Less is not always moreAs an example of the challenges presented by AI, facial recognition used to unlock phones. Once, the unlock interface was easy to describe. User swipes. Keypad appears. User enters the passcode. Application authenticates. User gains access to the phone. With AI-inspired facial recognition, however, UX design begins to go deeper than the interface into the AI itself. Designers must think about things they’ve never had to before, like the training data or the way the algorithm is trained. Designers are finding it hard to understand AI capabilities, to describe how things should work in an ideal world, and to build prototype interfaces. Engineers, in turn, are finding they can no longer build software to exact specifications. For instance, engineers often consider training data as a non-technical specification. That is, training data is someone else’s responsibility. “Engineers and designers have different priorities and incentives, which creates a lot of friction between the two fields, Leaky abstractions are helping to ease that friction.”
Radical reinventionIn their research and colleagues interviewed 21 application design professionals UX researchers, AI engineers, data scientists, and product managers across 14 organizations to conceptualize how professional collaborations are evolving to meet the challenges of the age of artificial intelligence. The researchers lay out several leaky abstractions for UX professionals and software engineers to share information. For the UX designers, suggestions include things like the sharing of qualitative codebooks to communicating user needs in the annotation of training data. Designers can also storyboard ideal user interactions and desired AI model behavior. Alternatively, they could record user testing to provide examples of faulty AI behavior to aid iterative interface design. They also suggest that engineers be invited to participate in user testing, a practice not common in traditional software development. For engineers, the co-authors recommended leaky abstractions, including compiling of computational notebooks of data characteristics, providing visual dashboards that establish AI and end-user performance expectations, creating spreadsheets of AI outputs to aid prototyping and “exposing” the various “knobs” available to designers that they can use to fine-tune algorithm parameters, among others. The authors’ main recommendation, however, is for these collaborating parties to postpone committing to design specifications if possible. The two disciplines must fit together like pieces of a jigsaw puzzle. Fewer complexities mean an easier fit. It takes time to polish those rough edges.
In software development, there is sometimes a misalignment of needs, Instead, if I, the engineer, create an initial version of my puzzle piece and you, the UX designer, create yours, we can work together to address misalignment over multiple iterations, before establishing the specifics of the design. Then, only when the pieces finally fit, do we solidify the application specifications at the last moment.”In all cases, the historic boundary between engineer and designer is the enemy of good human-centered design and leaky abstractions can penetrate that boundary without rewriting the rules altogether.
You probably don’t consider the ransomware groups’ “tech stack,” “customer service,” or business strategy when you think about dark web
To robust cybersecurity and cloud security, there are no fast cuts to achieving it, and many firms are failing to
AI proponents argue that technology may enhance human abilities and assist in the solving of difficult problems. However, some worry
A New Wave Of Data Acceleration Is Being Introduced : We are losing the ability to handle complex jobs as
See More Blogs
Definition of programming A computer program is made up of code that is run by the computer to carry out
WHAT IS SOFTWARE? Software is a collection of instructions, data, or computer programs used to run computers and carry out
What Is Cloud Computing? In plain English, cloud computing is the process of accessing and storing data over the Internet
1 . Change your power settings Windows 10’s “Power Saver” mode will slow down your computer if you use it.
Big data has grown to be a significant part of the tech industry today because of the useful information and