What is the difference between LEADERSHIP and MANAGEMENT?

In short: leaders create risk, and managers reduce it.

LEADERSHIP ANTICIPATES THE BEST OUT OF PEOPLE, AND MANAGEMENT ANTICIPATES THE WORST. While leadership invites others to follow, management ensures the followers are following.

Leadership is the act of inviting others to a new and better future.  A leader inspires and creates change by casting a vision of a destination that is different, better, and achievable.

Management is the ensuring things happen by creating, communicating, and monitoring expectations.  It tracks individual people to see that they perform as expected, as opposed to inspiring a number of them. 

Leadership skills can be summarized as those skills relevant to interacting with large groups of people, and to inspiring and creating vision. Conversely, management skills are those which are relevant to interacting with individual people, and to specifying and monitoring performance.

Many of the skills required to lead people are also the ones used to manage people. However, the expression of these skills can be significantly different.  For instance, a leader needs to effectively communicate to be compelling and inspirational, and a manager needs to effectively communicate to be precise and personal.

Because of the skillset overlaps between management and leadership, it is quite possible that a single person assumes either of these roles.

 

Want to learn more about leadership?  Check out EVERYTHING YOU NEED TO KNOW ABOUT LEADERSHIP.

Share

Smiling is Contagious. Try it!

It has been a spring that many will say there was nothing to smile about. It was cold, rainy and dark. From all the rain we have beautiful green lawns and flowers starting to bloom. Again there are many people in parts of the world that are not smiling with all the rain causing flooding and destruction. I wanted to take this opportunity to write about smiling and how contagious it may be in our workplace and for our clients.

Some people are always smiling, cheerful, and they seem to brighten up a room. Their positive attitude and gusto are identified by those they come in contact with. Moreover, we have all encountered those have the opposite effect on people-the “doom and gloom effect.” we often refer to one’s attitude and yet what is that? It is your mental state or the position you take regarding life.

Zig Ziglar once said, “Your attitude, not your aptitude, will determine your altitude.”  If you take the word “OPPORTUNITYISNOWHERE,” some people see the “no where” while others see “now here.” So is the glass half empty or half full? Often the difference between success and failure is not linked to how we look, how we dress, or how much education we have; it is based on how we think!

Great leaders share the same thought; knowing that a positive attitude is contagious. As leaders, it is vital that we display a positive mindset daily. After all, if we expect our employees to express positive attitudes, we should model such behaviours for them to see.

Each day we have a choice of whether we elect to display a positive or negative attitude. Daily, we encounter negative attitudes at work and in our personal lives. If you remain positive amongst pessimism, you can be contagious.

Some times it is not that easy. I have found some tips I would like to share to help you be positive from “Attitudes are Contagious. Is Yours Worth Catching” by Patti Wanamaker.

  • Be enthusiastic – people love to be around enthusiastic people. Enthusiasm is contagious and draws others to you like a magnet.
  • Associate with positive people – if you want to stay positive, stay away from people that drag you down. Associate yourself around like-minded people.
  • Smile – smiling makes it all better. Smiling releases endorphins and serotonin, which are known as the feel-good hormones. It is a lot easier to adopt a positive attitude when you feel good!
  • Change your thoughts – positive thoughts lead to a positive attitude, while negative thoughts lead to an adverse reaction.
  • Stop complaining – limit your complaints. Whining and griping about anything and everything will not create a positive attitude. When you are complaining, you are spreading negativity.

·        If you want more success in your leadership role and to have a positive impact on your employees, then make sure your attitude is worth catching.

Many of you are thinking, what is there to smile about, and why maintain a positive attitude when there are doom and gloom around us? Research has shown that there are health benefits of smiling in the workplace. We are dealing with conflict, mental health issues and have difficult situations arising every day as we manage our workplace. Interestingly many years ago, it was declared that “the smile is the best medicine for the happiness of humanity.” Later scientific research explained the effects and physiological benefits of smiling for a healthier life. Smiling can be beneficial, in dealing with illness, pressures of everyday life, stress at work, and smiling can even substantially change the quality and forecasts of our lives.

Would life not be better if people smile regularly? I think smiling every day would keep you away from the doctor and feeling self-confident. Try these:

  • By smiling, we can reduce the level of stress hormones. Smiling helps us to increase the number of antibody-producing cells and improve the effectiveness of other cells.
  • Smiling is good for our general health. Smiling 100 times is equivalent to ten minutes of rowing or cycling in fifteen minutes.
  • Sometimes we just want to laugh or cry. That means you want to release all the pent feelings in your head, making you feel both physically and mentally better. So to reduce anxiety smile often, even when you are not happy. Smiling at others will, in turn, help them be happy.
  • Smiling can take you from being angry, stressed, feeling guilty, and negative to putting you in a more favourable frame of mind. Smiling will make you change yourself and improve the attitudes and thinking to other people to the better.
  • When people can view an event that may be frightening as funny, they may be able to feel more content and see the events occurred just merely as a “challenge” in life, rather than a threat.

There are times when smiling, and laughter can be contagious. If you smile more than you can make other people around you also smile more. So by smiling yourself, you can reduce the stress levels of people around you and change their moods. Maybe even improve the quality of social interaction, and reduce your stress level as well.

They say that optimists have a stronger immune system and can fight disease better than the pessimists. There is a link between a positive attitude and good health, which is measured in many different ways. In general, researchers have discovered that optimistic people are more healthy, and they have a stronger immune system.

According to the British Organization of Dental Health, a smile has the level of stimulation as eating 2000 chocolate bars.

A smile does not cost you a cent, and it is easy to spread. A recent study showed that preschool children laugh 400 times a day, but the time we reach adulthood, we just laugh an average of 17 times per day.

So take the challenge and smile more often and find things in your lives that you can laugh about.

Stay great and healthy.

 

Monika B. Jensen PhD is Principal of the Aviary Group and can be contacted by email at mjensen@aviarygroup.ca

 

Share

Cyber Attacks & Municipalities: A Tale of Two Communities

“There are only two types of companies: Those that have been hacked, and those that will be.”, 

Robert Mueller, FBI Director, 2012

Executive Summary

In 2018, many municipalities in North America fell victim to cyber-attacks, and in particular ransomware. This study reviews two municipalities, Atlanta, Georgia, and Wasaga Beach, ON whom both were impacted as a result of a malicious attack on their networks.

Atlanta

Atlanta (pop. 486 000) was hit in March 2018 with a cyber-attack through ransomware. A ransom of $51 000USD was demanded but not paid. Over the next few days, critical systems and activities were taken offline as city staff struggled to regain access to systems. Impact included:

·       Public Wi-Fi disabled

·       30 mission critical applications disabled

·       8 000 employees were unable to access their email or networks for days

·       Citizens were unable to pay fines or parking tickets

·       Forms had to be completed by hand as systems restored

·       Many official documents were not recoverable

Final tally was close to $10 Million, including costs for additional contractors, system upgrades, new technology and computer replacement.

Wasaga Beach

Wasaga Beach (pop. 21 000) was hit in April 2018 with a similar type of ransomware attack. Initial demand for close to $150000 was reduced to  $35 000 and paid by the municipality. Despite this, the town was impacted for weeks even with recovery efforts. 

Impacts included:

  • Government data inaccessible for weeks
  • Systems had to be re-imaged and rebuilt
  • Payroll systems hampered

Final tally close to $252 000, including $50 000 for consulting,  $160 000 for lost productivity and overtime, system upgrades, new technology and computer replacement. Some costs carried into 2019 Budget Year.

How to be Prepared in Your Municipality

While Atlanta and Wasaga Beach are different sizes, they both suffered similar negative impacts due to a malicious attack, and having inadequate preparation for the type of attack that hit each separately.

Being prepared begins with a proper security risk assessment and review of the security practices and processes currently in place. Assessments should typically review such areas as:

  • Technology in place for security controls
  • Policies and standards related to Information Security
  • Training and awareness in place with staff
  • Incident Response plans
  • Disaster Recovery Plans 

Municipalities should also consider:

  • Training for IT staff on cybersecurity
  • Cyber Insurance
  • Testing and training of staff on cybersecurity issues
  • Use of third parties with cyber specialization to complement skillset of internal team.

Conclusion

Cyber Attacks can be indiscriminate and attack all levels of companies including municipalities large and small. However they can also target municipalities, due to limited IT budgets, strained technical resources and small if any dedicated security personnel.

Municipalities should take proactive measures to prepare for cyber-attacks and reduce the impact and likelihood of financial costs and loss of services.

“The effectiveness of one’s security program belongs to those who see the possibilities
before they become obvious.”, 
Michael Castro, 2018

RiskAware is a boutique Cybersecurity firm, specializing in Security Governance and Strategy, assisting organizations of all sizes with security and risk advisory services and security-on-demand capabilities.

RiskAware can be contacted at info@riskaware.ca or visited at www.riskaware.ca

 

Share

Cyber Security and Municipalities: Balancing Risk and Budget

Weak or nonexistent cybersecurity programs represent a massive organizational risk for municipal government agencies across North America, and of course Canada. Municipal leaders are often unaware of these risks because they assume that security is addressed or believe that a threat is minimized as a public sector organization.

In 2018, reports from three Ontario municipalities, one in BC and one in Quebec surfaced. All around ransomware, and all impacted adversely the operations and privacy of their records and impacting their constituents. Each also had a financially impact to the municipalities as each had to work to eradicate the malware, recover data or pay ransoms.

While ransomware attacks are often indiscriminate and are about disruption, other attacks are imminent that also hinge on weak security measures and experience. Theft of data from the public sector is valuable and should not be overlooked. Land deeds, mortgage information, birth and death records, SIN numbers and more, all constitute Personally Identifiable Information (PII) and all can equate to valuable dollars to those who can use them for further criminal activity.

Municipalities need to be looking at various areas to shore up cyber security for their offices and staff and help reduce the risk associated with these threats.Actions can include but not limited to:

-Developing a cyber security strategy to combat threats and understand security posture

-Implementing technology and security tools to handle threats as they emerge

-Awareness training for staff to help know when threats like phishing email are present

-Developing a information security policy for all staff to follow

Cyber threats is a multi billion dollar industry for cyber criminals. Municipalities are not immune to the threats that are present every day. Each municipal leadership team should look at their own areas and determine what steps are needed to be performed.

In the end it is not IF a cyber attack will affect them but rather WHEN and HOW impactful it will become.

 

Interested in an assessment or virtual CISO services? Feel free to drop a line

 

Michael Castro

Founder and Principal, RiskAware Group

mcastro@riskaware.ca   www.riskaware.ca

 

 

 

Share

Top 4 Considerations to Save Money When Improving Citizen Services

By checking your own internal bias you stand a better chance of Finding the best solution

We all want to better our citizens’ services but, when pursuing this goal, what can we do to ensure we are spending the right amount of money on the right plan?  The only way is to look at your citizens, your goals and what you currently have to achieve the right balance between spend and results.

Here are four areas you should consider to make sure you are getting the most for your money.

1.       Understand first. 

·         When creating any plan, the first action should be to understand the needs and wants of your target.  Not all people will have the same issues as you. The only way to know is to ask your citizens, listen intently and believe them. This is particularly true when you think you have solved certain issues already.

·         In modern agile technology development, the practice is to rely on the” voice of the customer”. This is to ensure when the product is complete it meets the needs expressed by the potential buyer.  The same is true in finding the best solution for your citizens.

·         Remind yourself that you are not the citizen. Assume that you do not really know anything about your citizens’ needs. This way you will not try to prove your bias right or dismiss some expressed citizen needs as “not important” or “already solved”.

2.       Look at what you have today.

·         Look at the processes you have today that are at the heart of any of the issues identified by your citizens (e.g. a citizen is not notified when an issue is fixed – perhaps because a work order is lost after a job is completed so there is no record of it being closed).  Ask yourself what vehicles, tools, and processes you are using to meet your “citizen service goals”.

·         Are you using your website to get information out?  Do you have posters in community gathering spaces? Do you have a section every week in the local paper? Do you have a CiRM or a spreadsheet to track issues?  Do you have a written policy that helps all staff to address citizen issues quickly?  Do any of these create or solve the issue expressed by your citizens? These types of questions are key to success.

 

3.       List all potential solutions.

·         Improving citizen services may not require buying new hardware or software and spending a bundle on installation and configuration.  A successful solution, regardless of how great it is, may very well need to be coupled with bettering an internal process. Or maybe it is a simple matter of increasing the awareness of your website or creating posters to inform citizens about how you do things and why.  It might also be possible to improve services by repurposing technologies that you already have in hand (e.g. using your CRM in a unique way or changing access permissions so more people can answer the questions posed by citizens).

·         Listing solutions should not be an excuse to try to make current software do things it was not meant to do. Look at the process you want to have first then find the solution that best fits it.

·         Do not be afraid to look at human resource factors.  Maybe the answer is to better train staff in citizen resolution or conflict management (customer service skills). Maybe you need to ensure that all staff members know your policies and how they should be implemented.

4.       Consider technology solutions by task, not product name.

·         List your “service goals” and rate the importance of each of one. The best way is to break down your list into the following columns: “must have”, “good to have” and “nice to have”.

·         If you think that technology might solve some of the issues, list only the “service goals” you want your software to address, i.e. not what features or what brand will be the best solution.

·         Remember the technology may not need to be citizen facing to increase satisfaction. It might just enable an improvement in your processes to offer better, faster and more reliable citizen services.

If you consider these four areas, you will likely find a solution with that best fits your budget, and that will have the largest impact on your citizens.  By checking your own internal bias, you stand a better chance of making sure the right process, tracking and communication methods (internal or external) are part of your change, and the costs may well be less than you thought.

At AccessE11 we understand that paper systems and endless email chains are not productive when it comes to citizen services and support. There are too many opportunities for an issue to fall through the cracks, or for delays in responses to issues.

We promote instilling processes that make sense and that are easy to adopt so that everyone in the municipality can become a citizen support expert.  Please visit us at www.accesse11.com to find out more.

Share

Legacy Systems; The Old Rebuild or Reuse Software Conundrum

Why the Rebuild Route Makes Sense

Text image that reads Rebuild vs Reuse

Typically, in the short term, the rebuild will cost more, but over time, will cost less, provide better ROI and create potentially happier and more efficient employees.

We have created a handy ROI calculator that we use when discussing the true value of saving time and having more efficient workers. This calculator and the logic with it can be downloaded here: Software ROI Calculator.

Rebuild vs Reuse: Things to Think About

With any rebuild of a legacy solution the following areas must be addressed:

    • Mobility: Employees need to access data from different handheld devices. Be it iPhone, Android or Blackberry. Today technology exists to make a solution device agnostic.
    • Web (Remote) Access: Using a browser to access the data provides the most cost-efficient way for users to access data; whether it is internal users or external users. Mobile users can access the web browser to use, interact or access the new system.
    • Future-Proof Workflow: By rebuilding a solution, potential technology traps can be avoided. Ideally, any system built should scope out and last for 6 to 8 years before workflow modifications are required.
    • Collaboration: Gone are the days of a static web page. Companies, big and small, want some form of customer integration with their web page. Rebuilding a solution using a custom web technology will allow a web page to bolt on and be used by both employees, customers, and prospects.

Gone are the days of a static web page. Companies, big and small, want some form of customer integration with their web page. Rebuilding a solution using a custom web technology will allow a web page to bolt on and be used by both employees, customers, and prospects.

Whenever I visit a potential new customers site, I am always surprised by the age of some legacy systems. Moreover, I am surprised at how a great return on investment from the past has now turned into a system/process that is inefficient and a detrimental for employees.

If your existing system was built more than 15 years ago and is still working and being used – congratulations! You have certainly received a great ROI from past investments. But now might be the time to think about a rebuild of your solution. Rebuild before access, inefficiencies or age of hardware severely hurt your business’ growth.

Every business is unique and so is the software they need. Get your free Personal Needs Analysis today.

Share

Cyber threats and how to protect your municipality

Brad Pinch – Director of Municipal Needs at AccessE11

 

Often, when we hear about securing online systems against cyber-attacks the first thought is to invest time and energy into cybersecurity software. While this is important, and should not be downplayed, did you know that software alone will only defend against a small percentage of cyber-attacks?

Hacker Image

 

The easiest way for someone to breach your security infrastructure is to employ the unsuspecting assistance of your users.

According to PhishMe’s 2017 Enterprise Phishing Resiliency and Defense Report, 91% of all cyber-attacks are a result of people who fall prey to Phishing Attacks. Of the remaining 9% of cyber-attacks, more than 75% are the result of other forms of “human failure” to secure information.

Phishing is an attack that begins with a very targeted email sent to your staff (and perhaps yourself), that often impersonates a service provider, colleague, family member or friend and entices you to click on a link or open a document. This action may include a request for private information that provides the perpetrator with the means to launch a secondary cyber-attack or it may launch an attack directly through the download of malicious software. Attacks can be in the form of spyware, malware, and increasingly ransomware and data theft.

Wombats Security’s – State of the Phish 2018 report– suggests that phishing attack frequency from 2016 to 2017 increased by 48%; phishing is on the rise because it continues to work. Hackers have quickly learned that it requires less energy to trick users into giving them access than it does to circumnavigate the sophisticated security systems deployed today.

6 simple steps that a municipality can do to protect themselves

Here are a few steps a municipality can take to minimize its chances of security breaches and cyber attacks.

  1. Stay Informed and educate your team

Much of the battle against phishing and spear phishing (personalized phishing) attacks is getting users to understanding what this type of attack looks like, so they are less likely to be duped. Phishing relies on basic human conditions:

  1. information overload and shortcuts our brains take to process the information,
  2. a desire to help those we care for and trust of information that (seems to) come from them,
  3. curiosity for new information.

These traits are well known to attackers and are exploited in order to get victims to click on a link or open a document. Emails look like they’re from legitimate sources: Microsoft 365, Google, Dropbox, PayPal, Adobe account, LinkedIn, credit card company and many more.

There is a great infographic called don’t get hooked: how to recognize and avoid phishing attacks from the Digital Guardian. Print it out and post it for all to see.

  1. Keep your software up to date

Malware is being created all the time and is designed to take advantage of newly discovered vulnerabilities in our general use software. Vendors are quick to update their software, but you must update your version in order to be secure. You should regularly, or ideally automatically, update your software:

  1. Browsers (Chrome, Safari, Firefox, etc)
  2. Operating Systems (Windows, MacOS)
  3. Office Software (Outlook, Word, Adobe)
  1. Call before you click

Any email from a bank or colleague can usually be responded to directly, rather than via a reply or by clicking on a link. If there is ever any doubt, call your bank on the phone (using published numbers, not one in the email), or log directly into their website directly – not from the link in the email. By not taking the shortcut, fraudulent links can be avoided.

  1. Install anti-virus software and activate the Anti-Phishing toolbar if available

Antivirus software is designed to guard against known vulnerabilities. Even though today’s operating systems are more secure than ever, security tools look for malicious content in real time and provide an extra layer of scrutiny. And make sure you keep it updated as well.

Internet browsers can also be extended with anti-phishing toolbars. Such toolbars run quick checks on any site you visit and compare it a to lists of known phishing sites. If you stumble upon a malicious site, the toolbar will alert you about it. This is just one more layer of protection against phishing scams, and there are many that are completely free.

  1. Implement Secure Password Policies

As hard as it is to believe, the 10 most common passwords in 2017 were:

  • 123456, 123456789, qwerty, 12345678, 111111, 1234567890, 1234567, password123, 123123, 987654321

It won’t take a hacker long to break these codes.

Equally important though – do not use the same password for everything: If you do, and someone gets access to one system, they can often get access to them all. If you struggle to remember passwords (who doesn’t) there are many excellent tools that can assist:

These programs store an encrypted version of your passwords on your computer and conveniently provide them when you need them. This means remembering only one password.

  1. Beware the Unknown Storage Devices

It is possible the free USB drive that is received from a tradeshow, or the one you found in the parking lot has a virus on it. Sites that sell marketing USB drives unwittingly provide ones that have viruses installed from the source in China, Russia, India, Korea and other countries (yes including the UK, US, and Canada). These were likely never checked by the company who put their information on the drive to give to you.

If a data storage device is not bought by your company or municipality from a reputable source then it should not be allowed on one of your computers, ever!

These are only a few ideas to help better protect your organization from cyber-attacks. The common element in each remains the same; people and their behavior represent the greatest risk but also provide the best defense against cyber-attacks. Any user can open the door to intruders, so ensuring everyone understands the risk and remains vigilant is critical. Investment in the human factor will pay off quickly and be more cost-effective than any other action.

For More Interesting Articles on Issues that Municipalities are facing please visit us at https://www.accesse11.com

Share

Everything You Need to Know about Software ROI

While not all projects or organizations are alike, there are many different elements of technology acquisition that have different value propositions and hence, need to be evaluated differently.

Here’s everything you need to know about software ROI… Let’s get to it…

People at office laptops

Software Value Proposition

Software is unique – it can run on almost anything, comes on a disk, CD, DVD, download, Cloud… It can do almost anything – from organize your day, inventory, plant, office, people, customers… you get the idea – it is somewhat ubiquitous – because you can never use that work too much.

Software value proposition aligns directly with the big three ROI elements reviewed in my previous blog:

  • Increased Revenue/Gross Margin
  • Increased Bottom Line/Efficiency
  • Improved Customer Experience

But how do you measure these (without hiring a team of financial specialists and accountants)? Let’s get back to the KISS principle.

Some software has an acquisition cost in either license costs or development costs. This licensing model typically has some form of maintenance or upgrade cost associated – you may also want to incorporate some component for infrastructure costs. Subscription [OK I’ll use the Cloud word] based software has a monthly or annual fee. All of these models can fairly easily allow you to find a long term direct cost of ownership – I would suggest you span this out past 5 years for acquisition licensing model with a 10-year life span or 5 years for the subscription model.

You now have a handle on the long term investment in the solution – sadly that may be the easy part…

In order to measure the returns, it can get a little more complicated. Let’s look at the big 3.

1) Revenue/Gross Margin

If you can you attribute specific revenue increases to the functions the software provides, then it simplifies things. It may not always be so easy. New geographies, increased penetration into existing accounts, cross selling metrics can be functions of many things. Additional revenue from online transactions is easier to quantify. Ultimately, it will be important to quantify these to your best ability. If you can attribute the reduction in direct Cost of Goods to the revenue, this number becomes somewhat obvious.

2) Increased Bottom Line

Generally, this is one of the somewhat easier parts to quantify – If you are in a position where you need to hire additional resources to complete tasks that automation can address, you can offset these net costs directly. Ultimately if you have operational costs that are labour intensive, eliminating the inefficiencies of these tasks through automation will reduce costs through increased production without increased labour and deliver an improved bottom line.

3) Improved Customer Experience

In a world where customers will pay for a premier experience, this may be one of the most important aspects of ROI, but perhaps one of the hardest to quantify. Through an improved experience, your “customers:”

  • Have a higher degree of loyalty
  • Purchase more from you because you are always open or have tools to purchase when they need it (impulse)
  • Have access to information to do their jobs from anywhere without interrupting their jobs
  • Rely on your organization because you are an extension of them

Ultimately the goal here is to attempt to quantify (in real dollars) the gains from these activities.

The rest is just math…

Person typing on a keyboard

A Simple Approach to Calculating ROI/ROI%

(Recognizing there are no factors for NPV for the financially oriented readers)

Calculate all direct costs for the useful life of a project (Development, Licensing, Support):

  • e.g. $ 50k initial development + 5k support annually for 10 years = 100k direct costs

Calculate the increased bottom line contribution through increased revenue, decreased cost:

  • e.g. Reduce hiring requirement of a $60k person, increase revenue by $ 50k annually through efficiencies = ($ 60k + $50k) * 10 = $ 1,100k
  • ROI (months) = 100k/1,100k*120 = 11 Months
  • ROI% = 1,100/100*100 = 1,100% or 110% annually

Chat with CoreSolutions about Delivering Tangible Results

Our rule of thumb for the viability of a project is fairly simple. When you invest in a project, the project should pay for itself within 18-36 months through increased returns. After that period you will receive these increased financial returns for the balance of the software’s useful life. Typically, this results in a 40-80% annualized ROI% – very few financial investments can boast these levels of return.

I would welcome the opportunity to chat with you about how we might assist in optimizing and growing your business and delivering tangible results. So, connect with us via telephone at 1-800-650-8882 or fill out a contact us form on our website.

Share

Advantages of Progressive Web Applications

Progressive web apps are causing a paradigm shift for software development. Traditionally, the development of an app meant knowledge of native languages such as (but not limited to) Java, Objective-C or Swift. It also meant jumping through the hoops and hurdles of getting yourself listed on those pesky Apple and Android App Stores. Now however, the development of apps can be made accessible to us lowly HTML, CSS and JavaScript coders. Before we continue on about the benefits of progressive web apps, it may be beneficial to explore their predecessor: Traditional Web Apps.

Traditional Web Apps

Traditional web apps differ from native apps because rather than an app icon on your screen; they are made accessible through a web browser. They are beneficial because unlike native apps, they are easier to maintain due to their common code across various platforms. Most importantly however, they don’t require visiting an app store for download.

However, web apps are not without their own shortcomings; as they are not installed directly on your mobile device—without internet connectivity, a web app is relatively useless. Hybridizing mobile and traditional web apps however create a new entity, one that takes advantages of the strengths in both native mobile and web applications: Progressive Web Apps.

Progressive Web Apps

Progressive web apps are a hybridization between native, and traditional web apps. Progressive web apps are progressive because they work in old and new browsers, although they benefit from the use of modern browsers and features. They also deliver a more app-like user experience. Like native applications, PWA’s can have icons placed either on your desktop, or in your toolbar, providing easy application accessibility. By combining the native and traditional web applications, PWA’s are able to achieve the benefits of each, while mitigating their shortcomings. In fact, Pinterest – a popular image sharing site – experienced a 40% increase in time spent on their site, and 44% higher user generated ad revenue after implementing their new progressive web app.

Benefits

A major advantage to using progressive web apps is the avoidance of app stores, and their strict regulations. Another important benefit not to be overlooked, is the growing presence of “app fatigue”. The 2017 U.S. Mobile App Report revealed an astonishing 50% of smartphone users in the US download NO apps per month. By focusing more on the user experience, PWA’s can provide more value to your customers, and your organization.

Arguably one of the most important features of a progressive web app is its flexibility, although originally intended for mobile use, PWA’s function just as well on desktop, television, and tablet screens. Offline mode is also of benefit, as information a user has accessed previously is available for use and viewing without the need of an internet connection; something native apps have yet to accomplish.

In terms of maintenance, progressive web apps also boast simplicity over their app-store-distributed counterparts. Rather than having to submit an update packaged file to the app-store, PWA’s can simply be updated directly through the server.

Limitations

So far you might be thinking – “why would anybody choose native over progressive web apps?”. However, there are a few shortcomings associated with obtaining your own web app. The main downfall is the lack of support on iOS devices, limiting your applications reach. Secondly, unlike native apps downloaded directly onto your phone, these web applications are unable to sync with your phones functionalities. Things like GPS location, calendars, contacts, or any other features native apps typically interface with, are unavailable to PWA’s.

Conclusion

Progressive web apps are changing the face of software development. Not only do they experience a variety of user benefits, but they also improve performance overall—see Pinterest’s Progressive Web App Performance Case Study. Increased time spent on site, increased ad revenue, as well as conversions are just a few of the benefits you can expect from replacing your native application with a web application.

Overall, PWA’s are:

  • Easier to develop
  • More useful for users
  • Easier to install, maintain, and keep secure
  • Easier to grow as your company grows
  • Can be run on any type of device (desktop, mobile, tablet)

Let’s discuss your next web-based application. Contact us directly at 1-800-650-8882 or fill out a contact us form on our website and we’ll help you determine how to make your next progressive web app a massive success!

Share

Implementation of an Enterprise-wide Common Street Address Database for the City of Hamilton

Problem

The City of Hamilton has many service delivery applications utilizing and storing resident addresses. For example, street addresses are solicited from the resident in a free form method and are never validated against a common address database.  Thus, the City has numerous instances of address databases that are not accurate or consistent, which are used on a daily basis to communicate to the residents. In many cases, these address databases are misused and often invalid addresses cause breakdown of communications.  This has led to embarrassment for the City, anger by the residents and in some cases legal action.

Challenge

The challenge is to establish a single authoritative address database which all service delivery applications can valid against.  Establishing which is most correct and then comparing others to get the best of breed is the greatest challenge.  Other challenges are the adoption of a single authoritative database, “clean up” existing databases and encourage application stewards to use the single authoritative database as truth.

Resolution

The City engaged a subject matter expert to help collect business requirements, design a solution and implement this solution. The technical solution consisted of a consolidated database model, application database cleanup, address maintenance tool, redlining tool for identifying address issues and a method to deliver addresses to other service delivery applications.

Also a sustainability model to ensure that addresses were maintained accurately and on a timely basis by identified stewards. The address model would ensure that new or updated addresses would be available to other service delivery applications.

Share