Feeds

Payroll jobs and Canucks on an iPhone

Three projects, many lessons

  • alert
  • submit to reddit

SANS - Survey on application security programs

Sysadmin blog I am supposed to crank out a set of articles about NTFS and Share permissions, but I'm changing the topic: user experience management.

This coincides with a series of IT-related but not IT-led projects at work. The projects allowed me a chance to see how other individuals approached the provisioning of IT services, from which I learned a lot.

The first project is the rollout of a new payroll system. To users, payroll is a mundane item. From an accounting perspective new payroll systems are stressful events. The closest IT analogue I can think of is a major operating system upgrade: think taking your entire network from NT5 to NT6. Most bean counters are not power users, and watching a rollout such as this happen, without much interaction with IT, is enlightening in two ways.

Firstly, all technical information related to the project was doled out by the payroll company at metered intervals. We didn’t find out the IT requirements until the end of the project. We haven’t set up the hand scanner yet because can’t get firm details on what systems the payroll company requires. Plenty of hoopla about how excellent their software and labour saving accounting procedures are; not very timely with the details.

The second observation is much more positive. I watched as the payroll company provided an exhaustive amount of information to our bean counters about how to use the software. Videos, live support conferences, reams of documentation and step-by-step instructions for absolutely everything. Provided of course you are using the environment they assume, which sadly relies on Internet Explorer.

It's positive because the bean counters were able to train staff, entirely on their own, how to use this software. There should have been more inter-departmental communication, especially when bugs and browser problems popped up, but the documentation provided by this company was excellent. The accounts department rolled out the software almost entirely without IT’s help.

They are impressed by the software. I’m more jaded. From an IT perspective, it’s primitive. I am sure it ticks the right boxes for regulatory compliance and ease of use, but the software raised no interesting flags. The presentation however, and the level of support, were superb. Dress up mediocre software right, and people will fall over themselves to use it.

The second project involved tweaking and testing some XML-based templates that fuel a java app we present to customers so they can place orders with us. Changing a bunch of variables, then launching the app and testing it to see if it blows up is monkey work. Template design takes skill and talent; testing templates takes nothing more than the ability to pay attention. Regardless, the CEO of the company ended up spending an entire day testing templates because there was nobody else to do it.

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
IBM rides nightmarish hardware landscape on OpenPOWER Consortium raft
Google mulls 'third-generation of warehouse-scale computing' on Big Blue's open chips
It's GOOD to get RAIN on your upgrade parade: Crucial M550 1TB SSD
Performance tweaks and power savings – what's not to like?
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.