Categories
microsoft windows OS

SCOOB!: Every Scooby-Doo Character Confirmed For The Movie

Those eagerly anticipating SCOOB! now have a clear image of which timeless Hanna-Barbera characters will be making a look in the upcoming Scooby-Doo film. The 3D-computer animated movie, directed by Tony Cervone, will be a reboot of sorts for the Scooby-Doo movie franchise. The upcoming film will likewise mark the very first installation in a Hanna-Barbera shared cinematic universe .

Scooby-Doo was among the most popular titles to come out of the Hanna-Barbera umbrella of titles. The cherished canine and his gang of mystery-solvers –– Shaggy, Fred, Daphne, and Velma –– were staples throughout the timeless period of Saturday early morning animations. The characters were included in a great deal of spinoffs and TELEVISION movies prior to Warner Bros. established a brand-new Scooby-Doo movie franchise in 2002. The motion picture generated a theatrical follow up in addition to a TELEVISION prequel, follows up, and spinoffs.

Related: What Song Is In The SCOOB Trailer?

Rather than establishing another animated adjustment, Warner Bros. had actually chosen to go the 3D animation path for SCOOB! The motion picture will concentrate on Scooby and the gang while likewise working as an origin story. Scooby and Shaggy wind up being hired by Blue Falcon to assist remove Dick Dastardly and his prepare for a ” dogpocalypse.” The following is every Hanna-Barbera character validated for the film.

There definitely could not be a Scooby-Doo movie without the precious talking canine in the front and. The big Great Dane and devoted buddy of Shaggy Rogers and the rest of Mystery Inc. made his Hanna-Barbera launching in 1969 with the best of Scooby-Doo, Where Are You! on CBS. In the following years, a number of animated spinoffs were established including Scooby, consisting of films. In spite of his afraid behavior, Scooby worked in resolving crucial mystical along with his human good friends. He’s likewise popular for his numerous catchphrases like “Scooby-Dooby-Doo!” or ” Ruh-roh!” when things go awry. Frank Welker has actually voiced the character considering that 2002 and will be playing him once again in SCOOB!

Shaggy, whose genuine name is Norville Rogers, belongs to Mystery Inc., an amateur group of investigators that concentrate on cases including supernatural events. Shaggy has actually been around for as long as Scooby in the Hanna-Barbera franchise, as the 2 are close buddies. The character got his label for his shaggy design of hair and his loose-fitting outfit. Shaggy is rather of a slacker and shares the exact same kind of cowardice as Scooby, however he assists do the job. He was very first voiced by Casey Kasem worldwide of animation and especially depicted by Matthew Lillard in the live-action adjustments from the early ’00s. Will Forte voices him in SCOOB! in addition to Iain Armitage as the more youthful variation of Shaggy.

Fred Jones is a fellow member of Mystery Inc. and tends to take the lead in examinations. He was constantly understood for being the good-looking member using his traditional white sweatshirt and orange ascot tie. Fred can a bit bossy sometimes, however it appears like SCOOB! is focusing more on his appeal instead of his intelligence for the most recent adjustment. The character was voiced by Frank Welker because 1969, however live-action variations have actually been played by Freddie Prinze Jr. and Robbie Amell. For SCOOB!, Zac Efron will be heard voicing Fred with Pierce Gagnon playing his more youthful equivalent.

Related: All Upcoming Scooby-Doo Movies

Daphne Blake, a.k.a. “Danger Prone Daphne,” is among the 2 female members of the young investigator gang. As recommended by her label, Daphne constantly had a history of getting herself stuck in harmful circumstances up until her representation was altered to make her more independent. Daphne originated from a rich household who assisted Mystery Inc. get off the ground. The character, understood for her style sense, was very first voiced by Stefanianna Christopherson prior to Heather North took control of. Sarah Michelle Gellar likewise represented Daphne in several titles. Amanda Seyfried is set to voice the character in SCOOB! with Mckenna Grace voicing young Daphne.

Velma Dinkley is the brains behind Mystery Incorporated. Because her intro in 1969, Velma has actually constantly been the doubter amongst the gang, not quickly encouraged by the supernatural. She likewise had an ability in persuading Scooby in discovering guts through a kickback of Scooby Snacks. Velma was voiced by Nicole Jaffe and Pat Stevens, amongst numerous others. Gina Rodriguez will be heard voicing Velma in SCOOB! while Ariana Greenblatt provides her voice to young Velma.

Blue Falcon was presented in the 1976 animated series, Dynomutt, Dog Wonder, a series packaged with Scooby-Doo throughout Saturday early morning animations. The character was a millionaire art dealership called Radley Crown who had a secret identity as a superhero. His robotic pet dog, Dynomutt, worked as his assistant and partner. Scooby, Shaggy, and the rest of the gang would typically appear in the series and to help in heaven Falcon’s crimefighting and the very same chooses the upcoming movie. The character will be voiced by Mark Wahlberg in SCOOB!.

Dynomutt, the other half of the Daring Duo along with Blue Falcon, is the robotic canine geared up with boundless gizmos to help Radley. The pet dog’s superhero alias is Dog Wonder and his powers were understood to come in convenient while the Daring Duo secured their city. Like Scooby, Dynomutt was a partner that might talk. In SCOOB!, Dynomutt is voiced by Ken Jeong.

Related: Scooby-Doo! The Mystery Begins Reveals The Origins Of Mystery, Inc

Captain Caveman was the titular star of the 1977 Hanna-Barbera animated series, Captain Caveman and the Teen Angels. After 3 mystery-solvers called the Teen Angels thaw an ancient caveman from a block of ice, he joined them in their efforts. Captain Caveman was billed as the “world’s very first superhero” considering that he might pull things out of his hair, obtain super-strength, and fly utilizing his club. In SCOOB!, Tracy Morgan is set to voice Captain Caveman.

Dee Sykes belonged to the Teen Angels included in the series about Captain Caveman. She and her 2 buddies found Captain Caveman and brought him back to life. Dee was represented as the most smart member of the group, similar to Velma in the Scooby-Doo gang . Kiersey Clemons will be heard voicing the character in SCOOB!.

Dick Dastardly was a popular villain throughout numerous series within the Hanna-Barbera animated universe. The character initially appeared in Wacky Races prior to starring in the spinoff, Dastardly and Muttley in Their Flying Machines. The character was constantly computing together with his partner, an anthropomorphic canine called Muttley. Cock Dastardly will have a significant function in SCOOB! as the main bad guy. He is voiced by Jason Isaacs.

Next: Every Warner Bros. Motion picture Coming In 2020

.

Read more: screenrant.com

Categories
microsoft windows OS

Why Are All My Apostrophes Missing?

Have you ever seen an HTML page or email where everything looks fine, except instead of apostrophes there are odd question marks or square blocks? You might also see other characters replaced similarly.

Info from our 2008 article

Most commonly, this occurs when importing HTML that has been created by Microsoft Word. For generating HTML, Word uses a specific character set called “Windows Latin 1” that has special characters like ‘smart quotes’ and trademark symbols.

When you view the email on your own machine, those characters will show up, but then when imported into Campaign Monitor they might disappear or be converted into incorrect characters.

Character encoding makes the difference

The reason is that Campaign Monitor sends in UTF-8 encoding (which covers a wide number of languages), and the special characters are not in the same location in UTF-8 as they are in Windows Latin 1.

So what to do about it? Well, the first (and most thorough) option is to just not use MS Word to generate HTML. Word tends not only to cause character problems but also adds vast amounts of unnecessary HTML to even simple pages.

If you view the source you will see rampaging hordes of span tags and CSS with oddly named classes everywhere. It can also tend to break tags that Campaign Monitor uses like <unsubscribe></unsubscribe> by inserting other tags inside them.

There are much better options for simple HTML creation out there, even at little or no cost—look at tools like NVU, Coffee Cup (free and paid), and First Page.

Of course, you can go right up to tools like Dreamweaver if you have the need.

Another alternative is to do some ‘find and replace’ work in notepad or similar to remove Word’s smart characters and replace them with the correct Unicode characters. Some common ones to look out for are:

For “ Left double quotes: Use “
For ” Left double quotes: Use ”
For ’ Apostrophe: Use ’

That way you can have the typographically correct characters show up in your email. Character encoding can be a tricky area, and you have to keep an eye on it in your HTML, in your subscribe form pages, and in the subscriber lists your import.

Always keep in mind that Campaign Monitor will send in UTF-8 no matter what, so you want to import everything in UTF-8 to begin with, so no conversion occurs.

For more information on HTML and character encoding, read The Definitive Guide to Web Character Encoding at SitePoint.

4 Commonly asked questions about HTML email

For those who aren’t familiar with HyperText Markup Language (HTML), it can be an overwhelming topic. That’s why we’ve gone ahead and compiled a list of commonly asked questions regarding HTML email.

1. What is HTML email?

An HTML email is an email that was designed using HyperText Markup Language. These emails stand out from plaintext emails because you have the ability to use and customize all manners of images, fonts, and layouts. Most email marketers prefer HTML emails to plaintext emails because they are more visually appealing and more likely to keep the email reader engaged in the content that is presented.

Plaintext email vs. HTML email

Source: Gmail/Victoria’s Secret

2. What are HTML elements/tags/attributes?

HTML emails are made up of several different pieces, including elements, tags, and attributes. Each one of these pieces has it’s own function.

Example of a beautifully designed HTML email

Source: Campaign Monitor

HTML Elements: These are the individual “pieces” of a webpage or HTML email. These include your paragraph elements, an image element, and even a link. HTML emails are created with several varying elements to make it more visually appealing for the reader, increasing the chances that they’ll engage with it in some way.

HTML Tags: Your HTML tags are the names of the specific elements that are included throughout your HTML email. They usually come in pairs—a start tag and an end tag. Common tags include:

<p> </p> – indicates the “pharagraph” element
<title> </title> – indicates a “title” element
<h1> </h1> – indicates a “large heading”
<head> </head> – indicates the element that contains meta information about the specific document
<body> </body> – indicates visible page content
<input> </input> – indicates a feils where the users can enter specific data

HTML Attributions: HTML attributes help to further define your individual HTML tags. These attributes help to change the way in which your specific tag is displayed and/or behaves. For example, you can take the HTML <input> tag and further define it with the attribute “type.” This attribute then allows you to define what the specific tag is, such as text or a checkbox.

Examples of different HTML attributions

Source: GoSkills

3. What is the difference between HTML and HTML5?

The only significant difference between HTML and HTML5 is that the later is the most up to date version of the available HyperText Markup Language. The HTML code has gone through several evolutions since it was initially introduced in 1990, and the most current version is HTML5.

4. Which browsers support HTML/HTML5?

All updated internet browsers currently support HTML5, with the only exception being older or outdated browsers.

Wrap up

Coding your HTML emails doesn’t have to be difficult, especially with so many options on the market for drag and drop email editors. If you’re ready to get your feet wet in email coding, Campaign Monitor provides several free tools to help marketers get started, including:

Email template builder
CSS guide
CSS inliner
Templating language
Bulletproof email buttons
Bulletproof background images

Each of these tools helps to take the confusion out of HTML emails and allows you to get started with creating emails worth sending.

If you want to create stunning HTML emails but lack the coding knowledge behind the practice, Campaign Monitor has your back. Start creating beautiful HTML emails with our drag and drop email editor today.

The post Why Are All My Apostrophes Missing? appeared first on Campaign Monitor.

Read more: campaignmonitor.com

Categories
microsoft windows OS

Freedom to Stand Out in Your Career

As we come across the 4th of July there has actually never ever been a time that Flexibility has actually never ever been more on top of individuals minds

.If you live in the USA there are lots of days that liberty is taken for given, #ppppp>.

We have the flexibility to:

.Modification tasks at will.Transfer to a brand-new city.Speak our minds.

How does flexibility assist you stand apart in your profession?

As I have actually been composing this post for going on 5 years I’ve recalled at a few of my previous posts and I’ve understood that a person of the greatest benefits we have in the USA is liberty.

But, that liberty is never ever complimentary.

For example, being a long-lasting student takes some time and effort. Both of which are not complimentary. When we are more youthful, even though they may appear to be really totally free. The older we get the more we worth (or ought to worth) our time.

Education is the essential to open the golden door of liberty.~ George Washington Carver

Here are a couple of posts (of the 250+ posts I’’ ve composed here) that highlight a bit of the reason you have the Freedom to Stand Out in Your Career.

If You Are Not Billing, Be Skilling Get a Side Hustle, You’’ ll Need One What Got You Here Won’’ t Get You There

This one “liberty” is the liberty to look for an education. Nobody can inform you that you can not find out something. Even in the most alarming circumstances you can constantly be finding out. Any location with web gain access to has a huge variety of knowing tools within your reaches — — whether in a book or on a computer system.

You can constantly hellip &go; Old Skool Analog

Truth be informed … Libraries are incredible locations. They have actually these bound paper files that you <> read and keep in your hands.( frequently they have computer systems too)

These flexibilities are small in contrast to what individuals that serve our military and our other federal government companies provide for us every day. These are liberties that practically every person of the United States can delight in. They are not totally free. There is a charge. There is a toll. There is a tax.

.Your Fee is your Attention.Your Fee is your Time.Your Fee is your Sharing (what you have actually discovered).

For those that are sticking out in their professions you currently understand this. For those that wish to stand apart in their professions please take this suggestions under advisement and get hectic with your non-free flexibilities. And, hellip &keep in mind; share what you understand. When you can share what you understand you offer what is maybe the best present of all.

Go our and take pleasure in the Freedom to Stand Out in Your Career.

The post Freedom to Stand Out in Your Career appeared initially on Personal Branding Blog – Stand Out In Your Career .

.

Read more: personalbrandingblog.com

Categories
microsoft windows OS

Self-Care Sunday: Sinikiwe Dhliwayo on going therapy, opting out of friendships, doing things that challenge her

Self-Care Sunday: Sinikiwe Dhliwayo on going therapy, opting out of friendships, doing things that challenge her


Self-Care Sunday: Sinikiwe Dhliwayo on going therapy, opting out of friendships, doing things that challenge her

Sundays are a day to recharge and reset. It’s a day where you can put your mental health first, hang with a few friends, or turn off your phone and bathe for hours on end. That’s why we choose to celebrate this holy day by showcasing people who love Sundays just as much as we do. Tying it to our Instagram Self-Care Sunday series, we ask the hard-hitting questions that embody what a perfect self-care Sunday means, whether it’s about mental health, physical health, community, and personal joys. We want to know why Sundays are important and how people enjoy them, from morning to night. 

Trigger warning: this story discusses suicide. 

One would think that a founder and creative director of a wellness company would worship the idea of self care. But for Sinikiwe Dhliwayo, the founder of Naaya, a company that serves to empower people of color to define what wellbeing is for themselves, that is far from the truth.

“I think the word self care has been grossly overused,” she says. “To me, taking care of myself is anything that I need to do to maintain my wellbeing. For Dhliwayo, this means simply paying rent on time. “Without paying my rent, I would seize to have a place to live.”

The truth is, while Dhliwayo loves doing a mean skin-care routine, she also loves having the ability to consistently do the things that might not seem glamorous to most. “I am grateful [to] just the ability to pay my bills and do seemingly mundane things, as I haven’t always had the ability to consistently do those things.”

For this week’s Self-Care Sunday, we asked Dhliwayo about her journey with therapy, how she maintains mental clarity, and the advice she would give to women of color and founders about self care.

Mental Health:

Her journey with mental health

The vernacular of mental health came into my knowledge until my late twenties. When I was a teenager, I told my parents I wanted to commit suicide. I was extremely bullied and I didn’t know, or maybe didn’t want, to acknowledge my pain. I had privileges, like my computer being taken away. I didn’t go to therapy or anything after the fact—I just found ways in which to deal. 

I then went through my parents divorce when I was a senior in college and then once again, I didn’t really deal with it. I moved to another city, and I ate my feelings but I didn’t fully deal with it. I did my best to read all of the self-help books, but it got to a point where I just had to acknowledge that I needed professional help. So finally, I did it and went to therapy, and I truly wish I had done it sooner. 

That said, as much as my therapist helped me. I know firsthand through friends how many therapists aren’t equipped to deal with Black and brown folk. I say this given that there are lots of folks who haven’t addressed their biases and this impacts their ability to effectively help folks who aren’t like them. 

Go-to best practices for mental health

I have a few: Yoga (obviously). [I do] meditation. I love my Samaya cushion. The founder of the company is a fellow female-identifying human and a great person. I also just started doing breathwork with a teacher named Jennifer Patterson who just released a book called the Power of Breathwork

I was doing acupuncture religiously until my amazing acupuncturist Allison Unterreiner moved to the South. It helped me tremendously with my periods that were debilitating. 

samaya meditiation cushion, amazonSamayaavailable at Amazon | $119Shop Now

Wind-down practices

I dance off the day. I get home and I change out of my street clothes, put on something comfortable and some bops, and I dance. Dancing to me feels so freeing. I can just shake and shimmy until my heart’s content. 

How she maintains mental clarity

I can’t say that it’s something that I do [on a] weekly [basis] but I make a really concerted effort to be in nature. I live for that shit. I was a Girl Scout—some might say for too long (until 10th grade)—and there is something about being outdoors, preferably around a fire, that I’m a sucker for.    

Physical Practices:

Incorporating new routines into freelance life

I’m figuring out new routines. I’m navigating the Wild Wild West that is freelancing and feeling a bit unmoored. I’ve been accustomed to having a set schedule and a routine that corresponded with that schedule. The nature of freelance is that things pop up, so I’m working on cultivating a routine that accommodates for some flexibility. 

Sunday rituals

Sunday is the Lord’s day. So I fully try and dive into that meaning and try to do the least. If possible, honestly, I might not even leave my house. I like to read, schedule emails to go out the following week (best feature on Gmail), and mostly try to relax. 

Body image

I have a great degree of respect for my body, and on most days, I like it. It seems radical in some ways, though, to like my body, especially as a person who inhabits a Black body. Everywhere I look, the image of “good and right” when it comes to bodies is generally one that is skinny and white. 

How she keep physically healthy

With all of this talk of Coronavirus, I’ve become fanatical about wiping shit down. Namely my laptop, since its always out and about. I’m actively trying [not] to touch my face, and I’m really trying to tune into when I need to sleep versus forcing myself to keep going.    

Sinikiwe Dhliwayo, self-care sunday, self-careSinikiwe Dhliwayo

Community Care:

Why she chooses to “opt out”

I think the biggest boundary I’ve been cultivating is opting out. Opting out of people who don’t make me feel good or who have shown me that they don’t have my best interest at heart. I’m learning to put boundaries on my social media. I talk a lot about race, privilege and white supremacy and I think that often leads people to think they have an opening. When really [they’re] asking me questions outside of what I’m posting, [which] is asking for me to do labor and to educate you. These topics are integral to the work I do, but, I repeat, I do not have the responsibility for making someone understand these concepts. 

How she creates community for her company, Naaya

People can be really finicky. What they like one minute is not what they like the next. I’m trying to follow my gut and create a brand that I wish existed in the world. I put out content when I feel like it and not on a set schedule or every day like it sometimes feels I have to. Generally speaking, I prefer to do things in real life versus over the interwebs, but events can be really challenging. As much as it takes money to build a business, I also don’t want anyone to not be able to garner important knowledge or partake in important conversations because they can’t afford something. 

Alone time

10/10 I like to be alone. It’s hard to truly get alone time in New York. Sunday is also the Lord’s day or at least, that’s what I call it. What better way to appease the Lord then by chilling the F out. 

Personal Joys:

Skin-care routine. 

My skincare routine is really intensive to the point that Into the Gloss did a deep, deep dive into it. My current favorite products are. SuperGoop Unseen Sunscreen, Replica- Jazz Club Perfume, Praz Natural Face Revive Oil, Youth to the People Cleanser, and Ole Henriksen Babyphat Mask

Supergoopavailable at Sephora | $34Shop Now

Reading

I think I need to reassess and join the library again. The thing is I’m impatient so I don’t want to have to wait for someone to bring a book back to the library. That said, I just dropped some serious coin at the bookstore despite banning myself from buying books. Quarter two—it’s on, baby. No book purchases for three months. 

Singing

It’s not something that I do often—save for the end of my yoga classes—but I love to sing. I was in all the choirs growing up and would love to invite that practice back into my routine.

Life Advice:

When Sunday plans go awry

I try and maintain the outlook that if this particular Sunday needs to be busy, then I will do my best to have a calmer more relaxing Sunday the following week. 

Advice for women of color/founder who want to better their self-care/mental health routine

Find something you like to do and as much as you can, do it because you want to. I have a really hard time doing things I don’t want to do. I think the same can be said for most people, which is why you won’t find me doing CrossFit or killing myself on the treadmill.

The caveat to this is doing things that you like and that will challenge you. I was on a very heavy Pilates kick for a while, and holy shit it was hard, and that’s ok. I think when it comes to doing hard things, like going to therapy, it’s important to know that it’s going to challenge you and it’s ok to wait to do it when you feel ready (it me). 

The post Self-Care Sunday: Sinikiwe Dhliwayo on going therapy, opting out of friendships, doing things that challenge her appeared first on HelloGiggles.

Read more: hellogiggles.com

Categories
microsoft windows OS

How To Design Mobile Apps For One-Hand Usage

How To Design Mobile Apps For One-Hand Usage

How To Design Mobile Apps For One-Hand Usage

Maitrik Kataria

2020-02-20T11:00:00+00:00
2020-02-20T12:07:18+00:00

On Friday, January 2007 the world shrank into our palms as three revolutionary products — the iPod, a phone, and a breakthrough internet communicator — were unified to create the smartphones we know and love today.

Steve Jobs on One-Handed UX

The first iPhone introduced in 2007 marked the fall of Qwerty keypad and stylus. (Large preview)

iPhone was built to be comfortably used for one-handed operation, allowing for a smoother thumb movement across the screen.


Steve Jobs once said that the 3.5-inch screen is the “perfect size for consumers” and that larger screens are foolish.

Smartphone Shipments Worldwide by Screen Size from 2015 to 2021

(Large preview)

But it wasn’t until the turn of the last decade that phablets gained popularity owing to their bigger screens, so much so that less than 1% devices sold today had smaller than 4-inch screens.


90% of the smartphones sold today have bigger than 5-inch displays.

In the meantime, this goldrush for bigger-the-better presented app makers and designers with opportunities to utilize the screen real estate to serve more content and functions.

For instance, the CNN App was among the few who got early access to iPhone 5 introduced in 2012. The developers not only gave it an aesthetic transformation but also designed a reader-friendly, visually-appealing experience that made headlines stand out.

Evolution of Thumb Zone in UX UI Design

Adapted from Phil Schiller’s keynote at Apple’s Special Event 2012. (Large preview)

With Bigger Screens, The Ease Of Access And Reachability Suffer

While bigger screens are great for showing more content, the #1 design consideration of Steve Jobs for making 3.5-inch phones suffers — designing for one-handed usage.

In his 2-month-long research — at airports, streets, cafes, on buses and trains — Steven Hoober shed light on the three ways users hold their phones.

How People Hold and Interact with Mobile Phones

(Large preview)


49% of users hold their phones with one-hand specifically while they are on the go.

Making a strong case for designing apps for one-handed usage. Steven also found that users frequently alter their grip based on their comfort and situation.

Why Designing For One-Handed Usage Should Become The Top Priority For App Makers

We use our phones a great deal when we are preoccupied or in a hurry. This greatly impacts how users hold their phones and how they use the apps resulting in a lot more of one-handed-usage than the 49% number suggested above.

Research suggests that an average user checks their phones for as many as 58 times a day out of which 70% of mobile interaction lasts less than 2 minutes.


We use our phones in “distracted short-burst usage”.

Image Credit: Rescue Time. (Large preview)

A team of researchers at Simform observed usage and behavior of short-burst sporadic usage in multiple scenarios such as:

When Users Use Mobile Apps

Example cases of short-burst usage (Large preview)

Google’s Product Director, Luke Wrobleski, terms these short bursts as ‘one thumb, one eyeball’ mobile-usage experience. It reflects how a distracting environment forces users to engage in single-handed usage within short spans of partial attention. He further adds that the most optimal type of smartphone usage with a single hand is one where quick interaction is supported by smooth functionality.

How To Design For Keeping These One-Handed Short-Burst Usages In Mind?

The answer is rather simple. Do continuous usability testing and study different ways your users hold their phones in various situations.

If the users of your app tend to use the app a lot in distracting scenarios, then you should focus on designing patterns that target reachability and one-handed use.

Two Methods of Holding a Touchscreen Phone with One Hand

(Large preview)

Let’s take a look at the evolution of Spotify’s interface to get a perspective of the problem:

Thumb Zone for Mobile Hamburger Menu UI

Spotify’s Old Navigation — Hamburger Menu. (Large preview)

Spotify used the Hamburger Menu at the top-left which concealed these features and set the users on a treasure hunt of sorts. With the advent of bigger screens, however, another design challenge was added to the list — reachability.

Thumb Zone for Mobile Hamburger Menu UI

Spotify — A certain level of difficulty and discomfort was experienced as users tried to communicate with the app. (Large preview)

This compelled Spotify’s team to pull down the Hamburger Menu in 2016 and lay its core features — Home, Browse, Search, Radio, and Library — at the bottom that resulted in an increase of 9% clicks in general and 30% on menu items.

Use Established UX Patterns For Common App Usage Scenarios To Make One-Handed Usage Easy

Why reinvent the wheel? When you can use proven UX patterns that work. Many designers have already focused on one-handed usage as their designing principle.

We have gone through hundreds of apps and thousands of patterns to find the best patterns one-handed usage in mind. So let’s look at what works, what problems are solved, and what benefits you will get out of these.

We divide the most common user behaviors and UX patterns in six categories:

Navigation UX Patternse.g. menu bars, tab bars, and, gestures for easily moving between the most important sections of the app;
Designing For ActionsCreating, editing, posting, adding, removing, and other actions users take to utilize the core functionality of the app;
Shopping, Transactional And Checkout Flow Design Patterns
Searching, Sorting, And Filtering Patterns for when users want to quickly find or browse content;
Input And Interaction PatternsSliders, pickers, selectors, dropdowns, form fills, zooming, scrolling that make up the building blocks of any app;
Miscellaneous PatternsMedia playback, photo capture, photo editing, and map navigational patterns.

1. Designing App Navigation Keeping ‘One-Handed Usage’ In Mind

What Is It?

The foundation of a great app is a good navigation design. Good navigation helps users discover the features faster and find what’s important to them.

70% of users discover features of the app using navigation links compared to search or other ways. Navigation bars, menus, gestures, links, tabs, etc are the most common navigation UX patterns.

A good navigation design should have all the important sections right upfront and easily accessible.

Challenges

Common UX patterns like Apple’s tab bar and Google’s swipeable menu have limitations. You can put only a limited number of features in the tab bar and to access all of the swipeable menu items is not easy.

Users shouldn’t have to struggle to reach an important part of the app by stretching to the top of the screen. That’s just bad usability. Specifically, if the users are on-the-go and are using the app in a short burst.

Solution

Facebook and many other apps solve this challenge by putting items in a tab icon called More or Menu from where users can access more features and sections of the app. This, however, is not ideal for reachability and one-handed use.

Use the flyout menu instead of a full-page menu for reachability and fitting in more than 5 items.
Expanded tab bar for when you have more content.
Personalized tab bar for power users to quickly access what they like.
Use gestures to imbibe ease-of-access in users’ habits.
Getting back and closing a page should be easy as well.
Quickly jumping to a section of the page with smart UX patterns

Facebook, for instance, conceals numerous features in a Hamburger Menu that declutters the main screen. Although this inclusion has a cleaner and more organized appeal, users suffer from one-handed reachability.

1.1 What makes the Hamburger Menu a REAL Problem?

Use Flyout Menu Instead Of A Full-Page Menu For Reachability

Thankfully, we have a way to resolve this challenge —

Full-page menus can be replaced with flyout menus, which like the name suggests ‘fly-out’ from the bottom. This allows for easier access to the options even with one hand.

1.2 Mobile UX Patterns for Flyout Menu Designs (Video Credit: Joox)

Expand The Tab Bar For When You Have More Content

Human Interface Guidelines recommend having no more than 5 features in the bottom navigation bar. This makes it tricky for app builders to present additional core functionalities at the forefront.

This is where the ‘More’ option (3 dots) comes in handy. Located at the bottom bar, it can conceal other functionalities and reveal them with a click.

1.3 Designing Bottom Navigation Bar with Expandable More Options.

Personalized Tab Bar For Power Users To Quickly Access What They Like

Every user is different and a feature that is important for one user may not be that important for the other. To make the most of your app, you can allow users to customize their tab bars with frequently used functionalities.

1.4 Personalized Bottom Tab Bar for Quick Feature-Accessibility.

Gestures Are Easy To Imbibe In Users’ Habits For Quick Navigation

Popularised by Tinder, Gesture-based navigation is a great technique to facilitate single-handed usage. Gestures if smartly used can help expand navigation for one-handed use.

1.5 Gesture-based Navigation to Access App Features.

From Designing “Getting To” To “Getting Back” Using Gestures And Accessibility

Navigation isn’t only about getting to a screen or section of the app. It is important to design for — going back to where the user came from, closing a screen, or jumping to a section on a page! Let’s look at how apps use gestures and UX patterns to do those things easily.

1.6 Using Gestures to Navigate Through Multiple Screens (Video Credit: Zenly)

Patterns For Quickly Jumping To Different Sections Of The App

Apps with many categories, subcategories, and sections such as books, wiki, restaurant menus, products may need more organization to ensure users don’t struggle with finding content.

These can be organized in a hierarchy and using UX patterns to increase accessibility and ease of use.

1.7 Floating Tab Bars and Gestures to Jump Between Sections.

2. One-Handed Patterns For Core Actions Like — Creating, Editing, Posting, Adding, Deleting And Others

What Is It?

Users spend about 50% of their mobile phone time in self-expression, social interaction, online shopping, managing finances, health and productivity, and planning upcoming events. These action-driven UX patterns include things like creating social posts, editing documents, editing, a few others.

Challenges

When designing action-driven apps, we have to ensure they don’t take the backseat. Like, having a post or creating a button at the top instead of right next to your thumb.

Solution

There are three things to keep in mind when designing the user experience of these core actions.

Core actions should grab users’ attention by the prominent placement of the icon or button. Don’t put them at the top right corner of the app where they can get buried. It should be easily reachable without needing to use second hand or overreaching.
On top of that, users should be able to finish the entire creation and addition task flow with one hand. This includes things like canceling the task, typing with keyboard opening up, moving to the next step and so on.
Designing for complex editing tasks with multi-level edit menus and controls.
With reachability as a goal, you can make sharing and sending things easy and simple too.

The Button Or Icon For The Core Task Of The App Should Draw Users In

Apps’ core tasks center around things like capturing images, creating a post, adding files, sharing, etc. It becomes necessary to have users focus on these first and make it — reachable and discoverable.

For instance, Snapchat hides everything and only incentivizes users to capture photos and videos. Also, the ‘Send’ button immediately asks users to share their stories with others.

2.1 Making Core Tasks Easily Reachable with Gestures, Flyout Menus, and Floating Tab Bars.

Breaking Up Complex Editing Tasks With Menus And Controls Designed Specifically For Mobile

For many users, mobile phones are the most used computing devices. There is a generation of users who get real work done on their mobile phones. For example, document editing is no longer a computer-only affair since a host of mobile apps offer the service.

Microsoft Word and WPS Office offer a host of editing tools and multi-level menus within thumb’s reach. These intuitive menu systems are smart and powerful allowing users to do complex operations and multiple choices.

2.2 Placing Editing Tools on the Bottom Half of the Screen for Quicker Modifications.

With Reachability As A Goal, You Can Make Sharing And Sending Things Easy And Simple Too

What amplifies our experience with our favorite music these days is the super-quick shareability options for social media, often just a click away.

You can employ a share extension that slides up from the bottom and allows users to directly type messages.

2.3 UX Patterns for Single-handed Sharing of Photos, Videos, Music, and More.

Divide Creating Or Adding Tasks Into Multiple Steps

Creating boards, favorites, and wish lists can be a drag, especially when they are placed at the top extremes. Let’s look at the patterns that handle multi-step data inputs.

Flipboard and Airbnb keep everything at the bottom and within the reach of the thumb. From typing to selecting the next steps or canceling the action is very simple.

2.4 Placing ‘Create’ and ‘Add’ Icons within the Reach of the Thumb for Smooth One-handed Usage.

3. Designing Faster Checkout And Transactional Experiences For When You Are On-The-Go

What Is It?

According to Kaspersky Cybersecurity Index, 50% of eCommerce sales happen on mobile phones. Add to that commercial transaction like booking a ride, flight, hotel room, movie tickets, and concert tickets and you realize how important designing mobile checkout experience is. A report by Baymard Institute suggested that 23% of shoppers who abandon their cart abandon it because of the complicated checkout process. This is specifically true for mobile shoppers for whom checkout is a multi-step process where inputting data is not as easy.

Challenges

The checkout process requires many inputs and careful attention from users.

Designing a one-handed checkout experience would mean users can complete the transaction with minimal thumb movement and fewer steps.
This is especially very important for users who are on the move or need to do the transaction immediately.

Solution

To design a one-handed checkout experience we have to minimize the information required from the users.

When choosing product variations like size, color, time/date and others, they should be easily accessible and discoverable.
We can use applications like Google and Apple wallet or autofill from things like Keychain, 1password, and LastPass to fill the information like names, credit cards, addresses, One-time-passwords.
We also must emphasize the simple and minimal thumb movements from the users.

Adding Items To Carts And Choosing Product Preferences At Thumb’s Reach

The logistics of shopping online can be simplified within three steps — adding items to carts, picking product variations, and completing the payment process.

As designers, it becomes essential for us to not only make these selections noticeable but also to place them within the reach of a thumb.

One way to achieve this goal is to display product variations in a tray that slides up when the user chooses an item.

Another way is to allow users to scroll through the page and quickly select variations of a product while the option to ‘Place the Order’ or ‘Buy’ stays static at the bottom.

3.1 Smooth Payment Checkout Flow With Options to Add Items and Choose Product Variations.

3.1 Adding Items to Cart for e-Commerce on On-Demand Delivery Apps. Video Credits: Shopping Choose | WE+AR TRBL | Tasty Hamburger App

Using e-Wallets And Password Managers For Swift Payment

The Payment Methods Report 2019 suggests that over 71% of online transactions are carried out via e-Wallets like Apple Pay, Google Pay, Alipay, Fitbit, Samsung Pay, YandexMoney, and others. These wallets are not only deemed to be faster but are also much safer and easier to access.

The checkout process can be made more efficient and straightforward. What’s more, you can also add a swipe-to-pay option for higher conversions.

3.2 UX Patterns for Payment Checkouts for e-Commerce Mobile Apps.

3.2 UX Patterns for Payment Checkouts for e-Commerce Mobile Apps. (Video Credits: SPACED Challenge (Travel + VR) | Checkout Promocode | Gamification Checkout)

4. Searching, Filtering, And Sorting Content With Reachability As The Main Goal

What Is It?

Without the right UX, finding just the right products or items can be a tedious challenge for the user. Searching, filtering, and sorting tools determine how easy or difficult it is for the user to browse the site’s product and item catalog.

Filters are a great tool to narrow down high volumes of content and to find the most relevant results.

In theory, they are different: sorting organizes the content according to a certain parameter, filtering removes it from view.

During Baymard’s Product Listings & Filtering study, it was observed that sites with an average product list usability saw abandonment rates of 67–90%. What’s more, there was about 17–33% abandonments from users trying to find the exact same types of product from e-Commerce sites with a slightly tweaked toolset. This resulted in approximately 4X increase in leads.

Challenges

Searching on mobile should be easily accessible. For example, Youtube, Amazon Prime, Slack, Google Maps make it difficult for users to reach the search menu by having them reach the top right corner.
Organizing the information hierarchy of filters as there are too many parameters and categories so that users can find what they are looking for quickly.
Manage multi-level information in UI especially when there are many categories and each category has many items.
Changing UI based on different states like “Filter is applied” and what “Filters are applied”.
All this should be accomplished by users in the reach of users’ thumb.

Solution

Use gestures or easily accessible buttons for search. When users go to the search screen give suggestions as well as open the text box immediately.
Speak the language of the users and keep users intent in mind when organizing filters. Keep the filters/sorting button near the reach of users. Also, make accessing and closing the filters menu with one hand.
To solve information complexity use either a two-step filtering control or side by side filtering control.
Apply filters immediately. Make filters interactive based on actions users take. Allow users to choose multiple options. Change filter categories to match applied filters.
Show recommendations, recently used or most frequently used information first.

For many apps, Search is one of the top 5 features used. But many app designers make reaching the search icon difficult. See the comparison below for Apple Maps vs Google Maps and Netflix vs Youtube.

UX Search Patterns for Apple Maps and Google Maps

Comparing Search Bar Reachability – Apple Maps vs Google Maps. (Large preview)

UX Search Patterns for Netflix and YouTube

Comparing Search Bar Reachability – Netflix vs YouTube. (Large preview)

Some apps use the search screen as a content discovery screen. They recommend users what they’d like, what they searched before, what’s trending and so on.

4.1 Creating a Search Page for Users to Discover Content. (Large preview)

Remove Friction And Impending Steps From Searching And Filtering

To make things really quick for users, we can make it so that when they tap on the search icon on the tab bar the keyboard immediately pops up so that users can start typing their queries immediately. See the examples of Netflix and SpotHero.

Many apps like Amazon or Google Drive use the search bar prominently at the top of the home page. In such cases, we can use gestures (swipe down) like the Inshorts app to immediately start typing instead of having to reach the top and tap on the search bar.

4.2 Searching and Filtering Made Thumb-friendly.

Double-Tap On The Search Icon To Pull Up The Keyboard

If you want to use your search page to show information to users then you can also use double-tap to pull up the keyboard like Microsoft News, Spotify, and Reddit Apollo.

4.3 Accessing Keyboard Made Easy with a Double-tap on ‘Search’ Icon.

Thumb Reachable Filter Menu Should Let Users Find Information Faster

Online shopping, booking, on-demand and other apps alike can contain a laundry list of items for users to choose from.

The biggest consideration for designing a filtering menu for small devices is the information hierarchy. Let’s look at these examples to understand how filtering and sorting can be designed when options are aplenty. These show how you can handle information complexity without letting one-handed usage suffer.

Also, filters should be responsive and reactive to users’ choices and indicate when filters are applied.

To make this process more responsive, search results can be filtered in the background simultaneously as users select the choices.

4.4 Sorting and Filtering Items on e-Commerce and On-Demand Delivery Mobile Apps.

4.4 Sorting and Filtering Items on e-Commerce and On-Demand Delivery Mobile Apps. Video Credit: Filters | Car Sharing with Friends.

5. User Input Controls Such As Forms, Pickers, Selectors, Dropdowns, Sliders That Make Up The Building Blocks Of An App

What Is It?

With smaller screens comes smaller real estate. Fundamental user interactions have to be reimagined in order to increase the productivity of mobile users.

Things like filling up forms, typing up the password, choosing date/time, making a selection, popovers had to translate well to touch interface without abandoning the metaphors of PCs.

Challenges

Inputting data on mobile devices is tedious, especially when there are a number of data fields to be filled.

Translating user interactions to smaller devices is not easy. The biggest challenges are:

Speed of user input should be very fast with minimal movement of users’ thumb.
Information should be gathered in a minimal number of steps.
The input control design should have an easily understood interface and metaphor.
The experience should be delightful and consistent.
Users must know their location and information must not be lost.

When done correctly, adding inputs in trackers, calendars, and others alike could become a short task.

Solutions

Any user action like filling up forms or making choices should be closer to the bottom. The flow of actions and choices should be consistent without any jarring UI changes.
Information needed to move ahead should be in thumb’s reach.
Data input options including notifications should be clear and near to the bottom.
Bigger forms can be divided into multi-step and multi-screen forms. This multi-screen approach should have going forward and going back very easily.

Fixing Filling Up Forms Starting With Sign-Up Forms

We all hate filling up sign up forms. They are time-consuming and ask for unnecessary information.

Filling up forms can be less laborious by turning a lengthy form into multiple screens. Using things like auto-fill, thumb reachable buttons for next and previous steps, continuous keyboard presence, and no scrolling makes this approach faster and easier.

5.1 Best Practices for Multi-Screen Onboarding Flows (Video Credit: Zenly & AirBnB)

Get Quick Input From Users With Minimal Thumb Movement

Positioning the user-input controls towards the bottom of the screen allows for quicker data entry and prompt call-to-action responses.

Use pickers, dropdowns, scrollers, and sliders to supply information to users.

5.2 One-handed User Input Controls for Accurate Form Filling (Video Credit: Periscope)

Smart Mobile Patterns For User Input Controls

Let’s look at some more patterns that make getting input from users easier.

5.3 One-handed User Input Controls for Mobile App Forms (Video Credit: Peach | Zova Workout & Fitness | Square Order)

6. Miscellaneous Patterns For Media Playback, Photo Capture, Photo Editing, And Map Navigation Patterns

With over 2 million apps on Google Store and 1.83 million apps on the App Store, it has become imperative for designers to make their apps stand out. One way to do this is to make common functions fun and smooth for users, and this final section is a round-up of miscellaneous user interactions.

6.1 Forget Pinching; These Apps Lets Users Zoom In and Out with One Thumb.

6.1 Whether it’s Selecting Emojis, Sending Images, or Listening to Audio Clips, Gestures Can Add Ease such App Interactions.

6.1 Whether it’s Selecting Emojis, Sending Images, or Listening to Audio Clips, Gestures Can Add Ease such App Interactions (Video Credit: Composer Concept | Gamification + Checkout)

Conclusion

Although reachability is a big part of it designing for one-handed usage, it is not just about ensuring everything close to users’ reach. Apps that have good one-handed use also save the time of users, remove friction, take out unnecessary steps, and most importantly focus on quickening the “distracted short burst usage” of apps.

We looked at many patterns that designers can use to solve different UX challenges. For more, you can check these websites to find patterns that help you design for one-handed use.

Smashing Editorial
(cc, yk, il)

Read more: smashingmagazine.com

Categories
microsoft windows OS

Don’t fall victim: Tips to stay safe online

Crowe UK reveal that scams costs the worldwide economy ££ 3.89 trillion, and losses related to scams have actually increased by 56% in the previous years.Let’’ s look at precisely what scams is, and how to prevent the myriad of various rip-offs distributing online:What is scams? An Garda Síochána , Ireland’’ s polices, specify scams as a circumstances in which: ““ an individual is economically cheated by another individual”.” It can take place when a private tricks another by causing them to do something, or not do something, that leads to a monetary loss. It can likewise be dedicated either online, face to face, or through correspondence. The Gardaí identify 6 primary kinds of scams in Ireland: Payment Card Fraud: includes using taken or counterfeit payment cards to make direct purchases or money withdrawals. It likewise consists of making use of taken card information to purchase products over the phone or through the web. Billing Redirection Fraud: the criminal pretends to be a provider of products or services that you currently work with and demands that the checking account information taped for the genuine provider are altered on your monetary system. The next time a billing shows up from the genuine provider, the payment is sent out to an account managed by the criminal rather of the provider. CEO scams: in this case, junior workers in the financing department of a business get an e-mail from a criminal professing to be the CEO specifying that a crucial offer or some other immediate matter is pending which a considerable payment requires to be processed right away. Phishing: frequently through e-mail. The e-mail might seem from a reliable business nevertheless when one clicks the e-mail or accessory or link within the e-mail, harmful software application( malware )is downloaded onto a PC or other gadget permitting the criminal to track online activity and recognize monetary or individual details for deceptive functions. Phone scams (vishing/ smishing): when crooks are calling you by phone( vishing) or by text( smishing) pretending to be your bank, charge card company, energy business or frequently a computer system business. Throughout the discussion they will attempt and fool you into providing individual, banking or security info. Advance Fee Fraud: when lawbreakers are targeting victims to make advance or in advance payments for items, services or monetary gains that do not emerge. There are numerous kinds of advance charge scams; such as rental scams, ticket scams, and even love scams How to prevent online scams. It simply may be when you find something online that appears too excellent to be real. Keep in mind– if something appears “ off, ” leave. According to monetary scams action.org.uk ,” your bank,banks, and even the authorities will never ever: Phone you to request your PIN number or your electronic banking password, even by tapping them into the telephone keypad Ask you to upgrade your individual information by following a link in a text Ask you to move cash to a brand-new represent scams factors CurrencyFair will never ever ask consumers for their individual six-digit pin or password. Discover more on how we keep your accounts safe and secure here . How to examine if a site is phony: Wikihow has a simple list of the warnings to look for on a site, such as: Exists a little lock icon on the address bar? Does the site has ‘ https’ in the URL? Having the letter HTTPS in a URL is a strong indication that the site is safe which if you get in any individual information, like your name, a password or payment information, it will be not just encrypted however safeguarded from any celebrations utilizing the website to obstruct the information that is beinggone into. Seeing HTTPS in the URL isn ’ t a 100% warranty that the siteowner isn ’ t the party celebration intends means take your personal individual information use utilize to commit devoteScams Constantly separately validate the site you are getting in monetary and individual information is safe and secure, even with HTTPS in the URL. Is the business name in the URL? Here is where individuals can quickly be deceived into thinking a site is protected. URLs can be controlled and celebrations with destructive intent can produce really persuading duplications of existing sites and without closer examination, you may miss out on the free gifts. It can be as easy as including a brand-new character in the URL for instance currency.fair.com or a various ending for instance currencyfair.org. If the website site strange odd bad design style copy, constantly examine a site URL. Is the website trustworthy? Prior to you utilize a site and get in not just individual however monetary information, initially run a background check. Inspect independent evaluation websites like TrustPilot , Which.co.uk, or TripAdvisor? Exist activesocial networks channels? Are the evaluations genuine? Often an easy Google search of the business name in addition to the words “ rip-off ”, “ scams ” or “ phishing ” will produce posts and results that might reveal if you are at threat. Exists bad grammar or misspelled words? Exists call info like an e-mail address, workplace address and telephone number on their site? Are they economically controlled? To run in the monetary markets in the European Union, banks and monetary providers are strictlymanaged and any business using monetary services in any nation, must be certified and authorised by “a genuine nationwide regulator.” CurrencyFair is managed by the Central Bank of Ireland (along with the Australian Securities and Investments Commission (ASIC) in Australia, the Monetary Authority of Singapore( MAS )in Singapore, and we are a certified Money Service Operator in HongKong) and we link straight to their site from our page on policy. In this method, our consumers understand their cash isin safe hands. Tips to safeguard your information online Whatismyipaddress have actually assembled a detailed list of methods to safeguard your information online that consists of typically neglected suggestions like: Do not utilize public computer systems Don ’ t usage totally free Wi-FI Evaluation your social networks accounts. We produced our guide to online security that notes some warnings to expect to remain safe online:. If you get an email/text asking you to upgrade payment information with a provider( or anybody you send out cash to), constantly verify with them straight that it is a genuine demand. Modifications in the language/tone of an e-mail might be an indicator of an effort to impersonate somebodyyou might understand. Constantly beware. “ Out of the blue ” demands to send out cash specifically to complete strangers. Any modifications, nevertheless little, to the requesters email address or design of interaction. Validate the identity of a contact by calling the pertinent organisation/person straight, through online or other search.Do not utilize the contact information offered in the message sent out to you. Never ever send out cash or provide charge card, online account information or copies of individual files to anybody you put on ’ t understand or trust and never ever by e-mail. Be extremely mindful about just how much individual info you share on social media network websites.“Fraudsters can utilize your details to discover who you are, your interests and who you handle, making it simpler to craft a reliable phishing attack. Password and Device Security. It is essential that you keep your password and gadgets as protected as possible. Make certain to upgrade to the most recent variation of your os, anti-virus software application and web browser. This will keep your details and gadgets secured versus the current recognized security attacks. Modification passwords throughout all platforms and social channels plus on any personal or service accounts if you believe you are a victim of online scams. Whatismyipaddress suggests utilizing not just a password supervisor however likewise two-factor authentication. Find out more pointers on how to safeguard yourself online here . What to do if you believe you have been a victim of online scams? If you have actually been a victim of online scams, garda.ie has a list of instant actions to take: theessential being, to report this to the regional authority in charge of scams in your nation like an Ombudsman, the authorities, and other boards of advisers. This authorities can assist find thecrooks accountable. The Money Advice Service notes additional actions to take if you have actually been a victim of online scams:. Safeguard yourself from more dangers. Contact your banking service provider to let them understand what has actually occurred so they can cancel your cards and put a block on deals from your account– even if you are not sure if you are at danger, in some cases information are taken just to be utilized at a later date as the victim may have forgotten they experienced an odd text or e-mail or in lots of cases, might may unaware uninformed their personal individual details stolenTakenWatch out for any uncommon deals on your checking account. Upgrading and developing more powerful passwords throughout all your accounts( e-mail, social or banks) is extremely recommended. Make sure to alter them to make each distinct and more powerful if you ’ ve utilized the very same password throughout all accounts.As encouraged above, check out a password supervisorand two-factor authentication. If you can get your cash back, inspect. There are actions to take to recover your losses however this is not ensured if you ’ ve lost cash due to online scams. Talk to the bank or card provider the scams accompanied. According to moneyadviceservice.org , refunds can be postponed if the bank thinks you have actually been irresponsible with your account information and put yourself at danger.While it might appear that there are threats at every phase of being online or accessing online services, there are actions to require to guarantee your individual information and cash is safe at all times. Everybody deserves to notshare these information by phone or e-mail or toquestion somebody looking for these information. Don ’ t act in rush and put in the time to examine the source when purchasing online or when you get a suspicious message asking you to act, share safe and secure information, or individual details. Beneficial links:. https://www.ncsc.gov.uk/section/information-for/individuals-families. http://www.fsa.gov.uk. https://www.bpfi.ie/news/fraud-alerts/. https://www.financialfraudaction.org.uk/. https://www.centralbank.ie/. https://www.actionfraud.police.uk/. https://www.fca.org.uk/.

The post Don’t fall victim: Tips to remain safe online appeared initially on CurrencyFair .

Read more: currencyfair.com

Categories
microsoft windows OS

Unifying security policy across all mobile form-factors with Wandera and Microsoft

The way we work is evolving—technology enables more effective employees by helping them to be productive where and when they choose. Businesses have also been enjoying the productivity benefits of an always-on and always-connected workforce.

While new business applications and device form-factors helped to accelerate these changes, organizations are now discovering the challenges with managing security and compliance policies in the modern workplace. As devices physically leave the corporate campus, administrators need tools to effectively manage end user applications and the corresponding access to company data; this is a particularly complex challenge for businesses who manage mobile devices running a variety of operating systems with significantly different management capabilities.

Mobile devices also introduce new IT challenges that can seriously impact business operations, such as:

Legacy security infrastructure such as Secure Web Gateways aren’t built for mobile devices, and backhauling traffic isn’t feasible for enforcing acceptable use policies, meaning that inappropriate content could be accessed, or shadow IT tools used, potentially creating legal liability for the business.
Insecure apps and content risks such as mobile phishing represent new attack vectors; modern app distribution methods and mobile-specific attack vectors (e.g., SMS, WhatsApp, Facebook Messenger) represent significantly expanded surface area that IT teams must now protect.
Excessive mobile data usage can lead to bill shock and result in unexpected financial risk for businesses of all sizes.

The modern business needs to manage risk in the simplest and most effective way, while simultaneously enabling worker productivity. Embracing tools that meet the needs of mobile work will improve employee and organizational productivity, and ultimately make the business more agile.

Mobility comes in many form factors and OSs, leading to admin complexity

The explosion in the number of iOS and Android smartphones and tablets sold over the last decade is a testament to their revolutionary impact in providing always-on communication, productivity, and organizational tools. Mobility has been great for businesses; according to Frost and Sullivan, portable devices increase productivity on work tasks by 34 percent and save employees 58 minutes per day.

While smartphones have been at the forefront of transforming personal productivity and improving business operations, they are not the only form-factor available for work that is performed on-the-go. Many worker tasks, such as manipulating large data sets or refining high resolution images, require specialized hardware such as a large display or a trackball to optimize the user experience and efficiency. A different type of mobile tool is needed for certain remote workers with job-specific tasks.

Windows devices have long been a key tool for enabling office employees, and in recent years, laptops have become lightweight and highly portable, making them as versatile as mobile devices. Many laptops now also include a physical SIM or eSIM to enable always-on connectivity, and the 2-in-1 form factor is proving to be a popular choice for office workers because of the resulting flexibility in working style.

Challenges managing a diverse mobile workforce go beyond the device

Supporting Windows devices outside of the office creates new challenges for IT teams—principally, how does the admin effectively manage users working remotely? Separate tools exist to manage apps and user access on different operating systems, creating management overhead. Additionally, Windows devices are typically attached to Wi-Fi and other unmetered networks where users are not constrained in how much data they can consume without penalty. As these devices are enabled for mobile data networks, these powerful systems need to be more intelligent in the way they consume data.

The difference in managing apps and data on mobile vs on Windows led to increased complexity for the admin. For example, Microsoft Word may be deployed via an Enterprise Mobility Management (EMM) solution such as Microsoft Intune on mobile, while on Windows, System Center Configuration Manager (SCCM) may be used. The different management infrastructures required for these tools have increased overhead and created challenges for IT teams maintaining more than one service to manage employees that simultaneously use mobile and Windows devices for working.

Any changes to users, such as employees joining or leaving the company, must be replicated across both tools. Additionally, the different tools have disparate controls, meaning that it is impossible to apply consistent security, acceptable use, and Conditional Access policies. Applying policies inconsistently can result in users receiving inappropriate privileges or disparate access to services across different form factors and operating systems. As a result, employees may be drawn to using a corporate-approved app on their Windows device but an unapproved consumer variant on their mobile device, leading to increased risk.

Strategies for effectively enabling a mobile workforce

It is just as important to protect users working remotely as it is to protect users within the network perimeter. Extending security policy in a consistent manner to mobile devices can be achieved with three services: a Unified Endpoint Management (UEM) service such as Microsoft Endpoint Manager, inclusive of both Microsoft Intune and Configuration Manager, an Identity and Access Management (IAM) service such as Azure Active Directory (AD), and a network-based risk management service such as the Wandera Mobile Security Suite that protects against cyber threats and usage risks.

Organizations looking to adopt this suite of services for unified policy should seek solutions that are deeply integrated in order to achieve a fully secure and manageable mobility stack. Wandera and Microsoft have partnered together to offer an integrated secure technology stack:

UEM services bridge the management gap between Windows and mobile devices. Microsoft Endpoint Manager enables administrators to push applications and configuration profiles to enable homogeneous management across both mobile and Windows devices.
Pairing Microsoft Endpoint Manager with Azure AD means that the profiles can be managed at a user level, instead of at the device level, further improving management consistency.
Wandera Mobile Security Suite allows administrators to define security and acceptable use policies at the network level, agnostic to the device that is being used. This means that applications and websites can be whitelisted or blacklisted, preventing users from using dangerous or unapproved services regardless of device type.

For example, a business may choose to use OneDrive for storing files in the cloud and want to prevent other file sharing services from being used. Microsoft Endpoint Manager and Azure AD can be used to push and configure the OneDrive application to the Windows and mobile devices, enabling employees to use this service. Wandera Mobile Security Suite can then be used in tandem to prevent employees from using other services such as Dropbox, preventing the user from accessing shadow IT in the form of application and web browser versions.

Many organizations have found that the lack of consistent controls create new attack surfaces that hackers use to penetrate the organization and mischievous employees abuse to circumvent IT policies. It is not uncommon for users to be blocked by acceptable use policies as they browse to unsanctioned content from a desktop computer, only to enable tethering on a mobile device to circumvent the policy.

Managing different technologies and applying different policies creates undue complexity for admin teams and prevents business flexibility, potentially leading to overlooked security gaps. Wandera Mobile Security Suite’s in-network security technology allows content security policies to be applied consistently across different device types. This means that phishing attacks, which are how 90 percent of data breaches begin, can be prevented regardless of device type. Mobile Security Suite is also able to block spam sites and stop malware communicating with command-and-control (C2) servers.

Mobile data management is another area of disparate control for businesses. The rich set of features in Wandera Mobile Security Suite for managing data usage on mobile devices can help an organization prevent bill shock caused by data overages or roaming on any iOS, Android, or Windows 10 device, with detailed and holistic reporting so businesses can understand how they use data and where risk may enter through mobile usage.

Better together—Microsoft and Wandera

Businesses can benefit from the strong integration between Microsoft Endpoint Manager, Azure AD, and Wandera Mobile Security Suite, making device management processes seamless. The combined solution streamlines device lifecycle management, involves a single source-of-truth for users and roles that is applied consistently between products, and makes security policies more intelligent and effective by ensuring that all components in the solution are sharing intelligence to remediate threat as soon as it’s detected.

Using Azure AD to centrally manage user identities simplifies administration, as credentials do not need to be created across multiple systems. When an employee is added in Azure AD, a profile will automatically be created in Microsoft Endpoint Manager, enabling their devices to be managed. In turn, Wandera Mobile Security Suite can be integrated with Microsoft Endpoint Manager so that the same acceptable use, content security, and data management policies can be applied seamlessly. This workflow functions when an employee leaves the business, unenrolling them from all services, making integration of services an easy way to manage a device’s lifecycle and ensuring that sensitive data remains secure

The integrated solution also enables differentiated access for users through applying policies by role. The three services can be linked directly so that an organization’s directory hierarchy can be shared, and acceptable use policies applied to the user level simply and easily.

Enabling employees is very important for productivity, but equally as important is preventing unwanted parties accessing confidential information and critical systems. Infecting an endpoint is an easy way for malicious parties to infiltrate a businesses’ technology systems.

The integrated solution also incorporates risk signals from a variety of sources to ensure that the user, device, and data are safe. Microsoft Endpoint Manager provides a risk assessment of the device configuration, including whether the lockscreen is configured properly. Azure AD is able to determine when sign-in behavior is anomalous or risky, through signals integration with Azure AD Identity Protection. Wandera Mobile Security Suite provides an added set of security assessments on the device that includes vulnerability scans, app vetting, and Man-in-the-Middle checks. All of these risk signals are brought together through a single Conditional Access policy.

Best practices for mobility management with iOS, Android, and Windows 10 devices

As mobile employees are enabled with mobile iOS, Android, and Windows 10 devices, businesses need to embrace technology that will give admins the necessary controls to effectively manage employee devices consistently. Businesses need to be able to manage productivity tools, by providing access to acceptable applications and blocking unwanted applications. Organizations need to provide strong security across devices to close gaps in their defenses and prevent common threats from impacting business operations. Finally, businesses should ensure that Windows devices do not cause unexpected data charges by employing cost control tools.

To be able to effectively enforce acceptable use, content security, and control costs across a device fleet with many different device types, businesses should utilize integrated solutions that can support consistent management. Microsoft Endpoint Manager, Azure AD, and Wandera Mobile Security Suite provide features that organizations need to embrace a mobile fleet. Bringing these three services together creates a powerful joint solution that can improve businesses’ lifecycle management, policy application, and identity and security management.

Bookmark the Security blog to keep up with our expert coverage on security matters. Check out our security solutions that help to address these issues. Also, follow us at @MSFTSecurity for the latest news and updates on cybersecurity.

The post Unifying security policy across all mobile form-factors with Wandera and Microsoft appeared first on Microsoft Security.

Read more: microsoft.com

Categories
microsoft windows OS

Rooting your Android phone: What you need to know

While your Android isn’t in the same sort of jail an iPhone lives in, rooting can help you break out.

If you’ve researched anything about Android on the internet, you’ve probably seen and read about “rooting” it. There was a time when many of the Android phones available didn’t live up to their potential, and root was the answer. Horrible software was the norm, applications that you would never use ran amok and wasted data and battery life, and the experience was bad all around.

Because every Android phone is running the Linux kernel and middleware very similar to a Linux distribution you would install on a computer under the hood, rooting them was the way to allow us to try and fix them our own way. Rooting is how you get complete access to everything in the operating system, and those permissions allow you to change it all. Modern Androids are quite a bit better than they used to be. Even the most inexpensive phone or tablet you can buy in 2019 will do more and perform better than the best Android phone available just a few years ago. But many of us still want to root our phones and are looking for more information.

Table of contents

What is root?
Should I root?
Getting ready
How to root
Samsung
LG
Huawei
OnePlus
Motorola
Pixel
Other phones

What exactly is root?

When you root your Android, you’re simply adding a standard Linux function that was removed.

Root, at least the way we’re talking about it here, is the superuser. Your Android phone uses Linux permissions and file-system ownership. You are a user when you sign in, and you are allowed to do certain things based on your user permissions. Apps you install are also given a type of user ID, and they all have permissions to do certain things — you see those when you install them on older versions of Android, or you are prompted to allow them on Marshmallow or higher — in certain folders with certain files. Root is also a user. The difference is the root user (superuser) has permission to do anything to any file anywhere in the system. This includes things we want to do, like uninstall application forced on us, or things we don’t want to do that can put your Android in an unusable state. When you’re doing things with superuser permissions, you have the power to do anything.

When you root your Android, you’re simply adding a standard Linux function that was removed. A small file called su is placed in the system and given permissions so that another user can run it. It stands for Switch User, and if you run the file without any other parameters it switches your credentials and permissions from a normal user to that of the superuser. You are then in complete control and can add anything, remove anything and access functions on your phone or tablet that you couldn’t reach before. This is pretty important, and something you should think about before you begin.

System root vs. Systemless root

Everything described above is how Linux-based systems normally work, and how Android worked before version 4.3.

Since the release of Android 4.3 the process that handles requests for root access has to run as soon as you turn on your phone. This daemon (that’s what these sorts of processes are called) also needs special permissions so it can work as intended. To make both of these things happen, files in the phone’s system folder had to be modified.

When Android 5.0 was released things changed and the boot image — software that does exactly what you think it does: boot up Android on your phone — need to be modified so that the su daemon was launched. Since this doesn’t modify the system partition, it was called a systemless root.

Systemless root is what you’ll have unless you can build Android for your phone and install it.

Work on systemless root was quickly halted when a way to root phones running Android 5 by editing the system files was found, but Google patched the method with Android 6 and systemless root was once again required.

It’s good that Google patches things to keep our phones more secure because most people don’t care about rooting phones and need these protections. In this case, it was also good for the rooting community at large because a systemless root is better in a lot of ways.

It’s easier when you want to update to a newer version of Android, it’s easier to remove if you change your mind, and what most users like about it is that a systemless root can be “hidden” so that certain apps and behaviors won’t know your phone is rooted and function normally. Yes, this means that things like Google’s SafetyNet, your bank’s app, or even a game that doesn’t allow rooted devices can work normally in many cases.

Unless you have a very old phone or just want to practice building Android yourself on a Pixel or other open hardware platform supported by Google, you’ll probably be using a systemless root method.

Should I root my Android?

Yes. No. Maybe. All three answers are perfectly valid. People have different reasons to want to root their devices. Some do it just because they can — they paid for the hardware and think they should be able to do anything they like. Others want to be able to add things that aren’t there, like internet servers or be able to “fix” services that are there but don’t work the way they would like them to work. People might buy a phone because they like the hardware, but hate the software and want to change it. Mostly, people root their phones because they simply want to get rid of the extra things on it that they don’t want. Every one of these reasons — as well as any reason you might have that aren’t mentioned here — are the right reasons.

Most people want root to get rid of the bloat.

Before you do any preparation to root your phone, you need to remember that it changes everything about the inherent security from Google and the company that built it. Plenty of us don’t like it, but being able to access an account with admin permissions was not included in release versions of Android on purpose. As soon as you add this capability, you are responsible for the security and integrity of the operating system and every application on it. For some, this is more responsibility than they want or need.

Rooting isn’t the answer for everyone. If you’re not sure about the ways you can break things by doing them as root, you should learn more about it before you start. It’s OK to not know things and to try and learn, but not knowing and doing them anyway can turn a very expensive Android into a paperweight. You also need to know that for many Android models, rooting means your warranty is null and void. Services (including apps as well as network access from your carrier) can be denied to you because of the security risk when you’re rooted. The risk is real because so many users go into it all blind and let security lapse. Not doing that is your responsibility — take it seriously!

Rooting your phone puts you in charge when it comes to privacy and security. That’s good and bad.

Finally, there are plenty of users who simply don’t care about this stuff. Any Android phone, no matter how restricted root access is, can do just about everything we want or need from a pocket computer. You can change the appearance, choose from over a million apps in Google Play and have complete access to the internet and most any services that live there. You can even make phone calls. It’s great if you’re happy with what you have and what it can do, and aren’t worried about trying to fix what isn’t (in your eyes) broken.

Getting ready to root

You’ll need to do a few things to prepare your phone for rooting, depending on which method you use. Many of the ways require you install the Android SDK or unlock your bootloader. This sounds like a lot of scary work, but it’s not difficult and knowing how to use these tools will help if things go wrong. The Android SDK is huge, and if you’re just rooting your phone, you don’t want to waste bandwidth or file space on it. XDA user shimp208 built Minimal ADB and Fastboot, a Windows tool that only contains the ADB and Fastboot components needed for rooting.

Here is our comprehensive walkthrough of how to set up and install the Android SDK

Depending on which phone you have, unlocking the bootloader is slightly different. The “standard” way is by using the OEM unlock command. If you’re using a Motorola, Sony, or LG phone you’ll be able to get an “official” cryptographic token to unlock your bootloader for some devices. You’ll find how to do that and who to get it from at each vendor’s developer pages in the links below. Remember that unlocking the bootloader on your Android may affect the warranty status.

Motorola bootloader unlocking
LG bootloader unlocking
Sony bootloader unlocking

How to root my phone?

How you root your Android is going to depend on which one you have. There are over 12,000 different Android models (and that’s only counting ones that can access Google Play) from hundreds of different manufacturers. Almost all of them have been designed so that they are hard to root. That’s because if it is is easy for you to root your phone when you want extra access, it may also be easy for someone else to root your phone and get the same access — which means they would have all of your important private data.

There are models specifically hardened to prevent unauthorized access (that means rooting, too) like the BlackBerry KEY2 as well as devices that were designed to be safely and easily unlocked for full developer access like the Google Pixel 4. Most phones fall somewhere in between, and when carriers get involved they have control over the process, too.

The best Android phones

With over 12,000 different models, we can’t cover every single method to root every single device. We can point you in the right direction and help you get there, though.

Rooting your Samsung phone

Samsung used to offer “developer editions” of their popular models, but weak sales (they usually needed to be paid for in full with no type of subsidy or financing) they seem to have stopped production. We have only ourselves to blame — it’s just not worth making something that nobody is buying.

Samsung also makes very lucrative deals with carriers, and most of the time those carriers want to prevent you from rooting your phone. Recent models from AT&T or Verizon are notoriously difficult to exploit, and all the U.S. versions of the Galaxy S9 are locked up and encrypted. There might not ever be a way to root them. This isn’t true for unlocked models sold outside of North America though.

Knox can pose special problems when trying to root.

To root most Samsung phones you’ll need to use a program called Odin. It’s a low-level firmware flashing tool that can push image files to the storage and overwrite existing images. You’ll also need the correct USB drivers for Windows computers. If you’re using a Mac computer or running Linux, the software that flashes images is called Heimdall. They both work essentially the same and carry the same risks — if you try and flash the wrong image or a bad image, your phone isn’t going to be able to start. While this is often recoverable, know that there is always a chance you can ruin your phone or tablet, and your warranty is voided as soon as you begin.

Also, many Samsung phones ship with Knox security enabled. Knox is part of Samsung’s special “Samsung Approved For Enterprise” feature where personal and work environments can be separated in a way that allows both to coexist on the same device. Knox can pose special problems when trying to root a phone that uses it, and it has a software counter that can show when device firmware has been tampered with. This means it’s very easy for Samsung to void your warranty if you start fiddling with things.

For more information about rooting Samsung phones, the best advice we have is to check XDA Forums for your particular model.
* Galaxy Note 10
* Galaxy S10
* Galaxy Note 9
* Galaxy S9

XDA Forums are a group of people, including some from the mobile industry, who are dedicated to the good sort of hacking of mobile devices. It’s one of the best places on the internet to learn about things like rooting your phone, and it’s the first place I check when I have any questions, too!

Rooting your LG phone

LG phones have several different methods to install the files needed for rooting. Some, mostly international models, are completely bootloader unlockable and it’s trivial to push the files through a custom recovery, while some are locked up tighter and require some special tricks. As we see with Samsung phones, carriers have a lot of influence here, so most new LG phones sold in the US are difficult to root.

In the past, phones like the LG G6 were trivial to root even if you tried on a carrier-branded model. Those days are gone and now the process may be risky. As with Samsung phones, the best thing you can do is to check the XDA forums for your model.

LG G8 ThinkQ
LG V30

Rooting your Huawei phone

Huawei doesn’t sell very many phones in North America, but the company is one of the largest smartphone manufacturers in the world and offers some really great products like the Mate 20 Pro, one of the best phones you can buy.

The company used to allow bootloader unlocking of their phones through an official program, but that was suspended in May 2018 because it felt that a better user experience could be provided and wanted to avoid issues for customers that flashed unauthorized software.

If you’re interested in rooting your Huawei phone, the best thing you can do is read up on your model at XDA.

Huawei P30 Pro
Huawei Mate 30 Pro
Huawei P20 Pro

Rooting your OnePlus phone

OnePlus has always been one of the more developer-friendly manufacturers, and all of the company’s phones except the T-Mobile branded OnePlus 6T can be rooted exactly the same way a Pixel phone can be — by unlocking the bootloader through the standard Android commands and transferring the correct files to the phone itself.

While carrier influence may make the T-Mobile OnePlus 6T an outlier, nothing has changed for the company’s latest version. You’ll find a full tutorial for unlocking and rooting your OnePlus phone at XDA Developers.

To root the T-Mobile branded OnePlus 6T, you’ll need to convert it to the standard model’s firmware. XDA Forums also has a full tutorial for you to follow. Other sections for OnePlus phones if you’re not using a 6T:

OnePlus 7 Pro
OnePlus 7t

Rooting your Motorola (Lenovo) phone

Motorola also offers a liberal bootloader unlocking policy for some models, which you’ll find at their developer site. Using the standard Android SDK tools, you can unlock your bootloader so that a custom recovery image can be flash. This allows you to flash any other system image to your phone.

If your Motorola phone isn’t covered under their bootloader unlocking policy (see the list here) you might have to resort to exploits or use commercial rooting apps. The best places to try are MOFOROOT or the relvant section at XDA Forums.

Rooting your Pixel phone

To root your Pixel phone, you should start with learning how to install and configure the Android SDK. There are plenty of one-click scripts or toolboxes that will unlock your bootloader and get you ready to flash (or even flash it for you) a custom recovery, but there’s a great reason to learn how to do it yourself — you are able to fix most anything if it goes wrong by using the Factory Images.

Google not only supports unlocking your bootloader, but they also give you full and complete instructions on how to do it, how to flash third-party images and how to go back. Unlocking the bootloader doesn’t break any warranties as Google realizes that there are many valid reasons to flash experimental on the developer/reference device for Android. Take advantage of this, and use the tools Google provides!

Once a third-party recovery image is flashed, you’re easily able to transfer the files you need to root to your phone. We highly recommend a Pixel phone to anyone who wants to tinker with the Android software platform.

Other phones

As mentioned previously, there are over 12,000 current Android models from hundreds of manufacturers. There’s no way to include each and every one on a single page.

Some of these phones come with a method (either approved by the manufacturer or found by a third-party) to unlock the bootloader and use the custom recovery method to root them. Many of these other phones can be rooted with applications you run on a computer or the phone itself. Look at specific forums for your device if you want to explore this.

Commercial root apps work but check out the pros and cons before you use them.

Apps like these work because they take advantage of an exploit (a bug or glitch) in the software. This means that many security applications will identify them as a virus, and that software updates can (and do) break compatibility with them. Not every phone can be rooted through an app that leverages an exploit, but many can. It’s certainly worth a look to see if your particular phone is supported.

It’s also good to question the methods and motives behind any company that wants access to potentially sensitive information, and a healthy dose of skepticism is a good thing. A lot of folks feel that these kinds of apps are unsafe or follow unsafe practices, and they may be correct. On the other hand, plenty of people have used the apps and services and are completely happy with the results. We can’t speak on it either way, as we’re not involved in the creation or testing of any of these apps. Our job is to inform you that they exist and let you know that there is always a bit of inevitable controversy surrounding them.

Updated February 2020: This article was completely rewritten to showcase all of the latest root guides and apps.

Read more: androidcentral.com

Categories
microsoft windows OS

How to use the Windows 10 Sandbox for safer web surfing

The virtual device in Windows 10 Sandbox is released with Microsoft Edge, that makes this unique function a reliable tool for more safe and secure web browsing.

Read more: techrepublic.com

Categories
microsoft windows OS

SwahiliPod101 Review: Facts About this Swahili Program

SwahiliPod101 Evaluation Summary:

.Kind of program: 100s of audio/video lessons and supplemental research study tools.How to find out: Listen to the audio lessons, enjoy the video lessons, utilize research study tools for additional evaluation.For who: Beginners and knowledgeable students (lessons for all levels) of any age.Discover on: any computer system, iPhone, iPad, Android or tablet.Costs: Free account, and beginning with $8/month.Helpful for: Learning discussions, listening, speaking Swahili.Time financial investment: At least 5 minutes a day. Lessons are 3-15 minutes usually.

Click here to go to SwahiliPod101 &&register for complimentary.

So, how can you discover Swahili with SwahiliPod101?

A) You Learn with Audio &&Video Lessons

The audio and video lessons are the core of SwahiliPod101.

 Swahilipod101 evaluation

You push play, you listen to an audio lesson or enjoy a video lesson. The instructors offer you a discussion, and after that they equate it and simplify. You hear the discussion as soon as more at the end.

Lessons cover useful discussions like greetings, shopping, little talk, inquiring about weather condition, household, travel and a lot more.

So, in those 3-15 minutes……

.You discover an easy discussion.You find out all type of vocabulary.You badger a grammar guideline or 2.If you duplicate what you hear), and you can begin speaking (.

If you wish to examine it out on your own, here’s a totally free and opened lesson. No registration required.

https://www.swahilipod101.com/lesson/survival-phrases-1-how-to-say-thank-you-in-swahili/

B) You Can Read Along with the Transcript or Lesson Notes.

Listening to audio (or enjoying videos) is something.

It’s another thing to follow in addition to the text. You can select up on every word that’s stated when you follow along with text. There are lesson notes and records with every lesson.

.PDF Lesson Notes: Gives you the discussion and translations, grammar descriptions and lesson vocabulary.Records: The total records of what the instructors state in the lesson.

C) For Audio Lessons, You get the Conversation Broken Down Line-by-Line.

So you can evaluate each line of the discussion.

.Listen to the audio of each line.Get the translation for each line.Practice stating each line and compare it versus native speakers with the voice recording alternative.You can likewise download the Dialogue track, which is simply the discussion without any Swahili to evaluate.

D) You Review the Lesson’s Words with the Vocabulary Section.

.Listen to the Audio.Listen to the slowed-down variation.Practice stating each word with the voice recording alternative.Evaluation words with the Slideshow.Evaluation with the Quiz.Send out the words to the 1) Word Bank or 2) Flashcards for more research study.

E) Then, SwahiliPod101 Feeds You The Next Lesson to Take.

.The control panel tracks your development.Dishes out your next lesson.

That’s how SwahiliPod101 works.

F) There are likewise Study Tools &&Extra Features.

.Lesson Library: This is where you’ll discover their 100s of lessons and discovering courses to take.2000 Core Word List (2000 most typical Swahili Words).Flashcards to assist you find out words.Word Bank to develop and conserve words research study sheets.Voice Recorder to tape yourself and compare to native speakers.Premium PLUS My Teacher – – this provides you an on-site instructor by means of their Premium PLUS messenger.The Word of the Day Emails (complimentary complementary service): You simply get a brand-new word every day.

SwahiliPod101 Review upgraded December 2019.

Click here to go to SwahiliPod101 &&register for totally free.

The post SwahiliPod101 Review: Facts About this Swahili Program appeared initially on LinguaJunkie.com .

Read more: linguajunkie.com