Risk Management Planning
Risk Management Plan Risk Management Planning Risk management typically follows four stages in an iterative process. These are identification, assessment, planning and monitoring. They should be followed at project start-up and then monitored in response to change, completion of project stages. One of the main reasons why risk-management activities fail … Continue reading →
Risk Assessment of Cloud Computing
Below, I have Performed a short qualitative risk assessment of cloud computing that may be used as guidance for any company thinking of moving to the cloud. Showing some of the strengths, weaknesses and benefits? Risks Risk Description Probability Impact Risk Affects Lock-in Difficult to migrate from one service provide to the … Continue reading →
404 Webpage Fix for WordPress and Host Gator
If you are getting this error, use this fix but make sure to shut off any WP applications that may be causing it! Not to go into specific details cause it is a pain in the neck but certain applications that can-rewrite urls for different browsing experiences are really messing … Continue reading →
Develope a Web Based CMS Using PHP
Download this File Here Abstract The Content Management System (CMS) is a web based application using a Linux Server, Apache Web-server, MySQL Database, and PHP Programming Language (LAMP). The objective of managing users, and information in any given network environment can only be hindered by the creativity of an information … Continue reading →
Multi Level Drop Down with Hover
I could not find a good replacement for my companies drop down menu that was created in Dreamweaver ages ago. The menu had to mimic the original and work decently in IE9. A lot of the CSS classes and id’s can probably be removed. I tried to keep it as simple … Continue reading →
Make sure you have committed to SCM before Production Build
Maven/BitBucket Validation for Production Code Deployment Introduction The justification for this document is to express a way to secure company code and create a possible company standardization for the WAR naming convention that is easily tracked back to a BitBucket commit that was used to deploy an interface to UAT … Continue reading →
SAP-B1 | Pack List for Sales Orders | SQL | Crystal Report
Looking for a better packing list for your shippers to view? This one will add descriptions and notes from the sales order text lines (unless the word “Freight Charge” is in the text line). Lines will be added them in the same ‘visual order’ as the shipping order. It will … Continue reading →
Run Fortify from Maven
Installing Fortify SCM Maven Plugin sca-maven-plugin supports Maven 3.0.5, 3.5.x And 3.6.x Installing This document is only viable if you already have Fortify installed for running with the Scan Wizard and Audit workbench. From: C:\Program Files\Fortify\Fortify_SCA_and_Apps_20.1.0\plugins\maven or wherever you installed Fortify Copy: maven-plugin-src.zip (poor success with the binary zip, choose … Continue reading →
Open Source Software in Digital Forensics
The purpose of this research paper is to research information on open source digital forensic tools that are assess-able for free, usually online. To review types of digital forensic tools available and what they do. The basic definition of what open source and digital forensics is will be defined, and … Continue reading →
Critical Chain Safety
Safety is a necessary CYOA mentality that most project managers need projects can finish on time. Trying to balance time management with resources needed is what it is all about and can be summed up in 3 steps; planning, execution, and monitoring. 1. Planning: Two durations are entered for each … Continue reading →