184
edits
Line 74: | Line 74: | ||
==Plans – how we want to solve the problem(s)== | ==Plans – how we want to solve the problem(s)== | ||
The ideas of last week worked quite well, but not properly understandable, so we want to extend it in the next week. | |||
We would look for similiar applications and how they deal with authentification and security methaphors. After that, we would improve our prototype with the results of the last weeks and try out different approaches | |||
<p style="color:darkgreen">Could you provide any Methods how you want to archive this? E.g. Analysis of competition, tests etc? Is your concern only directed at the icons? And what is bad about the current ones than?</p> --[[User:JanD|JanD]] 09:38, 12 December 2013 (CET) | <p style="color:darkgreen">Could you provide any Methods how you want to archive this? E.g. Analysis of competition, tests etc? Is your concern only directed at the icons? And what is bad about the current ones than?</p> --[[User:JanD|JanD]] 09:38, 12 December 2013 (CET) | ||
==Images== | ==Images== |
edits