#UbiNET twin #AI #Blockchain with mutating #security #algorithm

UbiNET platform architecture is built on two key components;

  • a twin blockchain written in an AI codebase called Ubi developed specifically for UbiNET
  • a mutating security algorithm derived from the unique platform functional architecture

By interlinking the security algorithm derived from every transaction only the next ordered AI blockchain knows what the structure of an acceptable contract is.

More to follow…….

Tagged : / / / / / /

#Project #Charlemagne #UIoT, the #unification of the #IoT

Paradigm Interactions has decided to get involved in building products to service the IoT marketplace.

Project Charlemagne is a unification project that links existing technologies with a high-level strategy and vision for financial benefits for those who implement it and gain insights from it.

Project Charlemagne is using Ethereum smart contracts to establish uniquely identifiable items in an IoT network effectively establishing a secondary handshake protocol for network access, that manages policies and identities, this will also allow us to simplify the data that IoT objects require and use ambient power tagging. Some of the sensor technologies do not exist in the format we require yet and we are engaged with medical sensor companies to develop ones that will work with our system.

“Our first product is an IoT retail platform intended to support the mapping of the birth to death (and everything in between) journey of retail products.” says CEO Karl Smith.

While this first version is not as polished as the offerings of major consultancies it does have proprietary information schema, data architecture and ambient power sensor systems that enable IoT item tracking from birth to recycling.

“The opportunities are endless with item level IoT, our whole world becomes a data source, we can deal with anti-social behaviour on an item level, waste and recycling and finally connect product makers to their end customers.” says CEO Karl Smith.

While Paradigm Interactions has already fixed a number of critical problems in regard of enterprise architecture, ontologies and micrometa, component technology working on ambient power requires additional investment to convert real-world interactions into digital insights.

This project remains in development until we can establish a true testbed in a single domain within FMCG.

Until the IoT retail platform is complete Paradigm Interactions focus will remain on client enablement though its IoT Products service.

Tagged : / / / / / / / / / / / /

#Information Architecture (IA) the #classification of #information

A simple website may only include 8 top level pages, 50 secondary and perhaps only 300 tertiary labelled (taxonomy) navigation elements, that’s only 358 entities. However, Information Architecture tends to be associated with the structure and classification of websites, intranets and software that accesses in excess of 100,000+ separate entities to be classified. I have worked on several huge taxonomies for Government, Publishers, Colleges, Universities, Insurance Companies and Banks involved in trading that involve between 1,000,000 and 25,000,000+ entities.

An Information Architect embarking on a new project will investigate if there is a standardised ontology for the project domain and conduct a content audit.

An ontology is a formal naming and definition of the types, properties, and interrelationships of the entities that really or fundamentally exist for a particular domain.

For example, if the project is a United Kingdom, Government project then there is a standard ontology and a classification of entities within a taxonomy.

If a standard exists the task is relatively simple but highly time-consuming as it then involves matching the in use ontology with the standardise one. If no standard exists a standard needs to be created. Creating a standard ontology is done through domain research. How do other’s of the same domain describe things, at this point it is worth considering ownership of language in the form of brands, trademarks, patients and de facto standards as a source of information, terms and potential restrictions.

Once the entities have been defined with their attributes and all the potential interrelationships then this is combined with or overwrites the content audit to define the new system taxonomy.

However, there may be multiple audiences looking at the same content from different perspectives. For example in educational publishing the audiences could be;

  • Distributors
  • Sellers
  • Institutions
  • Teachers
  • Pupils
  • Parents

Each one of these groups will have a very specific context of use when looking for content, the descriptions they use and understand to find it and their underlying purpose in doing so. In this case, they will each require a separate structure around an entity and may require their own version of the ontology.

Additionally there are criteria that operated as informational facets (now commonly associated with faceted search) which act as secondary entities;

  • ISBN
  • Bulk price
  • Unit price
  • Country standards
  • Regional standards
  • Education level
  • Education target
  • Education skills
  • Education method
  • Exam board
  • Exam year
  • Pupil/student age
  • Content subject
  • Content brand
  • Content group
  • Content purpose
  • Language
  • Language Tone of Voice
  • Media type
  • Media format

The above entities enable the audiences to find the content assets that meet their specific needs. It is very important at this stage not to confuse entities with hierarchies. Hierarchies are the structuring of entities in a direct or indirect relationship that are above or below (immediate superior or subordinate) this also includes cross related relationships. As previously mentioned there may already be standard hierarchies in the domain in question that should be observed.

But how do you find these entities in any domain?

Taking the above example the standard hierarchy in publishing is ISBN a review of several entities within a single ISBN item will reveal many of entities above. To get the rest research is required (it cannot be done any other way);

  1. Find out who the audience is and what is their objective?
  2. Find out what are the rules, laws and governance?
  3. Find out who buys, distributes, delivers, services, resells and what their relationship is to the originator?
  4. Find out specifically who the audience is currently, competitor and target audience?

Define ‘What is the smallest component of viable (useful) information?’ and use that to model the information system. I have worked with several huge education providers and universities and the questions I ask is, ‘What is a course?’;

  • A course has a title
  • A course has duration, with a start and an end
  • A course has a subject
  • A course has a level
  • A course has prerequisites
  • A course has an outcome, which leads to options
  • A course has a delivery mechanism

I also ask, ‘Who is a student?’, ‘Who is a tutor?’, ‘What is an outcome?’ even ‘What is a college?’, if a course has a regular location then this creates a secondary set of entities.

  • A location has an address, telephone number, email address
  • A location has facilities
  • A location has transportation links
  • A location has a community
  • A location has accommodation

And it goes on and on, this is Information Architecture 101.

This is a repost from an article first published in 2007.

About the Author

Karl Smith is Computer Scientist or as he describes himself a Creative Scientist. He has a BA in Design from the 1980’s and an MSc in Interactive Technologies for E-commerce from the 2000’s. His MSc was technically focused with a large portion given over to Transformation and Very Large Databases, data warehouses, Data Mining, online analytical Processing (OLAP), web browsers and search engines, optimisation, recovery and backup, database connectivity technologies. Including writing SQL.

Karl Smith is an acknowledged leader in the field of Human Centred Design, User Experience and Usability and has been honoured with a Fellowship by the British Computer Society. He is also the Founder of several organisations including The Human Centered Design Society.

Tagged : / / / / / / / / / / / / / /

O2 support has awful usability

O2 gets points for trying

I like other users were quite happy when O2 decided to spend some time and money to tie together their various online systems to at least give the appearance of a unified system. You can tell it’s all user experience and no information architecture though, everything links so there are no dead ends, unfortunately the information being sought is missing it’s an annoying merry go round.

Lucy help box in O2O2 fakes live support

The thing that I cannot think of an excuse for is an automated support search tool built to look like live support. Dear Lucy you gave me hope, then you took it away, you made me think O2 cared about me and the business I bring them. But no your not real your a search tool, that’s not really all that good. Changing interactive and interaction metaphors is indeed very brave and extraordinarily stupid as it aggravates users. For users in a support system the normal response is to look for another service supplier or phone up to vent on someone.

Still at least there was a feedback form for me to say how pathetic the experience was. Feedback form for fake live support

Tagged : / / / / / / / / / / / / / / / / /

#UX #requirements #gathering methods #determine #value

Requirements gathering methods determine value

There are lots ways to elicit UCD requirements so I don’t intend on listing them all here, what I will note are some of the effective ways that I utilise. They can be described as structured, unstructured or a mixture of the two, but importantly the methods produce differing depth of requirements dependant not only on the method but on the skill of the facilitator and the characteristics of physical location used. In effect the method used is limited by the capability of the facilitator.

Research Structure

It is critical to determine if there is enough usable information around the project to be able to establish a valid research start point. Get the questions right and the answers follow, get the questions wrong and you’ll waste a fortune. If your unsure carry out a pilot study to find out what the questions are.

Methods

Observational / Reflective

Asking users to carry out their normal activities while being observed does take quite a bit of setting up so that the activity data is not skewed as a result of the observation. It is critical not to participate or lead the user. It is especially common when users are told the fine detail about the project; they will try to give you what they think you want. Often this is because they feel threatened by the process, the old notion of time and motion leading to them getting sacked is embedded in British culture. However this type of method is very useful in a pilot study to determine what type of activities should form the basis of questioning or workshop based co-creation.

Narrative

Narrative is about stories, like the narrator in a play, they see the whole thing being able to talk in the present, remind of the past, note the future or describe a similie that others can relate to even if they cannot yet relate to the main story.

Asking users to describe how they think something should work (Cognitive Walkthrough), what the differences might be for different user types, how it’s done now, is there anything in other technology or experience that they can relate it to. In this way a multi-path picture can be built up from each participant for each interactive pathway within the new system or technology.

Diagnostic

Diagnostic is about testing something this will often manifest through workshops with groups of people. By setting a group a task or co-creation ‘Design the front page of your new website’ spending ‘K10,000,000 that’s Karl’s currency’ on to meet your goals and noting the group dynamic, decision making and outputs, very rich information is revealed by participants.

Show and Tell

Show and tell is imperative to feed back to participants what has happened to the information they have provided. More it can be used to validate key concepts and project directions in a fairly light environment, where participants can be highly critical knowing that everyone else is in the same frame of reference for that meeting.

Some of the Problems

Although the whole process exists to elicit information suitable to influence the project, some participants will have pet requirements that if not given the correct level of sycophantic response they will seek to invalidate the entire project as it does not represent their vision of what the project is any more. This type of attitude is very common when working with low pay low (self) risk bureaucrats, as they can personally destroy projects then blame it on ‘expensive’ consultants.

Case Study 4

On a national census project that was due to be run online and offline a member of the bureaucratic project team insisted that their opinions were correct on the basis of having won an award for a website ten years earlier. The opinions were very dated to the point of being bad practice, incorrect and were a constant disabler to the project. This client refused to consider an open support system, marketing website (to prepare country) or full language landing pages to support the full ethnic background of the country in question. The day to day engagement was painful, but the UX for the several forms, question logic and user interactions were eventually signed off even though the client never signed off the personas based upon the requirements they gave.

Tagged : / / / / / / / / / / / / /

#Lies damn lies and #user #experience

User experience has in recent years become the greatest area of fraud and theft in business. Because the output documents appear simple huge numbers of people without any formal knowledge of what goes into them are having a go.

Be careful of Fakes

Avoid designers, look for Architects and Consultants, with an MSc and good client references (but not a portfolio) which can be viewed on LinkedIn.

The most common request for people involved in user experience is to produce wireframes (low fidelity pictures) a task that a child could do.

Wireframes should be the container document for standards, insights into target audience expectations, business KPI’s and brand values.

Ignorance in UX can be costly

The real problem is that recruiters and clients don’t know what they should be getting for their money.

A good indicator that someone is ignorant is a request for a portfolio. A portfolio is a set of images that express the capability of a designer involved in architecture, graphics, fashion design etc, but it is not relevant for UX. The reason it’s not relevant is that the complex ideas within wireframes need an expert to review and validate them against standards.

People who want to see a Portfolio are incompetent

If the interviewer does not know the standards, frankly they deserve to be fleeced, it’s like employing a plumber to represent your interests in court instead of a solicitor because they can make a good argument. The action of the argument is not important, even if there are lots of buzz words included because legal matters like usability matters are complex interrelated sets of rules and dependencies.

So unless an expert does the review the activity is pointless, a secondary but probably more damaging problem is ownership, rights and breach of contract.

Wireframes contain information on “How it Works” not “How it Looks”

How something works is the inventive element and belongs to the client. If clients are not protecting their Intellectual Property in UX, they really should be quite aggressive about it, but all contracts have a provision for this protection asking to see UX work from clients is a breach of contract and breach of IP.

Asking people to show a UX portfolio is asking people to breach their contracts.

If you or your team require training on interviewing UX people please contact me.

Tagged : / / / / / / / / / / / / / / / / / /