Wir wollen mithelfen, dass die Welt von morgen ein kleines bisschen benutzbarer wird. Dazu legen wir auf UXcite unsere Erfahrungen aus dem Bereich User Experience dar und hoffen darauf jede Menge Gleichgesinnte zum Austausch zu finden.
With all the skepticism of whether it's just a social media fad and questions about how the company expects to generate revenue, Twitter has left many critics silent by continuing to grow.
This document provides an in-depth look at the process used in trying to solve real issues with the User Experience of a social bookmarking application. While it might be easy to simply take the first solution that works and assume that it’s the best solution, the first solution is very rarely the best solution. We found several solutions to several problems, and many of them worked and appeared to be decent solutions. It was only upon further investigation and doing more detailed research that we found hidden flaws in some solutions, issues with user satisfaction in other solutions, and even found some solutions that broke entirely under certain conditions.
This paper will describe the problems we faced in detail and then provide an explanation of the solutions evaluated for each problem, including the benefits and drawbacks of each solution. We will also identify the final solution chosen and why it was chosen.
Hi! If you think I add value to your network, do drop me a recommendation at http://mrtweet.net/jomiralb?gr Much appreciated! [from http://twitter.com/jomiralb/statuses/1218488446]
This page has been created to provide organisations and individuals using the OECD Privacy Statement Generator with information about international instruments and national regulations which apply to the ...
The User Interface Design group studies new user interface techniques, focusing on two areas:
* Usable automation. Our goal is for every computer user to be able to harness the power of automation for handling repetitive, time-wasting, or error-prone tasks, without having to struggle with the complexity of programming.
* Usable security. Effective security depends on good user interfaces. A door may have the strongest lock in the world, but if authorized users can't open and close it easily, and have to leave it open in order to get their jobs done, then it has no security at all. We are studying ways to rethink computer security so that it is not only secure against attack but also usable by ordinary people.
Two-way latent grouping model for user preference prediction
Eerika Savia, Kai Puolamäki, Janne Sinkkonen and Samuel Kaski
In: UAI 2005, 26-29 July 2005, Edinburgh, Scotland.
A question I hear pretty frequently is, “Why a redesign of the admin panel so soon after 2.5?” Those who have attended WordCamps in the past few months have already heard the answer, but for the people who haven’t had that opportunity, this post is for you.
When the community response to the 2.5 admin [...]
So to map your files with user id 1001 in /mnt/wrong to /mnt/correct with user id 1234, run this command:
sudo bindfs --map=1001/1234 /mnt/wrong /mnt/correct
This paper deals with how to calculate semantic similarity between user profiles. They want to find for example similar users, which share common interests.
In order to remove potential obstacles to personal data flows and to ensure a high level of protection within the EU, data protection legislation has been harmonised. The Commission also engages in dialogues with non-EU countries.
The Nielsen Company: Hamburg (ots) - Wann auch immer in den letzten Monaten plötzliche Ereignisse die mediale Berichterstattung dominierten: Die Nutzer des Microblogging-Dienstes Twitter ware
The Java User Groups Community aims to be the meeting point for JUGs, in order to create a better interaction among the groups, expanding and strengthening the Java movement worldwide.
Here, in the JUGs Community page, JUG leaders and JUG members can come to share information about creating, joining and running a JUG, and to work together in tools, projects and discussions that are important for the worldwide Java community.
As a community of JUGs, projects submitted to this community must represent groups of users, that focus primarily in Java and Java-related technologies. Each JUG project can have their own technical sub-projects.