Qualitative risk assessment of RFID
Below is a short qualitative risk assessment of RFID (Radio Frequency Identification) I have pieced together. In order to highlight strengths, weaknesses and benefits. May it help you come to a conclusion on how would you deploy this technology while minimizing its risks? Category Risk Impact Probability Affects Customer QoS for … Continue reading →
Show All PO Lines in PO Pack List for SAP Business One Crystal Reports
It is so hard to find useful information for SAP. I hope this helps. I created this document in SAP Business One 9.2 and Crystal Reports 2011. Database Expert If you think you can find a good relationship between ORDR, RDR1 and RDR10…good luck. I needed to create a command … Continue reading →
Cyber Crime: Risk Assessment
Cyber Crime: A Clear and Present Danger This is the excel file used for this post –> Risk-Registry.xlsx Information systems give great ways to communicate and learn, but also allow nefarious others access to exploit the power of the Internet for terrorist and/or criminal purposes. Criminal warfare has moved to … Continue reading →
Sources of Data for Business intelligence
Raw data on its own is not very useful, it is just stacks of symbols, sounds, pictures, numbers or words. After data is collected the ability to connect the data, to give it relational meaning is when data becomes useful information. Information can answer questions of who, what, when and … Continue reading →
Linux: Compiz Grid Plugin
After working on a few projects in windows, I finally moved my primary workstation back to Linux (RHEL 6.6). Out of the box everything worked fine, only one thing was missing, the ability to place a window were I needed it. In Windows 7 you can drag a full screen … Continue reading →
Elements Used in a Data Warehouse
Many Business Intelligence solutions are based on the use of a data warehouse. Here is a view of the components of a data warehouse both logically and physically. The data warehouse consists of several different elements: The source can come from legacy systems that are usually an operational system used … Continue reading →
Expect – For more remote work, automation, & CI
If you ever have a situation were you want to run scripts automatically this will help. You can even time the events through cron or CI (continual integration) software like Hudson/Jenkins. Let me introduce you to a new command I was not aware of until this year. It is called … Continue reading →
rsnapshot: Auto Version Controlled Backup for Unix/Linux/Mac/BSD…
Red Had Enterprise Linux (RHEL) 6. I missed the ease of configuration and all the free tools that people smarter than me have created. I would like to do a fast post on rsnapshot. I have seen ssh and rsnapshot scheduled in cron to automate backups of OSX to a … Continue reading →
Risk Management Planning
Risk Management Plan Risk Management Planning Risk management typically follows four stages in an iterative process. These are identification, assessment, planning and monitoring. They should be followed at project start-up and then monitored in response to change, completion of project stages. One of the main reasons why risk-management activities fail … Continue reading →
Make sure you have committed to SCM before Production Build
Maven/BitBucket Validation for Production Code Deployment Introduction The justification for this document is to express a way to secure company code and create a possible company standardization for the WAR naming convention that is easily tracked back to a BitBucket commit that was used to deploy an interface to UAT … Continue reading →