Data URIs allow embedding of resources like images, JavaScript, HTML, and CSV directly into other files and documents. They use a uniform resource identifier scheme with a base64 encoded interpretation of the resource. Most modern browsers understand data URIs so they provide a way to include resources without an additional network request.
The document appears to be a PDF file containing technical metadata and encoding information. It includes objects like pages, fonts, images and other resources that are typical of a PDF specification file. Numbers, hexadecimal codes and cryptic field names are used throughout to describe the internal structure and encoding of the PDF.
Auto Insurance Fraud Detection Using Unsupervised Spectral Ranking for AnomalyYutaTakahashi10
This document discusses using unsupervised spectral ranking for anomaly detection in auto insurance fraud. The key points are:
1. An unsupervised approach is proposed to detect anomalies in auto insurance claims using spectral ranking.
2. A graph-based model is constructed using claims data, where nodes are claims and edges represent similarities.
3. Spectral ranking is applied to the graph to assign an anomaly score to each node, allowing identification of potentially fraudulent claims without labeled data.
The document discusses various techniques designers can use to improve website performance, including optimizing images, using CSS sprites, icon fonts, data URI schemes, and maintaining consistency with styles and rules. It provides examples of how to optimize images, create CSS sprites, use icon fonts, embed images via data URIs, and improve consistency. It also includes links to resources about gzip compression and gradient button styles.
The document contains summaries of common Linux/Unix commands and their functions:
- ls lists the contents of a directory. ls -al shows hidden files and more details.
- cd changes the current directory.
- mkdir creates a new directory.
- rm removes (deletes) a file. rm -r removes a directory and all its contents.
- cp copies a file or directory.
- mv renames or moves a file or directory.
- cat outputs the contents of a file.
- head/tail outputs the start/end of a file. tail -f outputs adding content to a file.
This document is a PDF file containing technical information about the document structure and formatting. It includes objects like pages, images, and streams of encoded text. The summary provides high-level technical details without interpreting the full contents.
Help mijn website is gehackt - Joomla User Group Den Bosch 2014Peter Martin
Bij een routine controle ontdekte Peter dat de website van een klant enkele vreemde nieuwe bestanden bevatte. Na enkele grondige scans ontdekte hij dat de website was "gehacked".
Wat te doen als je website is gehackt? In deze presentatie (gegeven bij Joomla User Group Den Bosch) bespreekt Peter waarom websites worden gehackt, toont hij enkele website hacks, en laat zien hoe je een website kunt herstellen.
Trac is an open source project management and issue tracking tool. It integrates tightly with Subversion for version control and has a rich set of plugins. Trac uses a component architecture and plugins can be developed independently and added to Trac freely. The core components include an HTML interface using Genshi templating, configuration via trac.ini files, and APIs for tickets, databases, and permissions. This allows for a modular design and extensible functionality.
The document appears to be a PDF file containing technical metadata and encoding information. It includes objects like pages, fonts, images and other resources that are typical of a PDF specification file. Numbers, hexadecimal codes and cryptic field names are used throughout to describe the internal structure and encoding of the PDF.
Auto Insurance Fraud Detection Using Unsupervised Spectral Ranking for AnomalyYutaTakahashi10
This document discusses using unsupervised spectral ranking for anomaly detection in auto insurance fraud. The key points are:
1. An unsupervised approach is proposed to detect anomalies in auto insurance claims using spectral ranking.
2. A graph-based model is constructed using claims data, where nodes are claims and edges represent similarities.
3. Spectral ranking is applied to the graph to assign an anomaly score to each node, allowing identification of potentially fraudulent claims without labeled data.
The document discusses various techniques designers can use to improve website performance, including optimizing images, using CSS sprites, icon fonts, data URI schemes, and maintaining consistency with styles and rules. It provides examples of how to optimize images, create CSS sprites, use icon fonts, embed images via data URIs, and improve consistency. It also includes links to resources about gzip compression and gradient button styles.
The document contains summaries of common Linux/Unix commands and their functions:
- ls lists the contents of a directory. ls -al shows hidden files and more details.
- cd changes the current directory.
- mkdir creates a new directory.
- rm removes (deletes) a file. rm -r removes a directory and all its contents.
- cp copies a file or directory.
- mv renames or moves a file or directory.
- cat outputs the contents of a file.
- head/tail outputs the start/end of a file. tail -f outputs adding content to a file.
This document is a PDF file containing technical information about the document structure and formatting. It includes objects like pages, images, and streams of encoded text. The summary provides high-level technical details without interpreting the full contents.
Help mijn website is gehackt - Joomla User Group Den Bosch 2014Peter Martin
Bij een routine controle ontdekte Peter dat de website van een klant enkele vreemde nieuwe bestanden bevatte. Na enkele grondige scans ontdekte hij dat de website was "gehacked".
Wat te doen als je website is gehackt? In deze presentatie (gegeven bij Joomla User Group Den Bosch) bespreekt Peter waarom websites worden gehackt, toont hij enkele website hacks, en laat zien hoe je een website kunt herstellen.
Trac is an open source project management and issue tracking tool. It integrates tightly with Subversion for version control and has a rich set of plugins. Trac uses a component architecture and plugins can be developed independently and added to Trac freely. The core components include an HTML interface using Genshi templating, configuration via trac.ini files, and APIs for tickets, databases, and permissions. This allows for a modular design and extensible functionality.
This document discusses modern CSS architecture patterns. It introduces concepts like OOCSS, SMACSS, and BEM for organizing CSS in a modular, scalable and maintainable way. It provides examples of how to build reusable CSS modules and maintain them through techniques like naming conventions, categorization and decoupling CSS from HTML. The presentation emphasizes goals of building predictable, reusable, maintainable and scalable CSS architecture.
1. The document provides information about MKHAN and lists 10 points of important information about the company.
2. It then continues discussing MKHAN and provides more details about the company across 5 pages in the document.
3. The document promotes MKHAN and their services while providing contact information.
The document discusses the development of artificial intelligence and machine learning. It notes concerns about the focus of these technologies on advertising rather than more beneficial applications. It also references some machine learning frameworks and terms in different languages. Plots of data points are shown as examples of machine learning applications.
This thesis examines the relationship between civil extra-contractual liability and criminal offenses in Peruvian law. It analyzes key concepts such as negligence, fault, causation and damages. The document seeks to clarify the differences and intersections between the two areas of law. It also explores topics such as concurrent liability, joint tortfeasors, and the statute of limitations for civil claims following a criminal act. The goal is to bring greater legal certainty to this complex area of law.
The document appears to contain a mix of languages including Arabic, English and symbols. It discusses fasting (sawm) during Ramadan and how it is an obligation for Muslims. It mentions that fasting means abstaining from food, drink, and intimate relations from dawn to sunset. The summary is challenging to understand fully due to the mix of languages.
This file contains encrypted PHP code. Reverse engineering or decoding the file is strictly prohibited according to a comment at the top. The bulk of the file consists of a long encrypted string that likely contains the PHP source code when decrypted.
This document discusses the features of Grails, a web application framework built on Groovy and Java. It lists the main characteristics of Grails as:
1. Convention over configuration approach to web application development
2. Support for common Object Relational Mapping (ORM), Dependency Injection, Aspect Oriented Programming (AOP) and MVC patterns through integration of frameworks like Hibernate, Spring and Spring MVC.
3. Use of Groovy as the main programming language which is a dynamic language that runs on the JVM and is syntactically similar to Java.
The document then provides examples of how conventions over configuration and DRY principles are applied in Grails. It also discusses the
The document appears to be describing a teen drama film or television show. It outlines the main plot points and characters. The plot involves three friends - Harriet, Abi, and Georgia - in high school. Harriet's boyfriend cheats on her with Georgia, causing drama between the friends. Harriet seeks revenge on Georgia for betraying her trust. The characters each have distinct personalities - Harriet is outgoing but easily betrayed, Abi is portrayed as naive, and Georgia is mean-spirited. The themes involve betrayal, friendship, and high school social politics.
The document appears to be describing a teen drama film or television show. It outlines the main plot points and characters. The plot involves three friends - Harriet, Abi, and Georgia - who are in high school. Harriet's boyfriend cheats on her with Georgia, causing drama between the friends. Harriet seeks revenge on Georgia for betraying her. The themes are portrayed as betrayal, friendship, and high school social politics. Each character is given a distinct personality to portray in the opening scene: Harriet is outgoing but easily betrayed; Abi is clumsy and naive; and Georgia is mean-spirited.
The document appears to be describing a teen drama film or television show. It outlines the main plot points and characters. The plot involves three friends - Harriet, Abi, and Georgia - in high school. Harriet's boyfriend cheats on her with Georgia, causing drama between the friends. Harriet seeks revenge on Georgia for betraying her trust. The characters each have distinct personalities - Harriet is outgoing but easily betrayed, Abi is portrayed as naive, and Georgia is mean-spirited. The themes involve betrayal, friendship, and high school social politics.
The document provides an introduction to PHP programming. It discusses PHP basics like syntax and variables, learning resources like tutorials and documentation references, and advanced PHP topics for more experienced developers like functions, arrays, and object-oriented programming. The goal is to help new PHP programmers learn the language and give them guidance on where to go to continue developing their skills.
The document discusses database normalization through various normal forms. It begins by explaining that redundancy in a database leads to issues like extra storage space, inconsistent data, and more. Normalization is introduced as a process to remove redundancy. The document then defines various normal forms from 1NF to 5NF, providing examples to illustrate each form. It explains how moving from one normal form to the next helps remove different types of redundancy and anomalies from the database.
El documento describe varias afecciones oculares relacionadas con la mácula, incluyendo la degeneración macular senil, la toxoplasmosis macular y la maculopatía serosa central. Explica las características de la mácula normal y anormal, y los métodos de evaluación e imágenes como la cartilla de Amsler y la fluoresceinografía. El documento fue escrito por el Dr. Angel de Jesus Bustillo, médico oftalmólogo y forense en Honduras.
Este documento habla sobre las enfermedades más comunes que llegan con la temporada lluviosa en Honduras. Explica brevemente sobre la leptospirosis, malaria, hepatitis A, dengue y diarreas, incluyendo sus síntomas, formas de transmisión, prevención y tratamiento. También menciona cómo la lluvia trae tanto beneficios como problemas para la salud debido a inundaciones y deslaves.
Perche’ dovrei raccogliere metriche? Come possono aiutarmi? Il mio CFD e’ molto colorato ma a cosa serve?
CFD, control chart, lead time distribution…Le metriche possono incutere timore ma se sai come interpretarle puoi portare il tuo processo a un nuovo livello!
In questo experience report pieno di esempi pratici vi raccontero’ come il mio team a Sky (Londra) usa Kanban e metriche per:
- guidare il processo di miglioramento continuo
- essere prevedibili, senza bisogno di stime
Downloads
Powerpoint: https://goo.gl/mHg3nx
PDF: https://goo.gl/WFaoW8
We like the architecture of our applications to revolve around the business logic, not around technical details (and especially not around the database).
In my team at Sky Network Services we use the Clean Architecture and it has given us a great deal of benefits: the business logic is explicit, we are free to change our technical decisions, the app is easy to test, working on it is faster and scalable, it’s hard to do the wrong thing, and many more.
But it comes at a cost, of course. In this talk I’ll tell you the story of our experience with Clean Architecture and give you some tips to get the most out of it.
Example Project
https://github.com/mattia-battiston/clean-architecture-example
Downloads
Online: https://goo.gl/DTxftJ
PDF: https://goo.gl/ZAtdBN
Powerpoint: https://goo.gl/D54wdZ (but you need to install these fonts to see it properly: https://goo.gl/iH8SO5)
Kanban Metrics in practice at Sky Network ServicesMattia Battiston
Why should I bother collecting metrics? How can they help me? My CFD is pretty and colourful, but what is it actually trying to tell me?
CFD, control chart, lead time distribution, percentiles...Metrics can be daunting to start with but if you know how to interpret them they can really take your Kanban system to the next level - drive continuous improvement and forecast the future! It’s much easier than you think, no need for complex maths or expensive software.
At Sky Network Services a few teams are using Kanban and metrics. In this talk I’ll share our experience: what metrics we use, how we use each one of them, what little data we collect to get a whole lot of value, what pitfalls we encountered.
Downloads
Powerpoint: https://goo.gl/19wOjU
PDF: https://goo.gl/AM69MF
This document discusses modern CSS architecture patterns. It introduces concepts like OOCSS, SMACSS, and BEM for organizing CSS in a modular, scalable and maintainable way. It provides examples of how to build reusable CSS modules and maintain them through techniques like naming conventions, categorization and decoupling CSS from HTML. The presentation emphasizes goals of building predictable, reusable, maintainable and scalable CSS architecture.
1. The document provides information about MKHAN and lists 10 points of important information about the company.
2. It then continues discussing MKHAN and provides more details about the company across 5 pages in the document.
3. The document promotes MKHAN and their services while providing contact information.
The document discusses the development of artificial intelligence and machine learning. It notes concerns about the focus of these technologies on advertising rather than more beneficial applications. It also references some machine learning frameworks and terms in different languages. Plots of data points are shown as examples of machine learning applications.
This thesis examines the relationship between civil extra-contractual liability and criminal offenses in Peruvian law. It analyzes key concepts such as negligence, fault, causation and damages. The document seeks to clarify the differences and intersections between the two areas of law. It also explores topics such as concurrent liability, joint tortfeasors, and the statute of limitations for civil claims following a criminal act. The goal is to bring greater legal certainty to this complex area of law.
The document appears to contain a mix of languages including Arabic, English and symbols. It discusses fasting (sawm) during Ramadan and how it is an obligation for Muslims. It mentions that fasting means abstaining from food, drink, and intimate relations from dawn to sunset. The summary is challenging to understand fully due to the mix of languages.
This file contains encrypted PHP code. Reverse engineering or decoding the file is strictly prohibited according to a comment at the top. The bulk of the file consists of a long encrypted string that likely contains the PHP source code when decrypted.
This document discusses the features of Grails, a web application framework built on Groovy and Java. It lists the main characteristics of Grails as:
1. Convention over configuration approach to web application development
2. Support for common Object Relational Mapping (ORM), Dependency Injection, Aspect Oriented Programming (AOP) and MVC patterns through integration of frameworks like Hibernate, Spring and Spring MVC.
3. Use of Groovy as the main programming language which is a dynamic language that runs on the JVM and is syntactically similar to Java.
The document then provides examples of how conventions over configuration and DRY principles are applied in Grails. It also discusses the
The document appears to be describing a teen drama film or television show. It outlines the main plot points and characters. The plot involves three friends - Harriet, Abi, and Georgia - in high school. Harriet's boyfriend cheats on her with Georgia, causing drama between the friends. Harriet seeks revenge on Georgia for betraying her trust. The characters each have distinct personalities - Harriet is outgoing but easily betrayed, Abi is portrayed as naive, and Georgia is mean-spirited. The themes involve betrayal, friendship, and high school social politics.
The document appears to be describing a teen drama film or television show. It outlines the main plot points and characters. The plot involves three friends - Harriet, Abi, and Georgia - who are in high school. Harriet's boyfriend cheats on her with Georgia, causing drama between the friends. Harriet seeks revenge on Georgia for betraying her. The themes are portrayed as betrayal, friendship, and high school social politics. Each character is given a distinct personality to portray in the opening scene: Harriet is outgoing but easily betrayed; Abi is clumsy and naive; and Georgia is mean-spirited.
The document appears to be describing a teen drama film or television show. It outlines the main plot points and characters. The plot involves three friends - Harriet, Abi, and Georgia - in high school. Harriet's boyfriend cheats on her with Georgia, causing drama between the friends. Harriet seeks revenge on Georgia for betraying her trust. The characters each have distinct personalities - Harriet is outgoing but easily betrayed, Abi is portrayed as naive, and Georgia is mean-spirited. The themes involve betrayal, friendship, and high school social politics.
The document provides an introduction to PHP programming. It discusses PHP basics like syntax and variables, learning resources like tutorials and documentation references, and advanced PHP topics for more experienced developers like functions, arrays, and object-oriented programming. The goal is to help new PHP programmers learn the language and give them guidance on where to go to continue developing their skills.
The document discusses database normalization through various normal forms. It begins by explaining that redundancy in a database leads to issues like extra storage space, inconsistent data, and more. Normalization is introduced as a process to remove redundancy. The document then defines various normal forms from 1NF to 5NF, providing examples to illustrate each form. It explains how moving from one normal form to the next helps remove different types of redundancy and anomalies from the database.
El documento describe varias afecciones oculares relacionadas con la mácula, incluyendo la degeneración macular senil, la toxoplasmosis macular y la maculopatía serosa central. Explica las características de la mácula normal y anormal, y los métodos de evaluación e imágenes como la cartilla de Amsler y la fluoresceinografía. El documento fue escrito por el Dr. Angel de Jesus Bustillo, médico oftalmólogo y forense en Honduras.
Este documento habla sobre las enfermedades más comunes que llegan con la temporada lluviosa en Honduras. Explica brevemente sobre la leptospirosis, malaria, hepatitis A, dengue y diarreas, incluyendo sus síntomas, formas de transmisión, prevención y tratamiento. También menciona cómo la lluvia trae tanto beneficios como problemas para la salud debido a inundaciones y deslaves.
Perche’ dovrei raccogliere metriche? Come possono aiutarmi? Il mio CFD e’ molto colorato ma a cosa serve?
CFD, control chart, lead time distribution…Le metriche possono incutere timore ma se sai come interpretarle puoi portare il tuo processo a un nuovo livello!
In questo experience report pieno di esempi pratici vi raccontero’ come il mio team a Sky (Londra) usa Kanban e metriche per:
- guidare il processo di miglioramento continuo
- essere prevedibili, senza bisogno di stime
Downloads
Powerpoint: https://goo.gl/mHg3nx
PDF: https://goo.gl/WFaoW8
We like the architecture of our applications to revolve around the business logic, not around technical details (and especially not around the database).
In my team at Sky Network Services we use the Clean Architecture and it has given us a great deal of benefits: the business logic is explicit, we are free to change our technical decisions, the app is easy to test, working on it is faster and scalable, it’s hard to do the wrong thing, and many more.
But it comes at a cost, of course. In this talk I’ll tell you the story of our experience with Clean Architecture and give you some tips to get the most out of it.
Example Project
https://github.com/mattia-battiston/clean-architecture-example
Downloads
Online: https://goo.gl/DTxftJ
PDF: https://goo.gl/ZAtdBN
Powerpoint: https://goo.gl/D54wdZ (but you need to install these fonts to see it properly: https://goo.gl/iH8SO5)
Kanban Metrics in practice at Sky Network ServicesMattia Battiston
Why should I bother collecting metrics? How can they help me? My CFD is pretty and colourful, but what is it actually trying to tell me?
CFD, control chart, lead time distribution, percentiles...Metrics can be daunting to start with but if you know how to interpret them they can really take your Kanban system to the next level - drive continuous improvement and forecast the future! It’s much easier than you think, no need for complex maths or expensive software.
At Sky Network Services a few teams are using Kanban and metrics. In this talk I’ll share our experience: what metrics we use, how we use each one of them, what little data we collect to get a whole lot of value, what pitfalls we encountered.
Downloads
Powerpoint: https://goo.gl/19wOjU
PDF: https://goo.gl/AM69MF
Kanban Metrics in practice for leading Continuous ImprovementMattia Battiston
Why should I bother collecting metrics? How can they help me? My CFD is pretty and colourful, but what is it actually trying to tell me?
CFD, control chart, lead time distribution, percentiles...Metrics can be daunting to start with but if you know how to interpret them they can drive continuous improvement and forecast the future and take your Kanban system to the next level! It’s much easier than you think, no need for complex maths or expensive software.
At Sky Network Services a few teams are using Kanban and metrics. In this talk I’ll share our experience: what metrics we use, how we use each one of them, what little data we collect to get a whole lot of value, what pitfalls we encountered.
Downloads
Powerpoint: https://goo.gl/4CkKJd
PDF: https://goo.gl/VDW93U
The document is a long string of random letters and numbers that does not appear to contain any coherent information or meaning. It consists of 3 sentences or less of gibberish.
This document discusses retail trends from 2010. It covers topics like concept stores, global retail leaders, and the future of retail. Specific companies and retail formats mentioned include Amazon, AngellA Arendt, Primark, Topshop, and pop-up stores. The presentation emphasizes the need for retailers to focus on customer engagement through new store designs, digital integration, partnerships, and experiences. Overall, the document provides a high-level overview of major retail trends and innovations from around 2010.
The document contains various symbols and characters that do not form coherent words or sentences. It appears to be random symbols and characters without any discernible meaning or message. The summary cannot provide any essential information from the document as it does not contain any substantive or intelligible content.
Tip of the day provides 3 tips for using Visual C++. It includes code snippets for getting the subject from HTML, checking for empty input, and conditional logic for different input values. The document also mentions challenges with source control and recovering from lost code.
The document is a random string of letters and characters that does not convey any clear meaning or information. It appears to be gibberish without any essential high level ideas or concepts that could be summarized in a concise way.
The document contains a random assortment of letters, words, and sentences that do not form coherent paragraphs or convey a clear message. It jumps between unrelated topics and includes technical terms, names of people and places, and fragments of sentences without context.
El cerebro: el lenguaje, los sentidos, la escritura y solución de problemasMarielaGonzalezL
The document discusses the main parts of the brain involved in senses, language, writing, and problem-solving. It includes images showing the different lobes and hemispheres of the brain, such as the frontal lobe associated with reasoning and the parietal lobe involved in movement and senses.
City of Cape Town - IT led Business Transformation - Rudy AbrahamsRudy Abrahams
The document provides an overview of business transformation at the City of Cape Town enabled by SAP. It discusses the city's background, drivers for change, and the solution framework implemented including SAP ISU, AMI, SAP HANA and SAP SMP. Benefits realized include enhanced service delivery, transparency, and citizen engagement through improved ICT. Key facts about Cape Town highlight its population, economy, tourism figures, and transportation methods. The city's diverse set of business partners are also noted.
- The document discusses an event involving multiple individuals.
- Several people were involved in an interaction that took place.
- Details of what occurred between the individuals are not provided.
The document is a collection of images without text. It appears to be comparing different objects or concepts visually through a series of photographs showing variations in attributes like age, color, thickness/thinness.
This document appears to be a collection of links from Google image and web searches related to various TV shows. It mentions some of the most popular shows on the E4 channel and discusses ideas for animations or projects around archery that could be inspired by some of these TV shows.
This document summarizes a presentation about the Shogi Playground website and application. It discusses how the application was built using Scala.js and JavaScript, with Scala handling backend logic and JavaScript managing frontend interactions. It also overviewed the State-Action-Model architecture used to structure application state updates and processing user actions. The document provided links to the application and source code repositories for further details.
The document discusses authentication and authorization, explaining that authentication verifies who a user is through their user ID, while authorization determines what resources a user can access. It introduces common authentication standards like OpenID Connect which uses an ID token and access token to log users in and grant them access to resources on another site or app. Tokens like ID tokens and access tokens are used to authenticate and authorize users in a secure way across different systems and applications.
The document contains a long string of random letters and symbols with no discernible meaning or organization. It does not provide any essential information that can be summarized coherently in 3 sentences or less.
The document contains an encrypted string of characters that does not provide any clear meaning or summarizable information. It appears to be random text that cannot be meaningfully summarized in 3 sentences or less.
The document discusses vices and provides a link to a blog about vices. It includes an image but the text does not provide any other context or information about the content of the document.
2. Data URIs
What are they?
• Uniform Resource Identifier scheme
• Normally a base64 encoded interpretation of an
image
• Can also refer to js, html, csv etc.
• Understood by most modern browsers
10. Data URIs
The problem:
Overusing sprites &
background images
11. “Google has top-secret algorithms designed to detect when
text is hidden/positioned off screen. If this type of hidden
text is detected, our important red phone rings, and this
becomes one of the signals that may cause us to believe
your site is deceptive.”
- Maile Ohye, Google
25 May 2010
Data URIs
More problems:
Gaming Google
12. Data URIs
The solution:
Data URIs & CSS3 effects
13. Data URIs
Before:
Each CSS image here has a response
time of approx. 200ms, which 8 CSS images
means about 1.5 seconds waiting
for these images alone.
14. Data URIs
NB: Extra file weight is due to extra
promo images on test1 not present After:
on live.
DATA URIs actually increase file size 1 CSS image
by 17.8Kb, but save 1.3s in response
times
15. Data URIs
The Grosvenor footer
Going Cross-browser
19. Data URIs
But it’s not perfect…
• Footer URIs now load on every page
• Not cached for the site
• File storage for originals/fallbacks
20. Data URIs
Top tips
• Optimise and Smush your image first
• More data in, more data out
• Gzipping is brilliant
• 2-3% of filesize rather than 20-30%
• The ideal solution?
• Build URIs on the fly
Editor's Notes
What are they? - Posh way of saying "it's a standard" - Can be RFC encoded - similar to URL encoding (twice as long) - just encoding data of any sort - whatever your browser understands - We'll get to that
What do they look like?
What do they look like?
What do they look like?
Advantages Less requests - no headers (including cookie headers) - no bottlenecking (due to browser restrictions on simultaneous downloads) Loaded at the same time as your html (no need to specify width/height to preserve space) No HTTPS requirement Easier to maintain Semantic - use them exactly as you would a spritemap, but have an image on the page Makes you look badass
DisadvantagesFallback necessary for IE7 up to 30% more data - mitigated by gZipping(only up to 3% more) cacheable? - Inline or in CSS? - Do we want the content to be searchable? Grosvenor Footer credit cards. - multiple instances inline would involve multiple embeds Re-encoding required for changes Maximum size - IE8 has lowest with 32768 bytes - weird computing reason for this (highest 16bit number)
UnknownsDoes Google crawl and store them for use in Google images? - Google were using them on their image search page, but unsure as to indexing - if they don't now, they undoubtedly will be soon.
The problem: - This CSS sprite currently live on the grosvenor site is 63Kb - on any given page up to 80% might be redundant - There's a second sprite for grosvenor as well that's still in use on older templates that's around the same size and equally baffling.
- Gaming google - Some of this content just shouldn't be here - non-semantic useage of images - techniques suck as text-indent:-99999px are recognised by Google because that's a trick used to cheat Search Engine Rankings http://maileohye.com/html-text-indent-not-messing-up-your-rankings/ - Source within Google http://luigimontanez.com/2010/stop-using-text-indent-css-trick/