Content Management Blunders From Down UnderContent Management Blunders From Down Under
The hits keep coming in from our "<a href="http://www.informationweek.com/blog/main/archives/2008/04/top_5_reasons_a.html">Top 5 Reasons A Content Management Company Will Go Out Of Business</a>" post. This time, the experiences come from a university from the land down under, proving content management blunders serve us all on a truly global scale.
April 30, 2008
The hits keep coming in from our "Top 5 Reasons A Content Management Company Will Go Out Of Business" post. This time, the experiences come from a university from the land down under, proving content management blunders serve us all on a truly global scale.And just for the record, we're painfully aware that most of the reasons apply to any technology company, certainly one that builds software.
• No. 1 -- You fail to thoroughly test your new releases, then delete any problem posts from your tech forum. • No. 2 -- There's not enough interaction between front-line technical staff and the engineers, so a problem goes for 3 months of "we haven't changed that" and then ends with a message from engineers with "oh, yes, we did." • No. 3 -- Your documentation hasn't been properly reviewed for a new release, so it contains suggestions that haven't worked for two major releases • No. 4 -- You have 'modular' products where you don't have to include all the pieces, but things are a bit strange if you don't. They're also problematic if you do, because you have to provide for customers that haven't bought them all. • No. 5 -- 'Upgrading' turns a functional testing machine into a nonfunctioning lump of silicon that needs to have its OS reinstalled because it is so far beyond being repaired. Nos. 1 and 4 are my favorites. The fourth one, describing the modular product pitch, really hit home. The challenge with "marketing modular" is the modules become moving targets, updated in collateral and client pitches as frequently as new functionality can be dreamed up by management. Do everyone a favor and first make sure you have the architecture in place to support your wild-eyed quest for more market share. OK, I'm done.
About the Author(s)
You May Also Like
The New Frontier of Cyber Security: Securing the Network Edge
Checklist: Top 6 Considerations to Optimize Your Digital Acceleration Security Spend
Top Six Recommendations to Improve User Productivity with a Hybrid Architecture
An Ultimate Guide to the CISSP
Three Ways Fortinet Hybrid Mesh Firewalls Secure Edge Networks