STORYTELLING WORKSHOP VISUAL DESIGN HACKING -

2y ago
17 Views
2 Downloads
6.76 MB
64 Pages
Last View : 2m ago
Last Download : 2m ago
Upload by : Xander Jaffe
Transcription

STORYTELLING WORKSHOPVISUAL DESIGNHACKINGPurin Phanichphant

VISUAL DESIGN HACKINGOne Goal:To equip you with simple andactionable techniques to kick assat visual design.

VISUAL DESIGN HACKINGVISUAL DESIGN IS ANEXTREMELY VALUABLE SKILL.IT GOES A LONG WAY.

VISUAL DESIGN HACKINGVISUAL DESIGNIS 1% GIFT,99% LEARNABLE SKILL.

VISUAL DESIGN HACKING

VISUAL DESIGN HACKING

VISUAL DESIGN HACKINGAHA!2003I’M GOOD20042005I’M AWESOME200620072008200920102011

VISUAL DESIGN HACKINGJUST LIKE MUSICJUST LIKE BIKINGJUST LIKE PUBLIC SPEAKINGPhoto credits: Google Images

VISUAL DESIGN HACKINGTHERE ARE SHORTCUTS AND TRICKSTO GREAT VISUAL DESIGN.1. Line things upSPECIFICALLY: 2. Leave breathing room for the eye3.4.5.6.7.Use designer fontsBe consistentPick only a few colorsCopy good examplesUse Keynote

VISUAL DESIGN HACKING1.LINE THINGS UP

VISUAL DESIGN HACKING

VISUAL DESIGN HACKING

VISUAL DESIGN HACKING76A6C8:E6HH 6Y inV 8]VcYBdc XV dcoVaZo?ja Vc B hh \Ejg c E]Vc X]e]VciEZc"[Vc HjcH:GK 8: HNHI:B ;DG 6 :6AI N 8DAA: : A ;:HINA:9Zh \c 8 8VgcZ\ Z BZaadc Jc kZgh in68@CDLA:9 :B:CIHEgd[Zhhdg ?dY ;dga oo Egd[Zhhdg H]Zaan :kZchdcHX]dda d[ 9Zh \cHX]dda d[ 8dbejiZg HX ZcXZ8BJ HijYZci ZVai] HZgk XZh8daaZ\Z h Vc c[Vbdjh eaVXZ [dg ]ZVai] egdWaZbh gVc\ c\ [gdb bZciVa higZhh id ZVi c\ Y hdgYZgh# LZ X]dhZ id ZmVb cZ i]Z a [ZhinaZh d[ [ZbVaZ XdaaZ\Z hijYZcih# LZ lZgZ cig \jZY Wn i]Z igZbZcYdjh egZhhjgZ id ZZe je l i] VXVYZb Xh VcY hdX Va a [Z# i h Vahd Y [ÒXjai id cdl ZmVXian ]dl lZaa"WVaVcXZY bZVah VgZ# 8dbW cZ i] h l i] i]Z Y [ÒXjain c gZbZbWZg c\ l]Vi dcZ ]Vh ZViZc VcY i WZXdbZh XaZVg i]Vi ZkZc V h beaZ Y heaVn d[ i]Z cjig i dcVa WVaVcXZ d[ [ddY XdjaY WZ Zcdj\] id ]Zae hdbZ eZdeaZ ÒcY i]Z g \]i [ddYh#G:H:6G8 LZ ZbeadnZY jhZg"XZciZgZY YZh \c bZi]dYh l i] c djg gZhZVgX] e]VhZ cXajY c\ XdciZmijVa cfj gn! jhZg djgcVah! VcY eVgi X eVidgn YZh \c XdaaV\ c\ hZhh dch# 6YY i dcVaan lZ VXfj gZY ch \]ih [gdb a iZgVijgZ gZk Zlh d[ gZhZVgX] eVeZgh VcY ejWa h]ZY Vgi XaZh! [gdb ciZgk Zlh l i] cjig i dc hih VcY eZghdcVa ]ZVai] bdc idg c\ ZmeZgih! VcY XdbeZi i kZ egdYjXi VcVanhZh#8DCI:MIJ6A CFJ GN?DJGC6A C ; cY c\hH:GK 8: 9:H C;gdb djg ÒcY c\h! i lVh VeeVgZci i]Vi hijYZcih XdjaY WZcZÒi [gdb eVhh kZ c[dgbVi dc Vi eVnbZci ed cih# LZ ]VkZ Xdch YZgZY bVcn dei dch [dg V cZl eVnbZci hnhiZb i]Vi XVc WZ Wj ai dc ide d[ Zm hi c\ iZX]cdad\ Zh VcY c[gVhigjXijgZh# I]Z ZcY gZhjai h 7VaVcXZ EVhh! Vc ZVhn lVn id eVn VcY \Zi VYk XZ dc ]ZVai] Zg dei dch [dg XdaaZ\Z hijYZcih#E6GI 8 E6IDGN 9:H C; cY c\hß ;ddY Xdchjbei dc ]VeeZch Vi di]Zg adXVi dch hjX] Vh dc"XVbejh [ddY kZcYdgh VcY d[["XVbejh gZhiVjgVcih# ß I]Z YZX h dc dc l]ZgZ i]Zn ZVi ValVnh XdbZh WZ[dgZ l]Vi i]Zn ZVi#; cY c\hß 6 bV dg in d[ i]Z g ZVi c\ YZX h dch lZgZ WVhZY dc VkV aVW a in VcY Y hiVcXZ id i]Z ZVi c\ eaVXZ# ß BVcn hijYZcih ]VkZ a iiaZ hZchZ d[ ]dl id hZi VcY \Zi id i]Z \dVa0 hdbZ hijYZcih YZh gZ id add a Z eZg[ZXi XdkZg bdYZah Wji VgZ l i]dji Vcn XajZh VWdji ]dl id VX] ZkZ i#HI6@: DA9:G INEDAD NEGD8:HH ;ADL 6C6ANH HH:GK 8: 6G8 I:8IJG:8ViZ\dg oVi dc d[ \gdjeh VcY cY k YjVah VXXdgY c\ id i]Z g cÓjZcXZh dc i]Z hZgk XZ WZ c\ YZh \cZY8daaZ\Z hijYZci [ddY ejgX]VhZ bdYZaHnhiZb Y V\gVb# I]Z hZgk XZ h c i ViZY Wn hl e c\ i]Z XVbejh 9 XVgY#;DD9 C9JHIGN DK:GCB:CI8DAA: : ;DD9EJG8 6H C BD9:AAdXVaGZhiVjgVcih ;ddY IgjX hHiVcYh gdXZgn HidgZ HjeZgbVg Zi;96 :6AI H:GK 8:H; cVcX Va HZgk XZh 7Vc h8gZY i 8VgY HnhiZb :I JC GN NB8a c Xh dhe iVah dkZgcZbiAVl BV Zgh; C6C8 6A 7JH C:HH E6GIC:GHLdg Zgh 9 VcY ediZci Va[ddY dgYZgDC 9:B6C9 C;DGB6I DC 9:8 9: ID D ID 6 ;DD9 EA68:HijYZci ZVai]HZgk XZh chjgVcXZ8dbeVcn :6AI NE6NB:CIH:GK 8::miZcYZY6bVodc dd\aZ9:8 9: L 6I ;DD9 ID 7JNJC K:GH INE6N ;DG I : ;DD9Hl eZ hZcYh 9 GZ\ hiZg C;DGB6I DC EJH ;ddY HZgk XZ6Yb c higVi dc;VXZ7dd 6 B;g ZcYhJeeZgXaVhhbZc gZZ Dg\h#Cdi hdXadhZ;g ZcYh6XXdjci WVaVcXZdg YZc Va d[ dgYZg:6IJc kZgh in djh c\;Vb anHD8 6A;ddY HZgk XZ8dcigVXidgKZcY c\HZgkZgh7: H6I H; :9KZcY c\ HZgk XZbVX] cZh?VcZ9dZ JcYZg\gVYjViZ HijYZci 9 XVgYGZfjZhi [dg\gVe]h chZgi dc ig \\ZghgZfjZhi [dg \gVe]hJH6 : H8:C6G D7ZXdbZ ]jc\gn9ZX YZ l] X] eaVXZ id \d id9ZX YZ l]Vi [ddY id Wjn8VgY ]daYZg8Vbejhl gZaZhhCjig i dc\gVe]hEVn [dg i]Z [ddY:ViLZ [ZZa i h bedgiVci id cdi dcan YZh \c i]Z hZgk XZ Vi i]Z XdcXZeijVa aZkZa! Wji id Vahd add Vi i]Z hijYZci ZmeZg ZcXZ l i] i]Z hZgk XZ# 6i l] X] ed cih XVc c[dgbVi dc WZ VXXZhhZY4 L]Vi YdZh V YZk XZ add a Z4 dl YdZh V hijYZci ciZgVXi l i] i4 c dgYZg id \gdjcY djg hZgk XZ YZh \c! lZ ]VkZ \ZcZgViZY V jhZg eZghdcV VcY hXZcVg d d[ ]dl i]Z Zci gZ hnhiZb ldg h id\Zi]Zg hZVbaZhhan# iÉh ajcX]i bZ# HVgV] jhi \di dji d[ ]Zg Vgi ] hidgn XaVhh VcY ]Vh '* b cjiZh WZ[dgZ ]Zg cZmi XaVhh# H]Z YZX YZh id \d \gVW ajcX] l i] ]Zg [g ZcYh#H]Z ha eh dji ]Zg 7VaVcXZ EVhh id hZZ i]Z gZXdbbZcYVi dc [dg idYVnÉh fj X Zhi VcY ]ZVai] Zhi bZVah#7ZXVjhZ h]Z YdZhcÉi ]VkZ bjX] i bZ! HVgV] VcY ]Zg [g ZcYh YZX YZ id \d id i]Z XadhZhi hidgZ#L] aZ c i]Z hidgZ h]Z jhZh 7VaVcXZ EVhh id ÒcY ]ZVai]n dei dch#7VaVcXZ EVhh hj\\ZhiZY bZVah l] X] ]VY bdYZgViZ Vbdjcih d[ egdiZ c WZXVjhZ HVgV] ]VhcÉi ]VY bjX] d[ i aViZan# H]Z YZX YZh id ]VkZ V ijg Zn hVcYl X] VcY XZY iZV#H]Z eVnh [dg i]Z bZVa l i] ]Zg XVbejh 9# 7VaVcXZ EVhh jeYViZh ih Y heaVn l]Zc h]Z ejih i]Z 9 WVX ch YZ#I]Z Y heaVnh h]dlh i]Vi ]Zg dkZgVaa cjig i dc WVaVcXZ h hi aa \ddY# H]Z h gZlVgYZY ÒkZ ed cih [dg bV c\ V ]ZVai]n X]d XZ#HVgV] ZVih ]Zg hVcYl X] cdl c\ i]Vi h]Z l aa bZZi ]Zg \dVa d[ adh c\ h m edjcYh Wn i]Z ZcY d[ i]Z hZbZhiZg# CI:G;68: 9:H C7ZXVjhZ i]Z Y heaVn YZk XZ ]Vh id WZ bdW aZ VcY VWaZ id WZ hidgZY c V ejghZ! i]Z X]VaaZc\Z h id YZh \c V h beaZ nZi c[dgbVi kZ k hjVa ciZg[VXZ# LZ lZci dc id YZkZade i]Z c[dgbVi dc VgX] iZXijgZ! l gZ[gVbZh! VcY i]ZbZ Y gZXi dch# I]Z ÒcVa YZh \c h i]Z gZhjai d[ hZkZgVa gdjcYh d[ iZgVi dch VcY iZhi c\#96 AN CJIG I DC K :LL::@AN CJIG I DC IG:C9ß 9 heaVnh YZiV aZY cjig i dc ] hidgn i]gdj\]dji i]Z YVnß 9 heaVnh cjig i dc igZcY VcY WVaVcXZ dkZg V ldg lZZ ß HjbbVg oZh d[ hjgeajhZh VcY YZÒX ihß Ide"g \]i Ydi cY XViZh dkZgVaa cjig i dc WVaVcXZ l]ZgZ \gZn h lZaa"WVaVcXZY VcY gZY h aZhh WVaVcXZY#B:6A 69K HDGß 9 heaVnZY dcXZ hijYZci hZaZXih V bZVa ß BZVa hj\\Zhi dch WVhZY dc XjggZci e]nh XVa adXVi dcß HdgiVWaZ Wn Y hiVcXZ! eg XZ! dg cjig i dc WVaVcXZ

VISUAL DESIGN HACKING76A6C8:E6HH 6Y inV 8]VcYBdc XV dcoVaZo?ja Vc B hh \Ejg c E]Vc X]e]VciEZc"[Vc HjcH:GK 8: HNHI:B ;DG 6 :6AI N 8DAA: : A ;:HINA:9Zh \c 8 8VgcZ\ Z BZaadc Jc kZgh in68@CDLA:9 :B:CIHEgd[Zhhdg ?dY ;dga oo Egd[Zhhdg H]Zaan :kZchdcHX]dda d[ 9Zh \cHX]dda d[ 8dbejiZg HX ZcXZ8BJ HijYZci ZVai] HZgk XZh8daaZ\Z h Vc c[Vbdjh eaVXZ [dg ]ZVai] egdWaZbh gVc\ c\ [gdb bZciVa higZhh id ZVi c\ Y hdgYZgh# LZ X]dhZ id ZmVb cZ i]Z a [ZhinaZh d[ [ZbVaZ XdaaZ\Z hijYZcih# LZ lZgZ cig \jZY Wn i]Z igZbZcYdjh egZhhjgZ id ZZe je l i] VXVYZb Xh VcY hdX Va a [Z# i h Vahd Y [ÒXjai id cdl ZmVXian ]dl lZaa"WVaVcXZY bZVah VgZ# 8dbW cZ i] h l i] i]Z Y [ÒXjain c gZbZbWZg c\ l]Vi dcZ ]Vh ZViZc VcY i WZXdbZh XaZVg i]Vi ZkZc V h beaZ Y heaVn d[ i]Z cjig i dcVa WVaVcXZ d[ [ddY XdjaY WZ Zcdj\] id ]Zae hdbZ eZdeaZ ÒcY i]Z g \]i [ddYh#G:H:6G8 LZ ZbeadnZY jhZg"XZciZgZY YZh \c bZi]dYh l i] c djg gZhZVgX] e]VhZ cXajY c\ XdciZmijVa cfj gn! jhZg djgcVah! VcY eVgi X eVidgn YZh \c XdaaV\ c\ hZhh dch# 6YY i dcVaan lZ VXfj gZY ch \]ih [gdb a iZgVijgZ gZk Zlh d[ gZhZVgX] eVeZgh VcY ejWa h]ZY Vgi XaZh! [gdb ciZgk Zlh l i] cjig i dc hih VcY eZghdcVa ]ZVai] bdc idg c\ ZmeZgih! VcY XdbeZi i kZ egdYjXi VcVanhZh#8DCI:MIJ6A CFJ GN?DJGC6A C ; cY c\hH:GK 8: 9:H C;gdb djg ÒcY c\h! i lVh VeeVgZci i]Vi hijYZcih XdjaY WZcZÒi [gdb eVhh kZ c[dgbVi dc Vi eVnbZci ed cih# LZ ]VkZ Xdch YZgZY bVcn dei dch [dg V cZl eVnbZci hnhiZb i]Vi XVc WZ Wj ai dc ide d[ Zm hi c\ iZX]cdad\ Zh VcY c[gVhigjXijgZh# I]Z ZcY gZhjai h 7VaVcXZ EVhh! Vc ZVhn lVn id eVn VcY \Zi VYk XZ dc ]ZVai] Zg dei dch [dg XdaaZ\Z hijYZcih#E6GI 8 E6IDGN 9:H C; cY c\hß ;ddY Xdchjbei dc ]VeeZch Vi di]Zg adXVi dch hjX] Vh dc"XVbejh [ddY kZcYdgh VcY d[["XVbejh gZhiVjgVcih# ß I]Z YZX h dc dc l]ZgZ i]Zn ZVi ValVnh XdbZh WZ[dgZ l]Vi i]Zn ZVi#; cY c\hß 6 bV dg in d[ i]Z g ZVi c\ YZX h dch lZgZ WVhZY dc VkV aVW a in VcY Y hiVcXZ id i]Z ZVi c\ eaVXZ# ß BVcn hijYZcih ]VkZ a iiaZ hZchZ d[ ]dl id hZi VcY \Zi id i]Z \dVa0 hdbZ hijYZcih YZh gZ id add a Z eZg[ZXi XdkZg bdYZah Wji VgZ l i]dji Vcn XajZh VWdji ]dl id VX] ZkZ i#HI6@: DA9:G INEDAD NEGD8:HH ;ADL 6C6ANH HH:GK 8: 6G8 I:8IJG:8ViZ\dg oVi dc d[ \gdjeh VcY cY k YjVah VXXdgY c\ id i]Z g cÓjZcXZh dc i]Z hZgk XZ WZ c\ YZh \cZY8daaZ\Z hijYZci [ddY ejgX]VhZ bdYZaHnhiZb Y V\gVb# I]Z hZgk XZ h c i ViZY Wn hl e c\ i]Z XVbejh 9 XVgY#;DD9 C9JHIGN DK:GCB:CI8DAA: : ;DD9EJG8 6H C BD9:AAdXVaGZhiVjgVcih ;ddY IgjX hHiVcYh gdXZgn HidgZ HjeZgbVg Zi;96 :6AI H:GK 8:H; cVcX Va HZgk XZh 7Vc h8gZY i 8VgY HnhiZb :I JC GN NB8a c Xh dhe iVah dkZgcZbiAVl BV Zgh; C6C8 6A 7JH C:HH E6GIC:GHLdg Zgh 9 VcY ediZci Va[ddY dgYZgDC 9:B6C9 C;DGB6I DC 9:8 9: ID D ID 6 ;DD9 EA68:HijYZci ZVai]HZgk XZh chjgVcXZ8dbeVcn :6AI NE6NB:CIH:GK 8::miZcYZY6bVodc dd\aZ9:8 9: L 6I ;DD9 ID 7JNJC K:GH INE6N ;DG I : ;DD9Hl eZ hZcYh 9 GZ\ hiZg C;DGB6I DC EJH ;ddY HZgk XZ6Yb c higVi dc;VXZ7dd 6 B;g ZcYhJeeZgXaVhhbZc gZZ Dg\h#Cdi hdXadhZ;g ZcYh6XXdjci WVaVcXZdg YZc Va d[ dgYZg:6IJc kZgh in djh c\;Vb anHD8 6A;ddY HZgk XZ8dcigVXidgKZcY c\HZgkZgh7: H6I H; :9KZcY c\ HZgk XZbVX] cZh?VcZ9dZ JcYZg\gVYjViZ HijYZci 9 XVgYGZfjZhi [dg\gVe]h chZgi dc ig \\ZghgZfjZhi [dg \gVe]hJH6 : H8:C6G D7ZXdbZ ]jc\gn9ZX YZ l] X] eaVXZ id \d id9ZX YZ l]Vi [ddY id Wjn8VgY ]daYZg8Vbejhl gZaZhhCjig i dc\gVe]hEVn [dg i]Z [ddY:ViLZ [ZZa i h bedgiVci id cdi dcan YZh \c i]Z hZgk XZ Vi i]Z XdcXZeijVa aZkZa! Wji id Vahd add Vi i]Z hijYZci ZmeZg ZcXZ l i] i]Z hZgk XZ# 6i l] X] ed cih XVc c[dgbVi dc WZ VXXZhhZY4 L]Vi YdZh V YZk XZ add a Z4 dl YdZh V hijYZci ciZgVXi l i] i4 c dgYZg id \gdjcY djg hZgk XZ YZh \c! lZ ]VkZ \ZcZgViZY V jhZg eZghdcV VcY hXZcVg d d[ ]dl i]Z Zci gZ hnhiZb ldg h id\Zi]Zg hZVbaZhhan# iÉh ajcX]i bZ# HVgV] jhi \di dji d[ ]Zg Vgi ] hidgn XaVhh VcY ]Vh '* b cjiZh WZ[dgZ ]Zg cZmi XaVhh# H]Z YZX YZh id \d \gVW ajcX] l i] ]Zg [g ZcYh#H]Z ha eh dji ]Zg 7VaVcXZ EVhh id hZZ i]Z gZXdbbZcYVi dc [dg idYVnÉh fj X Zhi VcY ]ZVai] Zhi bZVah#7ZXVjhZ h]Z YdZhcÉi ]VkZ bjX] i bZ! HVgV] VcY ]Zg [g ZcYh YZX YZ id \d id i]Z XadhZhi hidgZ#L] aZ c i]Z hidgZ h]Z jhZh 7VaVcXZ EVhh id ÒcY ]ZVai]n dei dch#7VaVcXZ EVhh hj\\ZhiZY bZVah l] X] ]VY bdYZgViZ Vbdjcih d[ egdiZ c WZXVjhZ HVgV] ]VhcÉi ]VY bjX] d[ i aViZan# H]Z YZX YZh id ]VkZ V ijg Zn hVcYl X] VcY XZY iZV#H]Z eVnh [dg i]Z bZVa l i] ]Zg XVbejh 9# 7VaVcXZ EVhh jeYViZh ih Y heaVn l]Zc h]Z ejih i]Z 9 WVX ch YZ#I]Z Y heaVnh h]dlh i]Vi ]Zg dkZgVaa cjig i dc WVaVcXZ h hi aa \ddY# H]Z h gZlVgYZY ÒkZ ed cih [dg bV c\ V ]ZVai]n X]d XZ#HVgV] ZVih ]Zg hVcYl X] cdl c\ i]Vi h]Z l aa bZZi ]Zg \dVa d[ adh c\ h m edjcYh Wn i]Z ZcY d[ i]Z hZbZhiZg# CI:G;68: 9:H C7ZXVjhZ i]Z Y heaVn YZk XZ ]Vh id WZ bdW aZ VcY VWaZ id WZ hidgZY c V ejghZ! i]Z X]VaaZc\Z h id YZh \c V h beaZ nZi c[dgbVi kZ k hjVa ciZg[VXZ# LZ lZci dc id YZkZade i]Z c[dgbVi dc VgX] iZXijgZ! l gZ[gVbZh! VcY i]ZbZ Y gZXi dch# I]Z ÒcVa YZh \c h i]Z gZhjai d[ hZkZgVa gdjcYh d[ iZgVi dch VcY iZhi c\#96 AN CJIG I DC K :LL::@AN CJIG I DC IG:C9ß 9 heaVnh YZiV aZY cjig i dc ] hidgn i]gdj\]dji i]Z YVnß 9 heaVnh cjig i dc igZcY VcY WVaVcXZ dkZg V ldg lZZ ß HjbbVg oZh d[ hjgeajhZh VcY YZÒX ihß Ide"g \]i Ydi cY XViZh dkZgVaa cjig i dc WVaVcXZ l]ZgZ \gZn h lZaa"WVaVcXZY VcY gZY h aZhh WVaVcXZY#B:6A 69K HDGß 9 heaVnZY dcXZ hijYZci hZaZXih V bZVa ß BZVa hj\\Zhi dch WVhZY dc XjggZci e]nh XVa adXVi dcß HdgiVWaZ Wn Y hiVcXZ! eg XZ! dg cjig i dc WVaVcXZ

VISUAL DESIGN HACKINGMovie posters from Objectified and True Grit

VISUAL DESIGN HACKING2.LEAVEBREATHING ROOMFOR THE EYE

VISUAL DESIGN HACKING2.LEAVEBREATHING ROOMFOR THE EYE

VISUAL DESIGN HACKINGSlides courtesy of howtwosondesign.blogspot.com

VISUAL DESIGN HACKINGPoster by Dutch graphic designer Wim CrouwelPoster from 2008 JVC Newport Jazz Festival

VISUAL DESIGN HACKING

VISUAL DESIGN HACKINGLorem ipsum dolor sit amet, consecteturadipisicing elit, sed do eiusmod temporincididunt ut labore et dolore magna aliqua. Utenim ad minim veniam, quis nostrud exercitationullamco laboris nisi ut aliquip ex ea commodoconsequat. Duis aute irure dolor in reprehenderitin voluptate velit esse.

VISUAL DESIGN HACKINGLorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmodtempor incididunt ut labore et dolore magna aliqua. Ut enim ad minimveniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex eacommodo consequat. Duis aute irure dolor in reprehenderit in voluptate velitesse.

VISUAL DESIGN HACKINGLorem ipsum dolorsit amet, consecteturadipisicing elit, seddo eiusmod temporincididunt ut laboreet dolore magnaaliqua. Ut enim adminim veniam, quisnostrud exercitationullamco laboris nisiut aliquip ex eacommodoconsequat. Duis auteirure dolor inreprehenderit involuptate velit esse.

VISUAL DESIGN HACKING3.USE DESIGNERFONTS

VISUAL DESIGN HACKINGhttp://bit.ly/designerfonts

VISUAL DESIGN HACKING3.5DO NOT USETHESE FONTSFROM HELL

VISUAL DESIGN HACKINGComic SansCurlzIMPACT

VISUAL DESIGN HACKING4.BE CONSISTENT

VISUAL DESIGN HACKING

VISUAL DESIGN HACKING

VISUAL DESIGN HACKING5.PICK ONLY A FEWCOMPLIMENTARYCOLORS

VISUAL DESIGN HACKING

VISUAL DESIGN HACKINGMore Buck for Your Bang by Jason Mark Jones

VISUAL DESIGN HACKING

VISUAL DESIGN HACKING6.COPY GOODEXAMPLES

VISUAL DESIGN HACKINGIn order to design beautifulthings, you have to surroundyourself with beautiful things.— Dan Boyarski

VISUAL DESIGN HACKING

VISUAL DESIGN HACKINGGif[lZk ZfeZ\gklXc qXk fe@ EAFP 1Visualizing concepts with SketchUp & SolidworksWoodworking, TIG WeldingBicycle building & ridingSettlers of CatanPRODUCT DESIGN INTERNDaedalus Excel Product DevelopmentJanuary 2006 – May 2006My name is Purin Phanichphant. I am currently a graduate student in theJoint Program in Design at Stanford University.Worked on various aspects of medicalequipment design projects, includingproduct form sketching, productmodeling, CAD prototyping, competitiveanalysis, and designing interactive userinterface mock-upsWith a thorough understanding of the design process, ability to sketchand prototype rapidly in various media, and my love for experimentation,I want to leverage playfulness and create the next breakthrough productsand technologies that change human behavior for the better. Ultimately, Iwish to create a world that is happier, healthier, and full of laughter.?\ccf]ifdB PNFE :?LE 9XZ \cfi f] e\ 8ikj:Xie\ \ D\ccfe Le m\ij kp:fek\oklXc jkl[ \j Xe[ lj\i jlim\pjBuilding interactive prototypes with Flash/Actionscript, Processing, and Arduino)'')Æ)'', Gif[lZk ;\j e\iD Zifjf]k F]] Z\(00/Æ)''(DXgg e Xe[ [ X iXdd e VOILA!Low-fidelity prototyping fc[ k \ ]ifek Xe[ YXZb Zfm\ij Xifle[ jf k Xk k \ Zfie\ij d\\k% :i\Xj\ n\cc%%% Mf cX @EK I8:K@FE ; J@ E I)'- .(, ))-( J\Xkkc\# N8 b\pnfeZ7 fkdX c%ZfdFOLD & GLUEUser interface design?fc[ e fe kf \XZ j [\# \ekcp glj k \ \e[j kf \k \i kf ]fid k \ gX \j f] k \ Yffb%CUTLj\i \og\i \eZ\ jkfipYfXi[ e CMU Student Representative, ADSLConference, Belgium, Jan’05JkfipYfXi[ \mXclXk fej2005–06 CMU HCI Student Advisory BoardMember eki\gi\e\lXc @ek\iej g Xk I\XZk m kp# @eZ% 8ljk e #KOJkfipYfXi[\[ \ Ylj e\jj\jjZ\eXi fj Xe[ gififkpg\[ I\XZk m kp n\Yj k\Ëj Zc \ek Xi\X 2003, 2005, and 2006 CMU School of DesignMerit Award@ek\i[ jZ gc eXip[flYc\ dXafi e :fddle ZXk fe ;\j e Xe[?ldXe :fdglk\i @ek\iXZk feG BXggX G # )''(CHI 2006 & 2007 Presenter @E GI@EK 1Interdisciplinary Program in Industrial Designand Human-Computer InteractionGraduated May 2006 with College andUniversity Honors; jZflek ljXY c kp \mXclXk fejUser experience storyboardingEXk m\ jg\Xb\i f] Bfi\XeProduct conceptualization & sketchingID Magazine Student Design Review 06Honorable Mention for CUBOT: Motionbased Building Block SystemLj\i ek\i]XZ\ m jlXc [\j eENJOYMENT2006 IDSA Student Merit Award:lii\ekcp fc[ ?(9 m jXRECOGNITIONOffice Design Group, Microsoft CorporationJune 2005 – August 2005 (intern),August 2006 – August 2007GXg\i# n i\]iXd\# G fkfj fg dfZblgjINTERACTION DESIGNERJoint Program in DesignCandidate in Master of Fine Arts, Class of 2011:f ]fle[\[ Jkl[ f 8)* lgfe iX[lXk feIfcc\i ZfXjk\i j eX \ [\j e \Xie\[1STANFORD UNIVERSITYCollaborated with usability engineers,program managers, developers, productplanners, as well as other designers within thegroup to define front-end user experience forcurrent and future versions of Office client andserver applicationsI\cfZXk fe FB249 Ramona St.Palo Alto, CA 94301 cXj # ?KDC# ; i\Zkfi gifkfkpg\jproduct interaction 4.5640CARNEGIE MELLON UNIVERSITYI\]\i\eZ\j XmX cXYc\PURIN PHANICHPHANTGi\j\ekXk fej Xe[ Zfdg\k k fejHELLO!@%;% DX Xq e\ 8eelXc# ?fefiXYc\ D\ek fe ;\j e :fdg\k k fe# Alip 8jj\jjd\ek8@ 8 G kkjYli J fn# ]\Xkli\[@;J8 [lZXk fe :fe]\i\eZ\# ZXj\ jkl[pfrom:lk Xcfe k \ Z\ek\i c e\% Fg\e k \ gXg\i jf k Xk \ k j\Zk fej Xi\ j fn e % fc[ k \ gX \ fm\i cfe nXpj%Joined a team of young & talented graphic,motion, and environmental designers in ajourney to define, understand, and solve clientproblems. Projects included life-sizedinteractive Christmas tree and snow globe,modular graphic cubes, children’s maze,kinetic sculptures, and many more! eifcc\[ e j\c] [\] e\[ Zflij\j e em ifed\ekXc iXg Z Xe[ XZk m\cp glijl\[ e[ljkip gifa\Zkj# eZcl[ e *i[ \e\iXk fe dfY c\ [\m Z\ZfeZ\gk ]fi JXdjle c\Zkife Zj Xe[ b e\k Z kpgf iXg p :; IFD ]fi ;\j e DXeX \d\ek @ejk klk\Farmgroup Design Studio, BangkokAugust 2008 – May 2009:LK FC;CREATIVE / DESIGNERDljk%% jkXp%%% Zi\Xk m\%%%%M j fe kf Gif[lZk:i\Xk\[ ]lkli jk Z gifkfkpg\ f] ;fZld\ek C ]\ZpZc\ m j feXi\X ]fi F]] Z\ )''Jfc\ L@ Xe[ Zfek\ek [\j e\i]fi M j f )''- Xe[ X e\nF]] Z\ iXg Zj gif[lZkB\p gcXp\i e [\] e e gif[lZk jZfg\# [\m\cfgd\ek gcXe# Xe[ dX ekX e e LO hlXc kp f] k \ e\n gif[lZkAf ekcp Zi\Xk\[ X [\j e gifZ\jj n k X ljXY c kp\e e\\i# Xe[gi\j\ek\[ k \ [\j e gifZ\jj Xj X 9\jk GiXZk Z\j ZXj\Xk D Zifjf]kËj ZfdgXepn [\ LO ;Xp

VISUAL DESIGN HACKINGhttp://www.logolounge.com/article.asp?aid lnPf#.Ufm3JBZ15SY

VISUAL DESIGN HACKING

VISUAL DESIGN p://pinterest.com/ash/design-pr0n

VISUAL DESIGN -design/

VISUAL DESIGN HACKING7.USE KEYNOTE

VISUAL DESIGN HACKING2 minutes

VISUAL DESIGN HACKING

VISUAL DESIGN HACKING

VISUAL DESIGN HACKINGPURPLEPARTYKARAOKE / DRINKS / DANCING / MOREPD LOFT / BUILDING 610SATURDAY MAY 7TH / 9PM ONWARDS

VISUAL DESIGN HACKING

VISUAL DESIGN HACKINGKEYNOTEDEMO

DEMO 1: DRAG IMAGES TO CROPCats are similar in anatomy to the other felids,with strong, flexible bodies, quick reflexes,sharp retractable claws, and teeth adapted tokilling small prey. Cat senses fit a crepuscularand predatory ecological niche. Cats can hearsounds too faint or too high in frequency forhuman ears, such as those made by mice andother small animals.Cats have a rapid breeding rate. Undercontrolled breeding, they can be bred andshown as registered pedigree pets, a hobbyknown as cat fancy. Failure to control thebreeding of pet cats by neutering, and theabandonment of former household pets, hasresulted in large numbers of feral catsworldwide, requiring population control.[8]Since cats were cult animals in ancient Egypt,they were commonly believed to have beendomesticated there,[9] but there may have beeninstances of domestication as early as theNeolithic from around 9500 years ago (7500BC).[10]

DEMO 3: PASTE TEXT TO EXISTING FORMATSHIFTOPTIONCOMMANDVThe domestic cat[1][2] (Latin: Felis catus) or the feral cat[2][4] (Latin: Felis silvestriscatus) is a small, typically furry, carnivorous mammal. They are often called housecats when kept as indoor pets or simply cats when there is no need to distinguishthem from other felids and felines.[6] Cats are often valued by humans forcompanionship and for their ability to hunt vermin. There are more than 70 catbreeds; different associations proclaim different numbers according to theirstandards.Cats have a high breeding rate. Under controlled breeding, they can be bred andshown as registered pedigree pets, a hobby known as cat fancy. Failure to control thebreeding of pet cats by neutering and the abandonment of former household pets hasresulted in large numbers of feral cats worldwide, requiring population control.[8]This has contributed, along with habitat destruction and other factors, to theextinction of many bird species. Cats have been known to extirpate a bird specieswithin specific regions and may have contributed to the extinction of isolated islandpopulations.[9] Cats are thought to be primarily, though not solely, responsible forthe extinction of 33 species of birds, and the presence of feral and free ranging catsmakes some locations unsuitable for attempted species reintroduction in otherwisesuitable locations.[10]

DEMO 3: PICTURE FRAME MULTITOUCH ZOOM & ROTATE

DEMO 4: COPY TO PHOTOSHOP & ILLUSTRATORYOUAREHERE

DEMO 5: OPTION-DRAG TO DUPLICATE DISTRIBUTE

DEMO 5: OPTION-DRAG TO DUPLICATE DISTRIBUTE

DEMO 6: EXPORT TO PDF

THINK-ALOUD DEMO: REDESIGN A POSTER

CANTOR AFTER HOURSA MINI-PARTY ON THE EDGE AT THECANTOR ARTS CENTER.THURSDAY FEBRUARY 23, 2012 7-10PMFeaturing live performances byAndi Harrington,David Rockwood,Bent Spoon Dance Company,Stephen Henderson & Tyler Brooks,Ram's Head Theatrical Society,Leilan Fusion Belly Dance,Pat Kennedy & Susannah Poland,Stanford Spoken Word Collective,Ry-Man,Stanford Bhangra,MAA,Krimzon,Gabriela Farfan,and student art bythe 2011 Arts Grantrecipients & the [your arthere] program.Event is free & open to allStanford students. Pleasebring your SUID.If your parents are coming infor Parents' Weekend, feelfree to bring them along!Refreshments from CoupaCafe will be served.Sponsored by the Cantor ArtsCenter, Student Arts GrantCreativity Fund Board, andSOCA,the Student OrganizingCommittee for the Arts.

VISUAL DESIGN HACKINGVISUAL DESIGN IS ANEXTREMELY VALUABLE SKILL.IT GOES A LONG WAY.

VISUAL DESIGN HACKINGVISUAL DESIGNIS 1% GIFT,99% LEARNABLE SKILL.

VISUAL DESIGN HACKINGTHERE ARE SHORTCUTS AND TRICKSTO GREAT VISUAL DESIGN.1. Line things upSPECIFICALLY: 2. Leave breathing room for the eye3.4.5.6.7.Use designer fontsBe consistentPick only a few colorsCopy good examplesUse Keynote

STORYTELLING WORKSHOPTHANKS!

CANTORAFTERHOURSA MINI-PARTY ON THE EDGE ATTHE CANTOR ARTS CENTER.THURSDAY FEBRUARY 23, 2012 7-10PMFeaturing live performances byAndi Harrington,David Rockwood,Bent Spoon Dance Company,Stephen Henderson & Tyler Brooks,Ram's Head Theatrical Society,Leilan Fusion Belly Dance,Pat Kennedy & Susannah Poland,Stanford Spoken Word Collective,Ry-Man,Stanford Bhangra,MAA,Krimzon,Gabriela Farfan,and student art bythe 2011 Arts Grant recipients & the [your art here]program.Event is free & open to all Stanford students.Please bring your SUID.If your parents are coming in for Parents'Weekend, feel free to bring them along!Refreshments from Coupa Cafe will be served.Sponsored by the Cantor Arts Center, StudentArts Grant Creativity Fund Board, and SOCA,the Student Organizing Committee for the Arts.

CANTORAFTERHOURSA MINI-PARTY ON THEEDGE AT THE CANTORARTS CENTER.THURSDAY FEBRUARY 23,2012 7-10PMFeaturing live performances byAndi Harrington,David Rockwood,Bent Spoon Dance Company,Stephen Henderson & Tyler Brooks,Ram's Head Theatrical Society,Leilan Fusion Belly Dance,Pat Kennedy & Susannah Poland,Stanford Spoken Word Collective,Ry-Man,Stanford Bhangra,MAA,Krimzon,Gabriela Farfan,

Feb 23, 2012 · STORYTELLING WORKSHOP. VISUAL DESIGN HACKING One Goal: To equip you with simple and actionable techniques to kick ass at visual design. VISUAL DESIGN HACKING VISUAL DESIGN IS AN EXTREMELY VALUABLE SKILL. IT GOES A LONG WAY. VISUAL DESIGN HACKING

Related Documents:

Hacking Concepts 1.10 What is Hacking? 1.11Who is a Hacker? 1.12 Hacker Classes 1.13 Hacking Phases o Reconnaissance o Scanning o Gaining Access o Maintaining Access o Clearing Tracks Ethical Hacking Concepts 1.14 What is Ethical Hacking? 1.15 Why Ethical Hacking is Necessary 1.16 Scope and Limitations of Ethical Hacking

Part 2. Experimental Methods 1See: Visual Hacking Experimental Study, conducted by Ponemon Institute and sponsored by 3M, February 2015. The 2016 study at a glance Visual hacking is a global problem. Visual hacking occurred in all countries and 91 percent of 157 visual hacking attempts (trials) were successful.

in discussing visual storytelling as a marketing approach for creating effective ads & the demonstration of advertising samples using visual storytelling as a strategy. Key words: Visual Storytelling, Communication, Marketing, Advertising, Media. *Corresponding Author: Doa

Chapter 7 Passwords In This Chapter Identifying password vulnerabilities Examining password-hacking tools and techniques Hacking operating system passwords Hacking password-protected files Protecting your systems from password hacking P assword hacking is one of the easiest and most common ways attack-ers obtain unauthorized network, computer, or application access.

Hacking The Wild: Desert Island Castaway Survival Series Marathon Hacking The Wild: Escape from Death Valley Hacking The Wild: Deadly Glacier Hacking The Wild: Alaskan Ice Forest Hacking The Wild: Black Bayou, The Hacking The Wild: Desert Island Castaway

Chapter 7 Passwords In This Chapter Identifying password vulnerabilities Examining password-hacking tools and techniques Hacking operating system passwords Hacking password-protected files Protecting your systems from password hacking P assword hacking is one of the easiest and most common ways attack-ers obtain unauthorized network, computer, or application access.

private sectors is ethical hacking. Hacking and Ethical Hacking Ethical hacking can be conceptualized through three disciplinary perspectives: ethical, technical, and management. First, from a broad sociocultural perspective, ethical hacking can be understood on ethical terms, by the intentions of hackers. In a broad brush, ethical

published by the American Petroleum Institute (API, 1984, 1991) are generally not consistent with the physical processes that dictate actual pile capacity. For example, the experimental observa- tion of a gradual reduction in the rate of increase of pile capacity with embedment depth is allowed for by imposing limiting values of end-bearing and shaft friction beyond some critical depth .