Flylib.com
Mobile Usability: How Nokia Changed the Face of the Mobile Phone
Mobile Usability: How Nokia Changed the Face of the Mobile Phone
ISBN: 0071385142
EAN: 2147483647
Year: 2005
Pages: 142
Authors:
Christian Lindholm
,
Turkka Keinonen
BUY ON AMAZON
Table of Contents
BackCover
Mobile Usability-How Nokia Changed the Face of the Mobile Phone
Preface
Acknowledgments
Introduction--Mobile Distinctions
Sequential Presentation
Experts in Communication
The Hidden Possibilities of New Technology
Part 1: Dominant Design in Mobile User Interfaces
Chapter 1: User Interface Styles
Segments and Categories
Defining the Mobile Style
A Core Set of Scalable Styles
User Interface Style Evolution
Benefits of Evolving UI Styles
Convergence and Standardization?
User Interfaces to Come
Lessons Learned
References
Chapter 2: Takeout Menu-The Elements of a Nokia Mobile User Interface
Takeout Menu
Sturdy Boosters Wanted
When the Rules Change
We Say It Your Way
How Soft Can a Key Be?
Giant Leaps
Chapter 3: The Navi-key Story
Launching the Concept
Product Development and Testing
Marketing the Product
Conclusion
Part 2: Living with Mobiles
Chapter 4: Indian Needs-Cultural End-User Research in Mombai
Apprentice
The Indian Way
Messenger
References
Chapter 5: Usability Meets Sociology for Richer Consumer Studies
Communication Glues Society Together
Context Shapes Communication and Users
Different Users Want Different Things
Products Change after the Launch
Sociology and Usability Research
Research Methods for a Broad Understanding of End-User Needs
Better Research, Better Products
References
Part 3: Design and Research Intertwined
Chapter 6: Managing the Design of User Interfaces
Vision Management
Team Management
Quality Management
Documentation Management
Consistency Management
The Management Toolkit
Chapter 7: The One-Row Keyboard-A Case Study in Mobile Text Input
The Idea-August 1998
High Hopes-September 1998
Changing Horses-October to December 1998
Facing the Facts--January to March 1999
Looking Back--April 1999
Looking Forward--May 1999
Chapter 8: Series 60 Voice Mailbox in Rome--A Case Study of a Paper Prototyping Tour
Scissors and Imagination
Message from Rome
Two Hours Before . . .
I Am the CPU
The Day After
Voice Mailbox di Italia
References
Chapter 9: 14 Samara-Hardware Prototyping a Driving Simulator
The Steering Wheel Project
Speed Does Matter
High-Tech Samara
On the Track
At the Finish Line
Acknowledgments
References
Chapter 10: Dawn on the Wireless Multimedia Highway
The MOMENTS Project
Milan-Area Traffic Service
Designing the Tests
Distinguishable Services and Critical Mass
Efficiency of the Trials
Conclusions
Acknowledgments
References
Chapter 11: Just-In-Time Usability Engineering
Just-in-Time in the Factory
The Problem with Traditional Usability Engineering
Just-in-Time Usability Engineering
The Zen of Just-in-Time Usability
References
Part 4: Mobile Contradictions
Chapter 12: The Expressive Interface
A Menu with 200 Items
For Better or Worse
Spoiled by Choice
The Most Important Person Is Ann
Mixed Emotions
The Machine Knows What You Need
The Permissible Intrusion
User s Dream--Designer s Nightmare
References
Chapter 13: Six Mobile Messages
Small User Interfaces Do Not Scale
Fragmented Minds--Do Not Standardize
Strive for a Seamless User Experience
Think by Doing
The More You Polish the Better It Gets
Design for Development Stability
Acknowledgments
Telecommunication Glossary
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_Y
Index_Z
List of Figures
List of Tables
List of Sidebars
Mobile Usability: How Nokia Changed the Face of the Mobile Phone
ISBN: 0071385142
EAN: 2147483647
Year: 2005
Pages: 142
Authors:
Christian Lindholm
,
Turkka Keinonen
BUY ON AMAZON
CISSP Exam Cram 2
CRYPTOGRAPHY
Documents and Guidelines
Telecommunications and Network Security
Network Models and Standards
Answer Key
Certified Ethical Hacker Exam Prep
Summary
Securing Wireless Networks
Viruses and Worms
Apply Your Knowledge
System Hacking
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Resource Risk
Managing Activity Risks
Managing Project Risk
Conclusion
Appendix A Selected Detail From the PERIL Database
VBScript Programmers Reference
Data Types
Control of Flow
The Scripting Runtime Objects
Appendix D Visual Basic Constants Supported in VBScript
Appendix K The Variant Subtypes
Snort Cookbook
Capturing and Viewing Packets
Capturing Without Putting the Interface into Promiscuous Mode
Keeping the Rules Up to Date
Excluding from Logging
Installing and Configuring ACID
Systematic Software Testing (Artech House Computer Library)
Risk Analysis
Analysis and Design
The Test Organization
The Software Tester
Some Final Thoughts…
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies