Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 3: Balancing Needs Through Iterative Development
Figure 3.1: Tensions affecting product priorities.
Figure 3.2: Advertising units on ESPN.com in 2002.
Figure 3.3: Lycos in May 1999.
Figure 3.4: Yahoo! in May 1999.
Figure 3.5: Google's interface, circa 2001.
Figure 3.6: The waterfall method.
Figure 3.7: Iterative development— the final product is at the center, and the development orbits it, adjusting as it goes along.
Figure 3.8: A sample research program.
Chapter 8: Contextual Inquiry, Task Analysis, Card Sorting
Figure 8.1: A portion of an affinity diagram.
Figure 8.2: Couch-buying analysis diagram (segment).
Figure 8.3: EZSort diagram for a typical shopping site.
Chapter 9: Focus Groups
Figure 9.1: Cardiod versus omnidirectional microphone sensitivity.
Figure 9.2: Temporary conference room-style focus group layout.
Figure 9.3: Permanent living room-style focus group layout.
Chapter 10: Usability Tests
Figure 10.1: The Webmonkey 2.0 Navigation Panel design (open).
Figure 10.2: The Webmonkey 2.0 Navigation Panel design (closed).
Figure 10.3: Picture-in-picture video documentation.
Figure 10.4: A typical usability testing configuration.
Chapter 11: Surveys
Figure 11.1: Sample and sampling frame.
Figure 11.2: Sampling bias.
Figure 11.3: A normal distribution.
Figure 11.4: A bimodal distribution.
Figure 11.5: Example cross-tabulation chart.
Figure 11.6: Confidence intervals.
Figure 11.7: Confidence interval example.
Chapter 12: Ongoing Relationships
Figure 12.1: Mentions of Advanced Search options in HotBot diaries.
Chapter 13: Log Files and Customer Support
Figure 13.1: How Web files are cached.
Chapter 14: Competitive Research
Figure 14.1: The ZDNet interface (circa 1998).
Chapter 17: Reports and Presentations
Figure 17.1: The Webcard homepage.
Appendix A: The Budget Research Lab
Figure A.1: A typical usability testing lab.
Previous page
Table of content
Next page
Real-World .NET Applications
ISBN: 1558609237
EAN: 2147483647
Year: 2002
Pages: 144
Authors:
Budi Kurniawan
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Key Terms
An Overview of TrojansThe History of Trojans
Firewalls
Trojans and Backdoors
Limitation of Liability
C++ GUI Programming with Qt 3
Creating Main Windows
Basic Layouts
Installing Event Filters
Advanced Clipboard Handling
Writing XML
Visual C# 2005 How to Program (2nd Edition)
Terminology
Creating and Executing Threads
Char Methods
Advanced Graphics Capabilities
Self-Review Exercises
Ruby Cookbook (Cookbooks (OReilly))
Date and Time
Walking a Directory Tree
Automatically Initializing Mixed-In Modules
Being an FTP Client
Integrating a Database with Your Rails Application
802.11 Wireless Networks: The Definitive Guide, Second Edition
Direct Sequence Transmission
TGnSync
1X on the AirPort
Using Antennas to Tailor Coverage
Improving Performance
Comparing, Designing, and Deploying VPNs
Summary
Review Questions
Benefits and Drawbacks of L2TPv3-Based L2VPNs
Scaling IPsec Virtual Private Networks
Designing QoS for IPsec VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies