The document summarizes user testing conducted on a website called Jameson1780. There were three key findings:
1. The onboarding process was confusing for most users, especially connecting with Facebook which raised privacy and permission concerns.
2. Users wanted to easily share compelling content from the game to their social networks.
3. Navigation between clues was difficult and frustrating for many users.
The document outlines plans to address these issues, such as clarifying the Facebook connection, streamlining permissions, and improving navigation between clues.
Some Dos and Don’ts in UI/UX Design of Mobile ApplicationsAshiq Uz Zoha
This slide is about some good practices and don'ts of UX design in Mobile Applications. This was presented by the author as an invited talk in "Workshop on Mobile Computing & Human Computer Interaction" under HEQEP subproject CP : 2080 , at Dept of CSE , BUET.
Some Dos and Don’ts in UI/UX Design of Mobile ApplicationsAshiq Uz Zoha
This slide is about some good practices and don'ts of UX design in Mobile Applications. This was presented by the author as an invited talk in "Workshop on Mobile Computing & Human Computer Interaction" under HEQEP subproject CP : 2080 , at Dept of CSE , BUET.
Intro + Examples
Human Interface Principles
Platform Characteristics
UX Guidelines
This presentation has been developed in the context of the Mobile Applications Development course, DISIM, University of L'Aquila (Italy), Spring 2014.
http://www.ivanomalavolta.com
A short intro to user experience design, meant for beginners & enthusiast to UX field. Presented at first UXiD (uxid.org) Jogja Meetup on 16 March 2018.
UX design is not a step in the process, it's in everything we do. More than anything it is a project philosophy, not just a set of tools, methods and deliverables.
In this presentation we explain how you can differentiate through design, why user experience design matters as well as share our knowledge around all the activities that helps ensure a great UX/UI design.
In the modern day when people develop hundreds of software applications, websites or mobile apps the term UX (User Experience) is getting more and more significant, particularly in the IT industry.
In the world of tech capitals, a discussion about the great UX of a product, or the poor UI of a website is a common conversations we’ve all overheard. But what is exactly the difference between UI & UX design? Find out more in this presentation.
Diagrams, pictures and graphics in the slides are not mine unless stated otherwise. Please do not distribute without permission.
Here's a deck I put together for our weekly learning seminar at Verbal+Visual.
Special thanks for General Assembly, my instructors Luke Miller, Rashida White, and Nevan Scott.
http://www.verbalplusvisual.com/interaction-design-rapid-prototyping/
Product Design and UX / UI Design Process in Digital Product DevelopmentVolodymyr Melnyk
Presentation about product design and its role in digital product development, UI / UX design process and methodologies, examples of their applications.
The EO NERVE was the annual conference of EO including 1150 members from Albany, Atlanta, Boston, Birmingham, Charlotte, Connecticut, DC, Tennessee, Jacksonville, New Jersey, Nashville, New York, Raleigh Durham, Philadelphia, South Florida, Tampa, Southeast Virginia, and Western New York. Each member represents at least one multi-million dollar business.
Intro + Examples
Human Interface Principles
Platform Characteristics
UX Guidelines
This presentation has been developed in the context of the Mobile Applications Development course, DISIM, University of L'Aquila (Italy), Spring 2014.
http://www.ivanomalavolta.com
A short intro to user experience design, meant for beginners & enthusiast to UX field. Presented at first UXiD (uxid.org) Jogja Meetup on 16 March 2018.
UX design is not a step in the process, it's in everything we do. More than anything it is a project philosophy, not just a set of tools, methods and deliverables.
In this presentation we explain how you can differentiate through design, why user experience design matters as well as share our knowledge around all the activities that helps ensure a great UX/UI design.
In the modern day when people develop hundreds of software applications, websites or mobile apps the term UX (User Experience) is getting more and more significant, particularly in the IT industry.
In the world of tech capitals, a discussion about the great UX of a product, or the poor UI of a website is a common conversations we’ve all overheard. But what is exactly the difference between UI & UX design? Find out more in this presentation.
Diagrams, pictures and graphics in the slides are not mine unless stated otherwise. Please do not distribute without permission.
Here's a deck I put together for our weekly learning seminar at Verbal+Visual.
Special thanks for General Assembly, my instructors Luke Miller, Rashida White, and Nevan Scott.
http://www.verbalplusvisual.com/interaction-design-rapid-prototyping/
Product Design and UX / UI Design Process in Digital Product DevelopmentVolodymyr Melnyk
Presentation about product design and its role in digital product development, UI / UX design process and methodologies, examples of their applications.
The EO NERVE was the annual conference of EO including 1150 members from Albany, Atlanta, Boston, Birmingham, Charlotte, Connecticut, DC, Tennessee, Jacksonville, New Jersey, Nashville, New York, Raleigh Durham, Philadelphia, South Florida, Tampa, Southeast Virginia, and Western New York. Each member represents at least one multi-million dollar business.
A "mini user case study" was conducted in April 2020 to explore the question, "What’s needed to be attracted to a virtual world and to stay there afterwards?" The results are relevant to virtual presence platform providers moving products from beta through production to broad commercialization, and to their prospective platform users.
This is a presentation for my final year project at the Unicaf university. it was a description more about a social networking site where users in a society get to communicate to each other online using their smartphones or laptops
Bringing the Audience Back to NASA, Brian Dunbar / Forum One Communications W...Forum One
Brian Dunbar , the Internet Services Manager of NASA, tells the story of the audience research and usability studies that moved the NASA web site from a series of links with internal names, to a site with different ways to interact that keep audiences entertained and looking for more at Forum One's Web Executive Seminar, "Thanks, Come Again: Audience- Centric, User Experience" on November 5, 2009. To learn more about this event, visit http://www.forumone.com/thanks.
Increase mobile engagement by turning users’ feedback into solutionsNearsoft
In this webinar you will learn how to integrate information from google analytics with UX practices. This way you can learn more from your users and how they interact with your product. This will help you make data driven-decisions when developing your product.
RFID Journal Live! 2014 Charles Colby - User-centered DesignValtech Canada
RFID can solve problems and create unique user experiences, but a strong understanding of the user and their needs is important to assure the application brings value. The solution w.illi.am/ developed for the Infopresse OFF2013 conference was an ecosystem consisting of NFC bracelets, NFC enabled kiosks, a responsive web application and social media integration. This presentation describes how a user-centered design process can be applied to designing online/offline experiences, how our solution solved real problems for conference attendees and the learnings that the w.illi.am/ team took away from this successful project.
The visual design of surveys and other types of online data collection tools impacts how users perceive, understand and navigate the instrument as well as the responses they provide. Two key considerations that impact how users experience online data collection tools are the device they are using (e.g., smartphone, tablet, computer) and the method of interaction (e.g., website, app or both). When designing online data collection tools, creating a common user experience across different devices and methods of interaction is important to create a consistent user experience and to minimize measurement differences.
In this talk, we will compare the user experience across four different combinations of device and method of interaction of a survey: (1) desktop PC-website, (2) smartphone-app, (3) tablet-app, and (4) tablet-website. Through performance and eye-tracking data, we identify UX elements that must be unified across all devices as well as elements that might need customization for difference devices or methods of interaction.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Jameson - ux report
1. JAMESON 1780 USER EXPERIENCE UPDATES
UX/UI Documentation prepared by Chris Znerold
2. JAMESON 1780 USER EXPERIENCE UPDATES
Introduction
USER TESTING RECAP KEY FINDINGS
On February 13th and 14th, nineteen user testing recruits took part in a usability screening in which There are 3 areas of the site that were identified as being the most actionable in terms of timing and impact:
they were asked to navigate through the Jameson1780 website.
ONBOARDING:
The onboarding experience was the primary pain point for the majority users tested. Most of this dealt with the need to
Users were asked to complete a survey before they began using the site as well as a survey after they were
connect with Facebook. Users had concerns about why they needed to use their Facebook account to play the game; what
finished. This survey data was digitized and included in the internal review process that established
information the game would access and how they would use it; and whether or not the game would post to their newsfeed
detailed recommendations for how to best improve the user experience.
without their knowledge. Additionally, the Facebook plugin that was implemented to connect to Facebook allowed for
user edge cases to develop due to it’s ability to selectively remove permissions, or skip them altogether. In addition to the
In addition to the survey data, each user's screen activity and webcam were recorded in order to capture
problems that connecting with Facebook created, another issue was the time it took many users to go from entering the
the areas in which they were struggling to progress through the experience. These recordings, along with
site to finding the first clue. Many were lost or confused, and zoomed in and out of the map or scrolled around looking
an a/v recording of the test facilities and moderation instructions were also compiled and included as a
for hints as to what to do next.
part of the internal review process.
VIRALITY:
Finally, detailed observations gathered from the moderator about each user's activity and experience on
Each character, clue, and location garnered a different level of emotional response for each user. Many had strong visceral
the site was digitized and recapped internally with the EVB team, and helped guide the direction of
reactions to a particular video clue, and expressed a desire to share an individual scene to Facebook before reaching the
recommended changes to the site. The internal review process involved finding commonalities among
end of the game. Given the opportunity, many users would have actively pushed the content that interested them most to
the user group with regard to where they struggled, as well as where they succeeded, in navigating the site
their social audience.
and solving the quandary.
NAVIGATION:
At the end of the internal review, three areas of concern were identified and potential solutions to
While some users quickly picked up on the mechanics behind moving from one clue to the next in a quick and efficient
address these concerns were vetted by the creative, user experience, and technical teams to ensure that
manner, most had hangups that prevented them from having a cohesive narrative experience. Many users clicked the
any proposed changes fell in line with the brand ethos, programmatical feasibility, and usability
trunk to view the clue after each video in order to confirm what the had seen. Others would go back and watch a video
objectives set forth in the initial test plan.
twice in order to be absolutely sure of the clue. Almost all users would spend time looking around the map for what they
were supposed to click on next after watching a video. Some users would find it more quickly than others, but they all
USER EXPERIENCE STATISTICS TO CONSIDER:
expressed frustration at the time it took to move from one clue to the next. In addition to the difficulty in navigating
4/19 Users didn’t sign in with Facebook.
between clues, users who entered the site without their Facebook account had no motivation or messaging from the site
9/13 Users didn’t share their experience with Facebook
to course correct and re-sign into Facebook to complete the experience.
13/15 Users who signed in with Facebook successfully completed the game.
JAMESON 1700 USER EXPERIENCE UPDATES Prepared by Chris Znerold 2/9
3. JAMESON 1780 USER EXPERIENCE UPDATES
Application Landing Screen
APPLICATION LANDING SCREEN
ONBOARDING
In order to help users understand why we need to access their Facebook account in order to let them play the game,
we plan to update the age-gate landing page to include a graphical component that helps users see at a glance the
advantages to signing in with Facebook. Additionally, we plan to make it more clear to users that if they don’t sign
in with Facebook, they are only able to participate in a preview of the game and can’t actually play. Finally, we plan
to integrate a privacy component that explicitly states that the app won’t post to a users Facebook account without
permission or store any of their information.
JAMESON 1700 USER EXPERIENCE UPDATES Prepared by Chris Znerold 3/9
4. JAMESON 1780 USER EXPERIENCE UPDATES
Facebook Permissions Dialog
FACEBOOK PERMISSIONS DIALOG
ONBOARDING
In its current iteration the Facebook Dialog box requires three clicks in order to accept permissions, and allows
users to selectively opt-out or skip them entirely while still entering the site. In order to expedite the onboarding
experience the permissions user flow will be shortened to include just one screen that requires a single click and
cannot be selectively disallowed or skipped.
JAMESON 1700 USER EXPERIENCE UPDATES Prepared by Chris Znerold 4/9
5. JAMESON 1780 USER EXPERIENCE UPDATES
Suspect Preview Dialog
SUSPECT PREVIEW DIALOG
ONBOARDING
In its current iteration the Facebook Dialog box requires three clicks in order to accept permissions, and allows
users to selectively opt-out or skip them entirely while still entering the site. In order to expedite the onboarding
experience the permissions user flow will be shortened to include just one screen that requires a single click and
cannot be selectively disallowed or skipped.
JAMESON 1700 USER EXPERIENCE UPDATES Prepared by Chris Znerold 5/9
6. JAMESON 1780 USER EXPERIENCE UPDATES
Video Clue End Card
VIDEO CLUE END CARD
NAVIGATION
In order to eliminate the difficulties that users had in advancing between video clues, the end of each clue will now
include an end card that enables users to advance directly to the next level without having to navigate or interact
with the map. After selecting this option, users are shown the map view and the next Dubliner they are supposed to
visit will begin loading automatically. In addition to auto-advancing to the next clue, users also have the option to
either share the clue to Facebook or replay the video.
SHARING CLUES TO FACEBOOK
VIRALITY
At the end of each level, users will have the option to share the clue they just received to their Facebook news feed.
Each post will include an image of the Dubliner they met with, along with a dynamic text description that includes
the contents of the clue itself and a link to play the game.
JAMESON 1700 USER EXPERIENCE UPDATES Prepared by Chris Znerold 6/9
7. JAMESON 1780 USER EXPERIENCE UPDATES
Game Complete End Card
GAME COMPLETE END CARD
VIRALITY, NAVIGATION
After a user has successfully guessed the culprit, they will be shown an end card that allows them to share the
confession letter to Facebook, replay the game, or browse the map.
JAMESON 1700 USER EXPERIENCE UPDATES Prepared by Chris Znerold 7/9
8. JAMESON 1780 USER EXPERIENCE UPDATES
Map Browse Mode
MAP BROWSE MODE
NAVIGATION
At the end of the game a user can choose to enter a mode where they can pan, zoom, and interact with the map
and its included components. Users can replay the video clues, watch the TVC ads, or choose to restart the game
with an alternate culprit.
JAMESON 1700 USER EXPERIENCE UPDATES Prepared by Chris Znerold 8/9
9. JAMESON 1780 USER EXPERIENCE UPDATES
Non Facebok User Dialog
NON FACEBOOK USER DIALOG
NAVIGATION
Upon entering the application, and after each subsequent video clue watched, users who have not yet signed in
with Facebook will be prompted to sign in to actually play the game. They will also be given an option to continue
the game in preview mode, but are strongly encouraged after every point ofinteraction to sign in with Facebook and
start playing.
JAMESON 1700 USER EXPERIENCE UPDATES Prepared by Chris Znerold 9/9