Banner

How Project Schedule activities are related?

Project scheduling is a constant activity for a Project Manager. There are multiple challenges a project managers face when it comes to making sure the timelines are met and the project is going as per schedule or project schedule is able to absorb the challenges. It’s very important to understand for a project manager how different activities are related to each other. Without which any adoption or control of project schedule will be near to impossible. Relationships in a network diagram are defined depending upon the type of project and project needs/constraints. From PMP® prospective, there are four types of […]

How Project Schedule activities are related? Read More »

Two Factor Authentication

We have already read about ‘authentication’ and its role in security domains and software technologies.  Defining authentication yet again, ‘Authentication’ is specifying who you are to access protected resources. We will elaborate this concept to discuss 2FA or ‘Two factor authentication’ in this blog post. Why 2FA? Before we see what is meant by 2FA, let us see the reasons behind implementing 2FA. Data breaches are not new but the magnanimity of the breaches is growing each year. In 2014 alone, more than 1 billion personal records were accessed illegally. (zdnet.com)The ‘Anthem’ data breach, the IRS data breach are the

Two Factor Authentication Read More »

What is Kanban?

In today’s Agile world where waterfall becomes complete, not for many customers, Kanban is a very common term. Many of us assume from the word itself that it’s a board which is managed to work in agile environment. Though it’s not wrong to say Kanban is a board or informational card, there are more bites to it. This concept has been publicized by Toyota by introducing and implementing successful Just in Time concepts. Just In Time concept emphasizes on no/minimal inventories, which did wonders when implemented across organizations in terms of cost savings. As it’s clear from JIT concept, Kanban

What is Kanban? Read More »

How Lead and Lag helps in Scheduling?

Lead and Lag are two closely related terms which are commonly used in project scheduling and planning. Project Manager, while working on the schedule and activities of its project, has to closely put these two in place. These are the concepts used to derive the relationships among different activities of the project. Lead denotes acceleration of the following activity or we can say that following activity in full some or partially will start in parallel to first activity. In PMBOK® also lead is described as the amount of time whereby a successor activity can be advanced with respect to a

How Lead and Lag helps in Scheduling? Read More »

Do we have different types of Float?

Float is nothing but the bandwidth or buffer one has in the project schedule. There are lot of questions around float which troubles a project manager. Questions like, why do we need float? What are types of floats a project manager can have? Whenever any project manager starts its project, the first thing he works on is amount of total work he has to complete. Definitely when we know the total work, to manage and track it efficiently, one breaks it down in the form of activities. These activities are what a project manager uses to understand the dependencies and

Do we have different types of Float? Read More »

What is Scrum? Why we need it?

Before understanding Scrum, one need to be aware of What is Agile? Though Agility is well known term or jargon these days the basic fundamental of any Agile framework is based on iterative development and requirement evolution. Any framework can be agile as far as its in line with Agile manifesto, values and Agile principles. Scrum is one of them. Scrum in a very simple term is a framework to implement agility in a easy manner. Scrum word is taken from rugby where team is moving to the target together. Scrum is very famous these days for development due to

What is Scrum? Why we need it? Read More »

Web Application Security

Securing web applications in Java involves the very same core security concepts that are known to every InfoSec professional. These concepts and understanding the different authentication mechanisms for the ‘Web component developer’ exam forms the basis of this post. This post assumes knowledge of servlets, deployment descriptors and the servlet life cycle. The four security mechanisms: There are four basic security mechanisms that come into play when securing web applications. They are authentication, authorization, confidentiality and data integrity. Authentication is verifying who you really are. Specifying a name and password is one form of enforcing authentication. Authorization is giving individuals

Web Application Security Read More »

Data privacy in the age of the Apple vs FBI debate

With most of the technology world glued to the outcome of the tussle between Apple and FBI, “data privacy” again takes center stage in the age of social media. For almost a month now, the Apple vs FBI debate has kept us all guessing and taking sides on what is right and what is wrong. Our mobile world:               Smart phones, tablets and other mobile devices continue to grow in popularity and we store abundant amount of personal information in it. Chats, pictures, personal data, health data are all examples of some personal information stored on mobile devices. Seizing any

Data privacy in the age of the Apple vs FBI debate Read More »

Dimensional modeling

After having seen a few blog posts on security topics, we will turn our attention to ‘Data warehousing concepts’ and more specifically the modeling techniques in this post. This post assumes knowledge of basic databases like tables and fields. We have already seen the meaning of a Data warehouse, the reasons for creating a data warehouse and the components of a Data warehouse in earlier posts. Kimball approach to designing Data warehouses: Ralph Kimball preferred the bottom-up approach to designing data warehouses. Since the data warehouse is considered to be the union of all its data marts in the Kimball

Dimensional modeling Read More »

Whatsapp Security

The evolution of different technological tools to enhance communication is growing at a mind boggling pace. With the advent of the Internet in mid 90’s – we have seen messengers like Yahoo messenger, Windows Messenger and then we moved onto Google Talk, Skype, Viber and a number of social media tools like Facebook, Twitter, LinkedIn finally now we have ‘Whatsapp’.  All these and more have been born more on the necessity to communicate more effectively and in real time. The popularity of Whatsapp followed by its security limitations forms the basis of this post. Why is Whatsapp’s Popularity increasing? :

Whatsapp Security Read More »

Scroll to Top