Wesite Design

Wesite Design

  • Bootstrap- UX Design Frameworks

     Bootstrap- UX Design Framworks

     Bootstrap- UX Design Frameworks 

    Bootstrap is a free and open-source collection of tools for creating websites and web applications. It contains HTML- and CSS-based design templates for typography, forms, buttons, navigation and other interface components, as well as optional JavaScriptextensions. It aims to ease the development of dynamic websites and web applications.

    Bootstrap is a front end framework, that is, an interface for the user, unlike the server-side code which resides on the "back end" orserver.

    Bootstrap is the most-starred project on GitHub, with over 88K+ stars and more than 37K+ forks.

     

    We use bootstrap  UX frameworks for designing user interface for  WordPress CMS, Joomla CMS, Liferay CMS and Magneto Ecommerce . Bootstrap  is quite powerful and can be used for many user interface applications. Bootstrap based User Interfaces are custom made and unique. This means your website will have look and feel that is not shared with other websites. Such uniqueness helps in branding and positioning

     

     References :

     1.0  Getting Started with Bootstrap 3.3- ASIN: B00J6N75ZA

     2.0 UX Strategy: How to Devise Innovative Digital Products that People Want- ASIN: B00XZF0J26

     

     Note: This is an Working Article- Expect Revisions. Please note most  of the Published and Acacdemic papers have Permission of Use Policies. Please  read them craefully.  

     

  • Branding and Positioning for Websites

     Branding and Positioning for Websites

     

    Positioning and Branding For Websites

     

    What is Branding

     

    In business very little communication takes place, unless it is planned and executed properly. This is where branding and positioning comes in. In business, you have to communicate to customers your strengths and abilities against your primary and secondary competitions. The communication has to state what you do similar to your competitor and in what aspect you are different and superior.

     

    This differentiated message based on comparing and contrasting your business verticals is called branding.

      

    What is Positioning

     

    Positioning is what your customer perceives you are capable of. People always makes perception of You and your company from various things. The speech, voice, tone, the marketing materials and website. If the website is shabby and unprofessional, people will not take you seriously.

     

    On the other hand a professional appearance and clear communication can position you as a leader. Your customer has mental ladder in his mind- you have to create images and values in custom's mind that correlates to your products and service values. Quite often, technical entrepreneurs position themselves far below their capabilities in customers mind. The object of positioning is to correct that.

     

    The more technical the nature of your work- the more important it is for you to Position and Brand yourself- since average customer can never understand your depth of expertise and Values you bring to customers. The customer will position and brand your company using visual clues- the style of communication and clarity- The emotional and psychological content of the message. It is dues to this reason- Scientist- Engineers- Lawyers and Doctors should be careful of the communication and avoid technical details and focus on emotional and psychological aspect of communication and persuasion.

     

    What Problems It Solves For your Business 

     

    The market place is crowded with your competitors and you need to clearly communicate. This why a professional website with emphasis on Branding, Positioning and growth strategy is Important. With Internet and mobile phones people are looking for information in web for products and services and you need to get the message out- what you do- like your competitor, but more importantly what you differently and better- Positioning.

     

     

    Please contact us to discuss futher possibilities. In all buiness development websites, we include branding and positioning as an integral component of development.

     

     

     

    References

     

    1.0 Positioning- Al Reis and Jack Trout- ISBN 978-007-137358-6

     

    2.0 Ogilvy- You tube

     

    3.0 Sasha Strauss - Berkeley Hass School Google Talk

     

    4.0 Brand Relevance -  Hass School

     

  • Business Process Reengineering

     Business Process Reengineering

    Business Process Re-engineering (BPR) Definition

    Business process re-engineering (BPR) is the "fundamental rethinking and radical redesign of business processes aimed at achieving radical improvements in essential contemporary measures of performance, such as cost, quality, service and speed" (Hammer and Champy, 1993).

     

     

     

     References :

    1.0  Reengineering the Corporation: Hammar and Champy

    2.0 Competitive Advantage- Porter

    3.0 Competitive Strategy- Porter

    4.0 Business Process Modeling- Article Link

    5.0 Business value of Managed Service- Article Link

  • Growth Hacking- Viral Marketing

      Growth Hacking- Viral Marketing

      Growth Hacking- Viral Marketing 

    Given the media hype that surrounds the term ‘Growth Hacking’, you can be forgiven for dismissing the whole thing as another marketing buzzword. But what can get lost in the hubbub are some useful, development-inspired, working practices that can help a team focus on maximizing growth.

     

     

    In this Tech Talk, Rob Sobers, Director of Inbound Marketing at Varonis, tells you all you need to know about Growth Hacking. Rob explains what Growth Hacking is and describes the processes key for it to be effective – from setting goals, to working through an experimentation cycle and how it works in practice.

    Rob was formerly a Support Engineer here at Fog Creek, and is the creator of his own product, Munchkin Report. He writes on his blog about bootstrapping and startup marketing.

    Detailed Article

     

     Keen  Computer References

     1.0  Growth Hacker Marketing- Ryan Holiday- A Penguin Special

     2.0 Forbs Article- Growth Hacking 

    3.0 Quora Growth Hacking

    4.0 KeenDirect Video

    5.0 Running Lean- 2nd - Orielly: -Running Lean Slides

    6.0 Growth Hacking-  sira Bowden

    7.0 Customer Factory- Customer Factory- youtube

    8.0 Marketing Experiments- Marketing Exprements 

    9.0 Startup Grind- Web Portal 

    10. Lean Startup- slideshare

    11.0  Value Proposition Design- slideshare

    12.0 Startup Lessions  Learned - Blog 

    13.0 Groth Hacking Web- Discussion

    14  E-business Analysis and Design

    15 Value Proposition Canvas- Osterwilder 

    16 Orielly - Fireside Chat Video

    17 Orielly Lean Series 

     

  • Integrated Marketing & Communication In E-Solutions

    Integrated Marketing and Communication

    What is  Integrated marketing and Communication- (IMC)

     

     IMC as shown in the diagram - 2.1 above is a marketing strategy analysis, target marketing process followed by planning and program development. The resulting output of the IMC is used to derive  communication messages of a  corporate website and or E-Commerce solutions.

     

     IMC Strategy

    How IMC and Website and E Commerce work Together- the Big picture

     IMC empowers you with  a big picture of the corporate marketing  communication process that encompasses, various  channels, various target markets and various key objectives like branding and positioning,  market development and competitive  strategy. Doing marketing without understanding IMC is completely foolish- As Sun Tzu of The Art of War in  China says every war is won before the battle is fought. In  E-Business context this means  creating  a website and an e-commerce before applying analysis methods of   IMC, at best, the effort will be wasted.

     

    In E-solutions ( Web CMS and E-Commerce Solutions  ) IMC analysis  is done in conjunction with UX Design, Information Architecture and Content Strategy. The process is iterative , since so many factors and so many people are concerned. In fact,  the use of Collaboration Server[5] is quite common in the IMC analysis and design step. Typically One note  and mindmap is used for research  and analysis and as a writing tool.

     

     ELM- elaboration Likelihood Model of Communication

    Analyzing your methods, channels and Effective Process of Communication

     This is the central task of IMC, essentially you are examining various  alternatives to deliver the value message to the target segment of the market.  We utilize various Models of Communication- like Elaboration Likely Hood Model of Communication (ELM) as shown in figure 5.9 above. In ELM model we examine the message  receiver, the channel  and the authority of the  source of communication.

     Examining your Results and Revisions

      Various analytics tools provide  rapid feedback. Also consumer research provides before and after  feedback data. You should use such information to design your next pass of the IMC Analysis

     Various Case Studies and Creative Element of IMC

     The creative element of IMC is best understood by examining the case studies against the qualitative analysis frameworks of Belch and Belch IMC text[1].  We find Mindmap [4] to be effective in this process. The best is to work backwards from the target customer  to the business delivering the  messages, in the process competitive strategy and value chain of the messages has to be examined.[3] This means we need to understand our competition completely.[3]. This  understanding makes positioning effective and scientifically accurate. The source  & persona of the message is very  important in the communication.

      

     Summary

     Integrated marketing and communication are intricately connected with Business Development . It is not uncommon that  many business has not been able to integrate IMC and E-business solutions. Such  partial measures has resulted in  websites and e-commerce not being effective and waste of time and effort.  Rapid feedback from various  web analytics tool can clearly  demonstrate the value of the IMC  in the communication and business development process.

    Next Action Process

     Please contact us  regarding how integrated marketing & communication and E-Solutions can help your business. One of our Engineers will be happy to assist you in your endeavour.

    Acknowledgement

    The IMC Process  & ELM process  figures are taken from IMC Belch& Belch textbook [1]

     References

     1.0 IMC- Belch & Belch- ISBN-13: 978-0073404868

    2.0 IMC Handbook  ISBN-13: 978-1933199061

    3.0 The Art of war- Sun Tzu-  ISBN-13: 978-1590300541

    4.0 MINDMAP- Analysis Tools- software

    5.0 Alfresco Collaboration Server- software

    6.0 Microsoft One Note- software

     

      Note: Version 0.1150116

  • Wordpress Business Websites

     Wordpress Business Websites  

    Wordpress Business Websites 

     

     

     

    Demo Portfolio

    1.0 Dalma Pizza-  Live website

    2.0 IASR- The Engineering Company Live websire

    3.0 Reisig Consulitng- Live website

    4.0 Cordner Construction- Live Website

     

  • Business Development Website- Analysis and Design Process

     

    Business Development Website-  Analysis and Design Process

    We have worked over the years in various aspects of business development using IT. We are currently expanding our business in software development areas like web portal development and E-commerce solutions.Websites and E-commerce are areas where a large number of businesses can benefit from quality marketing and sales assistance.

  • Business Strategy and Execution

    Business Strategy and Execution

     

    Business Strategy and Execution

     

    admin - Posted on 23 September 2008

    Business Strategy and Excution is very important for all forms of business. How ever geting information to create strategy is not very easy. I am working on a systematic methods to gather strategic information for analyzing Software and IT Business.
    If you have any suggestion , please let us know.

    References:
    1.0 http://www.valuebasedmanagement.net/index.html
    2.0 http://www.jaxworks.com/index.htm
    3.0 Socratic Methods
    http://www.viddler.com/explore/mikeolpin/videos/22/
    4.0 Business Strategy
    http://swengineer.blogspot.com/2008/03/socratic-methods-and-competitive....
    5.0 Porter
    http://www.amazon.com/Competitive-Strategy-Techniques-Industries-Competi...
    6.0 Whorton
    http://www.amazon.com/Wharton-Dynamic-Competitive-Strategy-George/dp/047...
    7.0 Soctratic Methods
    http://books.google.ca/books?id=F0Ol9KbWROoC&printsec=frontcover&dq=socr...
    8.0 Socratic and Aristotal
    http://www.amazon.com/Socratic-Logic-Questions-Aristotelian-Principles/d...
    9.0 Ram Charan- execution
    http://www.amazon.com/Execution-Discipline-Getting-Things-Done/dp/060961...

  • Designing a Website That Deliver Results - KPI as a Strategy

    Designing a  Website That Deliver Results

    Key Performance Indicator (KPI) as a Strategy for Business Development Websites and E-commerce

     

     

    Measuring business performance on the basis of finance alone is flawed. Business performance should include other aspects of the business like:

    1.0  Utilization of Assets and Working Capital

    2.0 Research and Development and Continuous Learning

    3.0 Customer Satisfaction and Customer Development

    4.0  Environment and Community- Protection and  Development

    5.0 Internal Discipline and Order- Delivery on Time and being Effective

    6.0 Employee Satisfaction-  Retention and Skill Based Training

     

  • Document Management Solutions

    Document Management Solutions

    Document Management Systems

     

    A document management system (DMS) is a system (based on computer programs in the case of the management of digital documents) used to track, manage and store documents. Most are capable of keeping a record of the various versions created and modified by different users (history tracking). The term has some overlap with the concepts of content management systems. It is often viewed as a component of enterprise content management (ECM) systems and related to digital asset management, document imaging, workflow systems and records management systems.

     

     

    Document management systems commonly provide storage, versioning, metadata, security, as well as indexing and retrieval capabilities. Here is a description of these components:

     

    Topic

    Description

    Metadata

    Metadata is typically stored for each document. Metadata may, for example, include the date the document will be stored and the identity of the user storing it. The DMS may also extract metadata from the document automatically or prompt the user to add metadata. Some systems also use optical character recognition on scanned images, or perform text extraction on electronic documents. The resulting extracted text can be used to assist users in locating documents by identifying probable keywords or providing for full text search capability, or can be used on its own. Extracted text can also be stored as a component of metadata, stored with the image, or separately as a source for searching document collections.

    Integration

    Many document management systems attempt to integrate document management directly into other applications, so that users may retrieve existing documents directly from the document management system repository, make changes, and save the changed document back to the repository as a new version, all without leaving the application. Such integration is commonly available for office suites and e-mail or collaboration/groupware software. Integration often uses open standards such as ODMALDAPWebDAV and SOAP to allow integration with other software and compliance with internal controls.[citation needed]

    Capture

    Capture primarily involves accepting and processing images of paper documents from scanners or multifunction printersOptical character recognition (OCR) software is often used, whether integrated into the hardware or as stand-alone software, in order to convert digital images into machine readable text. Optical mark recognition (OMR) software is sometimes used to extract values of check-boxes or bubbles. Capture may also involve accepting electronic documents and other computer-based files.

    Validation

    Visual validation registration system and important data. E.g. document failures, lack of bells,[clarification needed] missing signatures, misspelled names, this can be printed on paper documents or images on paper.

    Indexing

    Indexing tracks electronic documents. Indexing may be as simple as keeping track of unique document identifiers; but often it takes a more complex form, providing classification through the documents' metadata or even through word indexes extracted from the documents' contents. Indexing exists mainly to support retrieval. One area of critical importance for rapid retrieval is the creation of an index topology.

    Storage

    Store electronic documents. Storage of the documents often includes management of those same documents; where they are stored, for how long, migration of the documents from one storage media to another (hierarchical storage management) and eventual document destruction.

    Retrieval

    Retrieve the electronic documents from the storage. Although the notion of retrieving a particular document is simple, retrieval in the electronic context can be quite complex and powerful. Simple retrieval of individual documents can be supported by allowing the user to specify the unique document identifier, and having the system use the basic index (or a non-indexed query on its data store) to retrieve the document. More flexible retrieval allows the user to specify partial search terms involving the document identifier and/or parts of the expected metadata. This would typically return a list of documents which match the user's search terms. Some systems provide the capability to specify a Boolean expressioncontaining multiple keywords or example phrases expected to exist within the documents' contents. The retrieval for this kind of query may be supported by previously built indexes, or may perform more time-consuming searches through the documents' contents to return a list of the potentially relevant documents. See also Document retrieval.

    Distribution

    A published document for distribution has to be in a format that can not be easily altered. As a common practice in law regulated industries, an original master copy of the document is usually never used for distribution other than archiving. If a document is to be distributed electronically in a regulatory environment, then the equipment tasking the job has to be quality endorsed AND validated. Similarly quality endorsed electronic distribution carriers have to be used. This approach applies to both of the systems by which the document is to be inter-exchanged, if the integrity of the document is highly in demand.

    Security

    Document security is vital in many document management applications. Compliance requirements for certain documents can be quite complex depending on the type of documents. For instance, in the United States, the Health Insurance Portability and Accountability Act (HIPAA) requirements dictate that medical documents have certain security requirements. Some document management systems have a rights management module that allows an administrator to give access to documents based on type to only certain people or groups of people. Document marking at the time of printing or PDF-creation is an essential element to preclude alteration or unintended use.

    Workflow

    Workflow is a complex process and some document management systems have a built-in workflow module. There are different types of workflow. Usage depends on the environment to which the electronic document management system (EDMS) is applied. Manual workflow requires a user to view the document and decide whom to send it to. Rules-based workflow allows an administrator to create a rule that dictates the flow of the document through an organization: for instance, an invoice passes through an approval process and then is routed to the accounts-payable department. Dynamic rules allow for branches to be created in a workflow process. A simple example would be to enter an invoice amount and if the amount is lower than a certain set amount, it follows different routes through the organization. Advanced workflow mechanisms can manipulate content or signal external processes while these rules are in effect.

    Collaboration

    Collaboration should be inherent in an EDMS. In its basic form, collaborative EDMS should allow documents to be retrieved and worked on by an authorized user. Access should be blocked to other users while work is being performed on the document. Other advanced forms of collaboration act in real time, allowing multiple users to view and modify (or markup) documents at the same time. The resulting document is comprehensive, including all users additions. Collaboration within Document Management Systems stores the various markups by each individual user during the collaboration session, allowing document history to be monitored.

    Versioning

    Versioning is a process by which documents are checked in or out of the document management system, allowing users to retrieve previous versions and to continue work from a selected point. Versioning is useful for documents that change over time and require updating, but it may be necessary to go back to or reference a previous copy.

    Searching

    Searching finds documents and folders using template attributes or full text search. Documents can be searched using various attributes and document content.

    Publishing

    Publishing a document involves the procedures of proofreadingpeer or public reviewing, authorizing, printing and approving etc. Those steps ensure prudence and logical thinking. Any careless handling may result in the inaccuracy of the document and therefore mislead or upset its users and readers. In law regulated industries, some of the procedures have to be completed as evidenced by their corresponding signatures and the date(s) on which the document was signed. Refer to the ISO divisions of ICS 01.140.40 and 35.240.30 for further information.[3][4]

    The published document should be in a format that is not easily altered without a specific knowledge or tools, and yet it is read-only or portable.[5]

    Reproduction

    Document/image reproduction is key when thinking about implementing a system. It's great to be able to put things in, but how are you going to get them out? An example of this is building plans. How will plans be scanned and scale be retained when printed?

     

     

    Please contact us for details. One of our engineers will be happy to discuss your requirements.

  • E-commerce Solutions

     

    Ecommerce Solutions

     

    Electronic commerce, commonly known as E-commerce or e-commerce, is trading in products or services using computer networks, such as the Internet. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web for at least one part of the transaction's life cycle, although it may also use other technologies such as e-mail.

     

     We utilize various open source e-comer Frameworks like Java based OFBIZ and PHP Based Magento and Open cart for e-commerce implementation.  Such solutions are well suited for SMB marketplace.

     

     In case you are thinking about e-commerce, we request you to contact us for details. Initial consultation is private, fee and without any obligation.

  • Enterprise Website & E-commerce Design

    Enterprise Website & E-commerce Design

     

    Enterprise Website & E-commerce Design

     content management system (CMS) is a computer application that allows publishingediting and modifying content, organizing, deleting as well as maintenance from a central interface.[4] Such systems of content management provide procedures to manage workflow in a collaborative environment.[5] These procedures can be manual steps or an automated cascade. CMSs have been available since the late 1990s.

     

  • How SSL Can Secure and Add Features to Your Joomla! Site

     

    How SSL Can Secure and Add Features to Your Joomla! Site

    •  

    •  
    •  

    Joomla! takes security very seriously and is extremely proactive about fixing any issues that may arise. That doesn't mean that there isn't more you can do for your Joomla! website to protect it. Using SSL, you can enable a few features already built-in to Joomla! and protect from some easy exploits that may be taken against your site and users users. Better yet, SSL can be used for other features you may not even know about.

     

     How SSL Can Secure and Add Features to Your Joomla! Site

     

    Why you should be using SSL on your website

    SSL (or TLS as it’s newer revisions call it) is that little padlock that has appeared on webpages since Netscape 2.0 in 1996. While it’s commonly thought that SSL is only really needed on e-commerce, financial, or other similarly sensitive sites, the truth is that any site can benefit from the added security, including your Joomla! website. You don’t even need extra extensions, there are features built-in to Joomla! that you can take advantage right now to help your users, and especially yourself, be more protected.

     

    But, I don’t have anything special to protect

    Yes you do! One of the most valuable things on any website is the username and password for accessing the site. Even if you don’t have users that login to the Front-end of your site, surely, you log into the Administrator area. If you’re not using SSL, others can impersonate you in multiple ways and steal the ‘keys to castle’.

     

    So what’s at risk?

    When any user logs into your Joomla! site, their username and password are sent over the internet to your server. That part is obvious. What’s not obvious is that username and password can be intercepted anywhere along the way path from the users browser to a wireless router to the ISP to the server itself. While smaller sites are unlikely to be targeted, it's possible. More likely though, as the use of wireless networks at restaurants and coffee houses is pretty commonplace now, those credentials can be intercepted right out of the air before it even goes on the internet.

     

    What can someone do with credentials from my site?

    Well, if you’re an administrator, they can do anything they want. Additionally, for your users, password over-use is an extremely common problem. While you may not think credentials to your site are that valuable, they can be useful if the user for some crazy reason has the same username and password on a major retail site, hosting company, or other higher profile sites.

     

    How can SSL stop this?

    It’s amazingly simple, actually. In the Joomla! Login module, there’s a simple setting “Encrypt Login Data”. When you have an SSL certificate on your website, this setting will have the user’s browser encrypt their username and password before it’s sent over the internet to your server. That’s it!

     

     

    Session Cookies are vulnerable too

    With Joomla!, when a user logs into the Front-end or Back-end area of your website, a special session cookie is set in the browser to identify that user. That cookie is transmitted with every page load so that Joomla! knows the user that is viewing the page. That cookie then grants them the priveleges to do what any registered or administrator user can do.

    While the cookie is less of a threat as it will eventually expire, it’s still something that may be worth securing, depending on your site. By simply using SSL across your site, that cookie will be encrypted as well. Again, securing this aspect is as easy as changing the “Force SSL” setting in the Joomla! Global Configuration area. Simply set it to “Entire Site” or “Administrator Only”. If you have an SSL certificate, there’s no reason to select “None”, you should at least choose “Administrator Only” which will prevent your Back-end session cookie being taken, preventing access to the whole Administrator section of your site. 

     

    Really, is this even possible?

    In 2010, a Firefox addon named Firesheep was released which can automatically scan a wireless network to show and use any session cookies for popular sites like Facebook and Google. While there isn’t an easy addon specific to Joomla! sites, the possibility is still there.

     

    The drawbacks to SSL

    The biggest drawbacks of SSL are possible cost and performance. Depending on your hosting plan, an SSL certificate may cost anywhere from free to $150 / year. That cost all depends on if your host supplies a ‘free’ shared SSL certificate, lets you install your own from a 3rd party vendor (as low as $10-$20) or force you to buy one from them (up to $150).

    If the price is justifiable for your site, the only other thing to consider is that there is a slight performance hit. Since images, Javascript, CSS files and other content will be encrypted, the user’s browser won’t be able to cache these assets. That means more requests per page. While the impact should be minimal, depending on your hosting plan and traffic, it’s worth noting.

     

    Are there other features for SSL?

    Yes! The whole reason this article came about was because we received similar questions of “What else is SSL good for?” on our forums. For our Joomla! Facebook integration extension,JFBConnect, SSL is required for Facebook invitations to be sent and for Page Tab integration, to show parts of your website on your Facebook page. Since most sites don’t have SSL, we started presenting multiple reasons that it can beneficial to have an SSL certificate outside of just enhanced Facebook integration.

    There’s plenty of other reasons for SSL that you probably weren’t aware of, and hopefully now you a few good examples. Do you have any other ways that SSL can enhance features, functionality, or general security of a website you’d like to share? Post them in the comments below.

     

     

     Please contact us  regarding how you can apply lean IT principals to your Organization. One of Our engineers will be happy to discuss  your requirements.

     

  • Joomla Business Websites

    Joomla  Business Websites

    Commercial Joomla Websites

     

     

     

     

     

     Demo Sites

     1.0 Keencomputer Solutions - Live Site

    2.0 Solarsolutions Africa- Live Site 

    3.0 Indian Army School- Live Site

    4.0 Canadian Roof Works - Live Site

     

  • Liferay Enterprise Portal Development

    Liferay Enterprise  Portal Development
     

     

     

    Liferay CMS Solutions

     

    Liferay Portal is a free and open source enterprise portal project written in Java and distributed under the GNU Lesser General Public License and optional commercial license. The Liferay project additionally supports Liferay Social Office, Liferay Sync, Liferay AlloyUI, Liferay enterprise Connectivity Apps and the Liferay Marketplace. It is primarily used to power corporate intranets and extranets.

  • Web Design and CMS

     

    Web Design and CMS

     

    content management system (CMS) is a computer application that allows publishing, editing and modifying content, organizing, deleting as well as maintenance from a central interface.[4] Such systems of content management provide procedures to manage workflow in a collaborative environment.[5] These procedures can be manual steps or an automated cascade. CMSs have been available since the late 1990s.

    CMSs are often used to run websites containing blogs, news, and shopping. Many corporate and marketing websites use CMSs. CMSs typically aim to avoid the need for hand coding, but may support it for specific elements or entire pages.

     

     we utilize various open source CMS Frameworks in PHP,  JAVA and ASP.NET Technologies.  In particular we work with  WORDPRESS, JOOMLA, LIFERAY  and Dot Net Nuke( DNN) Frameworks. We undertake custom Template design and modules development if necessary.

     

     Information architecture, UML Based web architecture, Interaction design, and custom web application development is also undertaken in the development process, In every stage we undertake agile development methodology.  For details of complete lifecycle of development process, please contact us.

     

     

     CMS based web sites are well suited for     SMB customers. In most cased we try to optimize cost of development utilizing open source components and frameworks. All our CMS solutions are mobile ready and we embrace responsive web development technology. In case  you are contemplating web development and or upgrade of a website, please contact us for details.

  • Writing Web Content

    Since a large number of E-commerce and Static website requires good amount of English Composition- The process can be frustrating since the objective of writing has no fixed goal.

    Are we writing to create an online marketing campaign? Are we trying to communicate?
    What is our goal and strategy? Are we creating a Public Relations material that is supposed to create a buzz like strong German Schnapps or the public relations will be low key like warm Glue-Wine of Scandinavian Christmas.
    Are we just trying to create some ineffective web pages with a lot of CSS so that we can demonstrate our technical savvy?

    In a more technical sense, Are we substantiating an argument? Using persuasion and compare and contrast to establish a point. Are we just trying to educate some factual information? Who is our target audience? Why such person be interested in our website?
    Does the end user needs to be entertained? excited? provoked? educated?

    Some how the short answer seems to all the above- and that makes it difficult.

    I have found a solution. A new book on web content design seems to be immensely practical and useful. I am reading it , right now-Killer Web Content- Garry McGovern . I highly suggest this book to any one involved in web design and content creation. Also try the letting go words[4]. I use letting go words of Redish in all my website works.

    Reference:

    0.0 Communicating Design- http://communicatingdesign.com/
    1.0 http://www.useit.com/
    2.0 http://websitetips.com/
    3.0 Information Architecture- ISBN 0-596-52734-
    4.0 Letting go words- ISBN- 0123694868
    5.0 Ginny Redish- http://www.redish.net/content/about.html
    6.0 Slide Presentation- In Power Point as Attachment

Go to top