This document discusses user experiences with software and how they can impact government and citizens. It provides nine laws of effective user experiences based on common successes, including focusing on the user first, empathizing with users, delivering software where users want it, gathering feedback through conversation, interpreting rather than directly taking user requirements, valuing good design, not trying to build for everyone, collaborating across teams, and allowing for flexibility rather than rigid plans. The document advocates applying these laws to optimize user adoption and achieve the benefits of software ROI for both government operations and citizens.
Many companies have employed the “Big Requirements Up-Front (BRUF)” or have found themselves mired in producing piles of paper to only have these documents out-of-date and not well understood by both the customer and the development team.
In this presentation we will discuss:
• How user stories are different from traditional approaches to requirements and how they combat “BRUF” and reams of documentation;
• Leveraging user stories to capture the intent of our customer;
• The anatomy of a user story;
• The three major elements of user stories (Card, Conversation, Confirmation).
Attend this presentation and learn how to successfully employ user stories for your requirements needs.
Length: 60 Minutes
Attendees: Business Analysts, Testers/Quality Assurance, Managers, and Development Team
User Story Writing & Estimation For Testers By Mahesh VaradharajanAgile Testing Alliance
This session aims to introduce the critical aspects of user story formulation like INVEST principle, requirements hierarchy in Agile - with focus on aspects related to Agile Testing, such that it fits into the overall theme of the event. Through an exercise, with Lego blocks, the session will address the following aspects: Testability of user stories and importance of acceptance criteria. Handling NFRs - either as part of acceptance criteria or a new user stories. DoD and accommodating testing efforts as part of user story estimation; Defects as user stories. Dependency management between user stories via story maps.
Talk including Demo for the learning objectives outlined above
Designing Rich Mobile Apps in a Fragmented WorldWorklight
User experience and design best practices for the development of high-quality and engaging cross-platform smartphone and tablet applications that meet users' expectations.
Many companies have employed the “Big Requirements Up-Front (BRUF)” or have found themselves mired in producing piles of paper to only have these documents out-of-date and not well understood by both the customer and the development team.
In this presentation we will discuss:
• How user stories are different from traditional approaches to requirements and how they combat “BRUF” and reams of documentation;
• Leveraging user stories to capture the intent of our customer;
• The anatomy of a user story;
• The three major elements of user stories (Card, Conversation, Confirmation).
Attend this presentation and learn how to successfully employ user stories for your requirements needs.
Length: 60 Minutes
Attendees: Business Analysts, Testers/Quality Assurance, Managers, and Development Team
User Story Writing & Estimation For Testers By Mahesh VaradharajanAgile Testing Alliance
This session aims to introduce the critical aspects of user story formulation like INVEST principle, requirements hierarchy in Agile - with focus on aspects related to Agile Testing, such that it fits into the overall theme of the event. Through an exercise, with Lego blocks, the session will address the following aspects: Testability of user stories and importance of acceptance criteria. Handling NFRs - either as part of acceptance criteria or a new user stories. DoD and accommodating testing efforts as part of user story estimation; Defects as user stories. Dependency management between user stories via story maps.
Talk including Demo for the learning objectives outlined above
Designing Rich Mobile Apps in a Fragmented WorldWorklight
User experience and design best practices for the development of high-quality and engaging cross-platform smartphone and tablet applications that meet users' expectations.
A bit of background as to the growth and how we use mobile plus a web developers perspective for going mobile for a non-technical audience. Primarily for an arts/ cultural and ticketing audience.
Event at the 120 Bloor Street - Toronto Innovation Centre Offices. The event was part of IBM's Centennial Celebrations. Non-profit organizations were invited to listen to presentations on the topics of Social Media, Collaboration and Web User Experience Design.
Mobile Applications Development - Lecture 3
User-Centered Design
Information Architecture (sitemaps, wireframes, ...)
UI Design
This presentation has been developed in the context of the Mobile Applications Development course at the Computer Science Department of the University of L’Aquila (Italy).
http://www.di.univaq.it/malavolta
A bit of background as to the growth and how we use mobile plus a web developers perspective for going mobile for a non-technical audience. Primarily for an arts/ cultural and ticketing audience.
Event at the 120 Bloor Street - Toronto Innovation Centre Offices. The event was part of IBM's Centennial Celebrations. Non-profit organizations were invited to listen to presentations on the topics of Social Media, Collaboration and Web User Experience Design.
Mobile Applications Development - Lecture 3
User-Centered Design
Information Architecture (sitemaps, wireframes, ...)
UI Design
This presentation has been developed in the context of the Mobile Applications Development course at the Computer Science Department of the University of L’Aquila (Italy).
http://www.di.univaq.it/malavolta
It’s hard to find an organisation with over 161,000 employees, spread across firms in 154 countries, that is willing to reposition itself and drastically modernise its brand. But that’s precisely what PwC has done – with enough creative and strategic flair to be named co-winner of the Grand Prix at this year’s Transform Awards.
PwC now speaks with a single voice and visually distinguishes itself from its competitors. Mike McMurphy joins us from New York to tell us how this was achieved.
Helen Atkinson, PwC, director for global brand integration
In "The ROI of User Experience: From Strategy and Conception to Development and Execution,"
EffectiveUI President Anthony Franco demonstrates why companies need to invest in user experience and user experience research, and how to optimize and measure UX ROI.
How we could use Email as a simple but effective tool to both validate problems and potential solutions AND to understand the users we are designing for a little better in a practical sense.
Like Mobile-First, only a bit different...
Slides from a workshop at The Net Value, Cagliari 03/2016
Your product is perfect and users are stupid. You are developing for a long time, following the perfect idea, your assumptions, you are not wrong… or not?
In this workshop you will understand the foundation of user experience. What UX is, why it is important and how you can start adopting it in your processes.
Top 10 jakob nielsen’s phenomenal rules of uiux design for 2022Cogniter Technologies
Do you want to build a stunning graphic design portfolio? Cogniter Technologies can meet your needs by creating an eye-catchy graphic design portfolio for you. We have skilled designers who are well-versed in presenting your experiences, best work, and case studies in a creative manner.
There are key things that will give you a much better chance at success. While these are well documented in numerous books, articles, and videos - there are still many stakeholders that don't subscribe to some basic truths, like: product decisions should be based on evidence, or having dedicated UX Designers on product teams.
Jeremy will go over his top ten questions to ask any team to see if they're heading toward launching a great product experience.
This presentation was originally given @ Refresh Dallas on 2/12/15
WinOps Conf 2016 - Matteo Emili - Development and QA Dilemmas in DevOpsWinOps Conf
The quick rise of Continuous Delivery in the enterprise means that common problems are often approached the other way round. Concepts like Feature Flags and Testing In Production caused several headaches to developers and QA engineers, especially where they have a wealth of experience about traditional development.
There are some challenges and approaches which are very common, and they still scare newcomers. Let's have a look at a few of these, with the most common solutions.
A webinar on Best practices of User Experience and how you use XPages to incorporate them in Lotus Applications. Presented by Gayathri Viswanathan of Maarga Systems and Durgaprasad of Peepal Design
Designing a good digital experience - PDA Europe Virtual Conference 2020 Margaux Lesaffre
In this session Paul and Ben explore how to design digital products with an understanding of user behaviours, as well as the importance of user-centric design for digital solutions.
You’ve embarked upon a user experience project – updating your website or creating a Web or mobile app. You know there will be an element of visual and experience design, but do you understand the basics behind why your designers are making the decisions and recommendations they make?
It’s important to understand some design basics in order to communicate effectively with the designers on your team. While many of us have an intuitive feel for what works and what doesn’t, developing a vocabulary to describe your issues and feedback and understanding the techniques required to validate your hunches are important skills in order to ensure the success of your project.
This session goes in-depth on which design techniques and principles ought to be part of every executive’s vernacular. By the end of the session attendees will understand the basics of both high level interaction design and lower-level visual design in a way that maximizes energy and time in the approval process, including:
• Basic design principles to help executives understand a design’s intent. This includes a basic understanding of layout, color theory and typography. • Design vocabulary, heuristics and analysis techniques • The difference between information architecture and interaction design, and how both have a critical yet often unseen influence on the development of the end project • Why incorporating user research is critical to good design
Effective UI’s Tony Hillerson and Juan Sanchez presented “Designing an App: From Idea to Market” at Android Open in October 2011. They cover best practices for desiging an Android app that offers a good user experience.
Flash and Flex in an HTML5 / App Store WorldEffectiveUI
EffectiveUI’s RJ Owen presented “Flash and Flex in an HTML5 and App Store World” at Adobe MAX, October 2011. This is an overview of where Adobe Flash and Flex have been, and predictions for how Adobe Flash and Flex will be used in the future for design and development.
EffectiveUI Senior Software Architect RJ Owen’s presentation from Flash Camp Denver, October 2010. Covers the basics of Adobe Flex framework, how to slice frames, Flex 4 component theory and life-cycle.
Whether you work alone or in a team, some sort of source control management is essential to you as a developer for things like keeping a history of your code, dealing with integrating code, managing releases and making your development workflow through different features painless. If you're coming from something like CVS or SVN, the open-source Git version control system will turn what you know of SCM on its head. This presentation explains why Git is different, and what that difference means to you as an Android developer.
EffectiveUI lead user experience architect John McRee's presentation from South by Southwest Interactive 2011:
"It’s a cultural phenomenon that most of us didn’t see coming: baby boomers are taking over Facebook, while the millenials are abandoning it like crazy because it is so last year. After all, what 20-something wants his mom to see his status update about last night’s party? This example signifies a trend in technology overall: the assumed late adopters are now joining early adopters as technology becomes increasingly easy and fun to use. Devices such as the Wii and the iPad have overwhelmingly been adopted by the older and less technologically savvy crowd. The trend has significant design implications. As we’re designing for emergent devices, we need to be very aware that we’re definitely not designing for ourselves. User research will become even more critical, with particular attention paid to the more mature crowd as they have different needs from other generations..."
Human-Centered Design and the Intersection of the Physical and Digital WorldsEffectiveUI
EffectiveUI user experience designers Lindsay Moore and Austin Brown's Lightning Round presentation given at IxDA Interaction '11 in Boulder, CO. "Austin and Lindsay demonstrate how they've redesigned everyday objects based on the combined disciplines of industrial and digital interaction design."
From the Trenches: Building the Accessible WebEffectiveUI
Jon Reid, Senior Developer at EffectiveUI, presented "From the Trenches: A Practical Approach to Building the Accessible Web" at Accessing Higher Ground 2010, an accessible media, web and technology conference hosted by the University of Colorado at Boulder.
Leonard Souza presents this look at Flex's amazing built-in visual effects and filters, which are probably one of the primary reasons to use the framework over other RIA platforms. As it turns out they are relatively easy to create. This presentation - given at 360|Flex in September 2010 - dives into the drawing API, the base effect/filter classes and Pixel Bender. You’ll learn how to build them from the ground up in a way that is reusable for yourself and other interaction designers.
EffectiveUI Lead Mobile Developer John Blanco gives a brief introduction to Mate and explores why we need it. This presentation also reviews problems with Cairngorm and PureMVC.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
By the Book: How Great User Experiences in Software Can Impact Government and Citizens
1. By the Book
How Great User Experiences in Software
Can Impact Government and Citizens
Anthony Franco twitter.com/anthonyfranco
President, EffectiveUI anthonyfranco.wordpress.com
4. Software ROI for Government
Operational Efficiency
Dissemination of Information
Gathering of Information
Collaboration
Compliance
5. Software ROI for Citizens
Citizen Enablement Tools:
•BenefitSelf Service
•Convenience
Information Transparency
Information Find-ability
6. example ROI calculations
citizen self service x user adoption = ROI
employee data entry x user adoption = ROI
information gathering x user adoption = ROI
process automation x user adoption = ROI
collaboration portals x user adoption = ROI
compliance portals x user adoption = ROI
15. ✓
focus on the end user first by:
understanding user
goals and needs
before deciding on a
technology approach
16. avoid: Vector Graphics
MXML
Flash Client Processing Cover-flow
Java Service Oriented Architecture
Sliverlight
Animation Social Networking
Streaming Video Aqua Multi-Channel
Runtime Skip Intro
Web 2.0 Productivity iPhone Accessibility
Google Reflections Audio
AJAX Thin Client
Security Sandbox Multi-Touch APIs
Apple Open Source
Flex Rich Conversions Microsoft Adobe
XAML Web Services Objective C SUN
buzz word bingo
17. ✓
focus on the end user first by:
understand user
goals and needs
before deciding on
the user flow
18. BUSINESS UNITS TURN IT INTO THIS:
PICK HOW YOU OPEN AN STORE CREDIT CLICK EMAIL
SHIP WILL PAY CARD INFORMATION WAIT FOR EMAIL TO CONFIRM
ACCOUNT
Now? I just want to
ship something.
LOGIN
PACKAGE, CHOOSE
TO & FROM CHECK PRICE/
DETAILED CONFIRM TRACK
SERVICE PAY
DESCRIPTION
I don’t know how What does
to answer that. each cost?
user flows as defined by executives
19. USERS WANT THIS:
PACKAGE, COST VS. CONFIRM
SHIP TO & FROM TIME DECISION PAY & TRACK
this is what users wanted
33. ABC CORP SYSTEM
ARCHITECTURE
TRANSACTION
CITIZEN DATA
SERVER
LEGACY
BPM AUTOMATION CMS
FRAMEWORK project teams to
minimize the user
3rd PARTY 3rd PARTY
WORKFLOW CONTENT in almost every
process
SOA
SEARCH ENGINE OPTIMIZATION
UI
this is our fault
89. TriGeo Console Project Milestone v_0.1
Last Modi ed: October 30, 2008 9:12 AM
USER INTERVIEWS INTERVIEW #1 NOTES nds something then looks at details :( con gure/manage tools
Only person take action takes forever to load
technical support resolve address
other people on technical sta use it check attacks source Dashboard
monitor logs who is/traceroute CPU, memory
not as dedicated Others check logs/trouble shooting Dial, inspection log
not regular basis Would like to nd all for IP for week/ overall network security health
calls the TriGeo Console “the TriGeo” day/month (Green/Yellow/Red)
Runs it in the background Deep dive in IGS Version of software
set up alerts Block IP name of device
gets alert google.com for IP to see if we do attackers/source hold
always open on separate computer business with graph - top 10 attackers
wants sounds Filters Graph/pie chart
uses blinking 58 (all) some TriGeo/some created top devices generating IP events In/
Cisco IPS 37 in tabs (dynamic and changing) = 6 Out TriGeo Console Project Milestone v_0.1
rows of tabs Last Modi ed: October 30, 2008 9:12 AM
uses the management console line graph/real time
Monitors TriGeo and any alerts that Mentioned the usage of “ lter sets” attacks over time
come through IPS then uses that TriGeo #of alerts generated
console for that event. Custom top alerts
USER INTERVIEWS CONT. describes this as “synergy” INTERVIEW #2 NOTES
“Day in the Life”
what kind/how many
functioning 20 - 3 rows
logs IGS - servers, edge, rewall suspicious tra c create and delete a lot
monitors servers, workstations
consolidate logs Morning activity/events Wishlist 10-11 on dedicated
research
nd out what events are coming from checkdatabases
sql lters Top Tasks
scheduling reports
which thing check tools on team, some semi-trained
4 people (status=up?) remain in directory where you put the
Console runs 24/7 Windows
IGS console has better capabilities run/check person
primary reports last one *same location
view tabs jumps around from window to
let it run all day
not enough licenses for all comps, but ? -rule builder
favorite serving locations window
Top Activities
going that route tools lag time
tools create lter from alert Context Scenarios
run on desktop to get a sense of Windowing
120 workstations would like ad hoc reports/custom
reports for rules too ! Logs in to the console
what’s going on the network (tabs) most apps run like that there are already prebuilt ones likes drag and drop for rules and lters
go through tabs to see what’s going
! Monitors network feeds
Usage
not much thought analyzeLife on internet (IP, domain,
Day in info
on throughout the day (made on navigating through window when other alerts? no?
see accounts) Dashboard ! Sets advanced filters
general health monitoring
TriGeo most custom) looking into speci c task
security functions knowledge base
same day to day what each server is doing ! Establishes rules
login errors, hardware errors
program rules for health uses it when needed
driven by lters
! Receives an alert
*trying to nd info that was stored by lter to nd what’s going on or
TriGeo through reports 9
! Drills down to problem area
run reports make notes of Ext.Info Wishlist ! Discovers and attack
tool alias wants to be able to deal with
monitor console
unmanaged Device ! Quarantines affected area
IDS make rules in rule builder
Rule Builder make notes, then goes into rule Quick reports with button click
dedicated machine builder
alerts Alert
general server health like being able to click and create rule TriGeo Console Project Milestone v_0.1
! James Woo
disk usage or has to take info and plug info rule Last Modi ed: October 30, 2008 9:12 AM
Power User Primary Persona
virus alerts automatically
windows time sync search alerts in Rule Builder?
29 savers rules in alpha order
go through log les order is confusing
USER RESEARCH SUMMARY backups succeeded CONSIDERATIONS to deal with
would like to be able James is an IT administrator for an internal network of a 3000 employee corporation. He is
services stopping? General
unmanaged workstations**
on call 24-7 and is responsible for maintaining a very complex, multi-tiered environment, Context Scenarios
restart Tabs take up a lot of space.
take action
Tactics for gaining insight into an application through the eyes of ! Logs in to the console
on/o line agents
users can be achieved many ways. User interviews, observation,
Navigation should be area- and task-
lter tabs from high-profile servers to employee computers.
based ! Reviews Network Activity
round-table discussions. This research directly impacts the
direction of the design and execution.
Multiple windows should be brought ! Sets New Rules
into the “central” portion of the
10
Being able to put his finger to the “pulse of the network”, maintain fine-grain control of
application as much as possible
As part of the TriGeo project, user interviews were conducted
Primary tasks should be brought out traffic and maintain a high level of security is what James relies on. There are gigabits of
over the phone to gain a general insight to usage patterns,
pain points and usability. When progress is made incorporating
of “hidden” contextual menus to be activity happening every hour that he must be able to respond to at a moments notice.
more top-level
this feedback, more focussed research is done to further re ne
Eliminate redundancy in menus
aspects of the application.
There is a separation between menus When James logs in to the application he is able to maintain an overview of his network.
and information
Initial phone interviews were made, however E ectiveUI was
Addition of a Dashboard (Ops Center) He knows the network inside and out and has customized his “workspace” to cater to the
asked to halt further user analysis and focus on the direct
feedback provided by primary stakeholders.
Ability to customize in various ways most critical areas.
Add methods of “progressive
disclosure” allowing users to dive ! Marian Phillips
Altogether, six people were interviewed and written notes were
deeper.
obtained accordingly.
Based on the discussions with users and making an evaluation
Consistency in work ows and
interface elements Novice User Secondary Persona
of the console, a number of target areas were identi ed for
Ops Center
improvement and consideration. Feedback from TriGeo also
helped drive the focus on some of these areas.
Ability to customize view and content Marian is IT support for a 200 employee company. She monitors the network, but also
Ability to add pre-created “Portlets” or
create unique ones
helps with employee hardware and software.
“Work Areas”
Re ne results using a variety of criteria
The first order of business for Marian is checking email, voice messages and the current
In-context options for taking action on status of the network. She receives an email stating that employees are no longer allowed TriGeo Console Project Milestone v_0.1
areas of interest to browse YouTube.com. Last Modi ed: October 30, 2008 9:12 AM
In-line re nement of data
In addition to monitoring the network, Marian can perform a couple easy steps to creating
Context Scenarios
8 a rule to block employees from browsing to YouTube.com. Sure, Marian can view every
! Logs in to the console
EXPERIENCE MAP
network activity, but her primary concern is respondingGlancesimmediate demands of
! to the at Dashboard
enforcing company policies. ! Evaluates network “saves”
The Experience Map acts as a diagram of the “ ow” of an
application. It is important to hone in on this high-level
framework of the application so a clear direction may be
Context Scenarios
established. This map helps the direction of wireframes without
getting too far into the details. ! Demonstrates the application
! Drills into specific features
The content of the Experience Map is based on user research,
a current understanding of the application and methods of
! Clark McCarthy improving usability. As more information is gathered and
Experience Map evolves until a direction has been established.
Executive User Secondary Persona ! George Newstead
Creating the Experience Map was an ongoing process that ran
in tandem with wireframes and creating design compositions.
TriGeo Executive
Clark is CTO for a 3000 employee company and reports directly to board members. inconsistent overlap due to these areas
Although there was some
He likes to keep tabs on the companies networkproduct that being done in parallel, thinking around on the path to a to
George is looking for a response and effectiveness to see and headed wireframes helped
can be white labeled if
TriGeo Console Project Milestone v_0.1
spending all that money on new servers is really paying off. tightenwith required functionality. vice versa.
SaaS offering while delivered on time and areas of the Experience Map and
Last Modi ed: October 30, 2008 9:12 AM
Steve wants an easy-to-use dashboard that allows him to monitor just how great his of the TriGeo Console was generated
In the end, a solid overview
that acts as the foundation for additional development and user
network is running. It also doesn’t hurt that he has high level information he can use is still work to be done and directly
experience re nement. There Context Scenarios
to get get praise from the boss. correlates to the Wireframes. ! Gives a demo
WIREFRAMES : OPS CENTER
! Navigates through features
! Linda Deris
TriGeo Employee
Linda is focused on selling TriGeo offerings. She wants something easy to demo and
TriGeo Console Project Milestone v_0.1 sell while successfully conveying the value, ease and power of the application.
Last Modi ed: October 30, 2008 9:12 AM 20
WIREFRAMES : MONITOR
TriGeo Console Project Milestone v_0.1
Last Modi ed: October 30, 2008 9:12 AM
28
WIREFRAMES : OPS CENTER
34
31
planning only gets you 20% of the way there
92. The Broken Analogy
“A bridge is the sum of its
parts. The pieces of metal
and welds and everything
else all add up to a single,
static bridge. A software
system is the behavior
created by the dynamic
interaction of its parts”
EffectiveUI
The art of building great experiences in software
94. Can we move the bridge 17
feet to the left?
It’s only 17 feet, so that’s
not a big deal, right?
95. We aren’t very happy with
how the bridge looks so far.
Can you propose a change
in the kind of materials
you’re using to make it
more attractive?
96. Remember when you asked us
whether the bridge would ever
need to support vehicle traffic
and not just pedestrian traffic,
and we weren’t sure, so we just
settled on the cheaper
pedestrian version? Well, we
were wrong. What can you do to
make this work for our needs?
97. We’ve hired an offshore
company to start building from
the other side of the valley so we
can cut the construction time in
half. They’re making some
improvements on your design,
so please coordinate with them
to make sure everything comes
together ahead of schedule.
102. 8 criteria for good user experiences:
✓ provide valuable feedback
✓ behave with consistency
✓ behave in a familiar way
✓ be obvious and efficient
✓ be responsive and perform
✓ help people & businesses accomplish goals
✓ be brand consistent & elegant
✓ be progressive & trustworthy
106. Context Scenarios
Logs in to the console
Monitors network feeds
Sets advanced lters
Establishes rules
Receives an alert
Drills down to problem area
Discovers and attack
Quarantines a ected area
James Woo Context Scenarios
Logs in to the console
Power User Primary Persona Reviews Network Activity
Sets New Rules
James is an IT administrator for an internal network of a 3000 employee corporation. He is
on call 24-7 and is responsible for maintaining a very complex, multi-tiered environment,
from high-pro le servers to employee computers.
Being able to put his nger to the “pulse of the network”, maintain ne-grain control of
tra c and maintain a high level of security is what James relies on. There are gigabits of
activity happening every hour that he must be able to respond to at a moments notice.
Marian Phillips
When James logs in to the application he is able to maintain an overview of his network.
Novice User Secondary Persona
He knows the network inside and out and has customized his “workspace” to cater to the
Context Scenarios
Logs in to the console
most critical areas. Glances at Dashboard
Marian is IT support for a 200 employee company. She monitors the network, but also Evaluates network “saves”
helps with employee hardware and software.
The rst order of business for Marian is checking email, voice messages and the current
status of the network. She receives an email stating that employees are no longer allowed
to browse YouTube.com.
In addition to monitoring the network, Marian can perform a couple easy steps to creating
a rule to block employees from browsing to YouTube.com. Sure, Marian can view every Clark McCarthy
network activity, but her primary concern is responding to the immediate demands of
enforcing company policies. Executive User Secondary Persona Context Scenarios
Demonstrates the application
Drills into speci c features
Clark is CTO for a 3000 employee company and reports directly to board members.
He likes to keep tabs on the companies network response and e ectiveness to see if
spending all that money on new servers is really paying o .
Steve wants an easy-to-use dashboard that allows him to monitor just how great his Newstead
George
network is running. It also doesn’t hurt that he has high level information he can use
to get get praise from the boss. TriGeo Executive
George is looking for a product that can be white labeled and headed on the path to a
SaaS o ering while delivered on time and with required functionality.
Context Scenarios
Gives a demo
Navigates through features
Linda Deris
TriGeo Employee
Linda is focused on selling TriGeo o erings. She wants something easy to demo and
sell while successfully conveying the value, ease and power of the application.
user archetypes