Ethics in Business Intelligence
The type of ethics in business intelligence (BI) is the ethical principles of conduct that govern an individual in the workplace or a company in general. It is also known as professional ethics and not to be confused with other forms of philosophical ethics including religious conviction, or popular conviction. … Continue reading →
Enhance VIM
While VI has been used for years, in current Linus & iOS systems a lot of people have resorted to using Vim. There are a lot of tricks to Vim that can make it easier to use. Some may not be active by default and I wanted a chance to … Continue reading →
rsnapshot: Auto Version Controlled Backup for Unix/Linux/Mac/BSD…
Red Had Enterprise Linux (RHEL) 6. I missed the ease of configuration and all the free tools that people smarter than me have created. I would like to do a fast post on rsnapshot. I have seen ssh and rsnapshot scheduled in cron to automate backups of OSX to a … Continue reading →
Critical Chain Safety
Safety is a necessary CYOA mentality that most project managers need projects can finish on time. Trying to balance time management with resources needed is what it is all about and can be summed up in 3 steps; planning, execution, and monitoring. 1. Planning: Two durations are entered for each … Continue reading →
Java | Constructor vs. Method
If you are within your first year of application development in Java you may have asked yourself this question. I know I did. What is the difference? Here is a reference list that I have compiled for your convenience. Download the excel file and build upon other comparisons you need … Continue reading →
Sources of Data for Business intelligence
Raw data on its own is not very useful, it is just stacks of symbols, sounds, pictures, numbers or words. After data is collected the ability to connect the data, to give it relational meaning is when data becomes useful information. Information can answer questions of who, what, when and … Continue reading →
Run Fortify from Maven
Installing Fortify SCM Maven Plugin sca-maven-plugin supports Maven 3.0.5, 3.5.x And 3.6.x Installing This document is only viable if you already have Fortify installed for running with the Scan Wizard and Audit workbench. From: C:\Program Files\Fortify\Fortify_SCA_and_Apps_20.1.0\plugins\maven or wherever you installed Fortify Copy: maven-plugin-src.zip (poor success with the binary zip, choose … Continue reading →
Model View Control
Introduction Model View Control (MVC) is a 3 level architecture that decouples the interface from navigation and application behavior, mostly because keeping the applications together creates a huge mess when it is time to redesign you program. MVC patterns will simplify implementation and greatly enhance re-usability. It should always be … Continue reading →
iTunes Restoring iPhone on Windows 10 | Error 4010
In order to restore my iPhone. For steps to fix error: “Unknown Error” 4010. None of the solutions worked. Except this. DON’T DOWNLOAD iTunes FROM THE MICROSOFT STORE. A step is skipped where you cannot accept the ULA. You are not even given the prompted to accept. Easiest way to tell … Continue reading →
Open Source Software in Digital Forensics
The purpose of this research paper is to research information on open source digital forensic tools that are assess-able for free, usually online. To review types of digital forensic tools available and what they do. The basic definition of what open source and digital forensics is will be defined, and … Continue reading →