Force Jenkins to connect to remote sites.

Problem:

  1. You created an awesome script on Linux that builds your application that will automatically upload to another server via sftp or ssh.
  2. You want to go a step further and have Jenkins run the same script.
  3. Every time Jenkins runs the script it fails.
  4. You Curse Jenkins/Hudson and start pricing Atlassian tools instead.

One possible reasons could be because you have already accepted the RSA fingerprint.

The authenticity of host ‘216.64.211.4 (216.64.211.4)’ can’t be established.CLI Root
RSA key fingerprint is 2c:78:0d:08:b7:06:ac:1a:be:5f:9a:4e:37:06:8f:53.
Are you sure you want to continue connecting (yes/no)?

You cannot get through to a remote sight for upload using Jenkins because even with Jenkins using your credentials, Jenkins still needs to accept the RSA Fingerprint to proceed.

Answer:

You need to have sudo rights
There is a user switch in sudo that will allow you to ssh as jenkins.

$ sudo  -u jenkins username@server

Manually accept the RSA fingerprint key.
Now test the script in Jenkins again. It should work unless there are other rights and directory paths that you need to work out.

JenkinsRemember:

Jenkins is a user with his own user directory. My Jenkin’s user directory was /var/lib/jenkins/
If you want to have Jenkins run a script, make sure it is in Jenkins directory.

Don’t name any of your Jenkin Items with spaces.
The Items you create are made into a directory inside Jenkin’s ~/workspaces/item-name

I am not a Linux expert, I am not certified in Linux. I have been using Linux systems for over 10 years now and love coming up with solutions using Open Source Software.

Java | Constructor vs. Method

If you are within your first year of application development in Java you may have asked yourself this question. I know I did.

What is the difference?

Java

Here is a reference list that I have compiled for your convenience.

Download the excel file and build upon other comparisons you need to keep track of –>constructor-vsmethods.xlsx

Topic

Constructors

Methods

Purpose

Create an instance of a class – Object Initialization Grouped Java statements – Each performs a small unit or task

Modifiers

No – Cannot be abstract, final, native, static, or synchronized, already marked as final & static. Yes – Can be abstract, final, native, static, or synchronized

Has a Return type

No – not even void Yes – void or a valid return type

Naming Convention

Same name as the class, first letter is capitalized by convention) — usually a noun Any name except the class. Method names begin with a lowercase letter by convention — usually the name of an action

Inheritance

No – Constructors are not inherited Yes – Methods are inherited

Compiler automatically supplies a default constructor

If the class has no constructor, a no-argument constructor is automatically supplied Does not apply

Compiler automatically supplies a default call to the super-class constructor

If the constructor makes no zero-or-more argument calls to super, a no-argument call to super is made Does not apply

Can be Overloaded/Overwritten?

Yes Yes

Can be public, protected, private?

Yes Yes

Must be same name as Class?

Yes No, arbitrary

chained and they are called in a particular order

Yes No

Cyber Crime: Risk Assessment

Cyber Crime: A Clear and Present Danger

This is the excel file used for this post –>   Risk-Registry.xlsx

Information systems give great ways to communicate and learn, but also allow nefarious others access to exploit the power of the Internet for terrorist and/or criminal purposes. Criminal warfare has moved to the virtual world were more damage can be done in less time with a better potential of getting away with it. The term used for criminals that use the Internet as there method for committing crimes is know as cyber criminals. Moor’s Law describes how the number of transistors that can be placed on inexpensive integrated circuitry double every two years. Since a new generation of faster computers can be processed every two years, it also allows for criminals to afford faster, more complex computers to leverage against your organization

Analyzing and avoiding risk should be a part of any organization who, especially if transactions are made on the Net. Include\ing: email, web browsing, online stores, etc.

The rest of this article is an example of what may be used to start your own risk register.

Qualitative Risk Assessment

Threats that have been identified through the risk it holds to the organizations have been qualified in the attached risk register spreadsheet. Download the actual Excel File –>   Risk-Registry.xlsx

Risk RegisterWhile all risk poses a level of threat there are certain ones that can be identified as low medium or high risk based on the severity of risk against cost and time loss to our origination. Damage to reputation from faulty security is actually a side effect of not being able to protect our customer’s assets and personal information. Side by side comparison of the risk register with the risk matrix will give a better forecast of risk as it impacts our organization.

Quantitative Risk Matrix

Qualitative

On average credit scam counts for $260 dollars per customer per year and we can mitigate that price through the use of heuristic programs that can detect unusual purchases as they happen instead of reading reports after the fact.

While the risk of finances from cyber attacks can be measured after the fact the most damaging effects of cyber attacks is the lack of trust from our customers. Irreversible damage could be imposed upon are organization as customer retreat to companies that they believe can manage their finances better. The contingency budget set forth below would save us from going completely under in the future. The quantity of the budget needed is minimally estimated to be around 1% of what we risk loosing. We must be ready to budget at least 30% of our organizations earned income after taxes and deductions.

Contingency Budget

Contingency BudgetColors reflect the same qualitative selection as the risk Matrix and should be considered top priority when considering budgeting amounts. The contingency cost has been lowered based on the probability of the risks occurrence and is 65% of the total budget needed to address all risks.

 

Recommendations

When money is used it is gone, data is more valuable than money. Our data and systems are worth more than can be quantified in any report. Data can be reused over and over again. In order to protect our data we need to spend our budget targeting mitigation of the highest ranked risks. Targeting unknown risks through monitoring assets as they are accessed and having a fast corrective action time to save the organization from unknown intrusions. All internal and external metrical information that can help target cyber activities should be used to the up-most efficiently to be as effective as possible. Continually vigilance in our security reaction time, as we move towards future technologies to communicate and process information on the Internet, is imperative to our survival.

Additional Resources

Martin H. Bosworth. (2008). Losses From Cybercrime Nearly $240 Million in 2007. Consumer Affairs. Retrieved from: http://www.consumeraffairs.com/news04/2008/04/cybercrime.html

Tom Mochal. (2006, May). Creating a risk contingency budget using expected monetary value (EMV). TechRebulic. Retrieved July 24, 2011, from http://www.techrepublic.com/article/create-a-risk-contingency-budget-using-expected-monetary-value-emv/6069576

United States Department of Justice. Computer Crime & Intellectual Property Section. Cyberethics. Retrieved from: http://www.cybercrime.gov/cyberethics.htm

Qualitative risk assessment of RFID

Below is a short qualitative risk assessment of RFID (Radio Frequency Identification) I have pieced together.  In order to highlight strengths, weaknesses and benefits.

May it help you come to a conclusion on how would you deploy this technology while minimizing its risks?

Category Risk Impact Probability Affects
Customer QoS for customers declines because decrease in staff Medium Low Customers, Company rep.
Customer Customers may be dissatisfied with change Medium Medium Company rep, customers
Fraud Scale to RFID Fraud Low High inventory
Fraud Hackers making there own RFID tags High Low Revenue, company rep, emp trust
Inventory Management Mis-tagged or no RFID tag High Medium Inventory, revenue
Employees Adaptability Very High High Employee trust
Employees Lose or trust Medium Medium Employee loyalty
Employees strike Low Low Company rep, employee loyalty, revenue
Employees Productivity to meet new expectations Medium Low Inventory, company rep, customer loyalty
Pricing Lack or pricing from no supervision of ID creator Low Medium Revenue, company rep.
Pricing Inconsistencies Medium Medium revenue
Pricing Scanners not scanning all items Low Low Inventory, revenue
Inventory Management Mis-counts or stock and poor inventory control Medium Low Inventory control
Technical Issues RFID not functioning Very High Medium Data, company rep, employee trust, customer trust.
Technical Issues RFID limitations Medium Low data
Technical Issues Lack of knowledge for RFID or when system goes down High Medium Customer loyalty, company rep.
Technical Issues Designing Standards and processes Medium Medium Employee trust
Inventory Management RFID supplies not delivered on time Low High Inventory, customers, inventory
Inventory Management Lack of knowledge for RFID inventory processing Medium Low Employee, company rep.

 

Srength:

  • Become a leader through technology
  • Improve process flow
  • Customer satisfaction by adding value to customer services

Weaknesses:

  • Lack of technical support knowledge
  • RFID tagging on devices and produce
  • Major inventory fluctuations
  • Internal fraud
  • Damage to reputation of RFID is not effective

Benefits

  • Better real time data and additional data to make assumptions by
  • Possible opening to new market segments

Cost would be on schedule and worth the cost if all negative risks had a contingency plan. Costs can be fixed in the system and validated during pilot program to ensure cost consistency.

 

Reference:

Amber Russell, Curt Ireton, Damon Mulligan, Jan Bondoc, Tyler Rudolph. (November 2009). Risk Management Plan. RFID Implementation for Fresh Foods. Retrieved from http:// www.curtireton.com/Assets/Fresh_Foods_Risk.pdf

 

 

Risk Assessment of Cloud Computing

Below, I have  Performed a short qualitative risk assessment of cloud computing that may be used as guidance for any company thinking of moving to the cloud.  Showing some of the strengths, weaknesses and benefits?

Risks

Risk Description Probability Impact Risk Affects
Lock-in Difficult to migrate from one service provide to the next. High Medium Company Rep., Data, Service
Loss of Governance Loss of some control  to CP and unknown roles Very High Very High Company rep, data, customers trust, service
Compliance Challenged Compliance with regulations and certifications Very High High Certifications, fines
Business Rep Loss Poor Service harms business during transition. Low High Company rep, service,  data
Cloud service Terminated Poor provider, lack of understandable terms N/A Very High Rep, trust, emp loyaty, service
Provider Acquisition Mergers and buy-outs of CP N/A Medium Rep, customer trust, emp exp, intellectual property, data, service
Supply chain Failure Lack of supplier redundancy Low Medium Company rep, customer trust, data, services
Technical Risk Over/under provisioning Medium Medium Access control, company rep
Malicious Insider Abuse of high privileges Medium Very High Company rep. data, employee and customer trust
Intercept Data in transit Weak encryption, vulnerabilities in cloud Medium High Company rep. data, intellectual property
Insecure/Ineffective deletion of data Proper sanitization or data Medium Very High Sensitive data, personal data
DDoS Distributed Denial of Service Attack Medium High Cloud Interface, Network, Customers, Company rep, service
Data Protection Staorage in multiple locations High High Company rep, data, service
Not part of CP Network Breaks Medium Medium Service
Social Engineering Lack of security & awareness Medium High Intellectual property, data, emp & customer trust, reputation.
Natural Disasters Lack or recovery plan Very Low High Back-ups, all of the above

 

Strengths & Benefits:

  • Security measures are cheaper when implemented on a large scale.
  • Data is replicated in multiple areas – increasing redundancy and independence from failure.
  • Local network problems are less likely to have global side effects.
  • Larger scale systems can develop more effective incident response capabilities.
  • Threat management is increased since the larger corporations that own the cloud can afford the generalists to deal with specific security threats that smaller companies cannot.
  • Reduces cost of running personal servers
  • Access to better technology

Weakness and Costs:

  • External CP will depend on network bandwidth
  • Integration of variety of software, integration can be very costly
  • Different configuration panel controls, learning curve for IT department
  • Configuring mixed modes between physical, virtual & cloud
  • Reports on performance could be hidden
  • May not integrate with current management controls

Reference:

Alex Gutman and Martin Perlin. (February 2011) 8 Cloud Building Conditions You Need for Taking your Data Center to the Next Level. www.evolven.com. Retrieved from: http://www.evolven.com/blog/8-cloud-building-conditions-you-need-for-taking-your-data-center-to-the-next-level.html

Daniele Catteddu, Giles Hogben. (n.d. Cloud Computing Risk Assessment — ENISA. Retrieved from http://www.enisa.europa.eu/act/rm/files/…/cloud-computing-risk-assessment

Naushad K. Cherrayil. (October 7, 2011). Cloud computing is the future of networking retrieved from http://gulfnews.com/business/technology/cloud-computing-is-the-future-of-networking-1.886905

Model View Control

Introduction

MVC

MVC

Model View Control (MVC)  is a 3 level architecture that decouples the interface from navigation and application behavior, mostly because keeping the applications together creates a huge mess when it is time to redesign you program. MVC patterns will simplify implementation and greatly enhance re-usability. It should always be used in O.O.P. (object oriented programming)

Model

The term Model stands for Data Module Objects, it holds all the application state information (ie data) and all operations that can modify the data.

A model is a computational approximation or abstraction of real world process, entity, or system. An example is the shopping cart when you order an item on-line using e-commerce. It would hold the information of the order number, what is being ordered, the quantity being ordered, and all the code that could interact with this data usually in SQL code. It is also called business logic and provides the connections to the data source as well as to the controller.

View

The view contains the interface functions, it is the GUI code. It will produce all the visual components of your program. It provides the access to the data and processing logic to the user.

It needs to allow the user enough functionality to provide the user with the tools the program is being developed for.

The view is tied into the Data model, if you delete an item from a shopping cart it will be removed immediate or upon a page refresh usually from an Event Object handler that contains the change and then updates the cart to show a page in HTML with the previously deleted item gone.

For an inexpensive home server try a Linux server with Apache Web-server, a MySQL database and PHP coding. All the software can be installed for free.

Controller

As its name implies, the controller component controls the overall flow. The controller code interacts with the view and model components to deliver a modular yet integrated solution.

It is the Controller that accepts input from the user in a particular modality, interprets that input (the interpretation may depend on the View), and invokes the appropriate operation on the Model.

For example, when the Controller detects a mouse click event on the “remove” button of an item it invokes the remove operation on that item. Any state changes that this operation causes on the

Model are sent by the Model to the registered Views via events. The controller component is normally written in Java and implemented as a Servlet.

 MVC usage rules

In order to support reusability, the interactions which do occur should be well defined and the dependencies between the elements (M-V-C) should be minimized. One of the goals of the MVC pattern is to enable the combination of a single Model with multiple Views and Controllers. The MVC pattern ensures that the Views are kept synchronized. When the Controller recognizes a valid command from the user’s input, it invokes the corresponding method on the Model. The

Model verifies that the operation is compatible with its current state, executes it and changes the state of the Views correspondingly. The views, as they have registered themselves as observers, get now informed about the Model’s state change and update their rendering correspondingly.

 The dependencies must be kept minimal

To support multiple views and controllers the dependencies must be kept minimal.

 Note: A is said to be dependent on B when the code of A embeds knowledge about B.

This leads to the following rules:

  1.  The Model does not have any dependency on Views or Controllers.
  2.   A View depends on its associated Model. It has to know the structure of the Model’s state to be able to render it.
  3.   A View does not have a dependency on Controllers. Therefore several different Controllers can be associated with the same View.
  4.  A Controller depends on its associated Model and View. The Model defines the operations the Controller can invoke and the View defines the context in which the Controller interprets the user input. This makes the Controller tightly coupled to the View.

 The interactions must be kept minimal

Another precondition to support multiple Views and Controllers is to keep interactions minimal.

In particular a Controller must never directly affect the rendering of its associated View. Instead user input must make a complete round trip through the Model before its effects become visible in the View. This rule guarantees that a state change updates all Views and that the Views remain synchronized. Often implementations with a single Controller violate this rule because of sloppy

thinking: “I already know that this state change will occur, and therefore do not need wait for the Model to tell me about it”. This is wrong for two reasons:

1. The Model can veto the operation for some reason. The operation will not occur.

2. Other Controllers may concurrently invoke operations on the Model. Some other operation can slip in between, which fundamentally changes the rendering and makes any assumptions about it invalid.

In addition it is impossible to extend such shortcut implementations later with additional Controllers.

 The MVC pattern in Web applications

Although the MVC pattern was originally devised for the organization of fat client GUI libraries, it has in the past several years received widespread acceptance as a suitable architectural pattern for implementing Web based solutions, too. Its structure has been applied, (with limitations), in recent Web applications. This is not surprising, since in both cases the separation of concerns is the driving force behind architectural choices.

 Extending the MVC pattern to distributed applications

Although the MVC pattern was originally devised for GUIs running on a single machine, it can be extended relatively straightforward to distributed systems, where some interfaces between Model, View and Controller may cross the network. The placement of the Model, the View and the Controller then becomes a crucial issue.

The client-centric approach puts all three functions: Model, View and Controller on each client device. The Model, which exists conceptually only in one instance, is “replicated” among the devices. A replication protocol keeps the copies of the Model synchronized.

The server-centric approach puts both Controller and Model on a server. The client devices contain only the Views.

 Why you should MVC

  • Separation of data from presentation

Drawbacks on MVC

  • Is not easy and requires planning
  • Thorough testing and more files needed
  • May overkill small applications

3 Reasons for BI

So you have been working with business intelligent tools for a while but when confronted by the COO on why you think they would be a good fit for your company you cannot figure out how to explain it to him/her.Here I have posted and describe three arguments you may use to persuade a business of the general value that Business Intelligence offers to most companies.

 1. Make faster decisions

BPMS LifecycleBI helps make better quality informative decisions at a faster rate than was done in the past.  It is not just for the IT staff, it is used by managers, executives, and consumers. One of the finalized reports in BI is the dashboard that allows for instantaneous perception of enterprise, departments and individuals performance, by bringing key metrics in a nice-looking and instinctive graphic interface. The best portion of a well advanced dashboard is the capability to drill down to underlying reports and apprehend what factors are contributing to good and bad performance. Another basic feature about dashboards is they permit you to effortlessly and constantly observe for exceptions, and alerts operators when to take action.

2. Report on the Now not the past

market BIWhile most reports can show you what has happened in the past, BI analytics can alert you to what is happening now and send out an alert. BI can also extrapolate possible future outcomes as well and all from a central location so that there is no relying on several different user reports from spreadsheets. The consistency of views is offered between all users because if the automatic data inputs. Because most of BI is automated, the accuracy of the data is also easier to trust. It is imperative for a corporation’s success to have detailed analysis of a corporation’s customers, business environment, stakeholders, business processes, competitors and several other sources of potential valuable information.

2. Future Insight

Bi dashboard exampleBI can offer future insight with predictive tools  so besides just viewing past and present information, you can also get a feel for what may happen in the future. Forecasting possible outcomes also gives  users the ability to be proactive.  Data mining allows analytics to be run on information that may have hidden patterns. Through simulations and collecting seemingly unrelated data, information can be revealed on what be approaching.

Conclusion

With BI you can increase employee productivity,  by empowering  employees with up-to-date reports that will help business decision making capabilities. Your business processes can be easily manage corporate wide from one spot. Relationships with business customers increase as well as the ability to increase market share, the companies IT department can reduce resources which reduces costs and helps deliver a more flexible department for developing and deployment of future cycles. The best way, in my own opinion, would be to provide several case examples from several different organizational implementations, from large scale to small, depending on what business you are trying to convince. If you are dealing with someone more tech savvy, then instead of just using dollars and cents, you could move on to actual business models that can help realize a business strategy.

Going Back to School

      This post informs of academic progression at college and the steps necessary to start, graduate and move on to a better job.

 Price of College Increases Every Year

Before you can take any classes you really have to decide if you are in it for the long haul. If you can’t afford the high rates of tuition plus unexpected charges, you should look into applying for financial aid, scholarships, and loans.

Technology has increased several folds since the 90’s, so has the way a college can educate its students. Because of the availability of alternative classes available to students that already have careers and/or families and are finding it easier to finish colleges.

In preparing this report I have spoken with financial counselors, academic counselors, and other students on what needs to be done in order to achieve your degree of choice as easy as possible. I already hold three associate degrees in Networking, Programming and Computer Applications, a bachelors in Computer Science and a Masters in Information Systems Management. I worked full time through all of these degrees, while raising 4 children.

 What Do You want to be doing 5-10 Years after College

 better jobsBefore you start taking classes you need to get a better understanding of what you like. Many people enter into fields of study just to change later on. There are several places online and at college campuses that will help guide you on the best career choice for you. Once you now what you want to do you can use that career choice to decide what type of education and diploma is necessary to pursue your future goals.

 The best place to start is always at the beginning. Before going back to college you should now what you want to do after college. Don’t chase dollar signs, it is best of you have a calling, a true desire to be in the field you choose and then pursuing a degree that will support this decision. Wither you have past experience or not.

 Extended Learning

 libraryThe nationwide availability of college programs gives busy working adults the opportunity to stay current in there chosen field and gives the additional education needed to advance in their career.

Available classes range from professional certificates to associate, bachelors, masters and doctoral degrees. Classes are offered in a variety of formats including evening and weekend classroom instruction, interactive television, mixed classroom instruction and online delivery as well as completely online instructions.

Were to get Help

https://bigfuture.collegeboard.org/college-search

The above address offers a list of classes by cities, selecting a city at or near your location will link to a page that will display programs available in that area. Make sure to call the student service office to verify if the program you are interested in is going to be available in the future. While pursuing a BS in Computer Information Systems (which is no longer available in my hometown), there was not a high demand and the satellite classes were moved to the closes major city area and I ended up having to drive 50 miles one way to class at night 2-3 times each week to complete my degree (WORTH IT).

Before you register you might want to know how close the nearest satellite campus is were you want to take classes and what they offer.

College counselors are usually available at least once a semester to help plan a course schedule. Find out when and make sure to schedule an appointment in advance.

 Preparing Your Finances

pile of moneyThere are numerous financial aid programs for students who need financial assistance. Programs are offered under federal, state, and institutions. Most people in middle class homes or lower income usually meet most requirements. Federal loans are also offered to supplement income or tuition while going to college.

I believe that you have to gamble a little in life and I rather bet on myself than a two dollar lottery ticket. That is why I have applied for the federal subsidized

loans to help pay for expenses while I go to college. I believe that I will be able to acquire a better paying career faster with a BS or masters than without.

As of July 2007 the total cost to take full time classes each semester plus expenses costs $8,893.00 and is expected to rise another 7% for the tuition each year. A lot of this expense can be minimized by living at home and finding books online. Still a lot of money no matter who you are but there is ways to work around some of the price that I will presenting.

 Applying for Financial Aid

 College prices are increasing at more that twice the rate of inflation for more than 20 years, the ability of many students and their families to pay for higher education is becoming national concern. Student financial services are becoming more critical in the college financial problem.

In order to be considered for financial aid you must first be admitted to a college. Make sure that you have completed your tax return and have a copy of it nearby. Then go to www.fafsa.ed.gov to apply for financial aid. It is necessary to do this as soon as possible since it could take at least 4 weeks to be approved and be contact by the college of your chose. There are also several reference guides that deal with merit, scholarships and other funding at most local and community college libraries.

Remember that you’ll need to fill out a new FAFSA before March 1st of each year. By meeting the priority deadline of March 1st, you can receive the maximum financial aid package you qualify for. If you don’t meet the priority deadline you may receive a lesser amount than you expect. Also if you want to check your financial aid status and see if there are any holds you can go online at most colleges and check.

Look for related links:

  1. student services
  2. student records
  3. student financial aid

 Student Loans

Another way to go is with federal loans, depending on what type of loan you apply for it could be have little no interest rate. Some don’t even charge interest until after you graduate. If you are considering applying for government backed loans, you will have to take loan entrance counseling and fill out a promissory note.

 Scholarships

There are several scholarships offered that vary by academic, financial need and community status. Most scholarships are awarded after summiting a summary on why you are requesting the scholarship.

Planning for Classes Well In Advance

 Not all classes are available at the same time or fit in with your schedule. The good news is that there are several night, weekend, and online classes that are design to fit all types of schedules. There are several guides and personnel that can help you develop a schedule of courses that fit to your schedule. Most classes can be taken at the nearest community college at a third the price of a 4 year college.

 When going back to college or attending for the first time as an alternative student you have to realize that it is an important lifestyle decision and that it will be stressful on you and your family.

family silouette In fact your ability to succeed depends a lot on how well your family co-operates, and is willing to be supportive and patient while you are away & studying. Make sure to thank them and appreciate what they are doing for you whenever possible.

Building your class schedule can be completed completely online using tools available at most colleges, even community colleges. Once you have a student number you will be able to access these sites. Always remember that taking these classes is a high priority. Failure in one class can affect you whole degree since graduating depends on your GPA not to mention the lack of available tuition assistance if your GPA falls.

 Registration

 I have tried desperately to find online when class registration begins and have failed each time. I can tell you on average class registration starts 4-5 months before the first day of class and that you should speak with a college representative around that time because they may be able to give you an exact date and help you register.

 Developing a Course Schedule

 

doctoral

As I previously mention advisers are usually available at each regional site every semester. Call you regional office to find out when your adviser will be visiting and to schedule an appointment. Talking with an adviser can save you a lot of time and money when planning on how to take your classes. It is not easy to know when classes will be available on-line and you usually need an academic adviser to admit you into the class you want to take. Pursuing my Masters, the student adviser was main person I talked to until I had to create me final thesis.

It is important not to overdue you first semester if you are a returning student. Maybe take one class for a semester and if it seems easy than take 2 or 3 the next semester. An important step when taking these classes is to talk t0

students who have taking the class before. They will be able to tell you if it was hard or easy and what the instructor expects.

 Finding Time for Everything

hard workingIf you are an alternative student it is usually because you have a family that you just can’t leave and go back to college full time. Going back to school as an alternative student is not just stressful for you but to your family to.

Keep your significant other informed, let her know as much as possible about what your learning and why it is important to there future. Remind that person that you would not be able to go to college at all if it wasn’t for there help with the kids. Make sure that if you have children that you let them in on what you are doing also. I let my family know that I was doing this to better not just my life but theirs also. Homework and classes on top of working 40+ hours a week and any other activities is really stressful but you have to make time for your family also. Try to finish your homework during the week even if you don’t get to watch your favorite TV show it is more important to have your Saturdays a little open to enjoy with friends and family so you don’t get burned out.

If you don’t think you will be able to finish an assignment on time you could talk to an instructor about getting an extension. Most college instructors realize that you have a job and are working harder than the regular student and want to help you find ways to achieve your degree. Even if this doesn’t sound like fun I have used some of my vacation days just to finish large assignments before they were do,

your not a teenager anymore you just can’t pull an all-nighter, doing so could jeopardize your job when you fall asleep at work.

Prepare for Post-College

 Congratulations on Graduating but you still need to find a job. Start by building a resume, finding a job, and preparing for that first professional interview.

2013 pay and unemployement

I added a graph to help motivate you a little more on getting your chosen degree. It shows the average  income levels & nu-employement based on education. The survey was done by the National Bureau of Labor and Statistics and published in 2013.

Education compared to Annual Income

 Creating a Resume

 A polished resume is crucial after graduating. Employers usually prefer a short to the point 1 page resume that contains all the pertinent personal information. Try to cut out the least important information to make it fit to one page. If you don’t have much work experience in your graduate field make sure to include your college degree at the beginning of your resume.

There are several places online that will help build your resume and even critique it for you. Check with you local community college also, there is usually a job placement counselor who is available and can be very useful. Check with the MyFSU student services tab online to find more information on job placement and resume building after graduation.

 Finding a Career

job search Most career searches are done online. Some of the best places to look online are:

Make sure to tell all your family and friends that you have graduated and looking for a new job. Some of the best positions near you will be found through social networking. You might of heard the expression “It doesn’t matter what you know, It’s who you know that matters.”

 Conclusion

I was offered several ways to achieve academic success which lead to professional success and a better life. I hope that I have made it a little easier to understand some of the steps in order to achieve success.

There are also several contact and extra information that are readably available on-line that you can pursue at you own leisure.

I do not believe that college is the only way, some very intelligent and not so have made it just by following their dreams.

A lot of positions require a higher degree of education…but not all.

 Works Cited

 Cassidy, Daniel J. The Scholarship Book 12th Edition. New York: Prentice Hall Press, July 2006

“Education and Income”. National Bureau of Labor and Statistics. 2002: 1-2

Gottesman, Greg. College Survival. New York: Prentice Hall, 1992

Osborne, AJ. Part-time clerical worker, Student Service Office for Extended Learning, Room 107. 20 April 2007

“University Center for Extended Learning: Ferris State University.” Ferris.edu, 07 July 2007, <http://www.ferris.edu/ucel/index>

Upcraft, Lee; Gardner, John; Barefoot, Betsy. Challenging and Supporting the First Year Student. California: Jossey-Bass, 2005

Risk Management Planning

Risk Management Plan

Risk Management Planning

Risk management typically follows four stages in an iterative process. These are identification, assessment, planning and monitoring. They should be followed at project start-up and then monitored in response to change, completion of project stages. One of the main reasons why risk-management activities fail to deliver as well as they should is because they get treated as a one-time exercise. Once the full heat of the project battle is underway, plans and contingencies get left to gather dust on the shelf. This is a sad waste; the initial assessment will have helped identify where the project is most at risk and will have helped focus attention on how to mitigate these risks (or accept them). However, the lack of monitoring allows new risks to emerge, or old ones to grow more serious, without anyone actually noticing. It then comes as a surprise that the roof has fallen in on the project.

indentify risk

The above picture demonstrates the dimensions of where risk comes into play when dealing with project risk management that must be dealt with.

Identification of Risk

Identification is the first step. Ideally, it involves asking anyone and everyone (within reason) to identify any risks they consider might apply to the project, a checklist may be involved like the one on the next page.

Question/comment Yes/no
Has a complete risk identification/assessment/planning exercise been conducted?
Is there an ‘owner’ for this process?
If not, have all the areas of risk been considered? As below:

Commercial?

Technical?

People?

Politics?

Process?

Change?

For all the risks identified, is there a realistic assessment of impact and probability?
Have these risks been ranked (prioritized) according to impact and probability

Identifying and classifying risk.

probability of occurrence

Risk Analysis

Once risk has been identified they can then be rated according to severity and probability. Normally, this is done on the basis of low, medium or high for both categories as seen in the above diagram.

We try to base on ranking the risks according to combined impact and probability. The first filter employed would be to eliminate all the very low risks. These need only be considered if their ranking changes in the future, it is not a good thing to to simply file and forget risks. The ranking process can then be applied to give increasingly higher profiles to high-impact/probability risks. During this assessment process, we could associate/review ranking numbers with the impact on budget and time. This can then be used to keep a track of how risks evolve with time as a result of project progress, risk reduction and contingency plans, plus events in the outside world.

 Risk Response

Following on logically, once the nature of the risk has been fully assessed, the next step is to develop a plan for dealing with each risk. These typically include: ignore it, take mitigating action to reduce the chance of it happening or minimize the impact, and have a contingency plan in case it actually comes to pass.

These are the four main solutions to risk for when they can potentially occur:

1. Avoidance

Includes not performing an activity that could carry risk. An example would be not buying a property or business in order to not take on the liability that comes with it. Another would be not flying in order to not take the risk that the airplane were to be hijacked. Avoidance may seem the answer to all risks, but avoiding risks also means losing out on the potential gain that accepting (retaining) the risk may have allowed. Not entering a business to avoid the risk of loss also avoids the possibility of earning profits.

2. Reduction

Involves methods that reduce the severity of the loss or the likelihood of the loss from occurring. Examples include sprinklers designed to put out a fire to reduce the risk of loss by fire. This method may cause a greater loss by water damage and therefore may not be suitable. Halon fire suppression systems may mitigate that risk, but the cost may be prohibitive as a strategy.

3.   Retention

Involves accepting the loss when it occurs. Risk retention is a viable strategy for small risks where the cost of insuring against the risk would be greater over time than the total losses sustained. All risks that are not avoided or transferred are retained by default. This includes risks that are so large or catastrophic that they either cannot be insured against or the premiums would be infeasible. This may also be acceptable if the chance of a very large loss is small or if the cost to insure for greater coverage amounts is so great it would hinder the goals of the organization too much.

4. Transfer

Means causing another party to accept the risk, typically by contract or by hedging. Insurance is one type of risk transfer that uses contracts. Other times it may involve contract language that transfers a risk to another party without the payment of an insurance premium. Liability among construction or other contractors is very often transferred this way. On the other hand, taking offsetting positions in derivatives is typically how firms use hedging to financially manage risk.

 The risk identification, assessment and planning stages need to be re-evaluated when things change. This can either be done by having regularly timed reviews (with the overhead that you might have reviews when you don’t need them). Alternatively, risk reviews can be implemented whenever there is a request for a change, however trivial, or by setting criteria that determine the extent of the reviews according to the extent of the change.

Risk Monitoring and Control

The monitoring process will be to systematically tracks and evaluate the effectiveness of risk handling actions against established metrics. Monitoring results may also provide a basis for developing additional risk handling options and approaches, or updating existing risk handling approaches, and reanalyzing known risks. In some cases monitoring results may also be used to identify new risks and revise some aspects of risk planning. The key to the risk monitoring process is to establish a cost, performance, and schedule management indicator system over the program that the program manager and other key personnel use to evaluate the status of the program. The indicator system should be designed to provide early warning of potential problems to allow management actions. Risk monitoring is not a problem-solving technique, but rather, a proactive technique to obtain objective information on the progress to date in reducing risks to acceptable levels.

“Best practices” acknowledges that all of the traps have not been identified for each risk issue. The traps are intended to be suggestive, and other potential issues should be examined as they arise. It is also important to recognize that sources and types of risk evolve over time. Risks may take a long time to mature into problems. Attention must be properly focused to examine risks and lessons learned.

Lessons learned should be documented so that future project managers can learn from past mistakes.

From past companies, and education, I have developed  risk management plans. That included risk management planning, identification of risk, risk analysis, risk response (including avoidance reduction transfer and retention), and risk monitoring and control.

As I find time, I will post more information.

WORKS CITED

Andersen, Erling S.; Grude, Kristoffer V.; Haug, Tor.; Katagiri, Mike.; Turner, J. Rodney
Goal Directed Project Management: Effective Techniques and Strategies
3Rd Ed. / Edited By Mike Katagiri, Rodney Turner. : London ; Sterling, VA : Kogan Page, 2004.

Ben-David and T. Raz An Integrated Approach for Risk Response Development in Project Planning; The Journal of the Operational Research Society, Vol. 52, No. 1 (Jan., 2001), pp. 14-25

Kerzner, Harold; Project Management: A Systems Approach to Planning, Scheduling, and Controlling : New York John Wiley & Sons, Inc. (US), 2001.

Nickson, David.; Siddons, Suzy;Project Disasters & How to Survive Them;: London ; Sterling, VA : Kogan Page, 2005.

Smith, Nigel J.; Managing Risk in Construction Projects : Oxford ; Malden, Mass. Blackwell Science, 1999.

[/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]

Develope a Web Based CMS Using PHP

Download this File Here

Abstract
The Content Management System (CMS) is a web based application using a Linux Server,
Apache Web-server, MySQL Database, and PHP Programming Language (LAMP). The
objective of managing users, and information in any given network environment can only be
hindered by the creativity of an information technology professional and not by technology. The
main objective of this thesis is to develop the early development steps of a LAMP software bundleCMS. By creating the
building blocks for developing, and taking into consideration basic methods for creating the core
platform of a CMS for further development. All information gathered, and experience gained will
assist with developing and offering my own personal e-commerce business solutions in the future
and to obtain additional business and practical knowledge in an open source software and ecommerce.
Continue reading