Programmers misconceptions about names - with examples

Programmers misconceptions about names - with examples 3r37474.  
3r37474.  
In 201? Patrick Mackenzie wrote the famous article 3r33427. “Programmers misconceptions about names” 3-33477. by listing 40 factoids that are not always true with respect to human names. 3r37474.  
3r37474.  
Do you think the programmers sat down, thought and changed the processing of names in computer systems? Unfortunately, not really. We are still universally asked to fill out online forms that require the presence of a first and last name (and in that order). These systems still assume that our names can always be written in alphabetic characters, often only ASCII. 3r37474.  
...
+ 0 -

Sans Forgetica: a font that allows you to memorize a little

Sans Forgetica: a font that allows you to memorize a littlea little better.   Nowadays a huge stream of information passes through a single person every day. Nobody is able to remember everything, but still if the memory is good, and the brain works well, then something in my head still remains. But this is often less than the amount of information that people would like to remember. In pursuit of improved brain function, many of us are ready for almost everything, including the use of nootropics.  In 201? the Fields of Darkness film appeared on the cinema screens, partly reflecting the cherished dream of many - to improve your memory and speed up the thought process...
+ 0 -

Trends in design in 2018: forecast and reality

Trends in design in 2018: forecast and reality  
 
Translator's note: this remarkable article was not translated for Khabra at the beginning of the year, nor later. While it is really useful and deserves attention. Therefore, despite the fact that almost ⅔ 18 years have already lived, I still decided to translate. At the same time, I compared forecasts with reality, which was left with comments on the text.
 
 
Attention: under the cut is a lot of heavy gifok and beauty!
 
Mindsparkle Mag closely follows the news in the world of design and publishes daily on his blog all the fun. After analyzing the information for 201? the specialists ...
+ 0 -

Secret Keyboard Level 3 or how to print a long dash

Secret Keyboard Level 3 or how to print a long dash  
 
Each user of the hub, at least once typing a "space-hyphen-space" here, can see how the hyphen is magically replaced with a long dash. It worked autocorrect, similar to the one that exists in the Word and other word processors.
 
typography , and to design the text correctly and immediately, without relying on the grace of the iron brain, you need to be able to enter characters from the keyboard that you can not enter. In particular, the longest dash, which is often used in the design of direct speech.
 
 
But, as we know: if you can not, but really want, then you can. For a long time sat on Windows...
+ 0 -

The hidden sheep and typographical archeology.


Unpack the original bitmap fonts Macintosh


 
I'm a big fan of the raster Chicago from Susan Kare. If you are older than 2? then it is familiar to you as a Macintosh system font from the 1980s to the 1990s, and then it was still encoded for the small screens of the first iPod. Behind the fame of the headset is a solid job. Small raster letters are difficult to give a unique and harmonious personality, but Chicago does this: a high-contrast chopped font with a handful of key curls creating a friendly impression. It looks like this:
 
 
The hidden sheep and typographical archeology. ...[/h]
+ 0 -

FontCode: a new way of steganography through the shape of the letters

FontCode: a new way of steganography through the shape of the letters  

Fig. 1. Minor change in the form of the glyph (the form of a specific letter) encodes the digital information due to a two-dimensional matrix of variants of the inscription. Each point in the two-dimensional grid generates the corresponding unique glyph

 
 
Specialists in steganography have come up with a new way to hide encryptions in an open channel. In this case, in plain text. In the opinion of inventors, in addition to the natural use in exploration, this technology can be used to covertly introduce metadata such as watermarks.
 
 
Recently on Habré it was told about ...
+ 0 -

Typography in iOS

Most information in applications is transmitted through text. Therefore, it takes a lot to make it, and ignorance of all the mechanics of rendering entails various problems. For example, a simple task is to add text selection to an existing application. We replace UILabel with UITextView, and suddenly all the indents go, the text looks different or does not fit at all.
 
 
Typography in iOS  
 
Under the cut, you will find the decoding of the performance
Irina Dyagileva
at AppsConf in which she explained why this is happening and what settings are better to use in this or that case.
 
 
The article will consist of ...
+ 0 -

Cretaceous writing for "dummies" on the example of work on an art object

This is the story of the personal experience of one UX-designer who fell in love with lettering still fuzzy knowing what it is.
 
 
I will talk about what is lettering in modern design, using the example of my work on an art object; about the difficulties that I encountered and how they solved them; about slate and chalk markers. And why is it "good for business." And there will be a little motivation for designers who would like to get up from a chair, but do not know how.
 
 
Cretaceous writing for "dummies" on the example of work on an art object  
 
It all started with the fact that our department had a task to make huge letters F U N. To floor-to-ceiling, so that ...
+ 0 -

Be careful with the copy-paste: fingerprinting of the text with nonprinting symbols

Do not want to read? Look at demo .
 
 
Zero-width characters are non-printable control characters that are not displayed by most applications. For example, in this proposal, I inserted a set of whites and a coarse width, are you noticeable or? (Hint: insert the sentence into Diff Checker , To see the location of the characters!). These characters can be used as unique "fingerprints" of text to identify users.
 
 
Be careful with the copy-paste: fingerprinting of the text with nonprinting symbols  

Of course, he can be here. And you'll never guess

 
 

What for?


 
Well...[/h]
+ 0 -