SlideShare une entreprise Scribd logo
1  sur  20
Building an Intranetwith WordPressJeff HesterWordCamp OCMay 14, 2011 1
2 I am passionate about WordPress
3 #intrawc#ocwc @jeffhester
4 What the heck is an intranet?
5 An intranet is a private computer network that uses Internet Protocol technology to securely share any part of an organization's information or network operating system within that organization. Wikipedia
6 So what exactly is an intranetgood for?
7
8 Intranetsby the Numbers THE SIX STEPS
STEP ONEKnow what you want to accomplish Photo: Alex Osterwalder
STEP TWOSetup your development environment
STEP THREEDefine security and use policies
STEP FOURBuild, Test & Deploy Photo: robynejay
STEP FIVECommunicate, Educate & Repeat Photo: Paige Parsons Photo:
STEP SIXMeasure the results(see step #1) Photo: Darren Hester Photo:
Your WordPress-powered Intranet Toolkit #1 of 3 Restricted Site Access Restrict access to named users or Ips White Label CMS Simplify the admin console and brand with your organization identity Avatars Allows users to upload an avatar  15
Your WordPress-powered Intranet Toolkit #2 of 3 Calendar Provide an event calendar on any page, post or in a sidebar Gravity Forms Replace offline forms with online versions and rudimentary workflow Image Widget Simple way for non-techies to add images to sidebars 16
Your WordPress-powered Intranet Toolkit #3 of 3 Stray Random Quotes Not just for quotes, but just about any rotating content WP-prettyPhoto Turn the built-in WordPress gallery into something better (among other things) BackupBuddy Automate the backup process 17
18 It’s HAMMERtime!
19 Hike your own hike(aka YMMV)
20 Jeff Hesterjeff.hester@gmail.com www.jeffhester.net @jeffhester

Contenu connexe

Tendances

Online Security
Online Security Online Security
Online Security JimWhite
 
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known VulnerabilitiesUnderstanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known VulnerabilitiesAnant Shrivastava
 
Nessus Software
Nessus SoftwareNessus Software
Nessus SoftwareMegha Sahu
 
Wordpress security
Wordpress securityWordpress security
Wordpress securityjhon wilson
 
Securing you SQL Server
Securing you SQL ServerSecuring you SQL Server
Securing you SQL ServerGabriel Villa
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014TonikJDK
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar henelpj
 
Top 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance SecurityTop 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance Security9 series
 
Abusing, Exploiting and Pwning with Firefox Add-ons
Abusing, Exploiting and Pwning with Firefox Add-onsAbusing, Exploiting and Pwning with Firefox Add-ons
Abusing, Exploiting and Pwning with Firefox Add-onsAjin Abraham
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development Cheng-Yi Yu
 
Top ten OSS products cutting out costs and making a difference in the public ...
Top ten OSS products cutting out costs and making a difference in the public ...Top ten OSS products cutting out costs and making a difference in the public ...
Top ten OSS products cutting out costs and making a difference in the public ...Ubertas
 
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
The Enemy Within: Organizational Insight Through the Eyes of a WebserverThe Enemy Within: Organizational Insight Through the Eyes of a Webserver
The Enemy Within: Organizational Insight Through the Eyes of a WebserverRamece Cave
 

Tendances (19)

Online Security
Online Security Online Security
Online Security
 
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known VulnerabilitiesUnderstanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
 
Amazon EC2
Amazon EC2Amazon EC2
Amazon EC2
 
Security gap in Internet Explorer
Security gap in Internet ExplorerSecurity gap in Internet Explorer
Security gap in Internet Explorer
 
What the fuzz
What the fuzzWhat the fuzz
What the fuzz
 
70-272 Chapter10
70-272 Chapter1070-272 Chapter10
70-272 Chapter10
 
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
 
Wordpress security
Wordpress securityWordpress security
Wordpress security
 
Securing you SQL Server
Securing you SQL ServerSecuring you SQL Server
Securing you SQL Server
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
 
Facebook Stetho
Facebook StethoFacebook Stetho
Facebook Stetho
 
無題 1
無題 1無題 1
無題 1
 
Top 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance SecurityTop 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance Security
 
Kali kinux1
Kali kinux1Kali kinux1
Kali kinux1
 
Abusing, Exploiting and Pwning with Firefox Add-ons
Abusing, Exploiting and Pwning with Firefox Add-onsAbusing, Exploiting and Pwning with Firefox Add-ons
Abusing, Exploiting and Pwning with Firefox Add-ons
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development
 
Top ten OSS products cutting out costs and making a difference in the public ...
Top ten OSS products cutting out costs and making a difference in the public ...Top ten OSS products cutting out costs and making a difference in the public ...
Top ten OSS products cutting out costs and making a difference in the public ...
 
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
The Enemy Within: Organizational Insight Through the Eyes of a WebserverThe Enemy Within: Organizational Insight Through the Eyes of a Webserver
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
 

En vedette

Website Planning
Website PlanningWebsite Planning
Website Planningstudconn
 
Organizing 2.0: How to Plan for Your Website Redesign
Organizing 2.0: How to Plan for Your Website RedesignOrganizing 2.0: How to Plan for Your Website Redesign
Organizing 2.0: How to Plan for Your Website RedesignJulie Blitzer
 
Website Development with Wordpress as Content Management System
Website Development with Wordpress as Content Management SystemWebsite Development with Wordpress as Content Management System
Website Development with Wordpress as Content Management SystemBroekman Communications
 
Building an Intranet with WordPress
Building an Intranet with WordPressBuilding an Intranet with WordPress
Building an Intranet with WordPresssixty4media
 
4Site Studios New Website Content Plan
4Site Studios New Website Content Plan4Site Studios New Website Content Plan
4Site Studios New Website Content PlanRiché Zamor
 
Modernizing WordPress Search with Elasticsearch
Modernizing WordPress Search with ElasticsearchModernizing WordPress Search with Elasticsearch
Modernizing WordPress Search with ElasticsearchTaylor Lovett
 
Intranet Governance At BT
Intranet Governance At BTIntranet Governance At BT
Intranet Governance At BTMark Morrell
 
Web Project Plan for Design and Development
Web Project Plan for Design and DevelopmentWeb Project Plan for Design and Development
Web Project Plan for Design and DevelopmentLynn Holley III
 
Elasticsearch as a search alternative to a relational database
Elasticsearch as a search alternative to a relational databaseElasticsearch as a search alternative to a relational database
Elasticsearch as a search alternative to a relational databaseKristijan Duvnjak
 
ng-owasp: OWASP Top 10 for AngularJS Applications
ng-owasp: OWASP Top 10 for AngularJS Applicationsng-owasp: OWASP Top 10 for AngularJS Applications
ng-owasp: OWASP Top 10 for AngularJS ApplicationsKevin Hakanson
 
WordPress as a CMS - Case Study of an Organizational Intranet
WordPress as a CMS - Case Study of an Organizational IntranetWordPress as a CMS - Case Study of an Organizational Intranet
WordPress as a CMS - Case Study of an Organizational IntranetTech Liminal
 
Reorganizing Website Architecture for HTTP/2 and Beyond
Reorganizing Website Architecture for HTTP/2 and BeyondReorganizing Website Architecture for HTTP/2 and Beyond
Reorganizing Website Architecture for HTTP/2 and BeyondKazuho Oku
 
Stateless authentication for microservices
Stateless authentication for microservicesStateless authentication for microservices
Stateless authentication for microservicesAlvaro Sanchez-Mariscal
 
Architecting an Highly Available and Scalable WordPress Site in AWS
Architecting an Highly Available and Scalable WordPress Site in AWS Architecting an Highly Available and Scalable WordPress Site in AWS
Architecting an Highly Available and Scalable WordPress Site in AWS Harish Ganesan
 

En vedette (16)

Website Planning
Website PlanningWebsite Planning
Website Planning
 
Organizing 2.0: How to Plan for Your Website Redesign
Organizing 2.0: How to Plan for Your Website RedesignOrganizing 2.0: How to Plan for Your Website Redesign
Organizing 2.0: How to Plan for Your Website Redesign
 
Website Development with Wordpress as Content Management System
Website Development with Wordpress as Content Management SystemWebsite Development with Wordpress as Content Management System
Website Development with Wordpress as Content Management System
 
Building an Intranet with WordPress
Building an Intranet with WordPressBuilding an Intranet with WordPress
Building an Intranet with WordPress
 
4Site Studios New Website Content Plan
4Site Studios New Website Content Plan4Site Studios New Website Content Plan
4Site Studios New Website Content Plan
 
Modernizing WordPress Search with Elasticsearch
Modernizing WordPress Search with ElasticsearchModernizing WordPress Search with Elasticsearch
Modernizing WordPress Search with Elasticsearch
 
Intranet Governance At BT
Intranet Governance At BTIntranet Governance At BT
Intranet Governance At BT
 
Web Project Plan for Design and Development
Web Project Plan for Design and DevelopmentWeb Project Plan for Design and Development
Web Project Plan for Design and Development
 
Elasticsearch as a search alternative to a relational database
Elasticsearch as a search alternative to a relational databaseElasticsearch as a search alternative to a relational database
Elasticsearch as a search alternative to a relational database
 
ng-owasp: OWASP Top 10 for AngularJS Applications
ng-owasp: OWASP Top 10 for AngularJS Applicationsng-owasp: OWASP Top 10 for AngularJS Applications
ng-owasp: OWASP Top 10 for AngularJS Applications
 
WordPress as a CMS - Case Study of an Organizational Intranet
WordPress as a CMS - Case Study of an Organizational IntranetWordPress as a CMS - Case Study of an Organizational Intranet
WordPress as a CMS - Case Study of an Organizational Intranet
 
Reorganizing Website Architecture for HTTP/2 and Beyond
Reorganizing Website Architecture for HTTP/2 and BeyondReorganizing Website Architecture for HTTP/2 and Beyond
Reorganizing Website Architecture for HTTP/2 and Beyond
 
Stateless authentication for microservices
Stateless authentication for microservicesStateless authentication for microservices
Stateless authentication for microservices
 
Architecting an Highly Available and Scalable WordPress Site in AWS
Architecting an Highly Available and Scalable WordPress Site in AWS Architecting an Highly Available and Scalable WordPress Site in AWS
Architecting an Highly Available and Scalable WordPress Site in AWS
 
Sample Website Proposal Presentation
Sample Website Proposal PresentationSample Website Proposal Presentation
Sample Website Proposal Presentation
 
Interviewing PPT
Interviewing PPTInterviewing PPT
Interviewing PPT
 

Similaire à Building an Intranet with WordPress

OWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention MethodsOWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention MethodsIRJET Journal
 
Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)Intergen
 
Purple Teaming With Adversary Emulation.pdf
Purple Teaming With Adversary Emulation.pdfPurple Teaming With Adversary Emulation.pdf
Purple Teaming With Adversary Emulation.pdfprithaaash
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
Migration vers Windows 8.1 : retour d'expérience chez Microsoft IT
Migration vers Windows 8.1 : retour d'expérience chez Microsoft IT Migration vers Windows 8.1 : retour d'expérience chez Microsoft IT
Migration vers Windows 8.1 : retour d'expérience chez Microsoft IT Microsoft Technet France
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
 
N-Tier Application with Windows Forms - Deployment and Security
N-Tier Application with Windows Forms - Deployment and SecurityN-Tier Application with Windows Forms - Deployment and Security
N-Tier Application with Windows Forms - Deployment and SecurityPeter Gfader
 
James Williams_IT110_IP1.doc.docxIT110-1404A-02 Introduction.docx
James Williams_IT110_IP1.doc.docxIT110-1404A-02 Introduction.docxJames Williams_IT110_IP1.doc.docxIT110-1404A-02 Introduction.docx
James Williams_IT110_IP1.doc.docxIT110-1404A-02 Introduction.docxpriestmanmable
 
Infrastrucutre As Code
Infrastrucutre As Code Infrastrucutre As Code
Infrastrucutre As Code Venu Murthy
 
Design and Implement Security Operat.docx
Design and Implement Security Operat.docxDesign and Implement Security Operat.docx
Design and Implement Security Operat.docxtheodorelove43763
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Report : Dpilot - A Cloud Based File Transfer Web Application
Report : Dpilot - A Cloud Based File Transfer Web ApplicationReport : Dpilot - A Cloud Based File Transfer Web Application
Report : Dpilot - A Cloud Based File Transfer Web ApplicationNidhi Chauhan
 
Windows 7 Feature Overview It Academic Day 2009
Windows 7 Feature Overview   It Academic Day 2009Windows 7 Feature Overview   It Academic Day 2009
Windows 7 Feature Overview It Academic Day 2009Tobias Koprowski
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 

Similaire à Building an Intranet with WordPress (20)

OWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention MethodsOWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention Methods
 
Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)
 
Purple Teaming With Adversary Emulation.pdf
Purple Teaming With Adversary Emulation.pdfPurple Teaming With Adversary Emulation.pdf
Purple Teaming With Adversary Emulation.pdf
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Migration vers Windows 8.1 : retour d'expérience chez Microsoft IT
Migration vers Windows 8.1 : retour d'expérience chez Microsoft IT Migration vers Windows 8.1 : retour d'expérience chez Microsoft IT
Migration vers Windows 8.1 : retour d'expérience chez Microsoft IT
 
Butler
ButlerButler
Butler
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
N-Tier Application with Windows Forms - Deployment and Security
N-Tier Application with Windows Forms - Deployment and SecurityN-Tier Application with Windows Forms - Deployment and Security
N-Tier Application with Windows Forms - Deployment and Security
 
Butler
ButlerButler
Butler
 
James Williams_IT110_IP1.doc.docxIT110-1404A-02 Introduction.docx
James Williams_IT110_IP1.doc.docxIT110-1404A-02 Introduction.docxJames Williams_IT110_IP1.doc.docxIT110-1404A-02 Introduction.docx
James Williams_IT110_IP1.doc.docxIT110-1404A-02 Introduction.docx
 
Ite pc v40_chapter9
Ite pc v40_chapter9Ite pc v40_chapter9
Ite pc v40_chapter9
 
Supply Chain Attack Backdooring Your Networks
 Supply Chain Attack Backdooring Your Networks   Supply Chain Attack Backdooring Your Networks
Supply Chain Attack Backdooring Your Networks
 
Infrastrucutre As Code
Infrastrucutre As Code Infrastrucutre As Code
Infrastrucutre As Code
 
Design and Implement Security Operat.docx
Design and Implement Security Operat.docxDesign and Implement Security Operat.docx
Design and Implement Security Operat.docx
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Crime security.
Crime security.Crime security.
Crime security.
 
Report : Dpilot - A Cloud Based File Transfer Web Application
Report : Dpilot - A Cloud Based File Transfer Web ApplicationReport : Dpilot - A Cloud Based File Transfer Web Application
Report : Dpilot - A Cloud Based File Transfer Web Application
 
Windows 7 Feature Overview It Academic Day 2009
Windows 7 Feature Overview   It Academic Day 2009Windows 7 Feature Overview   It Academic Day 2009
Windows 7 Feature Overview It Academic Day 2009
 
Wi-Fi File Explorer
Wi-Fi File ExplorerWi-Fi File Explorer
Wi-Fi File Explorer
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 

Dernier

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Dernier (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

Building an Intranet with WordPress

Notes de l'éditeur

  1. [twitter]Speaking at WordCamp OC NOW in Room 1[/twitter]
  2. [twitter]I love WordPress![/twitter]
  3. Keep your cell phones ON (but ringers off)Share your questions and feedback in real-time via Twitter with #intra #ocwchashtagsWe encourage you to share the key points with your network and retweet![twitter]Please retweet key points and share questions and feedback using these hashtag: [/twitter]
  4. According to Wikipedia: An intranet is a private computer network that uses Internet Protocol technology to securely share any part of an organization's information or network operating system within that organization.
  5. [twitter]What is an intranet good for?[/twitter]
  6. Do you have multiple offices? Remote workers? An intranet helps keep your confidential stuff private, but helps keep everyone on the same page.ConsistencyEliminate redundant effortBuild the team[twitter]Intranets are not just for companies. Clubs, families & groups of all kinds.[/twitter]
  7. Get all the stakeholders involved and brainstorm what you need. Prioritize to go after the items that will really help – like enhancing communication, improving onboarding for new employees, and strengthening person-to-person connections. [twitter]STEP 1: Know what you want to accomplish[/twitter]
  8. Don’t develop on your production server! Get WAMP (for Windows) or MAMP (for Mac). [twitter]STEP 2: Setup dev (NOT on production)[/twitter]
  9. Part of this will be a function of the production infrastructure. If you have IT resources that can configure and support a webserver on your internal network, this gives you the greatest level of control (but with the highest level of responsibility). While not technically an intranet, many small-to-mid sized firms use an internet-based web server and simply apply access controls (by name and/or IP address). This isn’t so unusual – you’re really just hosting your intranet “in the cloud.” [twitter]STEP 3: Determine security requirements.[/twitter]
  10. It’s not important to get it perfect. Don’t let worry about “getting it right” (or wrong) paralyze you from starting. Concede that you will make mistakes. Learn from them, iterate and keep improving. Enlist the other members of your intranet community to provide feedback and suggestions for improvement. [twitter]STEP 4: Iterate, iterate, iterate.[/twitter]
  11. The technology is (relatively) easy. This (the people and culture) is the really hard stuff. “If you build it, they will come…” may have worked for Kevin Costner’s Field of Dreams, but it typically requires something more for an intranet. Look for opportunities to build a “killer app” that really addresses a pain point experienced by your employees. Do this, and they will come. But even then, you’ll need to keep reinforcing this message over and over (and over) again. As you see little “successes” – write about them! People like to hear what other people are doing (and how they might benefit if they did the same). And it provides the reward of recognition to the ones that “get it.” They become your evangelists. Care and feeding of an intranet is much like that of a blog. If you don’t keep it up, it will eventually whither.
  12. If you started at Step 1 with clear, measurable objectives, this part should be pretty easy. But don’t overlook it. In the early stages, you’ll be looking primarily at usage statistics; how many people are going in and reading this or that?
  13. Demo
  14. Hike your own hike?This is Reinhold Metzger. He’s 67 years old and I met him while hiking the 211 mile John Muir Trail last August. My hike was 22 days. He was doing the same trail in 7 days, and previously held the speed record for 4 days, 12 hours and 45 minutes. There is a saying among hikers that you need to “hike your own hike”. The same is true for building an intranet. The specific business needs, environment and culture varies from one company to the next. WordPress could be the cornerstone of your intranet, or simply augment other systems. You need to determine what works best for your company. In other words, you need to hike your own hike. [twitter]Hike your own hike (applies to your intranet, too)[/twitter]
  15. [twitter]Want to learn more about building an intranet with WordPress? Contact me. [/twitter]