Figure 1. Gantt Chart Example: Planning a custom-written computer
project
Task
Earliest start
Length
Type
Dependent on...
A. High level analysis
Week 0
1 week
Sequential
B. Selection of hardware platform
Week 1
1 day
Sequential
A
C. Installation and commissioning of hardware
Week 1.2
2 weeks
Parallel
B
D. Detailed analysis of core modules
Week 1
2 weeks
Sequential
A
E. Detailed analysis of supporting modules
Week 3
2 weeks
Sequential
D
F. Programming of core modules
Week 3
2 weeks
Sequential
D
G. Programming of supporting modules
Week 5
3 weeks
Sequential
E
H. Quality assurance of core modules
Week 5
1 week
Sequential
F
I. Quality assurance of supporting modules
Week 8
1 week
Sequential
G
J. Core module training
Week 6
1 day
Parallel
C,H
K. Development and QA of accounting reporting
Week 5
1 week
Parallel
E
L. Development and QA of management reporting
Week 5
1 week
Parallel
E
M. Development of Management Information System
Week 6
1 week
Sequential
L
N. Detailed training
Week 9
1 week
Sequential
I, J, K, M
The death of privacy - Ireland's CIO and strategy news and reports service - Siliconrep... - 3 views
-
In the US this year, there was outrage when people in job interviews and in schools were asked to hand over their Facebook passwords. Dwyer said that in the future and with the arrival of the semantic web and linkable data there is a danger that insurance companies may be able to find out if applicants had done a search for keywords like cancer stretching back 15 years.
-
In the US this year, there was outrage when people in job interviews and in schools were asked to hand over their Facebook passwords. Dwyer said that in the future and with the arrival of the semantic web and linkable data there is a danger that insurance companies may be able to find out if applicants had done a search for keywords like cancer stretching back 15 years
Braille for computers - 6 views
US credit cards outdated, less useful abroad, as 'chip and PIN' cards catch on - 1 views
-
Smart card transactions can be quicker, because the terminal and card communicate with each other -- the terminal verifying that the card is authentic and vice versa -- instead of the terminal having to communicate via Internet or wireless with the card issuer to verify that the card is real and hasn't been reported lost or stolen, says Randy Vanderhoof, executive director of the Smart Card Alliance, a nonprofit organization that works to promote the adoption of smart card technology.
-
Also, when a card leaves the cardholder's physical presence, it can be compromised, using a hand-held information-stealing device called a skimmer,
-
in which information is encoded into a magnetic stripe on the back of the card, and the newer so-called smart cards, which contain a computer chip that holds information.
- ...1 more annotation...
1 - 10 of 10
Showing 20▼ items per page