How to stop bulk spam emails to my mail account?
If you are not one of the people who have had the bad experience of having your email account being subjected to a bulk spam...
Using Code First first
Traditional ways of software development focus on DB-first implementation methodology. But we are in the realm of latest developments and ORM models has taken us...
Preferred Multithreading in C# ASP.NET
Parallel execution has been one of the core techniques of programming languages that enables and stabilizes the heavy orchestrated flow of information across information management...
Software Project Size
Software Project Size is of great importance since it determines the level of management controls and the types of tools and technologies required for a...
Software Engineering then and now
Software Engineering is and will be the backbone and driving force behind the technological advancements that we enjoy and that will lead us to greater...
A Typical IT Backup Policy and Backup procedure
Lets see how back up policy was important for a typical IT company and how did it implement the same. Background: As we progress in...
Sample PL/SQL script for cleaning a detail table referring a master table
Have you ever had a need to write a PL/SQL snippet to clean a table. If you are in need, here is one below –...
Sample Perl program for cleaning database on a routine basis
Here is a samlpe Perl Program that gives you an outline on how to deal with cleaning DB on a routine basis (ofcourse scheudled via...
Attributes of a Good System Analyst
A system analyst is a person who conducts a methodical study and evaluation of various aspects related to business to identify the desired objectives and...
System Life Cycle – Classical definition
A system is a set of interacting elements that responds to inputs producing outputs. The events which together make up the development, operation and maintenance of...
Product Vision – Rule of Thumb – Simplicity
One would think that the a product’s success is directly proportional to the amount of complexity that it offers. In other words, majority of people...
Agile / Scrum methodology – Explained simple
Agile software development methodology is suitable for time-boxed iterative system development scenarios. The software product is released as various versions or releases, typically in time-boxes...
Numerical solution by method of Iteration
Solving x = 1/ (1+x)1/2 using iteration method – Iteration is a method of solving algebraic or transcendental equation and is widely used in computer...
Events and States
Events and States are differentiated below – Events States Anything that happen in time Shows the attributes values of object at a particular point in...
Actors and Data Stores
Actors: Actors are objects represented in the functional model that produce or consume data. An actor may store some data for further processing steps. Data...
State Diagram – Car
The state diagram may be drawn by considering the concurrency property of the aggregate objects that make up the car object ie. each aggregate object...
Object Diagrams with Multiple Inheritance
Below is an example of implementation of multiple inheritance – The Class ‘Universal’ inherits from two classes A/ and D/C, thus exhibiting multiple inheritance. Mutiple...
Abstraction
Abstraction may be defined as all those essential characteristics features of an object class which makes it different from other object classes. Abstraction as applied...
Multiplicity
Multiplicity refers to the number of object class instances of one class may be associated to the other class. An n+ symbol indicates that there...
Inheritance
Inheritance is the most basic feature of any Object Oriented programming language. It refers to the derivation of sub classes from a base/super class. The...
Reengineering Principles
The standard Reengineering principles are as follows – 1. Organize work around its end results, not tasks According to this principle, it is optimal to...
Why Companies Do Reengineering?
Companies are doing reengineering since they want to remain stable in the dynamic business environment while facing changing strategies, financial crisis due to weak /...
Creating Process based Organizations via Reengineering
While reengineering a business enterprise, we create a process based organization structure for the enterprise to avoid the inefficiencies and time wasting business process cycles...
Basic approaches to Reengineering
The three basic approaches to reengineering are as follows – 1. STREAMLIING 2. INTEGRATING 3. TRANSFORMING 1. Streamlining – Streamlining approach to reengineering the business...
Importance of formal project planning
One of the projects that I executed for one of my employers was an internal employee goal tracking system. The system enables employees from CEO...
Gotchas When a Technical Person is Promoted to Management Position
Scenario: Nicek is a senior technical leader and got a recent promotion as Project Manager, but was not given appropriate training in PM process. Below...
Sample WBS (Work Break Down Structure)
Below is a sample work breakdown structure for an online attendance management system that I worked on in the past –...
Project Scope Change And its Impacts
Project background: Developer xyz was in the middle of a project that went several scope changes while in UAT. The project is about implementing capability...
Mind Mapping Technique to Prepare WBS
I would prefer the mind mapping technique to arrive at WBS (work break down structure), due to my liking for problem solving by visualization and...
Sample Project Management Problem Resolution
Project description: Project for xyz that included development, maintenance and enhancements to the official web site and web-based intranet applications that supported integrated work flows...
Sample PM Day to Day Work
Project Management skill is very important in information management area. Let me paint a historical (early 2000) projet lead role where I was responsible for managing the...
Information Architecture for a web site – Sample Web site Concept Draft
XYZ Company Web Site Concept Draft “Becoming industry’s premier outsourcing solution for managed care services” Overview For the past decade, xyz.coom (fictitious) has been the major online...
Strategic alignment of IT resources – A case study in Grocery industry (Part 2)
Strategic alignment of IT resources – A case study in Grocery industry (Part 2) Japan UK Spain US Effect of economic situation The...
Strategic alignment of IT resources – A case study in Grocery industry (Part 1)
Strategic Alignment of IT Resources Grocery Industry Kathleen Chan, Deepesh Joseph, Raymond Jones, Paul Walleck Introduction To investigate how and why grocery companies are aligning...
Definition of E-Governance
The e-Government Act defines “electronic Government’ as “the use by the Government of web-based Internet applications and other information technologies, combined with processes that implement...
Reason for Federal Agencies to be Pro-Active
OMB is now in action mode without clear instructions and expectations. IT project failures and its increased concern has taken OMB to a point where...
Re-baselining of IT projects – Factors that makes it difficult and some recommendations
Before addressing the question, it would be beneficial if we understand what baselining and re-baselining is. Baselining is the common project management method where we...
Where are federal IT initiatives heading – Success or Failure – Lessons learned
GAO Cost Estimating and Assessment Guide is very extensive and gives us clear details of federal IT initiatives. The guide, together with OMB circular and...
Ideals of Openness, transparency Vs confidentaility, secrecy
There is great effect of privacy / individual rights on true e-Government implementations. As always, the core goals of e-Governance initiatives are to bring about...
Is there a conflict between the support of individual rights and the use of e-government for transformational purposes? Why or why not?
Based on my reflection on E-Governance reference materials and experience, I am concluding that e-government initiatives cannot be truly transformational unless the socio-political environment is...
E-Government Transformation in Maharashtra, India
The scalar transformation of e-government implementation models in the state of Maharashtra, India, took place exactly as West pictures as billboard, partial service delivery and...
True Transformation – Is it ever possible in E-Government setup?
This is an interesting and very scholastic topic to share and discuss. The basic question being raised is – Are e-government initiatives capable to bring...
Would Blogging in a Government Office be Appropriate? Why or why not?
Blogging has its relevance in supporting electronic government only if it is accepted within that localized setup and is strictly monitored and controlled by the...
Establishing the capability for employees of a local or national government to blog about their work life and access their Facebook accounts during work hours constitute Electronic government?
This clearly does not constitute electronic government in US and most of the world’s government context. The focus of electronic government is to use technology...
Will Rohr’s Secular Writings About Government Change In The Present?
If Rohr would have written his book in the present year, it would have a clear shift from the focus on defining what a perfect...
Effect of State of Technology Available on Open Government Authors
This reading materials as listed in the Bibliography, sets the stage for deeply analyzing the origins of the most long lasting government setup of the...
What measures need to be taken to make sure that offshore outsourcing does not adversely affect American jobs?
Offshore outsourcing is a highly debated topic. It would be nice if we reflect on the reasons that has lead to offshore outsourcing – 1....
Where should cyberlaw enforcement be centered?
I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this...
How Pervasive is Phishing?
Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing...
Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?
Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and...
USA Patriot Act and Data mining
I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other...
What limitations should be imposed on datamining of email traffic patterns?
E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy and result oriented when...
Should wiretapping of US citizen internet usage require a warrant?
First of all, I don’t think a search warrant is surely required in such a case as it is against Fourth Amendment. Now after 9/11,...
Will intelligence add-ons to the internet make it easier for hackers to penetrate the internet for criminal purposes?
Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...
Using Technology to combat terrorrism?
Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...
Can federal legislation prohibit certain types of computer usage in schools without violating students’ free speech rights?
Children’s legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech advocates out...
Can filtering protect children from harmful material in chatrooms, blogs, and social networks?
I don’t think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social networking and blogs. There should be...
Should legislation focus just on spyware, on undesireable practices (with spyware being just one example), or should legislation focus on protecting privacy and security of personal information?
Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other way to...
Should spyware be allowed for digital rights management, as exemplified by Sony and Microsoft practices?
Not at all. Firstly there is no relation between the terminology (Spyware) and what the DRM is intended to do. Something which is Spyware is...
Should parents, employers, and government be allowed to use spyware to monitor for bad behavior?
Interesting topic isn’t it! Usage of Spyware by itself should be made illegal in any case, as it invades privacy. Should a software is used for...