SlideShare a Scribd company logo
1 of 39
1. Framing
2. Why Artists Steal
3. Welcome to the Family
Goals:
1. Better Understand Design
2. Encourage active collaboration
3. Further discussion on standards in structured
borrowing
Context
a.Historical Context
b.Definition of terms
c.Comparing communal standards
d.Role of an Artist
Jobs vs. Gates
• Influence pervades
• “Fair Game” has
many meanings
Problem:
While development can be deemed open and thus
benefit from a diverse community of contributors,
design has always inherently been open in nature.
Questions:
1. Is borrowing permissable?
2. How can we borrow, but still innovate?
3. What should our attitude be toward those who
borrow from us?
4. When does borrowing become theft?
Design verses Development
Development
- Needs collaboration
- Values efficiency
- Behind the scenes:
self-value ethic
Design
- Seeks independence
- Values originality
- Center stage: judged
by all
Designer Responsibility
• Continuation of storytelling
legacy
• Derive elegant solutions to
real problems
Design is directed toward human beings. To
design is to solve human problems by
identifying them and executing the best
solution.
Ivan Chermayeff
To design is to communicate clearly by
whatever means you can control or master.
Milton Glaser
Artist’s Tools
- Perspective
- Awareness
- Empathy
The latest incarnation of Oedipus, the
continued romance of Beauty and the Beast,
stand this afternoon on the corner of 42nd
Street and Fifth Avenue, waiting for the
traffic light to change.
Joseph Campbell
The Hero With a Thousand Faces
Why Artists Steal
a.UX Benefits
b.Efficiency and expediency
c.Setting the bar
Why do artists steal
- Familarity
- Memory Mapping
- Conventionality
- Cameron Moll on
foundations
- Efficiency
- Artists as curators
Benefits of Familiarity
• Two systems of decision making
• Concious vs. Unconcious
• Our culture functions primarily on instant impressions
Daniel Kahneman
Nobel Prize-winning researcher
• Design decisions fail when they do not
leverage their predecessors
Dr. A.K. Pradeep, study of GAP failed logo launch
“Designers are often reluctant to take advantage of them
(conventions). Faced with the prospect of using a convention,
there’s a great temptation for designers to reinvent the wheel
instead, largely because they feel (not incorrectly) that they’ve
been hired to do something new and different, and not the
same old thing. (Not to mention the fact that praise from
peers, awards, and high-profile job offers are rarely based on
criteria like “best use of conventions.)”
Steve Krug, Don’t Make Me Think!
There are more than a billion pages on the web - for
your inspiration
Seth Godin
Great Design Ships
• We are not always the gatekeepers
• Stand on the shoulders of giants
Nina Paley
Iterations on accepted and familiar patterns
have a better chance of making it to market
and of being accepted
Types of theft
• Not all theft is conscious
• Theft differs from
appropriation, iteration,
and improvement
• Fork designs, push changes back
to help others
Ethical Theft
- Steal inspiration instead of outcome
- Reverse engineer final products
- Always cite, Always give back
- Make designs available to others, give credit
One of the surest of tests is the way in which a poet
borrows. Immature poets imitate; mature poets steal; bad
poets deface what they take, and good poets make it into
something better, or at least something different.
TS Elliot
Goals and Best Practices
- Curate intentionally
- Work within community
- Continue to innovate
- Great design sets the bar higher
- Look outside your comfort zone
Where to steal from
- “if you’re designing for the web, why look at loads
of design portals that show loads of web sites that
essentially all look the same? […] Surely they offer
too narrow a view to be really inspirational.”
Brendon Dawes, Analog In, Digital Out
Protection from Theft
- Notriety protects from plagiarism
- Edison and the patent clerks
- Use tools, know your rights
- Read copyright laws http://www.sitepoint.com/the-web-designers-copyright-crash-course/
- Always have a contract
- Document everything
Summation:
- Theft Happens:
- It’s at times involuntary
- It comes in many varities
- It’s part of designing
- Steal Better
- Follow ethics, follow laws, copy inspiration
- Stealing is good
- Stolen products often work better
Joseph Gagliardi
@jsphgag
jgagliar@westga.edu

More Related Content

What's hot

Hacker, Maker, Teacher, Thief: Which one are you?
Hacker, Maker, Teacher, Thief: Which one are you?Hacker, Maker, Teacher, Thief: Which one are you?
Hacker, Maker, Teacher, Thief: Which one are you?Daniele Fiandaca
 
Where Do Good Ideas Come From. Lucy Gower.2012 Final
Where Do Good Ideas Come From. Lucy Gower.2012 FinalWhere Do Good Ideas Come From. Lucy Gower.2012 Final
Where Do Good Ideas Come From. Lucy Gower.2012 FinalLucidity
 
Choosing The Best Ideas
Choosing The Best IdeasChoosing The Best Ideas
Choosing The Best IdeasOuadie Abbas
 
Summary book 'Convivial toolbox'
Summary book 'Convivial toolbox' Summary book 'Convivial toolbox'
Summary book 'Convivial toolbox' lcoorevits
 
Hacker Maker Teacher Thief; Which one are you?
Hacker Maker Teacher Thief; Which one are you?Hacker Maker Teacher Thief; Which one are you?
Hacker Maker Teacher Thief; Which one are you?Daniele Fiandaca
 
Design Principles: The Philosophy of UX
Design Principles: The Philosophy of UXDesign Principles: The Philosophy of UX
Design Principles: The Philosophy of UXWhitney Hess
 
APWA PWX Innovations - How Did They Do That?
APWA PWX Innovations - How Did They Do That?APWA PWX Innovations - How Did They Do That?
APWA PWX Innovations - How Did They Do That?Jim Proce
 
Tom Peters at Miller Agency, Hamden, CT
Tom Peters at Miller Agency, Hamden, CT Tom Peters at Miller Agency, Hamden, CT
Tom Peters at Miller Agency, Hamden, CT bizgurus
 
Tom Peters The Future of Talent Conference - Long
Tom Peters The Future of Talent Conference - LongTom Peters The Future of Talent Conference - Long
Tom Peters The Future of Talent Conference - Longbizgurus
 
Tom Peters at Property Loss Research Bureau, Orlando
Tom Peters at Property Loss Research Bureau, OrlandoTom Peters at Property Loss Research Bureau, Orlando
Tom Peters at Property Loss Research Bureau, Orlandobizgurus
 
Tom Peters at Quinnipiac & Miller Agency (Long)
Tom Peters at Quinnipiac & Miller Agency (Long)Tom Peters at Quinnipiac & Miller Agency (Long)
Tom Peters at Quinnipiac & Miller Agency (Long)bizgurus
 
How do we design designers
How do we design designersHow do we design designers
How do we design designersLauren Currie
 
The journey of a solopreneur
The journey of a solopreneurThe journey of a solopreneur
The journey of a solopreneurAhmed Genedy
 
Tom Peters at International Institute for Research in Lisbon
Tom Peters at International Institute for Research in LisbonTom Peters at International Institute for Research in Lisbon
Tom Peters at International Institute for Research in Lisbonbizgurus
 

What's hot (15)

18 Design Quotes to Inspire Creativity
18 Design Quotes to Inspire Creativity18 Design Quotes to Inspire Creativity
18 Design Quotes to Inspire Creativity
 
Hacker, Maker, Teacher, Thief: Which one are you?
Hacker, Maker, Teacher, Thief: Which one are you?Hacker, Maker, Teacher, Thief: Which one are you?
Hacker, Maker, Teacher, Thief: Which one are you?
 
Where Do Good Ideas Come From. Lucy Gower.2012 Final
Where Do Good Ideas Come From. Lucy Gower.2012 FinalWhere Do Good Ideas Come From. Lucy Gower.2012 Final
Where Do Good Ideas Come From. Lucy Gower.2012 Final
 
Choosing The Best Ideas
Choosing The Best IdeasChoosing The Best Ideas
Choosing The Best Ideas
 
Summary book 'Convivial toolbox'
Summary book 'Convivial toolbox' Summary book 'Convivial toolbox'
Summary book 'Convivial toolbox'
 
Hacker Maker Teacher Thief; Which one are you?
Hacker Maker Teacher Thief; Which one are you?Hacker Maker Teacher Thief; Which one are you?
Hacker Maker Teacher Thief; Which one are you?
 
Design Principles: The Philosophy of UX
Design Principles: The Philosophy of UXDesign Principles: The Philosophy of UX
Design Principles: The Philosophy of UX
 
APWA PWX Innovations - How Did They Do That?
APWA PWX Innovations - How Did They Do That?APWA PWX Innovations - How Did They Do That?
APWA PWX Innovations - How Did They Do That?
 
Tom Peters at Miller Agency, Hamden, CT
Tom Peters at Miller Agency, Hamden, CT Tom Peters at Miller Agency, Hamden, CT
Tom Peters at Miller Agency, Hamden, CT
 
Tom Peters The Future of Talent Conference - Long
Tom Peters The Future of Talent Conference - LongTom Peters The Future of Talent Conference - Long
Tom Peters The Future of Talent Conference - Long
 
Tom Peters at Property Loss Research Bureau, Orlando
Tom Peters at Property Loss Research Bureau, OrlandoTom Peters at Property Loss Research Bureau, Orlando
Tom Peters at Property Loss Research Bureau, Orlando
 
Tom Peters at Quinnipiac & Miller Agency (Long)
Tom Peters at Quinnipiac & Miller Agency (Long)Tom Peters at Quinnipiac & Miller Agency (Long)
Tom Peters at Quinnipiac & Miller Agency (Long)
 
How do we design designers
How do we design designersHow do we design designers
How do we design designers
 
The journey of a solopreneur
The journey of a solopreneurThe journey of a solopreneur
The journey of a solopreneur
 
Tom Peters at International Institute for Research in Lisbon
Tom Peters at International Institute for Research in LisbonTom Peters at International Institute for Research in Lisbon
Tom Peters at International Institute for Research in Lisbon
 

Similar to Great Artists (Designers) Steal

Artist Create Value
Artist Create ValueArtist Create Value
Artist Create ValueChris Finlay
 
Design Thinking: A Common Sense Process
Design Thinking: A Common Sense ProcessDesign Thinking: A Common Sense Process
Design Thinking: A Common Sense ProcessMichael Zarro, Ph.D.
 
Week-7: Value Proposition & Design Thinking
Week-7: Value Proposition & Design ThinkingWeek-7: Value Proposition & Design Thinking
Week-7: Value Proposition & Design ThinkingOracle
 
Creativity and Design Thinking 2012 SM MD
Creativity and Design Thinking 2012 SM MDCreativity and Design Thinking 2012 SM MD
Creativity and Design Thinking 2012 SM MDMichael Tizio
 
EST 200, Design Thinking
EST 200, Design ThinkingEST 200, Design Thinking
EST 200, Design ThinkingCKSunith1
 
Design thinking yuechi li
Design thinking yuechi liDesign thinking yuechi li
Design thinking yuechi liVijay Prabhakar
 
Design Thinking for Startups - Are You Design Driven?
Design Thinking for Startups - Are You Design Driven?Design Thinking for Startups - Are You Design Driven?
Design Thinking for Startups - Are You Design Driven?Amir Khella
 
Innovation needs waste - XP Days Germany 2011
Innovation needs waste - XP Days Germany 2011Innovation needs waste - XP Days Germany 2011
Innovation needs waste - XP Days Germany 2011Pierluigi Pugliese
 
Internetlibrarian2010designthinkingoct2510
Internetlibrarian2010designthinkingoct2510Internetlibrarian2010designthinkingoct2510
Internetlibrarian2010designthinkingoct2510Jeffrey V
 
Beyond Design Thinking at DNA
Beyond Design Thinking at DNABeyond Design Thinking at DNA
Beyond Design Thinking at DNAChris Jackson
 
Conquering Museum Challenges with Design Thinking
Conquering Museum Challenges with Design ThinkingConquering Museum Challenges with Design Thinking
Conquering Museum Challenges with Design ThinkingDana Mitroff Silvers
 
Valtech - Innovation Needs Waste
Valtech - Innovation Needs WasteValtech - Innovation Needs Waste
Valtech - Innovation Needs WasteValtech
 
Design thinking - IDEO
Design thinking - IDEODesign thinking - IDEO
Design thinking - IDEOAhmed Alaraj
 
Immerse, Imagine, Invent, Articulate: A framework for disruptive innovation
Immerse, Imagine, Invent, Articulate: A framework for disruptive innovationImmerse, Imagine, Invent, Articulate: A framework for disruptive innovation
Immerse, Imagine, Invent, Articulate: A framework for disruptive innovationPaulJervisHeath
 
Internet Librarian 2010 - Using Design Thinking to Enable Innovation
Internet Librarian 2010 - Using Design Thinking to Enable InnovationInternet Librarian 2010 - Using Design Thinking to Enable Innovation
Internet Librarian 2010 - Using Design Thinking to Enable InnovationHamilton Public Library
 
International Innovation for AURA
International Innovation for AURAInternational Innovation for AURA
International Innovation for AURANick Coates
 
The human side of design
The human side of designThe human side of design
The human side of designMax Soe
 

Similar to Great Artists (Designers) Steal (20)

Artist Create Value
Artist Create ValueArtist Create Value
Artist Create Value
 
Design Thinking: A Common Sense Process
Design Thinking: A Common Sense ProcessDesign Thinking: A Common Sense Process
Design Thinking: A Common Sense Process
 
Mktg. 7 chapter 4
Mktg. 7 chapter 4Mktg. 7 chapter 4
Mktg. 7 chapter 4
 
Week-7: Value Proposition & Design Thinking
Week-7: Value Proposition & Design ThinkingWeek-7: Value Proposition & Design Thinking
Week-7: Value Proposition & Design Thinking
 
Creativity and Design Thinking 2012 SM MD
Creativity and Design Thinking 2012 SM MDCreativity and Design Thinking 2012 SM MD
Creativity and Design Thinking 2012 SM MD
 
EST 200, Design Thinking
EST 200, Design ThinkingEST 200, Design Thinking
EST 200, Design Thinking
 
Design thinking yuechi li
Design thinking yuechi liDesign thinking yuechi li
Design thinking yuechi li
 
Design Thinking for Startups - Are You Design Driven?
Design Thinking for Startups - Are You Design Driven?Design Thinking for Startups - Are You Design Driven?
Design Thinking for Startups - Are You Design Driven?
 
Wikinnovation
WikinnovationWikinnovation
Wikinnovation
 
Innovation needs waste - XP Days Germany 2011
Innovation needs waste - XP Days Germany 2011Innovation needs waste - XP Days Germany 2011
Innovation needs waste - XP Days Germany 2011
 
Internetlibrarian2010designthinkingoct2510
Internetlibrarian2010designthinkingoct2510Internetlibrarian2010designthinkingoct2510
Internetlibrarian2010designthinkingoct2510
 
Beyond Design Thinking at DNA
Beyond Design Thinking at DNABeyond Design Thinking at DNA
Beyond Design Thinking at DNA
 
Conquering Museum Challenges with Design Thinking
Conquering Museum Challenges with Design ThinkingConquering Museum Challenges with Design Thinking
Conquering Museum Challenges with Design Thinking
 
Design Thinking
Design ThinkingDesign Thinking
Design Thinking
 
Valtech - Innovation Needs Waste
Valtech - Innovation Needs WasteValtech - Innovation Needs Waste
Valtech - Innovation Needs Waste
 
Design thinking - IDEO
Design thinking - IDEODesign thinking - IDEO
Design thinking - IDEO
 
Immerse, Imagine, Invent, Articulate: A framework for disruptive innovation
Immerse, Imagine, Invent, Articulate: A framework for disruptive innovationImmerse, Imagine, Invent, Articulate: A framework for disruptive innovation
Immerse, Imagine, Invent, Articulate: A framework for disruptive innovation
 
Internet Librarian 2010 - Using Design Thinking to Enable Innovation
Internet Librarian 2010 - Using Design Thinking to Enable InnovationInternet Librarian 2010 - Using Design Thinking to Enable Innovation
Internet Librarian 2010 - Using Design Thinking to Enable Innovation
 
International Innovation for AURA
International Innovation for AURAInternational Innovation for AURA
International Innovation for AURA
 
The human side of design
The human side of designThe human side of design
The human side of design
 

More from All Things Open

Building Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityBuilding Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityAll Things Open
 
Modern Database Best Practices
Modern Database Best PracticesModern Database Best Practices
Modern Database Best PracticesAll Things Open
 
Open Source and Public Policy
Open Source and Public PolicyOpen Source and Public Policy
Open Source and Public PolicyAll Things Open
 
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...All Things Open
 
The State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashThe State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashAll Things Open
 
Total ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScriptTotal ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScriptAll Things Open
 
What Does Real World Mass Adoption of Decentralized Tech Look Like?
What Does Real World Mass Adoption of Decentralized Tech Look Like?What Does Real World Mass Adoption of Decentralized Tech Look Like?
What Does Real World Mass Adoption of Decentralized Tech Look Like?All Things Open
 
How to Write & Deploy a Smart Contract
How to Write & Deploy a Smart ContractHow to Write & Deploy a Smart Contract
How to Write & Deploy a Smart ContractAll Things Open
 
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
 Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlowAll Things Open
 
DEI Challenges and Success
DEI Challenges and SuccessDEI Challenges and Success
DEI Challenges and SuccessAll Things Open
 
Scaling Web Applications with Background
Scaling Web Applications with BackgroundScaling Web Applications with Background
Scaling Web Applications with BackgroundAll Things Open
 
Supercharging tutorials with WebAssembly
Supercharging tutorials with WebAssemblySupercharging tutorials with WebAssembly
Supercharging tutorials with WebAssemblyAll Things Open
 
Using SQL to Find Needles in Haystacks
Using SQL to Find Needles in HaystacksUsing SQL to Find Needles in Haystacks
Using SQL to Find Needles in HaystacksAll Things Open
 
Configuration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit InterceptConfiguration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit InterceptAll Things Open
 
Scaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship ProgramScaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship ProgramAll Things Open
 
Build Developer Experience Teams for Open Source
Build Developer Experience Teams for Open SourceBuild Developer Experience Teams for Open Source
Build Developer Experience Teams for Open SourceAll Things Open
 
Deploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache BeamDeploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache BeamAll Things Open
 
Sudo – Giving access while staying in control
Sudo – Giving access while staying in controlSudo – Giving access while staying in control
Sudo – Giving access while staying in controlAll Things Open
 
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML ApplicationsFortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML ApplicationsAll Things Open
 
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...All Things Open
 

More from All Things Open (20)

Building Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityBuilding Reliability - The Realities of Observability
Building Reliability - The Realities of Observability
 
Modern Database Best Practices
Modern Database Best PracticesModern Database Best Practices
Modern Database Best Practices
 
Open Source and Public Policy
Open Source and Public PolicyOpen Source and Public Policy
Open Source and Public Policy
 
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
 
The State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashThe State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil Nash
 
Total ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScriptTotal ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScript
 
What Does Real World Mass Adoption of Decentralized Tech Look Like?
What Does Real World Mass Adoption of Decentralized Tech Look Like?What Does Real World Mass Adoption of Decentralized Tech Look Like?
What Does Real World Mass Adoption of Decentralized Tech Look Like?
 
How to Write & Deploy a Smart Contract
How to Write & Deploy a Smart ContractHow to Write & Deploy a Smart Contract
How to Write & Deploy a Smart Contract
 
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
 Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
 
DEI Challenges and Success
DEI Challenges and SuccessDEI Challenges and Success
DEI Challenges and Success
 
Scaling Web Applications with Background
Scaling Web Applications with BackgroundScaling Web Applications with Background
Scaling Web Applications with Background
 
Supercharging tutorials with WebAssembly
Supercharging tutorials with WebAssemblySupercharging tutorials with WebAssembly
Supercharging tutorials with WebAssembly
 
Using SQL to Find Needles in Haystacks
Using SQL to Find Needles in HaystacksUsing SQL to Find Needles in Haystacks
Using SQL to Find Needles in Haystacks
 
Configuration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit InterceptConfiguration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit Intercept
 
Scaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship ProgramScaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship Program
 
Build Developer Experience Teams for Open Source
Build Developer Experience Teams for Open SourceBuild Developer Experience Teams for Open Source
Build Developer Experience Teams for Open Source
 
Deploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache BeamDeploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache Beam
 
Sudo – Giving access while staying in control
Sudo – Giving access while staying in controlSudo – Giving access while staying in control
Sudo – Giving access while staying in control
 
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML ApplicationsFortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
 
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

Great Artists (Designers) Steal

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. 1. Framing 2. Why Artists Steal 3. Welcome to the Family
  • 6. Goals: 1. Better Understand Design 2. Encourage active collaboration 3. Further discussion on standards in structured borrowing
  • 7.
  • 8. Context a.Historical Context b.Definition of terms c.Comparing communal standards d.Role of an Artist
  • 9.
  • 10.
  • 11. Jobs vs. Gates • Influence pervades • “Fair Game” has many meanings
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Problem: While development can be deemed open and thus benefit from a diverse community of contributors, design has always inherently been open in nature.
  • 17. Questions: 1. Is borrowing permissable? 2. How can we borrow, but still innovate? 3. What should our attitude be toward those who borrow from us? 4. When does borrowing become theft?
  • 18. Design verses Development Development - Needs collaboration - Values efficiency - Behind the scenes: self-value ethic Design - Seeks independence - Values originality - Center stage: judged by all
  • 19. Designer Responsibility • Continuation of storytelling legacy • Derive elegant solutions to real problems
  • 20. Design is directed toward human beings. To design is to solve human problems by identifying them and executing the best solution. Ivan Chermayeff
  • 21. To design is to communicate clearly by whatever means you can control or master. Milton Glaser
  • 22. Artist’s Tools - Perspective - Awareness - Empathy
  • 23. The latest incarnation of Oedipus, the continued romance of Beauty and the Beast, stand this afternoon on the corner of 42nd Street and Fifth Avenue, waiting for the traffic light to change. Joseph Campbell The Hero With a Thousand Faces
  • 24.
  • 25. Why Artists Steal a.UX Benefits b.Efficiency and expediency c.Setting the bar
  • 26. Why do artists steal - Familarity - Memory Mapping - Conventionality - Cameron Moll on foundations - Efficiency - Artists as curators
  • 27. Benefits of Familiarity • Two systems of decision making • Concious vs. Unconcious • Our culture functions primarily on instant impressions Daniel Kahneman Nobel Prize-winning researcher • Design decisions fail when they do not leverage their predecessors Dr. A.K. Pradeep, study of GAP failed logo launch
  • 28. “Designers are often reluctant to take advantage of them (conventions). Faced with the prospect of using a convention, there’s a great temptation for designers to reinvent the wheel instead, largely because they feel (not incorrectly) that they’ve been hired to do something new and different, and not the same old thing. (Not to mention the fact that praise from peers, awards, and high-profile job offers are rarely based on criteria like “best use of conventions.)” Steve Krug, Don’t Make Me Think!
  • 29. There are more than a billion pages on the web - for your inspiration Seth Godin
  • 30. Great Design Ships • We are not always the gatekeepers • Stand on the shoulders of giants Nina Paley Iterations on accepted and familiar patterns have a better chance of making it to market and of being accepted
  • 31.
  • 32. Types of theft • Not all theft is conscious • Theft differs from appropriation, iteration, and improvement • Fork designs, push changes back to help others
  • 33. Ethical Theft - Steal inspiration instead of outcome - Reverse engineer final products - Always cite, Always give back - Make designs available to others, give credit
  • 34. One of the surest of tests is the way in which a poet borrows. Immature poets imitate; mature poets steal; bad poets deface what they take, and good poets make it into something better, or at least something different. TS Elliot
  • 35. Goals and Best Practices - Curate intentionally - Work within community - Continue to innovate - Great design sets the bar higher - Look outside your comfort zone
  • 36. Where to steal from - “if you’re designing for the web, why look at loads of design portals that show loads of web sites that essentially all look the same? […] Surely they offer too narrow a view to be really inspirational.” Brendon Dawes, Analog In, Digital Out
  • 37. Protection from Theft - Notriety protects from plagiarism - Edison and the patent clerks - Use tools, know your rights - Read copyright laws http://www.sitepoint.com/the-web-designers-copyright-crash-course/ - Always have a contract - Document everything
  • 38. Summation: - Theft Happens: - It’s at times involuntary - It comes in many varities - It’s part of designing - Steal Better - Follow ethics, follow laws, copy inspiration - Stealing is good - Stolen products often work better

Editor's Notes

  1. AG: My childhood masterpieces were rendered on tracing paper My imitation was made obvious by my iteration - Years later.. I saw a documentary on Disney animators flipping tracing paper
  2. This isn’t a mandate - it’s a confession -Let us become aware of it, and intentional in it - Apply standards - Understand it more fully
  3. Film: homage writer: research is fundamental
  4. The development community needs to set the tone Openness makes creation and problem solving easier Stealing is good Steal is going to happen, even if it isn’t good
  5. Expectations for presentation - open ended question
  6. UWG - Browsers - TinyMCE - Wordpress - GitLabs and github repos - Google Applications - Drive Moving on to context in design community
  7. Expectations for presentation - open ended question
  8. Current Event: Apple’s Jony Ivy has accused Chinese phone manufacturer of stealing Apple designs. http://readwrite.com/2014/10/13/jony-ive-apple-copying-stealing-vanity-fair
  9. -Patent wars are becoming ridiculous - like the “zero-length” swip == click argument - Apple has a history of borrowing/copying - Many Apple features in i0S8 are ported from Android This extends Ivy’s mentors clash over “theft”
  10. Jobs v Gates story Design does not exist in a vacuum. We’re all influenced by each other.
  11. -Apple’s stuff has been seen elsewhere - HTC, Samsung - Their software seems ported from Android It’s important to classify design as a language - a communicative currency If language were a currency - and royalties were due- Drake would be rich Or maybe, the true incepter http://www.businessinsider.com/xiaomi-to-jony-ive-try-our-phones-before-you-accuse-us-of-theft-2014-10
  12. Carpe Diem I borrow Colin Quinn’s analysis At what point does the derivation of an element no longer owe its existence to the creator of its parent element? Ivy, Jobs, Gates, Lin Bin - all clashing over their genius, we should look to true genius
  13. Jobs - guilt over putting stuff together This is key - we are curators, using our perspective to create
  14. Old Steve vs. Young Steve Steve Jobs famously said great Artists steal. The GUI was lifted from Xerox, but when Google released Android, Jobs called it a stolen product and promised to go thermonuclear war on it. What changed? The developmental methods were completely different - languages, tools, teams, objectives - and even the dogma of the OS was entirely different - “Welcome to the walled Garden” vs. “Hey here’s our kernel, go HAM” (picture of dog exposing belly) Design was what offended Steve as having been stolen - the way the product works. It was his genius - his intuition for how people interacted with objects, data, and interfaces. He attempted to have doctors redesign his breathing apparatus. It was who he was. So he felt that, in lifting the HOW of the design, Google had taken part of himself they were not entitled to take. Design though is inherently imbued with parts of ourselves - so it takes a reinvention of our interpretation of self to say, anything created with help from my creation is also imbued with part of my identity, and is therefore part of my design lineage.
  15. Development becomes this inherently open process where collaboration is required - and the tools common to the development community are often shared, as are best practices, trends, and helpful tips (shot of snarky stack overflow conversation) But in design, things aren’t always so open. Probably the most high-profile piece of proprietary software commonly used by any of your teams is being used by your designer. That’s not to say there doesn’t exist community - but that’s exactly the point - it springs up in spite of trends.
  16. We are modern mechanics, artisans, engineers, and painters, writers, poets, and filmmakers. We present stories, characters, and information fluidly, in a variety of contexts, suitable for digestion across myriad platforms. It’s important we see ourselves as the continuation of a proud tradition of expression and storytelling. The story does not lay flat on page, page comes alive, story surrounds, and audience IS a character, many times, the antagonist, prompting change through interaction, whether fluidic or fraught with struggle. As such we should understand the historical context of our skills and objectives - every major communicative medium endures the growth pains the web now faces, and navigates them in their own manner.
  17. As Artists, We are Thieves Artist reflect, interpret, modify the world around us. We can only do this through our lens, our perspective, with our toolset. Once we’ve rendered something, it is forever imbued with our perspective. So if our collective perspective is lacking, we cannot accurately see the world, let alone reflect it, and answer its needs. It is important for us to steal - or borrow - the perspective and pangs of others to better answer questions we have not thought to ask, and solve problems we have not ourselves even struggled with. This requires we remain tuned into those around us, and that we translate ourselves into walking surveys, walking sociological and psychological studies on the mechanics of our interfaces, information ,and craft - to better improve, iterate, and invent.
  18. Expectations for presentation - open ended question
  19. A positive side-effect to copying is conventionality - similar foundations - layout and IA and therefore it becomes “intuitive” to use a product and familiar, comfortable, appealing. We often don’t have time to painstakingly create anew. This isn’t an excuse, but its a consideration. Steal from yourself - in iterating, you will create things you’ll never use, so revisit them! (See bottom: resources to steal from) Picasso meant great artists are great curators - great collectors of otherwise hidden sources. It wouldn’t do them any good to steal well known material - but to bring lesser known designs to the masses helps them become a trend and appeal to more people - works them into the collective lexicon, the design language of all people - and achieve maximum impact. Nokia had an example of the iPhone 15 years ago but never did anything with it. Great designs, if kept private, do not achieve the fundamental goal of great design: to empower, influence, enhance, and enrapture its audience.
  20. Development becomes this inherently open process where collaboration is required - and the tools common to the development community are often shared, as are best practices, trends, and helpful tips (shot of snarky stack overflow conversation) But in design, things aren’t always so open. Probably the most high-profile piece of proprietary software commonly used by any of your teams is being used by your designer. That’s not to say there doesn’t exist community - but that’s exactly the point - it springs up in spite of trends.
  21. The best solution is probably already out there - the question is how to find it, and how to make sure its the best. This is because many designs arise to solve similar problems. Ask yourself why you’re embarking on a certain path!
  22. A lot of times, designers are not the gatekeepers - so standing on the shoulders of giants and iterating is the best way to get something into the market - it mitigates the risk for art directors and project managers and assures them it will work, it will deliver, it will achieve its end. This also highlights one of the great things about being stolen from - maybe your gatekeeper held something back, but this process can be subverted by openly sharing design and ideas, content can still make it to market through alternative channels. Impro by Keight Johnstone argues when improvisers strive for originality they fail. Instead, be obvious - specifics become and seem universal, and what’s obvious to you isn’t obvious to anyone else - so even if you and ten other designers steal from the same piece, you won’t steal the same things.
  23. Not all Stealing is Conscious We are stewards and curators of design trends and techniques, and so quickly become repositories for new methods. We don’t always mean to steal, sometimes we think we’ve invented something when really we’ve seen it somewhere else before, or we’ve merely appropriated something common. Even when we do iterate in cases such as this we must recognize we are standing on the shoulders of giants. Rather than shying away from comparison, or seeking to undo this subconscious borrowing, we should go down the rabbit hole, seeking to understand why things work, why we want to steal them in the first place - so we can transplant similar rationale to our other solutions and discoveries.
  24. Copy the inspiration - not the outcome Sort of like wikipedia - look to the footnotes, seek to understand why something works, or where it came from in order to work from a common ancestor - don’t copy the outcome verbatim, that’s in bad taste, and also doesn’t achieve what design is meant to in that it does not set your product or creation apart. Design is your creation’s identity - don’t let it be a mere echo of another identity.
  25. v Great Resources to Steal From Scotch.io CodePen Material design - Google CoDrops Dribbble Pinterest
  26. Edison - patent office races Einstein - afraid his work would be presented by collaborator before he could make it known (build out solution slide with this information) Build out - contact information, UWG History repeats itself - how we got from Model T to today Cultural aspects - China (borrowing or enhancing?) Highlight big words (words of importance) Refine timing - know where you are in the presentation write entire word for versus Remove abbreviations Revisit roadmap Remove unused slides Add more information about WHAT you’re saying to steal Visit how state ownership works as far as your employment Add more information about copyright ins + outs + how to defend against theft Enlarge slides Ensure all citations are very well documented on references page Don’t switch slides without switching topic - info should Roadmap - don’t go through everything Involve people by asking rhetorical question - then answer via slide transition Consolidate some slides into lists - be aware of what next slide will be Include definition of steal