Web site security, design and development: caution is key when building and maintaining web sites: sensitive information can now be carried around on a key chain and the majority of these timesavers does not encrypt any of the data. If lost or stolen, it could be disastrous to the company, its employees and its customers.

AuthorColby, Kent L.

[ILLUSTRATION OMITTED]

A few years back, a group of University of Alaska Southeast (UAS) business students were assigned a presentation for board members of a hypothetical company. Many of the class dazzled us with brilliant digital layouts, animated whiz-bangs, and presentations that would not fit on or be readable on a standard sheet of paper. These HTML or Web-based productions were very dull in black and white, sans the virtuoso graphics. "Know our audience," I criticized. "If they can't put it in their briefcase and take it to the office or home for review and comment, it may be lost."

Times, they are a changing. And, changing faster than a new Web site can be built. (Or, are Web sites born?) This past week, I browsed across a commentary by Anita Schoenfeld, "Tillinghast-Towers Perrin: Why Kill a Tree When You Can Beam an Electron." Schoenfeld addresses the issues of piles of paper that serve as doorstops, and the frustration of creating meaningful reports with lots of graphs and charts that take hours to produce and almost as much time to print. "Well, maybe all you need to do is improve the way you communicate, and not the content," says Schoenfeld.

USE WEB SITES INTERNALLY

Web sites are not just to dazzle customers anymore. These portals can serve companies' internal requirements via the intranet (a custom, internal Web environment), as well as the customers and vendors on the Internet (i.e., the World Wide Web). Whether the end creation is a basic Microsoft Power Point presentation, or an in-depth, custom report with detailed analysis and powerful graphics and illustrations, the CEO or the guy with the red stapler can print just the pages that suit his or her requirements.

With server virtual private network (VPN) access, the detailed reports can go anywhere and be available at the click of a mouse. The best solution for distributing bulbous reports may just be not distributing them at all.

With proper management, report diaries can be generated to see who, if anyone, has even looked at the report, right down to the page(s) viewed. Try doing that with paper-only reports. Additionally, users can download a report, modify the analysis, reformat, make changes, and even add their own graphics to re-circulate for the next level of review.

BUSINESS BEWARE!

Today's business environment is characterized by rapid, unpredictable change--and not all of the changes are conducive to progressive business.

Enter hackers, spammers, worms, evil twins, Trojans and viruses: a virtual...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT