Software Engineering
All Articles

Software Engineering then and now

Software Engineering is and will be the backbone and driving force behind the technological advancements that we enjoy and that will lead us to greater realms of information and knowledge management. Its good for us to refresh our basics and foundations. Software Engineering is a discipline which was conceptualized, developed and is constantly reviewed for…

Server Synchronization Technology for a Distributed server architecture
All Articles

Paper – Server Synchronization Technology for a Distributed server architecture (DSA)

Requirement: Company xyz has now decided to extend the current system as distributed server architecture, expanding over 46 locations. There will be a central server which will be running from xyz HQ. There will 46 independent host severs running at various locations across the nation, which will be loaded with product management software. These independent…

All Articles

Best Wire-framing / Prototyping tools

One of the most sought tools for a web designer / UI expert / anyone who wants to mock up a user interface based IT system/software is a wire-framing tool. Wire-framing is nothing but building screen / user interface mock of the targeted system which could be used as the medium to convey the user…

Treating Product Requirements
Agile development

Treating product requirements – The ideal way

Product requirements need to be treated with suspicion as if they really needed for the essential capability for a product release. Always prioritize product requirements and keep the bare minimum and most needed requirements on the top of the product backlog with fine-grained description of the requirements which could be easily implemented using any development…

All Articles

Main features of Object Oriented Languages – Classes, Objects, Encapsulation, Polymorphism, Inheritance

1. Classes and Objects In an object oriented programming language, we code the program as a corporate collection of objects which are instantiated from various class abstractions. A class is only a logical abstraction and has no physical existence. An object is a specific instance of the class and it has physical existence inside the…

All Articles

Inheritance

Inheritance is the most basic feature of any Object Oriented programming language. It refers to the derivation of sub classes from a base/super class. The inherited sub classes inherit the common / basic features of the base / super class at the same time implements their own specific features. Inheritance helps us to reduce the…

All Articles

Why Companies Do Reengineering?

Companies are doing reengineering since they want to remain stable in the dynamic business environment while facing changing strategies, financial crisis due to weak / poor / outdated business processes, technological changes, change in customer demands & business competition. Everyone is going for reengineering since it usually provides a quick fix for the present problem…

All Articles

Information Architecture for a web site – Sample Web site Concept Draft

XYZ Company Web Site Concept Draft “Becoming industry’s premier outsourcing solution for managed care services” Overview For the past decade, xyz.coom (fictitious) has been the major online presence for XYZ Company for serving the online needs of its customers as well as exhibiting its capabilities and services to the industry. XYZ Company’s core strategy is to continue generating…

All Articles

Strategic alignment of IT resources – A case study in Grocery industry (Part 1)

Strategic Alignment of IT Resources Grocery Industry Kathleen Chan, Deepesh Joseph, Raymond Jones, Paul Walleck   Introduction  To investigate how and why grocery companies are aligning their information and communication resources (ICT?s) (hardware, software, networks, databases, service offerings, processes, and portal layers) around a focal strategy.  Grocery Industry Introduction • NAICS 445110: Supermarkets and Other Grocery…

All Articles

Is there a conflict between the support of individual rights and the use of e-government for transformational purposes? Why or why not?

Based on my reflection on E-Governance reference materials and experience, I am concluding that e-government initiatives cannot be truly transformational unless the socio-political environment is favorable and open-minded to bring about highly participatory democracy with high level of citizen involvement through innovative technology usage. Two forces are in play that hinders transformation – narrow mindedness…

All Articles

Where should cyberlaw enforcement be centered?

I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this research, policies should be devised to regulate ISPs not to provide services for hosting such websites. Enforcing this policy cannot be done from a centralized location. Why don’t we share…

All Articles

How Pervasive is Phishing?

Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing and crime-ware map, which shows world-wide distribution. 2. GAIN technology from InternetPerils which claims highly effective ways to monitor internet traffic using efficient data pattern analysis. Good tool that can…

All Articles

Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?

Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and regulations which will enable easy coordinated crime-fighting between nations. Its not about questioning who is accusing who, rather the grave situation here to find am amicable solution for international peace…

All Articles

USA Patriot Act and Data mining

I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as – Wiretap Statute (Title III): Electronic Communications Privacy Act Computer Fraud and Abuse Act Foreign Intelligence Surveillance Act Family Education Rights and Privacy Act Pen Register and…

All Articles

Will intelligence add-ons to the internet make it easier for hackers to penetrate the internet for criminal purposes?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet resources for various activities. It’s shocking to read how they have been so Internet savvy and have been utilizing it for psychological warfare to recruitment, networking to fundraising and data-mining…

All Articles

Using Technology to combat terrorrism?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet resources for various activities. It’s shocking to read how they have been so Internet savvy and have been utilizing it for psychological warfare to recruitment, networking to fundraising and data-mining…

All Articles

Can federal legislation prohibit certain types of computer usage in schools without violating students’ free speech rights?

Children’s legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech advocates out there in the current issues that we face in the case of minors. If MySpace leads to minors having being lead to unrestricted content and practices, then there should strictly…

All Articles

Can filtering protect children from harmful material in chatrooms, blogs, and social networks?

I don’t think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social networking and blogs. There should be manual and AI based monitoring available that checks for content periodically and raise alarms when it detect something bad going on. All such sites should be personalized services so that…

All Articles

Should legislation focus just on spyware, on undesireable practices (with spyware being just one example), or should legislation focus on protecting privacy and security of personal information?

Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other way to invade privacy. From the text, literature and real world experience, we know how vast is the world of privacy invasion and techniques that leads to it. Unless we have clear…

All Articles

Is there a more effective strategy for helping developing countries increase the computer and information literacy of their children?

Intel’s Maloney’s words – “It’s about the Web more than anything. I have young kids …….. doesn’t have access to the Web is overwhelming” – is very striking. OLPC efforts might be an answer to this concern. Strategy and plan alone doesn’t work when we are talking about reforming developing nations, cost effective infrastructure is…

All Articles

Should broadband distributors be regulated as common carriers by the FCC?

From the literature and court cases, FCC is less obliged to regulate broadband distributors as common carriers, as “Computer network Information” services are not subject to common carrier telecommunication service regulation under Title II of the federal Communications Act. (NCTA v. Brand X Internet Services et al., U.S. Supreme Court Nos. 04-277 and 04-281, June…

All Articles

Information Architecture and security

Information Architecture, in general, should be implemented in such a way that it makes the user feel safe and comfortable while surfing through the site. Providing links to privacy policy, Feed backs and the like would be good starting point. As indicated, there is no clear rule of thumb for internet governance and thus no…

All Articles

“Not only is shopping melting into everything, but everything is melting into shopping”

“Not only is shopping melting into everything, but everything is melting into shopping” (The above sentence is taken from the referred article) The article ‘The mauling of America’, by Wittman K., introduces the consumer oriented nature of retail architectures. The article brings into light the most visible forms of ‘Gruen effect’ where the consumer is…

All Articles

Get Customer Perspective First

“Instead of creating a clever new product before trying to sell it to customers, the anthropological approach requires companies to look at the customer perspective first and feed that information back to developers and designers.” (The above sentence is from the referred article) Thomas K.’s article is very much relevant in the context of user…

All Articles

"Farmers Vs. Cowmen"

“Farmers Vs. Cowmen” – Is a sentence from the referred book and below is my review, recommendations – I found this topic very interesting and thought provoking since it is directly linked to the way that our mindsets are molded by our educational/professional background. The way different professionals visualize the website is accurately captured. Having…

All Articles

“Navigation Systems aids us to chart our course, determine our position and find our way back” – While designing good websites

“Navigation Systems aids us to chart our course, determine our position and find our way back” (The above sentence is quoted from the referred book) I liked this analogy of a conventional navigation system as related to the web-site navigation systems since it supports the basic user need to browse through information with most satisfaction….

All Articles

"When information is stacked in time, it is difficult to understand context and evaluate relationships" – While designing good websites

“When information is stacked in time, it is difficult to understand context and evaluate relationships” (This is based on a sentence as referred in the article by Tufte) I would like to expand on this concept and relate it to need for grouping related content together. The idea is simple – Our mind is less…

All Articles

Scent of information

“..Scent of information..” (This is based on a reference sentence as seen in Krug’s User experience book) The above extract from Krug’s book caught my attention since often we deal with IA components that ensure scents of useful information while navigating or searching through the web site. The need to keep the user less distracted…

All Articles

“Elements of User Experience”

“Elements of User Experience” (My reflections on the referred article from Garret) Garret’s presentation of ‘Elements of User Experience’ touched all vital aspects of web development that can affect user experience. What I liked most is the way the document brings into light how these user elements gets their unique roles in a web-based software…