Managing Information And Managing Knowledge D 6:49:00 PM Add Comment Information and Knowledge are two interrelated concepts. Is it necessary that we try to get inside people’s heads to capture it? Informatio... Read More
Information Technology D 5:00:00 AM Add Comment We have seen so much about IT and all of us have been a part of it by some means or other. We all know what IT refers to and what are its a... Read More
Attributes of a Good System Analyst D 5:57:00 PM Add Comment A system analyst is a person who conducts a methodical study and evaluation of various aspects related to business to identify the desired ... Read More
Best Wire-framing Tools D 10:02:00 AM Add Comment One of the most sought tools for a web designer / UI expert / anyone who wants to mock up a user interface based IT system/software is a wi... Read More
Sample WBS (Work Break Down Structure) D 6:09:00 PM Add Comment Below is a sample work breakdown structure for an online attendance management system that I worked on in the past - Read More
Scope Change During a Project And its Impacts D 6:01:00 PM Add Comment Project background: Developer xyz was in the middle of a project that went several scope changes while in UAT. The project is about imple... Read More
Preparing WBS Using Mind Mapping Technique D 5:58:00 PM Add Comment I would prefer the mind mapping technique to arrive at WBS (work break down structure), due to my liking for problem solving by visualizat... Read More
Example Problem Resolution Scenario D 5:52:00 PM Add Comment Project description: Project for xyz that included development, maintenance and enhancements to the official web site and web-based int... Read More
Information Architecture and Web Site Concept D 5:15:00 PM Add Comment XYZ Company Web Site Concept Draft “Becoming industry’s premier outsourcing solution for managed care services” Overview For the pas... Read More
Cyberlaw Enforcement D 7:15:00 AM Add Comment I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations.... Read More
Phishing D 7:11:00 AM Add Comment Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me... Read More
Importance of Global Cyber Crime Policies D 7:07:00 AM Add Comment Cyber-Crime and its big brother - "Cyber-warfare", have so conquered the ever expanding and versatile cyberspace that we need to ... Read More
Data Mining and USA Patriot Act D 6:19:00 AM Add Comment I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as... Read More
Data Mining of Email Traffic Patterns D 6:08:00 AM Add Comment E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy a... Read More
Wiretapping of US Citizen Internet Usage D 6:04:00 AM Add Comment First of all, I don't think a search warrant is surely required in such a case as it is against Fourth Amendment. Now after 9/11, the i... Read More
Using Technology to Combat Terrorism D 5:58:00 AM Add Comment Here's a special report that analyzes how the Internet can facilitate terrorist operations - http://www.usip.org/pubs/specialreports/sr... Read More
Student's Free Speech Rights? D 5:51:00 AM Add Comment Children's legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech adv... Read More
Filtering Harmful Material in Chatrooms, Blogs and Social Networks D 5:11:00 AM Add Comment I don't think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social ne... Read More
Dealing With Legislation on Spyware D 5:07:00 AM Add Comment Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other... Read More
How to Avoid Spyware On The Computer? D 5:48:00 PM Add Comment Some tips will be - 1. Make a point that one would not visit web sites such as mass advertising web sites as they are usually infectious ... Read More