You are here

IT Project Management

Salesforce Best Practices Part 2 - General Setup

Too many fields clutter up the page. i. A page with many fields becomes unwieldy. Run reports regularly to see which fields are empty. Do you really need them? Not enough fields can hurt you. i. Be sure you have the fields available for the data. A second email address in a Description or Note field is about worthless. Use the right field for the job. i. A number field is great for calculations or formulas but it will have comma separators. This will not work for a five digit account number. ii.

Salesforce Best Practices Part 1- Data Integrity

CSV files cannot have any commas. i. Do a “Find & Replace” to find commas and replace with nothing before importing or your data will end up in the wrong field. ii. CSV stands for Comma Separated Values so if a comma is in a cell, then the import will move everything after the comma to the next cell. Each comma shifts the data by one cell. Remove all duplicates before importing data. i. It is easier to remove duplicates from a spreadsheet than merging them in Salesforce. ii.

Project Teams in Space: The Times Are Changin' (Again)

What makes for a productive software development office environment?   How much "close" company is too much, and how much isolation and quiet is simply too much?  When is an interruption welcome and needed, and when is it a mental reboot that sets back focus by 15-30 minutes each and every time it hits?  When is management's new 'space plan' about creating great teamwork, and when is it about seeing how many people can be crammed into the smallest number of square feet of costly grade A office space?

An 8 Step Program for Recovering Micromanagers Like Me

Getting peak performance from a great project team is no mean feat. What can make the challenge particularly intense is a senior and seasoned team, combined with a complex project that requires large amounts of interaction and communication to coordinate effectively. For those PM's highly skilled in the art of ruthless task management and no holds barred follow-up, it is not hard to let diligent and very necessary pursuit of closure outcomes slip into annoying and counterproductive micromanagement.

Some really poor password choices...

For better or worse, passwords are the basis of much of the security we use in the cloud.

SplashData put out there “worst password of 2011” report, based on a blind review of their database of common passwords.  If you use any of these on any accounts you wish to protect, clearly a good idea to think about changing them soon.

Check this box if you think you are exempt...

Building software is hard! There are minefields everywhere...and if you don’t get the basics right the project is going to explode. Everyone hide in the bunkers right now, because when I say ‘the basics’, the basic that is the topic of the day is TESTING. Just because the letters QA are nowhere to be seen in your job description you are not exempt from the responsibility/accountability.

Small Businesses is Target For Hackers

A growing number of cyberattacks are targeting small businesses, from construction companies to local grocery stores, presenting an emerging threat that government officials are trying to combat.

Gerry Smith the digital affairs reporter for HuffPo wrote a nice piece on a new FCC tool out there to assist smaller business with security audits.  Here is a small piece of it:

Successful Projects through Agile Project Management

Agile movement the "brain child" of the development world? 

by Nancy Nee.

Both traditional and agile project delivery embody similar principles and practices that aim to deliver measurable results. Traditional project delivery can be described as a “waterfall” approach, which presumes that the requirements, expectations, duration, activities and outcomes of projects can be predicted accurately and planned in a sequence before any actual development activity takes place.