Stacking the Deck – The Exceptionally Clear Method to Define & Document Your Software Requirements

As a business leader, you may be considering developing a web application for your team, your company or customer use. Congrats! Let’s get your project off to a good start with a clear and concise Software Requirements process.

Throughout this series of Software Development Guide for Business Leaders, we will help you to understand the elements of success in a software development project.

As the leader, (aka project sponsor), your contribution will be paramount in defining the software expectations and your input will be required throughout the project lifecycle to ensure that everything stays on track and there are no surprises at the end of the project.

Finding the Aces – What is a Software Requirement?

Project Managers break software requirements into functional and non-functional components.

Functional requirements are simple documents that outline the inputs, the behavior of the software and the outputs. An example could include a login screen. You will have very specific inputs (typically username and password fields) and actions for different scenarios (login success, login failed, reset password, etc.)

The non-functional requirements include details such as performance requirements, security, or reliability. A good example would include a requirement for role-based security. This would change the features of the system depending on which user level an individual has logged in (administrator, contributor, general users, etc.)

Seems simple, right? It’s critical that we get these software requirements right before we start developing. Product quality, delivery timelines, and budget are all dependent on the quality of requirements. So, what can we do stack the deck in our favour?

Shuffling Methodologies – How to Develop Software Requirements

Image of Agile cycle

There were two studies performed in the 1990’s that help us create better software today. A study by the ESPI in 1995 found that 40 – 60% of all defects discovered in a software project traced back to errors made during the requirements stage. An earlier study in 1994 by the Standish Group helped us understand that 13.1% of projects fail due to incomplete requirements and 8.8% of projects fail due to rapidity changing requirements (Girase, 2012). It may have been a long time ago… but this is largely still true today.

There are two mainstream project development methodologies in existence today. The older Waterfall method that has been around for decades and is still used today by many organizations and the more recent Agile Software Development Model which was established with the publication of the Agile Manifesto in February of 2001.

The Agile Software Development Model made many strides to resolve and improve project requirements gathering, however, our experience is that both Agile and Waterfall have their advantages and disadvantages and they are not for suitable for every situation. Traditional project management models, like Waterfall, still require documentation of a requirement before the coding and testing start while Agile is iterative and requirements are refined as they are built. Agile is flexible and allows for fast feedback and changes as the project unfolds.

Internal development teams should get more value from Agile as they have easy access to stakeholders who are very engaged in the software development process. Not every organization has the resources or bandwidth to be engaged through the entire process and most stakeholders will want to have the clear start and end dates (and project budget) before starting a development project.

We have used both Agile and Waterfall and while they both have their benefits, we feel that we’ve found a sweet spot in between the two methodologies. We approach our development through a hybrid model that utilizes the best from both models and focuses on a visual representation of requirements and the design of a functional prototype before any coding starts. To bring our clients software visions to life, our Milestone development process borrows the parts we like from Agile (The iterative nature of the project, and the fast feedback) and from more traditional development like waterfall (having a planned finish date). This ensures that our stakeholders are active participants in the design and functionality of the system on an ongoing basis. Through this process, we eliminate surprises at the end of the project.

The Final Cut – Defining and Documenting Your Software Requirements

So, you have developed spectacular objectives, your project is guaranteed to be a smashing success now, right? Well, no. Simply having clear and well-defined objectives isn’t necessarily enough. One of the biggest challenges in software development (or any other longer-term project) is that we have to capture and document the requirements specifically enough to limit how open they are to interpretation. Clear direction is essential, or your development team may come back to you to clarify, or worse, deliver what they “thought you wanted”. Have you ever had someone come back to you and ask you to clarify an objective or thought only to realize that they were on the wrong track?

 

So where do you capture requirements? Well if you’re like the vast majority, you’re probably capturing requirements in simple Excel files. However, there are much better solutions available that offer so much more. At CoreSolutions, we really focus on capturing and bringing your vision to life. Capturing requirements in a visual way is a key component to clarifying expectations and limiting revisions. We document the requirements through a software system called iRise. This allows us to develop an interactive prototype before a single line of code is written. The actual development coding is the most expensive part of any software development process so, by developing a working prototype of the system before we start development, we can more accurately estimate the development cost and stay on budget. While this is more upfront work, it does lead to greater project success and overall experience. Let’s face it, the requirements need to be captured at some point during the project so why not do that work upfront so you have a better grasp of scope, timeline, and budget. It just makes sense.

 

Screenshot of iRise

 

The figure above is an example of a screen that’s part of a prototype in iRise.

 

As we outlined throughout this article, with so much riding on effective requirements planning, it’s critically important to define and document goals and deliverables. Whichever project methodology you decide to use, capturing requirements means a lot of upfront work, but it’s worth it to ensure the success of your project. By using an effective project methodology, and really understanding and documenting your system requirements upfront, you will effectively be stacking the deck for your project’s success. If you want to stack the deck even more and need help planning out your next software project, reach out to us. We love helping prepare software visions and have been great at it for over 25 years.

 

CoreSolutions’ team of experts, including developers and project managers, build web and mobile applications using the Agile Methodology and tools. CoreSolutions will assist you in all phases of your project including:

·         Brainstorming;

·         Requirements Planning & Gathering;

·         Prototype Design;

·         Project Management.

 

Connect with CoreSolutions today to start your project by completing a Project Profile.

Works Cited

Girase, N. M. (2012, May). airccse.org. Retrieved 12 10, 2016, from http://airccse.org/journal/ijsea/papers/3312ijsea05.pdf

Mitre. (n.d.). Eliciting, Collecting, and Developing Requirements. Retrieved 12 12, 2016, from www.mitre.org: https://www.mitre.org/publications/systems-engineering-guide/se-lifecycle-building-blocks/requirements-engineering/eliciting-collecting-and-developing-requirements

Share

Planning a Software Development Project? You need to read this!

What can you do to ensure your software development projects are successful and avoid costly redesigns.

Part One in the Series: Software Development Guide for Business Leader.

When you do as much custom development as we do, we hear a lot about future-proofing in development. The average expected lifetime of software that our customers expect is between 5 and 7 years. When a system is designed to last that long, a considerable amount of effort should be invested into planning. For a business that plans on developing a custom application, it’s important to future-proof your project to avoid costly application redesigns and to improve application longevity. Future-proof through planning, honest reviews of your in-house skills and capabilities, striking a balance of in-house support and outsourced development, and by avoiding proprietary tools and frameworks.

Future-Proofing Checklist

  • What is the life expectancy of your final product?
  • Have you assigned a Project Manager?
  • Have you set realistic project goals, budgets and timelines?
  • Have you done an assessment of your in-house resources?
  • Does the project rely on proprietary tools?
  • Have you assigned a Project Manager?
  • Is your outsourced partner large enough
  • Do you have a software update plan?

The key issues this post addresses include:

  1. How to avoid painting your development project into a corner by using proprietary frameworks and tools.
  2. How to be in control of your application development, regardless of your in-house development skills.
  3. How to ensure long-term support for your application when resources fail, are replaced or become incapacitated.
  4. How to handle post development support and why it is crucially important – The work continues even after initial development is complete.
  5. How to create the ideal mix of outsourcing and internal support.

Future-Proofing a Project During the Planning Process

Future-proofing your project starts just after it’s been envisioned and is typically the domain of the Project Manager (PM). The PM will use planning tools and methods and determine what is best for the business and the project long before any development occurs. PM techniques and processes help avoid uncomfortable situations where developers are vying for the work based on their skills and capabilities.

The PM uses tools and processes along with their knowledge of organizational assets and history, resource capabilities and strengths, and weighs this information to determine the right mix of in-house work and outsourcing.

Without thinking about future-proofing during the planning process you may end up with a short-lived web-application with higher than expected costs to the business. This is why dedicated pre-development planning is so crucially important.

Avoiding Costly Application Redesigns

Your company can avoid costly application redesigns and redevelopments if you critically review internal resources at the beginning of the project and if you avoid, as much as possible, the use of proprietary technology.

Also, an effective way to prevent costly redesigns is to:

  • Use Project Management techniques and tools, (use a Project Manager).
  • Complete project scope and business requirements documentation at the beginning of the project.
  • Have sufficient budget to do the project right the first time.
  • Setting a realistic timeframe and make sure not to cut corners.

The Importance of Assessing In-house Skills and Capabilities

An evaluation of your in-house capabilities is critical to the success of your business and crucial to your application development’s longevity. Your PM should execute a Capabilities Matrix to understand where your organization’s weaknesses are. A great place to start is the TOGAF Architecture Skills Framework for processes and layouts of an IT Capabilities Matrix.

Be honest about the real capabilities of your organization. Do you have the capacity, knowledge, and resources in place to make this project a success? An honest assessment will help avoid any problems and mitigate risks in the future.

Avoiding Proprietary Tools and Frameworks

To effectively future-proof your development project, PM’s and development leaders should avoid proprietary tools and frameworks sourced from new, or untested sources. The terms, “open source,” “free,” or even low cost, should be approached with extreme caution and diligence during the evaluation and selection processes.

You can achieve some amazing designs and benefits through these programs but never be lenient about accepting unproven technology or partners; especially during the planning phase of your project.

The long-term viability of using development resources from smaller organizations must be evaluated and weighted against other factors. Smaller, less experienced teams may be exciting to work with, but their stability in the long-term may trigger a redesign in the short-term.

When in doubt, go for tried and true solutions, tools and frameworks. You’ll have an easier time finding resources in the IT community to help you and you’ll all but eliminate the risks associated with partnering with an immature organization.

It’s not always as exciting, but it will be significantly less risky, and if something does go wrong, you have more contingency options available.

Keeping Custom Applications Up-to-date

Developing a custom application may incur a significant up-front cost, but the work doesn’t stop when the app goes live. There are ongoing costs and time investments that must be made to maximize the life of your new tools. Just like the operating system on your computer, your application will require upgrades over its useful lifetime.

You will need upgrades on databases, frameworks, tools and operating systems and there will be new features, additions, and business opportunities too.

No matter the cause, it is important to factor the cost of keeping your new application up-to-date in your annual budgeting of time and dollars.

Outsourcing Application Development and Support

Outsourcing is the ultimate future-proofing of your development projects.

When a development project has internal support for infrastructure and project management but uses external resources for the development then greater levels of success can be achieved.

Some of the benefits of outsourcing that I’ve seen include higher levels of technical expertise, excellent project management, and time management to name a few. Others can include tighter budgets, less scope creep and avoidance of the long-term cost of people.

Conclusion

If you plan on developing a custom application, be sure to future-proof it and avoid costly application redesigns while improving its shelf-life.

Future-proof it by using a project manager and project management tools and techniques.

Plan on updates. If secondary systems require updates, they may also need you to update your custom applications. Plan and budget for updates, then perform them; doing so will improve application longevity.

Assess the skills of your in-house team, (if you intend to develop in-house) and use an assessment framework to get the best result. An honest evaluation of resources and skills will help you avoid important operational tools using old thinking and skillsets.

Outsource; the costs associated with in-house development teams are more than dollars. While it is true that your team will know the business better and can react quicker; it’s also true that they will cost you more, get outmoded and limit development to their capabilities and skillsets. Outsourced agencies often have a broader, more modern approach to development.

On your next project try a hybrid approach by deploying an internal PM to oversee and coordinate the project, and an external development team to apply the latest techniques and programming tools.

About CoreSolutions

The CoreSolutions team of experts, including developers, systems analysts and project managers, build web and mobile applications using the latest technology and tools and will assist you through all phases of the project including brainstorming, requirements planning and project management.

Connect with CoreSolutions today to start your project with a free estimate.

Share

As Cities Get Smarter, Security Concerns Get Bigger, Trend Micro Research Finds

By: Jessie Bur January 19, 2017 | 11:02 am

More and more cities are employing “smart” technologies to improve communication with the public and reduce the burden on government services, but these technologies also open those cities to security and privacy dangers, according to a Trend Micro article released on Tuesday.

Smart cities are redefining the way we live and work. Blending cutting edge IoT (Internet of Things) technologies with virtualization, big data, cloud and more, they represent an urgent and ongoing attempt to overcome the challenges associated with rapid urbanization,” Ed Cabrera, chief cyber security officer at Trend Micro, wrote in a blog post. “There’s just one problem. These vast, interconnected technology systems also raise serious privacy and security concerns.”

According to Martin Roesler, director of threat research for Trend Micro’s Forward Looking Threat Research team, cities are particularly threatened by future IoT attacks because they pose an attractively visible target for hackers looking for maximum impact.

Continue reading

Share

The Importance of City Website Design for Economic Development

The Importance of City Website Design for Economic Development

by Rickey Hayes (Retail Attractions, LLC)

 

If you’re reading this, chances are your city is looking to grow by increasing sales tax revenue through economic development. One way to grow your tax base is by recruiting retail development. One of the key components of successful recruitment is your city’s website. Most companies will start their retail site selection research on the internet, and each project will have its own set of unique parameters. It is not enough that your city meets these requirements. For your city to be selected as a possible location, you have to sell your city. Get the information out there and let the potential investors know what you have to offer. Your city’s website will more than likely be your first chance to make a good impression on the potential developer or investor. If your website is out of date or lacking in information critical to investors, your website presents an unorganized city that is not prepared to support growth. Progressive cities are recognizing the need to aggressively market themselves and create economic greenhouses in preparation for growth.

One of the most critical pieces of information for a city’s website is current demographics for your city and trade area. If your city has a unique trade area or unique demographics, site selectors need to be made aware of this information. Take this opportunity to showcase what your city has to offer. If incentives are available to potential developers, your website should provide information on these incentives especially if they are unique to your community. With so many cities competing for the same development projects, your city has to be aggressive in marketing its potential.

The organization and presentation of your city’s information is another key element in making your city attractive to potential developers. Information should be easy to find, up-to-date and thorough. Your website should convey that your city is ready and willing to work with developers on any issue that may arise. Each department should have their own page with direct contact information, and pertinent documents such as permits and standards should be clearly posted. This is your chance to show potential investors that your city is organized and ready to help make their development project a success.

Lastly, let’s discuss the most commonly overlooked element in municipal web design, search engine optimization (SEO). A website that has been optimized for search engine accessibility has content that is highly searchable and easily indexed. Having an optimized website is important when an investor is searching for information on potential sites. Optimizing your cities website will ensure investors find your official city website and the most relevant information when searching for details about your city.

To find out more about website design for your city, contact Retail Attractions.

Rickey Hayes is the principal of Retail Attractions, LLC, a firm dedicated to helping cities and developers successfully find retail sites, close deals and improve the quality of life for our client cities.
Share

Managing Employee Time & Attendance? There’s an App for that…

If you find managing employee time, attendance and absences an administrative nightmare you are gonna love Softworks new app 🙂  Our Time & Attendance app allows employees to record their own time, attendance, absences and check work schedules via their smart phones/tablets from wherever they are. The app even includes their GPS location!

With employees entering their own requests and managers signing off via email alerts it couldn’t be easier to manage employee time and attendance. Wave goodbye to re keying data and a mountain of emails and phone calls!

With Softworks Time & Attendance Mobile App Employees can:

  • Clock In or Out (with GPS location) – Perfect for today’s mobile workforce.
  • View clocking history.
  • Check flexi balance (if applicable).
  • Book a holiday/vacation.
  • View current balances.
  • Check work schedules/rosters.
  • Update employee details.
  • Request absences including; training, sick leave, maternity, paternity, study and much more…

If you would like a quick demo of our new app, we would be delighted to show you around and get your feedback – Just fill in your details via this link and we will be in touch.

Share

What does Bill 132 (Sexual Violence and Harassment Action Plan Act) mean to you and your workplace?

One in four women and one in ten men say they have experienced some form of sexual harassment in the workplace. Of the reported cases of workplace sexual harassment, 55% were committed by co-workers; 39% of which involved a supervisor or manager. 8% of those who are sexually harassed at work report the harassment.

Recently there have been some changes made to Bill 168 – Violence in the Workplace, which gives employers’ statutory obligations. Bill 132, Sexual Violence and Harassment Action Plan Act, which received royal assent on March 8, 2016, requires all employers to have policies and programs including an investigation procedure. The essential changes brought by Bill 132 include: an employer is required to create a workplace harassment program; the program must include reporting and investigating tools for incidents of workplace harassment and violence; the employers must ensure that all complaints are investigated, and investigations are completed in a timely fashion and a new power to the Ministry of Labour (MOL) to order an independent workplace harassment investigation at the employer’s expense.

September 8, 2016, now looms for companies as the date for compliance with Bill 132. The amendments stand to change dramatically how workplace harassment is addressed in Ontario. The new OHSA obligations and expectations have been set and are accompanied by expanded government oversight. Harassment in the workplace is already a challenging issue that could engage multiple forums, with complaints possibly being advanced through a grievance, civil claim, complaint under the Human Rights Code, and, depending on the severity of the conduct, the criminal justice system.

Also, and particularly, the Bill amends the OHSA to require an employer to conduct an investigation of a workplace harassment complaint that is “appropriate in the circumstances.” The phrase “appropriate in the circumstances” is not defined. Further, the Ministry of Labour has not published any guidance material to communicate what factors will be considered by inspectors when determining whether an investigation meets this standard. Assuming that the inspectors could be evaluating investigations against expected best practices which would include such things as an impartial investigator, a collection of all relevant information, and procedural fairness to the alleged harasser could create challenges for employers as the appropriateness of an investigation may be evaluated in hindsight.

Consequences of flawed investigations would impair or prejudice the employer’s ability to establish just cause for termination or discipline. There would also be an issue of due diligence under the OHSA and Human Rights Code. Consequences would include aggravated, punitive or Code damages; penalties from the Ministry of Labour under the OHSA and reinstatement in unionized workplaces. Some of the critical mistakes some employers are making include: failing to act at all; taking the complaint seriously; failure to train investigators; inability to plan, improper or inadequate files; and retention of evidence.

Many situations happening in the workplace may prompt the necessity for an investigation, such as allegations of discrimination or harassment, workplace bullying, inappropriate use of the internet or social media, policy breaches, or statutory violations. Often, employers attempt to resolve minor issues informally through discussions with the employees involved. When the allegations are more serious, employers may depend on managers to conduct internal investigations. However, in many situations, having an organization deal directly with the problem is not necessarily the best approach – informal discussions may rapidly collapse, and basic investigative steps may be overlooked by inexperienced managers, making matters worse. A vital skill for any employer is identifying when a formal investigation by an external investigator is appropriate.

Note: meeting the requirements of Bill 132 could lead to mistakes that can be costly to your organization.

Be prepared. Be proactive.

Contact Monika Jensen, Principal Aviary Group at [email protected]  or (905) 683-9953 if you need a complaint investigated or mediated.

Share

Embracing Civility for a More Satisfying WorkPlace

Complaints of harassment, discrimination, bullying and now violence and disrespectful workplaces have become a standard concern for managers and Human Resources specialist. As we cope with the many arising situations, I have found the word incivility is becoming frequently used. So what does incivility mean? To define it, let’s look at how the Institute of Civility describes it. Civility is about more than merely being polite. Civility requires a profound self-awareness being characterized by true respect for others. Civility involves the tremendous hard work of remaining present even with those with whom we have inherent and perhaps fierce differences. It is about continuously being open to hearing, to learning, to teaching and to changing. It pursues mutual ground as a start point for discussions when differences may occur, while at the same time be aware that differences are heartening. It is persistence, grace, and strength of character.

Recently research has expanded our practical understanding of incivility by identifying behaviours which employees have deemed disrespectful. The most frequently occurring forms include: neglecting to turn off cell phones; talking behind someone’s back; doubting someone’s judgement, using demeaning or disparaging language, gestures or behaviours; communicating with the intent to belittle or degrade, eye rolling, giving the silent treatment and using sarcasm; gossip and slander; paying no attention or ignoring someone; taking credit for someone else’s work or ideas; intimidation by intentionally using fear to manipulate others. It may also include yelling, invading personal space, throwing things, slamming things and losing one’s temper; and sabotaging by setting someone up to fail or intentionally creating a situation to make another person look foolish or incompetent. Also may include hate-ism by deliberately pointing at a victim based on age, gender, race or sexual orientation are instances of profiling because of an “ism.”

Many examples include blaming others rather than accepting responsibility; checking email or texting during a meeting; using email to send a difficult message to avoid facing the person, which may be misunderstood and misinterpreted; not saying “please” or “thank you”; not listening and talking over or down to someone.
The cost of incivility is high. It is not only about money! There is research to support impacts on performance through lost time and absenteeism, lack of creativity, less helpfulness and less likely to assist another employee. The impact of teams is on the level of energy, emotional engagement, and performance. The conduct reaches into our physical health; impacts our customers and commitment to the organization and willingness of employees to stay with their companies. All affecting the bottom line of productivity.
So how do we address these issues? I would like to explore some recommendations for your consideration. It starts with us as individuals. Managing ourselves. How? If you throw a ball at the wall…it comes back. It works with people too. If you are, mean…it comes back! People will be mean to you.

How can you be kind and patient all the time when life is so stressful—and just plain hard? You do it by embracing civility! Civility requires self-awareness.

With self-awareness you can:
 Control your attitude
 Manage your moods
 Choose behaviours that do not negatively impact your life or disrupt those around you

Can you…
 Feel and express annoyance, irritation or frustration without hurting others— and then let it go?
 Accept and even appreciate that other people have needs and opinions which are different from your own?
 Encourage and enjoy the successes of others?
 Recognize when someone else feels irritated, upset or frustrated and keep yourself from reacting impulsively in response?

As leaders, we need to model. The Russian novelist, Leo Tolstoy wrote: “Everyone thinks of changing the world, but no one thinks of changing themselves.” Employees look to leaders for guidance and someone to aspire too. What are they seeing? Watch your language and put away your smartphones when engaging with your staff. Be mindful of the perils of emails and other electronic communication. Pick up the phone or set up a face to face meeting instead. Take immediate and corrective action when warranted. Rude and disrespectful behaviours emerge quickly and sometimes without warning. As the leader, you need to respond at the moment. By delaying a reaction or action, it sends out mixed messages to the offender as well as the entire team. Take all complaints seriously, realizing that coming forward by the individual is difficult, and they need to know they are supported.

We attend seminars and workshop on harassment prevention, Creating Respectful Workplace and Violence in the Workplace. I have put together a workshop on “How Embracing Civility can Create More Satisfying Work Environments”. The agenda is:
• Why Civility Matters
• It Starts with You!
• Do What You Say and Say What You Mean
• Good Fences Make Great Neighbours
• Working in the Salad Bowl
• Eliminate Gossip and Bullying
• You Can’t Always Get What You Want
• Taking It to the Extreme
• Paving the Path to Civility

Contact Monika Jensen, Principal, Aviary Group, at [email protected]  if you are interested.

Share

What is IoT (Internet of Things) and How can it help government?

GovLoop Resources has produced a free guide on the Internet of Things (IoT) in Government.

What is IoT? How can it be used for impact in gov? How can you deploy it? 
 
Check out their new guide to move beyond the surface implications of IoT and understand the real value it can bring to government organizations. You will learn:

  • Key issues about the IoT by answering the most-asked questions.
  • Best practices from gov experts who play a critical role in IoT programs.
  • Valuable insights from interviews with various organizations using IoT.
Share

Why Organizations & Businesses Need An Acceptable Use Policy

Does your business have an acceptable use policy regarding office use of the Internet? More importantly, is your acceptable use policy (AUP) enforced, or is it a document that’s only seen upon the point-of-hire? Learn exactly why your company needs an AUP, even if you are just a small company with a handful of employees.

Download a sample “acceptable use policy” – Click Here.

What’s In an Acceptable Use Policy?

Acceptable Use PolicyAcceptable use policies outline when and how employees can use the business’ Internet access. Typically, these policies cover:

  • Purpose – The reason for the policy, from a business perspective.
  • General expectations – Here, place any general rules for Internet usage.
  • Acceptable use – This explains how employees are allowed to use the Internet.
  • Unacceptable use – This specifically calls out unacceptable uses of company Internet. It may focus on banning specific sites (i.e. social media) or on prohibiting behaviors.
  • Confidentiality and disclosure – Any business policies around confidentiality and disclosure of data go here.
  • Network use – Here place policies regarding user accounts, general accounts, and network boundaries.
  • Enforcement – The “teeth” of the AUP, this section lists when and how the enterprise will monitor network usage and punish violators.

Now that you have a refresher on what goes into an acceptable use policy, review why it is critical that you have one – even if you are a small business.

Why Small Business Need an AUP

The acceptable use policy protects your business from any legal actions, while clearly communicating to employees your expectations regarding their behavior.

It is far better to lay out acceptable usage and get employees on board early than to have to backpedal if something goes wrong. In a worst-case scenario, a staff member could introduce malware into the office environment visiting a site that would have been blacklisted – if you had an AUP in place.

An AUP may limit your liability around illegal file sharing. If your staff download ebooks, music, or video files from an illegal site, your business may be legally liable for this behavior. Can you afford to fight a file-sharing lawsuit?

Even if all downloaded media files are legal, your business may be paying to back up items that are personal in use. Additionally, if users are downloading large files, this hogs bandwidth. It may prevent staff from completing needed tasks quickly, by reducing the bandwidth available for legitimate uses. From a cost perspective, it’s worth the time to lay out policies regarding storage of file downloads.

It may seem obvious to block staff access to online gaming sites or pornography sites. Yet legitimate sites – YouTube, for one – can pose a big problem by hogging bandwidth and distracting staff from their duties.

Consider carefully which websites to specifically block. Aim to strike a balance between allowing staff access to information needed to do their job and enjoy a happy work culture and maintaining office productivity.

The best policies are not so specific that employees can easily loop around prohibitions, yet not so vague as to block or allow almost anything. Work with IT to create an AUP that is not only effective at reducing unwanted behavior and limiting your risk but can be enforced. To increase buy-in, consider sharing draft policies with staff and asking their opinion.

Once the AUP is final, distribute copies at an information session, answer any questions, and get staff signatures.

OnServe is the trusted choice for small businesses who wish to get ahead of the curve regarding IT tips and tricks. To learn more, please contact us at (613) 634-8125 or send an email to [email protected] for more information.

  • Article by OnSerVe/ Photo by ThinkStock photos

 

Share

Connecting the Words – Content Marketing & Search Engine Optimization

Content Marketing is gaining in popularity and those that once said, “I don’t have time”, are now weighing the time commitment against the benefits. All for good reason, Content Marketing works, but you need to start with an organized foundation. This brings us back to the overly discussed and often misunderstood, Search Engine Optimization, more specifically, keyword optimization.

Before you spread your valuable content all over the internet, understand that Google Search’s sole focus is to bring the best possible results to its users. Google doesn’t comprehend your content, it simply connects the words, and all words are not created equal. If a searcher is looking for cereal, Google will bring back results that contain the word cereal, not oatmeal, cheerios, formula or Kellog’s, just cereal.

When planning and preparing your content, know your keywords and work to provide Google with a clear and concise path to your website’s content, blogs, images, videos, etc.

Content Marketing and Key Words

 Content Marketing Keyword Optimization SEO infographic

Home Cooked Website Solutions Inc. is a full-service marketing company located in Ontario serving Midland, Penetanguishene, Barrie, Orillia, Parry Sound, Toronto, and surrounding areas. 

Share