123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Copying Website Functionality

Profile Picture
By Author: James Harry
Total Articles: 46
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

We get an ever increasing number of requests from prospective clients who want a website that includes the functionality of a site they have seen. They are often trying to start a business based on either expansion of the functionality or the cloning of the features for a narrower and specialized market segment. It was several years ago that we got a request to create a site that functioned like match. com but just for friends. A year later we got a request to create an online magazine. At about the same time a network member wanted to create a coupon site. Recently we received a request to create an online registry similar to one being offered elsewhere.

In many cases, clients with this type of request come to us after they have given the project to website designers who fail to complete the task. It is not uncommon that we are being consulted after a second or third failure.

Imagining that projects like these are a simple process of copying website functionality overlooks the harsh realities that will eventually surface.

When you ask a developer to "clone a website" they are likely to be able to explore ...
... and see much of the functionality but they are unlikely to see and understand all of it. If the website is interactive, then the information being presented and the path the application takes will likely depend on the data entered. Developers will instinctively proceed through a web application supplying answers that they are most comfortable with. If filling out an address form they will likely use their home state and possibly a made up zip code. It is unlikely that they will try to enter a foreign address so they will not see the result of that entry. If the application provides some sort of search capability or data comparison functionality a developer will likely enter values that will be found. The more complex the application the less likely it is that exploring the forward facing functionality, the front end, will show all of the possible functionality. And the front end, which is available for exploration, is the simpler part of the application. The back end processes are likely more complex and they will be hidden. The back end functionality will need to be inferred. The even larger problem is the functionality that one does not even consider. Are there back end reports? Are there scheduled process? Are there notification emails. Are there responders and other crucial back end communication procedures?

So if you are looking to build a site to meet a particular business purpose, it is critical that you carefully define the processes the business will need and from there determine the web application needs. Handing a developer a request to clone some web functionality you have seen is likely a recipe for disaster. It you need help please visit our website or email dkrumholz at this domain.

Total Views: 575Word Count: 486See All articles From Author

Add Comment

Computers Articles

1. Market Forecast: Conversational Ai For Intelligent Contact Center
Author: Umangp

2. Complete Guide To Ipv4 Leasing, Lease Ipv4 Address & Ipv4 Address Rental By Elite Server Management
Author: Elite Server Management

3. B2b Marketer’s Guide To Onboarding A Lead Agency Without Losing Months
Author: demandify

4. Why Choose Sataware?
Author: brainbell10

5. Best Laptop Service In Hyderabad For Fast Laptop And Computer Repair Near Me
Author: Vfix4u Seo

6. Microsoft Dynamics 365 Upgrade Process
Author: brainbell10

7. Transforming The Future With Legacy Migration: How Tech Gazebos Drives Modernization Success
Author: Tech Gazebos

8. The Hidden Cost Of Treating Iam As A Governance Platform
Author: Tushar Pansare

9. Sqlite Development & Integration Services In Usa
Author: davidjohansen

10. Rp80 Thermal Printer For Pos: Full Overview
Author: pbs

11. Real-time Vehicle Inventory Monitoring
Author: Actowiz Metrics

12. Software Testing & Qa
Author: davidjohansen

13. Market Forecast: User Authentication
Author: Umangp

14. Dell Laptop Repair In Wadala
Author: Laptop Repair Mumbai

15. Data Mining Tutorial: A Complete Guide To Concepts, Techniques, And Applications
Author: Tech Point

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: