Saturday, April 19, 2014

BLOGS

BLOG

     A blog is a short form of the expression weblog,it's a discussion or informational website thats published on the internet.Blogs contain discreet entries called "posts",that are sorted in reverse chronological order i.e, the latest post appears first.
     A majority of the blogs are interactive, they allow visitors to leave comments for feedback and even message each other using GUI widgets present on the blogs, this interactivity is what distinguishes blogs from traditional static websites found on the internet.
     Blogging can also be seen as another form of social networking In the sense that the bloggers do not only produce content to post on their blogs, but also at the same time build social relationships with their readers of their blogs and also other bloggers.

     There also exist some high-readership blogs that do not allow readers to leave comments, primary example being  "Daring Fireball".Most blogs provide commentary on a subject; some function as personal online diaries; while some others work more as an online brand advertising platform of a particular individual or company.
    A typical blog is a combination of  text, images, and links to Web pages,other blogs and other media related to the blog's topic.The popularity of many blogs can be credited to their ability to facilitate readers to leave comments in an interactive format.
According to critics,Blogger(owned by Google) is the most popular blogging service being used today,as on survey conducted in Feb,2011.Blogs may contain content of any area ranging from arts,business data,entertainment,fashion medicine,politics to weather world.

TYPES
     Blogs are classified not only based on content but also in the way the content is delivered or presented.Some major types of blogs are:

Personal blogs
     A personal blog is one that contains ongoing dairy or a commentary by a single person.

Microblogging
     Microblogging serves as a portable communication mode that makes users feel spontaneous and has been successful in capturing the public imagination.

Corporate and organizational blogs
     Blogs that are used internally by organizations to serve the purpose of enhancing the culture and communication  in a corporation or used externally for brand promotion and public relations  are called corporate blogs.

By media type
      A blog that is made of videos is called a vlog, one containing links is called a link blog, a site containing a collection of sketches and images is called a sketch blog and one comprising photos is called a photo blog.

By device
     Blogs can also be classified by the type of device used to compose it. A blog constructed using a mobile device like a mobile phone or PDA can be called a moblog.

Reverse blog
     A Reverse Blog is one which is composed by multiple users rather than a single blogger. This system exhibits the characteristics of a blog, along with the writing of several authors. 




REFERENCES

retrieved april18th 2014 from http://en.wikipedia.org/wiki/Blog
retrieved april18th 2014 from http://www.ericastrawberrykane.com/wp-content/uploads/2014/01/



     





Friday, April 18, 2014

USABILITY TESTING

USABILITY TESTING

     Usability testing is a type of technique used in user-centered interaction mode to evaluate the pro's and con's of  a product by testing it on users.It gives direct feedback on how real users use the system.


     Usability testing usually involves in determining how well people can use the product.both qualitative testing and usability testing are used in combination in Usability testing,to better understand users' perceptions, in combination with their actions.
     Setting up a usability test involves in the creation of a scenario, where the user performs a list of tasks using the product while makers watch and take feedback.
     Hallway testing  is a general method for usability testing. Instead of using an, trained group of testers, just five to six random people are selected and  are brought in to test the product, or service.
     Expert review is another common method of usability testing. As the name indicates, this method relies on bringing in experts mostly from companies that are specialized in usability testing to evaluate and give feedback on the usability of a product. 
     Heuristic evaluation or Usability Audit is the evaluation of an interface by one or more Human Factor experts.Evaluators measure the usability, efficiency, effectiveness of the interface based on the principles of usability.
  
     On similar lines of expert reviews, automated expert reviews provide usability testing but through the use of programs which have good heuristics The main advantage regarding this is,although they  might not provide as much detail from people, they are more quick and consistent. 
The numbers of users that might be required for usability testing is generally given by the mathematical formula
U = 1-(1-p)^n
where p is the probability of one subject identifying a specific problem and n the number of subjects or test sessions. 

REFERENCES:
retrieved april 18th 2014 from http://en.wikipedia.org/wiki/Usability_testing
retrieved april 18th 2014 from http://www.limina-ao.com/
retrieved april 18th 2014 from http://www.usability.gov/how-to-and-tools/methods/usability-testing.html






QR CODES

QR CODES

     QR Code is an abbreviation for Quick Response Code.They are primarily used  used to transmit a piece of information.The reason why they are more useful than a standard barcode is in their ability to store much more data, including website links, geographical coordinates, images and text.The other key feature of QR Codes is that they instead of requiring a  hand-held scanner to scan them, most of the modern day cell phones can scan them using their cameras.




DESIGN

     In contrast the one dimensional QR codes that were designed to be used with hand held Scanners,QR codes are designed in such a way that they can be detected using a 2-dimensional digital image scanner and then by using a programmed processor digitally analyze them.The processor identifies all of the distinctive squares at the corners of a QR code, using a smaller square (or multiple squares) near the fourth corner to normalize the image for size, orientation and establish the angle for viewing.

USES

QR Codes were originally designed for industrial use.Expansion of technology led them to be gradually adopted into consumer advertising.QR codes have applications in various fields.

URL's
     
      An advertisement viewer needs only to reach for his or her phone and scan the QR Code rather than remembering it and risk forgetting it.It would benefit both the advertiser and the customer.

CODE PAYMENTS
     
      Bank account information or credit card information,can be saved using QR codes,they also can be modified in such a way that they work with specific payment applications. 

WEBSITE LOGIN

     QR codes can be used to log in into websites: a QR Code is shown on the login page on a computer screen, and when a registered user scans it with a verified smartphone, they will automatically be logged in on the computer. The user Authentication part in this, is performed by the smartphone which contacts the server and verifies credentials. 

SOFTWARE

    Software for scanning QR Codes is widely available.Specific applications are made available for every kind of mobile operating system by their manufactures in their respective application stores.

RISKS

     Though QR codes are extremely useful,they also come with their own set of risks and disadvantages.

  • The only form of executable data that can be stored in an QR code is an URL,The URL's may contain links to malicious websites,which may pose a threat to the user's security.
  • When an QR code application is downloaded they ask for various permissions,including read,write permissions.Then the application might read the Sensitive user data present in the device and transmit the data without the users knowledge.

     Although QR Codes come with inherent risks,when used well they can be a great aid in advertising and information Storage.

REFERENCES:
     retrieved april 18, 2014 from http://www.csoonline.com/article/2133890/mobile-security/the-dangers-of-qr-codes-for-security.html
retrieved april 18,2014 from http://en.wikipedia.org/wiki/QR_code