We need to come up with a plan of attack that addresses the following concerns:
-Technologies to be used
-Timeline
-Source of information/cleaning up information
-requirements for web hosting
-issues we might run into using information that we do not own
We need to come up with a plan of attack that addresses the following concerns:
-Technologies to be used -Timeline -Source of information/cleaning up information -requirements for web hosting -issues we might run into using information that we do not own