The 8 Don'ts of WCM


Published on

Presentation given at the Butler Web Content Management Strategy Briefing in November 2009 in London. Beyond the slides the presentation contained live demo of features in Day CQ5.

Published in: Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

The 8 Don'ts of WCM

  1. 1. The 8 Don'ts of WCM An Insider's Perspective Cédric Hüsler Photo: Craig Allan OVUM Butler Group Web Content Management Strategy Briefing - Nov 2009 - London
  2. 2. Cédric Cédric Hüsler Marketing Directo r of Product er Cédric Hüsl .com cedric@day @keepthebyte In Web Content Management since 1999.
  3. 3. Headquarter in Basel [Switzerland] and Boston [US] Founded 1993 - publicly traded since 2001 [DAYN] World-wide 130 employees +200 customers
  4. 4. #fail #fixwcm #futurewcm
  5. 5. Not talking about: You don’t know what you want Ever-changing goals People on the job don’t have the skills Doing project management via e-mail Product has bugs and bad documentation Trying to get the cheapest deal and then complain
  6. 6. 1. Content Editing Apply Formating WYSIWYG In-context
  7. 7. In-Context Editing?
  8. 8. Can you find the difference?
  9. 9. 2. URLs Links Stateless REST
  10. 10. f=q&source=s_q&hl=en&geocode =&q=Barf%C3%BCsserplatz, +Basel&sll=47.46217,8.06375&ssp n=0.540356,1.098633&ie=UTF8&hq =&hnear=Barf%C3%BCsserplatz, +Basle,+Switzerland&z=16 vs.
  11. 11. .../product.jsp?id=12346 Mistake 1 : Mistake 2: Mistake 3: Addressing the .jsp? What the “Script” heck? Does it have a name? /cars/audi/s4.details.html your IA what to display format - ? what a PDF?
  12. 12. 3. Permissions Moderation UGC XSS Attack
  13. 13. Permissions drive Primary Content/Navigation Structure? 1 Less permissions are better 2 Instead better review of changes [workflow?]
  14. 14. Moderation of UGC? DMZ Intranet Production Authoring user generated propagate content content to authoring environment publish approved content displays clean co only ntent full workrtow fl suppo
  15. 15. #1 Attack Vector on Web-Apps: Cross Site Scripting (XSS) <div class=”comment”> Check out this site <a href=”javascript:alert(‘ha’)”>this</a> site </div> <div class=”comment”> Look at my profile <img src=”javascript:alert(‘ha’)”> </div> <div class=”comment”> Cool <b>stuff</b> <b onload=”alert(‘ha’)”>stuff</b> </div>
  16. 16. 4. is anybody here Statistics Feedback Comments
  17. 17. Stats Hero Office of the CTO miles Author real-life
  18. 18. Let your prospect decide. Your rs designe Your s HiPPO Your it f avour
  19. 19. 5. Navigation Tagging Search
  20. 20. Quiz: Are You a Filer or a Piler? A filer is a person who organizes information using a rigid structure, and a piler is someone who maintains a mostly unstructured information organization.
  21. 21. 6. Setup Backup/Restore Disaster Recovery
  22. 22. ...but you install only once! my laptop eval-server dev1 dev2 quality integration production production assurance author publish clean having fun packing my cq5 including install to reproduce at home with cq an issue own app custom app
  23. 23. Disaster Recovery Process? “Ostrich”-style
  24. 24. 7. Dev: PHP Author: .Net Live: Java You ?
  25. 25. 1 Run the same platform in authoring and live 2 In-house skills inline with technology used?
  26. 26. 8. Collapse Load-testing Finger Pointing Performance
  27. 27. Project System Business Java Product Manager Admin Owner Developer Vendor The Grand Finger Pointing
  28. 28. “The performance Dialogs” Developer performance lab miles User real-life bridging the gap built-in profilers
  29. 29. 4000 mil 2000 mil 0 mil Jan April July How many do I order in January?
  30. 30. Use Cloud Computing
  31. 31. What do you think?
  32. 32. ( ...more information on ) Agility Matters. For Business, For Authors, For Developers, For Infrastructure Cédric Hüsler ( )