Amazon Silk Developer Guide Amazon Silk Developer Guide

Total Page:16

File Type:pdf, Size:1020Kb

Amazon Silk Developer Guide Amazon Silk Developer Guide Amazon Silk Developer Guide Amazon Silk Developer Guide Amazon Silk: Developer Guide Copyright © 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks of Amazon Web Services, Inc.: Amazon, Amazon Web Services Design, AWS, Amazon CloudFront, AWS CloudTrail, AWS CodeDeploy, Amazon Cognito, Amazon DevPay, DynamoDB, ElastiCache, Amazon EC2, Amazon Elastic Compute Cloud, Amazon Glacier, Amazon Kinesis, Kindle, Kindle Fire, AWS Marketplace Design, Mechanical Turk, Amazon Redshift, Amazon Route 53, Amazon S3, Amazon VPC, and Amazon WorkDocs. In addition, Amazon.com graphics, logos, page headers, button icons, scripts, and service names are trademarks, or trade dress of Amazon in the U.S. and/or other countries. Amazon©s trademarks and trade dress may not be used in connection with any product or service that is not Amazon©s, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. AWS documentation posted on the Alpha server is for internal testing and review purposes only. It is not intended for external customers. Amazon Silk Developer Guide Table of Contents What Is Amazon Silk? .................................................................................................................... 1 Split Browser Architecture ....................................................................................................... 1 Machine Learning .................................................................................................................. 2 Getting Started with Amazon Silk ..................................................................................................... 3 Are You an Amazon Silk User? ................................................................................................. 3 Are You a Site Owner? ........................................................................................................... 3 Accessing the Amazon Silk User Guide ..................................................................................... 4 Amazon Silk Settings Menu ..................................................................................................... 4 Developing Web Content for Amazon Silk .......................................................................................... 6 Responsive Web Design ......................................................................................................... 6 How Does Responsive Web Design Work? ........................................................................ 8 Responsive Design and Amazon Silk ................................................................................ 9 The Takeaway ............................................................................................................. 11 Additional Resources ................................................................................................... 11 Amazon Silk User Agent Strings ............................................................................................. 12 User Agent String Examples .......................................................................................... 13 User Agent Detection ................................................................................................... 14 Feature Detection ................................................................................................................ 14 How To Detect a Feature ............................................................................................... 15 Additional Resources ................................................................................................... 16 Media Handling ................................................................................................................... 16 Images ...................................................................................................................... 16 Audio ......................................................................................................................... 17 Video ......................................................................................................................... 17 Touch ................................................................................................................................ 17 Touch Example Using jQuery Mobile ............................................................................... 18 Additional Resources ................................................................................................... 20 Screen Resolution ............................................................................................................... 21 Secure Connections ............................................................................................................. 22 JavaScript .......................................................................................................................... 22 JavaScript Loading ...................................................................................................... 22 Caching ............................................................................................................................. 23 Remote Debugging .............................................................................................................. 24 Do Not Track ....................................................................................................................... 25 Additional Resources ................................................................................................... 26 HTML5 Support ........................................................................................................................... 27 Support for HTML5 and Related Features ................................................................................ 27 HTML5 APIs ....................................................................................................................... 29 Animation Timing API ................................................................................................... 29 Application Cache API .................................................................................................. 30 Cross-Origin Resource Sharing ...................................................................................... 31 File API ...................................................................................................................... 32 File System API ........................................................................................................... 32 Geolocation API .......................................................................................................... 34 Indexed Database API .................................................................................................. 35 Server-Sent Events ...................................................................................................... 36 Touch Events .............................................................................................................. 36 XMLHttpRequest Level 2 .............................................................................................. 37 Web SQL Database ..................................................................................................... 37 Web Storage ............................................................................................................... 38 Web Workers API ........................................................................................................ 39 WebGL ...................................................................................................................... 39 WebSocket API ........................................................................................................... 40 HTML5 Elements and Attributes ............................................................................................. 40 Audio Element ............................................................................................................. 41 iii Amazon Silk Developer Guide Canvas Element .......................................................................................................... 41 contenteditable Attribute ............................................................................................... 42 Input Types ................................................................................................................. 43 Keygen Element .......................................................................................................... 43 Meter Element ............................................................................................................ 44 Output Element ........................................................................................................... 44 Progress Element ........................................................................................................ 44 SVG Element .............................................................................................................. 45 Video Element ............................................................................................................ 45 CSS3 Support ....................................................................................................................
Recommended publications
  • The Web Never Forgets: Persistent Tracking Mechanisms in the Wild
    The Web Never Forgets: Persistent Tracking Mechanisms in the Wild Gunes Acar1, Christian Eubank2, Steven Englehardt2, Marc Juarez1 Arvind Narayanan2, Claudia Diaz1 1KU Leuven, ESAT/COSIC and iMinds, Leuven, Belgium {name.surname}@esat.kuleuven.be 2Princeton University {cge,ste,arvindn}@cs.princeton.edu ABSTRACT 1. INTRODUCTION We present the first large-scale studies of three advanced web tracking mechanisms — canvas fingerprinting, evercookies A 1999 New York Times article called cookies compre­ and use of “cookie syncing” in conjunction with evercookies. hensive privacy invaders and described them as “surveillance Canvas fingerprinting, a recently developed form of browser files that many marketers implant in the personal computers fingerprinting, has not previously been reported in the wild; of people.” Ten years later, the stealth and sophistication of our results show that over 5% of the top 100,000 websites tracking techniques had advanced to the point that Edward employ it. We then present the first automated study of Felten wrote “If You’re Going to Track Me, Please Use Cook­ evercookies and respawning and the discovery of a new ev­ ies” [18]. Indeed, online tracking has often been described ercookie vector, IndexedDB. Turning to cookie syncing, we as an “arms race” [47], and in this work we study the latest present novel techniques for detection and analysing ID flows advances in that race. and we quantify the amplification of privacy-intrusive track­ The tracking mechanisms we study are advanced in that ing practices due to cookie syncing. they are hard to control, hard to detect and resilient Our evaluation of the defensive techniques used by to blocking or removing.
    [Show full text]
  • Do Not Track a Nokia Browser Look
    Do Not Track Nokia Browser Position - Vikram Malaiya Copyright: Nokia Corporation, 2011 Our understanding of Do Not Track (DNT) • DNT is a technology to enables users to opt out of third-party web tracking • No agreed upon definition of DNT. There are currently 3 major technology proposals for responding to third-party privacy concern. 1. Stanford University and Mozilla’s DNT HTTP Header technique. 2. Blacklist based technique such as Microsoft’s ‘Tracking Protection’ which is part of IE9 3. Network Advertising Initiative’s model of a per company opt-out cookie. Opt-out cookie approach is being promoted by Google. DNT as HTTP Header The Browser adds ‘DNT’/ ‘X-Do-Not-Track’ to its http header. The header is sent out to the server with every web request. This header acts as a signal to the server suggesting that the user wishes to opt out of tracking. Adoption: Firefox 4, IE9 DNT as HTTP Header • Pros: – Scope: Server could apply restrictions to all third party entities and tracking mechanisms – Persistent: No reconfiguration needed once set – Simple: Easy to implement on the browser side • Cons: – Only work as long as the server honors users preferences – No way to enforce national regulations/legislations to servers located beyond country boundaries Block(Black) List / Tracking Protection This is a consumer opt-in mechanism which blocks web connections from known tracking domains that are compiled on a list. First party Third party Adoption: ‘Tracking Protection’ in Internet Explorer 9 cy.analytix.com The downloadable Tracking allow Protection Lists enable IE9 xy.ads.com consumers to control what deny third-party site content can deny track them when they’re ads.tracker.com Tracking Protection online.
    [Show full text]
  • Programming in HTML5 with Javascript and CSS3 Ebook
    spine = 1.28” Programming in HTML5 with JavaScript and CSS3 and CSS3 JavaScript in HTML5 with Programming Designed to help enterprise administrators develop real-world, About You job-role-specific skills—this Training Guide focuses on deploying This Training Guide will be most useful and managing core infrastructure services in Windows Server 2012. to IT professionals who have at least Programming Build hands-on expertise through a series of lessons, exercises, three years of experience administering and suggested practices—and help maximize your performance previous versions of Windows Server in midsize to large environments. on the job. About the Author This Microsoft Training Guide: Mitch Tulloch is a widely recognized in HTML5 with • Provides in-depth, hands-on training you take at your own pace expert on Windows administration and has been awarded Microsoft® MVP • Focuses on job-role-specific expertise for deploying and status for his contributions supporting managing Windows Server 2012 core services those who deploy and use Microsoft • Creates a foundation of skills which, along with on-the-job platforms, products, and solutions. He experience, can be measured by Microsoft Certification exams is the author of Introducing Windows JavaScript and such as 70-410 Server 2012 and the upcoming Windows Server 2012 Virtualization Inside Out. Sharpen your skills. Increase your expertise. • Plan a migration to Windows Server 2012 About the Practices CSS3 • Deploy servers and domain controllers For most practices, we recommend using a Hyper-V virtualized • Administer Active Directory® and enable advanced features environment. Some practices will • Ensure DHCP availability and implement DNSSEC require physical servers.
    [Show full text]
  • Performance Efficiency Pillar
    Performance Efficiency Pillar AWS Well-Architected Framework Performance Efficiency Pillar AWS Well-Architected Framework Performance Efficiency Pillar: AWS Well-Architected Framework Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. Performance Efficiency Pillar AWS Well-Architected Framework Table of Contents Abstract and Introduction ................................................................................................................... 1 Abstract .................................................................................................................................... 1 Introduction .............................................................................................................................. 1 Performance Efficiency ....................................................................................................................... 2 Design Principles ........................................................................................................................ 2 Definition .................................................................................................................................
    [Show full text]
  • Statement of Justin Brookman Director, Consumer Privacy Center for Democracy & Technology Before the U.S. Senate Committee O
    Statement of Justin Brookman Director, Consumer Privacy Center for Democracy & Technology Before the U.S. Senate Committee on Commerce, Science, and Transportation Hearing on “A Status Update on the Development of Voluntary Do-Not-Track Standards” April 24, 2013 Chairman Rockefeller, Ranking Member Thune, and Members of the Committee: On behalf of the Center for Democracy & Technology (CDT), I thank you for the opportunity to testify today. We applaud the leadership the Chairman has demonstrated in examining the challenges in developing a consensus Do Not Track standard and appreciate the opportunity to address the continued insufficiency of self-regulatory consumer privacy protections. CDT is a non-profit, public interest organization dedicated to preserving and promoting openness, innovation, and freedom on the decentralized Internet. I currently serve as the Director of CDT’s Consumer Privacy Project. I am also an active participant in the Worldwide Web Consortium’s Tracking Protection Working Group, where I serve as editor of the “Tracking Compliance and Scope” specification — the document that purports to define what Do Not Track should mean. My testimony today will briefly describe the history of online behavioral advertising and the genesis of the Do Not Track initiative. I will then describe the current state of the World Wide Web Consortium’s efforts to create Do Not Track standards and the challenges going forward to implement Do Not Track tools successfully. I will conclude with my thoughts on the future of Do Not Track. and why I believe that this protracted struggle demonstrates the need for the fundamental reform of our nation’s privacy protection framework for commercial and government collection and use of personal information.
    [Show full text]
  • Standard Query Language (SQL) Hamid Zarrabi-Zadeh Web Programming – Fall 2013 2 Outline
    Standard Query Language (SQL) Hamid Zarrabi-Zadeh Web Programming – Fall 2013 2 Outline • Introduction • Local Storage Options Cookies Web Storage • Standard Query Language (SQL) Database Commands Queries • Summary 3 Introduction • Any (web) application needs persistence storage • There are three general storage strategies: server-side storage client-side storage a hybrid strategy 4 Client-Side Storage • Client-side data is stored locally within the user's browser • A web page can only access data stored by itself • For a long time, cookies were the only option to store data locally • HTML5 introduced several new web storage options 5 Server-Side Storage • Server-side data is usually stored within a file or a database system • For large data, database systems are preferable over plain files • Database Management Systems (DBMSs) provide an efficient way to store and retrieve data Cookies 7 Cookies • A cookie is a piece of information stored on a user's browser • Each time the browser requests a page, it also sends the related cookies to the server • The most common use of cookies is to identify a particular user amongst a set of users 8 Cookies Structure • Each cookie has: • a name • a value (a 4000 character string) • expiration date (optional) • path and domain (optional) • if no expiration date is specified, the cookie is considered as a session cookie • Session cookies are deleted when the browser session ends (the browser is closed by the user) 9 Set/Get Cookies • In JavaScript, cookies can be accessed via the document.cookie
    [Show full text]
  • Document Object Model
    Document Object Model CITS3403: Agile Web Development Semester 1, 2021 Introduction • We’ve seen JavaScript core – provides a general scripting language – but why is it so useful for the web? • Client-side JavaScript adds collection of objects, methods and properties that allow scripts to interact with HTML documents dynamic documents client-side programming • This is done by bindings to the Document Object Model (DOM) – “The Document Object Model is a platform- and language-neutral interface that will allow programs and scripts to dynamically access and update the content, structure and style of documents.” – “The document can be further processed and the results of that processing can be incorporated back into the presented page.” • DOM specifications describe an abstract model of a document – API between HTML document and program – Interfaces describe methods and properties – Different languages will bind the interfaces to specific implementations – Data are represented as properties and operations as methods • https://www.w3schools.com/js/js_htmldom.asp The DOM Tree • DOM API describes a tree structure – reflects the hierarchy in the XTML document – example... <html xmlns = "http://www.w3.org/1999/xhtml"> <head> <title> A simple document </title> </head> <body> <table> <tr> <th>Breakfast</th> <td>0</td> <td>1</td> </tr> <tr> <th>Lunch</th> <td>1</td> <td>0</td> </tr> </table> </body> </html> Execution Environment • The DOM tree also includes nodes for the execution environment in a browser • Window object represents the window displaying a document – All properties are visible to all scripts – Global variables are properties of the Window object • Document object represents the HTML document displayed – Accessed through document property of Window – Property arrays for forms, links, images, anchors, … • The Browser Object Model is sometimes used to refer to bindings to the browser, not specific to the current page (document) being rendered.
    [Show full text]
  • Webgl, Webcl and Beyond!
    WebGL, WebCL and Beyond! Neil Trevett VP Mobile Content, NVIDIA President, Khronos Group © Copyright Khronos Group, 2011 - Page 1 Two WebGL-focused Sessions Today • Industry ecosystem and standards for 3D and compute - What is 3D anyway – jungle survival primer - Khronos and open standard acceleration APIs for native apps - The evolution of pervasive 3D on mobile platforms - WebGL and WebCL as part of HTML5 - Web apps and use cases beyond games – augmented reality • Hands-On with WebGL - Steve Baker - Intific WebGL Reference Cards at end of session! © Copyright Khronos Group, 2011 - Page 2 What is Real-time 3D Graphics? © Copyright Khronos Group, 2011 - Page 3 3D Pipeline Basics • The art of “faking” realistic looking scenes or objects using heuristic techniques learned over the years • The objects making up a scene are held in a database • Surfaces of objects are broken down into a grid of polygons • The vertices of the polygons are located in 3D coordinate space - x,y,z • Each vertex has a “material” – color and reflective properties • Vertices are positioned in 3D space – matrix math zooms and rotates y x2,y2,z2 x1,y1,z1 z x3,y3,z3 x © Copyright Khronos Group, 2011 - Page 4 3D Pipeline Basics – Pixel Shading • Project each polygon onto the screen Interpolate colors - Determine which pixels are affected between vertices • Smooth Shading Lighting - Run lighting equation at each vertex equation each - Compute vertex color depending vertex on how lights interact with surface angles and properties - Interpolate colors between the vertices
    [Show full text]
  • Exploiting Split Browsers for Efficiently Protecting User Data
    Exploiting Split Browsers for Efficiently Protecting User Data Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis Columbia University, New York, NY, USA {azavou,elathan,porto,angelos}@cs.columbia.edu ABSTRACT as the services offered to them. Web browsers have become Offloading complex tasks to a resource-abundant environ- the preferred “portal” to access these services, since they ment like the cloud, can extend the capabilities of resource allow developers to create a uniform interface that is acces- constrained mobile devices, extend battery life, and improve sible from different platforms (PCs, smartphones, tablets, user experience. Split browsing is a new paradigm that etc.), and requires minimal (if any) changes to support new adopts this strategy to improve web browsing on devices like platforms. For the same reason, many mobile applications smartphones and tablets. Split browsers offload computa- (e.g., the NY Times and Facebook apps) simply encapsulate tion to the cloud by design; they are composed by two parts, browsers, acting in essence, as site-specific browsers [24]. Their key role and popularity, their size, and in the case one running on the thin client and one in the cloud. Render- 1 ing takes place primarily in the latter, while a bitmap or a of mobile devices, a growing monoculture, are probably the simplified web page is communicated to the client. Despite main reasons browsers are frequently targeted by attack- its difference with traditional web browsing, split browsing ers [5, 11, 17]. In the past, they have suffered severe attacks still suffers from the same types of threats, such as cross-site that exploit vulnerabilities like buffer overflows [17], which scripting.
    [Show full text]
  • Using Web Speech Technology with Language Learning Applications
    the jaltcalljournal ISSN 1832-4215 Vol. 11, No.2 Pages 177–187 ©2015 JALT CALL SIG Computerized recognition and Using Web assessment of speech Speech Electronic communication has rapidly evolved over the last few decades, from technology with using chat commands via Telnet and usenet, to making video calls via Skype language learning and FaceTime. We can now simply speak to our mobile device when drafting an email applications or calling a friend instead of entering text with a keyboard. While computer-mediated communication has traditionally focused Paul Daniels on human-to-human communication, a new paradigm may emerge that includes Kochi University of Technology human conversations with artificial intel- [email protected] ligence, given that talking “to” a computer is becoming as common as talking “through” a computer. It appears that it will not be long before we speak to a computer as if it was a human rather than just a machine. In 2011 Google introduced their voice search, and more recently, in 2014, a group of research- ers claimed that a computer had for the first time passed the Turing test (University of Reading, 2014), a “test of a machine’s ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human” (Wikipedia, 2015). Brief history of speech technology Human-to-computer interaction relies on sophisticated computerized speech recogni- tion algorithms. Research on speech recog- nition dates back to the 1930 when AT&T’s Bell Labs began using computers to tran- scribe human speech, but it wasn’t until the 1990s that it was available to the masses.
    [Show full text]
  • Mobile Browsers Free Download Top 7 Best Browsers for Windows Phone
    mobile browsers free download Top 7 Best Browsers for Windows Phone. Windows Phone ships with Internet Explorer or IE as the default web browser on it, and over a period of time, Microsoft has done a pretty good job with the features on IE, continuously improving it. But, there is still room for improvement as many features are missing on the widely used browser of all time. This is where the third party web browsers come into the picture. There are lots of free and paid web browsers available in the Windows Phone store, and today we will be taking a look at the 7 such best browsers for Windows Phone that you can use as an alternative to Internet Explorer. 1. UC Browser 2. Maxthon Browser 3. Opera Mini Beta 4. Nokia Xpress 5. SurfCube 3D Browser 6. Surfy 7. Aerize Explorer. 1. UC Browser. UC Browser is one of the most best browser for Windows Phone, and one very good thing about the team behind it is that they release quite a lot of regular updates for the browser. It comes with a lot of useful features such as speed dial, Wi-Fi downloading, option to save to SD card, Bluetooth file sharing and more; all this packaged in a good interface makes it even more attractive. You are also allowed to change the browser skin using the options available in the UC Theme Center, and these can also be used as lock screen wallpapers. App size & price : 2.34 MB - 10.18 MB and Free. 2. Maxthon Browser.
    [Show full text]
  • Building Blocks: Utilizing Component-Based Software Engineering in Developing Cross-Platform Mobile Applications
    KTH Computer Science and Communication Building Blocks: Utilizing Component-Based Software Engineering in Developing Cross-Platform Mobile Applications Master of Science Thesis Interactive Media Technology at KTH Royal Institute of Technology By Oskar Andersson ([email protected]) Supervisor at KTH: Vasiliki Tsaknaki Supervisors at Ericsson Research: Michal Koziuk & Johan Sjöberg Acknowledgements I would like to thank Stefan Ålund and Ericsson Research for the opportunity to work with this thesis. In particular, I have to thank my supervisors, Michal Koziuk & Johan Sjöberg, for their help and support during my time there. I would also like to thank my supervisor at KTH, Vasiliki Tsaknaki, for her constructive criticism and valuable feedback. Thank you! Oskar Andersson October 3 2014, Stockholm 2 Abstract Contemporary approaches to cross-platform mobile application development, such as hybrid apps from PhoneGap and generated native apps from Xamarin, show promise in reducing development time towards Android, iOS and other platforms. At the same time, studies show that there are various problems associated with these approaches, including suffering user experiences and codebases that are difficult to maintain and test properly. In this thesis, a novel prototype framework called Building Blocks was developed with the purpose of investigating the feasibility of utilizing component-based software engineering in solving this problem. The prototype was developed towards Android along with a web interface that allowed users to assemble an Android app using software components. The report concludes that component-based software engineering can be – and already is – utilized successfully to improve cross-platform mobile app development with special regards to user experience. Qualitative data indicate that Building Blocks as a concept is flexible and shows promise for mobile app development in which functionality is often reused, such as enterprise apps.
    [Show full text]