Category Archives: Nadyne

from the “not getting it” files …

Recently, I got recruited.  Badly.

Nadyne,

I am a recruiter at [somewhere] and am searching for an experienced User Experience Researcher to work at our corporate headquarters in [the Bay Area]. I saw your profile on LinkedIn and thought you might be interested or might know someone who is.

We are looking for someone with 5+ years experience and

• Mastery of user experience research methodologies
• Successful track record conducting Qualitative and Quantitative research studies
• The ability to drive the creation and adoption of new research methods and tools, including reporting tools and
• Extensive knowledge of usability methods

If you are interested or know anyone who is I can be reached at [somewhere]

I look forward to hearing from you.
[recruiter]

I gave the email the response it deserved:

[recruiter],

http://www.nadynerichmond.com/blog/2012/06/07/the-flip-side-of-unsolicited-resumes/

Regards,
Nadyne.

It probably took me longer to write my email than the recruiter spent on their mail, since it took me a couple of minutes to find the blog post.

There’s nothing in the recruiter’s post about me.  I mean, I suppose I could give him points for spelling my name properly, but given that the rest of the mail is cut-and-paste1, I’ll assume that he’s capable of cutting-and-pasting my name too.   It just correctly identifies that I’ve got more than five years of experience as a user researcher.  There’s nothing in that mail that does anything to sell me on why I would want to work at that company or in that role.  It’s lazy recruiting, and I’m not going to invest my time in talking to a recruiter that can’t be bothered to do the most basic part of recruiting.

Amusingly, I got the following response:

Nadyne,

This is a great article.

Thank you.

[recruiter]

It is, isn’t it?  Except either (a) you didn’t read it, or (b) you read it but didn’t actually comprehend how it applies to you and your lazy recruiting.

  1. Although you might have noticed that the bullet point about “ability to drive creation …” is cut off.  That’s not actually in the job ad that’s listed on the company’s website, so apparently he’s not even that great at cutting and pasting.

software costs money

In light of the news that the Sparrow guys got bought out by Google, there’s been a lot of hand-wringing.  Comments threads about this news have been full of people whinging about Sparrow “selling out”.  But here’s the thing: software costs money.  People who make software are a relatively rare breed — and I’m saying this from Silicon Valley, where we’ve got to have a higher concentration of software engineers than anywhere else in the world.

It used to be that you’d spend a hundred bucks or more on software.  This is still true in rare cases: Amazon says that the cheapest version of Office:Mac is $100 (the version with Outlook adds another $50), OmniGraffle costs $100 from the App Store.  Sparrow rang in at $10, or $3 for the iPhone version, and I saw plenty of people whinging about its high cost.

Software does not just magically occur.  Good software takes a lot of time and expertise.  If it were easy to create good software, there’d be a lot more of it out there, and I wouldn’t’ve burnt so much time trying to find a reasonable replacement for Quicken for Mac1, or a desktop calendar app that supports CalDAV2.  For software to be really good, you need the following:

  • a software engineer or two
  • a tester or two
  • someone to write the documentation3
  • someone to make sure that your application’s architecture supports future growth

Now, in some cases, you can get away with all of this being the same person.  But that’s a lot of work for a single person.  It’s a lot of work for multiple people if the app gets complex enough, and I’ll tell you from a lot of experience that a mail app like Sparrow is a lot more complex than is obvious on the outside4.

But let’s just assume that this is a single software engineer.  There’s two ways to go about this.  You can do it in addition to your day job, which means that you don’t have a lot of time to focus on your side project, and it also means that you’re giving up much of your personal life so that you can have this side project going.  Your day job pays your bills, your side project is something that you love and think is awesome, and that you really hope will take off enough one day so that you can quit your day job.  Or you can quit your day job and try to live off of savings for awhile (or your partner’s income, if applicable), and work full-time on this so that you can make it into something self-sustaining.

Neither case is sustainable unless the app really takes off.  And by “really takes off”, I mean “can pay your bills at least as well as your day job”.

The other thing is that consumer software sells in cycles.5  You’ve got two major events where most of your software is sold: one in the late summer as students prepare for the upcoming school year, and one late in the year for holiday shopping.6  You’ll get another spike for a new version, but most software doesn’t have a new version every year, and software vendors often try to time their new versions to line up with either the school or holiday shopping seasons to take advantage of the time when consumers are already in the shopping mood.  Smaller spikes occur, such as when you get some good press from a positive review, but usually reviews are clustered around release time.  So you make most of your money during those two spikes, and that money has to last throughout the whole year, plus help you make investments on the next version.

At some point, we as consumers stopped wanting to pay money for software.  Some of that is that our computers were bundled with a lot of software so that we didn’t have to pay for apps that we use every day, like mail apps and web browsers.  Some of that is that companies who don’t primarily make their money elsewhere (say, on selling you computers) started selling their software at a steep discount, which depressed the overall market.  Some of it is that some software is now supported by ads, which reduces the out-of-pocket expense for the consumer (although there’s obviously the cost of having to view ads all the time).  And some of it is just that we as consumers have become a lot of whiners who have come to think that software should just come to us magically, continue to work on any hardware that we buy, and get updated with new features regularly.

David Barnard at App Cubby wrote a great post about this called The Sparrow Problem, which discusses his own experiences in selling software via the App Store and includes his own back-of-an-envelope calculations about what it takes for an app to be sustainable for an indie developer.

I don’t blame Sparrow for accepting a Very Large Cheque from Google.  They hit the hard reality of software development: software costs money.  For the software developers, there are always bills to pay (both their own and those associated with making the software).  A good software engineer is never lacking for offers to go elsewhere, because good experienced engineers are hard to come by, and software recruiters are relentless7.  There’s always an opportunity cost associated with spending your time on something — you could be spending it on something else and, quite possibly, making more money in doing so.  When you’re not making enough money on your application to be self-sustaining, it’s not hard to understand why they would accept that Very Large Cheque.

And I say: good on ’em.  Gmail could use the talent of some smart IMAP and UI engineers.  Google made a good decision in buying them out, and I think that Sparrow made a good decision in accepting their offer.  I hope that Gmail improves because of it.

  1. My final answer: Fusion + Windows 7 + Quicken for Windows.  None of the Mac-native apps came anywhere near covering my use case.  I’m not happy continuing to support Intuit, but they’re the only ones who support my use case, and Quicken for Windows is so much better than Quicken for Mac.
  2. iCal sucks, BusyCal isn’t quite there yet but is a lot closer.  I was happy to pay the $50, since that was much cheaper than whatever hospital bills I would have incurred when I stabbed my eyes after using iCal for too long.
  3. Even if it’s just the tooltips on the screen, otherwise you end up with useless tooltips
  4. IMAP isn’t a very well-written standard, resulting in a lot of work getting your client to work with the various IMAP servers out there.  If you start off by focusing on a server that doesn’t do a very good job following the not-very-well-written standard *cough*Gmail*cough*, then you’ve got a big job ahead of you in trying to extend your client to other IMAP clients.
  5. Disclaimer: This is my experience from working at Microsoft on Office:Mac.  I don’t work on consumer software at VMware.
  6. Black Friday isn’t good for just retailers.  It’s good for software vendors and others who are selling their merchandise through retailers, too.
  7. Which reminds me – I should write a post about the clueless recruiter who recently contacted me.

pay attention to your users

One of my colleagues, Ben Goodman, wrote a great post on the VMware end-user computing blog that essentially says “pay attention to your users”.  Okay, he titled it “what rogue users and cloud services can tell IT”, but my little researcher heart went pitter-pat when I read the post and saw that it was all about listening to your users.

Consider this paragraph:

Each time employees make a decision to choose a cloud service outside of the IT department, it’s an opportunity for IT to learn where those users are being underserved and to develop solutions that do fit the enterprise security, governance, and compliance requirements. So, in that sense, rogue services are a great opportunity for IT and they need to see it that way. Instead of looking at these service, tools and devices as unwanted invaders, IT needs to see them as what they are, leading indicators of their real customers’ needs.

And he’s totally right.  Pay attention to what your users are actually using, and you’ll learn a lot about what they need, what they want, and what hoops they’re willing to jump through to get what they want.  This will help you provide better IT services, better software, and a better user experience.

security policy-management user study

It’s research time!  In addition to the troubleshooting study that my team is conducting (and please, check out my blog post for more information, we’re still looking for participants for that), we’re also conducting research about security policies.

My team is conducting a study next week on security policy management in a virtual infrastructure. We would like to talk to people who manage and/or implement security policies in their virtual environment to learn about their work and get some feedback on our current initiatives.  If you are interested in participating, fill out this very short survey to answer a few questions and give us your contact information.

news cat gifs

Yes, I know, the title sounds like it’s spam, but bear with me.  The coolest tumblr that I’ve found lately is News Cat Gifs: animated .gifs of reporters cats reacting to news events.  It’s hysterical, and I have to say that no small number of them apply to my job as a researcher …

Okay, that’s enough animated gifs for now, go find your own favorites.

research participants needed

Edited on Friday 7/13 at 11am: Thanks for your interest!  We now have all of the participants that we need.  But we’re still looking for people who would like to participate in research about security policies … 

My team is conducting some research about troubleshooting in virtual environments.  If you’re a virtual infrastructure architect or senior admin who does a lot of troubleshooting, we’d love to hear from you.

For this study, we are looking for people who perform troubleshooting tasks in their VMware environment and are willing to share their experiences with us.  For those of you who are local to the Bay Area, we can either come to you and chat with you in your environment, or we can do a conference call.  For those of you outside of the Bay Area, we’ll do a conference call.

Our research will be conducted beginning on July 9.  If you’d like to participate, please email me with the following information:

  1. Your name, email address, and telephone number.
  2. How big is your virtual environment?  (number of hosts, number of VMs, etc)
  3. What kind of issues do you troubleshoot?
  4. What tools do you use for troubleshooting?
  5. Does your organization use vCenter Operations? (We’re looking for a mix of people who do and don’t use it.)
  6. Would you be willing to show our researcher the tools you use for troubleshooting your environment via during an online screen-sharing session (such as WebEx)?

Feel free to share this blog post with anyone you know who might be interested in chatting more with VMware about troubleshooting.

a small personal note

Tipsy, my 18-year-old Maine Coon cat, passed away yesterday at about 12:30.  I acquired him as a six-month-old abused kitten, and we haven’t been separated since.  I’ve had him for literally half my life.  And now, I don’t.

Eighteen years is longer than I ever could have asked for, and not nearly long enough. Rest in peace, Tipsy.  I’ll miss you more than I will ever be able to articulate.

Tipsy snoozing, March 2010
Tipsy, asleep on the sofa in March 2010

how to disguise bad research

There’s a lot of bad research out there.  And there’s lots of ways to disguise bad research.  Perhaps I’m just overly sensitive to it, but it seems like one awesome way to disguise your bad research is via the use of infographics.

Take, for example, this infographic about the relative impact of social media activity between Google Plus, Facebook, and Twitter.  In their research, they say that getting more Google Plus activity to be most closely correlated to increased visibility in Google results.

Now, I actually found this picture that explains the differences in social media via donuts1 to be more accurate.  I just went and looked at my G+ page.  I follow ~100 people there.  Now, I freely admit that my sample isn’t anything that could be remotely considered to be statistically significant, and my sample is clearly skewed towards my friends (who are, generally speaking, geeks), but here’s the posts that I found from the past seven days:

  • A Google employee2; he generally posts to G+ first and then (I probably shouldn’t give his secret away) posts to Facebook.
  • A friend who is cross-posting everything from Twitter to G+.
  • My employer, who also appears to be cross-posting everything from one of our official Twitter accounts to G+.
  • A friend whose blog automatically posts a link to G+ whenever there’s a new post.
  • A friend, who is not a Google employee, who appears to be actually using G+ to post content.  It appears that he’s posting weekly-ish.

Looking over my own experience, this research just doesn’t sit well with me.  I don’t know what I could do that would actually get 100 “+1” activities on G+, whereas my recent Facebook post acknowledging my wedding anniversary got ~70 likes and comments within the first 12 hours of the post.

Leaving aside my own experience, though, their methodology seems pretty dodgy.  They say that they got 100 G+ followers, and that increased their Google ranking by 14.53; on the other hand, getting 50 Facebook links and shares increased their ranking by 6.9.  And they even note that their methodology is dodgy, since they conducted their experiment in different markets with varying degrees of social media sophistication.  Also, it’s somehow a surprise that Google’s algorithm would give a higher ranking to activity on G+ rather than a competing site?

But they’ve got a pretty infographic, and they’re trying to sell you search engine optimization solutions, so it must all be good.  Their conclusion is just as slimy as you might expect from someone doing such bad research:

Regardless of the individual results, this study is another confirmation of the growing consensus that any well-rounded SEO strategy will have to embrace an element of social media signals.

Yeah.  This study is totally confirmation that you need their services!  I guess they get credit for being less shady than the fake malware scammers, but I prefer to set the bar higher than that.

  1. In my very quick search, I couldn’t track down the originator of that picture. If you know, please share with me, and I’ll update my link so that the appropriate person gets the credit they so richly deserve.  If they’re local, I’ll even buy ’em a donut.
  2. Who, to the best of my knowledge, isn’t a fan of donuts.

using VMware Workstation to thwart a fake antivirus scammer

I’ve gotten a bunch of fake antivirus/malware scammers calling my home lately.  Like others, sometimes I take delight in stringing them along, playing dumb while they try to get access to my machine.  Sometimes, I’ll ask them, “What’s Windows?”, waiting for them to figure out that I’m not actually a Windows users at all.  Or sometimes, when they tell me that they’re from Microsoft, I’ll use my old Microsoft credentials and say, “wow, I wasn’t aware that we were being more proactive about this, I’m so glad that our company has decided to do more to eradicate malware”.  Once they realize that they have someone technically adept on the call, they hang up instantly.

But I’ve never strung them along like this.  A couple of weeks ago, one of these scammers cold-called a security researcher from Sourcefire.  The security researcher immediately knew that it was a scam, but he decided to take it a step further: he quickly set up a virtual machine for them in VMware Workstation, and let the scammer go to town: “I realized I could give them an environment to bang around in”.    So the scammer installed LogMeIn, and then he watched (and, yes, captured video) while the scammer disabled Windows Services and VMware services (but not actually realizing that this means that he’s in a VM!), all the while insisting that he’s removing malware. Then they force a reboot under Safe Mode, which (given that they’ve disabled everything) won’t work properly.  This is how they try to get the victim of their scam to freak out and give them their credit card details, and likely will leave the victim with a computer that won’t work at all unless they can find someone else who can figure out that it’s simply that Windows Services have been disabled.

Dark Reading has a good breakdown of the security researcher’s call, and a shortened version of the call is available on YouTube.

clustering programming languages

Back in my programming languages days, when I was on the committee for a programming languages conference, I spent lots of time arguing the pros and cons of certain languages1.  I still keep an eye on the programming languages community, even though I haven’t been actively involved since I was the Industry Chair for OOPSLA 2008.

So when I stumbled across this project by a couple of people at UC-Berkeley to cluster programming languages, of course I was interested.  They’re collecting opinions about programming languages via survey, and drawing plenty of interesting observations from the data that they’re collecting.  They’re showing correlations for various properties about the programming languages.  For example, there’s a high positive correlation between “I would use this language for writing server applications” and “the thought of using this language in 20 years fills me with dread”, which I have to admit made me laugh out loud.  There’s a high negative correlation between “code written in this language will usually run in all the major implementations if it runs on one” and “I would list this language on my resume”, another correlation which made me laugh.  Actually, all of the high correlations for “I would list this language on my resume” are pretty interesting.

For my fellow programming language geeks, you should definitely check out this site. And, of course, you should fill out the survey and help further their research!

  1. Smalltalk is the One True Language.