Software Engineering
All Articles

Software Engineering then and now

Software Engineering is and will be the backbone and driving force behind the technological advancements that we enjoy and that will lead us to greater realms of information and knowledge management. Its good for us to refresh our basics and foundations. Software Engineering is a discipline which was conceptualized, developed and is constantly reviewed for…

Good Systems Analyst
All Articles

Attributes of a Good System Analyst

A system analyst is a person who conducts a methodical study and evaluation of various aspects related to business to identify the desired objectives and work out procedures to attain them. The system analyst is a person with unique skills – common sense, a structured framework and a disciplined approach to solving problems are a…

All Articles

Best Wire-framing / Prototyping tools

One of the most sought tools for a web designer / UI expert / anyone who wants to mock up a user interface based IT system/software is a wire-framing tool. Wire-framing is nothing but building screen / user interface mock of the targeted system which could be used as the medium to convey the user…

Treating Product Requirements
Agile development

Treating product requirements – The ideal way

Product requirements need to be treated with suspicion as if they really needed for the essential capability for a product release. Always prioritize product requirements and keep the bare minimum and most needed requirements on the top of the product backlog with fine-grained description of the requirements which could be easily implemented using any development…

All Articles

Project Scope Change And its Impacts

Project background: Developer xyz was in the middle of a project that went several scope changes while in UAT. The project is about implementing capability in the current Underwriting software to do pre-issue Medical Underwriting. The project was initiated by client request to modify the software to account for some new insurance product feature. The system…

All Articles

Mind Mapping Technique to Prepare WBS

I would prefer the mind mapping technique to arrive at WBS (work break down structure), due to my liking for problem solving by visualization and modeling techniques. Another reason to like that technique is that it is very much similar to various modeling tools that we use during the System Analysis phase of product development…

All Articles

Sample Project Management Problem Resolution

Project description: Project for xyz that included development, maintenance and enhancements to the official web site and web-based intranet applications that supported integrated work flows within various departments. I was leading a team of  team members including developers, web-designer and Mr X. Communication Issue: During my tenure leading the project, I have encountered situations where I had…

All Articles

Information Architecture for a web site – Sample Web site Concept Draft

XYZ Company Web Site Concept Draft “Becoming industry’s premier outsourcing solution for managed care services” Overview For the past decade, xyz.coom (fictitious) has been the major online presence for XYZ Company for serving the online needs of its customers as well as exhibiting its capabilities and services to the industry. XYZ Company’s core strategy is to continue generating…

All Articles

Is there a conflict between the support of individual rights and the use of e-government for transformational purposes? Why or why not?

Based on my reflection on E-Governance reference materials and experience, I am concluding that e-government initiatives cannot be truly transformational unless the socio-political environment is favorable and open-minded to bring about highly participatory democracy with high level of citizen involvement through innovative technology usage. Two forces are in play that hinders transformation – narrow mindedness…

All Articles

Where should cyberlaw enforcement be centered?

I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this research, policies should be devised to regulate ISPs not to provide services for hosting such websites. Enforcing this policy cannot be done from a centralized location. Why don’t we share…

All Articles

How Pervasive is Phishing?

Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing and crime-ware map, which shows world-wide distribution. 2. GAIN technology from InternetPerils which claims highly effective ways to monitor internet traffic using efficient data pattern analysis. Good tool that can…

All Articles

Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?

Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and regulations which will enable easy coordinated crime-fighting between nations. Its not about questioning who is accusing who, rather the grave situation here to find am amicable solution for international peace…

All Articles

USA Patriot Act and Data mining

I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as – Wiretap Statute (Title III): Electronic Communications Privacy Act Computer Fraud and Abuse Act Foreign Intelligence Surveillance Act Family Education Rights and Privacy Act Pen Register and…

All Articles

Will intelligence add-ons to the internet make it easier for hackers to penetrate the internet for criminal purposes?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet resources for various activities. It’s shocking to read how they have been so Internet savvy and have been utilizing it for psychological warfare to recruitment, networking to fundraising and data-mining…

All Articles

Using Technology to combat terrorrism?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet resources for various activities. It’s shocking to read how they have been so Internet savvy and have been utilizing it for psychological warfare to recruitment, networking to fundraising and data-mining…

All Articles

Can federal legislation prohibit certain types of computer usage in schools without violating students’ free speech rights?

Children’s legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech advocates out there in the current issues that we face in the case of minors. If MySpace leads to minors having being lead to unrestricted content and practices, then there should strictly…

All Articles

Can filtering protect children from harmful material in chatrooms, blogs, and social networks?

I don’t think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social networking and blogs. There should be manual and AI based monitoring available that checks for content periodically and raise alarms when it detect something bad going on. All such sites should be personalized services so that…

All Articles

Should legislation focus just on spyware, on undesireable practices (with spyware being just one example), or should legislation focus on protecting privacy and security of personal information?

Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other way to invade privacy. From the text, literature and real world experience, we know how vast is the world of privacy invasion and techniques that leads to it. Unless we have clear…

All Articles

Is there a more effective strategy for helping developing countries increase the computer and information literacy of their children?

Intel’s Maloney’s words – “It’s about the Web more than anything. I have young kids …….. doesn’t have access to the Web is overwhelming” – is very striking. OLPC efforts might be an answer to this concern. Strategy and plan alone doesn’t work when we are talking about reforming developing nations, cost effective infrastructure is…

All Articles

Should the prohibition in the Digital Millennium Copyright Act against breaking intellectual property safeguards be modified?

This article is a good resource for those who want to know more about the most raised question – Should the prohibition in the Digital Millennium Copyright Act against breaking intellectual property safeguards be modified? Read along .. I agree to the general consent that DMCA should be amended to shift its view from complete…

All Articles

Basic differences between managing information and managing knowledge? Is it necessary that we try to “get inside people’s heads” to capture it?

Information and Knowledge are two interrelated concepts. Information is processed data that has the capacity to give form or shape to a matter or to the mind. Formation of matter can be appreciated in the way that “messages passed from Genes instruct the cell machinery to build an organism” (Campbell J., 1982). Shaping of mind…

All Articles

What is IT?

We have seen so much about IT and all of us have been a part of it by some means or other. We all know what IT refers to and what are its applications. I have been trying to define what is IT or Information Technology, since some time. This is puerly a personal effort…