Skip to main content

Home/ ITGS-SIS/ Group items tagged report

Rss Feed Group items tagged

dec_burke

Gantt Charts - Project Management Tools from MindTools.com - 4 views

  • Figure 1. Gantt Chart Example: Planning a custom-written computer project Task Earliest start Length Type Dependent on... A. High level analysis Week 0 1 week Sequential B. Selection of hardware platform Week 1 1 day Sequential A C. Installation and commissioning of hardware Week 1.2 2 weeks Parallel B D. Detailed analysis of core modules Week 1 2 weeks Sequential A E. Detailed analysis of supporting modules Week 3 2 weeks Sequential D F. Programming of core modules Week 3 2 weeks Sequential D G. Programming of supporting modules Week 5 3 weeks Sequential E H. Quality assurance of core modules Week 5 1 week Sequential F I. Quality assurance of supporting modules Week 8 1 week Sequential G J. Core module training Week 6 1 day Parallel C,H K. Development and QA of accounting reporting Week 5 1 week Parallel E L. Development and QA of management reporting Week 5 1 week Parallel E M. Development of Management Information System Week 6 1 week Sequential L N. Detailed training Week 9 1 week Sequential I, J, K, M
dec_burke

The death of privacy - Ireland's CIO and strategy news and reports service - Siliconrep... - 3 views

  • In the US this year, there was outrage when people in job interviews and in schools were asked to hand over their Facebook passwords. Dwyer said that in the future and with the arrival of the semantic web and linkable data there is a danger that insurance companies may be able to find out if applicants had done a search for keywords like cancer stretching back 15 years.
  •  
    In the US this year, there was outrage when people in job interviews and in schools were asked to hand over their Facebook passwords. Dwyer said that in the future and with the arrival of the semantic web and linkable data there is a danger that insurance companies may be able to find out if applicants had done a search for keywords like cancer stretching back 15 years
dec_burke

US credit cards outdated, less useful abroad, as 'chip and PIN' cards catch on - 1 views

  • Smart card transactions can be quicker, because the terminal and card communicate with each other -- the terminal verifying that the card is authentic and vice versa -- instead of the terminal having to communicate via Internet or wireless with the card issuer to verify that the card is real and hasn't been reported lost or stolen, says Randy Vanderhoof, executive director of the Smart Card Alliance, a nonprofit organization that works to promote the adoption of smart card technology.
  • Also, when a card leaves the cardholder's physical presence, it can be compromised, using a hand-held information-stealing device called a skimmer,
  • in which information is encoded into a magnetic stripe on the back of the card, and the newer so-called smart cards, which contain a computer chip that holds information.
  • ...1 more annotation...
  • So-called card cloning also can be easier with magnetic stripe cards. Vanderhoof says: "With chip-and-PIN, it's nearly impossible to create a fake card."   
1 - 10 of 10
Showing 20 items per page