Ethics in Business Intelligence

The type of ethics in business intelligence (BI) is the ethical principles of conduct that govern an individual in the workplace or a company in general. It is also known as professional ethics and not to be confused with other forms of philosophical ethics including religious conviction, or popular conviction. … Continue reading

Risk Management Planning

Risk Management Plan Risk Management Planning Risk management typically follows four stages in an iterative process. These are identification, assessment, planning and monitoring. They should be followed at project start-up and then monitored in response to change, completion of project stages. One of the main reasons why risk-management activities fail … Continue reading

Develope a Web Based CMS Using PHP

Download this File Here Abstract The Content Management System (CMS) is a web based application using a Linux Server, Apache Web-server, MySQL Database, and PHP Programming Language (LAMP). The objective of managing users, and information in any given network environment can only be hindered by the creativity of an information … Continue reading

Enhance VIM

While VI has been used for years, in current Linus & iOS systems a lot of people have resorted to using Vim. There are a lot of tricks to Vim that can make it easier to use. Some may not be active by default and I wanted a chance to … Continue reading

Digital Forensics

               Reviewing the concept of anti-forensics, which can be described as being:  “…more than technology. It is an approach to criminal hacking that can be summed up like this: Make it hard for them to find you and impossible for them to prove they found you” (Berinato, 2007).  The … Continue reading

Critical Chain Safety

Safety is a necessary CYOA mentality that most project managers need projects can finish on time. Trying to balance time management with resources needed is what it is all about and can be summed up in 3 steps; planning, execution, and monitoring. 1. Planning: Two durations are entered for each … Continue reading

Open Source Software in Digital Forensics

The purpose of this research paper is to research information on open source digital forensic tools that are assess-able for free, usually online. To review types of digital forensic tools available and what they do. The basic definition of what open source and digital forensics is will be defined, and … Continue reading

Geographic Systems in Business

Geographic Information System (GIS) started out as just a proprietary system that used its own standards into a position of using technology standards and technology-based standards to be accepted by the IT community as another form of information technology that could help manage business. It has become one of the … Continue reading

Sources of Data for Business intelligence

Raw data on its own is not very useful, it is just stacks of symbols, sounds, pictures, numbers or words. After data is collected the ability to connect the data, to give it relational meaning is when data becomes useful information. Information can answer questions of who, what, when and … Continue reading

Tagged