{"id":112,"date":"2018-07-10T16:01:51","date_gmt":"2018-07-10T16:01:51","guid":{"rendered":"http:\/\/localhost\/book\/?p=112"},"modified":"2018-07-26T11:50:18","modified_gmt":"2018-07-26T11:50:18","slug":"eum-laoreet-blandit-2","status":"publish","type":"post","link":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/eum-laoreet-blandit-2\/","title":{"rendered":"How to Design User-Friendly Dashboards, 2018, Las Vegas Nevada, USA"},"content":{"rendered":"<p>With a growing need for mass data visualization, most business and consumer applications display a dashboard page that includes an overview of the system status and content. Are all these dashboards effective? What are the basic principles behind designing effective and intuitive dashboards? This introductory\/intermediate course in dashboard design will provide an overview of the fundamentals for designing and evaluating effective dashboards. Participants will then evaluate several dashboards and practice building an effective dashboard.<\/p>\n<p><strong>HCII 2018, Monday, 16 July 2018, 08:30 \u2013 12:30 Caesars Palace, Los Vegas , Nevada, USA<\/strong><\/p>\n<p><a href=\"https:\/\/cms.hci.international\/index.php?module=users&amp;norm_user_op=signup\">Click to Register for Tutorials<\/a><\/p>\n<p><strong>AHFEI 2018, Sunday, July 22, 2018 -08:00- 12:00 The Loews Sapphire Falls Resort, Orlando, Florida, USA\u00a0<\/strong><\/p>\n<p><a href=\"http:\/\/ahfe.net\/tutorial-registration.html\">Click to Register for Tutorials<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With a growing need for mass data visualization, most business and consumer applications display a dashboard page that includes an overview of the system status and content. Are all these dashboards effective? What are the basic principles behind designing effective and intuitive dashboards? This introductory\/intermediate course in dashboard design will<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":231,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-112","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-upcoming-workshop"],"acf":[],"_links":{"self":[{"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/posts\/112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/comments?post=112"}],"version-history":[{"count":8,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/posts\/112\/revisions"}],"predecessor-version":[{"id":242,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/posts\/112\/revisions\/242"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/media\/231"}],"wp:attachment":[{"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/media?parent=112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/categories?post=112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/tags?post=112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}