8.2.4 High-Fidelity Prototyping

Total Page:16

File Type:pdf, Size:1020Kb

8.2.4 High-Fidelity Prototyping 8.2 Prototyping and construction 245 I Drive car to gas pump Take nozzle from pump ... and put it ~ntothe car's gas tank Squeeze trigger on Replace nozzle Pay cash~er the nozzle until when tank is full tank is full Figure 8.4 A storyboard depicting how to fill a car with gas. Wizard of Oz Another low-fidelity prototyping method called Wizard of Oz assumes that you have a software-based prototype. In this technique, the user sits at a computer screen and interacts with the software as though interacting with the product. In fact, however, the computer is connected to another ma- chine where a human operator sits and simulates the software's response to the user. The method takes its name from the classic story of the little girl who is swept away in a storm and finds herself in the Land of Oz (Baum and Denslow, 1900). 8.2.4 High-fidelity prototyping High-fidelity prototyping uses materials that you would expect to be in the final product and produces a prototype that looks much more like the final thing. For example, a prototype of a software system developed in Visual Basic is higher fi- delity than a paper-based mockup; a molded piece of plastic with a dummy key- board is a higher-fidelity prototype of the PalmPilot than the lump of wood. If you are to build a prototype in software, then clearly you need a software tool to support this. Common prototyping tools include Macromedia Director, Vi- sual Basic, and Smalltalk. These are also full-fledged development environments, so they are powerful tools, but building prototypes using them can also be very straightforward. 246 Chapter 8 Design, protowing and construction Table 8.1 Relative effectiveness of low- vs. high-fidelity prototypes (Rudd et al., 1996) Type Advantages Disadvantages Low-fidelity prototype Lower development cost. Limited error checking. Evaluate multiple design Poor detailed specification concepts. to code to. Useful communication device. Facilitator-driven. Address screen layout issues. Limited utility after 6 Useful for identifyingmarket requirements established. requirements. Limited usefulness for Proof-of-concept. usability tests. Navigational and flow limitations. High-fidelity prototype 6 Complete functionality. More expensive to develop. Fully interactive. Time-consuming to create. User-driven. Inefficient for proof-of- Clearly defines navigational concept designs. scheme. Not effective for Use for exploration and test. requirements gathering. Look and feel of final product. Serves as a living specification. Marketing and sales tool. Marc Rettig (1994) argues that more projects should use low-fidelity prototyp- ing because of the inherent problems with high-fidelity prototyping. He identifies these problems as: They take too long to build. Reviewers and testers tend to comment on superficial aspects rather than content. Developers are reluctant to change something they have crafted for hours. A software prototype can set expectations too high. Just one bug in a high-fidelity prototype can bring the testing to a halt. High-fidelity prototyping is useful for selling ideas to people and for testing out technical issues. However, the use of paper prototyping and other ideas should be actively encouraged for exploring issues of content and structure. Further advan- tages and disadvantages of the two types of prototyping are listed in Table 8.1. 8.2.5 Compromises in protoiyping By their very nature, prototypes involve compromises: the intention is to produce something quickly to test an aspect of the product. The kind of questions or choices 8.2 Prototyping and construction 247 that any one prototype allows the designer to answer is therefore limited, and the prototype must be designed and built with the key issues in mind. In low-fidelity prototyping, it is fairly clear that compromises have been made. For example, with a paper-based prototype an obvious compromise is that the device doesn't actually work! For software-based prototyping, some of the compromises will still be fairly clear; for example, the response speed may be slow, or the exact icons may be sketchy, or only a limited amount of functionality may be available. Two common compromises that often must be traded against each other are breadth of functionality provided versus depth. These two kinds of prototyping 248 Chapter 8 Design, prototyping and construction I are called horizontal prototyping (providing a wide range of functions but with little detail) and vertical prototyping (providing a lot of detail for only a few functions). Other compromises won't be obvious to a user of the system. For example, the internal structure of the system may not have been carefully designed, and the pro- totype may contain "spaghetti code" or may be badly partitioned. One of the dan- gers of producing running prototypes, i.e., ones that users can interact with automatically, is that they may believe that the prototype is the system. The danger for developers is that it may lead them to consider fewer alternatives because they have found one that works and that the users like. However, the compromises made in order to produce the prototype must not be ignored, particularly the ones that are less obvious from the outside. We still must produce a good-quality system and good engineering principles must be adhered to. 8.2.6 Construction: from design to implementation When the design has been around the iteration cycle enough times to feel confi- dent that it fits requirements, everything that has been learned through the iter- ated steps of prototyping and evaluation must be integrated to produce the final product. Although prototypes will have undergone extensive user evaluation, they will not necessarily have been subjected to rigorous quality testing for other character- istics such as robustness and error-free operation. Constructing a product to be used by thousands or millions of people running on various platforms and under a wide range of circumstances requires a different testing regime than producing a quick prototype to answer specific questions. The dilemma box below discusses two different development philosophies. One approach, called evolutionary prototyping, involves evolving a prototype into the final product. An alternative approach, called throwaway prototyping, uses the prototypes as stepping stones towards the final design. In this case, the 8.3 Conceptual design: moving from requirements to first design 249 prototypes are thrown away and the final product is built from scratch. If an evo- lutionary prototyping approach is to be taken, the prototypes should be subjected to rigorous testing along the way; for throw-away prototyping such testing is not necessary. 8.3 Conceptual design: moving from requirements to first design Conceptual design is concerned with transforming the user requirements and needs into a conceptual model. Conceptual models were introduced in Chapter 2, and here we provide more detail and discuss how to go about developing one. We defined conceptual model as "a description of the proposed system in terms of a set of integrated ideas and concepts about what it should do, behave, and look like, that will be understandable by the users in the manner intended." The basis for designing this model is the set of user tasks the product will support. There is no easy transformation to apply to a set of requirements data that will produce "the best" or even a "good enough" conceptual model. Steeping yourself in the data and trying to empathize with the users while considering the issues raised in this section is one of the best ways to proceed. From the requirements and this ex- perience, a picture of what you want the users' experience to be when using the new product will emerge. 250 Chapter 8 Design, prototyping and construction I Beyer and Holtzblatt (1998), in their method Contextual Design discussed in Chapter 9, recommend holding review meetings within the team to get different peoples' perspectives on the data and what they observed. This helps to deepen un- derstanding and to expose the whole team to different aspects. Ideas will emerge as this extended understanding of the requirements is established, and these can be tested against other data and scenarios, discussed with other design team members and prototyped for testing with users. Other ways to understand the users' experi- ence are described in Box 8.2. Ideas for a conceptual model may emerge during data gathering, but remember what Suzanne Robertson said in her interview at the end of Chapter 7: you must separate the real requirements from solution ideas. Key guiding principles of conceptual design are: Keep an open mind but never forget the users and their context. Discuss ideas with other stakeholders as much as possible. Use low-fidelity prototyping to get rapid feedback. Iterate, iterate, and iterate. Remember Fudd's first law of creativity: "To get a good idea, get lots of ideas" (Rettig, 1994). Considering alternatives and repeatedly thinking about different perspectives helps to expand the solution space and can help prompt insights. Prototyping (intro- duced in Section 8.2) and scenarios (introduced in Chapter 7) are two techniques to help you explore ideas and make design decisions. But before explaining how these can help, we need to explore in more detail how to go about envisioning the product. 8.3.1 Three perspectives for developing a conceptual model Chapter 2 introduced three ways of thinking about a conceptual model: Which in- teraction mode would best support the users' activities? Is there a suitable interface metaphor to help users understand the product? Which interaction paradigm will the product follow? In this section, we discuss each of these in more detail. In all the discussions that follow, we are not suggesting that one way of approaching a con- ceptual design is right for one situation and wrong for another; they all provide dif- ferent ways of thinking about the product and hence aid in generating alternatives.
Recommended publications
  • Fastbuild: Accelerating Docker Image Building for Efficient Development
    FastBuild: Accelerating Docker Image Building for Efficient Development and Deployment of Container Zhuo Huang1, Song Wu1∗, Song Jiang2 and Hai Jin1 1National Engineering Research Center for Big Data Technology and System 1Services Computing Technology and System Lab, Cluster and Grid Computing Lab 1School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China 2Department of Computer Science and Engineering, University of Texas at Arlington, Texas 76019, U.S 1 fhuangzhuo, wusong, [email protected] [email protected] Abstract—Docker containers have been increasingly adopted is especially desired in a DevOps environment where frequent on various computing platforms to provide a lightweight vir- deployments occur. In the meantime, DevOps also requires tualized execution environment. Compared to virtual machines, repeated adjustments and testing of container images. An this technology can often reduce the launch time from a few minutes to less than 10 seconds, assuming the Docker image image is often iteratively re-built before and after a container is has been locally available. However, Docker images are highly launched from it. To support flexible customization of images, customizable, and are mostly built at runtime from a remote Docker adopts a mechanism to build images at the client side. base image by running instructions in a script (the Dockerfile). An image can be built by running a Dockerfile, which is During the instruction execution, a large number of input files a script containing instructions for building an image, from may have to be retrieved via the Internet. The image building may be an iterative process as one may need to repeatedly modify a base image that provides basic and highly customizable the Dockerfile until a desired image composition is received.
    [Show full text]
  • Introduction What Is Mtcp?
    Good news, everyone! User Documentation Version: 2020-03-07 M. Brutman ([email protected]) http://www.brutman.com/mTCP/ Table of Contents Introduction and Setup Introduction..............................................................................................................................................................8 What is mTCP?...................................................................................................................................................8 Features...............................................................................................................................................................8 Tested machines/environments...........................................................................................................................9 Licensing...........................................................................................................................................................10 Packaging..........................................................................................................................................................10 Binaries.....................................................................................................................................................................10 Documentation..........................................................................................................................................................11 Support and contact information.......................................................................................................................11
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Technical Notes All Changes in Fedora 13
    Fedora 13 Technical Notes All changes in Fedora 13 Edited by The Fedora Docs Team Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. All other trademarks are the property of their respective owners. Abstract This document lists all changed packages between Fedora 12 and Fedora 13.
    [Show full text]
  • (Computer-Mediated) Communication
    Submitted by Dipl-Ing. Robert Ecker Submitted at Analysis of Computer- Department of Telecooperation Mediated Discourses Supervisor and First Examiner Univ.-Prof. Mag. Dr. Focusing on Automated Gabriele Anderst-Kotsis Second Examiner Detection and Guessing o. Univ.-Prof. Dipl.-Ing. Dr. Michael Schrefl of Structural Sender- August 2017 Receiver Relations Doctoral Thesis to obtain the academic degree of Doktor der technischen Wissenschaften in the Doctoral Program Technische Wissenschaften JOHANNES KEPLER UNIVERSITY LINZ Altenbergerstraße 69 4040 Linz, Osterreich¨ www.jku.at DVR 0093696 Kurzfassung Formen der computervermittelten Kommunikation (CvK) sind allgegenwärtig und beein- flussen unser Leben täglich. Facebook, Myspace, Skype, Twitter, WhatsApp und YouTube produzieren große Mengen an Daten - ideal für Analysen. Automatisierte Tools für die Diskursanalyse verarbeiten diese enormen Mengen an computervermittelten Diskursen schnell. Diese Dissertation beschreibt die Entwicklung und Struktur einer Software- Architektur für ein automatisiertes Tool, das computervermittelte Diskurse analysiert, um die Frage “Wer kommuniziert mit wem?” zu jedem Zeitpunkt zu beantworten. Die Zuweisung von Empfängern zu jeder einzelnen Nachricht ist ein wichtiger Schritt. Direkte Adressierung hilft, wird aber nicht in jeder Nachricht verwendet. Populäre Kommunikationsmodelle und die am weitesten verbreiteten CvK-Systeme werden untersucht. Das zugrunde liegende Kommunikationsmodell verdeutlicht die wesentlichen Elemente von CvK und zeigt, wie diese Kommunikation
    [Show full text]
  • Table of Contents
    Contents 1 Table of Contents Foreword 0 Part I Welcome to mIRC 5 Part II Connect to a Server 5 1 Connection Issues................................................................................................................................... 6 Part III Join a Channel 6 1 Channels List................................................................................................................................... 8 Part IV Chat Privately 9 Part V Send and Receive Files 9 1 Accepting Files................................................................................................................................... 11 Part VI Change Colors 12 1 Control Codes................................................................................................................................... 12 Part VII Options 14 1 Connect ................................................................................................................................... 14 Servers .......................................................................................................................................................... 15 Options .......................................................................................................................................................... 16 Identd .......................................................................................................................................................... 18 Proxy .........................................................................................................................................................
    [Show full text]
  • How to Install the IRC Bouncer ZNC on Linux Debian and How to Use It with MIRC
    How To Install The IRC Bouncer ZNC On Linux Debian And How To Use It With MIRC How To Install The IRC Bouncer ZNC On Linux Debian And How To Use It With MIRC 1 / 4 2 / 4 ZNC is an advanced IRC bouncer that can establish such a permanent ... The default install includes SSL setup for secure web access, using a .... How to connect via mIRC (Windows) Add the IP address of your server, the port is the one you chose in the –makeconf step. As a password use “username:password”. E.g. if you made a user in the –makeconf step named “tiq” with the password “tiqtiq”, type into the password field “tiq:tiqtiq”.. Binary packages and builds of WeeChat are available for installation as well as the source code for self compilation. This includes most Linux distributions and .... To create new wiki account, please join us on #znc at freenode and ask ... an advanced IRC bouncer that is left connected so an IRC client can ... Or you can try testing version, using nightly tarball or Git. Older versions can be found here. Several distros provide ZNC as a package, look at Installation page .... ZNC is an IRC network bouncer software. ... If you have finished all of the above steps, you have successfully installed ZNC on Ubuntu Linux! ... Note which port you have told ZNC to use because you will connect to ZNC .... Many avid IRC users use an IRC bouncer, a proxy service that keeps you ... explains how to install ZNC on Fedora and how to configure an IRC ...
    [Show full text]
  • Apache-Ivy Wordgrinder Nethogs Qtfm Fcgi Enblend-Enfuse
    eric Ted fsvs kegs ht tome wmii ttcp ess stgit nut heyu lshw 0th tiger ecl r+e vcp glfw trf sage p6f aris gq dstat vice glpk kvirc scite lyx yagf cim fdm atop slock fann G8$ fmit tkcvs pev bip vym fbida fyre yate yturl ogre owfs aide sdcv ncdu srm ack .eex ddd exim .wm ibam siege eagle xlt xclip gts .pilot atool xskat faust qucs gcal nrpe gavl tintin ruff wdfs spin wink vde+ ldns xpad qxkb kile ent gocr uae rssh gpac p0v qpdf pudb mew cc e afuse igal+ naim lurc xsel fcgi qtfm sphinx vmpk libsmi aterm lxsplit cgit librcd fuseiso squi gnugo spotify verilog kasumi pattern liboop latrace quassel gaupol firehol hydra emoc fi mo brlcad bashdb nginx d en+ xvnkb snappy gemrb bigloo sqlite+ shorten tcludp stardict rss-glx astyle yespl hatari loopy amrwb wally id3tool 3proxy d.ango cvsps cbmfs ledger beaver bsddb3 pptpd comgt x.obs abook gauche lxinput povray peg-e icecat toilet curtain gtypist hping3 clam wmdl splint fribid rope ssmtp grisbi crystal logpp ggobi ccrypt snes>x snack culmus libtirpc loemu herrie iripdb dosbox 8yro0 unhide tclvfs dtach varnish knock tracker kforth gbdfed tvtime netatop 8y,wt blake+ qmmp cgoban nexui kdesvn xrestop ifstatus xforms gtklife gmrun pwgen httrack prelink trrnt ip qlipper audiere ssdeep biew waon catdoc icecast uif+iso mirage epdfview tools meld subtle parcellite fusesmb gp+fasta alsa-tools pekwm viewnior mailman memuse hylafax= pydblite sloccount cdwrite uemacs hddtemp wxGT) adom .ulius qrencode usbmon openscap irssi!otr rss-guard psftools anacron mongodb nero-aac gem+tg gambas3 rsnapshot file-roller schedtool
    [Show full text]
  • Irc Software for Mac
    Irc software for mac click here to download Mac IRC clients are all grown up and have entered the new era of free cloud computing and the Mac App Store. Most apps in this list are free or just a few dollars. This is a radical change from just a few years ago, when the best apps were shareware worth $30 or more. All of these apps are stable and usable, and that ​Colloquy · ​Textual · ​Snak. Tab, Complete nickname. Ctrl+Tab Opt+Space, Move to the next unread channel. Ctrl+Shift+Tab Opt+Shift+Space, Move to the previous unread channel. Opt+Tab, Move back to the previously selected channel. Cmd+Up/Down Cmd+Opt+Up/Down Cmd+{/}, Move to the previous/next active channel. Ctrl+Up/Down, Move to. Traditionally, chat clients on the Mac have been anything but glamorous. Colloquy is an advanced IRC, SILC & ICB client which aims to fill this void. By adhering to Mac OS X interface conventions, Colloquy has the look and feel of a quality Mac application. AppleScript. A powerful dictionary for easy scripting. IRC, SILC. Get the answer to "What are the best IRC clients for Mac?" See a list of the top 8 options and learn their pros and cons. Textual is an IRC client created specifically for macOS. I've read good things about Colloquy but i was hoping to get some info from someone with some first hand knowledge. Thanks! Hey all, I'm just wondering what is a good IRC client for Mac. I use it sometimes but don't really use it too much.
    [Show full text]
  • Cyber-Workfield
    Cyber-workfield Uncovering the spectrum during COVID-19 confinement 2020 Design anthropology ​ ​ Patricia Saco Atanes Introduction About this study There are multiple reasons, occasional and personal, that have led me to choose this community over others. On the one hand, the physical limitation of this stage of confinement as a result of the COVID-19 has completely reduced my options for field work ​ ​ outdoors. On the other hand, my son's recent diagnosis with Aperger’s has opened a ​ ​ new door in my life towards a new way of seeing and understanding things, both for him and for me. The one and the other have led me to enter an online IRC community, with ​ ​ the main goal of better understanding how is their day-to-day reality, and get support for my day-to-day. Goal The main purpose of this project is to understand the relationship of this community with a specific object, which in this case will be the chat, as a ​ ​ ​ ​ virtual physical object for interaction. Dedication & technical details We will consider this chat anonymous, and we will call it #autism. ​ ​ The study has taken place from March 28 to May 9, 2020, covering more than ​ ​ 1 month, with an average interaction of 18 hours per week, which lays on, more than 80 hours of participation. ​ ​ The interactions have been spaced at different times of the day and with ​ ​ different groups of users in order to have a complete view of the experience, especially taking into account the different locations of its users. ​ ​ Uncovering the spectrum during COVID-19 confinement ​ ​Patricia Saco Ethical statement I am not showing any kind of private data like nicknames, real names, IPs or ​ ​ chatroom names in this report just to respect all of the people that have been helping me and supporting me during the last month and a half.
    [Show full text]
  • Limnoria Documentation
    Limnoria Documentation The Limnoria/Gribble/Supybot contributors Sep 20, 2021 Contents 1 User Guide 3 1.1 Installing Limnoria on GNU/Linux and UNIX (FreeBSD, macOS, . )................3 1.2 Installing Limnoria on Windows.....................................6 1.3 Getting Started with Limnoria/Supybot.................................8 1.4 Configuration............................................... 13 1.5 Identifying the bot to services...................................... 16 1.6 Capabilities................................................ 19 1.7 Security in Limnoria........................................... 23 1.8 Using the HTTP server.......................................... 25 1.9 Restarting the bot automatically..................................... 27 1.10 Frequently Asked Questions....................................... 29 2 Plugin Developer Guide 35 2.1 Writing Your First Limnoria Plugin................................... 35 2.2 Using commands.wrap to parse your command’s arguments...................... 43 2.3 Style Guidelines............................................. 51 2.4 Advanced Plugin Config......................................... 53 2.5 Advanced Plugin Testing......................................... 61 2.6 Distributing plugins........................................... 65 2.7 Using Supybot’s utils module...................................... 68 2.8 Capabilities................................................ 74 2.9 Special methods and catching events.................................. 75 2.10 Using Limnoria’s HTTP server
    [Show full text]
  • Fastbuild: Accelerating Docker Image Building for Efficient Development
    FastBuild: Accelerating Docker Image Building for Efficient Development and Deployment of Container Zhuo Huang1, Song Wu1∗, Song Jiang2 and Hai Jin1 1National Engineering Research Center for Big Data Technology and System 1Services Computing Technology and System Lab, Cluster and Grid Computing Lab 1School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China 2Department of Computer Science and Engineering, University of Texas at Arlington, Texas 76019, U.S 1 fhuangzhuo, wusong, [email protected] [email protected] Abstract—Docker containers have been increasingly adopted is especially desired in a DevOps environment where frequent on various computing platforms to provide a lightweight vir- deployments occur. In the meantime, DevOps also requires tualized execution environment. Compared to virtual machines, repeated adjustments and testing of container images. An this technology can often reduce the launch time from a few minutes to less than 10 seconds, assuming the Docker image image is often iteratively re-built before and after a container has been locally available. However, Docker images are highly is launched from it. To support flexible customization of customizable, and are mostly built at run time from a remote images, Docker adopts a mechanism to build images at the base image by running instructions in a script (the Dockerfile). client side. An image can be built by running a Dockerfile, During the instruction execution, a large number of input files a script containing instructions for building an image, from may have to be retrieved via the Internet. The image building may be an iterative process as one may need to repeatedly modify the a base image that provides basic and highly customizable Dockerfile until a desired image composition is received.
    [Show full text]