Feeds

Give a little love

Holding hands and stroking egos is good business

  • alert
  • submit to reddit

High performance access to file storage

Sysadmin blog When you unify the user experience, there's going to be fallout. Homogenising the hardware and software environments means change, and sometimes users react badly to change.

I have been ordered to roll out Office 2010 this summer, and I know I have several users who are going to hate it. Helping them through the transition is a big part of the IT department's job, because moving from a haphazard environment to a unified one can be frustrating and disorienting.

The most disorienting thing for any user is a major User Interface (UI) change. A great example of this is Microsoft’s Office suite, which underwent a major UI change between versions 2003 and 2007. It introduced the ribbon bar: some people love it, others hate it.

The order to roll out Office 2010 came with two instructions from above which can be summarised as:

1. Just do it, Trevor

2. Anyone complains, send them to me

There is a category of power mad ubernerd whose introduction to new software is “this is what you get. You will like it because the company says you will”. I hate this approach.

I will comply with my orders and roll out Office 2010. There are a few things I can do to make the lives of my users a easier. I am looking for transition-assisting products. Since Microsoft unfortunately declined to take a smooth deprecation-based approach to recent major UI and feature changes, I have to rely on third parties.

I have relied on UBit menu for Office 2007. It introduces a “tab” in Office 2007 and 2010 that provides the classic menus. It is essential for some users; even power users resort to it occasionally when they can’t find a common feature using the ribbon bar. I also default to not save in docx format, because a lot of our customers can't read docx.

Some users need more, so I go out to all our sites once a year to do maintenance. It’s a chance to check up on my servers, run cable for new workstations or phones and upgrade hardware.

It's a bigger trip than usual this year.

The first new role is a hands-on user trainer. I don’t have the opportunity to train every member of the staff, but I can sit down with anyone who is struggling with the changes. I try to have lunch with a few of them every year and listen to their complaints, real or imagined. Often users are reluctant to report IT problems back to us. Either they think we won't listen, or that it is meant to work that way. It's deplorable.

If you think your IT department will dismiss your problems, it's probably a symptom of inept past - or current - user experience management. And if you expect that computers are always slow and unreliable it is a reflection of the industry's pervasive lack of user experience management.

Proper documentation helps, especially for the things that our users are called upon to perform once a month or less. I wrote some of the code that performs these tasks, but I can't always remember how to make them work.

 It takes seconds to knock together a wiki or a Wordpress install on a corporate LAMP server, a few seconds more to take screen shots and describe them. This isn't a big company thing, and it's free. If you don't do it, the only reason is your own laziness.

Users who were used to flexibility in configuring their environments may react badly to restrictions. They're people, and so can be petty and selfish too. When you eliminate the disparities that currently exist between systems, bear in mind that the disparities may well play an important psychological role for some staff. It's good to have the best computer and the newest software. If you remove this advantage over coworkers, handle it carefully.

I explain to users one-on-one why the changes are taking place. IT can’t afford to make enemies; we are a cost centre, so we rely on the cooperation of other departments as well as management. Only an unhealthy IT department has an “us versus them” mentality.

IT exists to serve the business; the business does not exist to serve IT. Creating a friendly, easy-to-use user environment is a often ignored, but IT is about more than solving technological problems; we have to hold hands and stroke egos so that our technology is used. It saves time, grief and money compared to the alternative: deploying your changes, and waiting for the storm.

High performance access to file storage

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.