Information Technology

By Sandeep Desai (http://www.thedesai.net/)

 

 

Outsourcing

 

Websites

 

www.patentcommons.org (List of patents available for open source use)

 

Measuring Project Risk

 

 

Software Development process

 

 

 

Management

Leading Geeks

Do one review per month instead of all at the end of the year

12 ways managers can grade geeks

First 4 applies to junior staffers, Senior staffers would show competence in more

Don't judge people only by project

 

Data Quality: Before doing ERP or CRM implementation or any new project make sure that the data quality is good. ETL process should not be used for fixing data problems

Tools available for improving data quality are

Data Quality Vendors:

 

US Government Regulations

HIPAA: (Health Insurance Portability and Accountability Act)

 

Sarbanes-Oxley:  Regulations requiring companies to identify, document and audit internal controls for fraud, assets (PC, servers), security etc to comply with section 404. Requires changing passwords every 120 days

 

RFID

 

Radio Frequency IDentification (RFID) is a method of remotely storing and retrieving data using devices called RFID tags/transponders. An RFID tag is a small object, such as an adhesive sticker, that can be attached to or incorporated into a product. RFID tags contain antennas to enable them to receive and respond to radio-frequency queries from an RFID transceiver.

 

RFID generates a large amount of data. See RFID warehouse article

RFID BI practices non-existent according to this Forester view article

 

RFID Wikipedia

RFID Journal

 

Finance

 

Business Math

 

Security

 

A rootkit is a set of software tools used by an intruder or illegal hacker to break into a computer and obtain root privileges in order to perform unauthorized functions, hide traces of its existence and exploit its system wide access

e.g. a rootkit could replace the dir command with a hacked dir command that would delete files first and then show you the list of files in the directory

 

 

Acronyms:

 

Java: Programming Language, 32 bit platform independent programming language

J2EE: Server side Java technology Servlets, JSP (Java Server Pages), JSF (Java Server Faces) EJB (Enterprise Java Beans) JAX-RPC

ETL: Extract Transform Load Data

HTTP: Hyper Text Protocol

RPC: Remote Procedure Call, invoke procedure over the network

SOA: Service Oriented Architecture, RPC over HTTP using XML

XML: Extensible Markup Language, used for creating structured data documents

 

Links

 

 

Database Security Vendors

 

Scan database for misconfigurations, security vulnerabilities, encrypt data, capture log information from Database, OS

 

www.appsecinc.com

www.consul.com

www.emc.com

www.guardium.com

www.ingrian.com (Hardware based cryptography)

www.iplocks.com (Compare database settings to industry standard)

www.lumigent.com (Audit database for user activities, identify change management)

www.ncipher.com

 

 

 

 

Hundreds of Free Data Models

 

 

ERP/CRM

 

Compiere Open Source ERP and CRM