About:
Bobbie is a tech enthusiast exploring digital interfaces, with experience as a student, developer, and manager, sharing insights through writing.
Website:
Specializations:
Interests:
Incoming Links:
Outgoing Links:
Subscribe to RSS:
The blog post explores the origins and rationale behind the keyboard shortcut Ctrl-Shift-P used in Sublime Text and VS Code for their command bars. It discusses the historical context of command bars, the inspirations from MacOS f...
Tensions between tech companies and the US government are ongoing, with historical parallels illustrating the complexities of these conflicts over privacy and security.
The blog post discusses the importance of error messages in user experience (UX) design, arguing that bad error messages often result from design trade-offs rather than incompetence. It highlights the need for informative and acti...
This post details the innovative use of font ligatures to create a Cistercian numeral font, blending historical context with modern digital typography.
The blog post humorously examines the historical role of human 'computers' in calculations and the evolution of the term, reflecting on their complexity and significance.
The blog post analyzes the percentage of image posts on Bluesky that include user-provided image descriptions (alt text). After examining 2.8 million posts, the author found that 19.9% of images had descriptions, a significant imp...
The post discusses the challenges software faces in handling uncertainty and proposes ways to better represent the unknown in user interfaces. It emphasizes the importance of acknowledging uncertainty in decision-making and explor...
Personalized pricing in the digital age raises concerns about fairness and consumer behavior as companies leverage behavioral data to set different prices for individuals.
The author reflects on the challenges of using Tesseract.js for automatic transcription of text from social media screenshots, initially presenting promising results but ultimately facing significant obstacles. The post discusses ...
The blog post discusses the Merlin app for bird identification, emphasizing the labor-intensive process behind its Sound ID tool, which relies on expert birders annotating audio recordings. The author draws parallels between the m...
The blog post discusses a recent phishing campaign targeting developers on GitHub, highlighting its clever use of GitHub's features to deceive open-source maintainers. The attack involved emails from an official GitHub address, wh...
The blog post celebrates the 50th anniversary of the Gypsy document editor, developed at Xerox PARC in 1975. It discusses Gypsy's significant influence on modern text editors, particularly its modeless interface that allows users ...
The blog post highlights various topics intersecting art, technology, and user experiences, including a discussion on the narrative changes in the VR game SUPERHOT, a tool for exploring modern music called Splitter.fm, a history o...
The author reflects on their recent hiatus from blogging due to personal and professional changes, including a job acquisition and a move. They emphasize the importance of quality over quantity in writing, cautioning against the t...
The article discusses the end of the AI lifestyle subsidy and how it will affect digital experiences. It explains how venture capital and zero interest-rate policy have led to unprofitable companies and biased search engines. It a...
The author discusses the limitations of A/B testing and the importance of understanding the customer's needs and behavior. They argue that A/B testing is often unnecessary and that qualitative research and direct user interaction ...
The text discusses the use of dial-up modem technology in meeting room teleconferencing by Zoom, using ultrasonic sound proximity detection. It highlights the benefits and challenges of this technology.
The text discusses the limitations of encryption despite its importance in securing software systems. It outlines the threats to cryptography, the challenges of key management, and the story of a security breach due to poor key ma...
The post is a roundup of links around the web, including topics such as few-shot prompting in 1993, the history of 'So-and-so is typing', automation pitfalls, and business hours.
The text discusses the challenges of backward compatibility in APIs, and how changes can break existing user workflows. It provides examples of changes that can break backward compatibility and suggests ways to manage the risk of ...
The text discusses how every application can be used for messaging, and provides examples of unconventional messaging hacks. It also talks about the difficulty of stopping people from communicating and the need for anti-abuse feat...
The text discusses the allure of infinite flexibility in products and platforms, emphasizing the importance of solving specific problems for users. It provides examples from the history of spreadsheets and programming tools, highl...
The text explains the correlation between microwave ovens and wi-fi interference, and how the ITU and FCC are involved in regulating frequency bands. It also discusses the emergence of spread spectrum modulation and the developmen...
The text discusses the fate of online accounts after the owner's death. It describes the process of memorializing accounts on LinkedIn and other platforms, the legal rights to inherit digital assets, and the challenges of managing...