ENTRIES TAGGED "design"
Drone Journalism, Mobile Web Dev, JS Book, and Chrome App Dev
- Drone Journalism — “The newspaper was for still images,” said Mr. Whyld, who builds his own drones, “but the Internet is for this.” is the money shot from a NY Times piece (not linked to directly, as is paywalled)
- Best UX Patterns for Mobile Web Apps (Luke Wroblewski) — advice from Google Chrome Dev Summit.
- You Don’t Know JS (Github) — book in progress, funded by a Kickstarter.
- Spark — A Chrome app based development environment with a reusable library of GUI widgets.
Offline Design, Full Text, Parsing Library, and Node Streams
- Network Connectivity Optional (Luke Wroblewski) — we need progressive enhancement: assume people are offline, then enhance if they are actually online.
- Whoosh — fast, featureful full-text indexing and searching library implemented in pure Python
- Flanker (GitHub) — open source address and MIME parsing library in Python. (via Mailgun Blog)
- Stream Adventure (Github) — interactive exercises to help you understand node streams.
Help Searching, Offline First, AWS Tips, and Awesome Fonts
- Learn to Search — cheeky but spot-on help for people running conferences.
- Offline First — no, the mobile connectivity/bandwidth issue isn’t just going to solve itself on a global level anywhere in the near future. THIS!
- 10 Things You Should Know About AWS — lots of specialist tips for hardcore AWS users.
- The League of Moveable Type — AWESOME FONTS. Me gusta.
Glass Games, Dopplr Design, Free Android, and Shameful Security
- A Game Designer’s Guide to Google Glass (Gamasutra) — nice insight that Glass is shovelware-resistant because input is so different and output so limited. (via Beta Knowledge)
- Be Polite, Pertinent, and Pretty (Slideshare) — design principles from Dopplr. (via Matt Jones’s memorial to Dopplr)
- Replicant — free software Android. (via Wired)
- Femme Fatale Dupes IT Guys at Government Agency (Sophos) — story of how a fake LinkedIn profile for a pretty woman reflects as poorly on security practice as on gender politics.
Visual Arduino Coding, Hardware Iteration, Segmenting Images, and Client-Side Adjustable Data View
- Visually Programming Arduino — good for little minds.
- Rapid Hardware Iteration at Scale (Forbes) — It’s part of the unique way that Xiaomi operates, closely analyzing the user feedback it gets on its smartphones and following the suggestions it likes for the next batch of 100,000 phones. It releases them every Tuesday at noon Beijing time.
- Machine Learning of Hierarchical Clustering to Segment 2D and 3D Images (PLoS One) — We propose an active learning approach for performing hierarchical agglomerative segmentation from superpixels. Our method combines multiple features at all scales of the agglomerative process, works for data with an arbitrary number of dimensions, and scales to very large datasets.
- Kratu — an Open Source client-side analysis framework to create simple yet powerful renditions of data. It allows you to dynamically adjust your view of the data to highlight issues, opportunities and correlations in the data.
Android Control, Privacy Eluded, Design Challenges, and "Watson, What's This Lump?"
- Google’s Iron Grip on Android (Ars Technica) — While Google will never go the entire way and completely close Android, the company seems to be doing everything it can to give itself leverage over the existing open source project. And the company’s main method here is to bring more and more apps under the closed source “Google” umbrella.
- How to Live Without Being Tracked (Fast Company) — this seems appropriate: she assumes that every phone call she makes and every email she sends will be searchable by the general public at some point in the future. Full of surprises, like To identify tires, which can come in handy if they’re recalled, tire manufacturers insert an RFID tag with a unique code that can be read from about 20 feet away by an RFID reader..
- method.ac — Complete 50 challenges. Each challenge is a small, design related task. They cover theory and practice of one specific design subject. Challenges are progressively more difficult, and completing them gives you access to more intricate challenges.
- IBM Watson’s Cancer Moonshot (Venture Beat) — IBM is ready to make a big a bet on Watson, as it did in the 1970s when it invested in the emergence of the mainframe. Watson heralds the emergence of “thinking machines,” which learn by doing and already trump today’s knowledge retrieval machines. I for one welcome the opportunity to be a false negative.
GUI Prototyping, Linux Containerisation, Searchable Apple Text, and Infosec Wargames
- Pencil — An open-source GUI prototyping tool that’s available for ALL platforms.
- lmctfy — open source version of Google’s container stack, which provides Linux application containers.
- ASCII WWDC — searchable full-text transcriptions of WWDC sessions.
- Cryptogeddon — an online infosec wargame.
Flexible Layouts, Web Components, Distributed SQL Database, and Reverse-Engineering Dropbox Client
- intention.js — manipulates the DOM via HTML attributes. The methods for manipulation are placed with the elements themselves, so flexible layouts don’t seem so abstract and messy.
- F1: A Distributed SQL Database That Scales — a distributed relational database system built at Google to support the AdWords business. F1 is a hybrid database that combines high availability, the scalability of NoSQL systems like Bigtable, and the consistency and usability of traditional SQL databases. F1 is built on Spanner, which provides synchronous cross-datacenter replication and strong consistency. Synchronous replication implies higher commit latency, but we mitigate that latency by using a hierarchical schema model with structured data types and through smart application design. F1 also includes a fully functional distributed SQL query engine and automatic change tracking and publishing.
- Looking Inside The (Drop)Box (PDF) — This paper presents new and generic techniques, to reverse engineer frozen Python applications, which are not limited to just the Dropbox world. We describe a method to bypass Dropbox’s two factor authentication and hijack Dropbox accounts. Additionally, generic techniques to intercept SSL data using code injection techniques and monkey patching are presented. (via Tech Republic)