• AMP Is Poisonous

    19 May, 2017

    AMP, Google's technology that tries to make the mobile web faster by giving Google a monopoly over it, is fucking poisonous and it destroys everything that makes the Web great. Reject AMP!

    Read more
  • Annabel is awed by the size of a tyrannosaurus rex skeleton.

    Science! (for toddlers)

    5 May, 2017

    Nobody is too young for science! Dan shares some of his toddler-friendly science activities.

    Read more
  • The Long Tail of an Abusive Relationship

    30 April, 2017

    Even the tamest of abusive relationships can have an impact that lasts for years or decades. Dan shares a facet of his experience.

    Read more
  • Steer! An Experimental Canvas/Websocket Game

    28 April, 2017

    Left alone to look after a conference stand, Dan implements a browser-based video game prototype called Steer! in which the player uses their mobile phone to control a speeding car.

    Read more
  • Ben Foxall at Render Conf 2017 discusses the accompanying JSOxford Hackathon.

    Tomorrow’s Web, Today

    19 April, 2017

    Feeling optimistic about the technical future of the Web, Dan finds the opportunity to hack about with some promising new tools: Intersection Observers, Web Workers, Blobs, and the Fetch API.

    Read more
  • Jack FM: Artist Frequency

    What Does Jack FM Sound Like?

    13 March, 2017

    Does Jack FM, Dan's favourite local radio station, always play the same old stuff? Let's find out with the help of some data mining...

    Read more
  • A Suitable Boy, seen from the edge

    A Suitable Blog

    21 June, 2016

    Dan writes the 594,000th (surviving) word in his blog, making it longer than virtually every novel, and reveals that his family will be getting a little larger this year.

    Read more
  • Anatomy of Cookie XSS

    16 June, 2016

    Using a real-life vulnerability he discovered on the University of Oxford's IT Services website as an example, Dan reminds you of the importance of sanitising even cookie data to prevent XSS vulnerabilities.

    Read more