Skip to main content

Best Practices in managing your school management software



For banks, buying an ATM machine is not just where it ended. ATM machine is useless except when put to use, and there are certain practices if ignored that will rendered any product useless,  how efficient the machine is, not withstanding. To make the most of your school management software and have it delivered it utmost value to your school there are certain practices that should not be ignored and i will show you quickly.


1. Don’t outsourced data entry to the vendor


The purpose of every product is to add value, but certain things can limit the effectiveness of a product. In Nigeria, some schools submit their result manuscript to the vendor and have them helped do the data entry and computation, this is dangerous. Data entry outsourced to vendors are prone to more errors and can also be compromised. Having control on your data does not just do more to reduce errors and it also brings accountability, on who and how information is managed in your school.


2. Involve your Teachers

The task of managing a school management software can be daunting, as such, a team is needed to effectively manage every school software. Teachers is one of the most valuable asset of your school, training them on a specific skill, will only deliver the utmost best to your school in many ways, one of such ways is delegating the managing of some of the key areas that affect them directly like result processing to teachers. This improves accountability and reduces significantly the chances of having an error riddled term result sheet.


3. Limit Privileges


Privileges in this context, means the extent every user is allowed to go when using the school management software. Allowing every body to have access to every thing is like allowing every body access to all your domestic issues without filter. Wrong information in the wrong hand can do more damage than a full blown fire. Limiting privilege helps you to determine what any body is allowed to do while using the software. Limiting privileges protect your school and makes sure that sensitive information like term result are not compromised.

Comments

Popular posts from this blog

How to implement RESTful API Versioning in ASP.NET Web API 2 using IHttpRouteConstraint

The only thing constant in life is change, and that is proved everyday in our industry, API’s are cool to extend the functionality of your application and expose it to other developers. The cool thing about IT and software, it’s that things changes quite rapidly and so it’s the technology, hence technology can change and the needs of your organisation can change, hence in order to keep serving this evolving needs and keep been relevant, your api might need to change also. Small changes can be accommodated within the initial version, but changes that will risked breaking the existing code, will required the need for versioning.

Implementing a custom IHttpRouteConstraint

According to msdn, a IHttpRouteConstraint simply Represents a base class route constraint. What then is a route constraint? A route constraint simply gets or sets a dictionary of expressions that specify valid values for a URL parameter.

publicclassApiVersionRouteConstraint : IHttpRouteConstraint
  {

publicApiVersionRouteCo…

How to implement multi-tenancy with subdomains using Route Constraint in ASP.NET MVC

According to Wikipedia, The term "software multitenancy" refers to a software architecture in which a single instance of software runs on a server and serves multiple tenants. A tenant is a group of users who share a common access with specific privileges to the software instance. With a multitenant architecture, a software application is designed to provide every tenant a dedicated share of the instance - including its data, configuration, user management, tenant individual functionality and non-functional properties. Multitenancy contrasts with multi-instance architectures, where separate software instances operate on behalf of different tenants. By giving companies, access to a tenant through a subdomain of choice, will help to personalise the experience more and gives a sense of ownership to each tenant. This will go along way to bring consistency in there branding.
Implementing Route Constraint
You use route constraints to restrict the browser requests that match a partic…

Top 4 Ways To Stop Mass Assignment Attack in ASP.NET Core MVC

Mass assignment or over posting is an attack on websites that binds models to request. This is where active record pattern in a web application is abused to modify data items that the user should not normally be allowed to access such as password, granted permissions, or administrator status. Because the attack is use to set or alter values that the developers does not expect to be by the user.

Scenarios of Mass Assignment Attack

To demonstrate how mass attack work, take for instance a web application, that has many users with different level of privileges and roles on the website. Each user is restricted on some point on what and what not to do while on the website, with the admin as the only user that have absolute role to control and do all things in the website. With mass attack a user can simply take over the role of the admin in the website and start doing things that is outside his roles and privileges.

For Instance, Let say you have a model:

public class UserModel
{
public string U…