visual spoofing attacks that exploit these flaws can lure even security-conscious users to perform unintended actions. The focus of this paper is to formulate the problem of GUI logic flaw and to develop a methodology for uncovering them in software implementations. Specifically, based on an in-depth study of key subsets of Internet Explorer (IE) browser source code, we have developed a formal model for the browser GUI logic and have applied formal reasoning to uncover new spoofing scenarios, including nine for status bar spoofing and four for address bar spoofing. The IE development team has confirmed all these scenarios and has fixed most of them in their latest build. Through this work, we demonstrate that a crucial subset of the visual spoofing vulnerabilities originate from GUI logic flaws, which have a well-defined mathematical meaning allowing a systematic analysis.
    [Show full text]
  • Microsoft Releases New Internet Explorer 9 Browser 15 March 2011, by Glenn Chapman
    Microsoft releases new Internet Explorer 9 browser 15 March 2011, by Glenn Chapman processing chips that can power videos, games and graphics. The long list of partners that have adapted websites to IE9 includes Facebook, Twitter, Pandora, Hulu, and Yahoo!, according to Microsoft. "We have worked with partners reaching a billion active Internet users," Hachamovitch said. "All of these partners are using IE9 to make a more beautiful Web, starting today." Microsoft announced that it will release the latest version More than 40 million copies of IE9 have already of its Internet Explorer Web browsing software free been downloaded as part of the process leading up online late on Monday (0400 GMT Tuesday). IE 9 will be to its official release, according to Microsoft. available for download in 30 languages at beautyoftheweb.com. Microsoft showed off a lean, muscular new Internet Explorer crafted to spotlight slick websites and beat back competition from Firefox and Google. Microsoft released the latest version of its Internet Explorer Web browsing software free online late Microsoft director of web services strategy Ari Monday, hoping to fend off recent challenges by Bixhorn booted up an Apple MacBook Pro laptop Firefox and Google Chrome. running the latest version of Firefox for a side-by- side comparison. "IE9 has just released around the world," a booming voice told a cheering crowd at 11:00 pm A laptop powered by Windows and using IE9 Monday (0400 GMT Tuesday) in the Austin City smoothly zipped through cascading images Limits Live concert hall where a launch party was illustrating top tunes at a radio station website while being held.
    [Show full text]
  • What They Know: the Business of Tracking You on the Internet
    What They Know The Business of Tracking You on the Internet A Wall Street Journal Investigation 2 Table of Contents Introduction .............................................................................. 3 Contributors .............................................................................. 6 The Web's New Gold Mine: Your Secrets ....................................................... 7 Explore the Data ....................................................................................... 14 Sites Feed Personal Details To New Tracking Industry ......................... 15 How to Avoid the Prying Eyes ................................................................. 17 What They Know About You ................................................................... 20 Microsoft Quashed Effort To Boost Online Privacy .................................... 22 On the Web's Cutting Edge, Anonymity in Name Only ............................... 27 Stalking by Cellphone ................................................................................... 33 Google Agonizes on Privacy as Ad World Vaults Ahead ............................. 39 On the Web, Children Face Intensive Tracking .......................................... 45 Explore the Data ...................................................................................... 50 How to Protect Your Child’s Privacy Online ........................................... 51 'Scrapers' Dig Deep For Data on Web ..........................................................53 Facebook in Privacy Breach
    [Show full text]