System Architecture

System Architecture

7447 bookmarks
Custom sorting
Persuasive strategies to build sustainable user engagement - Usability Geek
Persuasive strategies to build sustainable user engagement - Usability Geek
Don’t just copy persuasive design. It will backfire. Here’s how to successfully build persuasive design into your larger strategy. Persuasive design elements like points, badges, reputation, and scarcity warnings are meaningless as stand-alone systems, but can be helpful in supporting a larger strategy as a use experience unfolds over time. For Persuasive design elements to …
·usabilitygeek.com·
Persuasive strategies to build sustainable user engagement - Usability Geek
Digital autonomy and the GNOME desktop
Digital autonomy and the GNOME desktop
While GUADEC, the GNOME community's annual conference, has always been held in Europe (or online-only) since it began in 2000, this year's edition was held in North America, specifically in Guadalajara, México, July 20-25. Rob McQueen gave a talk on the first day of the conference about providing solutions that bring some level of digital safety and autonomy to users—and how GNOME can help make that happen. McQueen is the CEO of the Endless OS Foundation, which is an organization geared toward those goals; he was also recently reelected as the president of the GNOME Foundation board of directors.
·lwn.net·
Digital autonomy and the GNOME desktop
UI-Patterns.com
UI-Patterns.com
User Interface Design Pattern Library. UI patterns for web designers. See screenshot examples and learn how to do great design like the pros.
·ui-patterns.com·
UI-Patterns.com
Add psychology to your web design
Add psychology to your web design
On popular demand, we’re now printing the Persuasive Patterns collection as a huge poster you can hang in your office.
·shop.ui-patterns.com·
Add psychology to your web design
$ docker build -f Mockerfile.yaml .
$ docker build -f Mockerfile.yaml .
A proof-of-concept docker image definition that can be natively built with the Docker CLI
·matt-rickard.com·
$ docker build -f Mockerfile.yaml .
Request for Product: Typescript Docker Construct
Request for Product: Typescript Docker Construct
Dockerfiles are a constant source of frustration in the container ecosystem. First, they are difficult to write (well). They can't express all types of build graphs – only linear graphs are easily expressible, limiting the amount of parallelism one can do (i.e., how fast your builds can be). Finally, they
·matt-rickard.com·
Request for Product: Typescript Docker Construct
Spectrum of Reproducibility
Spectrum of Reproducibility
Spend any time in complex systems and you know the first line of defense against tough-to-debug bugs is a reproducible process. You'd think that most software we write is reproducible – but there are many places where it isn't. Files get overwritten. Different machines have slightly different configuration. One step of
·matt-rickard.com·
Spectrum of Reproducibility
Every Sufficiently Advanced Configuration Language is Wrong
Every Sufficiently Advanced Configuration Language is Wrong
Every sufficiently advanced configuration language is the wrong tool for the job. For basic configuration, YAML or JSON is usually good enough. It falls apart when you try to do more: * Template it with a templating engine * Use esoteric language features to reuse code (anchors and aliases) * Patch or modify
·matt-rickard.com·
Every Sufficiently Advanced Configuration Language is Wrong
My Notes on GitLab Postgres Schema Design
My Notes on GitLab Postgres Schema Design
I spent some time going over the Postgres schema of Gitlab. GitLab is an alternative to Github. You can self host GitLab since it is an open source DevOps platform. My motivation to understand the …
·shekhargulati.com·
My Notes on GitLab Postgres Schema Design
Design patterns
Design patterns
There are various design patterns used in UX Design practice. User Interface Design Patterns are used to choose the right input type, form…
·medium.com·
Design patterns
Persuasive Design: Using Advanced Psychology Effectively
Persuasive Design: Using Advanced Psychology Effectively
Persuasive design isn’t evil. It’s a tool, and like any tool, it can be misused. However, with the right research and thoughtful application, it can be a valuable addition to any designer’s toolkit. Using persuasive design, social and psychological principles can be used to influence user behavior.
·toptal.com·
Persuasive Design: Using Advanced Psychology Effectively
Breaking Down Persuasive Design Principles
Breaking Down Persuasive Design Principles
When used properly and ethically, persuasive design principles are powerful tools for building meaningful products that help people make better decisions and boost UX. #product #startup #tips #web #app #design #ux #ui
·toptal.com·
Breaking Down Persuasive Design Principles
UX Design Patterns You Should Focus On
UX Design Patterns You Should Focus On
Aiming to provide the best possible user experience? UX design patterns allow you to build interfaces and solve the most common issues.
·uxpin.com·
UX Design Patterns You Should Focus On
The Best Collections of Real UX/UI Design Patterns
The Best Collections of Real UX/UI Design Patterns
Looking for inspiration and examples of best practices for designing your apps, software, screen flows and products? Look no further than this comprehensive collection of Design Pattern resources.
·designerup.co·
The Best Collections of Real UX/UI Design Patterns
Authentication and Authorization Flows
Authentication and Authorization Flows
Learn about the various flows used for authentication and authorization of applications and APIs.
·auth0.com·
Authentication and Authorization Flows
10 Things You've Been Wondering About FIDO2, WebAuthn, and a Passwordless World
10 Things You've Been Wondering About FIDO2, WebAuthn, and a Passwordless World
Yubico has been working closely with Microsoft, Google, the FIDO Alliance and W3C to create and drive open standards that pave the way for the future of passwordless login. Learn more about the most commonly asked questions regarding FIDO2, the Security Key by Yubico, and the evolution of a passwordless world.
·yubico.com·
10 Things You've Been Wondering About FIDO2, WebAuthn, and a Passwordless World
What is FIDO Universal 2nd Factor?
What is FIDO Universal 2nd Factor?
U2F was developed by Yubico and Google, and contributed to the FIDO Alliance after it was successfully deployed for Google employees.
·yubico.com·
What is FIDO Universal 2nd Factor?
FIDO Alliance and W3C have a plan to kill the password – TechCrunch
FIDO Alliance and W3C have a plan to kill the password – TechCrunch
By now it’s crystal clear to just about everyone that the password is a weak and frankly meaningless form of authentication, yet most of us still live under the tyranny of the password. This, despite the fact it places a burden on the user, is easily stolen and mostly ineffective. Today, two …
·techcrunch.com·
FIDO Alliance and W3C have a plan to kill the password – TechCrunch
FIDO Alliance and W3C Achieve Major Standards Milestone in Global Effort Towards Simpler, Stronger Authentication on the Web - FIDO Alliance
FIDO Alliance and W3C Achieve Major Standards Milestone in Global Effort Towards Simpler, Stronger Authentication on the Web - FIDO Alliance
With support from Google Chrome, Microsoft Edge and Mozilla Firefox, FIDO2 Project opens new era of ubiquitous, phishing-resistant, strong authentication to protect web users worldwide  MOUNTAIN VIEW, Calif., and https://www.w3.org/ […]
·fidoalliance.org·
FIDO Alliance and W3C Achieve Major Standards Milestone in Global Effort Towards Simpler, Stronger Authentication on the Web - FIDO Alliance
HTTP Message Signatures
HTTP Message Signatures
This document describes a mechanism for creating, encoding, and verifying digital signatures or message authentication codes over components of an HTTP message. This mechanism supports use cases where the full HTTP message may not be known to the signer, and where the message may be transformed (e.g., by intermediaries) before reaching the verifier. This document also describes a means for requesting that a signature be applied to a subsequent HTTP message in an ongoing HTTP exchange.
·httpwg.org·
HTTP Message Signatures