Do we have different types of Float?

Float is nothing but the bandwidth or buffer one has in the project schedule. There are lot of questions around float which troubles a project manager. Questions like, why do we need float? What are types of floats a project manager can have? Whenever any project manager starts its project, the first thing he works on is amount of total work he has to complete. Definitely when we know the total work, to manage and track it efficiently, one breaks it down in the form of activities. These activities are what a project manager uses to understand the dependencies and […]

Do we have different types of Float? Read More »

What is Scrum? Why we need it?

Before understanding Scrum, one need to be aware of What is Agile? Though Agility is well known term or jargon these days the basic fundamental of any Agile framework is based on iterative development and requirement evolution. Any framework can be agile as far as its in line with Agile manifesto, values and Agile principles. Scrum is one of them. Scrum in a very simple term is a framework to implement agility in a easy manner. Scrum word is taken from rugby where team is moving to the target together. Scrum is very famous these days for development due to

What is Scrum? Why we need it? Read More »

Web Application Security

Securing web applications in Java involves the very same core security concepts that are known to every InfoSec professional. These concepts and understanding the different authentication mechanisms for the ‘Web component developer’ exam forms the basis of this post. This post assumes knowledge of servlets, deployment descriptors and the servlet life cycle. The four security mechanisms: There are four basic security mechanisms that come into play when securing web applications. They are authentication, authorization, confidentiality and data integrity. Authentication is verifying who you really are. Specifying a name and password is one form of enforcing authentication. Authorization is giving individuals

Web Application Security Read More »

Data privacy in the age of the Apple vs FBI debate

With most of the technology world glued to the outcome of the tussle between Apple and FBI, “data privacy” again takes center stage in the age of social media. For almost a month now, the Apple vs FBI debate has kept us all guessing and taking sides on what is right and what is wrong. Our mobile world:               Smart phones, tablets and other mobile devices continue to grow in popularity and we store abundant amount of personal information in it. Chats, pictures, personal data, health data are all examples of some personal information stored on mobile devices. Seizing any

Data privacy in the age of the Apple vs FBI debate Read More »

Dimensional modeling

After having seen a few blog posts on security topics, we will turn our attention to ‘Data warehousing concepts’ and more specifically the modeling techniques in this post. This post assumes knowledge of basic databases like tables and fields. We have already seen the meaning of a Data warehouse, the reasons for creating a data warehouse and the components of a Data warehouse in earlier posts. Kimball approach to designing Data warehouses: Ralph Kimball preferred the bottom-up approach to designing data warehouses. Since the data warehouse is considered to be the union of all its data marts in the Kimball

Dimensional modeling Read More »

Whatsapp Security

The evolution of different technological tools to enhance communication is growing at a mind boggling pace. With the advent of the Internet in mid 90’s – we have seen messengers like Yahoo messenger, Windows Messenger and then we moved onto Google Talk, Skype, Viber and a number of social media tools like Facebook, Twitter, LinkedIn finally now we have ‘Whatsapp’.  All these and more have been born more on the necessity to communicate more effectively and in real time. The popularity of Whatsapp followed by its security limitations forms the basis of this post. Why is Whatsapp’s Popularity increasing? :

Whatsapp Security Read More »

Tech Skills for 2016

With the New Year under way most of us feel the need to rejuvenate ourselves with new skills in the tech industry. New aspirations, new career choices and the need to step up our career, motivates most of us. The skills that will likely to shape our career this year, is explored in this post. Programming languages like Java,C, C++, Python The concept of programming was a new one in the 90s, but not so now. It is more natural and normal for young teenagers to be in tune with the different programming languages and their importance. ‘Hackathons’ are organized

Tech Skills for 2016 Read More »

Knowledge Management

Given the disparate and often excessive sources of information in an organization, it might be imperative for us to wade through this information and produce perfect results upon inquiry. ‘Knowledge Management’ refers to gathering, organizing, refining and disseminating information within an organization. We will discuss the basics of ‘Knowledge management’, the different processes in ‘Knowledge management’ and ‘Oracle knowledge management (OKM) ’in this post. Introduction: Though the very concept of ‘Knowledge management’ existed from the 1990’s, integrating these systems into the business strategy and solving business issues is fairly new. Before we see how knowledge management works – let us

Knowledge Management Read More »

You Too Can Become A Web Designer- Learn How

People say a lot of things about web design. The most interesting thing is that very few people understand the dynamics of this art and the fact that it can be done by just about anyone. You do not have to be an engineer with expertise in software development in order to do web design. Anyone can do website design. All that you need is a clear understanding of the basics of web design. Within a surprisingly short time you will be on the way to creating your first website without having to pay a fortune in the process. Getting

You Too Can Become A Web Designer- Learn How Read More »

Business Continuity plans(BCP) and Chennai floods

In wake of the incessant rains in south India and the resultant flooding organizations had to put their ‘business continuity plans’ (BCP) into action. No sooner did the rains lash the relatively dry area did the city know of a new natural disaster that was getting unleashed. Coping with this new type of natural disaster required a BCP (business continuity plans) for most organizations in Chennai. What is BCP? ‘Business continuity’ may be an InfoSec professional’s domain of expertise but it was the need of the hour in Chennai. ‘Business continuity’ is planning to continue businesses at another location after disaster

Business Continuity plans(BCP) and Chennai floods Read More »

Scroll to Top