3 Reasons for BI
So you have been working with business intelligent tools for a while but when confronted by the COO on why you think they would be a good fit for your company you cannot figure out how to explain it to him/her.Here I have posted and describe three arguments you may use … Continue reading →
Model View Control
Introduction Model View Control (MVC) is a 3 level architecture that decouples the interface from navigation and application behavior, mostly because keeping the applications together creates a huge mess when it is time to redesign you program. MVC patterns will simplify implementation and greatly enhance re-usability. It should always be … Continue reading →
Sources of Data for Business intelligence
Raw data on its own is not very useful, it is just stacks of symbols, sounds, pictures, numbers or words. After data is collected the ability to connect the data, to give it relational meaning is when data becomes useful information. Information can answer questions of who, what, when and … Continue reading →
Risk Assessment of Cloud Computing
Below, I have Performed a short qualitative risk assessment of cloud computing that may be used as guidance for any company thinking of moving to the cloud. Showing some of the strengths, weaknesses and benefits? Risks Risk Description Probability Impact Risk Affects Lock-in Difficult to migrate from one service provide to the … Continue reading →
Run Fortify from Maven
Installing Fortify SCM Maven Plugin sca-maven-plugin supports Maven 3.0.5, 3.5.x And 3.6.x Installing This document is only viable if you already have Fortify installed for running with the Scan Wizard and Audit workbench. From: C:\Program Files\Fortify\Fortify_SCA_and_Apps_20.1.0\plugins\maven or wherever you installed Fortify Copy: maven-plugin-src.zip (poor success with the binary zip, choose … Continue reading →
Develope a Web Based CMS Using PHP
Download this File Here Abstract The Content Management System (CMS) is a web based application using a Linux Server, Apache Web-server, MySQL Database, and PHP Programming Language (LAMP). The objective of managing users, and information in any given network environment can only be hindered by the creativity of an information … Continue reading →
Cyber Crime: Risk Assessment
Cyber Crime: A Clear and Present Danger This is the excel file used for this post –> Risk-Registry.xlsx Information systems give great ways to communicate and learn, but also allow nefarious others access to exploit the power of the Internet for terrorist and/or criminal purposes. Criminal warfare has moved to … Continue reading →
Open Source Software in Digital Forensics
The purpose of this research paper is to research information on open source digital forensic tools that are assess-able for free, usually online. To review types of digital forensic tools available and what they do. The basic definition of what open source and digital forensics is will be defined, and … Continue reading →
Ethics in Business Intelligence
The type of ethics in business intelligence (BI) is the ethical principles of conduct that govern an individual in the workplace or a company in general. It is also known as professional ethics and not to be confused with other forms of philosophical ethics including religious conviction, or popular conviction. … Continue reading →
Geographic Systems in Business
Geographic Information System (GIS) started out as just a proprietary system that used its own standards into a position of using technology standards and technology-based standards to be accepted by the IT community as another form of information technology that could help manage business. It has become one of the … Continue reading →