Personalization allows a system to identify a user as a specific type or individual, and to deliver appropriate content and functionality to that user. Personalization targets experiences to users with the intent of delivering what they need when they need it. However, personalization needs to be carefully implemented to ensure ongoing success.
Here are some guidelines for creating a successful personalized experience:
1. Assign roles carefully.
When done well, personalization can enhance an experience by presenting the right information to the right user at the right time. However, if a user is tagged as the wrong “type,” personalization can result in a frustrating experience that might annoy the user at...
Solving a big problem is more difficult than solving a small problem. However, if your app does only one thing, it had better to it really, really well. So, the criteria for polish are stricter for small applications than for enterprise applications. With thousands of screens in some applications
If form length is a concern, you can place field labels to the left of the text fields. However, make sure that labels are of similar length and are placed as close to the text fields as possible. If the labels are too far to the left, it can be difficult to associate the correct label with its
Upon further experimentation, I discovered another way of getting rid of the options box: uncheck the checkbox marked "Show options dialog." This, of course, completely violates the design rules for checkboxes and radio buttons , which are not supposed to have any immediate effect when they are
Past Bitcoin to Making Money from the Blockchain
Even if you don’t want to have anything to do with this technology, reality check: you probably already do. Blockchain is booming, and there’s no slowing it down right now. As more uses for this technology are identified, we’re all going to find ourselves talking blockchain at the dinner
A 60-Second Trailer of the 60-Day Report on Cybersecurity
Melissa Hathaway came across our radar recently when President Obama tasked the former Bush administration aide with leading a 60-day review of Bush’s Comprehensive National Cybersecurity Initiative; a largely classified, purported $30 billion, multi phase plan to address cybersecurity issues
9 Blockchains Transforming the Way We Pay, Play, and Work
Look past digital currencies’ nosebleed pricing volatility, and you’ll discover a robust, decentralized, secure database. Brands and technologists are quickly figuring out how to put this powerful ledger to good use. Here are several real-world examples that demonstrate cryptos’
Beyond Usability: 3 User Experiences Reshaping Their Industries
Pre Uber we were all plagued with standing on the corner, possibly in the rain, belongings in hand while attempting to wave down one of the few free taxis. (The worse the rain, the fewer the taxis — that’s a law of nature.) An abundance of unknowns adding further anxiety: how much is it going
6 tips for successful personalization
Brand Vocabulary in the Context of UX: Key Terms Defined
With the first, more meaningful definition of Brand in mind, we’ve compiled and defined the concepts that comprise an organization’s brand framework—those concepts that must be defined and understood on a company-wide level in order for an organization to provide a consistent brand experience
Brand Is Experience in the Digital Age
While “branding” products with an identifying mark (definition #1) has been around since people first began trading and selling goods, the use of brands to differentiate products — to truly attempt to influence consumers’ perceptions and choices within a market (definition #2) — is a
According to an article on Reuters.com (“U.S. contractors shift blame for HealthCare.gov problem”), when HealthCare.gov launched, prospective enrollees had to register before they could view the plans. This problem has been somewhat addressed later by adding a See Plans Now button on the
Visual Design Terms Cheat Sheet
If there are too few components on a page (which may not even warrant a dedicated page), users may not have enough information scent to confidently navigate that page. Conversely, too many components on a page can cause sensory overload and increase the task time or the chance that people will
3 Design Considerations for Effective Mobile-App Permission Requests
Any.do, an Android productivity app, provides an intro page upon launch, explaining the benefits of allowing access to the user’s contacts: get reminded to return phone calls. When users select Allow, the usual Android permission request is triggered. Without this initial screen, the permission
Recapping the State of the Word 2018
Not only should anyone be able to use and develop with WordPress, it needs to be accessible from devices of all sizes. To future proof the new editor, anything built with Gutenberg is responsive at all sizes. Mullenweg also made a point of pointing out the investment in WordPress mobile apps
6 tips for successful personalization
WP Engine All Hands Spring 2019: US
Last week, WP Engine employees from all over the U.S. came together at our Austin headquarters for the first biannual All-Hands event of 2019. All Hands is a two-day event in which employees from other offices and teams around the country get the chance to collaborate and strategize with one
Bringing Array Themes into the WP Engine Family
At WP Engine, we’ve realized this is just as important as the speed and SEO that helps you show up in search rankings, or the analytics and targeting features that help you cater to narrower sets of demographics. Great-looking websites are the basis of effective digital experiences, and with our
UX Guidelines for Recommended Content
The higher these individualized recommendation areas appeared on the site’s homepage, the more likely it was that users noticed and used them. For example, Amazon included several clearly personalized content areas near the top of the homepage, as well as throughout the long-scrolling page, and
Small Pictures on Big Screens: Scaling Up from Mobile to Desktop
For example, as the screen gets wider, scale the image up in width, height, or both, but stop before the image becomes either disproportionately large or hard to understand. Then, crop the image so it works in the new screen dimensions and start expanding this version until the image needs
UX Expert Reviews
Example of design-review finding: A screenshot from the design is annotated to describe the usability issue found, along with its severity rating. Realistic recommendations for fixing the issue can provide a starting point for the redesign. When available, a reference for the usability guideline
3 Ways to Use a Controversial Type of Data That Will Help You Succeed
So geotargeting with location-specific data is the name of the game. However, you can only make use of that data if your customers are OK with you collecting it. You may not be required to adhere to the GDPR yet, but you’re wise to start implementing the new law’s requirements now — it’s
Understanding Today’s IT Hierarchy
This position also averages between one and nine years of experience. The IT Engineer usually requires a bachelor’s degree in IT or computer science. The average salary is between $68,000 and $85,000. There are variations in this department and depending on the type of IT engineer, number of
The 3 Biggest Threats Healthcare Data Security is Facing Right Now
The supply chain is no longer a stranger to cyber threats. As the healthcare industry heavily relies on cloud-based systems, third-party service providers, and vendors in the supply chain. The organizations also realize the risk of supply chain attacks. Hackers can compromise third party goods and
7 Business Killers — Thoughts Startups Ought to Consider
No one needs to settle for a dimmed existence due to a lacking sense of self-worth. Many business startups individuals can buy into thoughts that there is something wrong with them. Some feel that they, personally, are somehow inadequate, not good enough and not worthy of being a competitor. These
6 tips for successful personalization
A 60-Second Trailer of the 60-Day Report on Cybersecurity
Finally, Hathaway sees this as a unique opportunity for the United States to work with countries around the world, and with organizations on an extremely local level. “We cannot succeed if our government works in isolation,” she added. It requires “leading from the top” from
A 60-Second Trailer of the 60-Day Report on Cybersecurity
She explained that the original design of the Internet was driven more by considerations of interoperability rather than security, and as a result we are now faced with almost insurmountable issues. Some examples include online criminals who steal our information, mass bandits who have the ability
6 Tips for Successful Personalization | Scaling User Interfaces: An Information-Processing Approach
Scaling User Interfaces: An Information-Processing Approach
When browsing the web, users keep information about their current goal in their working memory. For instance, they will carry information such as “I am trying to plan a vacation in France for my family during the month of July”. They also use their working memory to store contextual information
Are Chinese Websites Too Complex?
Many usability problems in this China study duplicated findings from our testing of Western sites with Western users. For example, users had trouble with the carousel on Tsinghua University’s website. As one Chinese user said, “On the page with different pictures from Tsinghua, I didn’t know
The Characteristics of Minimalism in Web Design
Remember that just because a design technique is popular doesn’t necessarily mean that it always supports user needs and optimizes profitability or other business objectives. In this study, we analyzed sites that are known to employ minimalist design, not sites that are known to be highly