The document outlines the development of a mobile app called The Bike Washer, which allows users in Paris to request an on-demand motorcycle or scooter cleaning service directly through the app. It describes the process of conducting user research including surveys and interviews to understand user needs. Based on this, the key flows and features of the app were designed, including registration, requesting a wash, and canceling or reviewing a completed wash. Wireframes and prototypes were created and user tested to refine the design. The document concludes with screenshots from the initial version of the app.
Through this app, commuters will now be able to see the location of the autos nearest to them and call the auto drivers directly on their personal mobile nos. and book their trip. Commuters can now be free from looking out and shouting for autos on the streets and instead have the autos provide a pick-up and drop service.
Apart from this, the application will also provide information on the estimated fare, trip distance, travel time as well as the traffic condition on the route. Getting autos will now no longer be a worry with the new OAB app.
Through this app, commuters will now be able to see the location of the autos nearest to them and call the auto drivers directly on their personal mobile nos. and book their trip. Commuters can now be free from looking out and shouting for autos on the streets and instead have the autos provide a pick-up and drop service.
Apart from this, the application will also provide information on the estimated fare, trip distance, travel time as well as the traffic condition on the route. Getting autos will now no longer be a worry with the new OAB app.
The case study describes a best practices approach to the development of a whole product roadmap for laboratory information management system (LIMS) software to support next-generation sequencing (NGS) for translational and clinical genomic research.
An overview on how should any B2B manufacturing company can initiate planning for Digital Marketing activities. This presentation highlights some key elements which form the crux of any digital marketing campaign. From introducing strangers, converting them into visitors, then to customers and finally advocates.
In case you wait for some case study in your industry it will be too late.
Product Roadmaps - Tips on how to create and manage roadmapsMarc Abraham
This presentation is focused on two areas with respect to product roadmaps. Firstly, a roadmap is a not a loose collection of timings and features. Secondly, it is key to define a product vision, goals and strategy before creating a roadmap.
Accenture publishes its technology vision annually. It is a distillation of our extensive research over the course of the previous 12 months, the experiences of our research teams and the input of our clients. In it, we outline the emerging technology trends that forward-thinking CIOs will use to position their organizations to drive growth and high performance, rather than just focusing on cost-cutting and efficiency improvements.
Business leaders now accept that their organizations’ future success is bound up with their ability to keep pace with technology. CIOs have to play a key role in helping these business leaders recognize and seize the opportunities enabled by new trends—but the price of progress will have to be paid, along with new risks assumed.
We believe six technology trends will influence business over the next three to five years:
Context-based services. Where you are and what you are doing will drive the next wave of digital services.
Converging data architectures. Successfully rebalancing the data architecture portfolio and blending the structured with the unstructured are key to turning data into new streams of value.
Industrialized data services. The ability to share data will make it more valuable—but only if it is managed differently.
Social-driven IT. Realize that social is not just a bolt-on marketing channel. It will have true business-wide impact.
PaaS-enabled agility. The maturing platform-as-a-service (PaaS) market will shift the emphasis from cost-cutting to business innovation, supporting rapid evolution for business processes that need continuous change.
Orchestrated analytical security. Organizations will have to accept that their gates will be breached and begin preparing their second line of defense—data platforms—to mitigate the damage caused by attacks that get through.
Micro Expressions are brief, involuntary facial expressions shown on the face of humans according to emotions experienced.
They occur when a person is consciously trying to conceal all signs of how he or she is feeling, or when a person does not consciously know how he or she is feeling.
In this deck, a brief history of micro expressions is introduced, along with a detailed analysis of the 7 universal facial expressions that could be found in almost anyone walking on this Earth.
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...Christopher Bradley
DAMA DMBoK 2.0 keynote presentation at DAMA Australia November 2013.
Overview of DMBOK, what's different in 2.0, and how the DMBOK co-exists and successfully interoperates with other frameworks such as TOGAF and COBIT
Updated with revised DMBoK 2 release date
chris.bradley@dmadvisors.co.uk
The case study describes a best practices approach to the development of a whole product roadmap for laboratory information management system (LIMS) software to support next-generation sequencing (NGS) for translational and clinical genomic research.
An overview on how should any B2B manufacturing company can initiate planning for Digital Marketing activities. This presentation highlights some key elements which form the crux of any digital marketing campaign. From introducing strangers, converting them into visitors, then to customers and finally advocates.
In case you wait for some case study in your industry it will be too late.
Product Roadmaps - Tips on how to create and manage roadmapsMarc Abraham
This presentation is focused on two areas with respect to product roadmaps. Firstly, a roadmap is a not a loose collection of timings and features. Secondly, it is key to define a product vision, goals and strategy before creating a roadmap.
Accenture publishes its technology vision annually. It is a distillation of our extensive research over the course of the previous 12 months, the experiences of our research teams and the input of our clients. In it, we outline the emerging technology trends that forward-thinking CIOs will use to position their organizations to drive growth and high performance, rather than just focusing on cost-cutting and efficiency improvements.
Business leaders now accept that their organizations’ future success is bound up with their ability to keep pace with technology. CIOs have to play a key role in helping these business leaders recognize and seize the opportunities enabled by new trends—but the price of progress will have to be paid, along with new risks assumed.
We believe six technology trends will influence business over the next three to five years:
Context-based services. Where you are and what you are doing will drive the next wave of digital services.
Converging data architectures. Successfully rebalancing the data architecture portfolio and blending the structured with the unstructured are key to turning data into new streams of value.
Industrialized data services. The ability to share data will make it more valuable—but only if it is managed differently.
Social-driven IT. Realize that social is not just a bolt-on marketing channel. It will have true business-wide impact.
PaaS-enabled agility. The maturing platform-as-a-service (PaaS) market will shift the emphasis from cost-cutting to business innovation, supporting rapid evolution for business processes that need continuous change.
Orchestrated analytical security. Organizations will have to accept that their gates will be breached and begin preparing their second line of defense—data platforms—to mitigate the damage caused by attacks that get through.
Micro Expressions are brief, involuntary facial expressions shown on the face of humans according to emotions experienced.
They occur when a person is consciously trying to conceal all signs of how he or she is feeling, or when a person does not consciously know how he or she is feeling.
In this deck, a brief history of micro expressions is introduced, along with a detailed analysis of the 7 universal facial expressions that could be found in almost anyone walking on this Earth.
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...Christopher Bradley
DAMA DMBoK 2.0 keynote presentation at DAMA Australia November 2013.
Overview of DMBOK, what's different in 2.0, and how the DMBOK co-exists and successfully interoperates with other frameworks such as TOGAF and COBIT
Updated with revised DMBoK 2 release date
chris.bradley@dmadvisors.co.uk
Cyclent | Rent your miles | Android App Marketing PlanSaurabh Yadav
Cyclent is an app that lets you quickly rent bicycles depending on your requirement & location.
The presentation is about the proposed mobile app & its marketing plan.
A Comprehensive Guide to e-Scooter Sharing App Development for 2024.pdfJPLoft Solutions
Make a scooter-sharing application with JPLoft's help. This tutorial, JPLoft, can help you discover the most effective ways to build a digital scooter application with the basics. The market for creating electric scooter applications has grown and become more extensive. This is because many individuals ride electric scooters, making traveling from one place to the next easier.
Carpooling App India - UX Desin - Avjit ChinaraAvijit Chinara
In these slides I have explained the UX design process used during carpooling App. These slides have been sanitized to make shareable. Hope this will give a clear idea about the UX design process.
Taxi App Development: An Extensive Guide with Detailed StepsZimbleCodeAustralia
With the Internet spreading its wings over nearly every sector, more and more taxi firms are coming in to get their can service online with taxi booking app development.
The most interesting fact is that ride-hailing apps like Uber and Lyft completed about 35 million more rides than traditional taxis in 2017. In addition, Statista projects that the market for ride-hailing services would increase at an average rate of $126,521 million by 2025.
Similar to Bike washer casestudy_v3_minfilesize (20)
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
3. Intro
There are over 35,000
image-conscious motorcyclists and
scooterists who use their two-wheeled
vehicles as their primary form of transport
within Paris.
The high cost of gas, scarcity of street
parking and frequent traffic jams
encourage the growth of scooter and
motorcycle adoption.
The Bike Washer founding team recruited
DOERS, a Paris-based digital agency,
to develop The Bike Washer
mobile applications in November 2011.
4. Service Proposition
1. Pinpoint your parking location with GPS
2. Tell us how long you’ll be parked
3. A mobile technician will
thoroughly clean and detail your bike
and take pictures before and after.
Presto!
No inconvenient location to drive to,
No waiting rooms with bad coffee and neon lights,
No trouble.
Just a great-looking bike you’ll be proud to be seen on.
5. Project Requirements:
Back-Office:
User-facing:
A web-based admin portal empowers a
business rep to perform the following
actions:
• assign cleanings to technicians
• perform quality control of
before-and-after cleaning results and
• deploy data to technicians in the field
Technicians use the product on their
smartphones to:
• view upcoming appointments
• access navigation services and
• capture photos and notes in the field
2 unique
consumer mobile
applications
(Android and iPhone)
6. Preliminary User Research
I developed a browser-based survey which
asked scooter and motorcylists about
their vehicle, transport habits, and lifestyle.
I then invited 10 survey participants to a hour-long in-person
interview.
Based on the analysis of the survey data and interviews,
I created personas to refine our understanding of the target
demographic and guide our product strategy.
7. Demo and Personas
Target Demographic:
•
28-50 year old, fashion-conscious men living in Paris
•
Use their scooter or bike as their primary form of transport
•
Over 70% of respondents believe that the quality, style, and overall
appearance of their scooter is important
Luc
François
• 42-year-old Finance executive
• Commutes to and from work on the
metro
• Likes to take long rides with fellow
enthusiasts on weekends
• Owns a 2013 Bimota SB6, worth ~ € 24K
• Owns an Android Nexus S phone that is
~2.5 years old
• 30-year-old Designer at an ad agency
• Uses his bike to commute to and from
work and around the city on weekends
• Enjoys concerts and clubs
• Owns a mid-range Honda Silverwing
worth ~ € 3K
• Inseparable from his iPhone 5
8. Friction Points:
The survey asked users how they feel about bike
cleaning and how they clean their bikes today.
We learned that:
68% of respondents drive and and pay for an automatic
or hand-detailing at a washing station
Obstacle: Time-consuming and expensive
27% of respondents hand-wash the vehicle at home
Obstacle: Time-consuming, labor-consuming, high
materials costs
5% of respondents don’t wash their bike
Obstacle: Dike remains dirty and unattractive
9. Procedure flows
I identified four primary procedure flows, and created the UI to
encourage four top-level objectives:
1.
User registration
2.
Wash request
3.
Review wash photos and leave feedback
4.
Cancel appointment
Each flow outlines:
•
consumer app behavior (including push notifications)
•
automated email confirmations and
•
back-office database behavior
and was included in the technical specification that guided our
development team.
11. User Testing
I reached out to a 4 male motorists and invited them to
come in for a usability test using a paper prototype.
I asked them to perform the four in-app goals we had
designed for, including
1. Register and request a wash
2. Leave feedback after a wash is complete
3. Cancel a wash
I observed as the participants navigated the app and took
notes as to which elements of the original design were
troublesome, and later revised the designs accordingly.
13. Tutorial
In order to
minimize user
drop off, we
set the user’s
expectations
as to the ease
of use by
illustrating the
four steps in
the app.
The following
4 screens
appear the
first time,
and all
consequent
times the
app opens,
until the user
registers.
1
2
16. Step 1: Your Location
Saved locations
GPS-gating
limits washing service
area
Four parking spot
types: sidewalk, bike
parking, car parking or
private yard
Assign this location a
name – e.g. office
Leave misc. note
(optional)
e.g. Intercom code to
access private yard
17. Step 2: Your Vehicle
Model and Make
dropdown menus
display base cleaning
fee
License plate number
manual entry
Date selector
Parking time selector
18. Step 3: Review/Confirm Wash
Optional services
selection for premium
services
Payment processor
integration with option
to save card for future
one-click ordering
20. Wash Detail Page: Done
Completed wash
re-cap with feedback:
1-5 star evaluation and
UGC text field
21. Wash Detail Page: Cancelled
Recap of cancelled
wash request
Detailing time between
wash request and
cancellation and
associated fees
New wash request