By

Ravel Charles
The following is a very quick post on the security risks between open source and closed sourced software. I hope you find this post to be useful in deciding which type of software you should use in your organization. Open source software is software which is available to the public via Internet download and agreement...
Read More
Why was the computer late for work? It had a hard drive! Simply put, usually the way a computer is able to secondarily store information is through the use of drives.  A hard drive (HDD) is a mechanical data storage device that uses magnetic storage to store and retrieve data. The way this is done...
Read More
A database is formally defined as any collection of data, or information that is specially organized for rapid search and retrieval by a computer. To help explain how a database is created, I will be referencing firsthand experience in creating a Relational Database. For this example, I will be using a waterfall development model, where...
Read More
The following is a quick post in regards to deadlocking. In particular, we will be discussing Oracle and how to control deadlocking. Oracle has a DBMS that can process database transactions. Deadlocking occurs when two or more transactions wait indefinitely for the other to release the lock on a previously locked data item. It is...
Read More
The following is my personal opinion on Uber and it’s ethics. Feel free to reach out to me directly if you will like to further this discussion. Although businesses exist to earn a profit, they also have fundamental responsibilities to the community. They must make decisions that are for the greater good of the community...
Read More
The following is my outline on how to test out a Security Awareness Program. As well, I have included parts of what I would share in that program in regards to physical and cyber security best practices. Quick Overview of Program Physical Security Lessons/Best Practices. Do not keep doors propped open at any time.Be aware...
Read More
The following is quick  post on Oracle and its Data Mining capabilities. I hope you find this useful when deciding whether or not to use Oracle for this function. Oracle Data MIning (ODM)  is an option that is part of Oracle’s Relational Database Management Systems Enterprise Edition. Oracle primarily specialized in developing and marketing database...
Read More
The following is my personal opinion on the controversial WikiLeaks situation. Considering that its been 7 years since actions have been taken against WikiLeaks, I will be covering my thoughts on whether or not they are justified. Introduction The following case study highlights actions taken by and against WikiLeaks since September 2011. More specifically, the...
Read More
To understand Health Level Seven (HL7), let’s highlight the issues that plague health care IT environments. Let’s start at the beginning, the government rolled out the Meaningful Use Program which financially incentivizes providers to adopt EHR technology and exchange health care data with external organization/applications to create a national connected healthcare information exchange network (HIE)....
Read More
The following is an example of how to transform a business rule into database specifications. The Business Rule, “an employee may have many degrees” can be represented in many ways. On a broad level the rule explains that an employee can have one degree or many(>1) degree. One way to represent this is by using...
Read More
1 2 3 4 5 6 10