1. ISSUE #1 - Competitive Advantage our main purpose for outsourcing is to limit our expenditure on data management, information sharing [cloud computing] and operational software maintenance/development [SugarCRM and Financial Tools]. being able to outsource software/database maintenance relieves the firm of having to worry about allocating more resources towards this - in addition to upgrading it every time, meaning the firm can focus on investing in better financial analysts/guest services agents our ability to focus on the said resources but still have the ability to retrieve information and analyze data when needed also gives the extra time we need to be able to make sure that the clients complaints, wants and simple requests are addressed - also all their questions are answered outsourcing our social CRM through SugarCRM and linking all social media accounts to our SugarCRM account will allow VAnalyst to manage all means of communication effectively and efficiently - also using insource guest service agents will allow VAnalyst to get to know clients at a more personal level when they do decide to go to the office - in addition to this effective and efficient management of socialCRM through SugarCRM will allow us to make our presence known to our local potential clients a lot faster outsourcing database management - linked to SugarCRM and all Financial Tools will allow our analysts to not only use financial data but also client data to match their portfolios and investment 'wants' [i.e. high risk/high yield or low risk/constant returns] giving us a better opportunity to heighten the satisfaction of our clients
2. ISSUE #2 - Security and Reliability SugarCRM uses online databases from various other big companies which supply these storage spaces and secure them with state of the art technology, however should any compromise to their storage happen VAnalyst will have hard copies and electronic on hand of every single transaction and conversation done with each client With regards to basic access to the SugarCRM software, usernames can be linked to security levels which only allow the specified user to view and or edit only the level allowed by the administrator - this lowers the chance private information leaks within the firm In the event of outages of any type, as mentioned above, VAnalyst will also be having hard copies [transcripts] of every transaction and conversation done with every client which is updated every start of the office hour
3. Group 319 CityWorkforce
3.1. Security
3.1.1. Not implementing ERP
3.1.1.1. Prevents issues of employees having too much information
3.1.2. Cloud
3.1.2.1. Who owns the data?
3.1.2.2. Make sure that we implement a strong privacy policy
3.1.2.3. Limit access based on user authorization
3.1.2.3.1. Provide different levels
3.1.2.3.2. Limit who can edit information to relevant client management people
3.1.2.4. Data transmission security; Wifi? LAN? Mobile?
3.1.2.4.1. Must maintain security of client data; there are likely legal constraints around this
3.1.2.4.2. Potential attacks because of valuable nature of our data for identity thefts
3.2. Project management
3.2.1. Outsource CRM
3.2.1.1. Cloud computing will be outsourced
3.2.1.2. Development
3.2.1.2.1. Buy CRM from a vendor
3.2.1.2.2. Adapt this CRM to allow matching and integration search engine
3.2.1.2.3. Need to train our own project managers
3.2.1.3. Implementation
3.2.1.3.1. Train staff, especially IT
3.2.1.3.2. Ensure this training program addresses any resistance and integrates the system into daily workflow
3.2.2. Keep internal
3.2.2.1. Payroll system
3.2.2.1.1. Do not put in the cloud due to security considerations
3.2.2.1.2. Can use current and expand it (save money)
4. 320 - Good Food Canada
4.1. E-commerce security related issues
4.1.1. Privacy : need for explicit privacy policy in order to increase customer trust toward release of personal information .
4.1.1.1. Privacy policy will explain which information will be mined from data collection, for which purpose and which technologies will be used to process them
4.1.2. The website will be an important channel for collection of customer data. Recommendation Agents will use customer information to implement cross-selling strategy . protection and securitization of database management system will be ensured through need for employees authentication for data access and backup .
4.1.3. Scepticism toward online payments : Credit card details will be protected by the payment gateway through encryption.
4.1.3.1. Credit card details will be protected by the payment gateway through encryption. Use of 3D secure protocol to increase level of data protection.
4.2. RFID privacy issues
4.2.1. - some information about the items will be accessible to anyone - where product was made need to be accessible only to those we choose- to protect our farmers and suppliers
4.3. Outsourcing
4.3.1. Smartphone App
4.3.1.1. Instead of creating an R&D department and providing necessary funding involved with hiring managers, employees, providing health benefits and EI and CPP etc. It will be more cost effective to outsource the creation of our Smartphone App
4.3.1.1.1. Benefits
4.3.1.1.2. Downsides
5. Group 318
5.1. Privacy
6. New node
7. Group 318: DataMed
7.1. Implementation: Resistance from employees
7.1.1. Why?
7.1.1.1. We believe some staff members, especially older physicians may resist our proposed changes as they do not want their work environment to change.
7.1.2. How to manage?
7.1.2.1. We need to educate our staff members about how the new systems will benefit them by making their jobs easier and providing a better patient experience. Employees are less likely to resist change if they are informed of the benefits. Once educated about the benefits, it is essential to provide a thorough training program so employees can understand and use our new software system with ease. Once the system is up and running, we need to ensure our partnered developer is available to provide support to staff members. If our developer is easily contacted to answer any questions it will make it easier for employees to adapt to this sophisticated system.
7.2. Development: Maintaining a solid relationship with development partner
7.2.1. Why?
7.2.1.1. DataMed is intent on developing a joint venture with a midsized software developer also located in Vancouver. We will retain a 60% share of the software while the developer will own 40%. Both organizations will contribute capital and resources. Our doctors will provide feedback and creative input about the software design. Our clinic will serve as a pilot project for launching and refining the software. There are many inherent risks and potential benefits with such a proposal. The software developer could abandon the project or our companies relationships could become strained. We believe the benefit of a customized software program, catered directly to our specifications outweighs the risks. This venture will allow us to attain advantages associated with outsourcing while achieving the customization and support associated with internal development.
7.2.2. How to manage?
7.2.2.1. We will hire a project manager to oversee the project and work with our physicians and the developers. The project manager will convey our interests to the developers and ensure the project is being completed at a reasonable pace. We also believe that 40% ownership provides an incentive for the developers to produce a quality software program that can be commercially successful. DataMed understands the practical aspects of medical software while our partnered developer can provide any necessary technical expertise and support!
8. Group 316- Full of Christmas Spirit
8.1. Development
8.1.1. Outsourcing
8.1.1.1. Why is it important?
8.1.1.1.1. Not developing own system- using sales force to cloud compute our information
8.1.1.1.2. Utilize professional and established service companies instead of having manage a newly developed service.
8.1.1.2. How are we going to manage it?
8.1.1.2.1. Don't need to manage since its just an external platform
8.1.2. Insourcing
8.1.2.1. Why is it important?
8.1.2.1.1. Lower cost compared to outsourcing to another company.
8.1.2.1.2. Need someone to update and maintain the website
8.1.2.2. How are we going to manage it?
8.1.2.2.1. Hire project manager
8.2. Implementation
8.2.1. Security
8.2.1.1. Why is it important?
8.2.1.1.1. Online security is essential for e-commerce
8.2.1.1.2. Security builds trust between partners so that deals can be reached
8.2.1.1.3. Customers can sue us if their information are stolen
8.2.1.1.4. Law requires the privacy of information among parties
8.2.1.2. How are we going to manage it?
8.2.1.2.1. Use firewall to protect us from possible attacks
8.2.1.2.2. Educate employees to keep track of information properly
8.2.1.2.3. Use digital signatures and other authentication devices to keep information protected and accessible to right users
8.2.2. Privacy
8.2.2.1. Why is it important?
8.2.2.1.1. When customers pay for an order online they need to be sure that the information (credit card info) will not be spread across the internet
8.2.2.2. How are we going to manage it?
8.2.2.2.1. Have a update and advanced security system
9. Group 315
9.1. Technology: Web 2.0 Site: Patient Profiles
9.1.1. Security and Patient Privacy
9.2. Cost of Technology Implementation
9.2.1. Outsourcing
9.2.1.1. Use external firm or freelancer to develop and implement the technology
9.2.1.2. Staff will need to be taught by software developer how to use technology and how to trouble shoot minor issues
9.2.1.3. DataMed will need to have someone available to be able to come in to fix software issues
9.3. Security
9.3.1. Implement Security software and make sure staff and patients know that it is in place and how to use it
9.3.1.1. New node
10. Group 314
10.1. Outsourcing [SugarCRM which includes online database, cloud computing, analytical and social CRM]
11. Group 312
11.1. Privacy
11.1.1. Why?
11.1.1.1. Due to sense of nature of customer data/information, Move IT needs to ensure their customer's privacy is respected and complies with privacy laws
11.1.2. How to manage?
11.1.2.1. Move IT will enforce a strict privacy policy to its employees to reinforce importance of keeping customer information private
11.1.2.2. Customer data will be protected by passwords and user registration to prevent unauthorized misuse of customer data
11.1.2.3. Inform customers that we are using their data to customize moving experiences
11.2. To outsource or insource?
11.2.1. Outsourcing
11.2.1.1. Why?
11.2.1.1.1. Some benefits of outsourcing are that Move IT’s management isn’t burdened trying to coordinate the design of a new CEM system from scratch. Moreover, designing an IT solution internally from scratch requires a large capital investment upfront, tying up money that could be put towards other projects. Furthermore, being a start-up moving company, Move IT doesn’t have large team of IT designers on payroll that experience building CEM systems adding arguments for outsourcing the creation of the information system.
11.2.1.1.2. Finally outsourcing will allow Move it to benefit from the expertise of Software designers that have many years of experience of building IT solutions. That’s their business, Move IT’s business is moving.
11.2.1.2. How to manage?
11.2.1.2.1. Outsourcing the development of Move IT’s CEM system is the most efficient way of completing the project with the least amount of supervision by management, lower initial capital investment, lack of skilled IT Move IT employees.
11.2.1.2.2. losing control of management so give specific instructions to manage system, communicate openly with outsourcing company weekly in order to create an IT solution that will support Move IT's value proposition
12. What are the two most important issues (of those discussed in the phase 8 slides) when planning the development and implementation of IT for your company? Why? How are you going to manage those two issues?
13. Group 317 CITY WORKFORCE
13.1. Implementation
13.1.1. Privacy
13.1.1.1. In order to protect sensitive customer and corporate information, we will develop written policies to establish employee guidelines, personnel procedures, and organizational rules to handle information - ie: develop an information privacy policy
13.1.1.2. Because the resume and cover letter the candidates provide will contain the contact information and address, it is important to protect those employees' privacy and only distribute their information upon their consent.
13.1.2. Information Security
13.1.2.1. Our sources of positions and candidates information is essencial for City Workforce.
13.1.2.2. Since we are a start up company, there will be a relatively little amount of information to protect, however, it is important to City Workforce to establish a secure network early to protect information from accidental or intentional misuse by persons inside or outside the organization
13.1.3. Change Management
13.1.3.1. Have a plan in place on how to implement the IT into City Workforce, including: training sessions for employees in order for them to fully understand how to operate the IT, slowly make the change over to the new IT (nothing drastic), communicate why it is important and how this IT will help with operations to employees of City Workforce. Explain to customers how this IT will increase the efficiency and effectiveness of matching (marketing).
13.2. Development
13.2.1. Outsourcing vs. Insourcing
13.2.1.1. Outsourcing
13.2.1.1.1. Define which kind of services we are going to provide and how our IT will assist or enable City Workforce to do so effectively. Define what our City Workforces IT requirements. Decide to outsource the development of our IT to achieve the aim of effective "matching" between candidates and positions in a shorter period of time.
13.2.1.2. Insourcing
13.2.1.2.1. Hire a group of new IT specialists to develop the intelligent agent system inside our company.
14. CRM software systems are a journey, not a destination, and successful CRM application programs leverage a continuous process improvement cycle to constantly refine and optimize the business software system. Compare, measure and verify planned and achieved stakeholder group objectives Compare and verify the most critical success factors Be sure to trend user-based utilization metrics Analyze proposed software benefits from new software version upgrades Verify Second Wave benefits (e.g. those proposed implementation activities that didn't make the cut in the original implementation) Assemble an internal or external advisory group and participate in the vendor's user group(s)
15. these specialists know the company and are aligned with our values.
16. Group 303
16.1. Outsourcing
16.1.1. Cloud Computing
16.1.1.1. Use Google Apps
16.1.1.1.1. Benefits: -reduces costs: eliminates need to recruit additional IT team -gives core team in VanRealty ability to focus on core activities (eg: manage business projects, manage schedules of clients, reception jobs, etc) -already developed, easier to implement rather than designing everything from scratch
16.1.2. iPhone App
16.1.2.1. Use external app developer
16.1.3. Website development
16.2. Project Management
16.2.1. -Require staff to 'define' projects -Make sure 'scope creep' does not occur -Ensure feasibility of project -Ensure project is communicated to all relevant parties: -eg: 3rd party service providers, etc
17. Implementation
17.1. Privacy
17.1.1. Importance
17.1.1.1. customers creates profiles in the online plateform, company is responsible for the privacy issues
17.1.1.1.1. New node
17.1.1.2. E-commerce: Customers fill in credit/debit card information online
17.1.2. Solution
17.1.2.1. GFC customers who utilize the website will be required to create an account, which will be protected with a password
17.1.2.2. Credit card information and other sensitive data that are required to process a payment will go through external outsourcing with companys such as Paypal, SSL and Authorize.net
17.1.2.3. OpenPro system will be made more secure by adding preventative measures including: firewalls, digital signatures and encryption
17.1.2.4. Routine back-up of information, In the case of a Web Attack and information in our database is deleted, we will be able to complete a full restore to recover the lost data
17.2. Information security
17.2.1. RFID, product informations are valuable because it is trackable to the supplier
17.2.2. If Customer database is vulnerable, once hacked, both financial and personal information will be leaked out
18. How do we develop a mobile app
18.1. How do we develop it
18.1.1. Insourcing
18.1.1.1. The big benefit here is that it will be developed by a team of internal employees. They know what they want and how we want it. They know the culture we want to portray, but then we also need to
18.1.1.2. There will be prohibitive costs involved, not only in hiring a team which is capable of doing it, but also what do we do after the project is complete
18.1.1.3. You could argue that we already have a team who already designed and implemented the website, so in fact we will be using our staff more efficiently. Arguments work both sides
18.1.2. Outsourcing
18.1.2.1. We can take expertise from outside, it could be a lot faster since those who are designing it will already know about mobile applications
18.1.2.2. There will be a communication gap, what we want may not transfer to the other team. If we outsource it, then it may be really expensive comparing it to offshoring which may be more cheaper but then we will also encounter a much greater communication gap
18.1.2.3. It will take time for the other organization to learn of our company culture so the application may not be representative of our culture
18.1.2.4. We will also need someone to maintain it after, which could just keep us giving major recurring costs
18.2. How will we manage it
18.2.1. As a cost focused company, the first and most important thing will be to get the balance between cost and quality.
18.2.1.1. The internal quiality we believe may be better but it could also be more expensive, whereas the external quality may be worse but the it could also be cheaper
18.2.1.2. In the long run it may be beneficial to insource it especially if we plan on taking future it projects
18.2.2. We must also realize the balance between the speed of the application. We need to determine how important it is to get the product out on in the market, so if speed is vitally important then it may just be more cost effective to outsource it purely for the speed it takes to get into the market
18.2.3. We must also realize that if we insource it, then the focus of our executives may slightly shift towards the main goal of selling products to partially including the website development as well. It may shift the focus from executives
18.2.4. If we are to be innovative, than outsourcing the product also causes other issues such as them using it for other companies as well as our own, so we loose that competitors advantage, but then we must also realize that it may already be happening that those companies already have another product and we can get the product even faster
19. We will hire a 3rd party developer to create the mobile applications
20. Group 301
20.1. Training
20.1.1. Introducing a new system will require our employees to learn how it works(how to input data into the system, how to view information etc.)
20.1.1.1. Solution: Test prototypes of the system with our staff and make necessary improvements that will make the system more user friendly (involve staff with the design of the system)
20.1.1.2. The hired contractor to make our database could provide documentation and training.
20.1.1.3. Microsofts provides many guides and videos on using MS Access
20.1.1.4. Additional Support from company and community forums is also an asset for our Gps Software (GpsGate)
20.2. Outsourcing
20.2.1. Communication with the developer is important, or the software we obtain might not meet our requirements
20.2.1.1. Solution: Like training, close communication between the developer is crucial. an iterative approach to development should be made. Prototypes should be shown to make sure project is meeting our requirements.
20.2.1.2. Our hired contractor must be able to come to our offices and work with us in person. He should not be in India.
20.2.2. 3rd Party Software we obtained may not perform as well as thought.
20.2.2.1. The system should be rolled out in parts - GPS could be tested on one truck, then 3 trucks before it is deployed to the entire system
21. Group 302
21.1. Development
21.1.1. Outsourcing
21.1.1.1. We will use: Microsoft Dynamics CRM 4.0 Implementation Guide (software) CRM software implementation should follow a strategic approach to maximize likelihood of successful outcome The outcome is uncertain for we often make adjustments and adapt to new ideas, new information or new human capital as we make progress.
21.1.1.2. Hire Project Management Professional (PMP)
21.2. Implementation
21.2.1. SMART goals:
21.2.1.1. Specific, Measurable, Agreed Upon, Realistic, Time-framed NOT – ‘Increase Customer Satisfaction’ ‘Increase customer satisfaction by the end of the quarter by reducing Late Delivery by 15 percent' ‘Complete Review of Preliminary Software Specifications by June 15th, ensuring compatibility with company values’
21.2.1.2. Hire Project Management Professional (PMP)
21.2.2. Phase 1:
21.2.2.1. Quality project plans start with proven implementation methodologies and project management best practices. Organise the project team Establish clear project goals and quantifiable success metrics Craft a detailed project scope Thoroughly review existing business processes and keep an open mind to business process re-engineering
21.2.3. Phase 2:
21.2.3.1. Software Design and CRP
21.2.3.1.1. A Conference Room Pilot (CRP): a systematic approach to prototype the proposed operation of an information system, to learn how it works or should work, and to decide how to best manage the business with it – prior to the go-live conversion. The CRP results indicate confirmation or illustrate gaps and areas requiring a more detailed design effort prior to full implementation.
21.2.4. Phase 3:
21.2.4.1. CRM software User Training
21.2.4.1.1. Use the KISS (keep it simple stupid) principal. CRM systems, more so than other type of business applications, should have less focus on software and more focus on people, processes and training. Develop a rock solid training curriculum, classroom approach, hand-out materials and agenda; integrate cross reference materials where they can add value.
21.2.5. Phase 4:
21.2.5.1. Go-Live and Software Testing
21.2.5.1.1. When the go-live event happens, your full project team, including executive sponsor, should be shadowing the user communities in order to project confidence and be instantly available for user requests or the inevitable software irregularities that are sure to arise. The more the CRM software system pilot is tested, the more smooth the go-live event will likely be.
21.2.6. Phase 5:
21.2.6.1. Software Evolution and Maintenance
22. Group 304
22.1. Development
22.1.1. Outsourcing
22.1.1.1. They will also maintain them at minimal cost, must less expensive than trying to have it developed in house
22.1.1.2. This is the most important thing because app development is key, as if the app is not developed well. no one will use it
22.2. Implentation
22.2.1. Training
22.2.1.1. Apps will be intuitive to allow minimum training to a small limited manual.
23. Group 311
23.1. Outsourced IT
23.1.1. ERP
23.1.1.1. Integration of OpenPro: converting from a traditional way of keeping records and providing customer service to a more consolidated application requires massive restructuring that can cause confusion and dislike amongst employees and managers.
23.1.1.1.1. Employees will have to be trained how to use the new technology. We have to allow a training period where an OpenPro professional guides them.
23.1.1.1.2. We have to make sure that the current website server is in sync with the OpenPro server.
23.1.1.1.3. OpenPro's E-Commerce software suits ours needs very well. One issue that may arise is that we may not be able to upgrade easily or add additional features without contacting OpenPro and negotiating prices first.
24. Group 309- MoveIT
24.1. 1) Outsourcing of our development
24.1.1. poses a great risk of spending a large amount of money on a project that does not end up accomplishing what we need in order to meet our value proposition and generate revenue
24.1.1.1. putting the creation of our software (which is needed to fulfill our value proposition) in the hands of someone who is not as familiar with our business strategy and mission as someone within the organization
24.1.1.1.1. We will manage this issue by ensuring that a top manager (business strategist) is involved in not only creating in depth requirements for the development of our software at the beginning of the project, but also in meetings throughout the process that will serve as check points to ensure that the development is constantly in line with our firm's goals.
24.1.1.2. This may take more time and money (employee salary), but it is worth it in order to avoid a huge loss that would be caused by the software not meeting requirements
24.2. 2)
25. Group 306- city workforce
25.1. Database
25.1.1. Problem: Security/Privacy of customer information
25.1.1.1. identity theft - using other people's identification to apply to a job
25.1.1.1.1. binding legal agreement that will make you liable if the information you provide is incorrect
25.1.1.2. Hacking
25.1.1.2.1. have an antivirus in place
25.1.1.3. Employees who don't understand how much information they actually have
25.1.1.3.1. training for employees to understand how to protect customer information
25.1.1.4. unprotected systems
25.1.1.4.1. have passwords in place
25.2. Talemetry
25.2.1. Anything to do with information of the customer is in-sourced, any extra features that we secure from out-sourcing will be unable to access our current database
26. Group 305
26.1. Insourcing
26.1.1. IT specialists will create a virtual design software
26.1.1.1. using prototyping (rapid application development) methodology in developing this technology.
26.2. Outsourcing
26.2.1. Business processing service, contacting a business to take care of payroll such that costs are eliminated from the company and no extra people and systems need to be set up
26.2.2. Cloud computing for our phone apps to ensure that there are no breakins and it is running efficiently
26.2.3. By outsourcing we are avoiding heavy capital investment, thereby releasing funds for other uses
26.2.3.1. Get expertise that is not available internally
26.2.3.2. Provide superior infrastructure
26.2.3.3. Eliminates the need to recruit and retain competent staff to operate the needed technologies
26.2.3.4. Downsizing and company wide cost-cutting efforts
27. Group 307 Van Realty
27.1. Development
27.1.1. Outsourcing(Cloud Computing)
27.1.1.1. Van realty will outsource to a 3rd party for our cloud computing platform. The cloud will run our MLS(multiple listing service) app and the 3rd party will maintain its stability
27.1.1.2. Make sure all the information and data that Vanrealty provides to the 3rd party is kept private and secure; we can do this by communicating with salesforce and inquiring about their security strategies/policies. We can also reccomend some of our own security policies to them
27.1.1.2.1. In order to maintain confedentiality, require both parties to abide by the confendiality clause in a contract
27.1.1.3. Once Cloud Computing is up and running we can rely on salesforce to always maintain an up-to-date MLS application.
27.1.1.3.1. Provide key features of app: matching system where we list houses for sale and current offers filter system to find specific houses, etc.
27.1.1.3.2. Continual maintenace checks with 3rd party to make sure everything is running smoothly
27.2. Implementation
27.2.1. Training
27.2.1.1. Need to make sure all employees are trained with Cloud computing and the MLS application
27.2.1.2. Make sure agents are familiar with Chatter application that they can use to communicate with clients and agents
27.2.1.3. Make sure our agents know how to market our application, listing the benefits of using our MLS application versus other companies. This will make us stand out and differentiate us from our competitors
27.2.2. Cross Compatibility
28. Group 308
28.1. Website Security
28.1.1. What is it
28.1.1.1. We will be storing a lot of data of our users such as some personal identifiable information as well as more secure credit card information. We not only have to protect this information, but we also need to work with it ethically
28.1.1.1.1. We need to worry about the ethics of the information. Is it right to be able to quietly sell it to marketers to earn revenue?
28.1.1.1.2. A lot of people tend to fill their carts, but don't make the actual purchase. We want to make the payment system as simple as possible so people are more likely to actually buy their cart, by storing their account information. Credit card information needs to be securely stored as well as securely transmitted during a transaction.
28.1.2. How will we manage it
28.1.2.1. Encryption
28.1.2.1.1. Having appropriate encryption methods, such as assymetric encryption (is that the one with public/private keys?) will ensure when information is being transmitted, only the intended receiver can read it, as well as know who was the intended sender
28.1.2.2. Good privacy policy
28.1.2.2.1. The decision which we choose on how we keep marketing data will be focused as a business strategic decision on how we mange this data. This will be decided by our privacy policy and we can go either way, whichever way seems more beneficial, and of course whichever method fits the law
28.1.2.2.2. If we do keep it secure, we will make it clear on the website, to make people comfortable with using our services
28.1.2.3. Digital Signatures (Part of encryption)
28.1.2.3.1. Part of credit card verification systems. We want people to know that their credit card is being treated properly, so investing some money on digital signatures such as verified by visa will ensure that the transactions are more secure
28.1.2.4. Prevention from hackers
28.1.2.4.1. We could ask other people to try and hack our system, but it could be costly
28.1.2.4.2. We could also just believe that we have appropriate systems in place to prevent such hacking, and deal with it when the situation occurs (probably happens most of the times anyways)
28.1.2.4.3. We could also place firewalls or other such ways to prevent people, such as spamming our website, if we get too many connections being opened, we can just block the iP addresss
28.1.2.4.4. Important part is to balance effective cost and security