The document discusses how human behavior and decision making can be influenced in subtle ways. It explores how the environment, objects, and other people can prime our irrational tendencies and unconscious biases. As designers, acknowledging and understanding these behavioral influences gives an opportunity to design persuasively and encourage positive behaviors.
This document appears to be a slide presentation about influencing others' thinking and decision making. It discusses directing others' thinking by getting them to agree with your ideas. It provides examples of asking different types of questions to understand situations from different perspectives. It also discusses guiding others through the buyer's journey and decision process, helping them generate options and make a choice. The presentation aims to provide strategies for overcoming resistance, challenging constraints, and connecting with others' objectives to influence their thinking.
The document summarizes a presentation about increasing positive intelligence (PQ) at work. PQ involves shifting one's thinking from "saboteurs" like the judge, victim, and avoider, to a "sage" perspective of curiosity, empathy, innovation, purpose, and calm action. The presentation discusses research linking high PQ to sales performance and strategies for strengthening PQ, like identifying saboteurs and using "PQ reps" to weaken them. It also outlines "PQ powers" like empathizing and navigating with purpose, and principles for activating the PQ brain in buyers. The presentation aims to help people master the science of persuasion through developing higher PQ.
SEO & Social Media Mind Control - Harness the Power of PersuasionBen Cook
Social media and search engine optimization are becoming more and more entwined which makes understanding and harnessing the principles of influence and persuasion even more important.
The Art Of Persuasion In The New Content Marketing WorldDarren Guarnaccia
This deck is a short presentation I did at Inbound Marketing Summit, about how your website can still be a persuasive marketing too, and how to incorporate Content Marketing tactics into your website.
This document provides information about a course on harnessing the power of persuasion taught by Harrison Monarth, a New York Times bestselling author and head coach. The course teaches students how to establish rapport with different audience types, increase persuasive abilities using a 7-part model, select techniques to structure messages effectively, and learn new tools to communicate with more impact.
Letter of Appreciation from Tanohata VillageNAF Misawa
The mayor and speaker of Tanohata village express their gratitude to the recipient for their contributions to rebuilding efforts after the 2011 earthquake and tsunami. Citizens who lived in shelters for over 100 days are now in temporary housing and starting new lives with hope for recovery. The village is pushing forward with a revival plan to create a new village and wishes for continued support in Tanohata's revival.
The science of influence and persuasion cscm presentation october 4, 2014Ray Williams
This Powerpoint presentation provides details of the Science of Influence and Persuasion presented at the CSMC National Conference, Banff, October 4, 2014
SGCI Science Gateways: Harnessing Big Data and Open Data 03-19-2017Sandra Gesing
The importance of Big Data and Open Data to achieve scientific advancements in precision medicine is beyond doubt and evident in many different projects and initiatives such as the Precision Medicine Initiative (All of Us), ICTBioMed, NCIP Hub, 100K Genomics England Project, NIH Cancer Moonshot, and the Million Veterans Program. In April 2013, McKinsey & Company proclaimed that Big Data has the ability to revolutionize pharmaceutical research and development within clinical environments, by using data for better informed decision making and targeting the diverse user roles including physicians, consumers, insurers, and regulators. Companies from a wide spectrum such as Oracle Health Sciences, Google, and Data4Cure build solutions that help address efficient and secure data sharing with the patient or clinician in mind. Open data can be maintained and shared by patient communities such as PatientsLikeMe.com and build an invaluable resource for further data mining.
Even with all these advances there are still challenges to address including a recent Precision Medicine World Conference announcement in November 2016: “We are missing easy-to-use solutions to share patient data.” Science gateways are a solution to fill the gap and help form by definition end-to-end solutions – web-based, mobile or desktop applications - that provide intuitive access to advanced resources and allow researchers to focus on tackling today’s challenging science questions. Science Gateways abstract the complex underlying computing and data infrastructure as far as feasible and desired by the stakeholder and can be tailored to different target groups with diverse backgrounds, demands, and technical knowledge.
Science Gateways have existed for over a decade and a wide variety of frameworks and APIs have been developed to support the efficient creation of science gateways and ease the implementation of connections to Cloud infrastructures and distributed data on a large scale. The importance of science gateways has been recognized by NSF by funding the creation of a Science Gateways Community Institute (SGCI) to serve the community with free resources, services, experts, and ideas for creating and sustaining science gateways. To achieve this goal, the SGCI serves the community with five areas that have diverse foci and which also closely interact: Incubator, Extended Developer Support, Scientific Software Collaborative, Community Engagement and Exchange and Workforce Development.
The Institute is technology-agnostic and serves the community by offering a wide variety of services and using technologies that are the best fitting solution for the use case. Gateways allow for precision medicine to be more efficiently developed or adapted by lowering the barriers to data sharing and Big Data analysis.
The document discusses six principles of persuasion: liking, reciprocity, social proof, consistency, authority, and scarcity. It provides examples for each principle and discusses how to apply them, such as developing genuine similarities with others to encourage liking, establishing expertise to build authority, and using exclusive information to create scarcity. The overall document examines ways to harness the science of persuasion through understanding and applying these six key principles.
Persuasion is the art of bringing people along our way of thinking. It the ability to make other people understand your point of view either for you to help them or to get help from them.
Persuasive Communication is the ultimate source of advantage in balancing Work and Life. It all about getting people to do something they would not ordinarily do if they are not being asked to do
This document discusses influence, empowerment, and politics in organizations. It covers several topics:
1. Types of influence tactics including soft tactics like rational persuasion and hard tactics like pressure. It also discusses outcomes of influence like commitment, compliance, and resistance.
2. Sources of power in organizations including position power, personal power, and different bases of social power.
3. Empowerment and how sharing power with employees can increase their motivation and potential. Several models of empowerment are presented.
4. Organizational politics and how uncertainty can cause political behavior. Different levels of political action and types of political tactics are discussed.
A precis is a condensed summary of a document that is approximately 1/3 the length of the original. It involves carefully reading the document to understand the main topic and key details, then rewriting it in your own words in a clear, succinct manner using indirect speech. The precis should have a title, include all essential information, and be a cohesive whole while omitting unnecessary examples, illustrations, or repetitions. Writing a precis is a valuable exercise that teaches concentration, understanding a document's most important ideas, and expressing ones thoughts concisely.
This document discusses the necessary art of persuasion. It defines persuasion as the action or process of persuading someone or being persuaded to do or believe something. It is not devious or manipulative in nature. The document outlines the need for persuasion in organizations as work cultures have shifted from "which work should I do" to "why should I do it?". It provides the key elements of persuasion such as establishing credibility, framing common ground, providing evidence, and creating an emotional connect with the audience. Examples are given of how persuasion has been effectively used through credibility, logic, and negotiating benefits. The document concludes that persuasion is an art that can help drive change if used effectively but must be handled
GSoC: How to get prepared and write a good proposal (or how to start contribu...João Paulo Rechi Vita
This document discusses how to get involved with open source projects and prepare a strong proposal for Google Summer of Code (GSoC). It recommends choosing a project you like, learning about the project's codebase, community, documentation and processes. Getting involved early by answering questions, reviewing code and discussing ideas can help you strengthen your application. Starting the proposal early and getting feedback is also advised.
Order, Acknowledgement and Delay in Order LetterRosalie Deña
Here are the answers:
1. Acknowledgment Letter
2. Assurance of the availability
3. Appreciation
4. Delay in Order Delivery Letter
5. Reasons why
6. Order Letter
7. Cash on Delivery
8. Mode of delivery
9. Quality, quantity, color, brand, shape, dimensions, price
10. Yes, we need to include the place and date of shipment/delivery. This is important information for both parties to know when and where the order will be delivered.
A Business Guide to Visual CommunicationColumn Five
As humans, we are biologically wired to process the world visually. We understand images instantly—long before we learn the language to describe them. That is why visual communication is the most powerful medium for transferring volumes of information. In a world of exponential information growth, we crave content that is efficient, engaging and easy to synthesize. Thus,communication as a whole, both in media and the enterprise, is becoming increasingly visual. But successful content is not simply created from words and pictures thrown together. It is crafted with intent, understanding and a solid framework. This guide will show you why visual communication works—and how to make it work for you.
Summary of the Persuasive Technology 2009 conference, presented at the Mini-UPA (Boston UPA chapter) conference on May 26, 2009 by Carolyn Snyder, PT 09 attendee.
Jess Mitchell discusses inclusive design, which considers the full diversity of humanity in design. Inclusive design results in better experiences for everyone. Mitchell acknowledges the traditional lands they are on and reflects on the need to reconcile past injustices. Complex problems require design thinking and inclusive design thinking to create solutions that work for more people and address existing gaps. Inclusive design recognizes diversity, uses an inclusive process, and aims to have broader beneficial impact. It challenges assumptions and designs for the edges to benefit the majority.
Why Design Thinking is Important for Innovation? - Favarin Vitillo - ViewConf...Simone Favarin
Design is a way of thinking, of determining people's true, underlying needs, and then delivering products and services that help them. This is the starting about Design. The meaning of the concept.
VR is a new technology that is entering in many industrial and creative processes: nowadays many company and people are experimenting with VR, because it opens new possibilities and it allows costs and time reduction. It is important to understand what is the current status of the technology, the future projections and especially its applications.
concludes by emphasizing the importance of including the disability community in the design process and imagining people of all abilities as citizens, customers, and experts on their own experiences.
This document is Kees Overbeeke's inaugural lecture as a professor at Technische Universiteit Eindhoven on October 26, 2007. The lecture discusses Overbeeke's beliefs that have guided his research group, the Designing Quality in Interaction Group, in designing for human perceptual-motor, emotional, cognitive, and social skills. Some key projects from the group include interactive lamps that respond to touch. Overbeeke argues that meaning emerges from action and embodiment rather than rational thought alone. The goal of the department is to design intelligent systems, products, and services that adapt based on user needs. Overbeeke's research group sits at the intersection of professional design practice and academic research.
This document summarizes key points from a talk on innovation in the pharmaceutical industry. It discusses the origins of innovation and how individuals and teams can foster innovation. Some of the main ideas presented include embracing reality while allowing excitement, creating an unusual primary task, and establishing a "micro-culture" through structured steps of invitation, relationship building, safety, and future-oriented activities to drive creative thinking outside normal routines. Unreasonable requests and exercises that disrupt routines can help spark breakthrough ideas. Advance preparation, enrollment of sponsors, and facilitation of a level playing field are also emphasized.
How Long Should Your Personal Essay Be. Online assignment writing service.Nicole Charles
The document discusses the steps to get writing help from HelpWriting.net. It involves creating an account, completing an order form providing instructions and deadline, and choosing a writer to complete the assignment. The platform uses a bidding system where writers submit bids and clients can choose a writer. Clients can request revisions until satisfied with the final paper.
Technology as a Cultural Practice - UX AustraliaRachel Hinman
How do you design a mobile money service for people in rural Uganda who’ve never had a bank account? How do you test the usability of a mobile phone’s address book for users in rural India who’ve never had an address… yet alone an analog address book?
As cheap PCs and inexpensive mobile phones flood the global market, usability and user experience professionals will encounter more and more questions like these – questions that challenge not only our research tools and methodologies, but our fundamental assumptions about how people engage with technology. In this talk, Rachel will share insights she’s gained through creating experiences that must scale across vastly different cultures. She’ll share her thoughts on the challenges and opportunities designing for global markets will present to the user experience industry in the years to come.
This document provides an overview of the agenda and activities for Day 1 of a workshop on making social innovation work. The morning sessions introduce concepts around behavioural design and science, including how people actually make decisions compared to rational models. After lunch, participants engage in activities to disrupt typical assumptions and generate new ideas, such as considering stereotypes in education and how to challenge normal expectations. The goal is to explore how understanding human behaviour can help design products and services that better support social outcomes.
Contemporary Theories in Design Research
Master Program of Innovation and Design,Department of Industrial Design,National Taipei University of Technology
Security Is Like An Onion, That's Why It Makes You CryMichele Chubirka
Why is the security industry so full of fail? We spend millions of dollars on firewalls, IPS, IDS, DLP, professional penetration tests and assessments, vulnerability and compliance tools and at the end of the day, the weakest link is the user and his or her inability to make the right choices. It's enough to make a security engineer cry. The one thing you can depend upon in an enterprise is that many of our users, even with training, will still make the wrong choices. They still click on links they shouldn't, respond to phishing scams, open documents without thinking, post too much information on Twitter and Facebook, use their pet's name as passwords, etc'. But what if this isn't because users hate us or are too stupid? What if all our complaints about not being heard and our instructions regarding the best security practices have more to do with our failure to understand modern neuroscience and the human mind's resistance to change?
This document summarizes tools and concepts for developing cultural intelligence, including socialization, rolling the DIE exercise, mental models, the ladder of inference, and paradigm shifts. It discusses how these tools can be used to explore one's own cultural assumptions and perspectives, understand others, and communicate more effectively across cultural differences. The document concludes by defining cultural intelligence as the ability to interact appropriately with people from other cultures through developing knowledge, awareness, and skills related to cultural differences.
Pay Attention To The Man Behind The Curtain AnalysisStacey Wilson
The article addresses the issue of identity in academic writing. The author argues that identity cannot be separated from writing and is unavoidable. While academic writing is typically seen as objective and impersonal, the author believes identity influences the work in subtle ways through the writer's perspective and background. He urges teachers to help students understand that academic identity involves connecting experience and viewpoint to arguments, rather than pretending to have no identity. Teachers should encourage students to consider how the writer's identity shapes their work.
The document discusses how digital technology is impacting marketing fundamentals and human behavior. While the fundamentals of marketing like understanding human psychology remain the same, the context is changing. Three significant contextual trends are identified: 1) Increased openness enabling control as technology allows greater monitoring, 2) Friends becoming more important than family as values and causes unite people globally, and 3) The real world continuing to feed the virtual world as digital conversations are sparked by real-life events and experiences. While the digital world is significant, the real world will still be central to brand building.
Persuasion Equation The Subtle Science of Getting Your Way.docxkarlhennesey
Persuasion Equation: The Subtle Science of Getting Your Way
by Mark Rodgers
AMACOM. (c) 2015. Copying Prohibited.
Reprinted for Personal Account, Purdue University Global
[email protected]
Reprinted with permission as a subscription benefit of Skillport,
All rights reserved. Reproduction and/or distribution in whole or in part in electronic,paper or other forms
without written permission is prohibited.
Chapter 2: Decision Making—The Surprising Reasons People Say Yes and No
Picking his way through the cramped ballroom, with people-filled padded chairs all askew, there was no clear route. Obstacles,
however, were not this man’s primary concern. On his face, you could see his mind racing—searching for what he would say
once he was in front of the crowd. Few people like public speaking, but this situation seemed even more torturous than usual.
He found his standing spot, turned, and faced the crowd.
“I have traveled three hours round-trip every day to attend this session. I’ve driven dangerous roads and in heavy traffic. You
are a talented and knowledgeable group. I have learned from you, and you have learned from me. And I sure could use the
money to help pay for gas. Please, please. Pick me!”
That scene played out in a Calgary persuasion workshop during which I asked three volunteers to vie for a single, crisp $100
bill by convincing the audience to individually award them the money. The idea: Whoever makes the most compelling case,
winning the affections of the crowd, walks away with the cash and the bragging rights.
Participants are allowed to make their case in any way they deem appropriate, with one exception: They can’t share the money
or materially benefit the crowd in any way. (I’ll buy you all drinks!) Adding to the pressure, I give them just four minutes to
develop their case and only 25 seconds to present it.
What would you say if you were in this situation?
This activity mirrors business life today in many ways. You are often in competition with others for the account, the promotion,
the project. You must think on your feet and be able to put together compelling arguments fast, and you might not have much
time to state your case. Sometimes you need to do all this—especially in peer-to-peer persuasion situations—without offering
your target some sort of material gain. Not an easy assignment, to be sure.
The most interesting aspect of this workshop activity, though, is not the people vying for the money—it’s the people deciding
who will earn the money. You may think that people are carefully analyzing participants’ arguments, weighing the pros and the
cons to rationally decide who gets their votes. That’s not what’s happening. At all. The surprising truth is that most people have
no idea why they say yes.
UNEXPECTED TRUTHS ABOUT YOUR THINKING
Nobel Prize–winning economist and author Daniel Kahneman suggests that human beings possess two “systems” for thinking:
one that processes information very quickly, and one that d ...
Data Protection in a Connected World: Sovereignty and Cyber Securityanupriti
Delve into the critical intersection of data sovereignty and cyber security in this presentation. Explore unconventional cyber threat vectors and strategies to safeguard data integrity and sovereignty in an increasingly interconnected world. Gain insights into emerging threats and proactive defense measures essential for modern digital ecosystems.
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Chris Swan
Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge.
You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter.
The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.
How to Avoid Learning the Linux-Kernel Memory ModelScyllaDB
The Linux-kernel memory model (LKMM) is a powerful tool for developing highly concurrent Linux-kernel code, but it also has a steep learning curve. Wouldn't it be great to get most of LKMM's benefits without the learning curve?
This talk will describe how to do exactly that by using the standard Linux-kernel APIs (locking, reference counting, RCU) along with a simple rules of thumb, thus gaining most of LKMM's power with less learning. And the full LKMM is always there when you need it!
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
What Not to Document and Why_ (North Bay Python 2024)Margaret Fero
We’re hopefully all on board with writing documentation for our projects. However, especially with the rise of supply-chain attacks, there are some aspects of our projects that we really shouldn’t document, and should instead remediate as vulnerabilities. If we do document these aspects of a project, it may help someone compromise the project itself or our users. In this talk, you will learn why some aspects of documentation may help attackers more than users, how to recognize those aspects in your own projects, and what to do when you encounter such an issue.
These are slides as presented at North Bay Python 2024, with one minor modification to add the URL of a tweet screenshotted in the presentation.
Blockchain and Cyber Defense Strategies in new genre timesanupriti
Explore robust defense strategies at the intersection of blockchain technology and cybersecurity. This presentation delves into proactive measures and innovative approaches to safeguarding blockchain networks against evolving cyber threats. Discover how secure blockchain implementations can enhance resilience, protect data integrity, and ensure trust in digital transactions. Gain insights into cutting-edge security protocols and best practices essential for mitigating risks in the blockchain ecosystem.
What's Next Web Development Trends to Watch.pdfSeasiaInfotech2
Explore the latest advancements and upcoming innovations in web development with our guide to the trends shaping the future of digital experiences. Read our article today for more information.
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecJames Anderson
The lecture titled "Automating AppSec" delves into the critical challenges associated with manual application security (AppSec) processes and outlines strategic approaches for incorporating automation to enhance efficiency, accuracy, and scalability. The lecture is structured to highlight the inherent difficulties in traditional AppSec practices, emphasizing the labor-intensive triage of issues, the complexity of identifying responsible owners for security flaws, and the challenges of implementing security checks within CI/CD pipelines. Furthermore, it provides actionable insights on automating these processes to not only mitigate these pains but also to enable a more proactive and scalable security posture within development cycles.
The Pains of Manual AppSec:
This section will explore the time-consuming and error-prone nature of manually triaging security issues, including the difficulty of prioritizing vulnerabilities based on their actual risk to the organization. It will also discuss the challenges in determining ownership for remediation tasks, a process often complicated by cross-functional teams and microservices architectures. Additionally, the inefficiencies of manual checks within CI/CD gates will be examined, highlighting how they can delay deployments and introduce security risks.
Automating CI/CD Gates:
Here, the focus shifts to the automation of security within the CI/CD pipelines. The lecture will cover methods to seamlessly integrate security tools that automatically scan for vulnerabilities as part of the build process, thereby ensuring that security is a core component of the development lifecycle. Strategies for configuring automated gates that can block or flag builds based on the severity of detected issues will be discussed, ensuring that only secure code progresses through the pipeline.
Triaging Issues with Automation:
This segment addresses how automation can be leveraged to intelligently triage and prioritize security issues. It will cover technologies and methodologies for automatically assessing the context and potential impact of vulnerabilities, facilitating quicker and more accurate decision-making. The use of automated alerting and reporting mechanisms to ensure the right stakeholders are informed in a timely manner will also be discussed.
Identifying Ownership Automatically:
Automating the process of identifying who owns the responsibility for fixing specific security issues is critical for efficient remediation. This part of the lecture will explore tools and practices for mapping vulnerabilities to code owners, leveraging version control and project management tools.
Three Tips to Scale the Shift Left Program:
Finally, the lecture will offer three practical tips for organizations looking to scale their Shift Left security programs. These will include recommendations on fostering a security culture within development teams, employing DevSecOps principles to integrate security throughout the development
In this follow-up session on knowledge and prompt engineering, we will explore structured prompting, chain of thought prompting, iterative prompting, prompt optimization, emotional language prompts, and the inclusion of user signals and industry-specific data to enhance LLM performance.
Join EIS Founder & CEO Seth Earley and special guest Nick Usborne, Copywriter, Trainer, and Speaker, as they delve into these methodologies to improve AI-driven knowledge processes for employees and customers alike.
Implementations of Fused Deposition Modeling in real worldEmerging Tech
The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries:
1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes.
2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions.
3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines.
4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors.
5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering.
6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands.
7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems.
8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering.
9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively.
Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.
Interaction Latency: Square's User-Centric Mobile Performance MetricScyllaDB
Mobile performance metrics often take inspiration from the backend world and measure resource usage (CPU usage, memory usage, etc) and workload durations (how long a piece of code takes to run).
However, mobile apps are used by humans and the app performance directly impacts their experience, so we should primarily track user-centric mobile performance metrics. Following the lead of tech giants, the mobile industry at large is now adopting the tracking of app launch time and smoothness (jank during motion).
At Square, our customers spend most of their time in the app long after it's launched, and they don't scroll much, so app launch time and smoothness aren't critical metrics. What should we track instead?
This talk will introduce you to Interaction Latency, a user-centric mobile performance metric inspired from the Web Vital metric Interaction to Next Paint"" (web.dev/inp). We'll go over why apps need to track this, how to properly implement its tracking (it's tricky!), how to aggregate this metric and what thresholds you should target.
Are you interested in learning about creating an attractive website? Here it is! Take part in the challenge that will broaden your knowledge about creating cool websites! Don't miss this opportunity, only in "Redesign Challenge"!
The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Invited Remote Lecture to SC21
The International Conference for High Performance Computing, Networking, Storage, and Analysis
St. Louis, Missouri
November 18, 2021
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfjackson110191
These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.
4. “…our medium is not
technology – it's
behaviour ”
Robert Fabricant/Interaction09
“Interaction design is not about computing technology”
Apparently controversial?
IMO, entirely appropriate.
5. My approach to design
Captured in Kolko’s Thoughts on IxD:
6. “Interaction Design is the creation of a dialogue
between a person and a product, service or system…
7. …This dialogue is usually found in the world of
behaviour.”
Participatory / Reactionary / Instinctive / Emotion
An undeniable part of how we engage with our products & services.
We participate in a dialogue, conversation, relationships
8. The behavioural layer
Designing for The Behavioural Layer.
But how much do we really know about this?
Is our perception, our decision making process as balanced, as rational as we think?
Opening story demonstrates that if anything, behaviour is at the very least complex.
Unpredictable.
At times, irrational
9. Economist.com
Example taken from Dan Ariely’s Irrational Behaviour.
We make decisons based on relative/comparative value.
Simply not as good as making choices without this level of context.
An example of Persuasive Design?
10. “Persuasion Design is used to improve
marketing and sales messages by analyzing
their verbal content, using established
psychological researchquot;
Wikipedia defines PD thus.
Evil?
Continues by saying how “controlling the message can lead to significantly higher conversion
rates”.
11. “The best thinkers in graphic design have
long held that information and persuasion
were oppositional modes of design…Some
content is understood as information and
some content is labelled as persuasion,
promotion or even propaganda.
In this scheme of things,
information is noble.”
Designer cynicism.
Reflects the potential for this to be misused.
Exploitation. Rhetoric.
12. “Perhaps information and persuasion are not
an either/or opposition. More likely they are
modes of communication that
overlap and interact.”
Not the philosophy or the methods that are at fault.
Intention is the decisive factor.
If we subscribe to the notion that we are creating dialogue, then all the usual rules of
politeness and manners apply. Interruption. Flash banners.
13. How are we influenced?
Reiterate: We operate within The Behavioural Layer.
Reiterate: Our psychology means we are open to influence.
But how, as humans, are we influenced?
14. 1. Place
2. Objects
3. People
Areas of influence can be loosely divided in to three areas.
16. Response to the place, environment around us (although perhaps not consciously?)
Architecture can be eective at mediating this kind of response.
Staircase in intentionally exposed in the central social hub of the building.
Exposes fluidity, movement of inhabitants.
Creates opportunity for chance encounters, serendipitous exchanges.
No instruction. Just implication.
Contrast with the NCP car park model (afterthoughts, utility, piss, tramps)
17. Socio-architecture
Central squares are common in European towns and cities.
All roads lead to one place. Alive. Spirited. Stimulating. Dynamic.
Encourages exchange.
Socio-architecture (psychologist Humphry Osmond Canadian architect Kyo Izumi) – part of
their research for the best architectural form for a mental hospital in 1951.
18. Places
Socio-petal
Osmond/Izumi also coined terms quot;sociopetalquot; and quot;sociofugalquot; to describe seating
arrangements that encourage/discourage social interaction.
Socio-petal: arranged so that each can see and interact with the others
20. Places
Broken Windows Theory
In contrast: Broken Windows Theory.
First ‘suggested’ by George L. Kelling and Catherine Coles
Controversy. Giuliani’s ‘zero tolerance’. Coincided with reduced crime rates across the US.
Takeaway: Theory based on the notion that our behaviour is in some way a function of the
environment around us.
21. 1. Place
2. Objects
3. People
So we know we’re influenced by the environment around us.
How about the Objects/Things within them?
23. 1.61803399
Mathematicians and philosophers have studied this number for years.
Design that obeys these proportions appears harmionious to the eye.
It appears as if we have an in-built aesthetic sensibility.
25. In architecture
Some studies of the Acropolis, including the Parthenon, conclude that many of its
proportions approximate the golden ratio.
26. In art
Da Vinci’s illustrations in De Divina Proportione demonstrate how bodily proportions conform
to the golden ratio.
Mona lisa specualtion.
Salvador Dali explicitly used the GR in ‘The Sacrament of the Last Supper’
27. Industrial Design
Screen to body ratio:
1 : 1.67 = iPod
1 : 1.75 = iRiver H10
1 : 1.47 = Creative Nomad Zen Xtra
Not a reason for success but certanly a contributing factor.
People often struggle to articualte why something is more attractive.
A dormant/latent sentiment?
28. Attractiveness bias
Beauty is a human attribute as well: in-built Attractiveness bias
Humans we are simply hard-wired to respond more favourably to attractive people.
Studies of babies show they will look more intently and longer at prettier faces.
A study of the 1974 Canadian federal elections found that attractive candidates received
more than two and a half times the votes of the unattractive ones
A Pennsylvania study, examined 74 defendants – found that good looking received
significantly lighter sentences. Twice as likely to avoid a prison sentence than unattractive
defendants.
A recent Guildhall University survey of 11,000 33-year-olds found that unattractive men
earned 15 % less than those deemed attractive. Simialrly, plain women earned 11 % less than
their prettier counterparts.
29. 1. Place
2. Objects
3. People
…leads to people.
We now know that both the environment/place we’re in
+ the objects/things around us can have a profound influence on the way we behave. Often
on a subliminal level.
So how about those around us…
31. Social proof
Social proof: in situations in which we don’t know what course of action to take we tend to
watch and rely on the behaviour of others to determine our own.
Hundreds of people in line for something = assume they must be queuing for somethign
worthwhile.
Apple know this of course and broadcast all the pictures of hungry people queuing for the
iPhone.
Eect: the iPhone must be worth it? A nudge towards it at the every least.
Very common for us to rely on simple rules of thumb like this.
32. Social proof
The Empty restaurant. Deserted.
Far less inclined to venture in
Why waiters try and sit you near the window.
http://farm1.static.flickr.com/107/295933540_2b710e4d93.jpg?v=0
Connected to our survival instincts? Safety in numbers?
Everything in psychology comes back to us ‘surviving on the plains of the Savannah!’
33. Help save the environment by
participating in our towel use program.
Social proof
From Robert Cialdini ‘Influence’.
Experiment to use messaging to help the environment (hotel towel reuse)
34. The majority of guests at our hotel recycle
their towels at least once during their stay.
Social proof
Towel recycling rose by 26%
35. The majority of the people who stayed in
this room participated in the towel
recycling program
Social proof
Towel recycling rose by 33%
Guests were more influenced by social factors than environmental.
Social software a powerful tool in helping tackle environmental issues.
40. The visceral layer
What’s happening here? What’s the psychology?
How and why are these decisions being made?
Often beneath normal level of consciousness: people are highly unlikely to acknowledge that
they have been ‘primed’, or influenced in any way.
Visceral layer? Biology...we as mammals, primates are attracted to bright colours. Like this
bee.
We have adapted, evolved to behave in this way.
This is built in to our brain. Again survival instincts.
Some examples of design that operates eectively on this layer:
41. International Energy Agency estimate that between 5 and 15% of the world's domestic
electricity is wasted by gadgets left on standby.
British designer, Rachel Turner for the Greener Gadgets competition.
42. “These little monster eyes tap into our uneasiness about things that go bump in the night.
They give us a little extra emotional nudge to remind us to turn our gadgets o properly -
especially when we head o to bed.”
Tapping in the fact that subconsciously we don’t respond well to angry, frowning faces.
“Emotional nudge”: lovely way of phrasing this level of influence.
43. As designers we have the opportunity to not only acknowledge, but also design for this level.
Doesn’t need to be complex (speculate that simple is better for this to be eective)
Subverts the usual model using almost human characteristics.
Provokes a reaction. Creates influence.
44. Play
The Power-Hog is designed to expose kids to the energy costs associated with running
electronic devices.
Plug the tail into the outlet and the device into the snout; feed a coin to meter for 30 minutes
of use.
Playful.
Builds on the in-built notion of play. More hard-wired behaviour.
45. Control
Close buttons often don’t actually do anything (other than allow lift techs to hack) = Placebo
button.
Designed to allow users to feel ‘in control’. The illusion of control.
In this case designed to allay irrational behaviour?
47. Poka-yoke
Similarly designing defensively to ensure people can’t make mistakes
This the concept of Poka-yoke: a Japanese term that means quot;mistake-proofingquot;
Achieved by putting limits on how an operation can be performed in order to force the
desired completion of the operation.
Automatic cars (key cannot be removed unless gearbox is left in P(ark).
Microwave doors that disable the use.
Macbook batteries.
SD cards.
48. Sensible, considered defaults
Hashem Akbari wants to paint the worlds roofs white.
The Guardian: “Together, roads and roofs are reckoned to cover more than half the available
surfaces in urban areas, which have spread over some 2.4% of the Earth's land area. A mass
movement to change their colour…would increase the amount of sunlight bounced o our
planet by 0.03%…that would cool the Earth enough to cancel out the warming caused by
44bn tonnes of CO2 pollution.”
Ambitious, but how much can we achieve through consideration of sensible default states?
49. Systems like last.fm (scrobbler) rarely interrupt, instead they gather silently.
The product’s output is simply a manifestation of my typical, intrinsic behaviour.
The data and therefore the value of my dialogue with last.fm emerges through use.
50. “The most profound technologies are those that disappear.”
The Computer for the 21st Century
Mark Weiser
Embedded or at least aligned with our normal behaviour
51. Round up:
1. We’ve learnt that we often make irrational choices even when we believe our decision is a
rational, balanced one.
2. That we’ve inbuilt biases like The Bandwagon Eect that can influence us in profound
unexpected ways.
Message: if we are designing for the Behavioural Layer – and I we believe we are – then we
must do more than acknowledge it .we must try and understand and design appropriately.
Now more than ever, the world is facing up to the some terrifying challenges. In many ways,
it’s our behaviour that has got us here. As designers we have an opportunity to influence
people’s behaviour in a positive way.
52. quot;If we know the common patterns of error or self-
deception, maybe we can work around them
ourselves, or build social structures for smarter
groups. We know we aren't perfect, and can't be
perfect, but trying is better than not trying.quot;
http://www.overcomingbias.com/welcome.html
53. This presentation is licensed under a Creative Commons Attribution-Noncommercial-Share
Alike license.
Thanks
Ashamed to say my first trip to Newcastle.
I seem to have written a talk on social psychology, neuroscience.
So in that spirit, I’d like to tell you about a little experiment.
Robert Fabricant/Interaction09
“Interaction design is not about computing technology”
Apparently controversial?
IMO, entirely appropriate.
Robert Fabricant/Interaction09
“Interaction design is not about computing technology”
Apparently controversial?
IMO, entirely appropriate.
My approach to design
Captured in Kolko’s Thoughts on IxD:
Participatory / Reactionary / Instinctive / Emotion
An undeniable part of how we engage with our products & services.
We participate in a dialogue, conversation, relationships
Designing for The Behavioural Layer.
But how much do we really know about this?
Is our perception, our decision making process as balanced, as rational as we think?
Opening story demonstrates that if anything, behaviour is at the very least complex.
Unpredictable.
At times, irrational
Example taken from Dan Ariely’s Irrational Behaviour.
We make decisons based on relative/comparative value.
Simply not as good as making choices without this level of context.
An example of Persuasive Design?
Wikipedia defines PD thus.
Evil?
Continues by saying how “controlling the message can lead to significantly higher conversion rates”.
Designer cynicism.
Reflects the potential for this to be misused.
Exploitation. Rhetoric.
Not the philosophy or the methods that are at fault.
Intention is the decisive factor.
If we subscribe to the notion that we are creating dialogue, then all the usual rules of politeness and manners apply. Interruption. Flash banners.
http://www.highgrounddesign.com/design/dcessay992.htm
Reiterate: We operate within The Behavioural Layer.
Reiterate: Our psychology means we are open to influence.
But how, as humans, are we influenced?
Areas of influence can be loosely divided in to three areas.
Areas of influence can be loosely divided in to three areas.
Areas of influence can be loosely divided in to three areas.
Response to the place, environment around us (although perhaps not consciously?)
Architecture can be effective at mediating this kind of response.
Staircase in intentionally exposed in the central social hub of the building.
Exposes fluidity, movement of inhabitants.
Creates opportunity for chance encounters, serendipitous exchanges.
No instruction. Just implication.
Contrast with the NCP car park model (afterthoughts, utility, piss, tramps)
Central squares are common in European towns and cities.
All roads lead to one place. Alive. Spirited. Stimulating. Dynamic.
Encourages exchange.
Socio-architecture (psychologist Humphry Osmond & Canadian architect Kyo Izumi) – part of their research for the best architectural form for a mental hospital in 1951.
Osmond/Izumi also coined terms \"sociopetal\" and \"sociofugal\" to describe seating arrangements that encourage/discourage social interaction.
Socio-petal: arranged so that each can see and interact with the others
Look what happened when I tried to take my 2 year old daughter away!
In contrast: Broken Windows Theory.
First ‘suggested’ by George L. Kelling and Catherine Coles
Controversy. Giuliani’s ‘zero tolerance’. Coincided with reduced crime rates across the US.
Takeaway: Theory based on the notion that our behaviour is in some way a function of the environment around us.
So we know we’re influenced by the environment around us.
How about the Objects/Things within them?
Again, we are influenced in many ways.
Beauty.
Mathematicians and philosophers have studied this number for years.
Design that obeys these proportions appears harmionious to the eye.
It appears as if we have an in-built aesthetic sensibility.
Appears in nature
In architecture
Some studies of the Acropolis, including the Parthenon, conclude that many of its proportions approximate the golden ratio.
http://www.flickr.com/photos/patrickwilken/399934129/
In art
Da Vinci’s illustrations in De Divina Proportione demonstrate how bodily proportions conform to the golden ratio.
Mona lisa specualtion.
Salvador Dali explicitly used the GR in ‘The Sacrament of the Last Supper’
Industrial Design
Screen to body ratio:
1 : 1.67 = iPod1 : 1.75 = iRiver H101 : 1.47 = Creative Nomad Zen Xtra
Not a reason for success but certanly a contributing factor.
People often struggle to articualte why something is more attractive.
A dormant/latent sentiment?
Beauty is a human attribute as well: in-built Attractiveness bias
Humans we are simply hard-wired to respond more favourably to attractive people.
Studies of babies show they will look more intently and longer at prettier faces.
A study of the 1974 Canadian federal elections found that attractive candidates received more than two and a half times the votes of the unattractive ones
A Pennsylvania study, examined 74 defendants – found that good looking received significantly lighter sentences. Twice as likely to avoid a prison sentence than unattractive defendants.
A recent Guildhall University survey of 11,000 33-year-olds found that unattractive men earned 15 % less than those deemed attractive. Simialrly, plain women earned 11 % less than their prettier counterparts.
…leads to people.
We now know that both the environment/place we’re in
+ the objects/things around us can have a profound influence on the way we behave. Often on a subliminal level.
So how about those around us…
Video: http://www.youtube.com/watch?v=ho9jcLMhVkE
Social proof: in situations in which we don’t know what course of action to take we tend to watch and rely on the behaviour of others to determine our own.
Hundreds of people in line for something = assume they must be queuing for somethign worthwhile.
Apple know this of course and broadcast all the pictures of hungry people queuing for the iPhone.
Effect: the iPhone must be worth it? A nudge towards it at the every least.
Very common for us to rely on simple rules of thumb like this.
The Empty restaurant. Deserted.
Far less inclined to venture in
Why waiters try and sit you near the window.
http://farm1.static.flickr.com/107/295933540_2b710e4d93.jpg?v=0
Connected to our survival instincts? Safety in numbers?
Everything in psychology comes back to us ‘surviving on the plains of the Savannah!’
From Robert Cialdini ‘Influence’.
Experiment to use messaging to help the environment (hotel towel reuse)
http://entertainment.timesonline.co.uk/tol/arts_and_entertainment/books/book_extracts/article2804923.ece
Guests were more influenced by social factors than environmental.
Social software a powerful tool in helping tackle environmental issues.
What’s happening here? What’s the psychology?
How and why are these decisions being made?
Often beneath normal level of consciousness: people are highly unlikely to acknowledge that they have been ‘primed’, or influenced in any way.
Visceral layer? Biology...we as mammals, primates are attracted to bright colours. Like this bee.
We have adapted, evolved to behave in this way.
This is built in to our brain. Again survival instincts.
Some examples of design that operates effectively on this layer:
International Energy Agency estimate that between 5 and 15% of the world's domestic electricity is wasted by gadgets left on standby.
British designer, Rachel Turner for the Greener Gadgets competition.
http://www.greenergadgets.com/index.php/design-competition/
“These little monster eyes tap into our uneasiness about things that go bump in the night. They give us a little extra emotional nudge to remind us to turn our gadgets off properly - especially when we head off to bed.”
Tapping in the fact that subconsciously we don’t respond well to angry, frowning faces.
“Emotional nudge”: lovely way of phrasing this level of influence.
As designers we have the opportunity to not only acknowledge, but also design for this level.
Doesn’t need to be complex (speculate that simple is better for this to be effective)
Subverts the usual model using almost human characteristics.
Provokes a reaction. Creates influence.
The Power-Hog is designed to expose kids to the energy costs associated with running electronic devices.
Plug the tail into the outlet and the device into the snout; feed a coin to meter for 30 minutes of use.
Playful.
Builds on the in-built notion of play. More hard-wired behaviour.
Close buttons often don’t actually do anything (other than allow lift techs to hack) = Placebo button.
Designed to allow users to feel ‘in control’. The illusion of control.
In this case designed to allay irrational behaviour?
http://architectures.danlockton.co.uk/2008/10/01/placebo-buttons-false-affordances-and-habit-forming/
Similarly designing defensively to ensure people can’t make mistakes
This the concept of Poka-yoke: a Japanese term that means \"mistake-proofing\"
Achieved by putting limits on how an operation can be performed in order to force the desired completion of the operation.
Automatic cars (key cannot be removed unless gearbox is left in P(ark).
Microwave doors that disable the use.
Macbook batteries.
SD cards.
Hashem Akbari wants to paint the worlds roofs white.
The Guardian: “Together, roads and roofs are reckoned to cover more than half the available surfaces in urban areas, which have spread over some 2.4% of the Earth's land area. A mass movement to change their colour…would increase the amount of sunlight bounced off our planet by 0.03%…that would cool the Earth enough to cancel out the warming caused by 44bn tonnes of CO2 pollution.”
Ambitious, but how much can we achieve through consideration of sensible default states?
http://www.guardian.co.uk/environment/2009/jan/16/white-paint-carbon-emissions-climate
http://www.flickr.com/photos/darijuss/2909691869/
Systems like last.fm (scrobbler) rarely interrupt, instead they gather silently.
The product’s output is simply a manifestation of my typical, intrinsic behaviour.
The data and therefore the value of my dialogue with last.fm emerges through use.
“The most profound technologies are those that disappear.”
The Computer for the 21st Century
Mark Weiser
Embedded or at least aligned with our normal behaviour