multi-dimensional erector set that we're going forever
"A multi-dimensional erector set that will go on forever..."
No, unfortunately not forever.
multi-dimensional erector set that we're going forever
"A multi-dimensional erector set that will go on forever..."
No, unfortunately not forever.
We don’t want to invalidate the input if the user removes all text. They may need a moment to think, but the invalidated state sets off an unnecessary alarm.
It can also be included as individual modules, i.e. Hashie::Extensions::MethodReader, Hashie::Extensions::MethodWriter and Hashie::Extensions::MethodQuery.
This is a useful little tip.
I think one thing would have been a solution to basically everything here: Player created maps. As Im involved in many modding communities, I know for a fact that player created content can be vital in making games last so much longer, and the quality can shoot for the stars, Player created maps would have been fantastic for this game.
Feel free to pick and choose what you need for your applications.
What this means is: I better refrain from writing a new book and we rather focus on more and better docs.
I'm glad. I didn't like that the book (which is essentially a form of documentation/tutorial) was proprietary.
I think it's better to make documentation and tutorials be community-driven free content
The bare bones operation without any Trailblazery is implemented in the trailblazer-operation gem and can be used without our stack.
While Trailblazer offers you abstraction layers for all aspects of Ruby On Rails, it does not missionize you. Wherever you want, you may fall back to the "Rails Way" with fat models, monolithic controllers, global helpers, etc. This is not a bad thing, but allows you to step-wise introduce Trailblazer's encapsulation in your app without having to rewrite it.
Only use what you like.
you can pick which layers you want. Trailblazer doesn't impose technical implementations
Anderson, Ian, and Wendy Wood. ‘Habits and the Electronic Herd: The Psychology behind Social Media’s Successes and Failures’. PsyArXiv, 23 November 2020. https://doi.org/10.31234/osf.io/p2yb7.
Couldn't find on Steam. https://steamdb.info/app/793300/ claims that it is there, but https://store.steampowered.com/app/793300/?curator_clanid=4777282&utm_source=SteamDB just redirects to home page.
Don't redirect to a different URL, esp. without a message explaining why it did so instead of keeping me on the page that I request. That's just incorrect behavior, and a poor UX. Respond with a 404 if the page doesn't exist.!
That way (among other things), I could use Wayback Machine extension to see if I can find a cached version there.
But even that (http://web.archive.org/web/*/https://store.steampowered.com/app/793300) is saying "huh?" so I'm confused.
Where did it go and why?
I guess it's no longer available, because this page says:
section_type ownersonly
ReleaseState unavailable
... but why?
$ nix-env --switch-profile /nix/var/nix/profiles/my-profile $ nix-env --switch-profile /nix/var/nix/profiles/default These commands switch to the my-profile and default profile, respectively. If the profile doesn’t exist, it will be created automatically.
learn more about profiles; creating new profiles was new info
Chapter 10. ProfilesProfiles and user environments are Nix’s mechanism for implementing the ability to allow different users to have different configurations, and to do atomic upgrades and rollbacks.
user environment
Explain the shit out of this one with tons of examples.
In Nix, different users can have different “views” on the set of installed applications. That is, there might be lots of applications present on the system (possibly in many different versions), but users can have a specific selection of those active — where “active” just means that it appears in a directory in the user’s PATH. Such a view on the set of installed applications is called a user environment, which is just a directory tree consisting of symlinks to the files of the active applications.
Have you ever been emailed something from a company and tried to reply only to be frustrated with a failed-to-send message response? A no-reply email frustrates your customers.Instead, use a dedicated email to send out your messages and to keep business emails in a central location so you can answer customer concerns quickly and decisively. This level of customer service will help develop your reputation as a company that cares about its customers.
Not to mention 80% of our sales are laptops and desktops running, you guessed it, a Linux desktop. So, unlike Red Hat and Canonical, we live or die based on how good that experience is.
Then recently I was shopping at the John Lewis website, and they brought up the Verified By Visa page in an iframe - wonderful! I'm still looking at the John Lewis site, and all that's happening is I'm being asked for my Verified By Visa password - no problem. Although as a web developer I know that there's no technical difference between that and a plain old redirect-there-redirect-back, the user experience is so much better!
Free software is a necessary but sometimes insufficient requirement to build domestication immunity. Two more measures include simplicity and open platforms.
Ideas for preventing user domestication
WhatsApp rose by trapping previously-free beings in their corral and changing their habits to create dependence on masters. Over time, this made it difficult or impossible to return to their previous lifestyle. That process should sound familiar: it’s eerily similar to the domestication of animals. I call this type of vendor lock-in user domestication: the removal of user autonomy to trap users into serving vendors.
This is a good definition of "user domestication". Such an apt metaphor.
a class of businesses models I call “user domestication”. The domestication of users is high on my list of problems plaguing the human race, and is worth a detailed explanation.
This portends to be an interesting concept: user domestication
Group Rules from the Admins1NO POSTING LINKS INSIDE OF POST - FOR ANY REASONWe've seen way too many groups become a glorified classified ad & members don't like that. We don't want the quality of our group negatively impacted because of endless links everywhere. NO LINKS2NO POST FROM FAN PAGES / ARTICLES / VIDEO LINKSOur mission is to cultivate the highest quality content inside the group. If we allowed videos, fan page shares, & outside websites, our group would turn into spam fest. Original written content only3NO SELF PROMOTION, RECRUITING, OR DM SPAMMINGMembers love our group because it's SAFE. We are very strict on banning members who blatantly self promote their product or services in the group OR secretly private message members to recruit them.4NO POSTING OR UPLOADING VIDEOS OF ANY KINDTo protect the quality of our group & prevent members from being solicited products & services - we don't allow any videos because we can't monitor what's being said word for word. Written post only.
Wow, that's strict.
There's a lot of advice online showing how to get rid of snap. (e.g.: https://cialu.net/how-to-disable-and-remove-completely-snaps-in-ubuntu-linux/ worked for me) so the only result (so far, a few months later) is that Chromium has lost a user, and having upgraded Ubuntu since the original Warty, if snap becomes obligatory I'll have to take a look at Mint, or Devuan.
It should be as simple to use as in the days of jQuery's tooltips.
We talked, for example, about how stores and governments were adding new rules and social distancing guidelines, often communicated through purely visual means, like stickers on the floor and printed signs. Mr. Johnston acknowledged that it was a tough new time for businesses, but shared that he faces new types of exclusion as a result.
this just makes me wonder how society in general will cope with this. Companies nay be more sensitive to all these challenges COVID has pushed in fast forward mode.
This is not only about designers being in the front seat of the business development plan, is about we as users setting-up these expectations!
While the very same software might be in a PPA and a snap, the fact that the snap is shown in Ubuntu Software is the point I’m making. Many people use that to install software. So making software appear there is beneficial for developers - their software is found, and beneficial for users - they discover new software.
In addition, PPAs are awful for software discovery. Average users have no idea what a PPA is, nor how to configure or install software from it. Part of the point of snap is to make software discovery easier. We can put new software in the “Editor’s Picks” in Ubuntu Software then people will discover and install it. Having software in a random PPA somewhere online is only usable by experts. Normal users have no visibility to it.
The benefits for developers do reflect on benefits for users, with more software delivered faster and more securely.
But now Chromium is no more available as deb, so what to expect ?
We must think of the users more than the technique itself
Good example/application/sub-case of "user-centric".
The download attribute can accept an optional value, allowing the author to create a custom, human-friendly name for the downloaded file.
Now they have what they need to make an informed decision, with a little intentional ambiguity to temper expectations.
For larger files, the wait time can be especially problematic. A standard download is an all-or-nothing affair—interruptions can corrupt them and render them useless. Worse, it can waste valuable data on a metered data plan, an unfortunately all-too-relevant concern.
It took faaaaaaaaaaaaar too long to signup at this site to reply to you. This site rejected the real address I use for amazon, username.place@cocaine.ninja so I created an email address that I'll never check again just to signup here. I have zero tolerance for spam.
no post edit, eh?Fine.
What the #$%@ is UX Design?
Short video about User Experience Design.
The aesthetics of underlying technologies have a way of leaking into the end user experience.
There's a huge area of seemingly obvious user-centric products that don't exist simply because there isn't a working business model to support it.
As was mentioned in the comments above, the material design spec for buttons specifies that the text should be uppercase, but you can easily override its CSS property: paper-button { text-transform: none; }
enables passive event listeners by default for some events (see list below). It basically will set { passive: true } automatically every time you declare a new event listener.
@use "@material/theme" with ( $primary: #FEDBD0, $on-primary: #442C2E);
You could totally just write your own name and not use the name in package.json, this template is made so the users wouldn't need to think about the UMD build.
Include the ability to dismiss or decline the promotion. Remember the user's preference if they do this and only re-prompt if there's a change in the user's relationship with your content such as if they signed in or completed a purchase.
Keep promotions outside of the flow of your user journeys. For example, in a PWA login page, put the call to action below the login form and submit button. Disruptive use of promotional patterns reduces the usability of your PWA and negatively impacts your engagement metrics.
I wonder if it's worth archiving the repository (while leaving the site running) with a message that we're transitioning the content to MDN (so folks don't get the wrong idea and a bad experience when filing issues).
rickrolling
https://www.youtube.com/watch?v=dQw4w9WgXcQ
While Rick Astley's "Never Gonna Give You Up," has existed since the 1980s, it was user-generated-content spawned from 4chan that linked the song to the bait-and-switch practice of surprising unsuspecting internet users with it after being promised something else (Dewey, 2014).
Works Cited:
Official Rick Astley. (2009). Rick Astley - Never Gonna Give You Up (Video) [Video]. YouTube.
Dewey, C. (2014). Absolutely everything you need to know to understand 4chan, the Internet’s own bogeyman. Retrieved 5 November 2020, from https://www.washingtonpost.com/news/the-intersect/wp/2014/09/25/absolutely-everything-you-need-to-know-to-understand-4chan-the-internets-own-bogeyman/
where some of the internet’s worst scandals have been fomented
While 4chan has developed a mostly negative public perception for itself, with the Washington Post's Caitlin Dewey even calling it "the Internet's own bogeyman," it also has brought attention to User-Generated-Content as beloved as Rickrolling and Chocolate Rain (Dewey, 2014). https://www.youtube.com/watch?v=EwTZ2xpQwpA
Works Cited:
Dewey, C. (2014). Absolutely everything you need to know to understand 4chan, the Internet’s own bogeyman. Retrieved 5 November 2020, from https://www.washingtonpost.com/news/the-intersect/wp/2014/09/25/absolutely-everything-you-need-to-know-to-understand-4chan-the-internets-own-bogeyman/
TayZonday. (2007). "Chocolate Rain" Original Song by Tay Zonday [Video]. YouTube.
Just coming here to voice my agreement that these warnings are annoying and exist in other libraries as well. For me this happened with svelma. I didn't write the library code, so I don't have complete control over it even though I agree there is an argument to be had around whether I should be notified anyway. In either case, these warnings should be easily disabled since libraries don't always get updated over night.
Maybe it's also a bug because every warning should be ignorable? Not sure.
I would like the compiler to add a property like canIgnore: false to the warning, if the warning cannot be disabled.
The Web needs to be accessible to everyone who wants to participate, who wants to share their knowledge with the world, who is not satisfied with the status quo and ready to change culture and society. Yet instead, we are currently building a Web of superficial distractions that is becoming less and less accessible to future generations.
i am dead cold afraid that the web that is coming seems like it will not support extensions. the bookmarklet is dead, extensions are only on desktop. websec has won, sites are secure, and alas, secured against the almighty user who we all agreed we served.
what sites do- now that's also been, frankly, not great.
We know children don’t get sick just during office hours. At our evening and weekend Urgent Care Clinic in Bellevue, your child’s minor illness or injury will be treated by our team of pediatric experts
Issue grooming: There appears to be a variety of different failure modes and user error/misconfiguration scenarios (all largely historic) described here.
If you want to implement a form with a superb User Experience, you have to take care of many variables:
Just let the user fill in some fields, submit it to the server and if there are any errors notify them and let the user start over again. Is that a good approach? The answer is no, you don't want users to get frustrated waiting for a server round trip to get some form validation result.
To silence circular dependencies warnings for let's say moment library use: // rollup.config.js import path from 'path' const onwarn = warning => { // Silence circular dependency warning for moment package if ( warning.code === 'CIRCULAR_DEPENDENCY' && !warning.importer.indexOf(path.normalize('node_modules/moment/src/lib/')) ) { return } console.warn(`(!) ${warning.message}`) }
Identify your user agents When deploying software that makes requests to other sites, you should set a custom User-Agent header to identify the software and provide a means to contact its maintainers. Many of the automated requests we receive have generic user-agent headers such as Java/1.6.0 or Python-urllib/2.1 which provide no information on the actual software responsible for making the requests.
Friendly UX
Why didn't they just say user-friendly?
Since this issue seems to pop up periodically, it would be useful to turn this into a warning. It may not be elegant, but it prevents surprise blank screens due to a navigation error.
Not an actual fix.
In '07, safety implied an unacceptable performance hit on slow single-core devices with 128MiB of RAM.
In 2007, safety implied an unacceptable performance hit for hosting extensions, on devices with one core and 128MiB ram. In 2020, the lack of extensions is the ultimate app-ification of the web, the reduction of the web into a useless, powerless medium where users have no control.
In my opinion, because Webpack was one of the first bundlers, is heavily packed with features, and has to support swathes of legacy code and legacy module systems, it can make configuring Webpack cumbersome and challenging to use. Over the years, I’ve written package managers, compilers, and bundlers, and I still find configuring Webpack to be messy and unintuitive.
User experience above all
balancing developer and user experience
What I believe should happen is the Svelte compiler should, when a promise is passed to onMount, realise that a promise has been passed, and await the result of the function to be used as the onDestroy function. i.e, it should behave the exact same way for an async function as it does for a non-async function (if this is possible)
Over the last year, we have gained a better understanding of the performance and correctness characteristics of the various rendering technologies available on the web, and have been experimenting with a second approach that uses CanvasKit. CanvasKit brings Skia to the web using WebAssembly and WebGL, enabling a hardware-accelerated drawing surface that improves our ability to render complex and intensive graphics efficiently.
you are setting dynamite to hypertext & turning the web into a webassembly powered VNC viewer. this is an awful thing for users, for the web in general. please desist. please i beg you stop.
the web is not for pushing pixels into people's faces. the web is a system of interlinking hypertext, a place where structured information can be viewed/enhanced by users, navigators, & extensions.
WebAssembly is pretty great, but should web applications just be rendered to a canvas, and every application brings its own graphics toolkit? Do we really want anti-aliasing differences between web applications? Applications-in-containers is a thing - look at Qubes - but it’s not really something that users should want.
Flutter seems intent on turning applications into mini-VNC sessions into webassembly, with CanvasKit work proceeding full steam ahead. can you please for the love of god NOT, Flutter? abomination.
the web is more than a means to pump pixels at people's faces; it is a system of structured information, that users, their navigators, & extensions have rights & capabilities to traverse.
The idea of a web browser being something we can comprehend, of a web page being something that more people can make, feels exciting to me.
my personal hope is that we can build a more sensible coherent web, that exudes the machines inside of it, by better harkening towards custom elements ("webcomponents"). move the page from being a bunch of machines in javascript, to a bunch of machines in hypertext.
and then build pages that start to expose & let the user play with the dom. start to build experiences that bridge the gap into the machine/page.
and keep going. keep going. build wilder web experiences. build more machines. and keep building battlesuits for the user, out of more componenets, out of more web, to let them wrestle & tangle with & manipulate & experiment & hack on & see & observe & learn about the truthful, honest, direct hypertext that we all navigate.
Thank you, but this answers the question and means I will be unable to use svelte.
Mais il ne songe pas aux causes
C’est ce que font les interfaces dites «user-friendly»: elles nous dispensent de penser, elles nous font oublier de penser.
La transparence de la technologie, sa présence normalisée, voire imperceptible dans la vie quotidienne est aussi une bonne chose – c’est la tâche du design de faire bénéficier une technologie de pointe au plus grand nombre.
Seulement, le numérique dissimule des enjeux de vie privée que nous ne pouvons percevoir directement par les sens: les enjeux sont invisibilisés, et les technologies «user-friendly» étendent leur pouvoir abusent du fait que les mécanismes échappent à notre perception, à notre entendement.
I wonder at what point Svelte would add this feature if, for example, a majority of their users ended up migrating to a fork that added this missing feature (like this one)?
Would they then concede and give in to popular demand in order to avoid a schism of the community?
Kind of like Rails swallowed / consolidated with Merb after they saw how great its ideas were?
TBH It is a bit disheartening to see this issue closed when all proposed solutions do not sufficiently solve the issue at hand, I really like svelte but if this is how feature requests are handled I am probably not going to use it in the future.
Horstmann, K. T., Buecker, S., Krasko, J., Kritzler, S., & Terwiel, S. (2020). Who does or does not use the “Corona-Warn-App” and why? [Preprint]. PsyArXiv. https://doi.org/10.31234/osf.io/e9fu3
So when we ask users to answer questions that deal with the future, we have to keep in mind the context in which they’re answering. They can tell us about a feature they think will make their lives better, but user val-idation will always be necessary to make sure that past user’s beliefs about future user are accurate.
Starominski-Uehara, M. (2020). Powering Social Media Footage: Simple Guide for the Most Vulnerable to Make Emergency Visible [Preprint]. SocArXiv. https://doi.org/10.31235/osf.io/gefhv
In fact, developers often tend to forget a simple, almost elementary fact: if users want to close the application or leave a site, they will — doesn’t matter which obstacles are placed on their path to the exit-button. The more obstacles there are the more negative the user experience will be.
As designers, it is our decision to provide users with a clear, unambiguous choice, but we have no right to decide for users which choice they make.
Any deviations from this convention result in a more design-oriented and less user-oriented design.
Users also don’t like to deal with dozens of opened tabs and some visitors tend to become quickly angry with the disabled back button. Furthermore, some visitors may not even realize that a new window was opened and hit the back-button mercilessly — without any result. That’s not user-friendly, and that’s not a good user experience we, web designers, strive for.
Starominski-Uehara, M. (2020). Powering Social Media Footage: Simple Guide for the Most Vulnerable to Make Emergency Visible [Preprint]. SocArXiv. https://doi.org/10.31235/osf.io/ek6tz
Matamala-Gomez. M., Brivio E., Chirico. A., Malighetti. C., Realdon. O., Serino. S., Dakanalis. A., Corno. G., Polli. N., Cacciatore. C., Riva. Giuseppe., Mantovani. F (2020) User Experience and usability of a new virtual reality set-up to treat eating disorders: a pilot study. PsyArXiv Preprints. Retrieved from: https://psyarxiv.com/b38ym/
Veltri, G. A., Prof, Lupiáñez-Villanueva, F., Folkvord, F., Theben, A., & Gaskell, G. (2020, April 29). The impact of online platform transparency of information on consumer’s choices. https://doi.org/10.31234/osf.io/htja5
Willem, L., Hoang, T. V., Funk, S., Coletti, P., Beutels, P., & Hens, N. (2020). SOCRATES: An online tool leveraging a social contact data sharing initiative to assess mitigation strategies for COVID-19 [Preprint]. Epidemiology. https://doi.org/10.1101/2020.03.03.20030627
Zoom didn't do this to comply with local law.
They did this because they don't want to lose customers in China.
This is just capitalistic greed.
Shutting down activists over a dictatorship is wrong, and it is actually as simple as that.
The EARN IT act turns Section 230 protection into a hypocritical bargaining chip. At a high level, what the bill proposes is a system where companies have to earn Section 230 protection by following a set of designed-by-committee “best practices” that are extraordinarily unlikely to allow end-to-end encryption. Anyone who doesn’t comply with these recommendations will lose their Section 230 protection.
Broadly speaking, Section 230 of the Communications Decency Act protects online platforms in the United States from legal liability for the behavior of their users. In the absence of this protection, many of the apps and services that are critical to the way the internet functions today may have never been created in the first place – or they couldn’t have been created in America.
A year’s worth of cajoling back and forth has ultimately resulted in the EARN-IT bill wending its way through the U.S. system, a bill that, if passed, would see messaging services become legally responsible for the content on their platforms. While not mandating backdoors, per se, without some form of probes into message content, the argument runs that the punitive risks become unsurvivable.
there’s a bill tiptoeing through the U.S. Congress that could inflict the backdoor virus that law enforcement agencies have been trying to inflict on encryption for years... The choice for tech companies comes down to weakening their own encryption and endangering the privacy and security of all their users, or foregoing protections and potentially facing liability in a wave of lawsuits.
Once the platforms introduce backdoors, those arguing against such a move say, bad guys will inevitably steal the keys. Lawmakers have been clever. No mention of backdoors at all in the proposed legislation or the need to break encryption. If you transmit illegal or dangerous content, they argue, you will be held responsible. You decide how to do that. Clearly there are no options to some form of backdoor.
Despite its opposition, EARN-IT is the clearest threat yet to end-to-end encryption, given this clever twist in pushing the onus onto the platforms to avoid transmitting illegal content, rather than mandating a lawful interception approach.
Tiring of the privacy and safety debate, those behind EARN-IT have proposed making the platforms responsible for the content they transmit, encrypted or not. This would mean, as explained by Sophos, that tech companies “either weaken their own encryption and endanger the privacy and security of all their users, or forego protections and potentially face liability in a wave of lawsuits.”
The Digital Millennium Copyright Act (DMCA) has notable safe-harbor provisions which protect Internet service providers from the consequences of their users' actions. (Similarly, the EU directive on electronic commerce provides a similar provision of "mere conduit" which, while not exactly the same, serves much the same function as the DMCA safe harbor in this instance.)
The breach was caused by Facebook’s “View As” feature, which allows users to view their own account as if they were a stranger visiting it.
Don’t go to code academy, go to design academy. Be advocates of the user & consumer. It’s not about learning how to code, it’s about translating real-world needs to technological specifications in just ways that give end users agency and equity in design, development and delivery. Be a champion of user-centric design. Learn how to steward data and offer your help.
The importance of learning to design, and interpreting/translating real-world needs.
At Google, we believe that if we focus on the user, all else will follow.
allows you to deploy "'strict-dynamic' in a backwards compatible way, without requiring user-agent sniffing
A "tag" is a snippet of code that allows digital marketing teams to collect data, set cookies or integrate third-party content like social media widgets into a site.
This is a bad re-purposing of the word "tag", which already has specific meanings in computing.
Why do we need a new word for this? Why not just call it a "script" or "code snippet"?
It’s worth saying though that while the law may give you up to 30 days to honor these requests, most subscribers won’t. It is therefore prudent to honor opt-out requests promptly or risk being marked as spam and compromising the total legitimacy of your associated address.
What I don't like is how they've killed so many useful extensions without any sane method of overriding their decisions.
I know, you don't trust Mozilla but do you also not trust the developer? I absolutely do! That is the whole point of this discussion. Mozilla doesn't trust S3.Translator or jeremiahlee but I do. They blocked page-translator for pedantic reasons. Which is why I want the option to override their decision to specifically install few extensions that I'm okay with.
There will be those within organisations that won't be too keen on the approaches above due to the friction it presents to some users.
This is one possible path to take in that you simply reject the registration and ask the user to create another password. Per NIST's guidance though, do explain why the password has been rejected:
I suggest being very clear that there has not been a security incident on the site they're logging into and that the password was exposed via a totally unrelated site
(also the above image)
By rendering important parts of the application with the real data on the server-side, an isomorphic application can show a meaningful initial page. On the other hand, client rendering application can’t show any meaningful information until it fetches all external data it needs. In the meantime, the only thing a user will see is a loading indicator.
One of the drawbacks of waiting until someone signs in again to check their password is that a user may simply stay signed in for a long time without signing out. I suppose that could be an argument in favor of limiting the maximum duration of a session or remember-me token, but as far as user experience, I always find it annoying when I was signed in and a website arbitrarily signs me out without telling me why.
Short of a fingerprint reader, two-step verification (aka two-step authorization) may be the single best way to protect online accounts.
There is a fundamental difference between these two kinds of content: the user comments are stored in our databases, which means their Markdown syntax can be normalized (e.g. by adding or removing whitespace, fixing the indentation, or inserting missing Markdown specifiers until they render properly). The Markdown documents stored in Git repositories, however, cannot be touched at all, as their contents are hashed as part of Git’s storage model.
I need that model created despite being invalid, so it actually works in my favor (I have an after-signup profile creation process users through
Each request to the API must be accompanied by a user agent request header. Typically this should be the name of the app consuming the service.
Did you expect the temp directory to get printed? In the last example, we saw the directories ./temp and ./C/temp got printed, but not now. This is the effect of the -print option. By default, the find command prints all the files matching the criteria. However, once the -print option is specified, it will print files only on explicit print instructions. In this find command, -print is associated in the other side of the OR condition, and hence nothing will get printed from the 1st part of the condition.
One mistake that we made when creating the import/export experience for Blogger was relying on one HTTP transaction for an import or an export. HTTP connections become fragile when the size of the data that you're transferring becomes large. Any interruption in that connection voids the action and can lead to incomplete exports or missing data upon import. These are extremely frustrating scenarios for users and, unfortunately, much more prevalent for power users with lots of blog data.
The point is that users should be in control of their data, which means they need an easy way of accessing it. Providing an API or the ability to download 5,000 photos one at a time doesn't exactly make it easy for your average user to move data in or out of a product.
Thousands of enterprises around the world have done exhaustive security reviews of our user, network, and data center layers and confidently selected Zoom for complete deployment.
This doesn't really account for the fact that Zoom have committed some atrociously heinous acts, such as (and not limited to):
It won't let me go beyond this page. I'm sure I've answered the CAPTCHA correctly at least some of the 10+ times I've tried. What's going on?
I can't even access their static website to find contact information for how to contact them about this problem!
Robots are currently suffering extreme discrimination due to a few false assumptions, mainly that they’re distinctly separate actors from humans. My point of view is that robots and humans often need to behave in the same way, so it’s a fruitless and pointless endeavour to try distinguishing them.
This means genuinely asking for permission — using honesty to win trust by enabling rather than disabling user agency.
For years, the most used solution was to add an ugly captcha to the form, with some hard to read letters, numbers etc on an image. The user had to type these in an input field. The spambots have a hard time reading these images: problem solved!But this solution is not very user-friendly: it’s ugly, and annoys users so much you might lose conversions.
Don’t go to code academy, go to design academy. Be advocates of the user & consumer. It’s not about learning how to code, it’s about translating real-world needs to technological specifications in just ways that give end users agency and equity in design, development and delivery. Be a champion of user-centric design. Learn how to steward data and offer your help.
To add insult to injury I learn that when Cloudflare automatically detects an anomaly with your domain they permanently delete all DNS records. Mine won't be difficult to restore, but I'm not sure why this is necessary. Surely it would be possible for Cloudflare to mark a domain as disabled without irrevocably deleting it? Combined with the hacky audit log, I'm left with the opinion that for some reason Cloudflare decided to completely half-ass the part of their system that is responsible for deleting everything that matters to a user.
...and this is why some companies should not grow to become too big for the good of their customers.
Do Browse like a user wouldTake natural pauses that users would take to consume page contentFocus on the most common use cases, rather than all the possible use casesTake note of pages where forms/logins occur, you will likely need to complete some scripting there
Invisible and Very Busy - Olia Lialina
TUI
I assume this means text-based UI?? First time I've seen this term.
Avoiding complicated outlining or mind-mapping software saves a bunch of mouse clicks or dreaming up complicated visualizations (it helps if you are a linear thinker).
Hmm. I'm not sure I agree with this thought/sentiment (though it's hard to tell since it's an incomplete sentence). I think visualizations and mind-mapping software might be an even better way to go, in terms of efficiency of editing (since they are specialized for the task), enjoyment of use, etc.
The main thing text files have going for them is flexibility, portability, client-neutrality, the ability to get started right now without researching and evaluating a zillion competing GUI app alternatives.
An ssh public key in a ~/.ssh/authorized_keys file can have a command="" option which forces a particular command to be executed when the key is used to authenticate an ssh connection. This is a security control that mitigates against private key compromise. This is great when you only need to execute a single command. But if you need to perform multiple tasks, you would normally need to create and install a separate key pair for each command, or just not bother making use of forced commands and allow the key to be used to execute any command.
from="<ip>",command="/usr/local/sbin/validate-rsync" ssh-dss AAAAZ5Hbl......
echo "from="${MYIP%% *}",no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty,command="rsync ${SSH_ORIGINAL_COMMAND#* }" $(ssh-keygen -yf ~/.ssh/rsync_rsa)" | ssh targetserver "cat - >>~/.ssh/authorized_keys" Note that the ‘command=’ restriction (http://larstobi.blogspot.ch/2011/01/restrict-ssh-access-to-one-command-but.html) will not apply if ‘/etc/sshd_config’ has already a ‘ForceCommand’ directive.
Might be a little too low-level (even with GUIs) for some teams of users. GPG and Git both require some setup and experience in these tools, or the willingness to learn. Porting a GPG key from machine to machine is not trivial.
Second, uBlock Origin does not have a dedicated server, it can't "phone home" with your browsing data, there is only GitHub, and GitHub is completely unrelated to uBlock Origin.
Is there a home server?
As you know, we ship the smallest thing to provide initial value and then we learn from your feedback and continue to improve the feature over time.
I don't want to bet more time on it without user feedback
Try not typing the dollar sign $.
"But in moving towards flat design we are losing much of the wisdom that was embedded in the old 3D style of UI, for example: a user must be able to glance at a screen and know what is an interactive element (e.g., a button or link) and what is not (e.g., a label or motto); a user must be able to tell at a glance what an interactive element does (does it initiate a process, link to another page, download a document, etc.?); the UI should be explorable, discoverable and self-explanatory. But many apps and websites, in the interest of a clean, spartan visual appearance, leave important UI controls hidden until the mouse hovers over just the right area or the app is in just the right state. This leaves the user in the dark, often frustrated and disempowered."
Unfortunately, misguided views about usability still cause significant damage in today's world. In the 2000 U.S. elections, poor ballot design led thousands of voters in Palm Beach, Florida to vote for the wrong candidate, thus turning the tide of the entire presidential election. At the time, some observers made the ignorant claim that voters who could not understand the Palm Beach butterfly ballot were not bright enough to vote. I wonder if people who made such claims have never made the frustrating "mistake" of trying to pull open a door that requires pushing. Usability experts see this kind of problem as an error in the design of the door, rather than a problem with the person trying to leave the room.
The web, in yet another example of its leveling effect, allows nearly everyone to see nearly every interface. Thus designers can learn rapidly from what others have done, and users can see if one web site's experience is substandard compared to others.
The primary benefit of this would be to make the Hudson River and Public Square park areas more easily accessible to everyone who lives and works east of Hudson Yards. Opening 10th avenue to street facing retail, turning the six lane street two-way, and adding bike lanes would also make it more forgiving.
Concluding appeal and explanation of the author's call to action. Considering the lack of walkability and limited potential use, they suggest a new design that will maximize access. This also has the benefit of altering the public's sense of that the space is exclusive.
Urbanists like Jan Gehl, Janette Sadik-Kahn, Jeff Speck, and others have composed a comprehensive and well codified body of knowledge on humane urban design and walkability, which art critics should assimilate into their practice.
Framework for criticism
The Javits Center is often used by urbanists as an example of the perils of inhumane design. The unused and un-policed periphery attracts crime and vagrancy while its one entrance opens upon an eight lane street. This combination means that most conference attendees hire a taxi to ferry them to a more hospitable neighborhood.
This is an excellent example of creation without context, particularly use by target populations. Walkability was so poor that it negatively affected the area.
The only way to reach the Public Square promenade from the street is to climb three flights of stairs onto the High Line, then cross a fairly narrow bridge connection. The street level features a large cafeteria, but like the 10th avenue perimeter, the sidewalks are so narrow and the road so heavily trafficked with vehicles that it is unlikely the street can thrive as a public space.
Examples of why this space is not user-friendly and basically unwalkable. Those designing the space did not consider practicalities like access.
But over time, they become numb to the novelty of art, and other considerations exert a far greater influence on their experience of the building: things like who uses the space, when the space is used, how the space forms community and how it integrates the the community that surrounds it.
His argument is user-orientated, criticizing experts in the field who work separately to build components of a shared urban ecosystem. Each architect was chosen for their fame, not their ability to work as part of a team, and spare little consideration about those who will live, work, and move through the space. Most importantly, the question of fostering community is addressed.
Similar to scholars at the top of their field, these architects place little consideration towards the mass consumption of their work and its context.
Street front retail creates foot traffic in places that might otherwise be desolate and inhospitable during different parts of the day. A diversity of land uses is key in cultivating walkability. For example, New York’s financial district is generally a ghost town after office hours because it lacks residential buildings. Adjacent Battery Park City has the opposite problem; it is so domestic that its streets are empty except during commuting hours.
Cites two examples of spaces in the city that fail to maximize walkability and reduces user satisfaction/use. Users require mixed-use spaces that promote diverse populations, keeping them from becoming too exclusive and barren during the off hours.
Having the expertise and context of the entire team in the room – the product designer, product manager and the engineers – means the plans are holistic and viable rather than limited to the lens of one of the roles
This method allows us to learn before shipping and make sure that we can be more responsible with the design decisions we make
Fail fast, fail often?
This feels much more sustainable without becoming laborious.
The matrix reduces the role of bias while giving space for other findings to emerge
Focusses on what the user does, not what they say or think
User research is about reducing uncertainty in the design process
Another way of thinking about a good metric is to define a bad one. Bad metrics include those that are:
A really nice list to check your metrics against
INVEST
According to this checklist, a User Story should be:
Indepedent (of all others)
Negociable (not a specific contract for features)
Valuable (or vertical)
Estimable (to a good approximation)
Small (so as to fit within an iteration)
Testable (in principle, even if there isn't a test for it yet)
Source(s):
I'm trading these who has these like how to videos, video tutorials and they really go in to the nitty gritty. I think they also have like a Wiki fac or like a wiki tutorial that is just like a whole encyclopedia of trading view and have every indicator you want, you click it and it expands and you can read about everything
on me. At first it seemed clunky and slow, but now I understand like it's just very like logical, uh, from like a Ux perspective.
Mobile Based User-Centered Learning Environment for Adult Absolute Illiterates
This study reviewed the education of absolute illiterates globally. It was based on the creation of game-based learning (GBL) which provides a user-friendly learning platform with little cost and little intimidation for the learner. The research also identified 60% of the world's illiterate population residing in rural areas with little access to computers and educational centers. The GBL environments created real world environments that allow learners to practice real-life scenarios in familiar surroundings using 3-D technology. The study also adapted a English language program to meet the needs of various languages. The context of the game is a farmer and a wife then acquire items and count them in their native language. The numbers used in counting are spoken and the game produces the correlating number so the learner becomes familiar with the written form of the letter. In conclusion, the participants identified that the mobile learning was more beneficial than PC applications due to unreliable electrical service at home. The mobile system was also available on demand.and applied to participants real-life usage.
RATING: 10/10
How is technology socially constructed, this is something I am interested about. What I would propose is that there are many experiences of people using things that aren~t meant to be used that way.
And what about using things that are built to be used in a certain way? Can we also learn from that?
Sen. Mark Warner of Virginia told the AP it is “frustratingly common” for technology companies “to have corporate practices that diverge wildly from the totally reasonable expectations of their users,” and urged policies that would give users more control of their data. Rep. Frank Pallone of New Jersey called for “comprehensive consumer privacy and data security legislation” in the wake of the AP report.
Design is inherently political, but it is not inherently good. With few exceptions, the motivations of a design project are constrained by the encompassing platform or system first, and the experiences and values of its designers second. The result is designers working in a user hostile world, where even seemingly harmless platforms or features are exploited for state or interpersonal surveillance and violence.As people living in societies, we cannot be separated from our political contexts. However, design practitioners research and implement systems based on a process of abstracting their audience through user stories. A user story is “a very high-level definition of a requirement, containing just enough information so that the developers can produce a reasonable estimate of the effort to implement it23.” In most cases, user are grouped through shared financial or biographical data, by their chosen devices, or by their technical or cognitive abilities.When designing for the digital world, user stories ultimately determine what is or is not an acceptable area of human variation. The practice empowers designers and engineers to communicate via a common problem-focused language. But practicing design that views users through a politically-naive lens leaves practitioners blind to the potential weaponisation of their design. User-storied design abstracts an individual user from a person of lived experience to a collection of designer-defined generalisations. In this approach, their political and interpersonal experiences are also generalised or discarded, creating a shaky foundation that allows for assumptions to form from the biases of the design team. This is at odds with the personal lived experience of each user, and the complex interpersonal interactions that occur within a designed digital platform.When a design transitions from theoretical to tangible, individual user problems and motivations become part of a larger interpersonal and highly political human network, affecting communities in ways that we do not yet fully understand. In Infrastructural Games and Societal Play, Eleanor Saitta writes of the rolling anticipated and unanticipated consequences of systems design: “All intentionally-created systems have a set of things the designers consider part of the scope of what the system manages, but any nontrivial system has a broader set of impacts. Often, emergence takes the form of externalities — changes that impact people or domains beyond the designed scope of the system^24.” These are no doubt challenges in an empathetically designed system, but in the context of design homogeny, these problems cascade.In a talk entitled From User Focus to Participation Design, Andie Nordgren advocates for how participatory design is a step to developing empathy for users:“If we can’t get beyond ourselves and our [platforms] – even if we are thinking about the users – it’s hard to transfer our focus to where we actually need to be when designing for participation which is with the people in relation to each other25.”Through inclusion, participatory design extends a design team’s focus beyond the hypothetical or ideal user, considering the interactions between users and other stakeholders over user stories. When implemented with the aim of engaging a diverse range of users during a project, participatory design becomes more political by forcing teams to address weaponised design opportunities during all stages of the process.
For now, the Solid technology is still new and not ready for the masses. But the vision, if it works, could radically change the existing power dynamics of the Web. The system aims to give users a platform by which they can control access to the data and content they generate on the Web. This way, users can choose how that data gets used rather than, say, Facebook and Google doing with it as they please. Solid’s code and technology is open to all—anyone with access to the Internet can come into its chat room and start coding.
A mental map (or cognitive map) is our mental representation of a place. It includes features we consider important, and is likely to exclude features we consider unimportant.
(Urban planner Kevin Lynch, early 1960s)<br> Elements of mental maps
Modern maps could use augmented and virtual reality to help clarify those elements, making a place easier to navigate and use. But they can also add useless noise that makes the place seem more confusing than it actually is.
Table 1. Characteristics of people interviewed for this study.
The thumbnail preview of the table is irritating in that it suggests there are only three content rows in the table, when there are several times as many.
For a technology to evolve in accordance with users’ needs, aiding social and economic development, the focus must move beyond mere adoption. When users appropriate technology and make it their own, new uses and innovations emerge. The appropriation process is a contest for control over a technological system’s configuration, as users, designers, and manufacturers battle over who can use that technology, at what cost, under what conditions, for what purpose, and with what consequences. This confrontation, we argue, constitutes a powerful innovation mechanism.
La adopción y la apropiación están muy cercanas en los metasistemas como Pharo/Smalltalk, pues que un usuario use una herramienta suele estar muy cercano a la idea de que esté en condiciones de modificarla.
Para el caso de Grafoscopio, la comunidad de práctica avanza, con miembros relativamente constantes entre edición y edición del Data Week y las Data Rodas y progresivamente miramos cómo modificar la herramienta. Aún así, no hay usos cotidianos de la misma (adopción) y la modificación (apropiación) aún es muy lenta. Sin embargo, el potencial de la herramienta para adaptarse a la comunidad y sus problemas, ha sido mayor que el de otras que se probaron.
®
Reduce size of R symbol
hypothes.is 簡介
Neither Apple nor Microsoft really captured the essence of what made the Smalltalk system powerful. They used it as a model to make computers more accessible, but they left out the aspect of letting people bend the system to their will, to customize it to be just what they want. Their systems were really an object-oriented facade over a traditional, non-object-oriented system. They lacked a consistent metaphore of everything being an object. The web has been even more stultifying in this regard (I mean the web interface), though Firefox has helped some, so I hear, with the concept of browser extensions.
The approach has also allowed Newman’s marketing team to learn what readers are interested in between the publication events, providing feedback to reporters and editors so that the next release of content reflects the priorities readers have stated.
This is a fascinating interactive development!
Jessica Helfand in her essay The Dematerialism of Screen Space (2001) critiques the phenomenon of design practise being led by developments in software engineering. She argues that designers should take the initiative: “design must submit to a series of commands and regulations as rigourous as those that once defined Swiss typography. Aesthetic innovation, if it indeed exists at all, occurs within ridiculously preordained parameters: a new plug-in, a modified code, the capacity to make picture and words ‘flash’ with a mouse in a non-sensical little dance. We are all little filmmakers, directing on a pathetically small screen – yet broadcasting to a potentially infinite audience. This in itself is conflicting (not to mention corrupting), but more importantly, what are we making? What are we inventing? What are we saying that has not been said before?” Helfand here is referring to the web, but her argument applies equally well to designing tablet publications. Designers of book and magazine apps should be asking themselves those last three questions. Since tablet publishing conventions are in the process of being formed (like child invention), we have a unique opportunity right now to influence their direction.
Some key themes arise from the two NNG reports on iPad usability: App designers should ensure perceived affordances / discoverability There is a lack of consistency between apps, lots of ‘wacky’ interaction methods. Designers should draw upon existing conventions (either OS or web) or users won’t know what to do. These are practical interaction design observations, but from a particular perspective, that of perceptual psychology. These conclusions are arrived at through a linear, rather than lateral process. By giving weight to building upon existing convention, because they are familiar to the user, there is a danger that genuinely new ideas (and the kind of ambition called for by Victor Bret) within tablet design will be suppressed. Kay’s vision of the Dynabook came from lateral thinking, and thinking about how children learn. Shouldn’t the items that we design for this device be generated in the same way?
The idea of lateral thinking here is the key one. Can informatics be designed by nurturing lateral thinking? That seems related with the Jonas flopology
The document argues that the use of illusionary surfaces and objects will lead to a more intuitive and pleasurable experience for the user. It also, yet again, looks to prior conventions for solutions rather than starting afresh.
Every theorem of mathematics, every significant result of science, is a challenge to our imagination as interface designers. Can we find ways of expressing these principles in an interface? What new objects and new operations does a principle suggest? What a priori surprising relationship between those objects and operations are revealed by the principle? Can we find interfaces which vividly reveal those relationships, preferably in a way that is unique to the phenomenon being studied?
Speech, writing, math notation, various kinds of graphs, and musical notation are all examples of cognitive technologies. They are tools that help us think, and they can become part of the way we think -- and change the way we think.
Computer interfaces can be cognitive technologies. To whatever degree an interface reflects a set of ideas or methods of working, mastering the interface provides mastery of those ideas or methods.
Experts often have ways of thinking that they rarely share with others, for various reasons. Sometimes they aren't fully aware of their thought processes. The thoughts may be difficult to convey in speech or print. The thoughts may seem sloppy compared to traditional formal explanations.
These thought processes often involve:
Nielsen considers turning such thought processes into (computer) interfaces. "Every theorem of mathematics, every significant result of science, is a challenge to our imagination as interface designers. Can we find ways of expressing these principles in an interface? What new objects and operations does a principle suggest?"
Testing the amazing hypothes.is on FB.
Hotel shower and lighting controls should be easy to find and easy to use. Why are they so often not?
because of feelings of belonging and obligation to the community.
Content organization refers to features that require little effort from the user and that help fellow users receive useful information about the content. These features include the “like” button and options such as ratings (star ratings or a numerical scale) or tagging content with user-suggested keywords.
Hypothes.is lacks this first step in the ladder. We don't have a like button. Tagging doesn't seem as easy as it could be.
Maybe when we rethink page level notes, we might prioritize calling user to action there: tag the text; maybe offer a broad statement/description.
"Field surveys are usually expensive to run." Suggesting iPads are revolutionizing field research.