60
Designing for a user-hijacked world.

Designing for a User Hijacked World

  • Upload
    frog

  • View
    8.053

  • Download
    2

Embed Size (px)

DESCRIPTION

As part of Social Media Week, frog Strategist Adam Silver hosted a workshop, "Designing for a User-Hijacked World" at the NY studio. His workshop focused on how design can use social media to build more inclusive, adaptive and relevant user experiences.

Citation preview

Page 1: Designing for a User Hijacked World

Designing for a user-hijacked world.

Page 2: Designing for a User Hijacked World

frog designSocial Media Week 2010

630-7 Meet and greet (and beer and wine)

7-730 Presentation730-830 Workshop

Page 3: Designing for a User Hijacked World

We build for the user.

Page 4: Designing for a User Hijacked World

We build for the user.

Page 5: Designing for a User Hijacked World

And now users are building for themselves.

Page 6: Designing for a User Hijacked World

They know better.

Page 7: Designing for a User Hijacked World

Lets go back. To the Internet of yesteryear.

Page 8: Designing for a User Hijacked World

The 80s: a time of single rainbows.

Page 9: Designing for a User Hijacked World

We were pioneers.

Page 10: Designing for a User Hijacked World

We geeked out.

Page 11: Designing for a User Hijacked World

We created the first Facebook.

Page 12: Designing for a User Hijacked World

We made the Internet cool.

Page 13: Designing for a User Hijacked World

And then…

Page 14: Designing for a User Hijacked World

AOL

Page 15: Designing for a User Hijacked World

Compuserve

Page 16: Designing for a User Hijacked World

Prodigy

Page 17: Designing for a User Hijacked World

The first online ad was launched.And that day, the users slowly lost control.

Page 18: Designing for a User Hijacked World

The internet became business as usual.

Page 19: Designing for a User Hijacked World

We made a deal.Our souls in exchange for better experiences.

Page 20: Designing for a User Hijacked World

What we got.

Page 21: Designing for a User Hijacked World

What we got.

Page 22: Designing for a User Hijacked World

What we got.

Page 23: Designing for a User Hijacked World

They crashed and burned.

Page 24: Designing for a User Hijacked World

The return to the open Internet promised a new era of openness.

Page 25: Designing for a User Hijacked World

It wasn’t meant to be.

Page 26: Designing for a User Hijacked World

And then…

Page 27: Designing for a User Hijacked World

We smartened up.

Page 28: Designing for a User Hijacked World

We started building again.

Page 29: Designing for a User Hijacked World

We figured out how to use the Internet to fund our passions.

Page 30: Designing for a User Hijacked World

Connect with people on our own terms.

Page 31: Designing for a User Hijacked World

Read news that’s just for you.

Page 32: Designing for a User Hijacked World

And…

Page 33: Designing for a User Hijacked World

Recover golden eggs.

Page 34: Designing for a User Hijacked World

Take hipstery photos.Recover golden eggs.

Page 35: Designing for a User Hijacked World

Take hipstery photos.Recover golden eggs.

Live your DJ dreams.

Page 36: Designing for a User Hijacked World

Take hipstery photos.Recover golden eggs.

Live your DJ dreams. Catch up on your RSS.

Page 37: Designing for a User Hijacked World

Find a taco truck.

Page 38: Designing for a User Hijacked World

Users are hijacking the Internet.

Page 39: Designing for a User Hijacked World

How can you benefit?

Page 40: Designing for a User Hijacked World

Ask yourself:

Page 41: Designing for a User Hijacked World

Can you make it more adaptable?

Page 42: Designing for a User Hijacked World

Can you make it more useful?

Page 43: Designing for a User Hijacked World

Can you make it more surprising?

Page 44: Designing for a User Hijacked World

Can you give it away?

Page 45: Designing for a User Hijacked World

Good solo.

Page 46: Designing for a User Hijacked World

Great together.

Page 47: Designing for a User Hijacked World

Hotmail: free

Page 48: Designing for a User Hijacked World

Dropbox: free and useful

Page 49: Designing for a User Hijacked World

Posterous: free, useful and adaptable.

Page 50: Designing for a User Hijacked World

Twitter is: free, useful, adaptable and surprising.

Page 51: Designing for a User Hijacked World

How to design for a user-hijacked world?

Page 52: Designing for a User Hijacked World

Don’t write the story.

Page 53: Designing for a User Hijacked World

Set the stage.

Page 54: Designing for a User Hijacked World

Then, let em hijack it.

Page 55: Designing for a User Hijacked World

When you design it to be hackable…

Page 56: Designing for a User Hijacked World

It just gets better.

Page 57: Designing for a User Hijacked World

Users = u$age. That’s the goal.

Page 58: Designing for a User Hijacked World

Thanks

Page 59: Designing for a User Hijacked World

Next up: workshopCreate your own hackable experience

Page 60: Designing for a User Hijacked World

Get started:

1. Look at your card, locate your number2. Locate your group (signs are on the walls)3. Grab a packet of worksheets from the front (1 per group)4. Get started! Frog moderators are floating around to help

You have 20 minutes for the first phaseWe will find you for the next…

Good luck!