Difference between revisions of "User Web Experience"

From MgmtWiki
Jump to: navigation, search
(Introduction)
Line 2: Line 2:
 
The [[User Web Experience]] has never been a priority over the plain expediency of just experiencing on new [[User Experience]] in the furtherance of expediency, or just getting the job done.
 
The [[User Web Experience]] has never been a priority over the plain expediency of just experiencing on new [[User Experience]] in the furtherance of expediency, or just getting the job done.
 
==Introduction==
 
==Introduction==
The Web has experienced phenomenal growth since its birth a CERN in
+
First a reality check; the internet was designed to connect computers, not users. On the other hand the Web focused on user access and has experienced phenomenal growth since its birth a CERN in
 +
 
 +
Security has been added to the internet from the bottom up starting with IPSEC at layer 2 and moving up to Transport Layer security at layer 4. Over the years both of these were made more secure and useful. Several attempts have been made to leverage these security protools for the benefit of the user (called channel binding or similar) but at the core they are focused on machine security, and not the real-world entities running the machines.
 +
 
 
==Grand Unification Theory==
 
==Grand Unification Theory==
  

Revision as of 12:09, 5 November 2020

Full Title or Meme

The User Web Experience has never been a priority over the plain expediency of just experiencing on new User Experience in the furtherance of expediency, or just getting the job done.

Introduction

First a reality check; the internet was designed to connect computers, not users. On the other hand the Web focused on user access and has experienced phenomenal growth since its birth a CERN in

Security has been added to the internet from the bottom up starting with IPSEC at layer 2 and moving up to Transport Layer security at layer 4. Over the years both of these were made more secure and useful. Several attempts have been made to leverage these security protools for the benefit of the user (called channel binding or similar) but at the core they are focused on machine security, and not the real-world entities running the machines.

Grand Unification Theory

References