5 Tips for Typography Best Practices

This was my first year at Typographics 2018. Typographics 2018 is a conference for typography enthusiasts around the world, that’s held at Cooper Union. There were panelists from San Francisco, Berlin, Buenos Aires, and Japan; it really felt like a truly international experience.

I had the chance to sit in on both the conference and TypeLab parts of Typographics. Here are a few highlights from the panels/breakout sessions that I really enjoyed:

1. Emojis = Pictures + Character (Jennifer Daniel, Google Emoji)
Emojis are images that may translate into different meanings across different devices. Jennifer gave an example about how the “dumpling” emoji looks different across different chat platforms -every culture has a dumpling!
I found an interesting tension in this statement -emojis should have a consistent user experience (across platforms), yet still be personalized to their users.

2. Ubiquitous type is can cause user confusion (Mr. Keedy)
Mr. Keedy created Keedy Sans, a popular font in the 90’s. The font was considered “uncool” 10 years later and used everywhere. Keedy sans is used on teenage girl makeup packaging, as well as winebars. This could create a bad user experience for people because of lack of branding. Last year, Mr. Keedy refreshed his font -to create greater customization and allow Keedy fans to layer the font for interesting visual effects.

3. Braille is a form of typography (Ellen Lupton, Cooper Hewitt)
Ellen talked about how blind individuals read Braille in a unique way -holding it across their body. She also demonstrated a blind person’s experience watching music videos by showing the accessibility voiceover.

4. Brand holds content together with design (Gale Bichler, NYTimes)
Gale foused on how the New York Times(NYT) has branded itself as a publication that experiments with many types of fonts. NYT can play around with different types and massive fonts as illustration. If someone picks up a page from the floor, they can usually tell that it’s from the New York Times because of branding.

5. Picking fonts is like eating ice cream. (Veronika Burian and Jose Scaglione, Type Together)
When combining fonts, look at mechanic and organic feels. Veronika and Jose talked about how people like humanist fonts, with a hint of a calligrapher’s hand. Ideally, you should find a balance typefaces share a common language.

The overarching theme is that typography is wide-ranging and crosses various mediums. Visual languages include symbols, braille, and audio caption. The challenge now lies in how to design the best experiences for these new forms of language.

Where to Buy Shiitake Logs at the Best Price

The mushrooms grow on logs and these logs can be prepared by you. The Shiitake mushroom is easy to grow by anyone as it does not need soil of different layers and nutrition. They grow on logs. You may plan to grow a huge quantity of Shiitake fruits and for this – it is better to buy the logs. You will need logs with 4″ diameter and the log should have its bark intact. The woods that are preferred are oak, poplar, alder and maple variety. The hardwoods are to be avoided. The conifers like fir or cedar are also of no use for you. When you have a 4 feet long log, it will be better to handle and you can put 10 to 12 plugs in it.

Online stores

There are different online sites where you can buy these Shiitake Logs to grow your fruits on them. You will have to find out the way these logs are used for using them for growing the fruits. These fruits are grown widely and are second to the most common button mushrooms. You can use the Shiitake Mushroom Logs for these fruits so that you can raise certified and organic sprouts. These can be used to create a commercial operation if you have some space for the hardwood logs and shady place to keep these logs for a good production. You just need to get a reference from any friends who grow these mushrooms and go to the site to buy the logs for sale.

Stores with guidance and instructions

These stores will have logs containing a substrate that are inoculated with spawn for proper growth. These stores often will have mycelium for colonizing the substrate. The mycelium will be kept in some bags and used until the substrate is completely colonized. The store will ship you the Mushroom logs for sale so that you can harvest your crop within 10 – 12 days. You can grow the fresh fruits and sell to the proper outlets. Often the online stores will give you instructions to grow the fruits and save time for your crop harvest. The logs are of high yield and stable quality. They will also have a high conversion rate.

Farms with mushroom logs

There are farms that will have Oaks, hornbeams, sweet gum and ironwood for mushroom cultivating base. These farms will sell you the hardwood tree logs and you can start cultivating the fruits on them. The trees are cut after the leaves have turned brown and sap migrate downwards to work as antifreeze. These farms often take the logs from firewood suppliers or farmers too. They stack the logs in their storehouse in the proper shade. Loosely kept logs are handled with care and are mostly kept covered with cloth.

Prepare a Shiitake log

You can start preparing a log for growing the mushrooms on them. These logs must be hardwood and they are to be inserted with plugs. These plugs will have the mycelium growing there. The logs are bored with holes so that the mycelium starts colonizing. They will soon grow into Shiitake sprouts for you to take off and sell. You need to drill in the logs for the plugs and then rubber mallet the plugs. Use beeswax for sealing the plugs. Store the log in a shady place until it is ready for cultivation.

How To Lead A More Effective Team By Disagreeing

It’s great when people agree with you, isn’t it? It’s a wonderful validation – of your thoughts, your ideas… of you. It makes you feel all warm and fuzzy inside. Yes, it’s great when people agree with you.

Except it doesn’t move the needle. Especially when the agreement comes too early.

There’s a great scene in the old TV series The West Wing. Leo McGarry is the Chief of Staff to liberal Democratic president Jed Bartlet. In this scene, Leo is offering a job to wickedly smart conservative Republican Ainsley Hayes. Ainsley is confused as to why a liberal president would want a conservative Republican working in the White House. Leo then says a line that I think should be committed to memory by every leader at every level:

“The president likes smart people who disagree with him.”

If you’re a leader, substitute your name for “the president” (unless you happen to be the president, in which case you should probably still substitute your name, because referring to yourself by your title is stupid and pretentious). Let’s just make it simple. Here’s the new sentence:

“I like smart people who disagree with me.”

I want you to make that one of your primary leadership mantras. “I like smart people who disagree with me.”

If you want to build your muscles, you do resistance training. The resistance can be in the form of weights, elastic bands, or your own body (for example, when doing pushups and pull-ups). Resistance makes muscles stronger.

Even the best ideas benefit from resistance. This resistance comes in the form of pushback by a smart person. Even if the smart person is just playing devil’s advocate, the challenge serves a purpose. When an idea is challenged, one of three things will happen:

The idea will be reinforced.
The idea will be reevaluated.
The idea will be abandoned.

Any of these three is preferable to the idea being blindly accepted by a team that’s either too intimidated to question, or too disengaged to care.

When an idea is challenged, it is examined. This examination will find one of three things about the idea, which correspond to the list above:

The idea is sound.
The idea is flawed but can be improved/fixed.
The idea is flawed, and cannot be improved. (Even in this case, though, the “bad” idea could be the spark that leads to the “good” idea.)
Agreement is a good thing, but not when it’s automatic; not when it’s a rubber stamp.
Agreement is a good thing when it comes at the end of smart debate. Agreement is a good thing when it rises out of disagreement.

‘Official’ Blockchain Standards for 2019

The succinct statement details the government’s pending official definitions of blockchain regulations. Publicly advertised rationales may appear comparatively innocuous or indeed prudent yet such official justifications are an obvious attempt at the curtailing rather than development of decentralized technologies. Even rudimentary, preliminary investigation of the statements highlight what may generously be labelled as contentious logic.

“China is set to publish official standards on blockchain technology next year, with one official telling Xinhua they will “give the industry some guidance” on the technology.

Li Ming, a director of the Blockchain Research Office under the Ministry of Industry and Information Technology (MIIT), told Xinhua’s Economic Information Daily that work had already begun on forming the standards. Li, however, made clear that while standards would provide some guidance to blockchain developers, authorities did not expect official guidelines to “quickly advance the development” of the industry. Despite efforts to clamp down on the financial risks associated with cryptocurrencies and initial coin offerings, the Chinese government has looked to show its support for blockchain development. China was the world’s biggest source of blockchain patents in 2017, while last September saw a blockchain research center opened by the China Academy of Information and Communications Technology, a research institution under the MIIT.

The new standards being drawn up by the Blockchain Research Office will include guidelines for the application of blockchain in terms of business, information security and reliability, Li told Xinhua. Despite the exciting potential surrounding blockchain, the technology remains in a stage of infancy. Without clear regulations in place, security problems have caused nearly 2.9 billion US dollars’ worth of losses worldwide between 2011 and 2018, according to Baimaohui Security Research Center, a specialist in online security that has worked with Alibaba and Huawei.

The last two years alone have seen 1.9 billion US dollars lost because of blockchain security issues, according to Baimaohui. Not only are China’s leading tech firms and banks applying for blockchain patents and researching how the technology can improve services and boost public trust in supply chains, China’s Ministry of Public Security is also studying how to implement the technology in terms of data storage. Earlier this week, data from China’s Intellectual Property Office showed that a patent application had been filed by the Ministry of Public Security for a blockchain system that would securely and transparently save unalterable data to the cloud. Such a system could be used and shared by police across the country, allowing data to be shared rapidly between various agencies. ( CGTN )”

To begin let’s not forget the differentiation of decentralized capacities versus centralized services. A regionally authorized service naturally adheres to geographically specific governing legislation. For example an international fast food chain may, in some European countries, sell alcoholic beverages over the counter while the same operator is typically not permitted to do so in North America. This variation is possible because of service use being localized. To have ‘official’ guidelines of decentralized capabilities would be to imagine access and or use of decentralized services being regional, or under the same legislation. It may not. It is decentralized.

Secondly it has been calculated by the American Government Accountability Office ( GAO ), that the 2008 financial crises cost $12.8 trillion dollars. This further omits subsequent bailouts, unemployment and broad reaching detrimental consequences suffered by millions.

The causes of the 2008 financial crises have been largely attributed to deregulation, securitization (double dipping and bundling), sales of subprime mortgages and the Federal Reserve’s raising rates on subprime borrowers. In short, actions conducted by government, banking and financial industries.

By contrast for one set of activities to lose under $3 billion over seven years is minuscule. Regardless of political stance, decentralized technologies offer the capacity for individual’s independently enacting personal choice. Personal loss resulting from bad decision making, such as ICO investment, is contained. Moreover it is a conscious participation where any individual may only invest or access a set amount, that which is in their immediate control. Compare this ceiling to unilateral extents achievable by governments and corporations.

To incorporate decentralized technology into one regional government’s operational guidelines may prove nothing more than redundant methods of double accounting. Used by individuals whom may collectively be under no single government’s purview, concurrently decentralized technological capacity must itself be equally discovered.

How Prepared Is Your Board for Cyberspace?

While cyber security is an important issue for boards, it has not always been top of mind. Because a major corporation like Equifax had a breach in its IT system, many companies are rethinking how to secure cyber security.

Boards around the world are examining the Equifax case to determine how to best secure their organizations valuable information stored in their IT systems. So who is responsible? Since the CEO has stepped down, it is apparent he was being held accountable. However, where was the board of directors?

In today’s world of cyberspace, corporate boards have to think about more than governance, CEO compensation and strategy.

As it stands, it is in the board’s best interest to ensure the company is not exposed to debilitating risks. Companies have workplace safety standards and sexual harassment policies to mitigate lawsuits. They even have disaster recovery plans in the event of natural disasters or occurrences like the World Trade Center plane crash. These plans and policies are in place to keep business running smoothly and perpetually. It protects customers and employees.

However, with sophisticated computer hackers around the world, it is no news that computer systems and valuable information can be breached and stolen. There are hackers who breach computer systems as a business. They ask for ransom in the amount of tens of millions of dollars. If it is not paid, they threaten to release the companies secure information, which sometimes could contain private email communication from top executives.

While many enterprises as large as Equifax may have disaster recovery plans for their physical operation, they may not have the same plan for cyber breach. The disaster recovery policies would include immediate action steps based on size of the breach, who made the breach, what information was taken, were company smart phones breached, what to communicate to employees, the public and shareholders as well as other important factors.

In some cases, it may make sense to inform the FBI. In other cases, it may be better to pay the ransom. The challenge with calling the FBI is that the hackers could be in countries like Russia. In Russia, the FBI may not pursue them. Why? Because the Russian government is always looking for good hackers. If the FBI exposes the hackers in Russia, the government may hire them, which can present long-term problems for the US. When it comes to paying ransom, it’s tricky. If you pay, they may hack you again as though you are an ATM machine. If you don’t pay, they may expose confidential information. These are also the kinds of challenges that directly involve the board.

What’s most important is that the board is talking about cyber security before there is a problem. There should be constant audits of the cyber security system to mitigate any risks. In addition, as a board, they should hold the CEO accountable for that security. Furthermore, there should be clear policies to guide the board and the executive team on how to handle the various moving parts in a delicate situation. Boards with disaster recovery plans and high accountability with the CEO are more likely to be forward thinking about cyber vulnerabilities and proactive about updating the security system.