“Great things in business are never done by one person, they’re done by a team of people.”
“Nothing in the world,” writes Ben Lerner in his 2014 novel 10:04, “is as old as what was futuristic in the past.”
Nicholas Windsor Howard, a designer from the States, has written a two issue essay on the current betrayal of Apple of six of its ‘old times’ core design principles:
- Analogies to familiar real-world objects, such as folders, buttons, a desktop, or a trash can, so that you feel comfortable and can easily use these clues to infer any of the computer’s functions.
- Style and grace, so that you want to use the computer.
- Judicious use of hierarchy and color (though technological limitations prohibited color displays until later in computer history), to draw your eye to the proper places and differentiate design elements from each other.
- Sufficiently readable fonts and bold iconography, so that you can see what you are doing.
- Feedback (for instance, the way an icon goes dark while being clicked). Providing feedback reassure you that you are accomplishing what you think you are, and it communicates the state of the computer.
- You need only glance at the interface to know what you can do and how to do it. According to this principle, the design should not include “hidden” elements (buttons, menus, and other choices should always stay visible) and should clearly communicate, using visual clues, what will happen when you interact with an element of the interface. This principle is called “What You See Is What You Get” (WYSIWYG).
My pal PowerUser82 has found another ‘pearl’ to share with me:
A new piece of malware, dubbed Backdoor.MAC.Eleanor by Bitdefender researchers, exposes Apple systems to cyber-espionage and full, clandestine control from malicious third-parties.
The backdoor is embedded into a fake file converter application that is accessible online on reputable sites offering Mac applications and software. The EasyDoc Converter.app poses as a drag-and-drop file converter, but has no real functionality – it simply downloads a malicious script.
Be warned. Be careful.