Effective End User Training

Author: Brian Rhodes, Published on Apr 23, 2012

Properly coordinating end user training is a key consideration of successful projects. It is important to recognize that a world class system installed in a flawless manner can be perceived as second rate if the end user is not adequately instructed on its proper use. Future expansion of that system hinges on end user satisfaction, and the correlation between proper training and satisfaction cannot be understated. In this note, we address the importance of end user training done right.

Overview

*** ********** ****** **** **** **** *** ***** ** *** surveillance ****** *** ********** ****** ******** ******. *** ******** *** the ********** ****** ********** ********** ** *** ****** ** ******* and ** **** ******.

**** *********** **** **** ** ********* *** ********** *** ******** training ***** *** *** ***** ****** *** *******. *******, ****** several ********* ********* ** *** ** ********** ********* ** *********.

Keys ** ********** **** ********

  • ******** ******** ******** *** ********* ******
  • ******** ******** **********
  • ******* *** ********* ******** *******
  • ***** ***** *******'* ****** ******
  • **** ****** ******
  • ***** * ********** ******

******** ******** ******** *** ********* ******: ** **** ********* *********** ** ***** ** ***** **** to ** *******, ******** ******** ******** ***** **** ******** ******. For ********, ********, ******** ****** *** ************* **** *** *** systems ** ********* ****, ***** ******** ** ********* ******* ** the ******.

******** ******** **********:******* ** ******* ******** * ***** ******** ** *********, *** training *** ***** *** ** *** ** * ****, ******** a ****** ******** ******* **** *** *******. **** **** *** enduser ** ******** * ********* **** ***** ***** *** *** distracted **** ***** ****.

******* *** ********* ******** *******:******** * ******** ****** ** *********. ****** *** *** **** a ******** ******* ******** ***** ****** ** *** ********** ********, but ** **** ***** ** ******* ********** ** ***** ********* functions. *** ****** *** ** **** ** *** ********** ** 'proof' **** * ******* ******** ** ******* *** *********, *** used ** **** ***** ** *** ******* ****** *** ****** of ********.

***** ***** *******'* ****** ******:***** ********, ***** ********* ** ****** *** ** ***** ******** system, *** **** * ******* ************* ******. *** **** ******** with ***** *** ******** *** ********** **** ******* ** **** can '***' *** ** ******* ** ***** *** ***********. *** only **** ******** ** ******, *** ***** ********* ******* ***** a ****** ****** ** ***** **********.

**** ****** ******:******** ******** ******** **** ***** *** **** ****** ** ******* important. ******** ******** ****** ** **** *****, *** ****** ********* actual ***-**** ********* ** *** ******. ****** ** **** *** much ********* ****** **** *** ***** * ****** ** * common ******* ** **** ********. ********** ** *** **** ********* are *** ** ************* *********, ******* *** ******** ****** ****** to **** *** *********** ******** *** ********* ** ********** *********.

***** * ********** ******: **** *** **** ******** **** *** ********* *** ***** remember ***** ********. **** ** ********** ********* *** ***** *** only *** *** ************ ****** ************. ******* ******** * *** page '**********' **** *** ************* (**** *** ** ** * search, ****** *****, ***.) *** ** **** *******. **** **** to ********* ** *** *** ****'* ******** ***** (*.*., ** they *** * ****, ***** ** ********* *** *** ************ rather **** ******* ************).

**********

** ** *** **** ** ******** *** ********** ** ********* end **** ********, *** ** ******* ******** *** **** ** future ***** *** ****** *********. ******* ** ******* ******* ** quick ******** ** ********* * ******, *** ********** ****** **** time ** ********* ** ********* ******** ****. *** **** **** the ******** ****** **** ******, *** *** ****'* ********* ************ strengthens *** ********** ************.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on End Users

'Solution' Manufacturers Threaten Integrators on Dec 09, 2016
The race to the bottom has driven manufacturers to become 'solution' providers, threatening integrators. Axis shift to 'solution' sales might be...
Anixter Sales People Selling To End Users on Nov 03, 2016
Anixter's most frequently heard defense of selling to end users is that they used to do it, but not anymore. However, this was undermined by...
The Xiongmai Botnet 'Recall' Will Not Work on Oct 25, 2016
The Xiongmai 'recall' has been the topic of global news, following the unprecedented bot net attacks that use their equipment, among...
Get End User Leads for Just $997 A Month on Aug 31, 2016
Scam or opportunity? As trade mags continue to suffer from the decline of print media, they are scrounging for new ways to make money. Rather than...
Integrators Vs Manufacturers Direct To End Users on Aug 31, 2016
Many manufacturers have increasingly large and hungry sales forces that call on more and more end users. One recent example is Axis ~$20 Billion...
Videofield Launches Dealer / DIY Service Dragonfly on Jan 21, 2016
RSI Technologies, the company behind Videofied, has launched a new DIY offering called DragonFly. There are many DIY security / intrusion offerings...
Large Video Surveillance Systems Guide on Oct 29, 2015
This 14 page guide explains the key uses, design factors, and players in the large system surveillance market. A global group of 80...
Mega-OEMs vs Micro-Relabelers on Aug 04, 2015
Manufacturers like Dahua are sold under dozens, if not hundreds, of aliases in the United States alone. Companies doing it range from two stoners...
Arecont Pulls End User Marketing Claims on Jul 28, 2015
Manufacturers, you have to get explicit permission from end users and only state factually true claims about them. Arecont struggles to understand...
Milestone 'CARES' About End Users on Jun 16, 2015
Milestone has announced CARE which they tout cryptically as "Service Offerings for Continuous Return on Investment." If you are familiar with...

Most Recent Industry Reports

Knightscope - $122,509 Revenue, $2.5 Million Loss Seeks $20 Million Investment on Dec 09, 2016
The robot that ran over a child, Knightscope, wants money and they need it. Investors can invest as little as $1,000 to participate and...
'Solution' Manufacturers Threaten Integrators on Dec 09, 2016
The race to the bottom has driven manufacturers to become 'solution' providers, threatening integrators. Axis shift to 'solution' sales might be...
The Russian SMP Security Robot on Dec 08, 2016
A Russian manufacturer, SMP, has a commercially available outdoor security robot, at a lower price and with much less marketing than their main...
How Hikvision Beats Its OEMs on Dec 08, 2016
Hikvision GM declared that they are not aggressive with their competitors. But some of their own OEM partners disagree. Inside, we reveal a key...
Dahua Discontinuing H.264 Only Products on Dec 08, 2016
Dahua has taken a stand for H.265 and is discontinuing its H.264 only products. We examine the shakeup inside this...
IP Networking Course January 2017 on Dec 08, 2016
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
Hikvision vs Dahua Mobile Apps Tested on Dec 07, 2016
With smartphone use and low-cost video recorders surging, many user's main interface to their surveillance system is their phone. With mobile video...
Paxton Drops US Reps, Plans Major Expansion on Dec 07, 2016
Paxton is gearing up to make a big run at  US access control success. The first step they have made is to cut all US Rep Firms, in anticipation of...
Axis Partner Elder Care Video Analytics (Smartervision) on Dec 07, 2016
Can video analytics be used to improve the care of the elderly? Axis and a video analytics startup, Smartervision, are working together to do so....
Sony IP Camera Backdoor Uncovered on Dec 06, 2016
A backdoor has been uncovered in ~80 Sony IP camera models, attackers can remotely enable telnet on the camera, and then potentially login as root,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact