SlideShare une entreprise Scribd logo
1  sur  51
!
                                       !"                    #"
                                                              $                   !
                                   !          %!                                  &" '!                       %
                                                                                                              !



                                                        !                       !                   #"
                                                                                                     $            !
                                   (   %            &" '!                       %
                                                                                !




Copyright © 2009 Perficient, Inc            PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       1
)                     !            '!
        * '
                                   "
             –
             –
             –
             –
             –
                                       "                   "




Copyright © 2009 Perficient, Inc            PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   2
+                          '!




             '!                           '                               !                       !                      '       ,
     !                                                       !%

                      "!            "              +                    -        ,               !
                             +          " !                      " ,                      (        "                !,       !
     !                             '!                                           !                                                "
     +                       "            +                        ""                           %

Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                    3
.                 '!
                                                            ! #
                                                             "                   $
                                   %& (
                                     ')                              ')
                                                                     )*
                                   +                              ,-  .                                  /
                                        "                                                            0
                                       1                                ,( )
                                                                          )

                                   "
                                   !                  2)
                                                       )3                                ')
                                                                                          )*
                                                                                        4    .

                                   5                                     6                               4
                                    4




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       4
/




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   5
0 !                           1    + .
  "                                 , "




Copyright © 2009 Perficient, Inc      PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   6
"




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   7
2                                    '"
                                   /4                /

             7                          8
                                        / 9             :
             4
                                    ;
                                   <
             7

                                   4




             4 /




Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   8
.                                                $"                         !


             =                                              >          ?

             ,@
              @@                   /


             A                     .     B
                –
                            C
                            C


                –

                                                                   1
                –            4
                                   ; 4




Copyright © 2009 Perficient, Inc             PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   9
*                           "                '

                           4
                                       <




          –
          –
          –     D
          –     7
          –     A
          –     "
          –                   1    /
          –




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   10
3             (                                   ,%
 "


        5 / !                                                                        "
        C   E                      >                                                 C   E
                                                                                                             /
        C   =

                                                                                     C   =




                          (                                   "
                          '



Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       11
.                                   "                                  (



                                   <

        7




        7                              /

                                       4

                                           /
              .
                                                                                                                 Cisco Personas
                                                <




Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                12
'       !                 !                   4,
   " "                                 4   (                 ""




Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   13
Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   14
'                      "




                  Todd Warfel
Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   15
Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   16
'                           ,




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   17
"
                                                                                                                 /
                                                          <

        D                                                                                                            6
                   8

                                                                    8                                                    4
                                       4                            8

        0                                                                 /           4
        4

                                   4




Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED               18
!   ,                                   '
                                                                           '


        "

            8

        =




        5 /

        !




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   19
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   20
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   21
"


          –!                       .
          –
          –                                4                         1
          –
          –
          –
          –0




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   22
2" '


                   4
                                          <

        F                          84 F
                                     <

        !             4                                        .




Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   23
3                         "

                      +                                                               5
                              "        " 6!
        ,<
                     – D
                     – D
                     –
                     –     "
                     –                          4                              4

        '<                             G         G                                            <

        (<                                 >                                                         4               <

        H<                         /       4                                      <




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       24
5      !                               "


                                                                                               +               !

      =                                I ;   .                                                                 D                   /
                                                   4 ;
                                                                     / 4<
                                                   1                                                                           <
                                       4                             D
                                   <                                                                                               /

                                                        <
                                                                                                                       <
                                                                                         ;              <
                                                                     9 <:                                                                  8
                                                                                                                               J
                                                                                                               4
                                                                                                                           <


                                                                                                                                       <

Copyright © 2009 Perficient, Inc                 PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                           25
3                         "

                                       7   "         8"


                  "                4

                  E


                  E                                                       ; / 4

                  5                                             4

                  E                                >

                                                                                            8




Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   26
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   27
.                               "

                                   .                                         4                               <

          – K                                                       4                         /                  .
                                                         <



        D

          –                         /                        !50                  4 /
          – !                      4 /
          –                                                  1




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED           28
3$                       " '


                "                                                      "




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   29
*
        Analysis                                                                                                        Data Oriented
        focuses on
        patterns




                                   Design Oriented

        Analysis is
        drawn to
        unique and
        extreme
        cases
                            Less Structured in                                                                           Very Structured in
                            Research Plans                                                                               Research Plans
                            and Data Collection                                                                          and Data Collection



Copyright © 2009 Perficient, Inc                  PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                          30
'                                                (


          "

          C




          C
                               4



          C                        .




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   31
,                  '      ! " '

                          *        /                                                                *        /



           A                                                                      0




                                                                                  5
                                                                                                                 4



      The design-oriented approach                                           The data-oriented approach taught
         enabled the team to recognize                                          the team to carefully weigh their
         new learning opportunities, and to                                     judgments against the evidence
         trust their instincts.

Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED           32
Getting started
                                   Forming the team
                                   Collecting and analyzing data to
                                   drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   33
!

        $
          – $
          – +
          – L



        5
          –                    1     7>                                 1              7                     4
          – $                  4          1                             9
                                                                               /8                                   :
          – !
          – "                      8. /
          – 7                       4 4                 4            4 /                                 4




Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       34
*




                                                                                                         35
Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED        35
2                               (                         ' ,




                                                                                                             36
Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED        36
1

        A .                        !


          – D




          –




        $
          – 7                      4                4
          –



Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   37
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: the elements
                                   of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   38
2                               '                        "

 Archetype name

 Identifying
 details

 Short,
 memorable story

 Goals,
 motivations

 Context,
 environment

 Values and
 attitudes




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   39
"




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   40
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas



Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   41
7,                            "                                8


     !                                   /    P                                                                #
      MI                                       MO                                                                  K           ;
       1                                       4
                           4       4 /                                    <N
              ;                          /                                                                                 4       >
                  /                  ;         7;                                                                      <

              ;
              / <N




                                                                                                                                       42
Copyright © 2009 Perficient, Inc             PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                            42
,


                                   /   /4                                                                                 <
                 ! 4                                                          /
                 ! 4                                                                          /

                                                                                                                      4
                 >
                    – E4                    >
                 !




                                                                                                                              43
Copyright © 2009 Perficient, Inc                PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                43
,

             Candidates                                         Considerations                                               Participants
        !                                      B              E4                        B                                         4     4
                                                              E      4                                  B
                                   B                          –      $
                                                              –      !                            I                          01    4
                  8                        4
                                       B                      –      +
                                                              –      0                                                            < <
                .                  /               B
                                                              –

                            < <
                                   B
                                                              01
        D                              4 /8                      –
               B
                                                                 – $
                                                              !                             8
                                                                                        6         I
                                                                                                                                            44
Copyright © 2009 Perficient, Inc                       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                       44
2" ' ,                                         "

                 7                     />                                         /,                 '<
                    –              1        I                                         -                               B
                                   7                    7          /                                              4
                                       <
                              C
                              C
                                   7                                                  7                                           /
                                                                  1                   <
                                                     4                                                                            <
                 K            4                                                                                   <
                 K            4                                                                                               <
                 $                          4                                 4
                 4                          4           4                                                 /               4   4
                                                                                  <
                                                                                                                                  45
Copyright © 2009 Perficient, Inc            PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                        45
)'                              '                 '

                 A                                                                                           4
                                               BI                                                                B

                                   4       /
                                                                   <



                                                                                                  <
                                                                         4
                                                            <7                                                   4
                                                             /                                             4              4
                                                                               <

     2                                 ,                           '                     "
      !!                           '                                                                   +             +
                                       "                    +                 !!                                         ( %   46
Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                      46
Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   47
2                               "   " !


        0>

        D
                     8                 .

        7
                     4                                   4                           4


          – 7
          – "                              4
          –
          – 0                              4




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   48
<                                                                                     < ! 5!
         ,@<
          @@
            4                      P <
                                                                                       !            <I                 ')
                                                                                                                       )@
         5                         !       QK        R <                     "
         #                                           "                                                                $ %<     4$
         ')<
          )-
                             L         Q                             <                                     &                  '
                                   (                                                                       <5                P
         ')<
          )2




Copyright © 2009 Perficient, Inc                PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                   49
$ 3
                             )             3                                  #        "

                                    2           * ! + 9 ; <
                                                        : < =
                                             9 < - 9< 3
                                              ; <    <   2
Identity management and governance has become a focal point for companies trying to meet regulatory and industry
expectations around information integrity and accountability. Information is power and information security is more crucial
now than ever.

And whether it is the protection of proprietary technology, customer information or financial data, identity management
should be a key component of any corporate security strategy.

In December’s Perficient Perspectives we’ll look at Identity Management:

      • What is it?
      • The three keys to an effective identity management strategy:
              • Business alignment
              • Executive involvement
              • Measurable results
      • Identity management solutions
      • Where does technology fit in?
      • Why technology alone is not the answer
      • How to assess your own level of corporate exposure to identity abuse and infrastructure vulnerabilities
.                                   '!




                                                            <             6         ! 3
                                   "        >
                                    1
                                                                                                                      <




                                   4    <   6       '!                                            /<           6          '!




Copyright © 2009 Perficient, Inc                PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED            51

Contenu connexe

Similaire à Cisco Personas Guide

Royal Ten Cate: Faster, cheaper and better than the market thinks
Royal Ten Cate: Faster, cheaper and better than the market thinksRoyal Ten Cate: Faster, cheaper and better than the market thinks
Royal Ten Cate: Faster, cheaper and better than the market thinksGert Steens
 
U of U Undergraduate IMC Class
U of U Undergraduate IMC ClassU of U Undergraduate IMC Class
U of U Undergraduate IMC ClassChris Carlston
 
6102 db us_en_wp_grid computing
6102 db us_en_wp_grid computing6102 db us_en_wp_grid computing
6102 db us_en_wp_grid computingCangpt
 
OE 42 boycott of virani moti's shantidas bapu for pro satpanth activities
OE 42  boycott of virani moti's shantidas bapu for pro satpanth activitiesOE 42  boycott of virani moti's shantidas bapu for pro satpanth activities
OE 42 boycott of virani moti's shantidas bapu for pro satpanth activitiesSatpanth Dharm
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgKheirEddine Tolba
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgKheirEddine Tolba
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgKheirEddine Tolba
 
Learning 3.0: The Age of Creative Learning
Learning 3.0: The Age of Creative LearningLearning 3.0: The Age of Creative Learning
Learning 3.0: The Age of Creative LearningTakashi Iba
 
Villa Alhambra Financials Sept. 2012
Villa Alhambra Financials Sept. 2012Villa Alhambra Financials Sept. 2012
Villa Alhambra Financials Sept. 2012VillaAlhambra
 
What's Hot & What's Not in Alumni/ae Relations - Dana Hall
What's Hot & What's Not in Alumni/ae Relations - Dana HallWhat's Hot & What's Not in Alumni/ae Relations - Dana Hall
What's Hot & What's Not in Alumni/ae Relations - Dana HallEverTrue
 
workshop lca board 11.1.12
workshop lca board 11.1.12workshop lca board 11.1.12
workshop lca board 11.1.12Lwala
 
Nokia - Empty Seats Travelling
Nokia - Empty Seats Travelling Nokia - Empty Seats Travelling
Nokia - Empty Seats Travelling Texxi Global
 
GaMPI - The Value of Social Media
GaMPI - The Value of Social MediaGaMPI - The Value of Social Media
GaMPI - The Value of Social MediaLiza Doyle
 

Similaire à Cisco Personas Guide (20)

Royal Ten Cate: Faster, cheaper and better than the market thinks
Royal Ten Cate: Faster, cheaper and better than the market thinksRoyal Ten Cate: Faster, cheaper and better than the market thinks
Royal Ten Cate: Faster, cheaper and better than the market thinks
 
Zayda sierra esp
Zayda sierra espZayda sierra esp
Zayda sierra esp
 
U of U Undergraduate IMC Class
U of U Undergraduate IMC ClassU of U Undergraduate IMC Class
U of U Undergraduate IMC Class
 
6102 db us_en_wp_grid computing
6102 db us_en_wp_grid computing6102 db us_en_wp_grid computing
6102 db us_en_wp_grid computing
 
OE 42 boycott of virani moti's shantidas bapu for pro satpanth activities
OE 42  boycott of virani moti's shantidas bapu for pro satpanth activitiesOE 42  boycott of virani moti's shantidas bapu for pro satpanth activities
OE 42 boycott of virani moti's shantidas bapu for pro satpanth activities
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sg
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sg
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sg
 
Learning 3.0: The Age of Creative Learning
Learning 3.0: The Age of Creative LearningLearning 3.0: The Age of Creative Learning
Learning 3.0: The Age of Creative Learning
 
Villa Alhambra Financials Sept. 2012
Villa Alhambra Financials Sept. 2012Villa Alhambra Financials Sept. 2012
Villa Alhambra Financials Sept. 2012
 
What's Hot & What's Not in Alumni/ae Relations - Dana Hall
What's Hot & What's Not in Alumni/ae Relations - Dana HallWhat's Hot & What's Not in Alumni/ae Relations - Dana Hall
What's Hot & What's Not in Alumni/ae Relations - Dana Hall
 
2011mayo Profesorado
2011mayo Profesorado2011mayo Profesorado
2011mayo Profesorado
 
workshop lca board 11.1.12
workshop lca board 11.1.12workshop lca board 11.1.12
workshop lca board 11.1.12
 
Colegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de MoussyColegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de Moussy
 
EB-85 A
EB-85 AEB-85 A
EB-85 A
 
Social Media and IMC
Social Media and IMCSocial Media and IMC
Social Media and IMC
 
Quranic therapy booklet 2
Quranic therapy booklet 2Quranic therapy booklet 2
Quranic therapy booklet 2
 
Nokia - Empty Seats Travelling
Nokia - Empty Seats Travelling Nokia - Empty Seats Travelling
Nokia - Empty Seats Travelling
 
Nota mensual d'actualitat econòmica Maig09
Nota mensual d'actualitat econòmica Maig09Nota mensual d'actualitat econòmica Maig09
Nota mensual d'actualitat econòmica Maig09
 
GaMPI - The Value of Social Media
GaMPI - The Value of Social MediaGaMPI - The Value of Social Media
GaMPI - The Value of Social Media
 

Plus de Perficient, Inc.

Driving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsDriving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsPerficient, Inc.
 
Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Perficient, Inc.
 
The Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesThe Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesPerficient, Inc.
 
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Perficient, Inc.
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVIDPerficient, Inc.
 
Centene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryCentene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryPerficient, Inc.
 
Automate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaAutomate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaPerficient, Inc.
 
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPreparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPerficient, Inc.
 
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Perficient, Inc.
 
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinThe Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinPerficient, Inc.
 
Cardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudCardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudPerficient, Inc.
 
Teams Summit - What is New and Coming
Teams Summit -  What is New and ComingTeams Summit -  What is New and Coming
Teams Summit - What is New and ComingPerficient, Inc.
 
Empower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementEmpower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementPerficient, Inc.
 
Adoption & Change Management Overview
Adoption & Change Management OverviewAdoption & Change Management Overview
Adoption & Change Management OverviewPerficient, Inc.
 
Microsoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomeMicrosoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomePerficient, Inc.
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkPerficient, Inc.
 
Infrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersInfrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersPerficient, Inc.
 
Accelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsAccelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsPerficient, Inc.
 
Preparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPreparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPerficient, Inc.
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Perficient, Inc.
 

Plus de Perficient, Inc. (20)

Driving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsDriving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season Results
 
Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation
 
The Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesThe Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial Services
 
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVID
 
Centene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryCentene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success Story
 
Automate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaAutomate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug Koda
 
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPreparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
 
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
 
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinThe Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
 
Cardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudCardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM Cloud
 
Teams Summit - What is New and Coming
Teams Summit -  What is New and ComingTeams Summit -  What is New and Coming
Teams Summit - What is New and Coming
 
Empower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementEmpower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis Management
 
Adoption & Change Management Overview
Adoption & Change Management OverviewAdoption & Change Management Overview
Adoption & Change Management Overview
 
Microsoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomeMicrosoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from Home
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
 
Infrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersInfrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote Workers
 
Accelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsAccelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft Teams
 
Preparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPreparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge Management
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 

Dernier

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Dernier (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Cisco Personas Guide

  • 1. ! !" #" $ ! ! %! &" '! % ! ! ! #" $ ! ( % &" '! % ! Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 1
  • 2. ) ! '! * ' " – – – – – " " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 2
  • 3. + '! '! ' ! ! ' , ! !% "! " + - , ! + " ! " , ( " !, ! ! '! ! " + " + "" % Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 3
  • 4. . '! ! # " $ %& ( ') ') )* + ,- . / " 0 1 ,( ) ) " ! 2) )3 ') )* 4 . 5 6 4 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 4
  • 5. / Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 5
  • 6. 0 ! 1 + . " , " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 6
  • 7. " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 7
  • 8. 2 '" /4 / 7 8 / 9 : 4 ; < 7 4 4 / Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 8
  • 9. . $" ! = > ? ,@ @@ / A . B – C C – 1 – 4 ; 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 9
  • 10. * " ' 4 < – – – D – 7 – A – " – 1 / – Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 10
  • 11. 3 ( ,% " 5 / ! " C E > C E / C = C = ( " ' Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 11
  • 12. . " ( < 7 7 / 4 / . Cisco Personas < Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 12
  • 13. ' ! ! 4, " " 4 ( "" Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 13
  • 14. Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 14
  • 15. ' " Todd Warfel Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 15
  • 16. Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 16
  • 17. ' , Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 17
  • 18. " / < D 6 8 8 4 4 8 0 / 4 4 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 18
  • 19. ! , ' ' " 8 = 5 / ! Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 19
  • 20. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 20
  • 21. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 21
  • 22. " –! . – – 4 1 – – – –0 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 22
  • 23. 2" ' 4 < F 84 F < ! 4 . Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 23
  • 24. 3 " + 5 " " 6! ,< – D – D – – " – 4 4 '< G G < (< > 4 < H< / 4 < Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 24
  • 25. 5 ! " + ! = I ; . D / 4 ; / 4< 1 < 4 D < / < < ; < 9 <: 8 J 4 < < Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 25
  • 26. 3 " 7 " 8" " 4 E E ; / 4 5 4 E > 8 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 26
  • 27. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 27
  • 28. . " . 4 < – K 4 / . < D – / !50 4 / – ! 4 / – 1 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 28
  • 29. 3$ " ' " " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 29
  • 30. * Analysis Data Oriented focuses on patterns Design Oriented Analysis is drawn to unique and extreme cases Less Structured in Very Structured in Research Plans Research Plans and Data Collection and Data Collection Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 30
  • 31. ' ( " C C 4 C . Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 31
  • 32. , ' ! " ' * / * / A 0 5 4 The design-oriented approach The data-oriented approach taught enabled the team to recognize the team to carefully weigh their new learning opportunities, and to judgments against the evidence trust their instincts. Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 32
  • 33. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 33
  • 34. ! $ – $ – + – L 5 – 1 7> 1 7 4 – $ 4 1 9 /8 : – ! – " 8. / – 7 4 4 4 4 / 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 34
  • 35. * 35 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 35
  • 36. 2 ( ' , 36 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 36
  • 37. 1 A . ! – D – $ – 7 4 4 – Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 37
  • 38. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: the elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 38
  • 39. 2 ' " Archetype name Identifying details Short, memorable story Goals, motivations Context, environment Values and attitudes Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 39
  • 40. " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 40
  • 41. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 41
  • 42. 7, " 8 ! / P # MI MO K ; 1 4 4 4 / <N ; / 4 > / ; 7; < ; / <N 42 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 42
  • 43. , / /4 < ! 4 / ! 4 / 4 > – E4 > ! 43 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 43
  • 44. , Candidates Considerations Participants ! B E4 B 4 4 E 4 B B – $ – ! I 01 4 8 4 B – + – 0 < < . / B – < < B 01 D 4 /8 – B – $ ! 8 6 I 44 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 44
  • 45. 2" ' , " 7 /> /, '< – 1 I - B 7 7 / 4 < C C 7 7 / 1 < 4 < K 4 < K 4 < $ 4 4 4 4 4 / 4 4 < 45 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 45
  • 46. )' ' ' A 4 BI B 4 / < < 4 <7 4 / 4 4 < 2 , ' " !! ' + + " + !! ( % 46 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 46
  • 47. Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 47
  • 48. 2 " " ! 0> D 8 . 7 4 4 4 – 7 – " 4 – – 0 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 48
  • 49. < < ! 5! ,@< @@ 4 P < ! <I ') )@ 5 ! QK R < " # " $ %< 4$ ')< )- L Q < & ' ( <5 P ')< )2 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 49
  • 50. $ 3 ) 3 # " 2 * ! + 9 ; < : < = 9 < - 9< 3 ; < < 2 Identity management and governance has become a focal point for companies trying to meet regulatory and industry expectations around information integrity and accountability. Information is power and information security is more crucial now than ever. And whether it is the protection of proprietary technology, customer information or financial data, identity management should be a key component of any corporate security strategy. In December’s Perficient Perspectives we’ll look at Identity Management: • What is it? • The three keys to an effective identity management strategy: • Business alignment • Executive involvement • Measurable results • Identity management solutions • Where does technology fit in? • Why technology alone is not the answer • How to assess your own level of corporate exposure to identity abuse and infrastructure vulnerabilities
  • 51. . '! < 6 ! 3 " > 1 < 4 < 6 '! /< 6 '! Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 51