Quantcast
Channel: Business Management – Adam M. Erickson
Browsing all 28 articles
Browse latest View live

Ethics in Business Intelligence

Adam M. Erickson The type of ethics in business intelligence (BI) is the ethical principles of conduct that govern an individual in the workplace or a company in general. It is also known as...

View Article



Sources of Data for Business intelligence

Raw data on its own is not very useful, it is just stacks of symbols, sounds, pictures, numbers or words. After data is collected the ability to connect the data, to give it relational meaning is when...

View Article

Open Source Software in Digital Forensics

The purpose of this research paper is to research information on open source digital forensic tools that are assessable for free, usually online. To review types of digital forensic tools available and...

View Article

Critical Chain Safety

Safety is a necessary CYOA mentality that most project managers need projects can finish on time. Trying to balance time management with resources needed is what it is all about and can be summed up in...

View Article

Digital Forensics

               Reviewing the concept of anti-forensics, which can be described as being:  “…more than technology. It is an approach to criminal hacking that can be summed up like this: Make it hard for...

View Article


404 Webpage Fix for WordPress and Host Gator

If you are getting this error, use this fix but make sure to shut off any WP applications that may be causing it! Not to go into specific details cause it is a pain in the neck but certain applications...

View Article

Image may be NSFW.
Clik here to view.

Develope a Web Based CMS Using PHP

Download this File Here Abstract The Content Management System (CMS) is a web based application using a Linux Server, Apache Web-server, MySQL Database, and PHP Programming Language (LAMP). The...

View Article

Image may be NSFW.
Clik here to view.

Risk Management Planning

Risk Management Plan Risk Management Planning Risk management typically follows four stages in an iterative process. These are identification, assessment, planning and monitoring. They should be...

View Article


Image may be NSFW.
Clik here to view.

Going Back to School

      This post informs of academic progression at college and the steps necessary to start, graduate and move on to a better job.  Price of College Increases Every Year Before you can take any classes...

View Article


Image may be NSFW.
Clik here to view.

3 Reasons for BI

So you have been working with business intelligent tools for a while but when confronted by the COO on why you think they would be a good fit for your company you cannot figure out how to explain it to...

View Article

Image may be NSFW.
Clik here to view.

Model View Control

Introduction MVC Model View Control (MVC)  is a 3 level architecture that decouples the interface from navigation and application behavior, mostly because keeping the applications together creates a...

View Article

Risk Assessment of Cloud Computing

Below, I have  Performed a short qualitative risk assessment of cloud computing that may be used as guidance for any company thinking of moving to the cloud.  Showing some of the strengths, weaknesses...

View Article

Qualitative risk assessment of RFID

Below is a short qualitative risk assessment of RFID (Radio Frequency Identification) I have pieced together.  In order to highlight strengths, weaknesses and benefits. May it help you come to a...

View Article


Image may be NSFW.
Clik here to view.

Cyber Crime: Risk Assessment

Cyber Crime: A Clear and Present Danger This is the excel file used for this post –>   Risk-Registry.xlsx Information systems give great ways to communicate and learn, but also allow nefarious...

View Article

Image may be NSFW.
Clik here to view.

Java | Constructor vs. Method

If you are within your first year of application development in Java you may have asked yourself this question. I know I did. What is the difference? Here is a reference list that I have compiled for...

View Article


Image may be NSFW.
Clik here to view.

Force Jenkins to connect to remote sites.

Problem: You created an awesome script on Linux that builds your application that will automatically upload to another server via sftp or ssh. You want to go a step further and have Jenkins run the...

View Article

Image may be NSFW.
Clik here to view.

Expect – For more remote work, automation, & CI

If you ever have a situation were you want to run scripts automatically this will help. You can even time the events through cron or CI (continual integration) software like Hudson/Jenkins. Let me...

View Article


Image may be NSFW.
Clik here to view.

Linux: Grep Script to Search Multiple Directories

Audience that may find this useful will mostly be new Linux administrators. This is a Command Line Interface (CLI) Shell script that once set up using the directories you want to search.  All you will...

View Article

Image may be NSFW.
Clik here to view.

Elements Used in a Data Warehouse

Many Business Intelligence solutions are based on the use of a data warehouse. Here is a view of the components of a data warehouse both logically and physically.  The data warehouse consists of...

View Article

Image may be NSFW.
Clik here to view.

WordPress: Upload Blocked File Extensions Without a Plugin

This is not for a novice, you should have a little experience in PHP and know what the .htaccess file does. If you are new and want to edit these files make sure to create a backup file in case you...

View Article
Browsing all 28 articles
Browse latest View live




Latest Images