Ethics in Business Intelligence
Adam M. Erickson The type of ethics in business intelligence (BI) is the ethical principles of conduct that govern an individual in the workplace or a company in general. It is also known as...
View ArticleSources of Data for Business intelligence
Raw data on its own is not very useful, it is just stacks of symbols, sounds, pictures, numbers or words. After data is collected the ability to connect the data, to give it relational meaning is when...
View ArticleOpen Source Software in Digital Forensics
The purpose of this research paper is to research information on open source digital forensic tools that are assessable for free, usually online. To review types of digital forensic tools available and...
View ArticleCritical Chain Safety
Safety is a necessary CYOA mentality that most project managers need projects can finish on time. Trying to balance time management with resources needed is what it is all about and can be summed up in...
View ArticleDigital Forensics
Reviewing the concept of anti-forensics, which can be described as being: “…more than technology. It is an approach to criminal hacking that can be summed up like this: Make it hard for...
View Article404 Webpage Fix for WordPress and Host Gator
If you are getting this error, use this fix but make sure to shut off any WP applications that may be causing it! Not to go into specific details cause it is a pain in the neck but certain applications...
View ArticleDevelope a Web Based CMS Using PHP
Download this File Here Abstract The Content Management System (CMS) is a web based application using a Linux Server, Apache Web-server, MySQL Database, and PHP Programming Language (LAMP). The...
View ArticleRisk Management Planning
Risk Management Plan Risk Management Planning Risk management typically follows four stages in an iterative process. These are identification, assessment, planning and monitoring. They should be...
View ArticleGoing Back to School
This post informs of academic progression at college and the steps necessary to start, graduate and move on to a better job. Price of College Increases Every Year Before you can take any classes...
View Article3 Reasons for BI
So you have been working with business intelligent tools for a while but when confronted by the COO on why you think they would be a good fit for your company you cannot figure out how to explain it to...
View ArticleModel View Control
Introduction MVC Model View Control (MVC) is a 3 level architecture that decouples the interface from navigation and application behavior, mostly because keeping the applications together creates a...
View ArticleRisk Assessment of Cloud Computing
Below, I have Performed a short qualitative risk assessment of cloud computing that may be used as guidance for any company thinking of moving to the cloud. Showing some of the strengths, weaknesses...
View ArticleQualitative risk assessment of RFID
Below is a short qualitative risk assessment of RFID (Radio Frequency Identification) I have pieced together. In order to highlight strengths, weaknesses and benefits. May it help you come to a...
View ArticleCyber Crime: Risk Assessment
Cyber Crime: A Clear and Present Danger This is the excel file used for this post –> Risk-Registry.xlsx Information systems give great ways to communicate and learn, but also allow nefarious...
View ArticleJava | Constructor vs. Method
If you are within your first year of application development in Java you may have asked yourself this question. I know I did. What is the difference? Here is a reference list that I have compiled for...
View ArticleForce Jenkins to connect to remote sites.
Problem: You created an awesome script on Linux that builds your application that will automatically upload to another server via sftp or ssh. You want to go a step further and have Jenkins run the...
View ArticleExpect – For more remote work, automation, & CI
If you ever have a situation were you want to run scripts automatically this will help. You can even time the events through cron or CI (continual integration) software like Hudson/Jenkins. Let me...
View ArticleLinux: Grep Script to Search Multiple Directories
Audience that may find this useful will mostly be new Linux administrators. This is a Command Line Interface (CLI) Shell script that once set up using the directories you want to search. All you will...
View ArticleElements Used in a Data Warehouse
Many Business Intelligence solutions are based on the use of a data warehouse. Here is a view of the components of a data warehouse both logically and physically. The data warehouse consists of...
View ArticleWordPress: Upload Blocked File Extensions Without a Plugin
This is not for a novice, you should have a little experience in PHP and know what the .htaccess file does. If you are new and want to edit these files make sure to create a backup file in case you...
View Article
More Pages to Explore .....