Software Information |
|
Five Tips For A Great Software Demo
Whether you need to close a sale, gather end-user feedback, show progress to your customer, or simply explain how your product works, sooner or later, you will need to demo your software product. Over the years, I've had the opportunity to perform hundreds of demos to audiences of various sizes. I've also had the chance to attend demos hosted by others. The following represent the top 5 tips I've learned over the last decade regarding demos. Manage Your Audience's Expectations Have you ever gone to see a movie everyone raved about and walk out totally disappointed? More often than not, moviegoers feel let down not because the picture was bad, but rather because it was worse than they anticipated. It didn't meet their expectations. Similarly, if people show up to a demo thinking they're about to see a finished product, they expect it to be virtually defect-free, aesthetically pleasing, and user-friendly. They wouldn't be impressed for example with a Web-based application that contains typos or JavaScript errors if they're under the impression it's going live in a week. However, if they know beforehand that you're presenting a throwaway prototype, this same audience will be much more lenient. And they will gladly provide much-needed feedback to help you with your work in progress. Managing your audience's expectation is critical to a successful demo. If you want them to walk away from your presentation pleased, make sure you set the right expectations beforehand. Be honest with them. Don't try to oversell your demo. Just sell it, and try to over deliver. One Bad Apple Spoils The Whole Bunch All it takes to screw up a demo is one person. If someone starts negatively critiquing every single widget in your application or constantly interrupts you simply because he/she likes to hear the sound of his/her own voice, your demo will be a disaster. It is your job to ensure that these bad apples don't show up to your presentation. Unless you're hosting a closed-door demo, it's very hard to control who will attend it. Omitting someone from your invitation list doesn't guarantee they won't hear about your demo through word-of-mouth and simply show up. Here are a couple of ways to trick bad apples into not attending your demo:
I'm well aware that these two tips sound like an excerpt from Scott Adams's Dilbert And The Way Of The Weasel, but unless you feel comfortable telling your peers, superiors or customers not to show up to your demo, these two options are pretty much all you're left with. Do A Practice Run I attended a demo last week hosted by the CEO of a local start-up. After meeting with him at a trade show, he managed to convince me that his company had developed a technology that could solve one of my client's needs. I therefore agreed to give him 30 minutes of my time so he could demonstrate his product's capabilities. I didn't need 30 minutes to realize I didn't want to do business with him. All I needed was 30 seconds. This guy couldn't even log in his own Web-based application! He spent the first 10 minutes of the demo looking for a password. Always do a practice run on the system that you're going to use during the actual demo. You might know the application like the palm of your hand, but if someone else has access to your demo system, who knows what shape it's in. They might have removed services, upgraded components or, as was the case with this CEO, changed the user credentials without informing you. Unless you don't mind looking like a fool, always do a practice run on your demo system before presenting to your audience. Pay Attention To Details The hundreds of demos I've performed over the years have taught me that people pay more attention to how the application looks than what it does. You software might be the solution to world-hunger but if a member of your audience notices a typo in your GUI, he/she will point it out! Readers are especially distracted by readable content ? and that's a fact. Deal with it by carefully reviewing the text on your interface and in your graphics. If you don't have the time to review and finalize the text, use Lorem Ipsum. Lorem Ipsum has a more-or-less normal distribution of letters, thereby making it look like readable English yet not distracting your readers. I now develop new prototypes strictly with Lorem Ipsum and add actual text when and only when I have time to write content that I know won't become a subject of discussion at my next demo. I strongly advise you to do the same. Point Out The (Obvious) Bugs Software contains bugs. It's that simple. Anyone who doesn't agree with that statement clearly hasn't worked in the software industry for long. Although we sometimes strive for defect-free products, reality is complex systems always contain defects ? even when they're generally available. Doing a practice run before your demo will allow you to identify and resolve the showstoppers, and using Lorem Ipsum will deal with the nitty-gritty details that would otherwise distract your audience. But what about the other defects attributed to Murphy's Law? In the event that an obvious bug does display itself during your demo, point it out! In all likelihood, your audience will have already noticed the bug. Any attempt to hide it will give them the impression that you're not being honest. Consequently, they'll start to wonder what else you're trying to cover up. Point out the bug, explain that you have a solution, confidently state that the fix will be implemented by a specific date, and move on. This sincere behavior will reassure your audience that (a) you're not trying to sweep one under the rug and (b) the defect will be resolved by the time they deploy your system. I'm not advocating that you go hunting for bugs during your demo. If you can circumvent them by any means, please do so. But if a defect does surface during your presentation, don't pretend it doesn't exist. The only person you'll be kidding is yourself. Conclusion There you have it. Five tips for a great software demo. Do these 5 tips represent all I've learned over the hundreds of demos I've hosted? Absolutely not! The hardest part about writing this article was probably limiting it to 5 tips. I could have easily thrown in 5 more tips such as (a) control the situation, and (b) always have a plan B. But the goal wasn't to point out all the tips that can help you out. Only the very top five! Luc Richard holds an MBA with a major in high technology. For the past 10 years, he's been managing the development of software applications. He is the founder of The Project Mangler (http://www.projectmangler.com), an online resource that publishes free articles, stories, and other ready-to-use tools to help developers, team leaders and managers deliver software projects on time, according to specs, and within budget.
|
RELATED ARTICLES
Microsoft Update - 5 Reasons to Update Service Pack 2 Microsoft released Service Pack 2 (SP2) for the Windows XP operating system back in August (2004), representing significant improvements in many areas, especially system security. For those people that are still unsure whether they should update to it, the following five reasons may help make the decision easier. Manufacturing Outsourcing: Microsoft Great Plains Implementation, Customization & Reporting Manufacturing in the USA is far away down from mid 20th century top of the hill or its golden time. However we are in very competitive business environment and we have to do what market tends us to do. Nowadays competitive offshore manufacturing labor cost outweighs custom clearance fees and forces us to have not full-size manufacturing, but rather final assembly facilities here in the US distribution centers, such as Chicago, Nashville, Los Angeles. We'd like to give you successful implementation/downsizing/outsourcing scenario of mid-size machinery manufacturer. Microsoft Great Plains - Typical Problems And Fixes ? Overview For IT Administrators How to delete the user? This is the first problem you encounter - when user shuts down the computer - Great Plains doesn't have the command to log off the user and when user tries to login the next day - she gets error message that user is already logged on. The fix: Cisco Certification: Introduction To ISDN, Part III Configuring PPP PAP Authentication Microsoft Great Plains Nationwide Remote Support ERP Consulting industry is on the way to serve clients nationwide and even worldwide, when the client is multinational corporation. There are several reasons to specialize in remote support. In this small article we'll give you these reasons and the advantages of remote installation, customization, integration, programming, reporting. Tripwire for Linux File Integrity What is Tripwire? Device Driver Basics Most people understand that the "hardware" part of their computer is the real physical parts, like the keyboard, mouse, modem, hard drive and so on. They understand that the "software" is computer bits stored on the hard drive, CD-ROM, or other storage media. But most people are a little hazy about exactly what a "driver" is. Microsoft Great Plains Customization: Project Organization ? International Business Example Microsoft Business Solutions Great Plains fits to majority of horizontal niches and clientele in the USA, Canada, Mexico, Latin America, U.K., Brazil, South Africa, Australia, New Zealand and Middle East. If you are project organization: Real Estate, Law Firm, Placement Agency with permanent clients, Construction or Freight Forwarding company ? you probably use or plan to deploy Project management or Project accounting extension for Microsoft Great Plains. If you have your business in one country ? this work relatively simple, however we see clients, involved into international business, when your headquarters is located in the US for example and offices and locations are in Mexico. Let's look at your options: Demand More From Your Lead Tracking Software An integral part of any quality CRM system is lead tracking software. This is the part of the system that helps you gather customer data from your sales force. The ideal lead tracking software package, however, won't just tell you where the sales are coming from, but will help generate revenue by pointing sales representative to higher conversion segments of your customer base. Computer Based Language Development and Spell-checking Language development computer: Computer-based method for aiding language development seems like an interesting idea, the trick with this would be in getting the computer to take on part of the role of the human in the checking process. SSH (SCP) Send Files from Windows to Your Linux Box Not all of us have the luxury of working both at home and at work on a UNIX based system. However that doesn't mean you can't transfer files safely and securely between the two systems. Microsoft Small Business Manager eCommerce ? Overview Microsoft Business Solutions Small Business Manager is scaled down Great Plains Dexterity based version of Microsoft Great Plains or former Great Plains Dynamics/eEnterprise. Small Business Manager first release 7.0 and all the following version was available on MSDE (MS SQL Server 2000 with limited usage and database size ? 2GB maximum). It is nice situation on the market in eCommerce niche ? we see huge number of customers, who have purchased and implemented SBM for their small and mid-size businesses and then realized that customization options for Small Business Manager are very limited: in comparison to Great Plains SBM doesn't have VBA/Modifier, it has very restricted version of Integration Manager. These restrictions lead you, eCommerce developer to direct SQL programming. Again ? being scaled down version of Microsoft Great Plains ? Small Business Manager has a legacy of relatively complex tables structure. tom stored procedures way here: Tools for Customizing Great Plains Microsoft Business Solutions ? Great Plains has captured the US market with its integrated business applications for small and mid-size organizations. Its comprehensive accounting and business management capabilities provide businesses with tools to customize various modules of the Great Plains software. These tools have been proven to have contributed to business growth and tighter control over its processes. Adware and Spyware Blockers The most important things you can do for your computer right now is to install adware and spyware blockers. Everyone is aware of computer viruses and run an anti-virus program to guard your computer against them. Intro to UNIX Shells A UNIX Shell is in simplest terms, a command line interpreter, that takes the users input and gives it to the Kernel. If you are familiar with DOS, you will remember the 'command.com' that file takes the users information and passes it to the operating system in a way it can be understood by the system. With DOS you only had one type of shell, but with UNIX you have a variety, each with their own abilities, pluses and minuses. Microsoft Great Plains Integration Manager ? Advanced Techniques Great Plains Integration Manager scripting and translation - overview for programmer, software developer, database administrator, IT specialist Is Your Family Protected? When you think about Security, what do you think of? We all have one device or another to assist in keeping us safe. We have pad locks and security systems to safe guard our home, alarm systems to protect the equipment in our cars, parental controls on our cable TV and satellite accesses. We even have ways to protect our loved ones from computer invasions. But are we protected enough, are we using the best devices to combat the unwanted and dangerous intrusions, not to mention keeping our family from stumbling across those out on the internet? Let's face it, without the proper soft ware to protect your computer, you are at risk every time you connect to the internet. There are the viruses, the Trojans and unwanted spam, not to mention the chat rooms where millions fall victim of on-line predators, and let's not forget the #1 problem on the internet, pornography. You may be saying, but I have the best anti- spy ware money can buy and my internet service provides parental controls. Here's the underlying question: How effective are they? Statistics show that 95% of internet users don't have the adequate security to prevent attacks or control the content the computer user can access. The average computer is scanned by online intruders on average of 12 times a day. More and more victims are realizing the importance of these safety devices. The newest trend for identity theft is to steal information and cash out, out side of the country making it impossible to trace and leaving the victims with nothing to replace the funds. What do I do, you ask? Let me begin with the basics. There are four steps to take into consideration. 1. Evaluate- There are diagnostic tools to find and identify dangerous threats to your computer. These tools are as simple as popping into you computer and scanning your hard drive. Threats are then identified with the proper recommended course of action to take. 2. Eliminate- Once the threats have been identified the obvious next step is to eliminate. These security tools help scan, eliminate and block threatening spy ware, annoying ad ware and cookies, damaging worms and Trojan horses. 3. Protect- Set up a barrier around your computer. This will keep intruders out and create a fire wall. This is the most effective way to defend you against hackers and avoid identity theft. 4. Control- This final step will create a peace of mind for you, with the knowledge that you can avoid potentially dangerous web sites. You can block undesirable websites as well as avoid ones that try to download spy ware onto your computer. So what's the next course of action? Find a security device that will cover these four steps and protect you from all of these hazardous things. There are even programs that will do this and automatically update every month to ensure added safety and avoid any new unknown danger. My advice, find them, get them on your computer to avoid any heartache that could happen. The average cost for these programs, to completely cover you computer, vary from $40- $120 depending on the collection of software you use. The products that will automatically update usually run $5 - $10 a month to give you the essential idea of, get it and forget it. Too many times we forget to update our securities and fall victim of these malicious acts. Don't wait, don't become a victim before you take action. What is the price for your safety? Do You Know These Facts About Spyware ? Imagine something that follows you home and sets itself up in your house. It eats your food, enjoys your drinks, reads everything you bring home or purchase. It runs up your phone bills and no matter where you go, it can follow you and takes notes on everything you do. 5 Mac Security Tips You Can?t Live Without So, you've bought a new Macintosh, and now you may be wondering how to make it safer. There are several things that you can do which will protect your Mac from viruses and hackers. Macs are already very difficult to hack, but don't let that fact allow you to become lenient with your security. Cisco CCNA Certification: Becoming A Truly Valuable CCNA. I've been active in the Cisco Certification track for four years, working my way from the CCNA to the coveted Cisco Certified Internetwork Expert title, and during that time I've conducted job interviews and casual conversations with hundreds of CCNAs and CCNA candidates. |
home | site map |
© 2005 |