Building efficient websites with AJAX
Books were the original model for website design. Navigation was similar to flipping the pages. Thanks to AJAX, many state-of-the-art websites now behave like desktop applications.
Before rendering a website, the browser and web server go through a number of steps (Figure 1):
- The browser sends a page request to a web server.
- The server processes the request and serves up the HTML text and images. This might take a couple of seconds if the load is heavy. The network transmission speed decides how fast the content is delivered. The required time is still noticeable on fast intranets, however.
- Finally, the browser reads the response and displays the page. The same sequence is repeated for each image before the browser can render the final version of the page.
All told, these three steps typically take several seconds. In case of HTML pages without AJAX technology the steps are repeated for even the tiniest of changes.
In contrast to rich client applications, this considerably affects the user experience: Menus that drop down without a delay, point and click sorting in tables, or drag and drop are not easily implemented because of time-consuming page reloads. HTML pages that offer these kinds of features need to be autonomous, like local programs; that is, you should not need to rely on a server connection.
Removing Time-Consuming Requests
To improve the user experience, more and more web applications are starting to process user input directly browser-side and to do without time-consuming server requests.
The proprietary Flash plugin executes binary Flash applications in the browser. The plugin is embedded in the web page very much like a bitmap image, except that it offers the user an interactive interface. The Flash plugin has excellent graphics capabilities with virtually no restrictions on the developers' creativity. However, for lack of equivalent open source alternatives, there is virtually no alternative to the Adobe tools.
Buy this article as PDF
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.