Software Engineering then and now
Software Engineering is and will be the backbone and driving force behind the technological advancements that we enjoy and that will lead us to greater...
Attributes of a Good System Analyst
A system analyst is a person who conducts a methodical study and evaluation of various aspects related to business to identify the desired objectives and...
Best Wire-framing / Prototyping tools
One of the most sought tools for a web designer / UI expert / anyone who wants to mock up a user interface based IT...
Treating product requirements – The ideal way
Product requirements need to be treated with suspicion as if they really needed for the essential capability for a product release. Always prioritize product requirements...
Sample WBS (Work Break Down Structure)
Below is a sample work breakdown structure for an online attendance management system that I worked on in the past –...
Project Scope Change And its Impacts
Project background: Developer xyz was in the middle of a project that went several scope changes while in UAT. The project is about implementing capability...
Mind Mapping Technique to Prepare WBS
I would prefer the mind mapping technique to arrive at WBS (work break down structure), due to my liking for problem solving by visualization and...
Sample Project Management Problem Resolution
Project description: Project for xyz that included development, maintenance and enhancements to the official web site and web-based intranet applications that supported integrated work flows...
Information Architecture for a web site – Sample Web site Concept Draft
XYZ Company Web Site Concept Draft “Becoming industry’s premier outsourcing solution for managed care services” Overview For the past decade, xyz.coom (fictitious) has been the major online...
Re-baselining of IT projects – Factors that makes it difficult and some recommendations
Before addressing the question, it would be beneficial if we understand what baselining and re-baselining is. Baselining is the common project management method where we...
Is there a conflict between the support of individual rights and the use of e-government for transformational purposes? Why or why not?
Based on my reflection on E-Governance reference materials and experience, I am concluding that e-government initiatives cannot be truly transformational unless the socio-political environment is...
True Transformation – Is it ever possible in E-Government setup?
This is an interesting and very scholastic topic to share and discuss. The basic question being raised is – Are e-government initiatives capable to bring...
What measures need to be taken to make sure that offshore outsourcing does not adversely affect American jobs?
Offshore outsourcing is a highly debated topic. It would be nice if we reflect on the reasons that has lead to offshore outsourcing – 1....
Where should cyberlaw enforcement be centered?
I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this...
How Pervasive is Phishing?
Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing...
Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?
Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and...
USA Patriot Act and Data mining
I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other...
What limitations should be imposed on datamining of email traffic patterns?
E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy and result oriented when...
Should wiretapping of US citizen internet usage require a warrant?
First of all, I don’t think a search warrant is surely required in such a case as it is against Fourth Amendment. Now after 9/11,...
Will intelligence add-ons to the internet make it easier for hackers to penetrate the internet for criminal purposes?
Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...
Using Technology to combat terrorrism?
Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...
Can federal legislation prohibit certain types of computer usage in schools without violating students’ free speech rights?
Children’s legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech advocates out...
Can filtering protect children from harmful material in chatrooms, blogs, and social networks?
I don’t think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social networking and blogs. There should be...
Should legislation focus just on spyware, on undesireable practices (with spyware being just one example), or should legislation focus on protecting privacy and security of personal information?
Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other way to...
What non-regulatory practices can users follow to reduce the incidence of spyware on their computers?
Some tips will be – 1. Make a point that one would not visit web sites such as mass advertising web sites as they are...
A revolutionary supposition – Advice for improved Education system
The educational system should revise the curriculum according to the current technology demands in the society and to build creativity of students. I think the...
Is there a more effective strategy for helping developing countries increase the computer and information literacy of their children?
Intel’s Maloney’s words – “It’s about the Web more than anything. I have young kids …….. doesn’t have access to the Web is overwhelming” –...
Should funding be available for social impacts research when it is not likely to lead to new innovations?
I think we should encourage funding on social impact research as it would lead us to explore and find answers to long disputed or rather...
Impact of Software Patents on Innovation in the Software Industry
This article is a good resource for those who want to know more about the most raised question – What is the impact of software patents...
Need for Legal and Technological Protection Mechanisms
This article is a good resource for those who want to know more about the most raised question – Is there a need for legal and...
How can the intellectual property community protect their intellectual property without the DMCA safeguards?
This article is a good resource for those who want to know more about the most raised question – How can the intellectual property community...
Should the prohibition in the Digital Millennium Copyright Act against breaking intellectual property safeguards be modified?
This article is a good resource for those who want to know more about the most raised question – Should the prohibition in the Digital...
Does making documents accessible over the web eliminate the need for printing documents?
The core idea of this article is to comtemplate on a most commonly discussed topic – Does making documents accessible over the web eliminate the...
M-Commerce? How could your company take liverage out of it?
Its my pleasure to introduce you to the emerging world of m-commerce and how your company can take a competitive edge by harnessing this technology...
Basic differences between managing information and managing knowledge? Is it necessary that we try to “get inside people’s heads” to capture it?
Information and Knowledge are two interrelated concepts. Information is processed data that has the capacity to give form or shape to a matter or to...
What is IT?
We have seen so much about IT and all of us have been a part of it by some means or other. We all know...