Advisor

Working Around the Delete Key, Part 2: What Are Our Users Really Doing?

Posted September 7, 2006 | Leadership | Leadership |

In my last Advisor (see "Working Around the Delete Key, Part 1," 24 August 2006), I told the story of how I had spent a year or more getting around a malfunctioning delete key on my laptop. The article pointed out the lengths to which I, a fairly savvy computer user, was willing to go to avoid giving up my principal computer. This article is about some of the thoughts this experience brought to mind.

About The Author
Ken Orr
Ken Orr was a Fellow of the Cutter Business Technology Council and a Senior Consultant with Cutter Consortium's Data Analytics & Digital Technologies, Business Technology & Digital Transformation Strategies, and Business & Enterprise Architecture practices. He was also a regular speaker at Cutter Summits and symposia. Mr. Orr was an internationally recognized expert on enterprise architecture, data warehousing, knowledge management… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.