Category: technology
-
On Hiring Talent (Not Just Programmers)
You could hire through open source like GitHub (“we hire ‘The Girl or Guy Who Wrote X,’ where X is an awesome project we all use or admire”) or use a check-list to recognise competency (passion, self-teaching, a love of learning, intelligence, hidden experience and knowledge of a variety of technologies) and no doubt find…
-
The Statistics of A/B Testing
Whether or not you believe this to be (as Joel Spolsky does) the “best post [ā¦] about A/B testing, ever”, it definitely is one of the easiest to understand and one of the few posts on split testing that is statistically sound (i.e. useful). Is [a given A/B test] conclusive? Has [variant] A won? Or…
-
Apple, Disney and Pixar: It’s the Products
Written in early 2006 shortly after Disney’s acquisition of Pixar in a $7.4 billion all-stock deal, BusinessWeek looks at the relationship between the Disney and Apple CEOs and where their relationship may lead. Prescient in that it accurately predicted the Apple TV and the iPhone, the article also briefly looks at Jobs and his product-first…
-
Seven Psychological Principles Con Artists Exploit
Inherent human vulnerabilities need to be taken into account when designing security systems/processes, suggests a study that looks at a dozen confidence tricks from the UK TV show The Real Hustle to determine recurring behavioural patterns con artists use to exploit victims. The study was a collaboration between Frank Stajano of the University of Cambridge…
-
Anti-Patterns
I’ve written about design patterns a couple of times in the past, but today I discovered anti-patterns: design patterns that “may be commonly used but [are] ineffective and/or counterproductive in practice”. One of the “key elements present to formally distinguish an actual anti-pattern from a simple bad habit, bad practice, or bad idea”: Some repeated…
-
The Importance of Information Literacy
The future of the Internet as a credible source of information is under threat due to the proliferation of spam and inaccurate information online, suggests Howard Rheingold, proposing that the most efficient way to counter this worrying trend is for “a great many people [to] learn the basics of online crap detection and begin applying…
-
Resources on the Psychology of Security and Risk
Professor of Security Engineering at the Computer Laboratory, University of Cambridge, Ross Anderson, has compiled a comprehensive resource page on the psychology of risk and security. The resources themselves are divided into seven section, to wit: Introductory Papers Deception Security and Usability Social Attitudes to Risk Behavioural Economics of Security Miscellaneous Papers Other (Conferences, Websites/Blogs,…
-
The New Rules of The Fold
In 1996, while discussing the importance of the inverted pyramid style of writing, usability expert Jakob Nielsen wrote that “users don’t scroll”. From there the idea of The Fold as an integral part of web design came into being. But, as Nielsen himself has said, the Internet has evolved and “as users got more experience…
