Hypertext Transfer Protocol (HTTP) Status Code Registry

Hypertext Transfer Protocol (HTTP) Status Code Registry

Registry included below

HTTP Status Codes

Registration Procedure(s)
IETF Review
Reference
[RFC7231]
Note
1xx: Informational - Request received, continuing process
2xx: Success - The action was successfully received, understood, and accepted
3xx: Redirection - Further action must be taken in order to complete the request
4xx: Client Error - The request contains bad syntax or cannot be fulfilled
5xx: Server Error - The server failed to fulfill an apparently valid request
Available Formats

CSV
Value Description Reference
100 Continue [RFC7231, Section 6.2.1]
101 Switching Protocols [RFC7231, Section 6.2.2]
102 Processing [RFC2518]
103-199 Unassigned
200 OK [RFC7231, Section 6.3.1]
201 Created [RFC7231, Section 6.3.2]
202 Accepted [RFC7231, Section 6.3.3]
203 Non-Authoritative Information [RFC7231, Section 6.3.4]
204 No Content [RFC7231, Section 6.3.5]
205 Reset Content [RFC7231, Section 6.3.6]
206 Partial Content [RFC7233, Section 4.1]
207 Multi-Status [RFC4918]
208 Already Reported [RFC5842]
209-225 Unassigned
226 IM Used [RFC3229]
227-299 Unassigned
300 Multiple Choices [RFC7231, Section 6.4.1]
301 Moved Permanently [RFC7231, Section 6.4.2]
302 Found [RFC7231, Section 6.4.3]
303 See Other [RFC7231, Section 6.4.4]
304 Not Modified [RFC7232, Section 4.1]
305 Use Proxy [RFC7231, Section 6.4.5]
306 (Unused) [RFC7231, Section 6.4.6]
307 Temporary Redirect [RFC7231, Section 6.4.7]
308 Permanent Redirect [RFC7538]
309-399 Unassigned
400 Bad Request [RFC7231, Section 6.5.1]
401 Unauthorized [RFC7235, Section 3.1]
402 Payment Required [RFC7231, Section 6.5.2]
403 Forbidden [RFC7231, Section 6.5.3]
404 Not Found [RFC7231, Section 6.5.4]
405 Method Not Allowed [RFC7231, Section 6.5.5]
406 Not Acceptable [RFC7231, Section 6.5.6]
407 Proxy Authentication Required [RFC7235, Section 3.2]
408 Request Timeout [RFC7231, Section 6.5.7]
409 Conflict [RFC7231, Section 6.5.8]
410 Gone [RFC7231, Section 6.5.9]
411 Length Required [RFC7231, Section 6.5.10]
412 Precondition Failed [RFC7232, Section 4.2]
413 Payload Too Large [RFC7231, Section 6.5.11]
414 URI Too Long [RFC7231, Section 6.5.12]
415 Unsupported Media Type [RFC7231, Section 6.5.13][RFC7694, Section 3]
416 Range Not Satisfiable [RFC7233, Section 4.4]
417 Expectation Failed [RFC7231, Section 6.5.14]
418-420 Unassigned
421 Misdirected Request [RFC7540, Section 9.1.2]
422 Unprocessable Entity [RFC4918]
423 Locked [RFC4918]
424 Failed Dependency [RFC4918]
425 Unassigned
426 Upgrade Required [RFC7231, Section 6.5.15]
427 Unassigned
428 Precondition Required [RFC6585]
429 Too Many Requests [RFC6585]
430 Unassigned
431 Request Header Fields Too Large [RFC6585]
432-450 Unassigned
451 Unavailable For Legal Reasons [RFC7725]
452-499 Unassigned
500 Internal Server Error [RFC7231, Section 6.6.1]
501 Not Implemented [RFC7231, Section 6.6.2]
502 Bad Gateway [RFC7231, Section 6.6.3]
503 Service Unavailable [RFC7231, Section 6.6.4]
504 Gateway Timeout [RFC7231, Section 6.6.5]
505 HTTP Version Not Supported [RFC7231, Section 6.6.6]
506 Variant Also Negotiates [RFC2295]
507 Insufficient Storage [RFC4918]
508 Loop Detected [RFC5842]
509 Unassigned
510 Not Extended [RFC2774]
511 Network Authentication Required [RFC6585]
512-599 Unassigned

The Shape of Things — Welcome to Thington — Medium

The Shape of Things — Welcome to Thington — Medium

In particular I want to talk about the relationship we’re starting to build between physical network-connected objects and some kind of software or service layer that sits alongside them, normally interacted with via a mobile phone.

I think we all forget how quickly things can change, but I think it’s fair to say that the era of the modern smart-phone starts with the iPhone, and it’s really important to remember that only launched a little under nine years ago. This by the way, is the very first advert for the iPhone which essentially replaced single use telephones with general purpose computers connected to the phone network.

Three years after the iPhone launched — so about six years ago now — in addition to all of the desktop and laptop computers we were buying, we were also buying 150 million smart phones a year.

Five years later — 2016 — and it’s projected that 1.6 billion smartphones will be sold. In one single year, one smart phone will be bought for every five people on the planet.

But what happens next? A world of connected objects.

 

Intro To Computational Linguistics

Intro To Computational Linguistics

ELIZA

Natural language processing comes in many varieties. The most robust natural language systems are tailored to the most limited applications. The simplest approach to natural language processing is to program the computer to look for a limited set of key words or phrases. When the computer finds these words it produces a programmed response. The ELIZA program offers a particularly compelling example of the keyword approach to natural language processing. ELIZA was written at MIT in the mid-1960s to mimic the role of a psychoanalyst interviewing a patient. Examples of ELIZA and related programs are now widely available on the web and personal computers.

ELIZA was never intended to be a model of natural language understanding, yet it is still one of the most popular artificial intelligence programs in the public domain. As long as the user accepts the premise that the program is conducting an open-ended interview, ELIZA can produce a convincing imitation of a talking computer. ELIZA works by searching for a list of keywords in the input. If the program finds one of these words, it asks a preprogrammed question that centers around the keyword. If the program does not find a word on its list, it chooses from a set of open-ended responses, such as Tell me more or Go on. Continue reading “Intro To Computational Linguistics”

Unicode Consortium

Unicode Consortium

The Unicode Consortium enables people around the world to use computers in any language. Our freely-available specifications and data form the foundation for software internationalization in all major operating systems, search engines, applications, and the World Wide Web.

Fundamentally, computers just deal with numbers. They store letters and other characters by assigning a number for each one. Before Unicode was invented, there were hundreds of different encoding systems for assigning these numbers. No single encoding could contain enough characters: for example, the European Union alone requires several different encodings to cover all its languages. Even for a single language like English no single encoding was adequate for all the letters, punctuation, and technical symbols in common use.

These encoding systems also conflict with one another. That is, two encodings can use the same number for two different characters, or use different numbers for the same character. Any given computer (especially servers) needs to support many different encodings; yet whenever data is passed between different encodings or platforms, that data always runs the risk of corruption.

Unicode is changing all that!

Unicode provides a unique number for every character, no matter what the platform, no matter what the program, no matter what the language.

The Unicode Standard has been adopted by such industry leaders as Apple, HP, IBM, JustSystems, Microsoft, Oracle, SAP, Sun, Sybase, Unisys and many others. Unicode is required by modern standards such as XML, Java, ECMAScript (JavaScript), LDAP, CORBA 3.0, WML, etc., and is the official way to implement ISO/IEC 10646. It is supported in many operating systems, all modern browsers, and many other products. The emergence of the Unicode Standard, and the availability of tools supporting it, are among the most significant recent global software technology trends.

Incorporating Unicode into client-server or multi-tiered applications and websites offers significant cost savings over the use of legacy character sets. Unicode enables a single software product or a single website to be targeted across multiple platforms, languages and countries without re-engineering. It allows data to be transported through many different systems without corruption.

About the Unicode Consortium

The Unicode Consortium was founded to develop, extend and promote use of the Unicode Standard, which specifies the representation of text in modern software products and standards. The Consortium is a non-profit, 501(c)(3)charitable organization. The membership of the Consortium represents a broad spectrum of corporations and organizations in the computer and information processing industry. The Consortium is supported financially through membership dues and donations. Membership in the Unicode Consortium is open to organizations and individuals anywhere in the world who support the Unicode Standard and wish to assist in its extension and implementation. All are invited to contribute to the support of the Consortium’s important work by making a donation.

For more information, see the Glossary, Technical Introduction and Useful Resources.

Internet Society | Internet Issues, Technology, Standards, Policy, Leadership – Global_Internet_Report_2014.pdf

Internet Society | Internet Issues, Technology, Standards, Policy, Leadership – Global_Internet_Report_2014.pdf

More than two decades ago, the Internet Society was formed to support the open development, evolution, and use of the Internet for the benefit of all mankind. Over the years, we have pursued that task with pride. We continue to be driven by the hope and promise of the benefits the Internet can bring to everyone.

In doing so, the Internet Society has fostered a diverse and truly global community. Internet Society Chapters and members represent the people of the world and the many and varied ways they use the Internet to enrich the lives of themselves and their peers. They use the Internet to create communities, to open new economic possibilities, to improv lives, and to participate in the world. We are inspired by their stories of innovation, creativity, and collaboration.

Thanks to the Internet’s own success, we are now in an increasingly complex era where the stakes are much higher than before, and potential threats to the Internet’s core principles loom larger. To protect your ability to use the Internet for your needs – to keep it open and sustainable – we must do more to measure impacts and present the strengths of the open Internet model in more compelling ways, to convince policy makers, influencers, and the general public of the importance of our mission.

To this end, I am pleased to launch this, the first in an annual series of Global Internet Reports. With this report, the Internet Society introduces a new level of integrated analysis, measurement, and reporting to Internet governance discussions at all levels.

The Global Internet Reports will become a showcase of topics that are at the heart of the Internet Society’s work about the future of the Internet, weaving together the many threads of the diverse multistakeholder Internet community.

The Internet Really Has Changed Everything. Here’s the Proof. — Backchannel

The Internet Really Has Changed Everything. Here’s the Proof. — Backchannel

Instead I answer his question. “I am writing about how technology has changed humanity.”

Now he looks nervous.

“Basically, this story is a controlled experiment,” I continue. “Napoleon is a place that has remained static for decades. The economics, demographics, politics, and geography are the same as when I lived here. In the past twenty-five years, only one thing has changed: technology.”

“All scientific experiments require two conditions: a static environment and an independent variable. Napoleon is the control; technology, the testable variable. With all else being equal, this place is the perfect environment to explore societal questions like,

  • What are the effects of mass communications?
  • How has technology transformed the way we form ideas?
  • Does access to information alone make us smarter?

As we discuss other apps on his home screen — YouTube, eBay, Facebook, Twitter, Yahoo — I realize that my line of questions are really just attempts to prove or disprove a sentence that I read on the flight to Dakota. The sentence appears on page 20 of Danah Boyd’s book, It’s Complicated, a study of the social lives of networked teens:

What the drive-in was to teens in the 1950s and the mall was in the 1980s, Facebook, texting, Twitter, instant messaging, and other social media are to teens now.”

Continue reading “The Internet Really Has Changed Everything. Here’s the Proof. — Backchannel”

On Permission, by Craig Mod · The Manual

On Permission, by Craig Mod · The Manual

I wonder about the waterfall of tweets. I wonder about the @ replies. I wonder how much mail is sitting in my inbox—something I haven’t checked since I went to sleep the night before. I wonder what news has been plastered on Techmeme, how AAPL and AMZN and TSLA have done today. I wonder what’s happened on Facebook, what new photographs are waiting, what new trending tidbits chosen by the algorithm are sitting atop my newsfeed.

And then I think about the algorithm itself. I wonder if it’s sad. If she is sad. It’s been nearly twenty hours since she last saw me. Since my last visit. Suddenly, with my new rules, I wonder if her feelings have been hurt, even though I know this algorithm has no feelings, or certainly none for me.

🙁