Standard 2-pin bayonet cap (left) and 3-pin bayonet cap BC3 (right) fittings compared Summary for mystified international readers: In the UK new houses/flats must, by law, have a number of light fittings which will ‘not accept incandescent filament bulbs’ (a ‘green’ idea). This has led […]
All posts filed under “Lock-in”
Dishonourable discharge?
Long overdue, I’m currently reading Bruce Schneier‘s excellent Beyond Fear, and realising that in many ways, security thinking overlaps with architectures of control: the goal of so many systems is to control users’ behaviour or to deny the user the ability to perform certain actions. […]
Biting Apple
Interesting to see the BBC’s summary of the current iPhone update story: “Apple issues an update which damages iPhones that have been hacked by users”. I’m not sure that’s quite how Apple’s PR people would have put it, but it’s interesting to see that whoever […]
Bad profits
The Gillette Sensor Excel not only comes with a dummy blade, it also only comes with two out of five possible blade slots filled. Images from Sevenblock on Flickr. The razor-blade model in general is something of an old chestnut as far as architectures of […]
Another charging opportunity?
Last month, an Apple patent application was published describing a method of “Protecting electronic devices from extended unauthorized use” – effectively a ‘charging rights management’ system. New Scientist and OhGizmo have stories explaining the system; while the stated intention is to make stolen devices less […]
Persuasion & control round-up
New Scientist: Recruiting Smell for the Hard Sell Samsung’s coercive atmospherics strategy involves the smell of honeydew melon: THE AIR in Samsung’s flagship electronics store on the upper west side of Manhattan smells like honeydew melon. It is barely perceptible but, together with the soft, […]
Digital control round-up
Mac as a giant dongle At Coding Horror, Jeff Atwood makes an interesting point about Apple’s lock-in business model: It’s almost first party only– about as close as you can get to a console platform and still call yourself a computer… when you buy a […]
Eight design patterns for errorproofing
Go straight to the patterns One view of influencing user behaviour – what I’ve called the ‘errorproofing lens’ – treats a user’s interaction with a system as a set of defined target behaviour routes which the designer wants the user to follow, with deviations from […]
Swoopo: Irrational escalation of commitment
Swoopo, a new kind of “entertainment shopping” auction site, takes Martin Shubik’s classic Dollar Auction game to a whole new, automated, mass participation level. It’s an example of the escalation of commitment, or a sunk cost fallacy, where we increase our commitment (in this case […]
More thoughts on the Eaton MEM BC3, CFLs and Power Factor
UPDATE: See this more recent post for information and photos of how to get a 2-pin bulb to fit in a BC3 fitting. BC3 reactions The post looking at the Eaton MEM BC3 system, a couple of months ago, has become something of a reference […]
A bright idea?
UPDATE: See this more recent post for information and photos of how to get a 2-pin bulb to fit in a BC3 fitting. This may well be the example which involves the most different ‘architecture of control’ issues so far – by a long way. […]
Useful terminat-ology
Image from Black Flag website. Sometimes there’s very useful terminology in one field, or culture, which allows clearer or more succinct explanation of concepts in another. In the UK we don’t have Roach Motels. There are doubtless similar products, but they don’t have such a […]