Browse Definitions :
Definition

humanware

Contributor(s): Cesar Souza Liedke

Humanware is hardware and software that emphasizes user capability and empowerment and the design of the user interface. The process of building humanware generally consists of these steps:

  1. Define users (age, mindset, environmental context, previous product experience and expectations, and so forth) and what they really want to do
  2. Identify tasks they will need to do or capabilities they will want
  3. Specify usability objectives (if possible, these should be measurable, such as how long to do something or how many mouse clicks to get to a specified task point) for each task or capability
  4. Build a prototype of the user interface (it can be a paper or simulated prototype if time is short)
  5. Test and verify or correct the prototype
  6. Provide the prototype and usability objectives to the program designers and coders
  7. Test the code against the prototype and objectives and, if necessary, redesign or recode the software
  8. Test the product with users or valid test subjects and revise as necessary
  9. Get feedback from users and continually improve the product

Philips Research uses the term for both software and hardware that is specially designed to interact with users, including its speech synthesis and speech recognition microchips.

This was last updated in October 2005

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close