Expect – For more remote work, automation, & CI

If you ever have a situation were you want to run scripts automatically this will help. You can even time the events through cron or CI (continual integration) software like Hudson/Jenkins. Let me introduce you to a new command I was not aware of until this year. It is called … Continue reading

Force Jenkins to connect to remote sites.

Problem: You created an awesome script on Linux that builds your application that will automatically upload to another server via sftp or ssh. You want to go a step further and have Jenkins run the same script. Every time Jenkins runs the script it fails. You Curse Jenkins/Hudson and start … Continue reading

Java | Constructor vs. Method

If you are within your first year of application development in Java you may have asked yourself this question. I know I did. What is the difference? Here is a reference list that I have compiled for your convenience. Download the excel file and build upon other comparisons you need … Continue reading

Cyber Crime: Risk Assessment

Cyber Crime: A Clear and Present Danger This is the excel file used for this post –>   Risk-Registry.xlsx Information systems give great ways to communicate and learn, but also allow nefarious others access to exploit the power of the Internet for terrorist and/or criminal purposes. Criminal warfare has moved to … Continue reading

Qualitative risk assessment of RFID

Below is a short qualitative risk assessment of RFID (Radio Frequency Identification) I have pieced together.  In order to highlight strengths, weaknesses and benefits. May it help you come to a conclusion on how would you deploy this technology while minimizing its risks? Category Risk Impact Probability Affects Customer QoS for … Continue reading

Risk Assessment of Cloud Computing

Below, I have  Performed a short qualitative risk assessment of cloud computing that may be used as guidance for any company thinking of moving to the cloud.  Showing some of the strengths, weaknesses and benefits? Risks Risk Description Probability Impact Risk Affects Lock-in Difficult to migrate from one service provide to the … Continue reading

Model View Control

Introduction Model View Control (MVC)  is a 3 level architecture that decouples the interface from navigation and application behavior, mostly because keeping the applications together creates a huge mess when it is time to redesign you program. MVC patterns will simplify implementation and greatly enhance re-usability. It should always be … Continue reading

3 Reasons for BI

So you have been working with business intelligent tools for a while but when confronted by the COO on why you think they would be a good fit for your company you cannot figure out how to explain it to him/her.Here I have posted and describe three arguments you may use … Continue reading

Going Back to School

      This post informs of academic progression at college and the steps necessary to start, graduate and move on to a better job.  Price of College Increases Every Year Before you can take any classes you really have to decide if you are in it for the long haul. If … Continue reading

Ethics in Business Intelligence

The type of ethics in business intelligence (BI) is the ethical principles of conduct that govern an individual in the workplace or a company in general. It is also known as professional ethics and not to be confused with other forms of philosophical ethics including religious conviction, or popular conviction. … Continue reading


Who I am, what I've done, past, present, future.