28
Thu, Nov
0 New Articles

Collaboration: Working with Non-IT Personnel in Building Technical Solutions

General
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Did you know that, at present, two-thirds of the new applications developed never see the light of day? Wow. That's an impressive statistic. There are several reasons for this, of course, including a development cycle that is too long, unrealistic goals, changing hardware or operating system influences, etc. None of the other reasons for failure to launch, however, occurs as frequently as flawed requirements gathering—that is, the communication between those who need a solution and those who provide the solution is inadequate.

Requirements Discovery

One of the most important activities in the application development process is the gathering of system and user requirements. These are your "marching orders" for things the system should do (functional requirements) and the set of constraints under which the system must run (non-functional requirements). The difficulty in acquiring accurate specifications has long been recognized, and multiple software engineering disciplines exist to validate the requirements collected. The approach may be documentation-intense, with specifications written up, reviewed, signed off, prototyped, reviewed, and so on. Or the approach may be lightweight and agile, with little "stories" about small user tasks representing the specifications and the development cycle being tight and frequent. The purpose, in any event, is to mitigate the risk of faulty requirements discovery.

Non-IT Personnel

As IT professionals, we developers rely on input from a variety of concerned persons called "stakeholders." As the name suggests, stakeholders are those with something to be gained from the successful development of a technical solution. Stakeholders include users, managers, trainers, network engineers, auditors, etc. Generally, these individuals are more than just people with something to gain or lose; they're actually participants in the solution development process. In that respect, each stakeholder will have his/her own perspective or viewpoint.

Multiple perspectives are a natural condition of software development because multiple stakeholders are involved. Each has a personal agenda, and if the agenda is understood, the viewpoint may be evaluated accordingly. One stakeholder's priority may be to minimize payroll, another's to maximize production, another's to improve customer service, and yet another's to look good on the annual audit.

The viewpoint-oriented approach to solution development recognizes that multiple perspectives exist, and it requires a mechanism for resolution of conflicting differences. Sometimes, one stakeholder's viewpoint trumps another's. Determining the respective merit of one against another can be a challenge for machine-oriented personnel. Into the mix, add politics. If the boss favors a particular individual or department, you may be handcuffed. (Have you ever noticed that accounting seems to get anything they want? I think that's because they deposit the checks.) In that atmosphere, the likelihood of failure is amplified.

Application Domain

The environment in which a technical solution operates is called the "application domain." Essentially, this is the specific business or scientific area that the system is intended to benefit. Getting accurate and complete information about the application domain can be difficult for a couple of reasons:

  • Although "non-technical" folks are not computer-oriented, they nonetheless may be very technical within their domain. Frequently, these people will rely heavily on specific jargon to describe their requirements or operating environment. This use of jargon can be a source of misunderstanding or of incomplete communication.
  • Some aspects of the stakeholders' domains may be so familiar to them that they assume that they're familiar to you as well. A stakeholder may gloss over essential details or omit important information altogether.

Interviewing

Most of the system requirements will be discovered through the interviewing process. An interview can be formal, in which a predetermined set of questions is asked, or informal, in which observations are made and questions are asked as needed, or a combination of the two. Some formal questions should be included in even the most casual ad hoc interviews because the direction of the interview may go astray or may get mired in a relatively insignificant topic.

Nevertheless, people like to talk about their jobs, and they usually appreciate being included in the system design process. Your strongest tool, then, is patience. If you expect to garner accurate requirement specifications, you have to put in the time.

Once collected, system and user requirements are organized and grouped into related types. Then, the requirement types are prioritized, conflicting requirements are identified, and resolutions are negotiated. This activity in the process is often assisted by middle management personnel, even though they themselves are non-technical. Finally, when the dust has settled, the requirements are compiled into some sort of document.

Asking Key Questions

Sometimes, users will indicate equal concern about a condition that is the exception, rather than the rule. They will go on about something that, although annoying to them, is minor in comparison with the grand scale of things. To ferret out these sidetracking influences, you should ask questions like these:

  • How often does that happen?
  • When did it happen last?
  • What did you have to do to fix it?
  • But most of the time, how does it go?

Further, you have to crack the code. By that, I mean you must identify the hierarchy of conditions that will, in turn, fire processes. For example, process B is only appropriate if condition A is true. If condition A is not true, then skip over process B and proceed to process C. It can be very difficult at times to get a clear understanding of these rules through the interview process because the dependencies of conditions can be very complex and users tend to emphasize the details of the processing over the higher-level perspective. You may do well to frequently ask "Do you perform that process every time or just sometimes?" or "Does that process apply to all the transactions or just some of them?" This will help keep your understanding of the domain on track.

User Interface Design

For reasons too numerous to mention, the user's interface to an application has become crucial to the application's success. It must be recognized that users do not read. They don't read screens, they don't read error messages, and they certainly don't read manuals. You have to expect this and build your application accordingly. Your user interface, although new and improved, must also be old and familiar. Most successful new systems build on the computer know-how that their users already possess. Any unfamiliar new features should adhere to the principles of affordances (designs that invite proper use intuitively) and natural mappings (making your system operate in a manner that the user intuitively recognizes).

Deploying a New Application

Actually getting the target consumer to adopt a new application can be very tricky. For a number of reasons, people are reluctant to let go of an application they're already very familiar with and strike out on an entirely new course.

Learning a new system is unsettling for the users, but the system developer can diminish this concern if the users have been included in the requirements discovery and interviewing processes. If the users feel that the new system is an outgrowth of their own involvement in the process, they will acquire "pride of authorship," even though they can't write a lick of code. The new application will represent the specifications they themselves asked for, and they will adopt—indeed even defend—the new system.

You have to show the users that you're on their side. They should see that your goal is to genuinely understand their viewpoint through intelligent questions and conscientious observation and that you're prepared to incorporate their requests into the system. They should also see that you intend to make an improvement in the quality of the tools they use to do their job.

What non-IT personnel should not see, however, is your technical solution as a threat to their professional well-being. To that end, you should stress the importance of the user's grasp of the business operations—with or without a new computer system. The application to be deployed, then, is just another tool that is going to make the user's day more productive, satisfying, and predictable. If you have the goodwill of your users, the reaction is positive, the adoption time is minimized, and the effort is more likely to be considered a success.

Believe it or not, there are still people in the world who are uncomfortable with computers. They can feel that the computer is sort of watching them and drawing conclusions as to their performance and reporting it somewhere. These folks usually make a point of announcing their discomfort with computers and so are self-identifying. For them, a soft touch is appropriate. You must be extra patient and non-technical in your dealings with them.

Ironically, these users can provide the most beneficial input to the development process. It's their perspectives that you, as a technical professional, can least anticipate. What may seem obvious to you may not be so obvious to them and vice versa. The back-and-forth dialogue with the stakeholders should not be slighted (especially in the late stages of the development cycle, when deadlines are drawing near and patience is wearing thin).

Knowing the Business

When I was doing the hiring for a large IT installation and I interviewed developers, I weighed strong programming skills at about 50%. That is, being a hot-shot programmer got you about halfway there. Equally important in a candidate's value was knowledge of the business. And, sure enough, the best applications we produced came from a strong understanding of the application domain.

Non-technical personnel, as consumers of our application development services, are the customers. Clearly, with a 66% non-acceptance rate for new applications, they aren't buying everything. We then, as application developers, must continually provide a better product. The traits of the target consumer have to be regarded and accommodated just as though we were trying to get them to buy a house or a car. When it comes to opinions, theirs are really the only ones that count.

Chris Peters has 26 years of experience in the IBM midrange and PC platforms. Chris is president of Evergreen Interactive Systems, a software development firm and creators of the iSeries Report Downloader. Chris is the author of The i5/OS and Microsoft Office Integration Handbook, The AS/400 TCP/IP Handbook, AS/400 Client/Server Programming with Visual Basic, and Peer Networking on the AS/400 (MC Press). He is also a nationally recognized seminar instructor and a lecturer at Eastern Washington University. Chris can be reached at This email address is being protected from spambots. You need JavaScript enabled to view it..

Chris Peters has 32 years of experience with IBM midrange and PC platforms. Chris is president of Evergreen Interactive Systems, a software development firm and creators of the iSeries Report Downloader. Chris is the author of i5/OS and Microsoft Office Integration Handbook, AS/400 TCP/IP Handbook, AS/400 Client/Server Programming with Visual Basic, and Peer Networking on the AS/400. He is also a nationally recognized seminar instructor and a lecturer in the Computer Science department at Eastern Washington University. Chris can be reached at This email address is being protected from spambots. You need JavaScript enabled to view it..


MC Press books written by Chris Peters available now on the MC Press Bookstore.

i5/OS and Microsoft Office Integration Handbook i5/OS and Microsoft Office Integration Handbook
Harness the power of Office while exploiting the i5/iSeries database.
List Price $79.95

Now On Sale

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: