“We believe in the freedom to tinker – to tear apart our technology, our clothes, our food, our stuff and use those raw materials to build something new and better…We insist that young students should be encouraged to do undocumented, dangerous, and weird things with their toys, tools, and electricity because they will surprise us with what they choose to invent.”
Watch it here:
Can I get an “Amen”?
At dorkbot austin (next meeting October 12th, 2006) you sure can.
Bruce Schneier has a blog post that talks about trashcan usability in terms of finding the right balance between security and ease of use: Human/Bear Security Trade-Off
From the blog post, ending with one of the best quotes ever:
Back in the 1980s, Yosemite National Park was having a serious problem with bears: They would wander into campgrounds and break into the garbage bins. This put both bears and people at risk. So the Park Service started installing armored garbage cans that were tricky to open — you had to swing a latch, align two bits of handle, that sort of thing. But it turns out it’s actually quite tricky to get the design of these cans just right. Make it too complex and people can’t get them open to put away their garbage in the first place. Said one park ranger, “There is considerable overlap between the intelligence of the smartest bears and the dumbest tourists.”
Adam Rosen has put together a great online Vintage Mac Museum, where you can learn all about the history of our Apple hardware. Adam is very knowledgable about the history of the Macintosh, and has some great info.
This brings to mind all of the Macintoshes I’ve owned (or used for work):
(Fat) Mac 512k
Macintosh SE (with 20MB HD – woohoo!)
Mac IIx (with the Texas Instrument LISP chip in it)
Mac Classic (color)
Duo 280 (where I installed my own internal modem, the Mac equivalent of neurosurgery at the time)
NeXT slab (that counts now, doesn’t it?)
Powerbook 540 (Blackbird?)
Quadra and Performas (many different ones, all similar)
A large, Macintosh-less gap that could be called the dark ages.
And there are probably at least a few more I’m forgetting.
If I could only stay in Seattle another month, I’d certainly be attending the IDEA 2006 Conference (Information: Design, Experience, Access.) going on at the Seattle Public Library, October 23-24, 2006.
IDEA 2006 brings together a diverse set of designers, creators, and researchers addressing a fundamental challenge we’re facing today – how to let everyday people take true advantage of the overwhelming mass of information that floods their lives.
There are currently many different kinds of folks working in this space, but they typically don’t talk with one another. For this event, we’ve made an effort to invite presenters across a stunning array of disciplines – museum design, information visualization, librarians, environmental design, user research, engineering, interaction design, product strategy, and more.
It’s important to recognize that this is not airy-fairy theoretical stuff. These presenters are practitioners, people actually doing this cross-channel, cross-media work with complex information. A primary goal of this conference is to give you the confidence to cross boundaries and engage with a wide range of problems.
So if you want to find out where the world of design and information is heading, and how you can prepare, come join us October 23-24 in Seattle.
People are now using the World Wide Web (Web) to seek, gather, and share information in increasingly complex ways. In order to develop the next generation of Web information systems, we must have an understanding of people’s goals, their context, and their situational aspects. These aspects are difficult, if not impossible, to investigate in laboratory settings. Therefore, researchers must turn to naturalistic studies involving large number of users who may be separated geographically. In these settings, many researchers require logs of user behaviour on the Web to study the interactions of Web users, both with respect to general behaviour and in order to develop and evaluate new tools and techniques. Traces of Web activity are used for a wide variety of research and commercial purposes including user interface usability and evaluations of user behaviour and patterns on the Web. Unfortunately, current tools and processes do not support consistent and detailed studies using logs of user behaviour. As such, there is a duplication of effort, which hampers progress in the field.
Relevant research themes include, but are not limited to:
Methodologies for data collection (client-side, server-side, proxy-based)
Collection of browser data (e.g. events, bookmarks, history, and caches)
Collection of data from users across different browsers
AJAX-compatible logging systems
Using mixed data sources for data validation
Cleaning Web data
Web data warehousing
Using Web data for proactive user functionality
Methods for matching user behaviour to task models
Qualitative annotation of Web data
Submissions should be full length articles. All submissions will be peer reviewed and should describe original research that is not under consideration in any other forum. Please follow the formatting guidelines of the journal. Submissions should be emailed to firstname.lastname@example.org in PDF format. All questions regarding submissions should be directed to Melanie Kellar (email@example.com).
Submission Deadline: January 8, 2007
Reviews Due: February 8, 2007
Notification to Authors: February 19, 2007
Final Papers Due: March 19, 2007