|
Using URL hashes to control AJAX requests |
Following on from my previous article here (http://www.mccran.co.uk/index.cfm/2011/10/17/Adding-hash-values-into-URLs--The-basics) this article deals with injecting Hash values into URL's and using them to power AJAX requests.
Starting with the code of the previous article I'll expand it to include an AJAX request based on the Hash inserted into the URL.
|
Adding hash values into URLs - The basics |
Building a site that uses AJAX to Asynchronously import content into it? You can take advantage of the URL hash value and some of the functionality it gives you.
By inserting a hash character into the URL you can pick up the string following it and use it as a value in AJAX requests. Also you can create a listener event to check for a hash being added to a URL and use that to activate your custom JavaScript.
This blog entry is an intro to this process, where we deal with adding the hash value into a URL.
|
Architectural issues with AJAX requests and user journeys |
The more I use non standard ways of loading data and online content the more issues I uncover with how users can interact with a platform.
Adopting new technologies to build applications is all well and good but what implications does this bring to bear on your users? How do they apply their normal usage habits to your new and differently architected application?
|
My Samsung Galaxy Tablet 10.1 review - Part 2 |
Continuing on from my previous article I have been reviewing the Samsung Galaxy Tablet 10.1. I've had the tab a month now and I thought I'd document my findings.
You can read the previous article here: http://www.mccran.co.uk/index.cfm/2011/10/4/My-Samsung-Galaxy-Tablet-101-review--Part-1
Part 2 deals with the software layer and my summary.