Monday, September 30, 2013

Deluxe Applications

UX or User Experience is starting to become a buzz word in every industry, particularly IT. User Experience is defined by the International Organization for Standardization (ISO) that discusses the ergonomics of human-computer interaction as "a person's perceptions and responses that result from the use or anticipated use of a product, system or service. UX includes all the users' emotions, beliefs, preferences, perceptions, physical and psychological responses, and behaviors that occur before, during and after use of a produce, service, or experience."

So why is this so important? Think about the apps or websites you encounter on a daily basis; you decide in seconds whether it is easy to use, if it's something that responds quickly, and if it's something you'll want to use again. UX is not just something that "happens" and it is not an accident. You don't wait until the implementation phase to incorporate it. UX is extremely important for developers. Users drive the demand for your product or service, and expect the applications and technology they work with to be easy to use and to get a meaningful experience from it. Tools like surveys can tell us directly what the customers want, and can be taken a step further by looking at physical evidence of user analytics and trends. We can allocate resources and design something that makes sense to each of us, but there's more to it than that. If I were to design something that I absolutely love it would be decorated in black and gold and covered in chocolate. This hardly relates to anything IT, but goes to show that only a small percentage of the user-base will share the same desires as your own personal biases. If the product falls through, it is us to blame, not the user. You don't want to make the user confused or have to think in any way when using your application.


Many employers and organizations thrive on analytics, so if it can be proven that you can enhance user experience based on data from a source like Google Analytics, why wouldn't you user-center your design? In Google Analyics, you can see demographics of locations, behaviors, the bounce rate, the number of hits on each sub-page of your site, what people are searching on your site, and even the technology behind your web-site traffic. For example see the screenshot to the left of this blog's mobile technology metrics.

As you can see, the only hits we've gotten on our page have been from desktops. We could use this to justify the revision of our site to make it more mobile friendly. Of course, this is just an example, but this is one way that you can use analyics to start the user-experience process to make all of your applications, technologies, products, or services deluxe applications.

Related UX Reads:
UX Design Magazine
UX Defined

-Bailey

Monday, September 23, 2013

3D Printing...Yeah, that's right, 3D!


I don't know about you, but I find this whole 3D Printing (also known as additive manufacturing) to be pretty awesome! As she mentioned in the video, it has been around for about 3 decades, and I'm surprised I haven't heard more about it before now.

3D Printing creates a 3D model or copy of an object and can be done with several types of materials. She goes in to detail in the video on exactly how this is done, but the "printer" basically creates very intricate layers upon layers of the object you are printing. The detail that goes in to these models is so great that the printed copy can function exactly the same as the original.

When I researched this topic initially, I came across a video of someone copying a wrench. The printed wrench could work exactly like the original one, which they do test at the end of the video. That got me interested, but after watching Lisa Harouni's TED Talk, I think this is much more than just a new way to create tools or spare parts. Hearing her talk about prosthetics and implants made me wonder where this 3D printing is going to take us in the future.

For more information visit:
http://www.3dprinter.net/reference/what-is-3d-printing
http://www.ted.com/speakers/lisa_harouni.html (info about Lisa)
http://www.3ders.org/3d-printing.html

Monday, September 16, 2013

Phone need juice?.. not so fast!

You might want to think twice next time about what ports you use to charge your phone!

Personally, when I need juice, I need it now. I don’t have time to wait until I return home to charge my phone. I may miss an important phone call that needed to be picked up when it was placed. I will do whatever it takes to pump life back into my phone even if it’s a public charging station; especially at an airport. However, doing this can lead to a not so good outcome. USB cables carry both power and data which means they are potentially ripe for abuse when it comes to desperate smartphone users plugging into public chargers to boost their battery charge. All that’s required is for the charger to be connected to some form of computer which is able to pull data from the smartphone when it is connected.
Insert the USB Condom. This device made by int3.cc fits on top of a USB plug and cuts off access to the pins that allow it to transmit and receive data. Only the pins that allow the plug to receive power are left open, so that a device can charge without the possibility of malware being passed between the device and its power source. The USB Condom is meant to protect against what's known as "juice jacking," where a charging station is used to steal data or harm a device.
int3.cc specifically cites the phenomenon of juice-jacking as cause for concern. Power stations are dangerous and it turns out that most smartphones are configured to connect and dump off data. Any random person could implement a system at one of these stations that can extract photos and data or write malware to devices that have been connected to it.

iOS devices seen as more secure than other smartphones are also susceptible to being compromised. During a BlackHat security conference, it was demonstrated that within one minute of being plugged into a malicious charger, a computer could implant malware onto the phone. Some phones may be more susceptible to data theft and malware than others, but what is certain is that by breaking the data connection, int3.cc's USB Condom removes all doubt.
Safety Tips:
Assuming an outlet is available, charging your phone through a power cord is the safest route for protecting your information. Battery powered mobile charging devices also work well. It is advised that if you must use a charging kiosk to power down your device before juicing up!

For more info visit:
http://www.theverge.com/2013/9/13/4726486/usbcondom-protects-charging-devices-from-hackers-juice-jacking

http://krebsonsecurity.com/2011/08/beware-of-juice-jacking/
 




Thursday, September 5, 2013

Welcome to Now Tech News

Hi! We are Now Tech News! Our team consists of Amber, Bailey, and Jessica. We are currently seniors at the University of Northern Iowa all majoring in Management Information Systems blogging for our Information Systems Management class. The purpose of this blog is to keep you up to date on current tech news as through our eyes covering a broad spectrum of IT related topics. We are looking forward to keeping you up to date on Now Tech News!