All posts filed under “Sneaky

Locking out IE users

Locking out IE users

UPDATE: The code being used is from the Explorer Destroyer project, which has an explanation of its rationale here. It’s worth noting that it’s not just ‘Get Firefox’, but ‘Get Firefox with the Google Toolbar’, hence the $1 referral fee… I’d much rather have Firefox […]

Sniffing out censorship

Sniffing out censorship

Image from News Sniffer News Sniffer‘s Revisionista monitors alterations to published news stories from a variety of sources by comparing RSS feeds, sometimes revealing subsequently redacted information or changes of opinion (e.g. note the removed phrase in the first paragraph of this story about Cuba). […]

Shaping behaviour: Part 1

Shaping behaviour: Part 1

A couple of months ago I posted about the ‘shaping behaviour’ research of RED, part of the UK Design Council. At the time I noted in passing a classification of design approaches for shaping behaviour, mentioned by RED’s Chris Vanstone: “stick*, carrot or speedometer.” It’s […]

Chairman of the bored

Chairman of the bored

This blog often looks at methods for preventing people sitting down comfortably, usually in public space, from actual benches designed for this purpose, to features of walls and ledges which treat people like pigeons. How often is the complete lack of seats a deliberate strategy? […]

Tearstrip-tease

Tearstrip-tease

Alexander Freitas of the Infinity Squared blog notes the difficulties with frustrating tear-strips on packaging, and, comparing an easier-to-open pack from one manufacturer with a difficult tearstrip from another, suggests (somewhat along the lines of ‘Forcing functions designed to increase product consumption‘), that the company’s […]

A bright idea?

A bright idea?

UPDATE: See this more recent post for information and photos of how to get a 2-pin bulb to fit in a BC3 fitting. This may well be the example which involves the most different ‘architecture of control’ issues so far – by a long way. […]

Packet switching

Packet switching

Both Dr Tom Stafford (co-author of the fantastic Mind Hacks book & blog) and Gregor Hochmuth (creator of FlickrStorm, an improved Flickr search system) have been in touch suggesting packaging/portion sizes as a significant everyday architecture of control, (or at least an aspect of design […]

Objects in mirror are wider than they appear

Objects in mirror are wider than they appear

This is an interesting story. Robert Kilroy-Silk (above) currently an independent MEP, has raised the issue in the European Parliament of intentionally distorting mirrors in clothes stores, specifically Marks & Spencer: Marks and Spencer has said it is mystified by a claim by MEP Robert […]

Key issue

Key issue

Is this simply poor design or a deliberate feature? A friend tells me of his irritation with his Sony Ericsson W880i’s ‘internet’ key, which is positioned such that it frequently gets pressed accidentally when pressing the buttons above and below it – “three or four […]

Use of RFID in DRM

Use of RFID in DRM

Via Dave Farber’s Interesting People, a brief New Scientist article outlines Sony’s continuing obsession with restricting and controlling its customers (the last one didn’t go too well): “A patent filed by Sony last week suggests it may once again be considering preventing consumers making “too […]