NEW GENERATION CRAFT: IKEA HACK AND ITS TAXONOMY
نویسندگان
چکیده
منابع مشابه
Apple , Ikea and their integrated Information Architecture
The design of a physical space can and should take advantage of information architecture (IA) deliverables, in particular when designing an integrated model of IA. The user must be able to easily-consult [...] technology-dependent environments, e.g. digital medium or printed paper catalogue, in line with the information flow conveyed through the website. Conveying the relevance of information t...
متن کاملCorporate Responsibility and Hypercompetition. The IKEA Case
The rapid changes caused by growing complexity, accelerating technological innovation and globalisation, have driven companies to play a precise economicsocial role. Hypercompetition implies a substantial change in a company’s strategic objectives: every advantage gained over the rivals is rapidly imitated and surpassed. Hypercompetition needs from the company the ability to control simultaneou...
متن کاملNumerical Hydrodynamic Performance of the Stepped Planing Craft and Its Step Height Effect (RESEARCH NOTE)
One of the most efficient methods of reducing drag on planing craft is the use of transverse step on the bottom of a hull. Applying steps on the hull reduces the contact area with water and as a result, it reduces drag of the craft. Planing craft are able to have one or two transverse steps. In this paper, numerical hydrodynamic performance of the stepped planing craft and its step height effec...
متن کاملHandmade Paper : a Review of Its History , Craft , and Science
For over 2000 years the manual craft of papermaking has been practiced all over the world utilizing a variety of techniques. This review describes the evolution of hand papermaking and its cultural significance. Paper’s evolution has been shaped by the structure and chemical composition of the fibers. Almost every aspect of modern papermaking technology has been foreshadowed by traditional prac...
متن کاملThe MIFARE Hack
The MIFARE Classic is the most popular RFID chip, used in public transport as well as cafeterias and other applications. This paper gives an overview of which methods were used to re-engineer the chips, from polishing to analyzing the communication. Within this process, various security weaknesses were discovered. Those allow various attacks, which will be shown in the last part of the paper.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: TURKISH ONLINE JOURNAL OF DESIGN ART AND COMMUNICATION
سال: 2021
ISSN: 2146-5193
DOI: 10.7456/11001100/013