readability – Driving users attention through opacity masks (reading rhythm)

I was reading this handy answer about Light on dark vs. dark on light: which is better for attention span? in the Graphic Design SE site and while reading the most voted answer I discovered that my attention focus point was almost a 100% just in the top first paragraph on my screen:

enter image description here

I decided to make some tests on how this can apply to a user experiencing reading in a site with text driven content.

I asked the following question:

How can I control this 100% of user attention on a certain piece of text?

So I created opacity masks of different heights to visually analyse this hypothesis:

70% opacity mask height:

enter image description here

50% opacity mask height:

enter image description here

However I discovered that I experience a different 100% attention area when the text size is bigger:

enter image description here

So, the question is, should I use this opacity masks in my blog or site to control in a certain the user’s attention throughout the reading rhythm?

UPDATE:

I think that as with large or complex forms which are tedious to complete, maybe, a user will finish a large reading if he/she gets small chunks of information instead of showing the user what’s next and discover that there’s a lot left to read…

users – How can I display Only the first Array/Object?

By using WordPress REST Api

./wp/v2/users/?_fields=id&orderby=id&order=desc

Result

[{"id":13},{"id":12},{"id":11},{"id":10},{"id":9},{"id":8},{"id":6},{"id":5},{"id":4},{"id":3}]

What I want?

I just want to display [{“id”:13},
Means, I want to limit it to only 1 array Using REST API. Any one have solution on this?

usability – Is it always bad to force users to click to show them your products?

Option 3 is the best, without discussion

Option 1 is a nightmare. Just thinking of a long unorganized page with extreme cognitive load is reason enough to ditch it.

Option 2 is even worse: you’re offering the user the same thing as in option 1, only that with an added step!

Also, besides messing your product’s list (reason enough but not the only one), keep in mind that in fact these first two options require more effort. Not nly cognitive, but physical: remember that in order to scroll… You have to click as well! So you’re not savng effort at all in your first two scenarios. Quite the contrary, you’re adding a lot of effort and friction with 0 benefit

What percentage of Internet keyboard users are hunt-and-peck typers?

Some people can type without needing to look at the keys. Other people need to look at the keys before pressing a key.

I’m curious if there is any published research on the percentage of users that need to hunt for the keys vs. the percentage that can type without looking at the keyboard.

I was able to find several studies comparing speeds – as expected, the people who typed without looking won – but could not find any on population percentages that use each method.

servertrafficweb.com – Storage RDP | Admin Encoding RDP | 8 Users MAX | NL Location | NewProxyLists

Why Choose Server Trafficweb ?

  • We Provide 24/7 Real Support
  • Affordable Prices For High Quality Hardware
  • Windows Server 2012 R2
  • No Setup Cost.
  • Instant Setup
  • 99.9 % Network Uptime
  • Locations :- Netherlands

Pre Installed Application :

  • Internet Download Manager
  • WinRar
  • Chrome
  • Firefox
  • Media Player Classic
  • VLC
  • Utorrent
  • Total Commander
  • And More….

Netherlands RDP Servers :-
Our Goal :-
To provide best available service to our clients, by means of best support, offering cheapest prices for the RDP slots and with the best servers available in the market.
Our Guarantee
24 hour Money Back Guarantee*
Anytime refund in the form of Credits*

Not Allowed :-
Mining | Cracking | Downloading from Public Torrent Trackers | Child Porn | Sick Porn | Spamming | Not More than 3 Torrents at a time | Check with us if you are unsure about the activity before buying since we do not provide refunds.

Payment method :-

Proof Support :-


Speed Testing :-
Request demo for speed testing. We also have 24 hours money back guarantee.

24/7/365 Full Support :-

Skype :- live:servertrafficweb24
Website :- http://servertrafficweb.com
Email :- [email protected]

Stay Connected :-
Facebook | Twitter | Instagram

custom post types – restrict content for users with same role

I have created a custom post type (CPT) called “books” where users will be able to exchange “bookid” and “bookinfo” (as ACF).

I have created user roles such as Countries and cities (France> Paris, France>Marseille)

I am looking to find a way that a user who has the user role Paris can only “view/edit/delete” the books from all users from same user role (Paris)

I am also looking to find a way that a user who has the user role France will be able to “view/edit/delete” the books from all sub user roles such as Paris and Marseille.

I hope my idea is quite clear…
I havent found any plugin who could do that or any function after hours of research online.
any idea ?

javascript – Suspicious behavior by Google when verifying users via nodejs

I’m building a user authentication system in Nodejs and use a confirmation email to verify a new account is real.

The user creates an account, which prompts him/her to check the email for a URL that he/she clicks to verify the account.

It works great, no issues.

What’s unusual is that in testing, when I email myself (to simulate the new user process), and after I click the verify-URL, immediately afterward there are two subsequent connections to the endpoint. Upon inspection, it appears the source IPs belong to Google. What’s even more interesting is that the user agent strings are random versions of Chrome.

Here’s an example of the last sequence. The first one is the HTTP 200 request and the next two — the HTTP 400s are Google. (I remove upon user verification the user’s verification code from the database so that subsequence requests are HTTP 400s.)

162.158.78.180 - - (03/Jul/2020:20:35:40 +0000) "GET /v1/user/verify/95a546cf7ad448a18e7512ced322d96f HTTP/1.1" 200 70 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36" "hidden.com" "72.191.192.163" "US" "en-US,en;q=0.9"
162.158.187.117 - - (03/Jul/2020:20:35:43 +0000) "GET /v1/user/verify/95a546cf7ad448a18e7512ced322d96f HTTP/1.1" 400 28 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" "hidden.com" "74.125.210.22" "US" "en-US,en;q=0.9"
162.158.187.117 - - (03/Jul/2020:20:35:43 +0000) "GET /v1/user/verify/95a546cf7ad448a18e7512ced322d96f HTTP/1.1" 400 28 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.122 Safari/537.36" "hidden.com" "74.125.210.8" "US" "en-US,en;q=0.9"

Now I’m using Cloudflare so the first IP address in each line is a Cloudflare IP address but the second one you see is the real one (as reported by Cloudflare) … I modified my “combined” log format in Nginx.

Anyhow, any idea what this is? Or why Google would be doing this?

It’s just incredibly suspicious given the use of randomized user agent strings.

And one last note, if I inspect my console w/Chrome and go into the network tab before I click a verification link from my email, the 2 subsequent connections never come. It’s like Google knows I’m monitoring … this is just so incredibly odd that I had to ask the community. I’m thinking maybe this is an extension that’s infected w/some kind of tracking, but how then do the IPs come back as Google?

Can G Suite admins access suspended users’ data?

According to Google’s G Suite, "What happens to a suspended user’s account and data? …unavailable to the user."

But what about the admins? Is the data still available to them? If so, how?

design – How can I implement an invite system between users in an app?

I’m currently making a web app using flutter and firebase. To make this short and sweet, I want users in my app to be able to form groups. The group leader will pick base “settings” for the group and the users will add their own settings. Example:
Example

So in the example above, the group leader has formed a group called “Ice cream group” and has chosen its base settings with every user in the group having its own settings. To form this group, the group leader would need to have the usernames of the users they want to invite and have it sent to the users. Within the invite are the group settings. The users will have the opportunity to add their settings and accept the invite. So in the end everyone in the group will be using the settings of the group and their own.

So sequentially this would happen.

  1. Group Leader creates group settings
  2. Group Leader makes its own settings.
  3. Group Leader has the ids of users that they want to invite.
  4. Group Leader sends the invites.
  5. Users receive the invite with the base settings. They can accept or reject the invite. Before they accept, they would have to add their own settings.
  6. Once every user that the group leader invites accepts the invitation, then the group is formed.

For this project I’m using the flutter framework and firebase(nosql) for the back end. Since firestore uses nosql my guess to the solution would be a document that would track the status of the invites. And depending on the status the group would be formed.

Currently my structure for the user looks something like this:
User Document

I was thinking about adding an invite field to the user and then adding a invite document that would hold the settings of the group, the status of the invite, and the user settings…

I have some ideas on what I think should done but I wanted to come here first to see if anyone had any suggestion before I try and tackle it. If anyone has any pseudo code, information, or can direct me to a place where I should ask this question, I’d appreciate it. Thanks!

Can you change recovery mode from simple to full with users working on the server?

Can you change recovery mode from simple to full with users working on the server?

While the server is changing the mode is the work of the users interrupted? If so, for how long.

Version: SQL server 2016

Thank you very much