Mimicking Your Customers’ Experience

Mimicking Your Customers’ Experience

Mimicking Your Customers’ Experience

hacker-attack

One of the more dramatic and visible aspects of computing in the age of the cloud is the “attack.” Banks, governments, retailers and other high-profile organizations are hit regularly, in many cases daily, by hackers seeking either to steal data, as happened to Target and Tesco very recently, or to sabotage a site, as best illustrated by the Distributed Denial of Service (DDoS) attacks experienced by NATO and the freelancing website Elance.com just this week. Hacker attacks serve as a wakeup call to companies of any size, reminding IT managers and executives of the risks involved in doing business on a globally connected network.

For IT companies, another wake-up call comes from these stories: no matter which letter precedes their “aaS” moniker, as in SaaS, PaaS, DaaS, IaaS or even ITMaas, customers need to feel that they and their industry are understood. Take website design, for example. Websites have grown in sophistication and complexity in the two decades since CERN revealed the very first one  in 1995, but very often the designers of these sites forget the end user experience in favor of a sleek look and feel. Complicated forms, for example as might be offered by a mass transit company, incorporate data from Google Earth into a their own scheduling software in order to assist patrons in choosing the correct bus or train route. But if these forms do not work correctly on a particular device, an iPad or smartphone, for example, then the functionality and convenience is lost. Website designers worth their salt will incorporate a cast of “user profiles” in designing a site, including the student, the grandma, the busy executive, the newly arrived immigrant – all with a different approach to using technology, and with different challenges in understanding commands and procedures for using the site. They will also factor in the variety of user platforms, from old PCs through to the newest phones. Such awareness of a customer’s experience is crucial during both the design and testing phase and can make the difference between success and failure.

Eric Anderson CTO and co-founder of Austin, TX-based CopperEgg, agrees. “A company website represents a crucial element of its presence and transaction capability,” he states. “If the site fails to load in time, customers leave quickly. It’s all about seconds.” Anderson points out that every time a large-scale retail system such as Amazon.com takes more than five seconds to load, thousands of dollars in revenue are lost as customers quickly move elsewhere.

His company addresses these types of issues through monitoring and optimization solutions that constantly analyze traffic and potential data problems so as to alert IT managers and the systems themselves as to possible overload or breakdown situations.

Anderson is careful to reinforce that the type of analysis and monitoring that his company provides is not intended to only be purely procedural for the IT managers – it is intended to ensure that the end user experience is continually positive and satisfactory. He cautions his clients to take the time to truly observe a website or online service from the standpoint of a customer or end user. “You have to mimic the customer experience,” he says, and that is sometimes difficult for experienced, high-functioning IT specialists. “Remember the cup holder,” he states, referring to the age-old computer help-desk joke about a customer who mistook his DVD slide out tray for a coffee-cup holder. Customers do not generally know as much as programmers do, and it is not the customer’s obligation to get caught up. It is up to us as IT specialists to know what they know and what they don’t and to build that in to the functionality, both on the surface, as well as underneath.

As the SaaS industry grows in response to the increased use of the cloud, Anderson cautions that the final letter in that acronym is “service,” which refers to the human beings staring at the screen and not the software itself. Niche services such as those provided by CopperEgg must constantly reinforce the customer experience by truly knowing it: “You need monitoring at the granularity your customers care about. And that’s seconds, not minutes.”

CopperEgg offers a free trial of their monitoring and optimization solutions here.

By Steve Prentice

Post Sponsored By CopperEgg

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…