Code First
All Articles

Using Code First first

Traditional ways of software development focus on DB-first implementation methodology. But we are in the realm of latest developments and ORM models has taken us to a level that is was a complex ordeal some years back. Eventhough a thorough domain/ERD based approach provides some advantages, there are far more overall improvements to development and…

All Articles

Preferred Multithreading in C# ASP.NET

Parallel execution has been one of the core techniques of programming languages that enables and stabilizes the heavy orchestrated flow of information across information management systems. All Object Oriented Programming languages provides couple different ways to implement this to function smoothly under heavy and stressful load 🙂 A better way was introduced in C# which…

All Articles

Software Project Size

Software Project Size is of great importance since it determines the level of management controls and the types of tools and technologies required for a software project. Accordingly, software projects are classified into 6 major categories as follows (this basic yard stick is used in all of the diversified software development and project management methodologies)…

Software Engineering
All Articles

Software Engineering then and now

Software Engineering is and will be the backbone and driving force behind the technological advancements that we enjoy and that will lead us to greater realms of information and knowledge management. Its good for us to refresh our basics and foundations. Software Engineering is a discipline which was conceptualized, developed and is constantly reviewed for…

Good Systems Analyst
All Articles

Attributes of a Good System Analyst

A system analyst is a person who conducts a methodical study and evaluation of various aspects related to business to identify the desired objectives and work out procedures to attain them. The system analyst is a person with unique skills – common sense, a structured framework and a disciplined approach to solving problems are a…

All Articles

System Life Cycle – Classical definition

A system is a set of interacting elements that responds to inputs producing outputs. The events which together make up the development, operation and maintenance of such a computer system or information management system may be referred to as the ‘System Life Cycle’. The different elements of a system life cycle are – 1. Initial Study –…

Agile
Agile development

Agile / Scrum methodology – Explained simple

Agile software development methodology is suitable for time-boxed iterative system development scenarios. The software product is released as various versions or releases, typically in time-boxes of a month. Agile development assumes and welcomes delays and late requirements or scope changes even during development/testing phase! Agile software development might not be suitable for all software development…

All Articles

Events and States

Events and States are differentiated below – Events States Anything that happen in time Shows the attributes values of object at a particular point in time An event separate two states A state separates two events An event is said to have happened without regard to whether it changes a state or not A state…

Actors and Data Stores
All Articles

Actors and Data Stores

Actors: Actors are objects represented in the functional model that produce or consume data. An actor may store some data for further processing steps. Data Stores: Data stores are store house of data represented in the functional model. A data store could only store or consume data, but could not produce data. Below is an…

All Articles

State Diagram – Car

The state diagram may be drawn by considering the concurrency property of the aggregate objects that make up the car object ie. each aggregate object has a state of its own. Below is a sample state diagram for a Car object – Below is the state diagram for Ignition System – State Diagram – Transmission…

All Articles

Abstraction

Abstraction may be defined as all those essential characteristics features of an object class which makes it different from other object classes. Abstraction as applied to inheritance refers to the specific features defined for each subclass in the class hierarchy. Such a representation of the object class including only its essential attributes and operations, leaving…

Multiplicity
All Articles

Multiplicity

Multiplicity refers to the number of object class instances of one class may be associated to the other class. An n+ symbol indicates that there can be n or >n associations of the object class near to the n+ symbol to the other associated class. A solid ball indicates 1 or >1 associations and a…

All Articles

Inheritance

Inheritance is the most basic feature of any Object Oriented programming language. It refers to the derivation of sub classes from a base/super class. The inherited sub classes inherit the common / basic features of the base / super class at the same time implements their own specific features. Inheritance helps us to reduce the…

Reengineering
All Articles

Reengineering Principles

The standard Reengineering principles are as follows – 1. Organize work around its end results, not tasks According to this principle, it is optimal to determine the work’s end result rather than dividing the work into small tasks & units. We try to rearrange the work process so that a single person can perform all…

All Articles

Why Companies Do Reengineering?

Companies are doing reengineering since they want to remain stable in the dynamic business environment while facing changing strategies, financial crisis due to weak / poor / outdated business processes, technological changes, change in customer demands & business competition. Everyone is going for reengineering since it usually provides a quick fix for the present problem…

All Articles

Creating Process based Organizations via Reengineering

While reengineering a business enterprise, we create a process based organization structure for the enterprise to avoid the inefficiencies and time wasting business process cycles as in a functions based organization. ie – the business process information systems and the enterprise wide information infrastructure are integrated in such a way that the people of various functions…

All Articles

Basic approaches to Reengineering

The three basic approaches to reengineering are as follows – 1. STREAMLIING 2. INTEGRATING 3. TRANSFORMING 1. Streamlining – Streamlining approach to reengineering the business offers a basic, segmented, quick-fix methodology for reengineering. It cleans up and treats symptoms but doesn’t  necessarily transform a process nor find a cure for a bad process. It doesn’t…

All Articles

Importance of formal project planning

One of the projects that I executed for one of my employers was an internal employee goal tracking system. The system enables employees from CEO to bottom level, enter their goals supporting their superior’s goals. According to user levels, there is ability to view/edit/approve/reject goals and there are mechanisms to conduct performance management. This project…

All Articles

Project Scope Change And its Impacts

Project background: Developer xyz was in the middle of a project that went several scope changes while in UAT. The project is about implementing capability in the current Underwriting software to do pre-issue Medical Underwriting. The project was initiated by client request to modify the software to account for some new insurance product feature. The system…

All Articles

Mind Mapping Technique to Prepare WBS

I would prefer the mind mapping technique to arrive at WBS (work break down structure), due to my liking for problem solving by visualization and modeling techniques. Another reason to like that technique is that it is very much similar to various modeling tools that we use during the System Analysis phase of product development…

All Articles

Sample Project Management Problem Resolution

Project description: Project for xyz that included development, maintenance and enhancements to the official web site and web-based intranet applications that supported integrated work flows within various departments. I was leading a team of  team members including developers, web-designer and Mr X. Communication Issue: During my tenure leading the project, I have encountered situations where I had…

All Articles

Sample PM Day to Day Work

Project Management skill is very important in information management area. Let me paint a historical (early 2000) projet lead role where I was responsible for managing the E-governance project for the state of Maharashtra, India. Let me frankly state that, we had no defined project management process in place that adheres to PMBOK guidelines. The project processes…

All Articles

Information Architecture for a web site – Sample Web site Concept Draft

XYZ Company Web Site Concept Draft “Becoming industry’s premier outsourcing solution for managed care services” Overview For the past decade, xyz.coom (fictitious) has been the major online presence for XYZ Company for serving the online needs of its customers as well as exhibiting its capabilities and services to the industry. XYZ Company’s core strategy is to continue generating…

All Articles

Strategic alignment of IT resources – A case study in Grocery industry (Part 1)

Strategic Alignment of IT Resources Grocery Industry Kathleen Chan, Deepesh Joseph, Raymond Jones, Paul Walleck   Introduction  To investigate how and why grocery companies are aligning their information and communication resources (ICT?s) (hardware, software, networks, databases, service offerings, processes, and portal layers) around a focal strategy.  Grocery Industry Introduction • NAICS 445110: Supermarkets and Other Grocery…

All Articles

Definition of E-Governance

The e-Government Act defines “electronic Government’ as “the use by the Government of web-based Internet applications and other information technologies, combined with processes that implement these technologies, to—‘‘(A) enhance the access to and delivery of Government information and services to the public, other agencies, and other Government entities; or ‘‘(B) bring about improvements in Government…

All Articles

Reason for Federal Agencies to be Pro-Active

OMB is now in action mode without clear instructions and expectations. IT project failures and its increased concern has taken OMB to a point where it has to prove measurable actions to the President. The OMB director directs and CIO reacts – common theme that was seen in Memorandum. Agencies struggle to show results and…

All Articles

Where are federal IT initiatives heading – Success or Failure – Lessons learned

GAO Cost Estimating and Assessment Guide is very extensive and gives us clear details of federal IT initiatives. The guide, together with OMB circular and IT dashboard web site gave some important hints towards how concerned and vigilant is US government in reviewing and evaluating Federal IT projects. The Cost estimating guide highlights customized methods…

All Articles

Is there a conflict between the support of individual rights and the use of e-government for transformational purposes? Why or why not?

Based on my reflection on E-Governance reference materials and experience, I am concluding that e-government initiatives cannot be truly transformational unless the socio-political environment is favorable and open-minded to bring about highly participatory democracy with high level of citizen involvement through innovative technology usage. Two forces are in play that hinders transformation – narrow mindedness…

All Articles

E-Government Transformation in Maharashtra, India

The scalar transformation of e-government implementation models in the state of Maharashtra, India, took place exactly as West pictures as billboard, partial service delivery and Portal stage (with major focus on service delivery). The e-government initiative took its shape during late nineties with my employer being appointed as the Apex consultant to the state government…

All Articles

True Transformation – Is it ever possible in E-Government setup?

This is an interesting and very scholastic topic to share and discuss. The basic question being raised is – Are e-government initiatives capable to bring about transformation within the ecosystem (citizens, government agencies and all public administration setup) that it functions and serves? To answer the question, we really need to define what ‘transformation’ are…

All Articles

Establishing the capability for employees of a local or national government to blog about their work life and access their Facebook accounts during work hours constitute Electronic government?

This clearly does not constitute electronic government in US and most of the world’s government context. The focus of electronic government is to use technology to effect automation and coordinated function of specific rules, processes or procedures so that it leads to measurable outputs as expected by the inherent e-government policy or Acts. If we…

All Articles

Where should cyberlaw enforcement be centered?

I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this research, policies should be devised to regulate ISPs not to provide services for hosting such websites. Enforcing this policy cannot be done from a centralized location. Why don’t we share…

All Articles

How Pervasive is Phishing?

Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing and crime-ware map, which shows world-wide distribution. 2. GAIN technology from InternetPerils which claims highly effective ways to monitor internet traffic using efficient data pattern analysis. Good tool that can…

All Articles

Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?

Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and regulations which will enable easy coordinated crime-fighting between nations. Its not about questioning who is accusing who, rather the grave situation here to find am amicable solution for international peace…

All Articles

USA Patriot Act and Data mining

I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as – Wiretap Statute (Title III): Electronic Communications Privacy Act Computer Fraud and Abuse Act Foreign Intelligence Surveillance Act Family Education Rights and Privacy Act Pen Register and…

All Articles

Will intelligence add-ons to the internet make it easier for hackers to penetrate the internet for criminal purposes?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet resources for various activities. It’s shocking to read how they have been so Internet savvy and have been utilizing it for psychological warfare to recruitment, networking to fundraising and data-mining…

All Articles

Using Technology to combat terrorrism?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet resources for various activities. It’s shocking to read how they have been so Internet savvy and have been utilizing it for psychological warfare to recruitment, networking to fundraising and data-mining…

All Articles

Can federal legislation prohibit certain types of computer usage in schools without violating students’ free speech rights?

Children’s legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech advocates out there in the current issues that we face in the case of minors. If MySpace leads to minors having being lead to unrestricted content and practices, then there should strictly…

All Articles

Can filtering protect children from harmful material in chatrooms, blogs, and social networks?

I don’t think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social networking and blogs. There should be manual and AI based monitoring available that checks for content periodically and raise alarms when it detect something bad going on. All such sites should be personalized services so that…

All Articles

Should legislation focus just on spyware, on undesireable practices (with spyware being just one example), or should legislation focus on protecting privacy and security of personal information?

Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other way to invade privacy. From the text, literature and real world experience, we know how vast is the world of privacy invasion and techniques that leads to it. Unless we have clear…