Make invitations to beta services better
...the service and a 12 character beta code, such as: DSVN4Z5YEMST Observations It took them three frustrating minutes to enter the beta code correctly. With the consent of the participant,...
...the service and a 12 character beta code, such as: DSVN4Z5YEMST Observations It took them three frustrating minutes to enter the beta code correctly. With the consent of the participant,...
...than software owned by an individual or a company (also known as proprietary software). Where we are today Today we use a lot of open source software in government projects....
I’m a designer and I prototype in code, the kind you put together to test ideas quickly and iterate continuously to meet user needs. Home Office Forms (HOF) is a...
...content out of the code into a separate content file. It involves replacing the content with a ‘token’, which is entered into the code. That token represents the correct words,...
...happen with how something is done today, we make the mistake of designing ‘digital’ versions of the same thing without addressing the problems. The aim is for services that are...
...you apply for and public service. Charles Babbage - the 'father of computing' If you are interested in tech, you might know that today is Ada Lovelace Day. Recognised for...
...way, if we share common values, and are clear about what they are. Today’s Civil Service is different from the one I joined more than 30 years ago. Technology is...
...team of 2 civil servants in 2015 to today’s 100 designers and researchers, she's built one of the most respected user-centred design practices in government. Katy Arnold Shaping the future...
...or re-use code and capability. While this data landscape delivered insights, it challenged integrated ways of working and innovation. We needed a department-wide focus on maintaining high standards of analysis....
...development our test engineers help us check that: code works the way it’s expected to changes to code haven’t broken existing functionality services are protected against security threats Using the...