View allAll Photos Tagged User_Interfaces
www.monitor-systems-engineering.com/anti_piracy_terrorism...
Maritime Early Detection Systems (M.E.D's) for Oil Rigs, Semi-Submersibles and Jack-Ups!
Ninety percent of the world’s trade moves in containers and nearly half of all incoming U.S. trade moves by ship. The current situation is bleak at best, Maritime attacks are on the increase. Pirates are more aggressive. The financial impact is significant and increasing. Military solutions are weak– they can’t be everywhere at the same time and private sector solutions are non–existent.
Don't leave port without it!
• Integrated systems designed to specific threat levels, pier side, at anchor and under way
• Any ship can be easily refit to any level of ability
• Crew assistance with installations cut costs
• System operates with no user interface
• System can provide off vessel reporting and monitoring
• Integrated system designed to give advance warning prior to boarding, giving crew time to take evasive action
A Closer Look at Maritime Early Detection Systems (M.E.D's) Onboard
With day/night and infrared gyro-stabilized cameras and motion detection equipment strategically placed, crews are alerted to the presence of an approaching threat. Bearing and speed data are provided through a radar interface.
This is integrated into a security network on board with custom control panels and alert devices placed throughout the vessel. Custom control and monitoring can be satellite linked to corporate security offices, central monitoring and law enforcement personnel.
Monitor Systems is the United Kingdom distributor for Radio Zeeland DMP’s highly effective, maritime security system. We supply, install and commission the Maritime Early Detection System (M.E.D.S) which offers a comprehensive layered security approach with onboard advance warning for ships, boats, rigs, platforms and pipelines against acts of terrorism, hijacking, piracy and other violations of security wherever a vessel is operating.
M.E.D.S delivers a military grade solution in a commercial format combining unique cutting edge technology integrated in design and function with a user-friendly interface. Utilising a customised perimeter sensor monitoring network and sophisticated infra-red tracking day/night vision cameras and onboard radar equipment, this state of the art system generates a secure perimeter network extending outwards from the vessel, divided into three zones – Red, Orange and Yellow. Each zone represents a secured area in relation to its proximity to the vessel to provide maximum levels of detection able to detect intruders from all quadrants in advance.
M.E.D.S. can be expanded and integrated with other options and systems and can be installed whilst the vessel is in service thereby eliminating costly downtime.
Case Study
Overview: Under construction. Anti piracy maritime security solutions, Non-Lethal Anti-Piracy Maritime Security Solutions, Terrorism Maritime Security, piracy detection, anti piracy, against piracy, anti-piracy, maritime piracy, sea piracy, high seas piracy, piracy solutions, piracy security, marine security, maritime security, Maritime Early Detection System, maritime piracy protection
Maritime Early Detection System (M.E.D.S)
Overview: Maritime Early Detection Systems (MEDS™) is a combination of unique integrated state of the art technologies. By equipping maritime assets with these advanced detection systems we can dramatically decrease the potential of a hostile takeover of ships /rigs in port or at sea. The worldwide threat of terrorism and piracy in international waters is increasing exponentially and the need for a solution is becoming paramount.
Option 1 uses a proximity sensor network with built in motion sensing which provides short range detection capabilities that allow a ship’s crew enough time to take the necessary measures to successfully avoid attacks before assailants are in the pilot house and have control of the vessel.
Maritime Early Detection System (M.E.D.S)
Short Range Detection
MEDS™ Perimeter Sensor Network provides a 180 degree laser grid of protection that is proven to work in extreme temperature and weather conditions. Each sensor is mounted into the side frame of the vessel and equipped with a remote enclosure with internal battery back up and redundant wired and emergency wireless communications via armored cable and cyclonic secure encryption respectively.
Each sensor ties into a wired data hub and reports its status continuously. If hard wired communication fails or is lost to any one unit the wireless communication feature will query as a back up. If this query is not returned it will report a failure of sensor locally to the monitoring system and control panels, as well as triggering an audible alarm.
Maritime Early Detection System (M.E.D.S)
MEDS™ Sensors
Photo of typical sensor system installation provides 180 degree continuous protection for the vessel, cargo and crew. Added green ½ spheres illustrate the sensor overlapping downward facing protection. Sensors are in NEMA 4x weatherproof enclosures with lighted alarm and klaxon for local indication of perimeter breach or sensor failure. Each sensor has a built in lens heater and remote back up power supply to ensure optimal operation under even the most extreme conditions and scenarios.
Maritime Early Detection System (M.E.D.S)
System Redundancy and Protective Measures
The complete MEDS package is designed with multiple redundant integrated communication systems that ensure that upon failure or destruction of one part of the system another system will come online to compensate for the failure. Upon loss of any component in the system even down to the smallest communication error, the crew or port security personnel is alerted via the monitoring control system and control of the issue giving a real time diagnostic of the overall health of the system. This feature ensures that no matter what is attempted to bring down the system for intrusion purposes the system will continue to function to do what is required … PROTECT AND REPORT.
Maritime Early Detection System (M.E.D.S)
System Expandability and Customisation
One key feature that stands out with the MEDS™ solution over any other devices currently on the market is the ability of the system to be integrated with other options and systems that the end user wishes to include. The system is based off of standard Ethernet Protocol which allows us to program Ethernet based modules to allow time and/or event delayed operation of external components. For example if minutes after a confirmed perimeter breach the owner wanted all cargo holds and the pilot house of the vessel to lock down until released from inside the pilot house via a secure code command MEDS™ allows that possibility. Or maybe a more aggressive approach is desired while still remaining non‐lethal in design. If the owner wanted motion activated debilitating sonic devices enabled at all doors when a confirmed breach is detected after the lock down of all doors this can be accomplished as well. Anything that you can think of when it comes to protecting your vessel and investment.
back to top of page.
Further Reading
Overview: Maritime Security.
Maritime security is concerned with the prevention of intentional damage through sabotage, subversion, or terrorism. Maritime security is one of the three basic roles of the United States Coast Guard has gradually developed in response to a series of catastrophic events, which began in 1917.
There are three main maritime security activities conducted by the Coast Guard: Port Security / Vessel Security and Facility Security.
Port Security
The Port Security requirements found in the MTSA requires security measures for U.S. ports in order to reduce the risks and to mitigate the results of an act that threatens the security of personnel, facilities, vessels, and the public. The regulations draw together assets within port boundaries to provide a framework to communicate, identify risks, and coordinate resources to mitigate threats and consequences. The COTP must ensure that the total port security posture is accurately assessed, and that security resources are appropriate to meet these programs. The COTP must identify critical assets within a port, develop a prioritized list of those most susceptible to acts of sabotage, and plan for adequate security measures to meet specific needs.
Vessel Security
Both MTSA and the ISPS Code regulate vessel security. The regulations within these two documents require the owners or operators of vessels to designate security officers for vessels, develop security plans based on security assessments, implement security measures specific to the vessel’s operation, and comply with current Marine Security levels.
Facility Security
A facility is defined as: any structure or facility of any kind located in, on, under, or adjacent to any waters subject to the jurisdiction of the U.S. and used, operated, or maintained by a public or private entity, including any contiguous or adjoining property under common ownership or operation. Some examples of facilities are:
Barge fleeting facilities.
Container terminals.
Oil storage facilities.
Passenger vessel terminals.
Outer Continental Shelf (OCS) Facilities are generally offshore fixed platforms in water depths ranging up to 1,000 feet deep whose primary purpose is the exploration, development, and/or product of offshore petroleum reserves. This definition also includes novel floating design such as:
Tension Leg Platforms (TLP).
Floating Production Facilities (converted MODUs).
Floating Production Storage Offloading units (FPSO).
Both MTSA and the ISPS Code regulate facility security. The regulations within these two documents require the owners or operators of facilities to designate security officers for facilities, develop security plans based on security assessments, implement security measures specific to the facility’s operation, and comply with current Marine Security levels. Those facilities designated as Outer Continental Shelf (OCS) facilities must meet the same security requirements as those designated as waterfront facilities.
When US Navy merchant vessels are in dangerous waters, security detachments are posted on the vessel. Security forces have helped deter piracy as well as terrorist attacks, such as the Maersk Alabama and the USS Cole. US Navy merchant vessels normally train the deck department in firearms training, but the added Navy security detail provides for extra security. Additionally, Navy escorts might sometimes accompany the vessels, such as traveling through the Straights of Gibraltar.
This video illustrates the prototype for the graphical user interface (GUI) CTAO operators will use for telescope control and monitoring of the array. The GUI is being designed by a team of physicists from CTAO, together with collaborators from the field of Human-Computer interaction. The video begins with a representation of the layout of a CTAO array, where each circle corresponds to a single telescope. The relative position of telescopes corresponds to a scaled physical layout on-site, constituting a pseudo-geographic display of the array. As the user zooms in, the status of the sub-systems of each telescope is revealed in increasing detail.
Learn more about CTA array control: www.cta-observatory.org/project/technology/array-control/
See more videos of the GUI on YouTube: www.youtube.com/playlist?list=PLSmiVc92qFFJG0kPQtYK0Y33fj...
Credit: Iftach Sadeh, DESY, astro.desy.de/gamma_astronomy/cta/
The day before last, I uploaded a picture of the Blue Screen of Death, which is a screen that is all too familiar to users of the Microsoft Windows Operating System. I mentioned in my narrative that the 25th anniversary of Windows will be observed later this year. Which got me to thinking about Windows 1.0.
I made a visit to my basement archives looking for examples of some of the early advertising Microsoft did for Windows. What I found was a six-page, glossy advertisement for Windows that appeared in the January, 1986 issue of Byte Magazine which, at that time, was the pre-eminent microcomputer publication.
Microsoft was a heavy advertiser in Byte, and this is the first Windows advertisement to appear in that magazine. I don't know whether this is the very first Microsoft Windows advertisement, but it is certainly one of the first. I've left the images full size so all six pages can be clear read when enlarged to full size.
The release of Microsoft Windows 1.0 did not receive the kind of attention associated with later Window's releases. I haven't found any flashy cover stories in the PC rags that immediately followed the release of Windows 1.0 in November, 1985. With the exception of Mac users, not everyone was sold yet on the benefits of a graphical user interface. And, on the Windows side of things, there weren't any killer apps. Actually, there were barely any Window's application other than those included by Microsoft with the installation disks (it came on floppy's).
The other thing to keep in mind is that the early versions of Windows were really nothing more than a graphical shell on top of the MS-DOS operating system. Look at the screen shots and you can see how primitive it all looked, especially when compared to the Macintosh which had nearly a two year head start. The windows could only be tiled against one another. There was no overlapping at all, and multitasking was available but limited.
I hope you enjoy this trip down old technology memory lane.
For more photographs of vintage technology from the early years of personal computing, visit my "Personal Computing in the 1970s & 80s" (Set).
Fucking England. Why can't we sell all our transport infrastructure to the French?
An inch of snow and the entire transport network in the south-east collapses into anarchy.
That said, this really is the best piece of UI design I've ever seen. It's Transport for London's real-time tube map and all the lines are greyed out, unless there's a problem, when they show up in their normal colour.
It's perfect, because anyone who uses London's transport enough to check how fucked it is can just glance at it for a moment and see whether or not their journey is gonna be like this morning's or not.
Love it.
Except this morning.
This is a concept for the User Interface, mainly pointed to the Smartphone OS environment with [ large ] touch screen capability. The concept is available for sale should some of the OS developers be interested.
I was showing a client what an intelligence dashboard looks like. Each column provides a unique piece of data for the client.
It auto-updates and is client-centered. It is usually made in Netvibes and comprised of RSS feeds and custom-made Yahoo! Pipes that track whatever data the client needs tracked across the web.
Tenth edition of the Dive Into User-Interface Design and UX workshop, in New Delhi. Conducted by Niyam Bhushan. Powered by NASSCOM 10,000Startups. On 26-27 Feb 2015. Venue kindly hosted by cks.in
Note: The entire six-page advertisement from which this photo has been abstracted can be seen in my "Personal Computing in the 1970s & 80s" (Set).
The day before last, I uploaded a picture of the Blue Screen of Death, which is a screen that is all too familiar to users of the Microsoft Windows Operating System. I mentioned in my narrative that the 25th anniversary of Windows will be observed later this year. Which got me to thinking about Windows 1.0.
I made a visit to my basement archives looking for examples of some of the early advertising Microsoft did for Windows. What I found was a six-page, glossy advertisement for Windows that appeared in the January, 1986 issue of Byte Magazine which, at that time, was the pre-eminent microcomputer publication.
Microsoft was a heavy advertiser in Byte, and this is the first Windows advertisement to appear in that magazine. I don't know whether this is the very first Microsoft Windows advertisement, but it is certainly one of the first. I've left the images full size so all six pages can be clear read when enlarged to full size.
The release of Microsoft Windows 1.0 did not receive the kind of attention associated with later Window's releases. I haven't found any flashy cover stories in the PC rags that immediately followed the release of Windows 1.0 in November, 1985. With the exception of Mac users, not everyone was sold yet on the benefits of a graphical user interface. And, on the Windows side of things, there weren't any killer apps. Actually, there were barely any Window's application other than those included by Microsoft with the installation disks (it came on floppy's).
The other thing to keep in mind is that the early versions of Windows were really nothing more than a graphical shell on top of the MS-DOS operating system. Look at the screen shots and you can see how primitive it all looked, especially when compared to the Macintosh which had nearly a two year head start. The windows could only be tiled against one another. There was no overlapping at all, and multitasking was available but limited.
I hope you enjoy this trip down old technology memory lane.
www.monitor-systems-engineering.com/anti_piracy_terrorism...
Maritime Early Detection Systems (M.E.D's) for Oil Rigs, Semi-Submersibles and Jack-Ups!
Ninety percent of the world’s trade moves in containers and nearly half of all incoming U.S. trade moves by ship. The current situation is bleak at best, Maritime attacks are on the increase. Pirates are more aggressive. The financial impact is significant and increasing. Military solutions are weak– they can’t be everywhere at the same time and private sector solutions are non–existent.
Don't leave port without it!
• Integrated systems designed to specific threat levels, pier side, at anchor and under way
• Any ship can be easily refit to any level of ability
• Crew assistance with installations cut costs
• System operates with no user interface
• System can provide off vessel reporting and monitoring
• Integrated system designed to give advance warning prior to boarding, giving crew time to take evasive action
A Closer Look at Maritime Early Detection Systems (M.E.D's) Onboard
With day/night and infrared gyro-stabilized cameras and motion detection equipment strategically placed, crews are alerted to the presence of an approaching threat. Bearing and speed data are provided through a radar interface.
This is integrated into a security network on board with custom control panels and alert devices placed throughout the vessel. Custom control and monitoring can be satellite linked to corporate security offices, central monitoring and law enforcement personnel.
Monitor Systems is the United Kingdom distributor for Radio Zeeland DMP’s highly effective, maritime security system. We supply, install and commission the Maritime Early Detection System (M.E.D.S) which offers a comprehensive layered security approach with onboard advance warning for ships, boats, rigs, platforms and pipelines against acts of terrorism, hijacking, piracy and other violations of security wherever a vessel is operating.
M.E.D.S delivers a military grade solution in a commercial format combining unique cutting edge technology integrated in design and function with a user-friendly interface. Utilising a customised perimeter sensor monitoring network and sophisticated infra-red tracking day/night vision cameras and onboard radar equipment, this state of the art system generates a secure perimeter network extending outwards from the vessel, divided into three zones – Red, Orange and Yellow. Each zone represents a secured area in relation to its proximity to the vessel to provide maximum levels of detection able to detect intruders from all quadrants in advance.
M.E.D.S. can be expanded and integrated with other options and systems and can be installed whilst the vessel is in service thereby eliminating costly downtime.
Case Study
Overview: Under construction. Anti piracy maritime security solutions, Non-Lethal Anti-Piracy Maritime Security Solutions, Terrorism Maritime Security, piracy detection, anti piracy, against piracy, anti-piracy, maritime piracy, sea piracy, high seas piracy, piracy solutions, piracy security, marine security, maritime security, Maritime Early Detection System, maritime piracy protection
Maritime Early Detection System (M.E.D.S)
Overview: Maritime Early Detection Systems (MEDS™) is a combination of unique integrated state of the art technologies. By equipping maritime assets with these advanced detection systems we can dramatically decrease the potential of a hostile takeover of ships /rigs in port or at sea. The worldwide threat of terrorism and piracy in international waters is increasing exponentially and the need for a solution is becoming paramount.
Option 1 uses a proximity sensor network with built in motion sensing which provides short range detection capabilities that allow a ship’s crew enough time to take the necessary measures to successfully avoid attacks before assailants are in the pilot house and have control of the vessel.
Maritime Early Detection System (M.E.D.S)
Short Range Detection
MEDS™ Perimeter Sensor Network provides a 180 degree laser grid of protection that is proven to work in extreme temperature and weather conditions. Each sensor is mounted into the side frame of the vessel and equipped with a remote enclosure with internal battery back up and redundant wired and emergency wireless communications via armored cable and cyclonic secure encryption respectively.
Each sensor ties into a wired data hub and reports its status continuously. If hard wired communication fails or is lost to any one unit the wireless communication feature will query as a back up. If this query is not returned it will report a failure of sensor locally to the monitoring system and control panels, as well as triggering an audible alarm.
Maritime Early Detection System (M.E.D.S)
MEDS™ Sensors
Photo of typical sensor system installation provides 180 degree continuous protection for the vessel, cargo and crew. Added green ½ spheres illustrate the sensor overlapping downward facing protection. Sensors are in NEMA 4x weatherproof enclosures with lighted alarm and klaxon for local indication of perimeter breach or sensor failure. Each sensor has a built in lens heater and remote back up power supply to ensure optimal operation under even the most extreme conditions and scenarios.
Maritime Early Detection System (M.E.D.S)
System Redundancy and Protective Measures
The complete MEDS package is designed with multiple redundant integrated communication systems that ensure that upon failure or destruction of one part of the system another system will come online to compensate for the failure. Upon loss of any component in the system even down to the smallest communication error, the crew or port security personnel is alerted via the monitoring control system and control of the issue giving a real time diagnostic of the overall health of the system. This feature ensures that no matter what is attempted to bring down the system for intrusion purposes the system will continue to function to do what is required … PROTECT AND REPORT.
Maritime Early Detection System (M.E.D.S)
System Expandability and Customisation
One key feature that stands out with the MEDS™ solution over any other devices currently on the market is the ability of the system to be integrated with other options and systems that the end user wishes to include. The system is based off of standard Ethernet Protocol which allows us to program Ethernet based modules to allow time and/or event delayed operation of external components. For example if minutes after a confirmed perimeter breach the owner wanted all cargo holds and the pilot house of the vessel to lock down until released from inside the pilot house via a secure code command MEDS™ allows that possibility. Or maybe a more aggressive approach is desired while still remaining non‐lethal in design. If the owner wanted motion activated debilitating sonic devices enabled at all doors when a confirmed breach is detected after the lock down of all doors this can be accomplished as well. Anything that you can think of when it comes to protecting your vessel and investment.
back to top of page.
Further Reading
Overview: Maritime Security.
Maritime security is concerned with the prevention of intentional damage through sabotage, subversion, or terrorism. Maritime security is one of the three basic roles of the United States Coast Guard has gradually developed in response to a series of catastrophic events, which began in 1917.
There are three main maritime security activities conducted by the Coast Guard: Port Security / Vessel Security and Facility Security.
Port Security
The Port Security requirements found in the MTSA requires security measures for U.S. ports in order to reduce the risks and to mitigate the results of an act that threatens the security of personnel, facilities, vessels, and the public. The regulations draw together assets within port boundaries to provide a framework to communicate, identify risks, and coordinate resources to mitigate threats and consequences. The COTP must ensure that the total port security posture is accurately assessed, and that security resources are appropriate to meet these programs. The COTP must identify critical assets within a port, develop a prioritized list of those most susceptible to acts of sabotage, and plan for adequate security measures to meet specific needs.
Vessel Security
Both MTSA and the ISPS Code regulate vessel security. The regulations within these two documents require the owners or operators of vessels to designate security officers for vessels, develop security plans based on security assessments, implement security measures specific to the vessel’s operation, and comply with current Marine Security levels.
Facility Security
A facility is defined as: any structure or facility of any kind located in, on, under, or adjacent to any waters subject to the jurisdiction of the U.S. and used, operated, or maintained by a public or private entity, including any contiguous or adjoining property under common ownership or operation. Some examples of facilities are:
Barge fleeting facilities.
Container terminals.
Oil storage facilities.
Passenger vessel terminals.
Outer Continental Shelf (OCS) Facilities are generally offshore fixed platforms in water depths ranging up to 1,000 feet deep whose primary purpose is the exploration, development, and/or product of offshore petroleum reserves. This definition also includes novel floating design such as:
Tension Leg Platforms (TLP).
Floating Production Facilities (converted MODUs).
Floating Production Storage Offloading units (FPSO).
Both MTSA and the ISPS Code regulate facility security. The regulations within these two documents require the owners or operators of facilities to designate security officers for facilities, develop security plans based on security assessments, implement security measures specific to the facility’s operation, and comply with current Marine Security levels. Those facilities designated as Outer Continental Shelf (OCS) facilities must meet the same security requirements as those designated as waterfront facilities.
When US Navy merchant vessels are in dangerous waters, security detachments are posted on the vessel. Security forces have helped deter piracy as well as terrorist attacks, such as the Maersk Alabama and the USS Cole. US Navy merchant vessels normally train the deck department in firearms training, but the added Navy security detail provides for extra security. Additionally, Navy escorts might sometimes accompany the vessels, such as traveling through the Straights of Gibraltar.
Susan Kare (American, born 1954)
Ink on graph paper
Museum of Modern Art, NYC 2015
"Kare started designing graphic user interface icons for Apple in 1982. Her process, part of which occurred just a few weeks before she was officialy hired at Apple, is documented in graph paper sketchbooks. Using one box to equal one pixel, Kare designed intuitive icons for various functions the computer user might undertake (for example, a pair of scissors symbolizes cutting text). The pictogram icons were designed to be an instinctive language that could be understood by users in many different countries. As well as designing new symbols, Kare mined history and visual culture for existing icons that could be appropriated, from wristwatches (to mark the passing of time) to globe bombs (to indicate grave computing problem). The command key allows users to apply keyboard shortcuts; originally denoted by an apple icon, the now-familiar looped design introduced by Karen in 1984 is based on a Scandinavian map symbol used to denote places of interest".
Museum of Modern Art, NYC 2015
Elevator button, U Street Metro Station, 13th Street side, Washington DC. The Stationmaster has upgraded the passenger interface to compensate for low light conditions and the illegible bas relief lettering on a patinated bronze surface. This probably reduces user confusion with the emergency call button, minimizing accidental false alarms.
Mercedes-Benz's user interface is called COMAND, and it incorporates a numeric keypad that allows quick, safe dialing with a Bluetooth-connected telephone as well as presets for radio.
On other Mercedes-Benz models, the numeric keypad occupies part of the center stack, adding to the clutter there and making the dashboard look intimidating. (I don't mind personally.) The S-class uses this elegant solution, placing the numeric keypad on a small pod on the armrest.
This generation of the Mercedes-Benz S550 (chassis W221) launched in the US with two models - the mainline S550 and the super-expensive S600. Eventually other models were added, including the S400 Hybrid and the S350 Bluetec; both models cost a bit less than the S550 while delivering better fuel economy.
The S350 Bluetec is part of a new generation of clean-diesel German cars meeting California's stringent emissions regulations. These German cars use AdBlue, a proprietary urea solution, to reduce the nitrogen oxide emissions; AdBlue is slowly used up over time, so it needs to be refilled once a year. These vehicles also need the low-sulfur diesel fuel that is common in Europe but was unavailable in the US until 2007 or so.
In the US, diesel-powered cars have limited appeal, partly because only selected gas stations have diesel, partly because diesel fuel often costs much more than gasoline (wiping out the diesel fuel economy advantage), and partly because the late 1970s General Motors diesels, hastily converted from gasoline power and notorious for engine failures, had left a bad taste in the motorists' minds.
Seen at Los Angeles International Auto Show, 2011.
Design of a user login interface. There is nothing new, just a modification of it.
If you need any design work be it graphic or web design, please contact me at design@mohdrafie.co.uk
30% off for web hosting if you don't have any. Cheers!
Screenshot of the optimal reading distance index in PosterGenius, a new software application specifically designed to allow you to create effective scientific, academic and engineering poster presentations quickly and easily.
PosterGenius informs you in real-time about the optimal distance by which the content of your poster will be easily readable in the conference hall. If the distance is good for an average conference area, PosterGenius marks the index with a green background color. Otherwise, it marks it with an orange or red shade, depending on how severely off-range this distance is, therefore indicating that you should adjust the type size accordingly.
A Palm Zire Z22 handheld computer, one of the last to use Palm OS. I bought it for about $100 in 2005 to replace an older Palm V device. Most of the apps were preinstalled, although there was a way to download them from the Web and sync them to the device. Text input was through a pen writing on the screen. There was no wifi connectivity. I used it mainly as an address book and calendar, and synced them to Palm's excellent desktop application. Per the terms of this creative commons license, please credit "iPod Touch In 30 Minutes" and link to ipod.in30minutes.com if you use this photo.
Microsoft SharePoint 2007 was updated and overhauled so that the user interface and user experience can be radically modified, and customized designs applied.
There is evidence that SharePoint is the Intranet solution of choice for a growing number of firms - but who would have thought that it would also be the solution for their Internet sites as well?
Very impressive.
These are a collection of 12 of favorite of the Top 100 SharePoint Sites. Together with SharePoint they are the winners of the International 2008 Information Style Award.
'Dive Into User-Interface Design and UX' workshop, eighth edition. Powered by NASSCOM 10000Startups. Conducted by Niyam Bhushan at 91SpringBoard, in Gurgaon, Haryana. More details at bit.ly/niyam
LG already announced UX 4.0, its brand new user interface that will be pre-loaded on the G4, but that doesn’t mean we know everything about it. Fortunately, today LG released a fresh video that lets us take a closer look at some of the new features included in UX 4.0.
Besides...
A Palm Zire Z22 handheld computer, one of the last to use Palm OS. I bought it for about $100 in 2005 to replace an older Palm V device. Most of the apps were preinstalled, although there was a way to download them from the Web and sync them to the device. Text input was through a pen writing on the screen. There was no wifi connectivity. I used it mainly as an address book and calendar, and synced them to Palm's excellent desktop application. Per the terms of this creative commons license, please credit "iPod Touch In 30 Minutes" and link to ipod.in30minutes.com if you use this photo.
In Interactive Design 3, students are asked to select from one of three client briefs to develop a social change project. Cherie, Michael and Jay chose to develop a mobile application to assist with earthquake preparedness. The application offers device features, such as RSS, GPS tracking and "bounce location" to sustain user correspondence during disaster relief efforts.
The team divided the roles and responsibilities to tackle strategic review, competitive analysis, moodboards, user experience, information architecture and interactive design.
Learn more about VFS's one-year Digital Design program at www.vfs.com/digitaldesign.
By day (or is it by night?) Anirudh Sharma is an ace hacker, a Google Summer of Code geek, a user-interface enthusiast, and much more. Anirudh's picking up photography tips from me before we start brainstorming for the next day's talk I have to deliver. Anirudh is the main guy who convinced me to come to ECB and help him and his friends ignite the FOSS movement there. touchaddict.blogspot.com
Invited to deliver talks at Rajasthan’s largest and most prestigious engineering college which is spread across 337 acres: the Engineering College of Bikaner (ECB) www.ecb.ac.in/.
ECB has around 6,000 students enrolled on its campus, out of which around 2,500 alone are in IT and Computer Science courses.
Delivered two talks on Linux and Free & Open Source Software (FOSS): ‘How to Avoid the Axe Effect’; and ‘How to Make a Dent in the Universe’. The talks were delivered at the ‘FOSS GN09 event’ which was cleverly dove-tailed with the college’s yearly techfest mega-event, called ‘Sakshama’. An ancient Sanskrit word, ‘Sakshama’ means ‘skilled; competent; adept’. The 2009 incarnation of the event, held from 28th to 31st October, was called ‘Sakshama GN09’, to highlight ‘Generation Next’. www.sakshama.org.
And what a Generation Next! They also sought my help and mentoring in launching their own on-campus Linux Users Group (LUG), www.lugb.in. Am quite impressed with their active mailing-lists and outreach activities. These guys and gals are rocking! Together with its founders, we launched LUG-Bikaner at the ‘Sakshama GN09’ event-night, on an outdoor stage in front of an audience of over 2,500.
ECB has around 1,200 computers on-campus, and with the personal laptops and desktops of students, totals at around 4,000 PCs. Till date, LUG-Bikaner has migrated over 500 computers to Linux, and still counting. Plus, they also reach out to other colleges and institutions within Rajasthan to spread the awareness of this ‘muft and mukt’ vision of computing. After all, who can understand freedom better than the royal state of Rajasthan in India?
After mightily struggling to get continuous autofocus to work with the 5DSR, I finally a got the hang of it somewhat. I am still learning to use the Canon user interface, but I can see that I have only scratched the surface of the autofocusing capabilities Canon cameras have.
It is amazing how many different focus modes are in the Camera, with many variations within each. It goes far beyond anything I have seen in Nikon, Sony or Leica cameras. Hopefully, I will learn some of the tricks.
Now that I have the basics working, the focus accuracy is excellent. These cars were not moving super-fast - maybe about 50 km/h (30 mph). So the bar was relatively low. The real challenge will be with fast moving subjects like birds. I will be taking more test shots.
The above image is actually a screen shot of my LightRoom app. It shows one frame selected out of a sequence of 12 images shot in the burst mode, at 5 fps. The view is actual pixels at 100%. My target was the license plate of the approaching car, with center point focus selected. In the fifth and last frames, my target was blocked by cars passing in the other direction.
I marked all the frames with accurate focus with 5 stars. In this sequence, frame #6, which was right after #5, the focus was slightly off. But in all the other frames, the 5DSR nailed the focus.
Hearthstone: How to Create an Immersive User Interface Derek Sakamoto | Senior User Interface Designer, Blizzard Entertainment Location: Room 3020, West Hall Date: Wednesday, March 4 Time: 11:00am - 11:30am
A Palm Zire Z22 handheld computer, one of the last to use Palm OS. I bought it for about $100 in 2005 to replace an older Palm V device. Most of the apps were preinstalled, although there was a way to download them from the Web and sync them to the device. Text input was through a pen writing on the screen. There was no wifi connectivity. I used it mainly as an address book and calendar, and synced them to Palm's excellent desktop application. Per the terms of this creative commons license, please credit "iPod Touch In 30 Minutes" and link to ipod.in30minutes.com if you use this photo.
Went super hard with the greebling for the control setup, though i wish i did more for the suit overall.
This diagram is an exploration of the future of interactive television. Drawn at Harvard Square while eating breakfast with Paige Saez after the conference MIT's Futures of Entertainment 3.
Design Museum, Kensington High Street July 2017.
California - designing freedom.
How did California come to have such a powerful influence on contemporary design? California: Designing Freedom explores how the ideals of the 1960s counterculture morphed into
tech culture of Silicon Valley, and how ‘Designed in California’ became a global phenomenon.
The central premise is that California has pioneered tools of personal liberation, from LSD to surfboards and iPhones. This ambitious survey brings together political
posters and portable devices, but also looks beyond hardware to explore how user interface designers in the San Francisco Bay Area are shaping some of our most common daily experiences.
By turns empowering, addictive and troubling, Californian products have affected our lives to such an extent that in some ways we are all now Californians.
How did California come to have such a powerful influence on contemporary design? California: Designing Freedom explores how the ideals of the 1960s counterculture morphed into the tech culture
of Silicon Valley, and how ‘Designed in California’ became a global phenomenon. The central premise is that California has pioneered tools of personal liberation, from LSD to surfboards and iPhones. This
ambitious survey brings together political posters and portable devices, but also looks beyond hardware to explore how user interface designers in the San Francisco Bay Area are shaping some of our
most common daily experiences. By turns empowering, addictive and troubling, Californian products have affected our lives to such an extent that in some ways we are all now Californians.
HemeshGui is a graphical user interface I made for the excellent Hemesh library by Frederik Vanhoutte. HemeshGui can render shapes directly in Sunflow via Christopher Warnow's SunflowApiApi. These are some of the first things I made with it! ;-)
Blogpost: CreativeApplications
Source Code: Google Code
The Design Revolution continues with another workshop on 30th-31st Oct, 2015 at 91Springboard, Gurgaon. With Co-Founders, CEO, Directors, Product Managers, Software Enigineers, Junior Software Developers, Art Supervisers, Growth Hacker and more.Companies like Tagos, Digilogues, Seclure Technology, Whizkidz Media, 99Acres, Dijyo Spiritual Pendants, 91Springboard, Urbane Concepts Pvt Ltd and ADOBE.Powered by NASSCOM 10000 Startups and SHEREOS.IN.
After the online radio player we launched last year, we decided to start another R&D project: presenting our best content in a multimedia magazine running on the iPad…
In collaboration with Fabian Tilmant – Fabnet (concept and project management), Ali Nassiri – Digital Park (user experience and user interface), Anthony Janssens – Datasmart (programming), Julien Mourlon – Laid Back (consultant) & Caroline Maerten – Rolling Talks (consultant)
More about this project soon!
The Design Revolution continues with another workshop on 30th-31st Oct, 2015 at 91Springboard, Gurgaon. With Co-Founders, CEO, Directors, Product Managers, Software Enigineers, Junior Software Developers, Art Supervisers, Growth Hacker and more.Companies like Tagos, Digilogues, Seclure Technology, Whizkidz Media, 99Acres, Dijyo Spiritual Pendants, 91Springboard, Urbane Concepts Pvt Ltd and ADOBE.Powered by NASSCOM 10000 Startups and SHEREOS.IN.
The Design Revolution continues with another workshop on 30th-31st Oct, 2015 at 91Springboard, Gurgaon. With Co-Founders, CEO, Directors, Product Managers, Software Enigineers, Junior Software Developers, Art Supervisers, Growth Hacker and more.Companies like Tagos, Digilogues, Seclure Technology, Whizkidz Media, 99Acres, Dijyo Spiritual Pendants, 91Springboard, Urbane Concepts Pvt Ltd and ADOBE.Powered by NASSCOM 10000 Startups and SHEREOS.IN.