Frequently Asked Questions
Here in the FAQ you can find some context to some of the terminology used. as well as questions we hear more then once.
General Questions, Terms & Concepts
A brief explanation of some of the terminology and concepts used on this website.
Shadow IT and shadow databases
We often come across IT infrastructure that has not been explicitly vetted by management or the board, and often this sort of situation arises because someone knows a handy piece of software, or just needs to fix a particular need. If you need to connect everything a dashboard might be the solution.
But to explain further; They are not in the light of day, and called “shadow IT” or “shadow databases” While not necessarily bad, it’s better to have a closer look at these situations.
The problem is that these solutions are not on the radar of the people who are responsible for maintaining access, data, and these sorts of things, leading to potential vulnerabilities and leaks that no one at the top is even aware of. These blind spots can be points of ingress for hackers and or other unsanctioned users, or just not comply with local laws, or shift where data falls through.
The phenomenon can be either a spark of initiative that drives the company forward. It’s not always a bad thing to have the flexibility within the organization to adapt, rather than have a very strict and rigid hierarchy; or it can be a potential detriment somewhere down the line. So we leave it up to our customers to decide whether the glass is half full or empty, we just think it’s a phenomenon to be aware of.
How do I know if the software I use has a Database?
Relatively speaking, if the software has a “memory” you can be sure it has some form of database which it uses to house the data that you can then overwrite, or pull up. So there are not many pieces of software out there that run without storing data. At the very least this would be your login information, perhaps a name and email address, but it could be much more extensive.
What is "bespoke software"
Quite often software gets made. And patched, updated, quick fixes are applied, and so forth.
But quite often these things are not designed from the ground up to do one particular thing very well. Quite often it’s a general solution like a plugin that gives some functionality and is easy to install. Or a patch to correct an error.
But in certain cases, a situation arises that warrants its software development, from the ground up. often this makes a process extremely “light” (so, fast.) and you can also make it extremely secure because it’s a tailored solution. A lot of security issues arise from generalist software. so taking the time to design something from the ground up properly, with prosperity in mind and making sure it won’t fall apart after a system update is what we call bespoke software.
What is a Dashboard?
Simply put, nothing more and nothing less and a sort of web page or web app that is used to consolidate all data upon, so in essence its data unification and data integration into a nice safe and visually easy to read environment.
What data is shown here depends on a myriad of factors, but its mainly for vital information for the organisation. What this is depends on your organisation, the market you find yourself in, what systems you are using, preferences, what is vital to keep track of etc.
There are many reasons depending on the circumstances you find yourself to consider building a dashboard.
But to put it simply; you have one source of truth in the organisation instead of a few repositories of information. It’s a safe way of accessing this data and it’s a huge boon to efficiency when you have thought out metrics automatically refreshing at your finger tips, basically like NASA’s space command center, but in your office. Or on your tablet or smartphone if needs be.
When is bespoke software a good solution?
Generally speaking, when it becomes cost-effective to do so; you really need to keep tight control over certain data flows. Another element is speed. Sometimes you have a piece of software or library that has been found somewhere that is rather general purpose, or something like a plugin for a CMS.
Is it cheaper to make a dashboard, or should I buy new software?
Often new software packages can be a large investment, new hardware and the license for the software often don’t come cheap. If you only need some data from the old system and don’t want to migrate to a completely new environment, with new tools and new rules, the whole staff will have to adjust to this new piece of software.
Sometimes new implementations also require a lot of bug testing, fine-tuning, and general calibrating before they are ready. Not every company manages to pull off a clean transition and this can also be a costly factor, as well as a huge annoyance for everyone involved.
Upgrading the old with some bespoke software might be a good idea. As you just define what is really lacking or not working optimally in the old system, and add to this with some costume code. Of course, you need access to the source code, so this doesn’t work for SaaS solutions, unfortunately.
What is a Data Silo?
What is 2FA authentication?
Two-Factor Authentication; like it says on the tin. It uses two factors to make sure you are who you appear to be.
This often comes in the form of a code that’s send to your mobile via an SMS or perhaps via a specialized app that can generate a number or a small number of digits and letters that are valid for a few minutes.
But a lot of other things can be the second factor as well, such as your verified phone, or biometrics or just a simple pin code. It’s a common way of moving away from just a password and email address login which are quick an easy, but not the most secure option. So if you want security and are willing to spend a little more time logging in each time, 2FA might be the right solution for you.
What is OpenID Connect?
OpenID Connect is a protocol which allows users to authenticate themselves against an centrally managed identity provider. This a great solution for enterprises with a plethora of applications that their employees use, as it allows identities and roles to be managed from a central location. You may have seen this solution in action via “Connect via Google” or “Log in via Facebook” buttons when logging in to your favorite websites.
Such an authentication setup has multiple benefits, both for users and system administrators. Users do not need to remember a large number of accounts, one for every application they use, with different user names, passwords and possible (hardware) 2FA solutions. Instead, the user only needs to remember a single user name, password and use a single 2FA mechanism. Depending on the implementation, if Single Sign-on (SSO) is supported, users only need to log in once per session to get access to all the applications they need to use. This allows for quick and efficient access, without interruptions.
For system administrators multiple benefits exist as well. By centralizing authentication and authorization, a fractured landscape of accounts and roles is aggregated into one secure environment. This allows for one environment to add and remove user accounts, give users access to applications and enforce 2FA policies. Additionally, using OpenID Connect as an authentication scheme in user applications is more secure as well: as users only enter their credentials in an environment provided by the identity provider, these credentials are not seen by user applications. Instead, they only have access to an authentication token provided by the identity provider, which as limited access. This is crucial in the case of compromised applications: only having access to a token limits access to the compromised system to the roles assigned to the user of that access token, and rejects all access to other applications. This is in contrast with having access to a username and password that can be used in multiple systems.
If your company has implemented a centralized identity provider with support for OpenID Connect, it is well worth the effort to connect applications to secure them and restrict user access
General Security Questions & Topics
Technology can make our lives so much easier. But just equally as well give us one hell of a headache, read about some of them here!
Data silos and multiple sources of data cause duplications or inaccurate data representation
A common scenario is also when there are multiple sources of data, that are not necessarily wrong but just have a different point of measurement. Meaning, one might be a bit older. But or looking at the same thing but with a slightly different scope or vantage point. This can be incredibly confusing and or downright detrimental to decision-making.
So, it’s often advisable to sort out what is what, make a hierarchy for these points of data ingestion and put all of this data in a unified dashboard so there is a clear overview. This can be done with a unified dashboard by Dashcoon, we can tailor-make and pull information from various ways safely and securely.
So, it’s often advisable to sort out what is what, make a hierarchy for these points of data ingestion, and put all of this data in a unified dashboard so there is a clear overview. This can be done with a unified dashboard by Dashcoon, we can tailor-make and pull information from various ways safely and securely.
Integration difficulties between new systems and legacy systems
Sometimes the older software is written in a language that is not popular anymore. There is a common joke on the internet that HR asks the inventor of a language or library if he has 6+ experience with a language that is at most 4 years old. While hilarious it’s also quite an appt in demonstrating the seasonality of certain coding languages and pieces of software.
Some, like Microsoft Excel or Word, are basically “immortal” pieces of software that do not have to change with the times because they have been so widely adopted and are so genre-defining.
But, for the vast majority of languages and software packages out there, they will stop being supported at one point. We all have seen this in our smartphones, after a while – your model will not be supported anymore. This is a bummer on a personal level because we all get used to our phone and kind of like how it’s working, and then are forced into a new purchase this way.
But, on the level of company-wide IT infrastructure, this is more of a hassle than just going to the store and purchasing yourself the latest and the greatest in cellphone technology to be up to date again.
Department-specific software and databases
Often over the years, different departments will end up using their software due to the ease of use, or someone in said department is already familiar with a piece of software and helps it get adopted department-wide.
This can lead to a productivity boost for the team, but it also is yet another database floating around.
How can I combine data from two systems
Yeah, it happens quite often that you end up with two systems that do a certain task, but then you find yourself in a position where you want to pull data out of both, and somehow equate the two or use it.
Migrating to a new system, or unifying the data you need in a unified dashboard
Basic Security for a Dashboard
When setting up the Dashboard environment naturally security and the checking of identity is an issue.
The most basic way you can ensure that only vetted people have access to you’re “inner sanctum” would be the age old password an username combination which needs to be entered before the application loads.
This is of course not going to keep out knowledgeable and slightly determined intruders. Just on it’s own this is quite an antiquated. “Brute Force Attacks” where quite populair back in the day, basically you use a computer to just try every variation underneath the stars. And in the time when the 3 favorite passwords under the stars where “Love” , “Secrete” and “God” this was a great way of gaining access to places you had no purpose being.
But, these automated attacks can be easily thwarted now with a Captcha, so it’s bare bones but still doable if you do not consider you’re self a particularly large target.
Good Security for a Dashboard
A good way of setting up security for your secure Dashboard enviroment would be the use ofcourse, a login of a user name and password but to back this up with some additional layers.
A very useful and common one is the “2FA” or two factor authentication. You have a special app that generates a code on request, or a computer sends you an sms with a number which is only valid for your login, and a limited time only this creates an extra barrier that’s pretty hard to get around for malcontents. So we would generally advice this level of login security.
Advanced Security for a Dashboard
So if you have your username and password login all setup and it’s humming along nicely besides the F2A authentication you are in a pretty safe place.
But for those who hold to the credo: “just because you are paranoid, doesn’t mean they are not out to get you!” or you know, you have a large obligation due to the nature of your business to be very very cautious with data. Such as is often the case in the medical field or finance related matters. There is an additional mile to go in terms of security if you where so inclined:
Questions about Dashboards
Scalability: Can a dashboard be changed or modified in the future?
Yes, new things can be added when you have a new system that is a potential source of information. Or you start to use new SaaS software that has an API that can send out data.
Besides the technical mumbo jumbo, there is an element of UX to the dashboard we like to make for you. Information should be displayed in a unambiguous and clear way, otherwise it can still cause confusion. So jacking in a new system might mean looking at the larger picture again to see how to best fit it in and make it add to the rest of the data instead of detracting from it, but yes technically it’s very much possible.
Security Aspects: Why is a Unified Dashboard considered safe?
The general thing that makes a dashboard safe is that you construct a few secure, automated pipelines to one central hub. This means you can go to town with the security in this environment and add everything you want from F2A authentication, VPN, LDAP-server_ Or use Active directories to shore up the security for this environment.
Our philosophy is to automate and add maximum security to info pipelines you know people will need access to on regular intervals. If you have people login randomly, or email each-other spreadsheets and data this is a great way to get data leaks. Every login or data export from a dodgy connection is a potential vulnerability. And if it’s common in your company for people to ask other employees for data this is fertile ground for so called social engineering “phishing” schemes. Hence we say, automate this risk away!
Content: What type of information can be showing in a Dashboard?
The type of content that can be displayed is in essence what is available in a digital format. So in simple terms this means; what you’ve got running locally and the SaaS services you use that have an automated export function in them.
Once this information is available we can start to correlate and equate everything into nice graphs, tables and so on and so forth.
We like to have a discussion with your team, figure out what is important and figure out the best way to display this, so you have one source of truth that automatically updates itself.
Access: How can I manage access levels to data?
Yes! We can help you manage various tiers of access in your system. Either on a user access level base system or a role based access system.
So on the bases of someones corporate email. Or you can assign a group of email addresses as to belong to the marketing department, and levy access to certain stats and figures to everyone in marketing.
It’s also a possibility to manage which group or person has remote access: for example:that you give Sales certain access, and only they can have remote access to a dashboard.
Or you can have a specific tier of access available for your clients that are repeat buyers and need some info like: Delivery time of an order, current price of a product, availability and so on and so-forth. No need to be sending emails or calling when the dashboard environment can allow them to login and see what’s up with there order. Greatly increasing clarity and efficiency.
Timeline: How long does it take to build a Dashboard?
The time we need to complete the secure dashboard environment for you depends on a few factors the complexity of the dashboard and what it should display is an important factor. But often the underlying systems and their stability and ease of access are the largest focus because these things need to be at a certain level of stability before you can make a reliable Dashboard based on them.
So, if certain underlying stuff is showing signs it might be best to swap it out, we might recommend some bespoke software first to stabilize the situation. As a Dashboard needs to get it’s information from somewhere to be able to populate itself with data.
So it really depends on the situation. Sometimes we can start with the dashboard quite quickly, other times some intervention is required to stabilize the situation. luckily we are full service and we can help out with this.
Hosting: Where is a Dashboard environment hosted?
This depends on where you want it to be hosted. We can help you setup a secure environment hosted on a server that has the necessary background software running. So, more or less anywhere and then configure it for maximum safety. Or if you wish the physical location of the server can be somewhere on the premise of your HQ office. We are hosting agnostic here at Dashcoon.
Mobile: Do Dashboards work on mobile devices such as smartphones & tablets?
When an employee is on the road, they want to have access to the relevant information of their next appointment as quickly and easily as possible. While some systems can only be used from a desktop or laptop environment, Dashcoon dashboards can be adapted to any target platform.
Remote access: How can I access my company data on the road?
Yeah, we can help you setup a safe and secure way of accessing a dashboard from the road. This could be done on a tablet, laptop or smartphone. It will be device agnostic.
Security is often the main issue here besides all the technical tinkering to make it possible. So we can help make various levels of accessibility to data, two factor authentication and things like that, let us know what your organisation needs and we will get back to you!