An amazing video of a five-metre-tall female giraffe wandering into a restaurant at the Lion Park near Johannesburg, as patrons joke and laugh nervously, has gone viral on the internet, appearing on Huffington Post, the Mirror, the New York Daily News and Fox News.Many of the video posts begin with, “So this giraffe walked into a restaurant …”Watch the video:Text by Mary Alexander
Today while on the phone with technology support rep at AppleCare, I actually cried. At first I tried to hide my tears of desperation, but it was obvious so I just “let it go.” I’m real like that. I am now on day four of having no access to my i Cloud, phone or text messaging. The blame is as a result of a combination of factors including a failure on the part of AppleCare, my own failure because I couldn’t remember the answers to the security questions I had put in place. I place more of the blame on Apple because the first technical support person that I spoke with wasn’t exactly forthcoming with the entire process and how this “issue” would limit my work productivity this week.I’ve long been a fan of technology whether consumer or enterprise. I’ve also been a proponent of a single unified technology in HR and across the organization. I say I’ve been a fan because that changed today. The benefits of a HRMS (Human Resources Management System) that is unified seems to be an obvious one. With a single unified system, you are able to use a single login to access all systems or in my case a single login so I can access my own as well as my family’s assortment of Apple smartphones, computers and tablet device. Two iPads, an iPhone, a MacBook air and an iMac are all tied to a unified password and account through my i Cloud.For enterprise HR technology, that might be a suite-based HR technology product, HRMS or an enterprise technology that integrates not just with HR technology products like the HRIS, Payroll, and ATS but also procurement, expense management, scheduling, marketing automation and budgets and forecasting.Convenience or Security When Selecting HRMSThe convenience is awesome. I use a single login to access all the different types of tech. The data, reporting and information just like my i Cloud account syncs with every systems simultaneously. It’s the reason I know when my daughter downloads the new HentriLeWorm app. It’s an IOS app that tells the story of a French worm who is also a chef. He overcomes adversity and wins the chef contest even after the evil villain steals his prize winning French recipe cookbook.I know this because with a unified cloud based technology once my daughter downloads the app on her iPad, it also simultaneously downloads on all other tablet and smartphone Apple device. Which in theory is great until that moment when security is compromised or breached and because it’s unified and cloud based you now have no access to the technology.On Monday, for some reason I wasn’t able to complete the password change on my i Cloud account. It wasn’t accepting the new password I had reset from a few days ago. So I tried to reset my password and inadvertently froze my account. Apple has strict privacy and security rules for good reason. Apple came under fire a few years ago when a hacker completely wiped a Wired journalists Apple account. They (the hacker) took over the journalist’s Twitter and Gmail accounts. I remember setting up security passwords out of fear that something like this would happen to me. It’s the reason I have 2 factor security measures on my Twitter and Facebook accounts in the event I get or someone tries to hack. It’s ironic that my own security measures failed me.Is Your Workplace Tech Protected from Security & Privacy Breaches?As I mentioned we are drawn to the single unified HRMS system because of the convenience. With one simple user ID and password, you are able to access EVERYTHING. Hackers, disgruntled ex-employees and authorized users can access your entire enterprise technology network. They have access with just a login and password putting your organization at high risk for sharing private employee as well as candidate information not to mention financial information and trade secrets of your company. With a single unified system, you are opening yourself up to possible breaches. This simple fact makes me want to hide in my bedroom closet and not face reality. At current I’m hoovered in a corner in a cold sweat having withdraws from my Apple technology. Did I mention I have no access to anything?Hackers at the moment are targeting credit information at companies like Target, Nordstrom and Home Depot, but our employee and candidate information and data is equally at risk. Identify theft is extremely common place. Access into an ATS could result in millions of dollars for the hacker. This is an estimation of what 300,000 candidate and employee social security numbers at $3.25 a piece.We aren’t talking about it, but it’s already happening. Late last year I learned of an organization who had a former employee access the applicant tracking system. Hundreds of emails were distributed to recent applicants. The messages included racist and inappropriate language. The organization reacted quickly talking directly to the candidates impacted. They limited the damage and only told me their story so that I could share the risk that our own HRMS technologies pose to candidates and employees. Their story was shared to me by one of the senior leaders within the organization. It made me think about how much trust candidates and employees place into our organizations and also our HR technology to keep their private information secure. It’s only a matter of time before there’s a major HR technology security breach.Unfortunately single unified systems (HRMS) aren’t going anywhere so it’s a matter of your technical team adding in additional security measures. The future of HR tech might come in fingerprint and retinal scans. Maybe passwords and candidate information is carried in briefcases by company representatives who are handcuffed to that information. The future really just depends on how important security and privacy are to your enterprise company.
A manager for a metro Oklahoma City Academy Sports store is accused of embezzling more than $100K in merchandise. Investigators allege between January 2017 and August 2018, Brandon Mace stole several items from two stores that he later sold on eBay. One of their loss prevention associates tipped Academy off after seeing suspicious sales online. GoPro cameras, Yeti coolers, and Fitbit watches, were among the stolen merchandise.According to court documents former Academy Sports and Outdoor Manager, Mace sold it all and pocketed the cash.Investigators say they have the eBay transactions to prove it. Using his store issued laptops, investigators say Mace listed multiple items for sale, so many, he eventually caught the attention of a watchful loss prevention manager.The LP manager initiated an investigation after finding multiple new items for sale with the Academy price tags still intact. After the eBay accounts profile information, to include phone numbers, names, and addresses checked back to Mace, the manager was confronted on the job and terminated. Mace allegedly denied any wrong doing, however, investigators say video surveillance proves otherwise. Academy released a statement saying they were cooperating with law enforcement on the matter. [Source: NewsOn6]- Sponsor – Stay UpdatedGet critical information for loss prevention professionals, security and retail management delivered right to your inbox. Sign up now
Role of Mobile App Analytics In-App Engagement What it Takes to Build a Highly Secure FinTech … sarah perez Tags:#Apple#mobile#privacy#security#web Why IoT Apps are Eating Device Interfaces A surveillance firm is now selling a spyware application for Apple’s new slate computer, the iPad. With this software installed, users can secretly track activity including emails sent and received, web sites visited and contacts added to the iPad’s address book. The information is surreptitiously recorded to a log file which is then uploaded to the Web whenever the iPad has an Internet connection. Afterwards, the user doing the spying can review the data from any computer connected to the Web, with no further need to gain physical access the iPad. Jailbroken OnlyBefore going any further, it’s important to make one thing clear: this application is not found in Apple’s iTunes App Store nor can it be installed on iPads that have not been jailbroken. Jailbreaking, the act of hacking the iPad to run unapproved third-party applications, is not something the majority of iPad owners will do. However, power users often jailbreak their Apple mobile devices, a lineup which includes iPads, iPhones and iPod Touches, because doing so allows for more features and functionality. For example, on a jailbroken iPhone, you can turn your device into a Wi-Fi hotspot. You can also enable multitasking by allowing applications to run in the background and you can completely customize the look-and-feel of the device from battery indicators to icons. The latest software for jailbreaking the iPhone and iPad is also incredibly easy to use – perhaps the easiest to have ever been released thus far. Within minutes, the process is complete and you have full control over your device.Mobile Spy: Kids, Employees, Spouses be Warned!With the new spyware software, dubbed “Mobile Spy,” users can track the activities of anyone who owns an iPad once the app is installed on the device where it runs in stealth mode. Although the nature of this software makes its legality sound questionable, the vendor gets around this issue by explaining that it’s ideal for tracking a child’s Internet behavior, just like the numerous applications for Mac and PC that do the same. (Children, it seems, don’t have the right to not be spied on by their parents.) But software like this won’t just be used as a parental control mechanism, says security researcher Graham Cluley, it will likely be used for more nefarious reasons too, like checking to see if a spouse is cheating or perhaps even criminal purposes. However, at a price point of $99.97 per year, only the most serious of stalkers will likely install it on victims’ devices. For everyone else, there’s still the old-fashioned method of snooping – checking the web browser’s history or simply reading through someone else’s email. The Rise and Rise of Mobile Payment Technology Related Posts
“(T)he law’s critics do not believe that giving the federal government the right to shut down websites at will based upon a vague and arbitrary standard of evidence, even if no law-breaking has been proved, is a particularly good idea.”Azerbaijani bloggers released. Adnan Hajizade and Emin Milli were arrested on July 8 of last year after being beaten “while dining with a group of other civil society and youth activists in a downtown Baku restaurant.” The youth activists and bloggers were both released within the past week. U.S. hacker detained, interrogated at airport. In similar wise to the temporary detention of Wikileaks volunteer Jacob Appelbaum in August, this week “Moxie Marlinspike” was also stopped and searched. U.S. Customs and Border Protection took the security consultant into custody at JFK when he stepped off a flight from the Domican republic and searched his laptop and phone. He refused to give them passwords and the devices were returned. He said he had no intention of using them now that they were in government hands. An airport exception in American law allows warrantless searches of those returning from foreign countries. Azerbaijan photo by Nick Taylor Tags:#Government#international#web Kareem Amer finally freed. Egyptian blogger Abdul Kareem Nabeel Suleiman, whose blogger name is Kareem Amer, was released this week after being held past his due date and beaten by secret police. Kareem served his four year sentence plus another week and a half. Kareem had criticized his religion, Islam, and its actions toward women and toward Egypt’s Coptic Christian minority. He also criticized the government of President Mubarak. For that he was jailed, where he was beaten and denied elemental rights. He is, mercifully, back at home with his family and out of the public eye for a while. Egypt used Facebook to flush anti-religious West Bank blogger. Walid Husayin, who was arrested last week, was found out in part by investigations carried out via Facebook. Many, possibly all, governments use Facebook and other social media tools to create fake profiles for the purpose of following and observing alleged threats. That seems to be the case in part for Walid. Chinese Twitter users gets one-year in labor camp for tweet. Cheng Jianping has wound up in a Chinese “re-education camp” based on a few words appended to a retweet. Mocking nationalistic vandalism that flared up around a Chinese-Japanese dispute over the ownership of uninhabited islands, she retweeted another’s message and added the ironic admonition, “Charge, angry youth!”Youngest imprisoned blogger on trial in Iran. 18-year-old blogger and women’s rights activist Navid Mohebbi is on trial, if you can call it that. He is in front of a “revolutionary” court in the northern Iranian city of Amol. He is the youngest blogger currently under arrest. His attorney is not allowed to be in the court room with him. U.S. Senate judiciary committee approves online censorship bill unanimously. The Combating Online Infringement and Counterfeits Act (COICA), is an attempt to make it easier to shut down sites that are infringing on legitimate copyright. The problem is that it also will, if it becomes law, make it much easier to shut down any site at any time for the barest of reasons. As Wired put it: curt hopkins Related Posts A Web Developer’s New Best Friend is the AI Wai… Top Reasons to Go With Managed WordPress Hosting Why Tech Companies Need Simpler Terms of Servic… 8 Best WordPress Hosting Solutions on the Market
(Large preview)ColumnsOne of the frequent features of complex tables is pinned columns. Usually, columns that contain key information, for instance, element names or statuses, are not scrollable. (Large preview)Note that the cursor is different when hovering over read-only and editable cells. Clicking on them triggers either selection of a row or going to the editing mode of the editable cell.In the next image, you can see that people can select one or multiple rows: (Large preview)In A NutshellStart with the smallest components, then gradually move towards bigger ones . Finally, mock up the whole thing.Think about all of the possible states for each component beforehand.Use Occam’s razor principle to keep the number of elements minimal yet sufficient.Recommended reading: Design Systems by Alla Kholmatova3. Define InteractionBuilding blocks aren’t enough for such a complex interface piece as a table. A designer should think about “the rules of the game” and design logical principles and conventions behind the visual part. I’ll describe some typical things you’ll need to consider.Numeric DataHow many decimals should numbers have in your table? One, two, five? What is the optimal precision level? I decide based on the accuracy users need for making the right decision. In some professions, fluctuation between 10932.01 and 10932.23 matters, whereas in other areas numbers 14 and 15 don’t really make a difference.This is an example of numeric data rules my team used in a sophisticated engineering product.LengthTwo decimals (57.53 m, 3.16 km); spaces are used as thousand separators (403 456.56 m).WeightTwo decimals (225.08 kg, 108.75 t); spaces are used as thousand separators (12 032.17 kg).MoneyTwo decimals ($9.45); commas are used as thousand separators ($16,408,989.00).DiameterThree decimals (10.375 cm); no separators needed.Latitude and longitudeEight decimals (26.4321121); minus sign used for the western longitude and southern longitude (-78.05640132).DefaultFor units not listed above — two decimals (32.05 g/m³, 86.13 C°).One more thing we considered was the difference between the “true” data saved on servers and “approximated” data in the interface. The system used extremely accurate numbers with dozens of decimals in all calculations but people didn’t need to see it all the time. So we decided to show the number of decimals described above and expose the full number only when a table cell is active. For example, an engineer could enter 134432.97662301, and once he pressed Enter, the table showed 134 432.98. After clicking one more time, the engineer would see 134432.97662301 again.Input ValidationUnlike the previous item about numbers, validation is important only for editable tables. It has two aspects. Firstly, the rules that qualify the entered data as valid or invalid. Secondly, either the messages that help to correct invalid data or mechanisms that fix it automatically. Usually, validation rules are too complex to reflect them in mockups or prototypes. So, designers can document them textually or in the format of flowcharts.This is an example of message templates I once used. Text in angle brackets is dynamic and comes from the calculation engine or database.Should be greater than number measurement unit. Optional explanation.Should be less than number measurement unit. Optional explanation.Should be between number 1 and number 2 measurement unit. Optional explanation.Min value should be less than max value.Max value should be greater than min value.Min and max values should not be equal.CommandsEditable tables with toolbars usually need a set of rules when toolbar commands are enabled and when disabled. These states can depend on the fact that a row is selected, on the number of selected rows, on the position or content of the selected row or rows, and other conditions. Below is one of the numerous ways to document such logical rules.So, we have a table with some chemicals. It has such commands as “Add a row”, “Move up”, “Move down”, Delete”, “Recalculate”, and “Settings”. (Large preview)Now we can try to combine different elements and see if it works. Here are some examples. (Large preview)The date picker filter has a calendar and works like its cell equivalent. It’s good to allow users both enter the date manually and pick from the calendar. If they know what they are searching for, it’s much easier to type than click.One more important thing is to format any meaningful input automatically and not to bother people with “invalid format” errors. On one of my projects, we allowed entering such dates as 01/25/2017, 6.12.17 and September 4 2016, and also filter by a month or year only. (Large preview)In my example, there are three types of filter boxes. The alphanumeric filter enables search by letters and numbers. It supports wildcards — unknown number of unknown characters. For instance, if I type 45*A1, it might result in showing the rows with such values as 45A1, 45982A1B, 45A109B and 096445-A1.Wildcards are a tricky feature since they depend on people’s habits. When I designed tables for technical specialists, we assigned the asterisk sign (*) to the unknown number of unknown symbols. For insurance analysts, I chose traditional SQL symbol — the percentage sign (%) — because they were used to it. As for the dropdown filter, it switches between a certain number of mutually exclusive text options, numbers or numeric ranges. How To Architect A Complex Web Table How To Architect A Complex Web Table Slava Shestopalov 2019-02-06T13:00:00+01:00 2019-02-06T12:04:36+00:00Imagine you design a system for data researchers. Or an application for energy management. Or a dashboard for corn traders. Maybe you’re designing something like that right now. In all the mentioned cases, people will expect tables. Not those fancy ones from design inspiration sites but Excel-looking monsters with hundreds of cells and complex interaction.In this case, a designer faces many challenges. For instance, matching design with existing frontend frameworks or struggling with “uncomfortable” data that smashes the layout. We’ll overcome these problems by means of the following steps: systematize needs, go atomic, and define interaction. (Large preview)Search TableThe cells are not editable, the header has filter boxes and sorting controls, it’s possible to select rows. From my practice, such tables help to find, compare and select an item or several items out of a large range. For instance, filter out five of six thousand irrelevant tools from a catalog and then choose one needed tool. HomeWeb DesignHow To Architect A Complex Web Table (Large preview)Rows And HeadersWhen cells are designed, you can make rows and see if various combinations work well together. Once I designed a table that had complex editing logic. Some of the properties were provided by users, whereas others were automatically calculated or populated with default values. Below is a mix of read-only and editable cells within one row. (Large preview)When I design web applications, I usually think about at least three types of containers for tables. The most typical case is when a large table is the center of a screen and occupies as much space as possible. Such a table might not have its own title since the whole screen is devoted to working with the table. Small and medium tables can become autonomous modules of a dashboard as well as other items like graphs, diagrams, schemes. In this case, the top bar of a table plays the role of the card header. And finally, in large enterprise applications, tables often exist inside of popup dialogs. There should be wise guidelines so that dialogs don’t blow up because of too much content.Another aspect of placing a table in the UI environment is the available screen area. The majority of enterprise applications are meant to be used primarily on the desktop. Table responsiveness is limited to simple stretching and squeezing behavior. Typically, tables with lots of rows and few columns occupy 100% of the available width. As a result, cells are evenly distributed on the screen, and more text can be shown without truncation of wrapping. On the other hand, huge gaps usually appear between columns, which contradicts the design law of proximity. That’s why some applications use lines between the rows or white-end-gray zebra coloring to make information better readable. (Large preview)On one of my projects, we defined the minimal widths of columns to prevent tables from ungraceful resizing. We disabled squeezing columns behind a certain width depending on the content type.Top BarWhat constitutes a table? Cells, columns, rows. In addition, complex tables often have a top bar. Like the rest of the components, the top bar is built of smaller elements — a title and commands.Below, I collected the list of commands with all the variety of states, which we used in one of the products. We had icon commands for obvious metaphors like plus = add / create, trash bin = remove, arrow = move. Non-generic commands (e.g., assign, archive, balance) needed explicit textual naming. Moreover, some of the commands were accompanied by a dropdown menu. (Large preview)Another way to handle long text strings is either to stretch a column by the longest content or wrap it and put on multiple lines. The first approach works better for more or less similar text strings. The second one works better if seeing the full content is more important for people than keeping the table vertically compact. (Large preview)Although table columns should smartly adjust to content size, it happens when text is truncated. In this case, column resizing is helpful. Users can drag the column edge and see long content. They might also need to squeeze an unimportant column or the one with a short text. (Large preview)Unlike table cells, filter boxes usually have “reset” icon on the right so that users can explicitly disable them and see unfiltered content. (Large preview)Cells can have such accessories as tooltips, input hints, error messages, placeholders, etc. At this stage, they are static, but a designer should later specify the logic of how they show up (animation, delay, etc.). (Large preview)Of course, this is not the ultimate list of features and elements. It differs from one project to another and may include other things, for example:Sorting by more than one column;Customizable set of columns (ability to toggle them);Expandable rows (a parent row can have child rows);Logical operators for filtering and search (“and”, “or”, “else”, etc.).If you hesitate which features to design and which not, here is a good principle. It’s Occam’s razor, or the law of parsimony. A designer should not create new instances if the existing ones satisfy the needs. You should “cut” the geeky features, which users might theoretically need in undefined future. The same story for the features that ideally fit one of a hundred situations but are useless in the remaining ninety-nine cases.Whole TableWhen all building blocks are ready, you can assemble a couple of tables for various purposes. This is a chance to spot inconsistencies. Most frequently I dealt with the following three types.Read-Only TableThe simplest table type to build since it only shows as-is data. There are no filtering or editing options. Sorting or row hierarchy might help to analyze large chunks of data. Such a table is used for showing data, informing people about something. (Large preview)AccessibilityEven an exceptionally smooth and nice table might become a nightmare for users. Therefore, it’s so important to follow accessibility principles. Web Content Accessibility Guidelines (WCAG 2.0) has a chapter about tables. Most of the material is about proper coding; however, a designer has a lot to think about too.Here are major design considerations in terms of accessibility.Give a title and prepare a concise summary.A visually impaired user should be able to get the idea of a table without voice-processing all its cells.Mind the font size.Although there is no official minimal size for the web, 16 px (12 pt) is considered to be optimal. Additionally, a user should be able to increase it up to 200% without breaking the whole layout.Test colors for people with color blindness.Text and controls should have enough contrast with their background. Color ratio 3:1 is minimally required (the more, the better). Also, color shouldn’t be the only way of marking things. For example, error messages shouldn’t rely on red text only, a warning icon will give additional clues to color-blind users.Avoid small and ambiguous controls.Clickable components are considered to be touch-friendly if they are at least 40×40 px. Commands represented by icons should either be labeled or have tooltips and alternative text. Designers shouldn’t overuse icons because users might not understand complex metaphors correctly.You can also utilize online tools for checking accessibility, for instance, Wave. Not only does it find accessibility issues and features, but also highlights them directly on a page and explains how to fix them.In A NutshellContent unification and formatting is the designer’s work too.Think beyond “things”, elements of your interface, and consider use cases and frequent patterns.When everything inside is consistent and compatible, it’s time to think about how it fits the rest of the interface.ConclusionWe’ve just walked through the process of constructing a complex table. Different projects require different approaches, but there is one universal principle. A designer should make all elements work together in any combination. That’s why it’s good to start with collecting needs and making small blocks first. And, of course, testing with users as soon as you have something clickable and realistic.Further Reading“Atomic Design,” Brad Frost“Design Better Data Tables,” Andrew Coyle“Refactoring UI,” Adam Wathan & Steve Schoger (Large preview)Now it’s time to think about the table header. From my experience, it’s often impossible to control column title length and stick to one line. Even with a good writer on a team, you won’t keep all the texts short. Some of the tables require long technical titles or localization. Phrases, which were one-line in English, might become two- or three-line in Greek, German or Hungarian. Therefore, I showed different variants: (Large preview)Users of data-based software often need sorting and filtering. It helps them to find valuable information in the large chunks of data. The challenge with sorting and filtering is to combine sorting controls and filtering boxes with other header elements — column titles, measurement units, etc. (Large preview)The tree of features prevents you from making extra work and helps to focus on what is important. A well-organized feature tree is also helpful for the development team. They can match planned features with available frontend libraries and find the best way to turn designs into code.On one of my projects, we used Angular Material framework. Unfortunately, Angular tables were too simple. We found an ag-Grid library that supported our functionality but had one limitation. It had no ability to expand a row and put children rows inside. We had revealed this issue before we put any effort into it and adjusted the design.In A NutshellStart building a complex table with collecting and prioritizing user needs. Consider a non-table solution, for example, a chart.Draw a tree diagram that systematizes all the needed features. Use it as a plan for producing visuals.Recommended reading: Table Design Patterns On The Web by Chen Hui Jing2. Go AtomicSo, the needs and functionality are defined, and you know technical limitations. It’s time to mockup your table. Basically, the atomic approach is designing small UI components first and then assembling bigger ones. We’ll gradually move from elementary particles like fonts and colors to such large modules like a header or column. I deliberately chose the strict brutalist style for mockups so that we can concentrate on function, not appearance.Fonts, Colors, IconsThese parts can be already defined by the design system or UI framework you use. If you create a table for an existing product, check whether its color palette, fonts, and icons meet the table needs. On the picture below, I showed some of the shades of gray needed for table frames, lines, fills and text. Red and blue tints stand for warning-error-destructive and active-enabled-selected stuff. Text styles are to distinguish between primary and secondary information, titles and body text. (Large preview)And here is the description of command states. It turns out their availability depends on one or several conditions. Posted on 6th February 2019Web Design FacebookshareTwittertweetGoogle+share (Large preview)Cells And AccessoriesWhen the table atoms are ready, we can proceed with molecules — different types of cells. In the first place, it’s important to think about normal, hover and active states of each element beforehand. Then go clicked, disabled and other states.On one of my projects, we had eight types of cells with their own interaction. The simplest ones are text and numeric cells. In our case, it was allowed to populate numeric cells with non-numeric content, such as “N/A” (not applied) and “N/C” (no control). It was the peculiarity of the domain. Dropdowns and date pickers are more complex and have child elements. Finally, we had table cells that represented in-row commands. (Large preview)Editable TableAll or some cells are editable. Usually, there is no filtering because the order of rows might be customized. Such tables typically are accompanied by a toolbar and allow performing actions with rows. (Large preview)A better way is to define rational default widths and allow manual resizing if needed. For reading a table, it’s better to have some empty space on the right than gaps between the columns.If a table contains both many rows and columns, horizontal and vertical scrolls are unavoidable.The key essence of a complex table is being large, thus giving the bird-eye view of data. Unfortunately, I cannot name a really good method of using large tables on smartphone screens. Excel and Google spreadsheets lose their power on small screens, although there are effective ways to handle small tables. For instance, converting a table to a set of cards. (dm, ra, il)From our sponsors: How To Architect A Complex Web Table Expectation vs. Reality (Large preview)1. Systematize NeedsSo, you’ve interviewed the target audience and figured out their needs and wants. Now it’s time to piece together findings and transform them into an interface structure. For example, one user said, “I need to see how my data affects other parts of the application.” Or while watching another person work with old software you noticed he uses shortcuts and doesn’t touch a mouse at all. What does it mean?The first user’s words are about input validation and hints. You’ll need to consider attaching alert or help information to a table. Or develop a system of meaningful colors. It depends on the domain and the mental model. The observation of the second user’s work might be a sign you need to design all actions keyboard-accessible. And you’ll probably need to think about shortcuts more profound than just “Cmd + C” and “Cmd + V”.Here are some observation-assumption pairs.“I need to operate dozens of items at a time easily.”Allow cell multi-selecting? Add checkboxes to select many rows?“Now we do all the calculations this way.” [Shows Microsoft Excel]Is Excel effective for this purpose? What features can we borrow?“Can we somehow know beforehand if this name is already on the server.”Data validation on the fly? Error messages or auto-correction?“Usually I enter this information. It’s pretty generic.”Suggest default values, defaults or templates?Ahoy! The hunt for shiny front-end & UX treasures has begun! Meet SmashingConf San Francisco 2019 — a friendly conference on performance, refactoring, interface design patterns, animation and all the CSS/JS malarkey. Brad Frost, Sara Soueidan, Miriam Suzanne, Chris Coyier and many others. April 16–17. You can easily convince your boss, you know. Check the speakers ↬As a result, you’ll have a list of people’s needs and wants. Open questions are helpful for figuring out real needs and filtering out whims:“What helps you to work faster? What can make your choice easier? How is this feature affecting the efficiency of your work? What will change if you aren’t able to do X?”So, what’s next? Now it’s time to build a logical skeleton for your table. A scheme of what it contains and is able to do. If you go directly to wireframing or prototyping, you step on the evil path of endless re-drawing and fighting with legacy.Below is an example of what you might start with. It’s the tree of features. And the basic building block of any table is a cell. Cells unite into rows and columns, which can have specific features different from those of separate cells. And finally, we go to such important supplements of a table as a top bar with buttons, keyboard commands, and handling errors. How To Architect A Complex Web TableYou are here: (Large preview)The next step is defining the result of each command. For example, what happens when I select two remote rows and click “Move up”? Or what is the result of clicking “Recalculate”? All these questions should be answered or at least considered beforehand.Container And ResponsivenessHow will the table be placed in the interface? For example, will it occupy some space within an existing container or be a separate module? The answers to these questions totally depend on a product and it’s better to foresee possible issues and thoroughly define the principles. Related postsInclusive Components: Book Reviews And Accessibility Resources13th December 2019Should Your Portfolio Site Be A PWA?12th December 2019Struggling To Get A Handle On Traffic Surges10th December 2019Building A CSS Layout: Live Stream With Rachel Andrew10th December 2019How To Design Profitable Sales Funnels On Mobile6th December 2019How To Build A Real-Time Multiplayer Virtual Reality Game (Part 2)5th December 2019
English football club Chelsea’s manager Jose Mourinho has been banned from driving for six months after being found guilty of speeding last year.The Portuguese was caught driving at 60 miles per hour in a 50mph zone in Surrey in September last year.Mourinho was ordered to pay a total of 1,820 pounds ($2,815) in fines at a court hearing on Wednesday, reports in the British media said on Thursday.Mourinho was not present at the hearing.
Tarun Ghosh was on a holiday at Mandarmani, a famous sea beach and tourist destination, with his family when an unfortunate incident occurred.Ghosh, an adventure enthusiast, in an attempt to make his trip memorable, enrolled his name for parasailing with a company named New Bengal Adventures. As soon as the parachute went into the air, the towing car came too close to an electric pillar due to the heavy tides. The parachute further went off track due to heavy rains and wind. The parachute got stuck in the pillar but the towing car didn’t stop. The pillar was uprooted and was dragged for a distance along with the Ghosh in the accident. Ghosh was rushed to the Contai district hospital where he was declared “brought dead”.The authorities claim that parasailing has been banned on the beaches long ago, but the said company was illegally carrying on with it at Mandarmani.”Parasailing by car on the beach is illegal. They have been stopped many times but they don’t pay any heed to that. They get full support of the local goons who get affiliated to the political party that comes to power. Today, due to heavy tide the car must have come too close to the pillar and the parachute got stuck on it. Even after that, the car didn’t stop, but rather accelerated which caused the death of that man. The man died due to the inexperienced driving.” said Laxminarayan Jana, the president of the local Gram Panchayat Samiti.advertisementPolice has initiated a probe against the company.”I have instructions to the SDPO to investigate the matter. We will inquire about these local adventure sports companies which are providing these services and whether they have any official permit for it. For the time being, all the services have been stopped,” said Alok Rajoria, Superintendent of Police, East Midnapore.Ghosh, 38, was a resident of Murshidabad. His family is completely devastated as their holiday turned into a nightmare after the accident. Mandarmani is famous for its pristine beaches and serene beauty in south Bengal.
Van Dijk insists Liverpool’s patched up back four can handle Man Utd attackby Paul Vegas10 months agoSend to a friendShare the loveVirgil van Dijk insists Liverpool’s patched up back four can handle Manchester United’s attack today.Klopp has defensive worries after injuries to centre-backs Joe Gomez and Cameroon’s Joel Matip, but Van Dijk is confident Liverpool will be ready to keep their title tilt on track.“Joe and Joel are injured but we have been playing with Dejan Lovren as well a lot this season and I don’t think we want to change anything, just do the things that we have done almost all season” says the defender.“It’s going to be a tough game. Manchester United are a good team and they have good players up front.“But we are a very good team all over and we will be ready. I’m going to focus on that and although it’s always tough against them we will be ready on Sunday.” About the authorPaul VegasShare the loveHave your say
About the authorPaul VegasShare the loveHave your say Liverpool legend Fowler: Klopp will have noted Man City celebrationsby Paul Vegas10 months agoSend to a friendShare the loveLiverpool legend Robbie Fowler says Jurgen Klopp will have taken positives in the aftermath of defeat at Manchester City.Fowler wrote for the Mirror: “I’m not sure too many people picked up on it at the Etihad this week, but what struck me was just how ballistic City went when they won.”I can tell you now, Jurgen Klopp noticed. And he’ll be using it to inspire and motivate his players in the title race from here on in.”I know it was a huge game, and a huge win for City. When you win like that it means so much, but the scenes at the end were still remarkable.”To see possibly the best team in world football celebrate with such relief was telling.”Liverpool lost, but Klopp will be urging them to take massive confidence from the fact that a side as big as City reacted like when beating them. He will be saying ‘that’s how good we are now’.”