All Articles

Need for better time reporting systems

System Background (circumstances):Most of the employers uses a web based time logging application that falls into the category of time attendance systems that we are addressing in this discussion. The goal of the system is to track employee hours spend during a working day under various project heads. The idea is that the top management…

All Articles

Schedule Compression Determination

If you were managing a software development project that was a year away from completion and the project sponsor asked you to cut a month from the schedule, what would you tell him or her? What factors would you consider? How would you determine an answer? I would warn him about increased cost in terms…

All Articles

Importance of formal project planning

One of the projects that I executed for one of my employers was an internal employee goal tracking system. The system enables employees from CEO to bottom level, enter their goals supporting their superior’s goals. According to user levels, there is ability to view/edit/approve/reject goals and there are mechanisms to conduct performance management. This project…

All Articles

Importance of following well-integrated change control process (CCP) on IT projects

Change in IT projects’ life cycle is inevitable. This points at the importance of establishing means to identify, control and document change in a formal approach. There will be changes in Technology, resources and organizational priorities. Equally important is change requests that initiates from the customer/user. In my experience with software development, these change requests…

All Articles

Project Scope Change And its Impacts

Project background: Developer xyz was in the middle of a project that went several scope changes while in UAT. The project is about implementing capability in the current Underwriting software to do pre-issue Medical Underwriting. The project was initiated by client request to modify the software to account for some new insurance product feature. The system…

All Articles

Mind Mapping Technique to Prepare WBS

I would prefer the mind mapping technique to arrive at WBS (work break down structure), due to my liking for problem solving by visualization and modeling techniques. Another reason to like that technique is that it is very much similar to various modeling tools that we use during the System Analysis phase of product development…

All Articles

Sample Project Management Problem Resolution

Project description: Project for xyz that included development, maintenance and enhancements to the official web site and web-based intranet applications that supported integrated work flows within various departments. I was leading a team of  team members including developers, web-designer and Mr X. Communication Issue: During my tenure leading the project, I have encountered situations where I had…

All Articles

Sample PM Day to Day Work

Project Management skill is very important in information management area. Let me paint a historical (early 2000) projet lead role where I was responsible for managing the E-governance project for the state of Maharashtra, India. Let me frankly state that, we had no defined project management process in place that adheres to PMBOK guidelines. The project processes…

All Articles

Information Architecture for a web site – Sample Web site Concept Draft

XYZ Company Web Site Concept Draft “Becoming industry’s premier outsourcing solution for managed care services” Overview For the past decade, xyz.coom (fictitious) has been the major online presence for XYZ Company for serving the online needs of its customers as well as exhibiting its capabilities and services to the industry. XYZ Company’s core strategy is to continue generating…

All Articles

Strategic alignment of IT resources – A case study in Grocery industry (Part 1)

Strategic Alignment of IT Resources Grocery Industry Kathleen Chan, Deepesh Joseph, Raymond Jones, Paul Walleck   Introduction  To investigate how and why grocery companies are aligning their information and communication resources (ICT?s) (hardware, software, networks, databases, service offerings, processes, and portal layers) around a focal strategy.  Grocery Industry Introduction • NAICS 445110: Supermarkets and Other Grocery…

All Articles

Definition of E-Governance

The e-Government Act defines “electronic Government’ as “the use by the Government of web-based Internet applications and other information technologies, combined with processes that implement these technologies, to—‘‘(A) enhance the access to and delivery of Government information and services to the public, other agencies, and other Government entities; or ‘‘(B) bring about improvements in Government…

All Articles

Reason for Federal Agencies to be Pro-Active

OMB is now in action mode without clear instructions and expectations. IT project failures and its increased concern has taken OMB to a point where it has to prove measurable actions to the President. The OMB director directs and CIO reacts – common theme that was seen in Memorandum. Agencies struggle to show results and…

All Articles

EHRI and its Effect on Federal Agency Performance

My vision is that agencies will become more proactive in establishing strong project management techniques and creating more live and actionable cost estimation and analysis techniques to create and sustain successful projects. This will also require adequate staffing at agencies that has the ability to make this happen. Initiatives such as EHRI are an indirect…

All Articles

Where are federal IT initiatives heading – Success or Failure – Lessons learned

GAO Cost Estimating and Assessment Guide is very extensive and gives us clear details of federal IT initiatives. The guide, together with OMB circular and IT dashboard web site gave some important hints towards how concerned and vigilant is US government in reviewing and evaluating Federal IT projects. The Cost estimating guide highlights customized methods…

All Articles

Is there a conflict between the support of individual rights and the use of e-government for transformational purposes? Why or why not?

Based on my reflection on E-Governance reference materials and experience, I am concluding that e-government initiatives cannot be truly transformational unless the socio-political environment is favorable and open-minded to bring about highly participatory democracy with high level of citizen involvement through innovative technology usage. Two forces are in play that hinders transformation – narrow mindedness…

All Articles

E-Government Transformation in Maharashtra, India

The scalar transformation of e-government implementation models in the state of Maharashtra, India, took place exactly as West pictures as billboard, partial service delivery and Portal stage (with major focus on service delivery). The e-government initiative took its shape during late nineties with my employer being appointed as the Apex consultant to the state government…

All Articles

Establishing the capability for employees of a local or national government to blog about their work life and access their Facebook accounts during work hours constitute Electronic government?

This clearly does not constitute electronic government in US and most of the world’s government context. The focus of electronic government is to use technology to effect automation and coordinated function of specific rules, processes or procedures so that it leads to measurable outputs as expected by the inherent e-government policy or Acts. If we…

All Articles

Should the United States increase the number of H-1B visas and green cards so international skilled workers can become permanent residents?

The basic point underlying the issues is that U.S. has an immense shortage of highly skilled labor ever year and the current percentage of fresh graduates from the STEM field is far less when compared to this huge requirement. Immigrants has always been a boost to U.S. economy. Providing more opportunities for highly skilled workforce…

All Articles

Where should cyberlaw enforcement be centered?

I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this research, policies should be devised to regulate ISPs not to provide services for hosting such websites. Enforcing this policy cannot be done from a centralized location. Why don’t we share…

All Articles

How Pervasive is Phishing?

Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing and crime-ware map, which shows world-wide distribution. 2. GAIN technology from InternetPerils which claims highly effective ways to monitor internet traffic using efficient data pattern analysis. Good tool that can…

All Articles

Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?

Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and regulations which will enable easy coordinated crime-fighting between nations. Its not about questioning who is accusing who, rather the grave situation here to find am amicable solution for international peace…

All Articles

USA Patriot Act and Data mining

I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as – Wiretap Statute (Title III): Electronic Communications Privacy Act Computer Fraud and Abuse Act Foreign Intelligence Surveillance Act Family Education Rights and Privacy Act Pen Register and…

All Articles

Will intelligence add-ons to the internet make it easier for hackers to penetrate the internet for criminal purposes?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet resources for various activities. It’s shocking to read how they have been so Internet savvy and have been utilizing it for psychological warfare to recruitment, networking to fundraising and data-mining…

All Articles

Using Technology to combat terrorrism?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet resources for various activities. It’s shocking to read how they have been so Internet savvy and have been utilizing it for psychological warfare to recruitment, networking to fundraising and data-mining…

All Articles

Can federal legislation prohibit certain types of computer usage in schools without violating students’ free speech rights?

Children’s legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech advocates out there in the current issues that we face in the case of minors. If MySpace leads to minors having being lead to unrestricted content and practices, then there should strictly…

All Articles

Can filtering protect children from harmful material in chatrooms, blogs, and social networks?

I don’t think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social networking and blogs. There should be manual and AI based monitoring available that checks for content periodically and raise alarms when it detect something bad going on. All such sites should be personalized services so that…

All Articles

Should legislation focus just on spyware, on undesireable practices (with spyware being just one example), or should legislation focus on protecting privacy and security of personal information?

Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other way to invade privacy. From the text, literature and real world experience, we know how vast is the world of privacy invasion and techniques that leads to it. Unless we have clear…

All Articles

Is there a more effective strategy for helping developing countries increase the computer and information literacy of their children?

Intel’s Maloney’s words – “It’s about the Web more than anything. I have young kids …….. doesn’t have access to the Web is overwhelming” – is very striking. OLPC efforts might be an answer to this concern. Strategy and plan alone doesn’t work when we are talking about reforming developing nations, cost effective infrastructure is…

All Articles

What protections should the public have regarding access to broadband networks for reception and/or transmission?

700 Mhz band is being developed and utilized with the intention of allowing entrepreneurs with less capital to establish broadband services, since it offers cheap means to setup service. This is the reason for the major players influencing Congress to gain an upper hand so that they kill competition and innovation. The term “public” means…

All Articles

Should carriers have the freedom through contracts and licenses to shape how their networks will be used?

Again this is an instance of protecting consumer rights and freedom in utilizing the digital medium. The carriers have a very important role in maintaining a healthy pipe that is effectively utilized. There should be efforts to setup regulation and standards to avoid piracy and unauthorized usage of network traffic. At the same time the…

All Articles

Should broadband distributors be regulated as common carriers by the FCC?

From the literature and court cases, FCC is less obliged to regulate broadband distributors as common carriers, as “Computer network Information” services are not subject to common carrier telecommunication service regulation under Title II of the federal Communications Act. (NCTA v. Brand X Internet Services et al., U.S. Supreme Court Nos. 04-277 and 04-281, June…

All Articles

Modifying World Trade Organization’s TRIPS agreement?

Here is another analysis article on a widely asked question – “Should treaties like the World Trade Organization’s TRIPS agreement be modified so developing countries can ignore software patents without facing WTO retaliatory measures?” Read along.. In my opinion, IPR should be preserved anywhere in the world. Making strict TRIP regulations has its major advantage…