Category: Knowledge Management

Software Engineering then and now

Software Engineering is and will be the backbone and driving force behind the technological advancements that we enjoy and that will lead us to greater...

Attributes of a Good System Analyst

A system analyst is a person who conducts a methodical study and evaluation of various aspects related to business to identify the desired objectives and...

Treating product requirements – The ideal way

Product requirements need to be treated with suspicion as if they really needed for the essential capability for a product release. Always prioritize product requirements...

Project Scope Change And its Impacts

Project background: Developer xyz was in the middle of a project that went several scope changes while in UAT. The project is about implementing capability...

Mind Mapping Technique to Prepare WBS

I would prefer the mind mapping technique to arrive at WBS (work break down structure), due to my liking for problem solving by visualization and...

Sample Project Management Problem Resolution

Project description: Project for xyz that included development, maintenance and enhancements to the official web site and web-based intranet applications that supported integrated work flows...

How Pervasive is Phishing?

Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing...

USA Patriot Act and Data mining

I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other...

Using Technology to combat terrorrism?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...

What is IT?

We have seen so much about IT and all of us have been a part of it by some means or other. We all know...