Are you ready for 2019? More importantly, is your website? Web Week is designed to help you take advantage of low traffic and inactivity by encouraging you to make changes to your site, try out new things, and revamp for the new year.
During Web Week, we encourage our customers to take advantage of this low-stress time of year to create more personalized, dynamic, and better-performing digital experiences. For brands and agencies, this is the perfect time to kick your feet up, re-access, and get creative. It’s the ideal time to get inspired and do all the things you’ve been neglecting during the hectic holiday season.
Despite concerns that Gutenberg would launch too early, that simply hasn’t been the case, and in recent months a herculean effort has gone into checking a considerable subset of the most-used plugins to make sure they’re Gutenberg-compatible. An equally heavy lift has been undertaken by
Almost three years ago, WP Engine expanded its global presence and opened a second international office in Limerick, Ireland (our first was in London). Known as a city where technology and culture collide, Limerick has been the perfect location for WP Engine to grow and evolve. At its start, the
When it comes to facilitating a truly enjoyable and productive workplace, it takes more than just the promise of perks and ping pong. Employees want their workplaces to reflect what they value and expect out of the company they work for: trustworthiness, morality, and the opportunity to grow both in
Cryptocurrency Fraud Is the Exception, Not the Rule
And of course, legitimate services attract fake copycats. For instance, an app posing as MyEtherWallet, one of the most popular services for storing Ethereum and other coins, rose to the top of Apple’s App Store charts in December 2017 before it was revealed to be a scam. Although these
5 Real Life Blockchain Implementations Outside of Cryptocurrency
Medicalchain aims to use blockchain technology to securely store medical records. Using a distributed ledger for healthcare is a godsend as it allows doctors, hospitals, laboratories, pharmacists, and health insurers to have more immediate access to health records, which could help save lives
A Tale of Two Bubbles: Why Cryptocurrency Isn’t the Next Dot-Com
Be ready to work with government agencies and adapt to new regulations when they inevitably arrive. Private companies that behave like public companies are more likely to come out on top. In that same vein, be sure you’re not taking a ton of money from unaccredited investors — or
How to use Screening Questions to Select the Right Participants for User Research
If you need to recruit people who are highly familiar with a certain topic, open-ended questions can elicit authentic details that tell you whether respondents have the relevant experience. If you ask people how often they play online games, it’s easy for someone who plays a few times a year to
join wp engine in web week 2018
Brand Is Experience in the Digital Age
Why is it important to understand the components of brand, and to differentiate brand from its common misinterpretation as simply a logo, a figurehead, or a website, among other things? Only when all three brand components — visuals, tone, and behaviors — are present and true to the core brand
Treemaps: Data Visualization of Complex Hierarchies
The size of each rectangle represents the market capitalization (value) of that stock, industry, or sector. At the lowest level of the hierarchy (individual companies), Google (E) has a larger market cap than Facebook (F), and so their relative rectangles are sized appropriately. One level up in
Top 10 Intranet Trends of 2016
Enbridge employees can easily access the company’s public information on social sites — including Twitter, Facebook, LinkedIn, and YouTube — via links in the middle of the homepage. This section also includes a link to the @enbridge blog. Providing quick access to external sites raises
Closeness of Actions and Objects in GUI Design
That mainstream corporate websites make blatant usability mistakes is understandable because most members of their teams aren't grounded in graduate degrees in human-computer interaction. (That's why I have recently added foundational courses, such as The Human Mind, to my usability conference
Indicators, Validations, and Notifications: Pick the Correct Communication Option
The way in which validation should be implemented varies based on the unique needs of the form. However, in general, if the user’s input is incorrect, the system should inform the user by providing an identifiable and clear message that aids in correcting the error. Validation messages should
The State of Transactional Email
In preparation for the fourth edition of our report on transactional email and confirmation messages (part of our Ecommerce User Experience report series), we conducted two user research studies: in-person usability testing, and a longitudinal diary study. The main types of transactional email
join wp engine in web week 2018
Large Devices Preferred for Important Tasks
This bar chart shows the average activity-importance rating for activities performed on a computer/laptop (red) versus on a mobile device (grey). Computer activities had an average importance rating of 4.03 out of 5, with a 95% margin of error of 0.25. Mobile activities had an average importance
The Distribution of Users’ Computer Skills: Worse Than You Think
This is what level-2 people can do: “At this level, tasks typically require the use of both generic and more specific technology applications. For instance, the respondent may have to make use of a novel online form. Some navigation across pages and applications is required to solve the problem
UX Mapping Methods Compared: A Cheat Sheet
All UX mappings have two-fold benefits. First, the process of creating a map forces conversation and an aligned mental model. Second, the shared artifact resulting from the mapping can be used amongst your team, organization, or partners to communicate an understanding of your user or service. This
Narrative Biases: When Storytelling HURTS User Experience
It’s easy to overlook sample size and instead look for a story that provides some reasonable explanation for why events happened. But a few instances should not be presumed to represent meaningful behavior patterns, unless there is specific contextual information to the contrary. (For example
Preventing User Errors: Avoiding Unconscious Slips
While your website’s database might not allow nonnumeric characters to be stored in a phone number, you surely want your users to notice typos when they enter their phone number. One solution is to let users type in a way that’s natural to them, rather than forcing them to use the format that
Rapid Experiments are Key to Making AI Technology Buy vs Build Decisions
As enterprises embrace AI and work towards integrating it increasingly into their business processes, one of the key decisions they are all having to make is whether to buy or build the AI components that will drive their enterprises into the future. More than 61 percent of businesses said they
How a VPN Can Enhance Your IOT Devices Security
Business, as well as individuals, need to be cautious about the security loopholes that can come with such devices. For companies, there are plenty of recommended business VPN providers that will help ensure more secure operations without compromising on network speed. For everyday consumers, free
Is Your VPN Masking your Online Privacy or Exploiting Your Data? 6 Ways to Find Out
Research has shown that VPNs have their limitations and issues to be addressed. Addressing private security issues is why it is essential to carefully and thoroughly read through every legal document attached to their pages. Okay — at least read through trustworthy VPN review sites that
A 60-Second Trailer of the 60-Day Report on Cybersecurity
Melissa Hathaway came across our radar recently when President Obama tasked the former Bush administration aide with leading a 60-day review of Bush’s Comprehensive National Cybersecurity Initiative; a largely classified, purported $30 billion, multi phase plan to address cybersecurity issues
join wp engine in web week 2018
Importance of Application Software
In tech-savvy times, applications have become a daily part of our lives, from music to data we take help of applications for almost everything we do for example shopping, music, traveling, food and even business. when it comes to businesses, these days they are increasing in size, complexity, and
9 Warning Signs Perfectionism is Killing Your Digital Productivity
We believe: the more productive we are, the more others will respect us and consider us professionals, able to balance work and life and, for all that, stay sane and happy. So we crave for stellar productivity. We want to join those “perfect” people, who’ve conquered the digital
Join WP Engine in Web Week 2018 | Horizontal Attention Leans Left
Horizontal Attention Leans Left
Search-engine use made up 16% of web use that we observed, and was analyzed separately to prevent the skew of data. We found that browsing patterns on search-engine result pages (SERPs) were different from browsing patterns on the general web. On SERPs, almost all fixations (94%) fell on the left
Changes in Web Usability Since 1994
The dominant Web look in 1994 was a mixture of gray text and large images, as shown to the right (screens from a comparative study of sites in 1994). This has certainly changed: We have better layout capabilities and many designers have learned to minimize their use of graphics and save download
Do Government Agencies and Non-Profits Get ROI From Usability?
It therefore costs $38,000 to identify the 34 usability problems that will be fixed, or $1,118 per problem. The cost of an actual fix might be much more, but in our example, the cost is modest because all that's required is a bullet point rewrite. That is, the new text must be written, approved