Mimicking Your Customers’ Experience

Mimicking Your Customers’ Experience

Mimicking Your Customers’ Experience

hacker-attack

One of the more dramatic and visible aspects of computing in the age of the cloud is the “attack.” Banks, governments, retailers and other high-profile organizations are hit regularly, in many cases daily, by hackers seeking either to steal data, as happened to Target and Tesco very recently, or to sabotage a site, as best illustrated by the Distributed Denial of Service (DDoS) attacks experienced by NATO and the freelancing website Elance.com just this week. Hacker attacks serve as a wakeup call to companies of any size, reminding IT managers and executives of the risks involved in doing business on a globally connected network.

For IT companies, another wake-up call comes from these stories: no matter which letter precedes their “aaS” moniker, as in SaaS, PaaS, DaaS, IaaS or even ITMaas, customers need to feel that they and their industry are understood. Take website design, for example. Websites have grown in sophistication and complexity in the two decades since CERN revealed the very first one  in 1995, but very often the designers of these sites forget the end user experience in favor of a sleek look and feel. Complicated forms, for example as might be offered by a mass transit company, incorporate data from Google Earth into a their own scheduling software in order to assist patrons in choosing the correct bus or train route. But if these forms do not work correctly on a particular device, an iPad or smartphone, for example, then the functionality and convenience is lost. Website designers worth their salt will incorporate a cast of “user profiles” in designing a site, including the student, the grandma, the busy executive, the newly arrived immigrant – all with a different approach to using technology, and with different challenges in understanding commands and procedures for using the site. They will also factor in the variety of user platforms, from old PCs through to the newest phones. Such awareness of a customer’s experience is crucial during both the design and testing phase and can make the difference between success and failure.

Eric Anderson CTO and co-founder of Austin, TX-based CopperEgg, agrees. “A company website represents a crucial element of its presence and transaction capability,” he states. “If the site fails to load in time, customers leave quickly. It’s all about seconds.” Anderson points out that every time a large-scale retail system such as Amazon.com takes more than five seconds to load, thousands of dollars in revenue are lost as customers quickly move elsewhere.

His company addresses these types of issues through monitoring and optimization solutions that constantly analyze traffic and potential data problems so as to alert IT managers and the systems themselves as to possible overload or breakdown situations.

Anderson is careful to reinforce that the type of analysis and monitoring that his company provides is not intended to only be purely procedural for the IT managers – it is intended to ensure that the end user experience is continually positive and satisfactory. He cautions his clients to take the time to truly observe a website or online service from the standpoint of a customer or end user. “You have to mimic the customer experience,” he says, and that is sometimes difficult for experienced, high-functioning IT specialists. “Remember the cup holder,” he states, referring to the age-old computer help-desk joke about a customer who mistook his DVD slide out tray for a coffee-cup holder. Customers do not generally know as much as programmers do, and it is not the customer’s obligation to get caught up. It is up to us as IT specialists to know what they know and what they don’t and to build that in to the functionality, both on the surface, as well as underneath.

As the SaaS industry grows in response to the increased use of the cloud, Anderson cautions that the final letter in that acronym is “service,” which refers to the human beings staring at the screen and not the software itself. Niche services such as those provided by CopperEgg must constantly reinforce the customer experience by truly knowing it: “You need monitoring at the granularity your customers care about. And that’s seconds, not minutes.”

CopperEgg offers a free trial of their monitoring and optimization solutions here.

By Steve Prentice

Post Sponsored By CopperEgg

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Comic
InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Five-part series details companies to watch across five essential technology sectors SAN FRANCISCO, Sept. 27, 2016 /PRNewswire/ — InformationWeek released its list of “125 Vendors to Watch” in 2017. Selected by InformationWeek’s expert editorial team, the companies listed fall into one of five key themes: infrastructure, security, cloud, data management and…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills Cloud technology has completely changed the infrastructure and internal landscape of both small businesses and large corporations alike. No professionals in any industry understand this better than IT pros. In a cutthroat field like IT, candidates have to be multi-faceted and well-versed in the cloud universe. Employers want to know that…

Is The Fintech Industry The Next Tech Bubble?

Is The Fintech Industry The Next Tech Bubble?

The Fintech Industry Banks offered a wide variety of services such as payments, money transfers, wealth management, selling insurance, etc. over the years. While banks have expanded the number of services they offer, their core still remains credit and interest. Many experts believe that since banks offered such a wide multitude of services, they have…

Infographic: The Evolving Internet of Things

Infographic: The Evolving Internet of Things

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…

The Questions of Privacy In The Internet of Things Revolution

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy. Big data comes with big responsibilities and…