Mugo Web main content.

Monitor Global Outlook

Mugo partner since 2010

This Business Intelligence website features a paywall, caching of content for logged in users, a responsive design, enterprise login features, Salesforce and Marketo integrations, and more.

Monitor Global Outlook helps clients better anticipate new opportunities, manage risk and prevent loss in Emerging and Frontier Markets. It is the Business Intelligence unit of The Christian Science Monitor.

Monitor Global Outlook frontpage

Subscribers to Monitor Global Outlook get access to in-depth reporting from 18 local offices throughout the developing world's fastest-growing regions. Mugo Web built features for personalization, multi-device support, editorial tools, and more. The site is built on top of the eZ Publish content management system.


Mugo started working with Monitor Global Outlook after we outgrew our first website and content management system. With a combination of solid tech development skills and excellent communication, the Mugo team rescued us from frequent website outages to put us on a stable foundation for growth.


We then worked together to implement a redesign, meeting fast-turnaround deadlines. I particularly appreciate their ability to propose creative, realistic solutions to our challenges and their eagerness to talk through ways to optimize the product development process.

Their team is truly part of the MGO team at this point.

- Ben Arnoldy, Product Manager, Monitor Global Outlook

User experience

Search filtering, saved searches, and e-mail alerts

Logged in users can browse site content by region and sector. Content is featured as Briefings, Specialist Q&As, and Strategic Outlooks.

There is also a rich set of search filters. Searches can be saved and shared. Searches can also be marked for alerts -- when new content is posted that matches the search criteria, the system will send out an e-mail alert.

Monitor Global Outlook saved searches

Paywall

A select number of articles are freely viewable. The rest are behind a subscription paywall. For marketing purposes, Monitor Global Outlook staff can generate time-limited URLs to share full articles with prospective customers.

Monitor Global Outlook staff can also create trial user accounts so that prospective users can get a good idea of all of the site benefits. All of the site features can be customized so that, for example, a staff member can create personalized content update e-mails tailored to a trial user's interests. Trial accounts automatically expire according to a configurable amount of time or a specific date, and the system automatically sends reminder and expiry e-mails at the appropriate times.

Enterprise login features

Enterprise customers have access to enhanced login features. They can create and manage sub-accounts under a single account; configure logins by IP address ranges; and configure logins by referring URLs.

Responsive design

The website has a responsive design, enabling users to view the site on any device.

Monitor Global Outlook responsive design

Editorial features

Salesforce, Marketo, and Google Analytics integrations

To support sales and marketing efforts, the Monitor Global Outlook website is integrated with both Salesforce and Marketo. Using Salesforce, lead statuses are tracked and customer information is synced between the website and Salesforce. The integration with Marketo includes the management of various subscriptions and a custom feed manager for populating newsletters.

Using Google Analytics, Monitor Global Outlook can track individual user behavior in order to better optimize the site experience.

Editorial workflow

Articles go through a custom editorial workflow. This enables authors, editors, and media editors to work together at different times and different locations to prepare articles to be published.

Monitor Global Outlook workflow

Tag management

To support the front-end user features, editors manage a powerful taxonomy tree for regions, sectors, companies, and classifications.

Landing page management

Editors have full control over landing pages, and can either pick specific articles to be featured in sliders and other page blocks, or configure the blocks to automatically update based on the new content by tag.

Technical implementation

Varnish cache for logged in users

We create different variations of pages within Varnish's cache in order to deliver a high performing, dynamic site.

Data import

Content for the Monitor Global Outlook website was originally managed in WordPress. Mugo re-used its existing data import tools to create an automated migration of content from WordPress to eZ Publish. During the migration period, we set up a login bridge between eZ Publish and WordPress so that user credentials could be validated against the WordPress database.

Read more

a gear labeled CMS surrounded by an array of cleaning tools

Cleaning up unused CSS and JS files from WordPress pages

WordPress can be a great option for easy website development, but because of the rapid evolution of the CMS, it can lead to inefficient code and slow loading pages. We'll show you how to clean up unused CSS and JS from pages to improve site-wide performance. 

LEARN MORE
illustration of a reCAPTCHA screen, withe question marks in place of text, and robots obscuring the photos for identification.

Making Google reCAPTCHA v2 play nice with browser form validation

CAPTCHA is an essential need on online forms, but to be blunt, the UX sucks. Without the implementation tips (helpfully detailed below), Google’s otherwise reliable reCAPTCHA service implemented “as-is” doesn’t actually provide any browser validation. The user will have to wait for it to make a time-consuming round trip to the server. It’s a problem for anyone and becomes compounded for users with accessibility needs.

LEARN MORE
a woman in a wheelchair using a computer superimposed over different digital windows

Creating accessible links to help users discover your site’s content treasures

Links are among a website's most valuable components. They connect (that’s what the word “link” means, after all) different pages and resources, helping site visitors find the content they are looking for. Well-planned and formatted links are like a detailed, intuitive treasure map that sends visitors to the right destination.

Links are also critical for making your website accessible to visitors with visual or other impairments. A link that lacks important information can prevent some visitors from accessing all the treasures a website holds. Or even worse, it can send users to completely undesirable content and discourage them from exploring all your site has to offer.

In this post, I’ll discuss how to present links in various contexts, clearly explaining how they can create and inform powerful relationships between different pages and assets.

LEARN MORE
Stylized representation of a server connected to the web, beside an overflowing piggy bank

AWS EC2 is cost-effective – with a little planning and smart management

Amazon Web Services (AWS) EC2 has the reputation of being a pricey option for cloud-based hosting and compute resources. Certainly, that was our initial impression here at Mugo Web years ago when we began standardizing our hosting and site management business on a single cloud platform.

However, we quickly discovered that AWS is actually quite affordable. In fact, our monthly costs for a virtual machine using 8GB of RAM, at 100% usage, is predictably lower with AWS than with other virtualized or traditional data centers. That’s without aggressively tuning our resource usage, which is often the focus of how to optimize AWS pricing.

In this post, I’ll show you how AWS can be a cost-effective option for professionally managed websites. I’ll also take a quick look at some of the additional savings tactics you can employ to get more value from your decision to run on AWS.

LEARN MORE
a gold key inside a gear, surrounded by circuitry

Convenience + security: best practices for AWS access key management

In this blog post I am going to talk about several security best practices, particularly for configuring AWS Access Keys. Some of these practices are based on a project that we inherited which was compromised by hackers. Best practices are often learned from mistakes; and when the mistakes are someone else's, so much the better!

LEARN MORE