Elements Used in a Data Warehouse
Many Business Intelligence solutions are based on the use of a data warehouse. Here is a view of the components of a data warehouse both logically and physically. The data warehouse consists of several different elements: The source can come from legacy systems that are usually an operational system used … Continue reading →
Force Jenkins to connect to remote sites.
Problem: You created an awesome script on Linux that builds your application that will automatically upload to another server via sftp or ssh. You want to go a step further and have Jenkins run the same script. Every time Jenkins runs the script it fails. You Curse Jenkins/Hudson and start … Continue reading →
Open Source Software in Digital Forensics
The purpose of this research paper is to research information on open source digital forensic tools that are assess-able for free, usually online. To review types of digital forensic tools available and what they do. The basic definition of what open source and digital forensics is will be defined, and … Continue reading →
iTunes Restoring iPhone on Windows 10 | Error 4010
In order to restore my iPhone. For steps to fix error: “Unknown Error” 4010. None of the solutions worked. Except this. DON’T DOWNLOAD iTunes FROM THE MICROSOFT STORE. A step is skipped where you cannot accept the ULA. You are not even given the prompted to accept. Easiest way to tell … Continue reading →
Going Back to School
This post informs of academic progression at college and the steps necessary to start, graduate and move on to a better job. Price of College Increases Every Year Before you can take any classes you really have to decide if you are in it for the long haul. If … Continue reading →
Cyber Crime: Risk Assessment
Cyber Crime: A Clear and Present Danger This is the excel file used for this post –> Risk-Registry.xlsx Information systems give great ways to communicate and learn, but also allow nefarious others access to exploit the power of the Internet for terrorist and/or criminal purposes. Criminal warfare has moved to … Continue reading →
Qualitative risk assessment of RFID
Below is a short qualitative risk assessment of RFID (Radio Frequency Identification) I have pieced together. In order to highlight strengths, weaknesses and benefits. May it help you come to a conclusion on how would you deploy this technology while minimizing its risks? Category Risk Impact Probability Affects Customer QoS for … Continue reading →
Make sure you have committed to SCM before Production Build
Maven/BitBucket Validation for Production Code Deployment Introduction The justification for this document is to express a way to secure company code and create a possible company standardization for the WAR naming convention that is easily tracked back to a BitBucket commit that was used to deploy an interface to UAT … Continue reading →
Develope a Web Based CMS Using PHP
Download this File Here Abstract The Content Management System (CMS) is a web based application using a Linux Server, Apache Web-server, MySQL Database, and PHP Programming Language (LAMP). The objective of managing users, and information in any given network environment can only be hindered by the creativity of an information … Continue reading →
Sources of Data for Business intelligence
Raw data on its own is not very useful, it is just stacks of symbols, sounds, pictures, numbers or words. After data is collected the ability to connect the data, to give it relational meaning is when data becomes useful information. Information can answer questions of who, what, when and … Continue reading →