A question I hear pretty frequently is, “Why a redesign of the admin panel so soon after 2.5?” Those who have attended WordCamps in the past few months have already heard the answer, but for the people who haven’t had that opportunity, this post is for you.
When the community response to the 2.5 admin [...]
This page has been created to provide organisations and individuals using the OECD Privacy Statement Generator with information about international instruments and national regulations which apply to the ...
The User Interface Design group studies new user interface techniques, focusing on two areas:
* Usable automation. Our goal is for every computer user to be able to harness the power of automation for handling repetitive, time-wasting, or error-prone tasks, without having to struggle with the complexity of programming.
* Usable security. Effective security depends on good user interfaces. A door may have the strongest lock in the world, but if authorized users can't open and close it easily, and have to leave it open in order to get their jobs done, then it has no security at all. We are studying ways to rethink computer security so that it is not only secure against attack but also usable by ordinary people.
Two-way latent grouping model for user preference prediction
Eerika Savia, Kai Puolamäki, Janne Sinkkonen and Samuel Kaski
In: UAI 2005, 26-29 July 2005, Edinburgh, Scotland.
With all the skepticism of whether it's just a social media fad and questions about how the company expects to generate revenue, Twitter has left many critics silent by continuing to grow.
This document provides an in-depth look at the process used in trying to solve real issues with the User Experience of a social bookmarking application. While it might be easy to simply take the first solution that works and assume that it’s the best solution, the first solution is very rarely the best solution. We found several solutions to several problems, and many of them worked and appeared to be decent solutions. It was only upon further investigation and doing more detailed research that we found hidden flaws in some solutions, issues with user satisfaction in other solutions, and even found some solutions that broke entirely under certain conditions.
This paper will describe the problems we faced in detail and then provide an explanation of the solutions evaluated for each problem, including the benefits and drawbacks of each solution. We will also identify the final solution chosen and why it was chosen.
Hi! If you think I add value to your network, do drop me a recommendation at http://mrtweet.net/jomiralb?gr Much appreciated! [from http://twitter.com/jomiralb/statuses/1218488446]
Wir wollen mithelfen, dass die Welt von morgen ein kleines bisschen benutzbarer wird. Dazu legen wir auf UXcite unsere Erfahrungen aus dem Bereich User Experience dar und hoffen darauf jede Menge Gleichgesinnte zum Austausch zu finden.
So to map your files with user id 1001 in /mnt/wrong to /mnt/correct with user id 1234, run this command:
sudo bindfs --map=1001/1234 /mnt/wrong /mnt/correct
Berlin, 25. März 2015 - 6 von 10 Bundesbürgern ab 14 Jahren (63 Prozent) nutzen ein Smartphone, das sind 44 Millionen Menschen. Das hat eine Umfrage im Auftrag des Digitalverbands BITKOM ergebe
F. Mitzlaff, M. Atzmueller, G. Stumme, and A. Hotho. Complex Networks IV, volume 476 of Studies in Computational Intelligence, Springer Verlag, Heidelberg, Germany, (2013)
R. Kern, C. Korner, and M. Strohmaier. Research and Advanced Technology for Digital Libraries, volume 6273 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2010)
M. Manca, L. Boratto, and S. Carta. Intelligent Systems in Science and Information 2014, volume 591 of Studies in Computational Intelligence, Springer International Publishing, (2015)
F. Daniel, F. Casati, S. Soi, J. Fox, D. Zancarli, and M. Shan. Proceedings of the 7th International Joint Conference on Service-Oriented Computing, page 647--648. Berlin, Heidelberg, Springer-Verlag, (2009)
T. Nestler, L. Dannecker, and A. Pursche. Service-Oriented Computing. ICSOC/ServiceWave 2009 Workshops, volume 6275 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2010)
F. Daniel, F. Casati, B. Benatallah, and M. Shan. Proceedings of the 28th International Conference on Conceptual Modeling, page 428--443. Berlin, Heidelberg, Springer-Verlag, (2009)