Monday, 23 March 2015

Full Circle Magazine issue 94 out now


Full Circle Magazine issue 94
Full Circle Magazine is pleased to announce the release of issue 94.

This month:
  • Command & Conquer
  • How-To : Block Calls, LibreOffice, and Using i2P
  • Graphics : Inkscape.
  • Linux Labs: BTRFS
  • Book Review: Practical Data Science Cookbook
  • Ubuntu Games: War Thunder
plus: News, Arduino, Q&A, and much more.

Get it while it’s hot!
http://fullcirclemagazine.org/issue-94/

Share it now!

Full Circle is a free, independent, monthly magazine dedicated to the Ubuntu family of Linux operating systems. Each month, it contains helpful how-to articles and reader submitted stories.

Sunday, 22 March 2015

Opinion: Goodbye Google Plus [Guest Post]


Google Plus: image Creative Commons by West McGowan 
It’s true: Google is breaking it’s heavily embedded but failed social networking product Google Plus into separate products – Streams and Photos, new head of Social Bradley Horowitz announced on Google+ earlier this month.

It was telling that Horowitz didn’t specifically mention Google Plus, which pretty well signals the end of Google’s foray. Google Plus was supposed to be a one-stop shop for interactiing across all products and all users.

Clearly the vision has changed.

Friday, 13 March 2015

How-to: Develop a backup policy and procedure


You will find no end of statistics on the number of companies that fail and the people who get fired in the aftermath of a data disaster; fire, flood and electrical failures cause interruptions to normal business and if you can't avoid it, the key thing is how you recover and get back up and running.

Your various systems - sales, logistics, HR, payroll, accounts, membership, inventory - these are all databases that contain the data critical to the overall success of your organization; not only does that need to be backed up regularly, but you also need to test the restore process.

That does not change whether all of that resides on premises, at a third party or on-line in the Cloud.

Thursday, 26 February 2015

How-to: Start Planning your CRM Landscape


Tibet landscape by Luo Shaoyang from Beijing, China (Tibet) [CC BY 2.0 (http://creativecommons.org/licenses/by/2.0)], via Wikimedia Commons For its foundation stones, CRM requires some basic building blocks in terms of storing data.

As with any technical solution, using CRM successfully depends on storing data in the right place and in the right way, which can only happen with careful consideration and planning; mapping your data into a sensible structure that the CRM can support.

That means planning for the general rule and carefully corralling the exceptions; just because you can go wild with custom fields for any and every occasion, doesn't mean you should.

Wednesday, 25 February 2015

How-to: Develop an Implementation Plan


The user requirements are in; the specification and designs signed off; development ready to begin; then you realise you have no idea what the implementation looks like!

With a major programme such as CRM to run, a phased implementation plan, scheduling delivery of slices of functionality, over the life of the project, would be a good approach. We're aiming to get the foundation components in place - the database schema, frameworks, server infrastructure, then, while detailed design and development continues, identify some quick wins to provide business benefit early on.

There's no point  waiting for a monolithic development to complete if everyone has retired or died in the interim...

Thursday, 19 February 2015

How-to: Review a Data Design


"the code be more a set of guidelines than actual rules"
(Pirates of the Caribbean)

This is not the only way, nor is it drawn from any particular method; this is just a convenient set of hooks on which to hang our data design meeting this week. You could apply it to any kind of design review, and it works well in the context of much more formal methods.

So my agenda for tomorrow looks like this:

Wednesday, 18 February 2015

How-to: Understand Website 'Identity Information'


...or more precisely, when a reputable website such as Wordpress.com displays a warning triangle and the message: "this site does not supply identity information."

You may notice the warning triangle in the address bar on sites which use the HTTPS, SSL and TLS protocol and certificates, and get the message when you scroll over it. Wordpress? Really?

Let's replay Internet Security-101, with apologies to the technically 'ept' (not the 'inept').