Verified Document

New Software Application Versus What Users Want Term Paper

Software Application Debate Computer users may not be interested in how software actually work, but they certainly want to be able to get the hang of things easily and without much trouble. When Microsoft or any other firm for that matter comes up with a new software application, initially there is apprehension as people are afraid of the unknown. While they are keen to see how the new software benefits them, they are also scared of what they might encounter and many feel more comfortable with the old version. But software developers know how the new software application offers increased functionality and thus are keen to help people accept the new software quickly. It is important to understand that oftentimes software may not offer exactly what the customer desires because there software developers are more concerned about functionality than they are about people's wishes and expectations.

For example with every new version of MS operating system, people are expecting some...

What people fail to understand is that software involves complicated coding and it is more important to make them work properly and offer as many conveniences as possible. For this reason, it is not possible to meet the demands and expectations of users. The best thing thus is to find a middle ground where both the users and developers can agree. This middle ground is the place where developers can actually see users being more accepting of the new software. In short, despite all the apprehensions, what users really want is to be able to understand the new software. They don't want the developers to hand them something that appears complicated or does something without them knowing about it.
For this reason, the three important rules of software design are transparency, defaults, and configurability. The more these rules are followed, the easier you make it for the users to accept the new application. Transparency refers…

Sources used in this document:
Reference

1) Software functionality: Accessed online 26th Jan 2005: http://www.meridium.com/software/convinced/index.asp
Cite this Document:
Copy Bibliography Citation

Related Documents

Software Applications: Vulnerabilities and Controls
Words: 1237 Length: 4 Document Type: Essay

All of these tools make it possible for a hacker to not only corrupt the application itself in terms of accessing confidential information, but further allow for the hacker to spread damage deep into the application to attack other systems, essentially able to shut down an entire application with the corruption of contained information. Though some of the aforementioned tactics involve the physical infiltration of a company in order to

Improving the CRM Suite of Software Applications
Words: 3357 Length: 9 Document Type: Essay

Improving the CRM Suite of Software Applications at SAP SAP AG (NYSE:SAP) is the worldwide leader in Enterprise Resource Planning (ERP) and one of the top companies globally in Customer Relationship management (CRM) software as well. While their dominance in ERP is solid, with Gartner, a leading industry research firm reporting that SAP has 25% global market share today, it's global CRM market share trails Salesforce.com who is the worldwide leader

Software Processing Methodology Understanding the Problem Klyne
Words: 7750 Length: 20 Document Type: Dissertation

Software Processing Methodology Understanding the Problem Klyne Smith, DSE Candidate Dr. Frank Coyle Technical Motivation Research and Contribution Methods Software Processing Methodologies Waterfall Methodology Strengths Weaknesses Opportunity Threats Iterative Methodology Strengths Weaknesses Opportunities Threats Model Methodology Strengths Weaknesses Opportunities Threats Where do we go from here (Spring 2010)? Define measurement data points for Test Case analysis Section IV Creation and Validation of the predictive model Section V Summary Analysis Practical Usage Praxis Conclusion Books Articles / Web Information Software Processing Methodology: Understanding the Problem Section I: Introduction In this work, I examine three different Software Processing Methodologies. I start with the iterative model, followed by the spiral

Software Testing Strategy
Words: 8852 Length: 24 Document Type: Term Paper

Software Testing Strategy Computers and their applications have brought about waves of changes in various areas of science and technology. It is also gaining widespread prominence in the field of business and management. So the requirement of a quality oriented technological implementation, having a range of usage is the order of the day. The few gazillion dollars worth software industry is constantly evolving with the needs of people and organizations across

Software Defense Establishing Software Security
Words: 996 Length: 4 Document Type: White Paper

Allowing for such access necessarily creates a point of weakness, and this must be carefully guarded against through many levels of protection (Stuttard & Pinto 2007). Many of the same steps that are employed in access differentiation as described above can also be employed here -- multiple levels of access that is password protected, strict compartmentalization of data and of processes, and other features such as the recognition and

User Perceptions and Online News
Words: 6474 Length: 24 Document Type: Research Paper

A survey questionnaire design is employed to gather data to be used in the lazy user model test, with details on the sample population in which the questionnaire is to be administered. An innovative method to increase response rate is offered, followed by a data analysis plan. Finally, a conclusion and recommendation will complete this research project. 2. Literature Review 2.1 Information Technology and the Internet The Information Age has changed our

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now