My name is Ildiko, I am a designer and interface developer based in Bergen, Norway ⛰️👋
I started doing daily UI practices back in March 2016, and since then I created more than 1000 designs.
I planned on creating a #design every week day until I reach 100 days total, to practice consistency and improve my skills. The improvement after the first hundred days was really encouraging, so I decided to make another hundred focusing on specific areas I am lacking in; and then another hundred, and then many more.
I created #UI Design Daily to be able to share these designs with anybody who is interested in using them as #inspiration or research material. I am hoping this project also takes me out of my comfort zone and provides new challenges. I’m planning to get better at development and pick up blogging as well, so lots of exciting things to look out for!
All the free items on this website are under #Creative_Commons license.
Le dinosaure onusien #UIT vient de publier des documents sur « l’Internet du futur » ▻https://www.itu.int/en/ITU-T/studygroups/2017-2020/13/Documents/Internet_2030%20.pdf où ils annoncent un nouvel Internet, et critiquent l’actuel. L’approche proposée (purement « vaporware » à cette étape) est celle de la table rase.
Un résumé en français ▻https://www.letemps.ch/monde/chine-exacerbe-bataille-controle-dinternet Bien plus médiocre, cet article qui présente la proposition UIT comme achevée alors qu’il ne s’agit que de PowerPoints ▻https://siecledigital.fr/2020/03/31/huawei-et-la-chine-proposent-un-nouveau-protocole-internet
Commme #Huawei est derrière, il y a eu des réactions parfois assez chauvines, notamment aux États-Unis. Article du Financial Times derrière un paywall : ▻https://www.ft.com/content/ba94c2bc-6e27-11ea-9bca-bf503995cd6f Milton Muller a critiqué ces réactions ▻https://www.internetgovernance.org/2020/03/30/about-that-chinese-reinvention-of-the-internet
L’ETSI, traditionnelle émanation des industriels de la téléphonie s’y met aussi, en se prétendant en charge de concevoir le nouvel Internet ▻https://www.etsi.org/newsroom/press-releases/1749-2020-04-etsi-launches-new-group-on-non-ip-networking-addressing-5g-new-se Leur projet ne mentionne pas l’UIT et semble distinct (bien que le discours soit identique).
Notez que le communiqué de l’ETSI parle d’un groupe de travail NGP qui aurait produit analyse et identification de technologies possibles (aucun lien fourni sur ces analyse et identifictaion) mais quand on regarde la page du groupe NGP à l’ETSI, on a… 404.
ce passage de la réponse de l’IETF est hilarant : “We also note
that any real-time systems requiring sub-millisecond latency inevitably have limited scope because of the constraints of the speed of light.”
Ils les auraient traités directement d’abrutis ça aurait été pareil !
L’intégralité de l’article du FT repris ici :
China’s Controversial Mission To Reinvent The Internet - Thakoni
Ci-après la partie que le CI n’a pas traduite (curieusement les derniers paragraphes sont en français)
The new IP presentation paints a picture of a digital world in 2030 where virtual reality, holographic communication and remote surgery are omnipresent – and for which our current network is unsuitable. The traditional IP protocol is described as “unstable” and “largely insufficient”, with “many security, reliability and configuration issues”.
The documents suggest that a new network should rather have a “top-down design” and promote data sharing systems between governments “thus serving AI, Big Data and all kinds of other applications”. Many experts fear that under the new IP, Internet service providers, usually state-owned, will control and supervise all devices connected to the network and be able to monitor and control individual access.
The system is already under construction by engineers from “industry and academia” in “several countries,” Huawei team leader Sheng Jiang told the group in September, although he will not reveal who they were due to commercial sensitivities. Spectators included ITU veterans, including government officials from the United Kingdom, the United States, the Netherlands, Russia, Iran, Saudi Arabia and China.
For some participants, the very idea is anathema. If the new IP address was legitimized by the ITU, state operators could choose to implement a Western or Chinese Internet, they say. The latter could mean that everyone in these countries would need permission from their internet provider to do anything over the internet – whether it’s downloading an app or accessing a site – and administrators might have the power to deny access on a whim.
Rather than a unified global network, citizens may be forced to connect to a patchwork of national internet, each with its own rules – a concept known in China as cyber sovereignty.
In recent periods of civil unrest, Iran and Saudi Arabia have cut internet connectivity for long periods, with the exception of some
In recent periods of civil strife, Iran and Saudi Arabia have cut internet connectivity for long periods, with the exception of some “essential” services © Alexander Glandien
Recent events in Iran and Saudi Arabia provide a glimpse of what it would look like. These governments blocked global internet connectivity for long periods during the civil unrest, allowing only limited access to essential services such as banking or healthcare. In Russia, a new Internet sovereign law adopted in November enshrined the government’s right to monitor web traffic closely and showed the country’s ability to separate from the global web – a capacity that Chinese companies, including Huawei, have helped the Russians build.
Experts now wonder whether China’s vision of Internet governance could shift from a defensive vision, in which the government wanted to be left alone to impose authoritarian Internet controls at home, to a more assertive approach, in which the country openly advocates for others. follow his example.
The creators of New IP say that parts of the technology will be ready for testing next year. Efforts to convince delegations of its value will culminate in an important ITU conference to be held in India in November. To persuade the ITU to approve it within the year, so that it can be officially “normalized”, representatives must reach an internal consensus, freely based on a majority agreement. If delegates fail to agree, the proposal will be put to a closed-door vote in which only member countries will be able to participate, cutting off the views of industry and civil society.
The rapid timetable is causing particular concern to Western delegations and requests have been made to slow the process down, according to documents consulted by the FT. A participant in the Dutch delegation wrote in an official response, leaked to the FT by several sources, that the “open and adaptable nature” of the Internet – both its technical structure and its mode of governance – was fundamental to its success and that he was “particularly concerned” that this model departed from this philosophy.
Another scathing reprimand from a British delegate, also leaked to the FT, said: “It is far from clear that technically sound justifications have been provided for taking such a drastic step. Unless these are to come, the reasonable basis for future work or even ongoing research activities on these topics is, at best, weak or nonexistent. “
Patrik Fältström, a non-conformist engineer with long hair, known in his native Sweden as one of the fathers of the Internet, is one of the most vocal critics of the new intellectual property. In the early 1980s, Fältström was a math student in Stockholm when he was hired to build and test the infrastructure for a new technology that the US government called the Internet.
His job was to write a series of protocols that allowed computers to send text to each other. “In Europe, we were maybe 100 people in Sweden, 100 in the United Kingdom, 50 here, 20 there, we all knew each other. We used to joke that if there was a problem, you knew who to call, ”he says.
Today, Fältström is a digital advisor to the Swedish government and its representative to most major Internet standards organizations, including the ITU. Thirty years after helping to assemble the building blocks of the Internet, it embodies the Western cyber-libertarian ideals that were woven into its foundation.
“The Internet architecture makes it very, very difficult, almost impossible for anyone providing Internet access to know or regulate the use of Internet access,” he says. “It is a problem for law enforcement and others who would like an ISP to control it, so it is not used for illegal activities such as film pirating or child abuse.
“But I am ready to accept that there will be criminals who will do bad things and the police will be unable to fight [all of] he. I accept this sacrifice. “
For Fältström, the beauty of the Internet is its nature “without permission”, as demonstrated by the Arab Spring. “We have to remember,” he says, “it’s a balance between being able to communicate and to control, but people who have a voice are always more important.”
A stark contrast to this view can be found in a river village called Wuzhen near Shanghai, which is emptied every fall to make room for technical executives, academics and policy makers attending the ambitious world conference of the Internet. The event was created by the China Cyberspace Administration in 2014, a year after President Xi Jinping came to power. A row of world flags greets visitors – a nod to Xi’s vision of creating “a shared future community in cyberspace”.
Tim Cook, CEO of Apple, at the 2017 World Internet Conference in China. Foreign participation has declined in recent years as the technology war between the United States and China has intensified and leaders feared to be too aligned with Beijing
Tim Cook, CEO of Apple, at the 2017 World Internet Conference in China. Foreign participation has declined in recent years as the technology war between the United States and China intensified and leaders feared being too aligned with Beijing © Getty
Tech executives, from Tim Cook of Apple to Steve Mollenkopf of Qualcomm, spoke at the event, crediting Xi’s attempts to bring together the international tech elite. But in recent years, foreign participation has declined American-Chinese Technological War intensifies and leaders fear being too closely aligned with Beijing.
There is a precedent for such fears. During the first year of the event, the organizers slipped a draft joint declaration under the doors of the guests’ hotels at midnight, setting out Xi’s point of view on each nation’s right to “cyber sovereignty” . Customers were invited to return with any changes before 8 a.m. After the protests, the organizers dropped the case completely. But the fact that management attempted such a move reflected Xi’s digital ambitions.
In the early 1990s, the Chinese government began to develop what is now known Large firewall, a system of internet controls that prevent citizens from connecting to banned foreign websites – from Google to the New York Times – as well as blocking politically sensitive national content and preventing mass organization online.
Beijing technical controls are supported by large teams of government censors as well as those hired by private tech companies such as Baidu and Tencent. Although anyone in the world can technically host their own website using just a computer and an Internet connection, in China you need to apply for a license to do so. Telecommunications providers and Internet platforms are also required to assist the police in monitoring “crimes”, which may include actions such as calling Xi “steamed bun” in a private discussion group , an act punishable by two years in prison.
Chinese President Xi Jinping at the World Internet Conference in 2015, where he told participants that each nation should have independent authority over its own Internet
Chinese President Xi Jinping at the 2015 World Internet Conference, where he told participants that each nation should have independent authority over its own Internet © Getty
Despite this, the Chinese Internet is not 100% effective in blocking content deemed sensitive or dangerous by the government. “The leaking global internet remains frustrating for Chinese censors, and they have dealt with it at great cost and effort, but if you could make these problems go away almost completely using a more automated and technical process, maybe like New IP, that would be fantastic for them, “says James Griffiths, author of The Great Firewall of China: How to Create and Control an Alternative Internet Version.
“Building a new version of the Internet could prevent more people from acquiring politically dangerous knowledge, thereby saving a great deal of effort, money and manpower on the censorship side. They can choose the commands they want, integrate them with technology and deploy them. “
The establishment of a sophisticated alternative to the Western Internet would also fit in with China’s ambitions to expand its digital footprint on a global scale. “At the very beginning of the Internet, China was a follower and did not recognize, like many other countries, how disruptive the Internet would be,” said Julia Voo, research director for the China Cyber Policy Initiative at the Harvard University in Belfer. Center.
“As they realized how important it was, [they] channeled more resources into technology development. . . and we can see their influence increased in many standards bodies like the ITU in the past two or three years.
“But the United States and others have made a strategic mistake by failing to see the value of growing infrastructure in developing markets,” she added. “There is still a lot of infrastructure to provide and over the past 10 years, Chinese companies have been at their disposal, especially in Africa.”
Beijing has signed memoranda of understanding on building a “digital silk road” – or advanced IT infrastructure system – with 16 countries. Huawei says it has 91 contracts to supply 5G wireless telecommunications equipment worldwide, including 47 in Europe – despite US warnings that Huawei’s involvement amounted to giving Chinese access to national security secrets, an allegation denied by the society.
“By proving that you can control and monitor your home internet intensely and prevent it from being used as a tool to rally people against the government, combined with the economic success of its businesses, China has made this vision incredibly attractive to regimes – autocratic and others – all over the world, ”says Griffiths.
ITU was created 155 years ago, making it one of the oldest international organizations in the world, even before the United Nations. It is installed in a group of glazed buildings on Place des Nations in Geneva. On the 10th floor is the airy office of Bilel Jamoussi, the head of ITU study groups, born in Tunisia – the units that develop and ratify technical standards.
The room is lined with a huge library from which Jamoussi draws a dusty blue book – his doctoral thesis, written 25 years ago, on traffic passing through the Internet. At the time, there was a desire to build a new networking protocol to meet the growing base of Internet users. Ultimately, the engineers opted for a layer on top of the existing TCP / IP infrastructure. Technology, invented in the late 1970s by computer engineers working for the United States Department of Defense, was a means of transmitting messages between computers at the speed of light, using a special addressing system.
Bilel Jamoussi, Head of ITU study groups, which ratify technical standards.
Bilel Jamoussi, Head of ITU study groups, which ratify technical standards. “Twenty years ago, it was Europe and North America that dominated the development of products, solutions and standards, we now have an eastward orientation” © YouTube
“Twenty-five years ago we had this conversation as a community – is it TCP / IP or is it something else – and then a lot of design and development came to a kind of rescue [it]Explains Jamoussi. “We are now, I think, at another turning point, saying, is this enough, or do we need something new?”
In its early days, the ITU oversaw the first international telegraph networks. Since then, it has grown from 40 countries to 193 and has become de facto the standardization body for telecommunications networks. The standards produced there legitimize new technologies and systems in the eyes of some governments – especially those in developing countries that do not participate in other Internet organizations. In the end, they give a business advantage to the companies that have built the technology on which they are based.
Over the past 21 years, Jamoussi has witnessed a geopolitical shift. “The pendulum has tilted to the east, and now we see more participation from China, Japan, Korea,” he said. “Twenty years ago, it was Europe and North America that dominated the development of products, solutions and standards, we now have an eastward orientation.”
On one of the marble walls of the ITU, backlit flags are hung, showing the largest donor countries. The Chinese flag – currently number five – was not there at all a few years ago, said an employee, but it is progressing gradually.
New intellectual property is the latest grenade launched in the ITU arena, but it is not the first Internet-related standard to be offered as an alternative to the original Western-style system. The governments of Russia, Saudi Arabia, China and Iran have been pushing the idea of alternative networks for years, according to participants who wanted to remain anonymous.
“In the early 2000s, once you saw widespread use of the Internet, you suddenly had this idea of democratization, which is basically to give people more control and more information. For authoritarian governments, it was something they were not happy with, ”said a member of the British delegation. “And so the work started, around the beginning of the 2000s, especially in China, then a little later in Iran and Russia, on how to create an alternative to the standards and technologies that were still being developed mainly by Americans. “
But in recent years, Chinese companies have switched to new intellectual property. “There is a new paradigm, it is not voice and text and video and people talking, it is real-time control of something remotely, or telepresence, or holograms”, explains Jamoussi. “These new applications require new solutions. And now it’s more doable, it’s no longer science fiction, it’s almost a reality. “
Cutting-edge projects for a new IP is Richard Li, chief scientist at Futurewei, Huawei’s R&D division located in California. Li worked with Huawei engineers based in China, as well as state-owned telecommunications companies China Mobile and China Unicom, with the explicit support of the Chinese government, to develop the technology specifications and the proposal for standards.
Having Huawei at the helm will sound the alarm for many in Europe and the United States, where governments are concerned that Chinese technology is being developed as a vehicle for state espionage. The advent of 5G – a much higher bandwidth network that will serve as the digital backbone for a more automated world – has raised growing concern that products developed by Huawei will be built with “backdoors” for consumers. spies in Beijing.
Richard Li, chief scientist at Futurewei, Huawei’s R&D division. Li worked with the explicit support of the Chinese government to develop technology that would allow
Richard Li, chief scientist at Futurewei, Huawei’s R&D division. Li worked with the explicit support of the Chinese government to develop the technology that would allow “cyber sovereignty” © YouTube
Last year, the United States excluded Huawei from sale in its market, and the British government is involved in a parliamentary battle over the company’s involvement in its basic telecommunications infrastructure.
The FT contacted Li to discuss the new IP, but Huawei declined the opportunity to explain the idea in more detail. The company said in a statement, “The new IP aims to provide new IP technology solutions that can support. . . future applications such as the Internet of Everything, holographic communications and telemedicine. New IP’s research and innovation is open to scientists and engineers from around the world to participate and contribute. “
Critics argue that the technical claims made in the New IP documentation are false or unclear and represent a “solution to the search for a problem”. They insist that the current IP system is suitable for use, even in a fast-scanning world. “The way the Internet has grown is through modular and weakly coupled building blocks, it’s the brilliance of it,” says Alissa Cooper, president of the Internet Engineering Task Force (IETF), an organization industry-dominated standardization in the United States. .
In November, Li introduced himself to a small group at an IETF meeting in Singapore, which Cooper attended. “[The current infrastructure] is in stark contrast to what you see in the new IP proposition, which is this type of top-down monolithic architecture that wants to tightly couple applications to the network. This is exactly what the internet was not designed for, “she said.
The implications for the average user could be enormous. “You push control into the hands of [telecoms] public operators, “said a member of the British ITU delegation. “Therefore [it means] now you can not only control access to certain types of online content, or track that content online, but you can actually control a device’s access to a network. “
For internet pioneer Patrik Fältström, the beauty of the Internet is its
For internet pioneer Patrik Fältström, the beauty of the Internet is its “unlicensed” nature. “We have to remember,” he says, “it’s a balance between being able to communicate and controlling, but people who have a voice are always more important” © Alexander Glandien
China is already in the process of setting up a credit rating system for its people, based on online and offline behavior and past “crimes”, noted the member of the delegation. “Donc, si le score de crédit social d’une personne est tombé en dessous d’un certain montant parce qu’il publiait trop sur les réseaux sociaux, vous pourriez en fait empêcher ce téléphone de se connecter au réseau.”
Les opérateurs de télécommunications chinois disposent de nombreuses données sur leurs abonnés. Selon la loi, les clients doivent s’inscrire pour un numéro de téléphone ou une connexion Internet en utilisant leur vrai nom et identification, qui est ensuite accessible par d’autres sociétés telles que les banques. La loi du pays sur la cybersécurité stipule également que tous les «opérateurs de réseaux», y compris les sociétés de télécommunications, doivent tenir des «journaux Internet» – bien que ce que cela implique ne soit pas clair.
Jamoussi fait valoir que ce n’est pas à l’UIT de juger si les propositions pour une nouvelle architecture Internet sont «descendantes» »ou pourraient être utilisées à mauvais escient par des gouvernements autoritaires. «Bien sûr, tout ce que vous construisez est une épée à double tranchant. Vous pouvez utiliser n’importe quoi pour le bien ou pour le mal, et c’est la décision souveraine de chaque État membre », dit-il. “À l’UIT, nous ne nous engageons pas dans ce mauvais usage potentiel de la technologie, nous nous concentrons uniquement sur” en voici quelques-uns. . . problème de la technologie de la communication, voici une aspiration, en tant que communauté, construisons une solution pour y parvenir. “Mais la façon dont les gens l’utilisent est vraiment à eux.”
Les ambitions de Pékin de renforcer les contrôles dans l’infrastructure Internet ne sont pas perçues par tout le monde comme un problème – simplement comme le prochain chapitre de son évolution.
«Internet était censé être une infrastructure neutre, mais il est devenu un bras de contrôle politisé. De plus en plus, l’infrastructure Internet est utilisée à des fins politiques – pour réprimer les gens économiquement et physiquement – nous l’avons vu au Cachemire, au Myanmar et dans les révélations de Snowden », explique Niels ten Oever, ancien délégué néerlandais à l’UIT.
«Pour moi, la question primordiale est: comment construire un réseau public sur des infrastructures privées? C’est le problème avec lequel nous nous débattons. Quel est le rôle de l’État par rapport au rôle des entreprises? “
Selon lui, les entreprises conçoivent des technologies principalement dans un but lucratif. «Internet est dominé par les entreprises américaines, toutes les données y circulent. Alors, bien sûr, ils veulent garder ce pouvoir », dit-il. «Nous avons peur de la répression chinoise. Nous faisons des caricatures des Chinois d’une manière impérialiste-raciste limite. Mais la gouvernance d’Internet ne fonctionne pas aujourd’hui. Il y a de la place pour une alternative. “
Partout où notre avenir numérique se construit actuellement, il semble y avoir un accord mondial pour dire que le moment est venu pour une meilleure version du cyberespace. “Je pense [some] les gens diraient que notre modèle actuel d’Internet est profondément défectueux, sinon cassé. À l’heure actuelle, il n’existe qu’un seul autre modèle vraiment complet et pleinement réalisé, celui de la Chine », écrit Griffiths dans Le grand pare-feu de Chine.
«Le risque est que si nous ne parvenons pas à trouver un troisième modèle – un qui autonomise les utilisateurs et accroît la démocratie et la transparence en ligne, et réduit les pouvoirs des services de sécurité des grandes technologies et du gouvernement – alors de plus en plus de pays pencheront vers les Chinois modèle, plutôt que de faire face aux retombées de l’échec de la Silicon Valley. “
Aujourd’hui le “Déclaration d’indépendance du cyberespace»- le principe directeur d’Internet – commence à ressembler de plus en plus à une relique. Le manifeste, écrit en 1996 par John Perry Barlow, co-fondateur de la fondation américaine sans but lucratif Electronic Frontier Foundation et parolier de Grateful Dead, était un appel aux armes.
«Gouvernements du monde industriel, vous, géants las de chair et d’acier, je viens du cyberespace, la nouvelle maison de l’esprit», commence le document. «Au nom de l’avenir, je vous demande du passé de nous laisser seuls. Vous n’êtes pas les bienvenus parmi nous. Vous n’avez aucune souveraineté là où nous nous réunissons. “
Cette opinion est maintenant devenue un retour à une époque antérieure à la capitalisation boursière de billions de dollars dans l’industrie de la technologie, disent les critiques. Mais il y a encore de l’espoir – et peut-être une troisième alternative à nos deux internets d’aujourd’hui.
«Ce qui nous différencie de la Chine maintenant, c’est qu’à l’ouest, le public peut toujours se mobiliser et avoir son mot à dire. Une grande partie de cette responsabilité incombe désormais aux législateurs de protéger la démocratie à l’ère de la surveillance, qu’elle soit dictée par le marché ou autoritaire », a déclaré Zuboff. «Le géant endormi de la démocratie est enfin en train de remuer, les législateurs se réveillent, mais ils ont besoin de sentir le public dans leur dos. Nous avons besoin d’un Web occidental qui offrira le genre de vision d’un avenir numérique compatible avec la démocratie. C’est l’œuvre de la prochaine décennie. “
Madhumita Murgia est la correspondante technologique européenne du FT. Anna Gross est journaliste aux marchés FT. Reportage supplémentaire par Yuan Yang et Nian Liu
“A short while ago curl‘s 230th command line option was added (it was —mail-rcpt-allowfails). Two hundred and thirty command line options! [...] Is this manageable? Can we do something about it?”
Very good text about user interface design, here for a command-line program, #curl. Read it if you design interfaces!
I don’t think a very advanced tool can remain easy to use in all circumstances. I think the aim should be to keep the commonly use cases easy.
Voir aussi le « how to » pour copier les requêtes d’un navigateur web comme curl : ▻https://daniel.haxx.se/blog/2015/11/23/copy-as-curl
The Guardian a sorti son « guide de digital #design » (refonte de sa homepage, continuité entre site & version papier, choix des typo, des couleurs, logos ...).
Et pour qui se passionne pour l’#UI, c’est une pépite.
Recours contre le décret sur le contrôle de la recherche d’emploi - MNCP
Suite à la requête sommaire déposée devant le Conseil d’État par l’union syndicale Solidaires le 28 février dernier contre le « décret du 28 décembre 2018 relatif aux droits et aux obligations des demandeurs d’emploi et au transfert du suivi de la recherche d’emploi », les associations AC ! APEIS MNCP CIP Recours Radiation, les syndicats Solidaires SUD Emploi et SUD Culture et Médias Solidaires, avec le soutien du CNTPEP-CGT, attaquent ensemble ce texte inadmissible et destructeur.
Issu de la loi du 5 septembre 2018 « pour la liberté de choisir son avenir professionnel » , ce décret met en place une automatisation des règles de sanction des #chômeur∙es, en les aggravant, et en instituant un « sursis » de deux ans, reconductible à chaque répétition d’un manquement. Pour celles et ceux qui sont indemnisé∙es, les sanctions encourues peuvent aller jusqu’à la suppression pure et simple du revenu de remplacement : ARE, ASS ou RSA.
Le décret détruit les missions du personnel de Pôle emploi, sommé de se transformer en agent actif d’une politique de contrôle et de répression des populations les plus précaires. Les salarié∙es de toutes les structures associées au service public de l’emploi devront, eux et elles aussi, participer à ces exclusions du revenu de remplacement, temporaires ou définitives, et aux radiations.
En parallèle, les annonces scandaleuses du gouvernement sur son projet de « transformation de l’assurance chômage et de l’accompagnement des chômeurs » annoncent une démolition de leurs droits, déjà bien saccagés par la loi « liberté de choisir son avenir professionnel », tant du côté de l’emploi que du côté de la formation.
Enrobé dans des annonces de justice sociale par des titres exprimant le contraire de leur contenu, ce projet n’est que manipulation, provocation et mépris.
La mécanique des recours qui oblige les personnes menacées de sanction, ou sanctionnées, à revenir inlassablement vers l’institution qui est à l’origine de ces sanctions risque d’augmenter les non-recours.
Ainsi exclues de l’indemnisation et de Pôle emploi, ces personnes iront rejoindre la horde des invisibles.
Depuis la loi Travail, une batterie d’instruments est mise en place pour réduire les droits et les moyens de défense des salarié∙es et des chômeur∙es.
Ce gouvernement instaure partout la peur, la violence et la contrainte : dans les entreprises, sur les ronds-points, à Pôle emploi, partout, à la ville comme à la campagne.
Leurs projets ne sont ni des réformes ni des transformations, ce sont des destructions des droits à tous les étages, pièce par pièce, pour un retour au travail forcé.
Nous ne nous laisserons pas faire.
C’est l’ancien grand chef du service juridique de l’UIMM, organisation patronale parmi les plus réacs, qui vient d’être nommé au cabinet de Muriel Pénicaud. Damien Delevallée y occupe désormais le poste stratégique de « conseiller chargé des relations de travail ».
Depuis janvier 2019, la fonction était détenue par Lucie Lourdelle, une ancienne dirigeante de la CFDT… Un ex-employé d’une filiale du Medef qui succède à une syndicaliste : des mauvais esprits y verront peut-être un raccourci des deux premières années de Macron à l’Élysée.
Le Canard enchaîné 3/7/2019
Implement Infinite Scroll or Pagination in #ios #uitableview using #swift 5
Infinite scroll is one of the basic requirements of the modern apps. It is a design pattern where content is continually loaded into the interface as the user scrolls downwards. Also called endless scroll, the point is that the user never reaches the end of the page. Instead they are presented with a perpetual content stream without having to click or spend cognitive load on paginated navigation.Sound familiar? It should do. Most people use infinite scroll on the daily in their social media browsing — think Facebook, Instagram or Twitter.Advantages of using Infinite ScrollInfinite scrolling definitely has its upsides; if it didn’t, big tech giants wouldn’t be using the pattern. For example:Users consume vastly more content on an infinite scroll page.Interaction costs are basically zero, and (...)
#inspiration for #ux Designers: Putting the User First
by JON on Aug 17, 2018Good UX #design is all about putting the user first. Any aspect of a website or app that doesn’t consider the user’s needs fails.“People ignore design that ignores people.”— Frank Chimero, DesignerNike90 Store by Balraj ChanaSpace Odyssey by MadeByStudioJQYomes — Renters Transparency Initiative by Claudio GuglieriWork hard by JONNorthFace by Eddie LobanovskiySurf Article Interaction by Bradley ZifferDivers App Concept by DannnielCharity Website by Riko Sapto DimoMotel | Food App by Johny vino™Youtube concept design — profile by Yi Li for HiwowMarble Interactive TV App — Case Study by Afrian Hanafi for PaperpillarExperimental Work by Divan RajPhotography Blog by Charles PattersonMovies Site by Aji DarmawanHQ Food Delivery Homepage by Aleks FaureIphone X Instagram Concept by Ivan (...)
Introducing UI2CODE : An Automatic #flutter #ui Code Generator
With the help of AI, Alibaba’s Xianyu tech team is advancing an intelligent tool that renders visual UI design as Flutter code with 100 percent accuracyAs we explored in our recent article on AI-based algorithm development, automation is quickly changing from something to that developers can work on into something that can do developers’ work. While the extent of this shift remains to be seen in the years to come, one major focus today is how AI can tackle the repetitive and tedious aspects of application development so human developers can focus their efforts elsewhere.Now, developers at Alibaba’s Xianyu(闲鱼) second-hand trading platform have launched the UI2CODE project to apply deep learning technology in converting visual user interface images to client-side code. With clear component, (...)
#gitops, or Why the Future Has No Dashboards
If you work in development or IT Ops, you probably spend much of your day staring at dashboards — a reality that makes IT work much less glamorous than it might sound. We use dashboards to manage code repositories, track builds, coordinate deployments, monitor software in production, and much more.Indeed, you probably have dashboards that aggregate data from other dashboards, because otherwise there would be so many dashboards that you would not be able to keep track of them all.If you’re tired of drowning in dashboards, there’s hope. With the help of GitOps, a new approach to managing software delivery, we can remove many of these dashboards from our lives and replace them with a streamlined, centralized management interface based on configuration files and pull requests.Here’s what the (...)
ReduxI have worked on a couple of projects which had Redux, and i see there is a lot of confusion among people who are getting started. My opinion is if we understand “what problem is redux trying to solve” and “responsibilities of the core components of redux”, life will be easier. This post is my attempt on trying to explain these things.The Problem…SPAs(Single Page Applications) these days are pretty complex and they maintain a lot of state in the front end, e.g: api responses, cache data, state of the #ui widgets like spinners and progress bars, etc..Usually we have Models which hold the data and Views which render them. A View can update a single Model or multiple Models, a Model can update another Model and based on these Model changes Views get updated. Because of all these (...)
Hi, I’m Alex Pustovalov. I’m the author of Webcodesk — a web application builder. And I want to tell you about Webcodesk in this tutorial.IntroThis tutorial assumes that you already have some experience with #react and know how to create web applications utilizing Create React App.First of all, let’s understand why would you need Webcodesk.Webcodesk was designed with the idea to help in creating big web applications using the React framework (yeah, they say it’s not a framework…) and at the same time make this process maintainable without writing extra code manually.In Webcodesk you can easily navigate, quickly change and experiment with data flows in the application. You will see the overall picture of how different pages, components, and logic interact in your application via #diagrams.Here is (...)
How to create a list in #ios App?
A beginners guide to UICollectionViewIntroduction of UICollectionViewUICollectionView is a part of UIKit Framework which enables you to add list view in your iOS App. This is highly flexible to meet your custom requirements. You can show list in any fashion i.e. Horizontal columns, Vertical rows, and grid etc.In this tutorial, we are going to see how we can add a list to ViewController programmatically (We will not use storyboards).Project setupCreate a new XCode Project. XCode prepares the project and opens the General TabXcode project initial setupSince we are not going to use Storyboards , we need to do some basic operations.Delete Main.storyboard (from project folder)Delete LaunchScreen.storyboard (from project folder)Clear Main Interface field in Deployment Info section of General (...)
#ui/UX and the Company Experience. A refined know-it-all guide on all about the Product.
UI/UX and the Company ExperienceA refined know-it-all guide on all about the Product.About the authorPavel Pekanov is a seasoned #creative Director, Art Director and Designer (and a Developer, but tss-s tell no one). Started his creative career in 2004, followed by the launch of his own Creative Agency in 2008. Ranked a top earning freelancer on Upwork (former Elance) in 2013. Launched a few startups of his own. Featured on CSS Design Awards. Former Creative Director at QUOINE. Pavel has been helping startups, founders and well run businesses with Branding, Product Design, UI/UX and Brand Experience for 14+ years.Personal website: pekanov.comPortfolio website: pekanovdesigns.comUI/UX & Product DesignUI (User Interface) and #ux (User Experience) go along together these days. Thought it (...)
Top 9 UI Trends in 2019
User interface (UI) design refers to the process of creating interfaces within the software or computerized devices, focusing on appearance and style. Here, designers mainly intend to create designs that users would find easy, intuitive, and pleasurable to use.Typically, UI design refers to the graphical user interface (GUI), but there are others, including the voice-controlled interfaces.UI is an important part of the design process as it plays an important role in the customer acquisition process, customer retention, lowering support costs, increasing productivity and reducing development time.(UI is often confused with user experience — but both are two different aspects that are closely related and aim at driving user satisfaction.)You risk losing your customers if they don’t find (...)
Best 15 Examples of Popular Card #ui #design for Inspiration in 2018
Card UI design helps to enhance interface and user experience. The 15 best card UI design practices for brand new web/app design inspiration in 2018.As one of the big UI design trends of 2018, card UI design, has gained mainstream status in modern interface design and has been deeply embedded in the UI design of various industries and fields. Lots of web and mobile apps have used card based UI design, especially with the popularity of Material Design.As an information container, cards hold all elements such as text, rich media, buttons, etc. Based on this contents, it can adapt its size to that of different devices and screens, balancing user interface and user experience.Compared to traditional UI design, a simple but intuitive advantage of card UI is that it provides a more (...)
Design Handoff: 7 Things Must Known About Design Specs for Developers
Quick summary:Design handoff takes place when designers finish the work and need to deliver results to developers. The ultimate goal of design handoff is to minimize the guesswork and improve the effectiveness of the design process. Here are 7 things that designers can do to make the handoff as smooth as possible:Establish effective communicationPrepare a handoff checklistPrepare high-quality assetsAutomate the handoff process using special toolsDesign for edge casesDescribe complex animated effects in detailsSchedule a meeting for handoff1. Establish effective communicationThe relationships between the design and engineering team play a vital role in project success. Many product teams make the same mistake — they isolate design and development teams. As a result, two teams work (...)
User Story Mapping For Beginners
User Story Mapping (USM) allows for project managers, developers and designers to put a method behind the continuous complexity of product #design and creating an awesome User Experience (UX). Creating with USM allows for developers to create products and processes which are user-centered and user experience focused.The process begins with keying in on user goals, and breaking down the product/process through understanding the problem at hand. Each step that the user takes to reach the goals are collected and listed. Simply follow the journey and narrative to uncover each step involved in the user’s activity. Create a solutions to improve the product, maybe even multiple to create user stories, a tool that helps you have shared understanding within your team.By organizing the goals, (...)
Using Multiple UIStoryboards in #xcode
iOS Developers, this tutorial has the intention to make you forget building #ios apps that rely on a single storyboard.In the past few years, iOS projects (and mobile projects in general) contained no more than 10–15 screens in total. A single storyboard was definitely a good option since it could fit all screens and still have a clean wireframe that was understandable for future and current developers.But, these days a 10–15 screens project is counted as a small sized project. What happens is that most of the projects currently are containing 40+ screens. And this is where it becomes a real issue. You are working with a single storyboard, you add all the screens inside of it, and suddenly you start facing many performance issues and getting lost easily in the sea of controllers. Not to (...)
Best Emotional #design Principles to Create Attractive and Enjoyable #ui
6 effective emotional design principles and examples can help you create attractive and enjoyable web/app UI for better UX.These days, with the rise of emotional design, an increasing number of UX/UI designers realize the importance of emotions and are starting to create emotional interfaces for better UX.Donald Arthur Norman, the co-founder of the famous Nielsen Norman Group, first introduced the term “emotional design” in his famous book called “Emotional Design” and emphasized the great impact of emotional design on web/app designs for better and more pleasurable UX.However, how can you put emotions into your web/app interface designs and engage more customers as a UX/UI #designer？Are you looking for some practical emotional design principles or examples to help you make an attractive and (...)
Implementing hidesNavigationBarWhenPushed on #uiviewcontroller
It’s been a while since my last post.I am back and hoping to dedicate more time to writing tutorials and open sourcing interesting things.What this post is about?In this post I want to go through the recently published HidesNavigationBarWhenPushed library and explain the motivation behind that, as well as the implementation.hidesNavigationBarWhenPushed in action (With interactive pop gesture recognizer)MotivationWhile hacking on various projects, time to time I get designs where view controller A has navigation bar visible, and view controller B has it hidden. It was always a pain to make it work.The simplest solution would be:▻https://medium.com/media/ab44bd8c5b6fec3d741ac6848ac1f366/hrefAnd it would work like this:That did not quite work, since the key requirement was to keep navigation (...)