User Analysis

There are two main characteristics of our user population:

  1. They access the Internet using a smart phone and/or computer.
  2. They are interested in staying up-to-date using information streams with more content than they are willing/able to read.

We noticed several people who do not consider themselves part of the group described by #2 because they don’t feel overwhelmed. They keep things under control by vigorously unsubscribing and unfollowing---or, viewed another way, undersubscribing and underfollowing. We think that they might still benefit from a system that allowed them to review more data with the same amount of effort.

Task Analysis

We consider 6 high-level tasks related to our problem. Three compose the central experience: reading, filtering, and configuring the display. The other three are required for our interface to be used with third-party services: identifying themselves to our service, initial setup, and managing connections to third-party information sources.

Reading

Besides viewing the content, users also need to be able to organize the content (such as with tags or a directory structure), and control the lifetime of the content (marking items as read, marking as “read later,” etc).

Filtering

Users will often be interested in only a subset of information (written by a specific person or persons, or covering a certain topic)* Why is the task being done? The user wants to restrict the given information to that subset.

Configuring the Display

We anticipate that one interface will not fit all, so we will need controls for display settings like changing the font face and size. This will be more important in the phone interface than on the desktop, where browsers expose convenient settings for the font size.

Initial Setup

Users will need to be able to specify what information they want to manage using our interface, preferably as quickly and easily as their existing techniques.

Identity Creation and Authentication

To store user information remotely, we need users to create an identity for our application and provide authentication information to identify themselves in the future.

Managing 3rd-Party Connections

After setup is complete and the app is being used, there are still actions that the user may want to take regarding our connections to the third-party services, such as remove them, pause their use (temporarily stop reading items from them), and configure how often updates are pulled.