SlideShare a Scribd company logo
Health Everyware Making Mobile Beautiful HIMSS Celltop Design Workgroup Janey Barnes Scott Lind Eric Miller Bruce Sklar Juhan Sonin, juhan@mit.edu HIMSS Coordinators Edna Boone Juanita Threat 22.Jun.10 Content in this presentation (unless otherwise noted) is licensed under a Creative Commons Attribution 3.0 License
We need a simple set of design best practices that  … takes a system approach to design …. accelerates good software behavior and interface design pattern adoption Guidelines will cover:  interaction and behavior models, graphic design (including layout, grid, color palette, type and naming conventions), information architecture, technical implementation
MOBILE DESIGN TENETS Let data scream Only handle information once Grid it Type less + less type Color carefully Date your users Speak my sign What interface? Repeat customers ROCK Get physical Lust to dust
MOBILE DESIGN TENETS Let data scream Only handle information once Grid it Type less + less type Color carefully Date your users Speak my sign What interface? Repeat customers ROCK Get physical Lust to dust
Let data scream
Envisioning Information, E. Tufte
and the Problem is… Increasingly complex systems Tool and Methodology gap Decision makers are swamped with conflicting data Our work is increasingly multi-dimensional (not a flat-decision space) Artifacts driving decisions need to be coordinated, presented Minimal transparency into key health metrics
How do I (as a patient, nurse, doctor, proxy)make quicker, more accurate decisions?
Ink and lines scream Data disappears Violates all 5 Tufte principles 5 principles produce substantial changes in graphical design: Above all else, show the data. Maximize the data-ink ratio (i.e., the % of ink that shows data) Erase non-data ink. Erase redundant data-ink. Review and edit.
Unreadable Grid >> Data Data as Interface… NOT
38%
Priorities, hierarchy Filtering Navigating … … … Patient data 1 2 last
25% 20%
70%
80%
80% of the screen space should be for data, the actual workspace
Let data scream The data is THE story Less ink, more bang 80% rule
healtheveryware.com

More Related Content

What's hot

Hci activity#1
Hci activity#1Hci activity#1
Hci activity#1
Desalegn Aweke
 
Practical IxD for Developers
Practical IxD for DevelopersPractical IxD for Developers
Practical IxD for Developers
David Ortinau
 
Interaction design and cognitive aspects
Interaction design and cognitive aspects Interaction design and cognitive aspects
Interaction design and cognitive aspects
Andres Baravalle
 
Interaction 09 Introduction to Interaction Design
Interaction 09 Introduction to Interaction DesignInteraction 09 Introduction to Interaction Design
Interaction 09 Introduction to Interaction Design
Dave Malouf
 
Human-Computer Interaction
Human-Computer InteractionHuman-Computer Interaction
Human-Computer Interaction
Tarek Amr
 
Hci unit 1& 2
Hci unit 1& 2Hci unit 1& 2
Hci unit 1& 2
Rama Prasad Vaddella
 
User cognitive aspects for HCI
User cognitive aspects for HCIUser cognitive aspects for HCI
User cognitive aspects for HCI
HafizMImran1
 
Human Computer Interaction Introduction
Human Computer Interaction IntroductionHuman Computer Interaction Introduction
Human Computer Interaction Introduction
N.Jagadish Kumar
 
Introduction to HCI (UCC)
Introduction to HCI (UCC)Introduction to HCI (UCC)
Introduction to HCI (UCC)
apppsych
 
Human computer interaction by gazegaze
Human computer interaction by gazegazeHuman computer interaction by gazegaze
Human computer interaction by gazegaze
gazegaze1234
 
Introduction To HCI
Introduction To HCIIntroduction To HCI
Introduction To HCI
Kshitiz Anand
 
HCI - Chapter 4
HCI - Chapter 4HCI - Chapter 4
HCI - Chapter 4
Alan Dix
 
Human-Centered Artificial Intelligence: Reliable, Safe & Trustworthy
Human-Centered Artificial Intelligence: Reliable, Safe & TrustworthyHuman-Centered Artificial Intelligence: Reliable, Safe & Trustworthy
Human-Centered Artificial Intelligence: Reliable, Safe & Trustworthy
JalnaAfridi
 
IT Fluency in Teen Second Life
IT Fluency in Teen Second LifeIT Fluency in Teen Second Life
IT Fluency in Teen Second Life
Barbara Johnson
 
HCI 3e - Ch 4: Paradigms
HCI 3e - Ch 4:  ParadigmsHCI 3e - Ch 4:  Paradigms
HCI 3e - Ch 4: Paradigms
Alan Dix
 
Principles of UX Engineering
Principles of UX EngineeringPrinciples of UX Engineering
Principles of UX Engineering
The Wisdom Daily
 
HCI Presentation
HCI PresentationHCI Presentation
HCI Presentation
Abdul Rasheed Memon
 
Virtual Office Spaces to Overcome Sensory Distraction in Cubicle-Based Enviro...
Virtual Office Spaces to Overcome Sensory Distraction in Cubicle-Based Enviro...Virtual Office Spaces to Overcome Sensory Distraction in Cubicle-Based Enviro...
Virtual Office Spaces to Overcome Sensory Distraction in Cubicle-Based Enviro...
Gavin Larson
 
Icons
IconsIcons

What's hot (20)

Hci activity#1
Hci activity#1Hci activity#1
Hci activity#1
 
Practical IxD for Developers
Practical IxD for DevelopersPractical IxD for Developers
Practical IxD for Developers
 
Interaction design and cognitive aspects
Interaction design and cognitive aspects Interaction design and cognitive aspects
Interaction design and cognitive aspects
 
Interaction 09 Introduction to Interaction Design
Interaction 09 Introduction to Interaction DesignInteraction 09 Introduction to Interaction Design
Interaction 09 Introduction to Interaction Design
 
Thai hci
Thai hciThai hci
Thai hci
 
Human-Computer Interaction
Human-Computer InteractionHuman-Computer Interaction
Human-Computer Interaction
 
Hci unit 1& 2
Hci unit 1& 2Hci unit 1& 2
Hci unit 1& 2
 
User cognitive aspects for HCI
User cognitive aspects for HCIUser cognitive aspects for HCI
User cognitive aspects for HCI
 
Human Computer Interaction Introduction
Human Computer Interaction IntroductionHuman Computer Interaction Introduction
Human Computer Interaction Introduction
 
Introduction to HCI (UCC)
Introduction to HCI (UCC)Introduction to HCI (UCC)
Introduction to HCI (UCC)
 
Human computer interaction by gazegaze
Human computer interaction by gazegazeHuman computer interaction by gazegaze
Human computer interaction by gazegaze
 
Introduction To HCI
Introduction To HCIIntroduction To HCI
Introduction To HCI
 
HCI - Chapter 4
HCI - Chapter 4HCI - Chapter 4
HCI - Chapter 4
 
Human-Centered Artificial Intelligence: Reliable, Safe & Trustworthy
Human-Centered Artificial Intelligence: Reliable, Safe & TrustworthyHuman-Centered Artificial Intelligence: Reliable, Safe & Trustworthy
Human-Centered Artificial Intelligence: Reliable, Safe & Trustworthy
 
IT Fluency in Teen Second Life
IT Fluency in Teen Second LifeIT Fluency in Teen Second Life
IT Fluency in Teen Second Life
 
HCI 3e - Ch 4: Paradigms
HCI 3e - Ch 4:  ParadigmsHCI 3e - Ch 4:  Paradigms
HCI 3e - Ch 4: Paradigms
 
Principles of UX Engineering
Principles of UX EngineeringPrinciples of UX Engineering
Principles of UX Engineering
 
HCI Presentation
HCI PresentationHCI Presentation
HCI Presentation
 
Virtual Office Spaces to Overcome Sensory Distraction in Cubicle-Based Enviro...
Virtual Office Spaces to Overcome Sensory Distraction in Cubicle-Based Enviro...Virtual Office Spaces to Overcome Sensory Distraction in Cubicle-Based Enviro...
Virtual Office Spaces to Overcome Sensory Distraction in Cubicle-Based Enviro...
 
Icons
IconsIcons
Icons
 

Similar to Health Everyware: Let Data Scream

Health Everyware
Health EverywareHealth Everyware
Health Everyware
Juhan Sonin
 
Cognitive Assistants - Opportunities and Challenges - slides
Cognitive Assistants - Opportunities and Challenges - slidesCognitive Assistants - Opportunities and Challenges - slides
Cognitive Assistants - Opportunities and Challenges - slides
Hamid Motahari
 
Interaction Design (IxD) in the context of User Experience (UX)
Interaction Design (IxD) in the context of User Experience (UX)Interaction Design (IxD) in the context of User Experience (UX)
Interaction Design (IxD) in the context of User Experience (UX)
Dave Malouf
 
Intelligent decision support systems a framework
Intelligent decision support systems  a frameworkIntelligent decision support systems  a framework
Intelligent decision support systems a frameworkAlexander Decker
 
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
RSD Relating Systems Thinking and Design
 
Session ID1 Lecture 1 -What is Interaction Design
Session ID1 Lecture 1 -What is Interaction DesignSession ID1 Lecture 1 -What is Interaction Design
Session ID1 Lecture 1 -What is Interaction Design
Khalid Md Saifuddin
 
Deck 92-146 (3)
Deck 92-146 (3)Deck 92-146 (3)
Deck 92-146 (3)
Thinkful
 
Recipe for an Usable System!
Recipe for an Usable System!Recipe for an Usable System!
Recipe for an Usable System!
Amith Kumar
 
Automated UI & UX Framework
Automated UI & UX FrameworkAutomated UI & UX Framework
Automated UI & UX Framework
IJARIIT
 
Code for science (rev 1)
Code for science (rev 1) Code for science (rev 1)
Code for science (rev 1)
Andy Lenards
 
The Human Feedback Loop - World Usability Day 2012
The Human Feedback Loop - World Usability Day 2012The Human Feedback Loop - World Usability Day 2012
The Human Feedback Loop - World Usability Day 2012
Rich Miller
 
Toward a socio-technical pattern language
Toward a socio-technical pattern languageToward a socio-technical pattern language
Toward a socio-technical pattern language
John Thomas
 
Building Compassionate Conversational Systems
Building Compassionate Conversational SystemsBuilding Compassionate Conversational Systems
Building Compassionate Conversational Systems
diannepatricia
 
Structured Dialogic Design
Structured  Dialogic  DesignStructured  Dialogic  Design
Structured Dialogic Design
SoCoDesign
 
Introduction to Interaction Design.pptx
Introduction to Interaction Design.pptxIntroduction to Interaction Design.pptx
Introduction to Interaction Design.pptx
vaishalikhairnar4
 
Design Inclusively
Design InclusivelyDesign Inclusively
Design Inclusively
Mark Riggan
 
Information Systems
Information SystemsInformation Systems
Information Systems
Carlos J. Costa
 
Using user centered design from a gender perspective. in3
Using user centered design from a gender perspective. in3Using user centered design from a gender perspective. in3
Using user centered design from a gender perspective. in3
Carina Soledad Gonzalez
 
Introducing Treesaver
Introducing TreesaverIntroducing Treesaver
Introducing Treesaver
See3 Communications
 
Designing for People: Communicating Effectively with Interaction
Designing for People: Communicating Effectively with InteractionDesigning for People: Communicating Effectively with Interaction
Designing for People: Communicating Effectively with Interaction
Andrea L. Ames
 

Similar to Health Everyware: Let Data Scream (20)

Health Everyware
Health EverywareHealth Everyware
Health Everyware
 
Cognitive Assistants - Opportunities and Challenges - slides
Cognitive Assistants - Opportunities and Challenges - slidesCognitive Assistants - Opportunities and Challenges - slides
Cognitive Assistants - Opportunities and Challenges - slides
 
Interaction Design (IxD) in the context of User Experience (UX)
Interaction Design (IxD) in the context of User Experience (UX)Interaction Design (IxD) in the context of User Experience (UX)
Interaction Design (IxD) in the context of User Experience (UX)
 
Intelligent decision support systems a framework
Intelligent decision support systems  a frameworkIntelligent decision support systems  a framework
Intelligent decision support systems a framework
 
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
 
Session ID1 Lecture 1 -What is Interaction Design
Session ID1 Lecture 1 -What is Interaction DesignSession ID1 Lecture 1 -What is Interaction Design
Session ID1 Lecture 1 -What is Interaction Design
 
Deck 92-146 (3)
Deck 92-146 (3)Deck 92-146 (3)
Deck 92-146 (3)
 
Recipe for an Usable System!
Recipe for an Usable System!Recipe for an Usable System!
Recipe for an Usable System!
 
Automated UI & UX Framework
Automated UI & UX FrameworkAutomated UI & UX Framework
Automated UI & UX Framework
 
Code for science (rev 1)
Code for science (rev 1) Code for science (rev 1)
Code for science (rev 1)
 
The Human Feedback Loop - World Usability Day 2012
The Human Feedback Loop - World Usability Day 2012The Human Feedback Loop - World Usability Day 2012
The Human Feedback Loop - World Usability Day 2012
 
Toward a socio-technical pattern language
Toward a socio-technical pattern languageToward a socio-technical pattern language
Toward a socio-technical pattern language
 
Building Compassionate Conversational Systems
Building Compassionate Conversational SystemsBuilding Compassionate Conversational Systems
Building Compassionate Conversational Systems
 
Structured Dialogic Design
Structured  Dialogic  DesignStructured  Dialogic  Design
Structured Dialogic Design
 
Introduction to Interaction Design.pptx
Introduction to Interaction Design.pptxIntroduction to Interaction Design.pptx
Introduction to Interaction Design.pptx
 
Design Inclusively
Design InclusivelyDesign Inclusively
Design Inclusively
 
Information Systems
Information SystemsInformation Systems
Information Systems
 
Using user centered design from a gender perspective. in3
Using user centered design from a gender perspective. in3Using user centered design from a gender perspective. in3
Using user centered design from a gender perspective. in3
 
Introducing Treesaver
Introducing TreesaverIntroducing Treesaver
Introducing Treesaver
 
Designing for People: Communicating Effectively with Interaction
Designing for People: Communicating Effectively with InteractionDesigning for People: Communicating Effectively with Interaction
Designing for People: Communicating Effectively with Interaction
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Health Everyware: Let Data Scream

  • 1. Health Everyware Making Mobile Beautiful HIMSS Celltop Design Workgroup Janey Barnes Scott Lind Eric Miller Bruce Sklar Juhan Sonin, juhan@mit.edu HIMSS Coordinators Edna Boone Juanita Threat 22.Jun.10 Content in this presentation (unless otherwise noted) is licensed under a Creative Commons Attribution 3.0 License
  • 2. We need a simple set of design best practices that … takes a system approach to design …. accelerates good software behavior and interface design pattern adoption Guidelines will cover: interaction and behavior models, graphic design (including layout, grid, color palette, type and naming conventions), information architecture, technical implementation
  • 3. MOBILE DESIGN TENETS Let data scream Only handle information once Grid it Type less + less type Color carefully Date your users Speak my sign What interface? Repeat customers ROCK Get physical Lust to dust
  • 4. MOBILE DESIGN TENETS Let data scream Only handle information once Grid it Type less + less type Color carefully Date your users Speak my sign What interface? Repeat customers ROCK Get physical Lust to dust
  • 7.
  • 8.
  • 9.
  • 10. and the Problem is… Increasingly complex systems Tool and Methodology gap Decision makers are swamped with conflicting data Our work is increasingly multi-dimensional (not a flat-decision space) Artifacts driving decisions need to be coordinated, presented Minimal transparency into key health metrics
  • 11. How do I (as a patient, nurse, doctor, proxy)make quicker, more accurate decisions?
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Ink and lines scream Data disappears Violates all 5 Tufte principles 5 principles produce substantial changes in graphical design: Above all else, show the data. Maximize the data-ink ratio (i.e., the % of ink that shows data) Erase non-data ink. Erase redundant data-ink. Review and edit.
  • 19.
  • 20.
  • 21.
  • 22. Unreadable Grid >> Data Data as Interface… NOT
  • 23.
  • 24.
  • 25.
  • 26. 38%
  • 27. Priorities, hierarchy Filtering Navigating … … … Patient data 1 2 last
  • 29. 70%
  • 30. 80%
  • 31. 80% of the screen space should be for data, the actual workspace
  • 32. Let data scream The data is THE story Less ink, more bang 80% rule

Editor's Notes

  1. Create a LIGHTWEIGHT celltop health services design pattern library, UI guidelines documentHarmonize the behavior, aesthetics, layout, interaction, and feel across health apps
  2. Now find the patient.Straight-forward to find.Data screams.
  3. What’s more important? The UI or the Stroke or Glascow Coma scale results?The Paint vs Data.Image from Stroke Scale app
  4. This table is from Wikipedia… and it’s more readable than an app designed just to display this information.And Wikipedia isn’t exactly known for their design… but they are known for their Design.
  5. What’s more important? The UI or the Stroke or Glascow Coma scale results?The Paint vs Data.
  6. In contrast to the previous example, the user interface takes a backseat… while the data is front and center.
  7. Grid lines, labels, UI elements are secondary… they fade into the background because they’re designed to (with smaller, lighter text compared to the data + grid lines are there to help the eye and are light grey, etc).The data pops… as well as the micro trend graph.
  8. ARDMS Ultrasound Exam app.
  9. Unreadable labels/global optionsRandomly placed buttonsGrid and labels are same visual priority as dataNo practice exam data… how about an action that allows me to take one, add one, import one. SOMETHING other than that.The data should be part of the manipulation game. Why have 4 options listed and I need to swing down another part of the UI to select one of those options? Make the options selectable.
  10. Slide credit: Brian Staats
  11. Slide credit: Brian Staats
  12. Slide credit: Brian Staats
  13. App = Tempted by Frog Design (shown here at Pop!Tech 2009)