Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Designing for a User Hijacked World

16,063 views

Published on

As part of Social Media Week, frog Strategist Adam Silver hosted a workshop, "Designing for a User-Hijacked World" at the NY studio. His workshop focused on how design can use social media to build more inclusive, adaptive and relevant user experiences.

Designing for a User Hijacked World

  1. Designing for a user-hijacked world.<br />
  2. frog designSocial Media Week 2010630-7 Meet and greet (and beer and wine)7-730 Presentation730-830 Workshop<br />
  3. We build for the user.<br />
  4. We build for the user.<br />
  5. And now users are building for themselves.<br />
  6. They know better.<br />
  7. Lets go back. To the Internet of yesteryear.<br />
  8. The 80s: a time of single rainbows.<br />
  9. We were pioneers.<br />
  10. We geeked out.<br />
  11. We created the first Facebook.<br />
  12. We made the Internet cool.<br />
  13. And then…<br />
  14. AOL<br />
  15. Compuserve<br />
  16. Prodigy<br />
  17. The first online ad was launched.And that day, the users slowly lost control.<br />
  18. The internet became business as usual.<br />
  19. We made a deal.Our souls in exchange for better experiences.<br />
  20. What we got.<br />
  21. What we got.<br />
  22. What we got.<br />
  23. They crashed and burned.<br />
  24. The return to the open Internet promised a new era of openness.<br />
  25. It wasn’t meant to be.<br />
  26. And then…<br />
  27. We smartened up.<br />
  28. We started building again. <br />
  29. We figured out how to use the Internet to fund our passions.<br />
  30. Connect with people on our own terms.<br />
  31. Read news that’s just for you.<br />
  32. And…<br />Find a taco truck.<br />
  33. Recover golden eggs.<br />Find a taco truck.<br />
  34. Recover golden eggs.<br />Take hipstery photos.<br />Find a taco truck.<br />
  35. Recover golden eggs.<br />Take hipstery photos.<br />Find a taco truck.<br />Live your DJ dreams.<br />
  36. Recover golden eggs.<br />Take hipstery photos.<br />Find a taco truck.<br />Live your DJ dreams.<br />Catch up on your RSS.<br />
  37. Find a taco truck.<br />
  38. Users are hijacking the Internet.<br />
  39. How can you benefit?<br />
  40. Ask yourself:<br />
  41. Can you make it more adaptable?<br />
  42. Can you make it more useful?<br />
  43. Can you make it more surprising?<br />
  44. Can you give it away?<br />
  45. Good solo.<br />
  46. Great together.<br />
  47. Hotmail: free<br />
  48. Dropbox: free and useful <br />
  49. Posterous: free, useful and adaptable.<br />
  50. Twitter is: free, useful, adaptable andsurprising.<br />
  51. How to design for a user-hijacked world?<br />
  52. Don’t write the story.<br />
  53. Set the stage.<br />
  54. Then, let em hijack it.<br />
  55. When you design it to be hackable…<br />
  56. It just gets better.<br />
  57. Users = u$age. That’s the goal.<br />
  58. Thanks<br />
  59. Next up: workshopCreate your own hackable experience<br />
  60. Get started:1. Look at your card, locate your number2. Locate your group (signs are on the walls)3. Grab a packet of worksheets from the front (1 per group)4. Get started! Frog moderators are floating around to helpYou have 20 minutes for the first phaseWe will find you for the next…Good luck!<br />

×