<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Posts on Bill Brown:Thoughts and Reference Material Online</title><link>https://www.billbrown.info/post/</link><description>Recent content in Posts on Bill Brown:Thoughts and Reference Material Online</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>BillBrown.info</copyright><lastBuildDate>Sat, 14 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.billbrown.info/post/index.xml" rel="self" type="application/rss+xml"/><item><title>Trust, CIA Triad, and Safeguards in Information Security</title><link>https://www.billbrown.info/post/trust-and-safeguards-in-information-security-an-organizational-perspective/</link><pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/trust-and-safeguards-in-information-security-an-organizational-perspective/</guid><description>
&lt;h2 id="trust-and-safeguards-in-information-security-an-organizational-perspective"&gt;Trust and Safeguards in Information Security: An Organizational Perspective&lt;/h2&gt;
&lt;h2 id="hahahugoshortcode66s0hbhb"&gt;The word &amp;quot;Trust&amp;quot; is defined as related to information security. Based on ones
understanding of securing your environment, what are some of the common safeguards is recommend
to ensure trust is viable in an organization?
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/h2&gt;
&lt;h2 id="defining-trust-in-information-security"&gt;Defining Trust in Information Security&lt;/h2&gt;
&lt;p&gt;Trust as defined by Jacobs (2016) is a characteristic allowing one entity to assume that a second
entity will behave exactly as the first entity expects. Trust can be viewed as assurance in the
honesty, skill, character, and certainty of a person or thing.&lt;/p&gt;</description></item><item><title>Personnel and Physical Security in Information Assurance</title><link>https://www.billbrown.info/post/personnel-and-physical-security-in-information-assurance/</link><pubDate>Fri, 13 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/personnel-and-physical-security-in-information-assurance/</guid><description>
&lt;h2 id="personnel-and-physical-security-in-information-assurance"&gt;Personnel and Physical Security in Information Assurance&lt;/h2&gt;
&lt;h2 id="personnel-security"&gt;Personnel Security&lt;/h2&gt;
&lt;p&gt;Process and procedures are needed to protect personnel security as Jacobs (2015) points out. The employee responsibilities need to be defined, and the employee must qualify for the role so that the risk is reduced from theft, fraud, or misuse of assets by the employee.
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
An excellent example of checking personnel security or identities occurs in businesses that do work on behalf of the government. Each employee, visitor, supplier and any others that interact with the organization require having their identities checked and verified. In some cases, foreign personnel are unable to participate in specific meetings or able to conduct business in various parts of the building due to the sensitive nature of the information handled and discussed. Security policies and procedures for the organization identify what personnel can and cannot do including terminations or disciplinary action was taken for any wrongdoing as discussed by Jacobs (2015). Regular training by the organization is required do be sure team members are up to date with regulations and required constraints that need to be followed. At the time of employment as Jacobs (2015) a job description, already in place is provided to the employee, and the terms and conditions of the employment should be provided as defined by the human resources, compliance and legal teams. The job description should include any security roles and responsibilities required by the job candidate. A candidate background check and drug test also should be conducted before taking on a candidate for employment which will identify any past existing issues with the candidate. If the candidate is hired, the employment contract and nondisclosure agreement should be completed before any organizational assets are provided to the new employee.&lt;/p&gt;</description></item><item><title>Risk Management in Security Systems Engineering Explained</title><link>https://www.billbrown.info/post/risk-management-critical-element-of-security-systems-engineering/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/risk-management-critical-element-of-security-systems-engineering/</guid><description>
&lt;h2 id="risk-management-as-a-critical-element-of-security-systems-engineering"&gt;Risk Management as a Critical Element of Security Systems Engineering&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Explain how Risk Management is a critical element to the Security Systems engineering.
Also disucss how Risk Management is a critical component to the Security Systems engineering.
Why is Risk Management a critical element of Security Systems engineering.&lt;/p&gt;
&lt;hr&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;h2 id="defining-risk-in-security-systems"&gt;Defining Risk in Security Systems&lt;/h2&gt;
&lt;p&gt;Risk Management is a critical component of Security Systems engineering. To understand risk management, let's understand what risks are, vulnerabilities and threats are in relation to security systems. The combination of a threat combined with a vulnerability best defines risk within the realm of security as described by Bejtlich (2004).&lt;/p&gt;</description></item><item><title>Systems Engineering and Information Security in the SDLC</title><link>https://www.billbrown.info/post/systems-engineering-and-information-security-integration-in-the-development-lifecycle/</link><pubDate>Wed, 05 Nov 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/systems-engineering-and-information-security-integration-in-the-development-lifecycle/</guid><description>
&lt;h2 id="systems-engineering-and-information-security-integration-in-the-development-lifecycle"&gt;Systems Engineering and Information Security Integration in the Development Lifecycle&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Topic:&lt;/strong&gt; Systems Engineering and Information Security&lt;/p&gt;
&lt;h3 id="systems-engineering-overview"&gt;Systems Engineering Overview&lt;/h3&gt;
&lt;p&gt;Systems engineering centers on defining the client's requirements and functionality early in the development cycle. Then one refines and documents the requirements that represent the needs. The method continues into design synthesis, development, system validation, deployment, operation, and retirement while considering the entire problem or also known as the system life cycle (Jacobs, 2016, p. 31). In short systems engineering is an interdisciplinary method to building complex and technologically diverse systems as described by Douglass (2016).&lt;/p&gt;</description></item><item><title>Systems Engineering SIMILAR Methodology Example</title><link>https://www.billbrown.info/post/systems-engineering-similar-methodology-example/</link><pubDate>Tue, 04 Nov 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/systems-engineering-similar-methodology-example/</guid><description>
&lt;h2 id="systems-engineering-similar-methodology-example"&gt;Systems Engineering SIMILAR Methodology Example&lt;/h2&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Systems engineering is an interdisciplinary team method meant to create a successful system as described by INCOSE. The systems engineering process takes into account both the business and technical needs of all the clients or customers. The ultimate goal of Systems Engineering is to provide a quality product that meets the client or customers needs as INCOSE points out. Systems engineering is concerned with handling a problem that is complex. The systems engineering process assists a team working on a solution to avoid omissions and invalid assumptions, can assist them in managing changing issues, and efficiently produce a cost-effective and robust solution as described by INCOSE. Using a systems engineering approach to building products and solutions efficient use of project cost and timeframes are managed and controlled effectively. The systems engineering team is always aware of the project requirements, interfaces and issues along with what the consequences are of making a change to the systems engineering plan and how the change will impact the overall project. Research showed, according to INCOSE, that systems engineering can save from 10% to 20% of a project's budget. INCOSE also points out that half of all project failure is preventable by using systems engineering techniques. The purpose of this paper is to discuss a practical example of System Engineering.
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/p&gt;</description></item><item><title>Understanding the Various Branches of Information Security</title><link>https://www.billbrown.info/post/understanding-the-various-branches-of-information-security/</link><pubDate>Mon, 03 Nov 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/understanding-the-various-branches-of-information-security/</guid><description>
&lt;h2 id="understanding-the-various-branches-of-information-security"&gt;Understanding the Various Branches of Information Security&lt;/h2&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The purpose of information security is to protect a companies or organization's valuable assets as Peltier (2013) points out. Information security includes securing computer hardware and software and information or data. The information security team, using the appropriate applications assist in defending the mission of the company or organization by protecting the physical and financial resources, reputation, legal position, employees and assets. An organizations information security program is devised so that security enables the organization to move forward not slow productivity down. For information security to become highly productive in a company, the company must explore and assess the information security risks to business unit(s) operations. The business or organization must also identify what policies, standards, and controls are essential in implementing to reduce the security risks identified. Promoting awareness and understanding amongst the team members is also required. Once policies, standards, and controls are implemented information security must assess the compliance and control effectiveness of what is put and place and revise if needed as Peltier (2013) discusses. The security enabled in a business must be layered in design and the approach to security is sometimes referred to as multilayered defense or defense in depth as Solomon, Kim, &amp;amp; Carrell (2015) discuss. The purpose of the paper is explain why it is important to understand the various branches of security.[^6][^8]
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/p&gt;</description></item><item><title>Information Security for Protecting Organizational Assets</title><link>https://www.billbrown.info/post/information-security-protecting-organizational-assets-and-enabling-business-operations/</link><pubDate>Sun, 02 Nov 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/information-security-protecting-organizational-assets-and-enabling-business-operations/</guid><description>
&lt;h2 id="information-security-protecting-organizational-assets-and-enabling-business-operations"&gt;Information Security: Protecting Organizational Assets and Enabling Business Operations&lt;/h2&gt;
&lt;h2 id="purpose-of-information-security"&gt;Purpose of Information Security&lt;/h2&gt;
&lt;p&gt;The reason that information security exists is to protect a company's or organization's valuable assets. Information security includes information or data, computer hardware, and software. The information security team, using the appropriate safeguards and applications contributes to the mission of the company or organization by protecting the physical and financial resources, reputation, legal position, employees and other assets (Peltier, 2013, p. xi).&lt;/p&gt;</description></item><item><title>HealthCare.gov Troubled Launch: Management and Risk Failures</title><link>https://www.billbrown.info/post/a-shaky-start-for-healthcare-gov/</link><pubDate>Sat, 01 Nov 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/a-shaky-start-for-healthcare-gov/</guid><description>
&lt;h2 id="a-shaky-start-for-healthcaregov"&gt;A Shaky Start for HealthCare.Gov&lt;/h2&gt;
&lt;h3 id="original-query"&gt;Original Query&lt;/h3&gt;
&lt;p&gt;A Shaky Start for HealthCare.Gov - Analysis of project implementation, risk factors, management problems, and lessons learned from the troubled launch of the Affordable Care Act's health insurance marketplace website.&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;h3 id="why-was-the-healthcaregov-project-so-important"&gt;Why Was the HealthCare.gov Project So Important?&lt;/h3&gt;
&lt;p&gt;The Affordable Care Act (ACA), signed into law on March 23, 2010, by President Barack Obama changed health care for all Americans from the date enacted. Hamel, Blumenthal, Abrams, &amp;amp; Nuzum (2015) point out that the two principal goals of the ACA are the expansion of health insurance and a new health care delivery system with the main access points for customers is the website HealthCare.gov. They go on to discuss during the first five years of the ACA the estimated number of uninsured who have signed up for health insurance including young adults had become eligible to join their parents' policies, is estimated to be at least 16.4 million. Of all the users signed up 87% received a government subsidy.&lt;/p&gt;</description></item><item><title>Does Big Data Analytics Bring Big Rewards for Business?</title><link>https://www.billbrown.info/post/does-big-data-bring-big-rewards/</link><pubDate>Fri, 31 Oct 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/does-big-data-bring-big-rewards/</guid><description>
&lt;h2 id="does-big-data-bring-big-rewards"&gt;Does Big Data Bring Big Rewards?&lt;/h2&gt;
&lt;h3 id="original-query"&gt;Original Query&lt;/h3&gt;
&lt;p&gt;Does Big Data Bring Big Rewards? - A case study analysis examining various types of big data collected by organizations, business intelligence technologies implemented, business benefits obtained, and management considerations before adopting big data solutions.&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;h3 id="types-of-big-data-collected-by-organizations"&gt;Types of Big Data Collected by Organizations&lt;/h3&gt;
&lt;p&gt;There are many different kinds of big data outlined in the case. Research by Wu, Zhu, Wu &amp;amp; Ding (2014) describes many complex, diverse data types. Examples of big data, data types comprise of structured, unstructured data, and semi-structured data. Big Data can also include tabular data (relational databases), text, hypertext, image, audio and video data. Within the case study, the different kinds of data collected include many data types. The case study helps understand that there are many types of big data within each of the data types.&lt;/p&gt;</description></item><item><title>AWS Cloud Security Risks, Compliance, and Best Practices</title><link>https://www.billbrown.info/post/amazon-web-services-cloud-information-security-risks-and-compliance/</link><pubDate>Thu, 30 Oct 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/amazon-web-services-cloud-information-security-risks-and-compliance/</guid><description>
&lt;h2 id="amazon-web-services-cloud-information-security-risks-and-compliance"&gt;Amazon Web Services Cloud Information Security Risks and Compliance&lt;/h2&gt;
&lt;h2 id="abstract"&gt;Abstract&lt;/h2&gt;
&lt;p&gt;This paper examines the critical security considerations and compliance requirements for organizations migrating to Amazon Web Services (AWS) cloud infrastructure, addressing the widespread concerns among IT professionals regarding cloud security risks. The research explores AWS's Shared Responsibility Model as the fundamental framework for delineating security obligations between AWS and its customers, where AWS manages the security &amp;quot;of&amp;quot; the cloud infrastructure while customers maintain responsibility for security &amp;quot;in&amp;quot; the cloud. Through analysis of AWS's global infrastructure security services, the paper identifies key customer responsibilities including operating system security, data encryption, network configuration, and identity access management, while AWS maintains the physical infrastructure, hypervisor, and managed services.&lt;/p&gt;</description></item><item><title>Common Issues with Security Policy Implementation</title><link>https://www.billbrown.info/post/common-issues-with-security-policy-implementation/</link><pubDate>Wed, 29 Oct 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/common-issues-with-security-policy-implementation/</guid><description>
&lt;h2 id="common-issues-with-security-policy-implementation"&gt;Common Issues with Security Policy Implementation&lt;/h2&gt;
&lt;h3 id="original-query"&gt;Original Query&lt;/h3&gt;
&lt;p&gt;Discuss common issues with implementation of security policies and Discuss include common issues and possible mitigations to ensure policy can be enforced.&lt;/p&gt;
&lt;h3 id="common-implementation-issues"&gt;Common Implementation Issues&lt;/h3&gt;
&lt;p&gt;&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
Implementation issues happen with security policies. Some of the common implementation issues, as described by Johnson (2014) are organization structure, fitting policies to leaders and targeting early adopters. The implementation of the policy has to take into account the type of organization, how large or small the organization is and what kind of technology is in use. One leader may present a security policy in a team meeting or town hall while another leader may be more hierarchical in the approach by holding a series of group meetings.&lt;/p&gt;</description></item><item><title>Incident Response Best Practices and AWS Forensic Procedures</title><link>https://www.billbrown.info/post/incident-response-process-best-practices-and-aws-forensic-procedures/</link><pubDate>Tue, 28 Oct 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/incident-response-process-best-practices-and-aws-forensic-procedures/</guid><description>
&lt;h2 id="incident-response-process-best-practices-and-aws-forensic-procedures"&gt;Incident Response Process Best Practices and AWS Forensic Procedures&lt;/h2&gt;
&lt;h3 id="topic-or-question"&gt;Topic or Question&lt;/h3&gt;
&lt;p&gt;&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
There are so many methods and best practices for handling incidents. Outline what an incident response process based on what is in the text. What is the process order, what may be missing, and how could the process be improved?&lt;/p&gt;
&lt;h3 id="introduction-to-incident-response-and-management"&gt;Introduction to Incident Response and Management&lt;/h3&gt;
&lt;p&gt;Incident response (IR) and Incident Management (IM) are similar when a disaster of any type occurs as described by Peltier (2013). IR and IM concepts document and developed and get utilized no matter why type of disaster that happened. The disaster could occur by computer security breach, a physical security attack or a natural disaster such as an earthquake.&lt;/p&gt;</description></item><item><title>Business Continuity and Disaster Recovery Planning Models</title><link>https://www.billbrown.info/post/compare-and-contrast-various-business-continuity-and-disaster-recovery-planning-models/</link><pubDate>Mon, 27 Oct 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/compare-and-contrast-various-business-continuity-and-disaster-recovery-planning-models/</guid><description>
&lt;h2 id="compare-and-contrast-various-business-continuity--disaster-recovery-planning-models"&gt;Compare and Contrast Various Business Continuity &amp;amp; Disaster Recovery Planning Models&lt;/h2&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Business continuity is essential as described by Hiles (2014). It is the ability of an organization to survive and thrive, survive and bounce back after a disaster or catastrophes. The general objective is to accomplish the mission for the organization no matter what disruptions happen along the way. Business continuity as described by Rima (2013) focuses on an organization's capacity to continue operations irrespective of the nature of interruption. The business continuity planning (BCP) which is a methodology that can be studied, and practitioners can be certified by Rima (2013) points out. The disaster recovery plan is considered a subset of BCP since it addresses stopping the effects of the disaster, catastrophe or event. After the consequences of the disaster or event have been resolved, business continuity activities typically begin. Business continuity as described by Hiles (2014) is the constant readiness of all necessary assets that support critical business functions. Business continuity management (BCM) offers the readiness of the process and resources following a disruption in the business to ensure the continued achievement of mission critical objectives.
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/p&gt;</description></item><item><title>BCP &amp; DR Planning: Common Approaches, Drawbacks, and Mitigations</title><link>https://www.billbrown.info/post/common-approaches-and-drawbacks-in-business-continuity-and-disaster-recovery-plans/</link><pubDate>Sun, 26 Oct 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/common-approaches-and-drawbacks-in-business-continuity-and-disaster-recovery-plans/</guid><description>
&lt;h2 id="common-approaches-and-drawbacks-in-business-continuity-and-disaster-recovery-plans"&gt;Common Approaches and Drawbacks in Business Continuity and Disaster Recovery Plans&lt;/h2&gt;
&lt;p&gt;&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
Business continuity is essential as described by Hiles (2014). It is the ability of an organization to survive and thrive, survive and bounce back after a disaster or catastrophes. The general objective is to accomplish the mission for the organization no matter what disruptions happen along the way. Business continuity as described by Rima (2013) focuses on an organization's capacity to continue operations irrespective of the nature of interruption. The business continuity planning (BCP) is a methodology that can be studied, and practitioners can be certified by Rima (2013) points out. A Disaster recovery plan is a subset of BCP since it addresses stopping the effects of the disaster, catastrophe or event. After the effects of the disaster or event have been addressed, business continuity activities typically begin.&lt;/p&gt;</description></item><item><title>Types of Security Architecture and Design Models Explained</title><link>https://www.billbrown.info/post/appraise-the-various-types-of-security-architecture-and-design-models/</link><pubDate>Sat, 25 Oct 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/appraise-the-various-types-of-security-architecture-and-design-models/</guid><description>
&lt;h2 id="appraise-the-various-types-of-security-architecture--design-models"&gt;Appraise the Various Types of Security Architecture &amp;amp; Design Models&lt;/h2&gt;
&lt;h3 id="security-architecture-overview"&gt;Security Architecture Overview&lt;/h3&gt;
&lt;p&gt;&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
Security architecture is the view of the overall system architecture from a security perspective. Security architecture provides insight into the security services, mechanisms, technologies, and features that can be used to satisfy system security requirements as described by Tipton &amp;amp; Krause (2003). The security architecture offers recommendations in the context of the overall system architecture, and security mechanisms should be placed. The security view of a system architecture emphases the system security services and mechanisms, implementation of security related functionality, and identifies interdependencies among security-related components, services, mechanisms, and technologies, and at the same time reconciling any conflict between them. The security architecture is one aspect of an enterprise or system architecture, and can also include network architecture or connectivity architecture.&lt;/p&gt;</description></item><item><title>Physical Security Failure Points and Mitigation Strategies</title><link>https://www.billbrown.info/post/common-points-of-failure-and-strategies-to-mitigate-physical-security-deficiencies/</link><pubDate>Fri, 24 Oct 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/common-points-of-failure-and-strategies-to-mitigate-physical-security-deficiencies/</guid><description>
&lt;h2 id="common-points-of-failure-and-strategies-to-mitigate-physical-security-deficiencies"&gt;Common Points of Failure and Strategies to Mitigate Physical Security Deficiencies&lt;/h2&gt;
&lt;h3 id="layered-defense-approach"&gt;Layered Defense Approach&lt;/h3&gt;
&lt;p&gt;&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
The nature of physical security ought to be like concentric rings or layers of defense with requirements for access that gets more difficult the closer one get to the center of the rings as described by Peltier (2013). The reason for the rings of security is evident because the security team takes some precautions to protect the organization.&lt;/p&gt;</description></item><item><title>Physical Security Models: Features and Functionality Compared</title><link>https://www.billbrown.info/post/evaluating-features-and-functionality-of-physical-security-models/</link><pubDate>Thu, 23 Oct 2025 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/evaluating-features-and-functionality-of-physical-security-models/</guid><description>
&lt;h2 id="evaluating-the-features-and-functionality-of-various-physical-security-models"&gt;Evaluating the Features and Functionality of Various Physical Security Models&lt;/h2&gt;
&lt;h3 id="three-levels-of-information-security"&gt;Three Levels of Information Security&lt;/h3&gt;
&lt;p&gt;&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
Logical security, physical security, and premise security are the three levels of information security as described by Vacca (2013). Logical security protects data stored on computers from software and network threats. The physical safety or infrastructure security protects the information systems that store the data. Physical security must also protect the people who operate and maintain systems and those who use the data. Premises security normally entails protecting facilities security. Premise security protects the people and property within the facility or building(s) that make up the organization.&lt;/p&gt;</description></item><item><title>Cryptology Methods in Organizations, CAC vs. User/Password</title><link>https://www.billbrown.info/post/cryptology-methods-in-organizations-cac-vs-user-password/</link><pubDate>Fri, 26 Apr 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/cryptology-methods-in-organizations-cac-vs-user-password/</guid><description>
&lt;h2 id="cryptology-methods-in-organizations-cac-vs-userpassword"&gt;Cryptology Methods in Organizations, CAC vs. User/Password&lt;/h2&gt;
&lt;p&gt;This text explores the different cryptology methods used for authentication within organizations. It compares the Common Access Card (CAC), used by federal agencies, with traditional username and password systems.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CAC:&lt;/strong&gt; The CAC offers two-factor authentication with a physical card and a PIN. PKI certificates on the card enable encryption and secure communication. This method is more secure than single-factor authentication. However, it has limitations such as the &amp;quot;bathroom effect&amp;quot; and the inability to access multiple systems simultaneously.&lt;/p&gt;</description></item><item><title>Access Control Methods: MAC, DAC, RBAC, and More</title><link>https://www.billbrown.info/post/access-control-methods-a-comprehensive-guide/</link><pubDate>Thu, 25 Apr 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/access-control-methods-a-comprehensive-guide/</guid><description>
&lt;h2 id="access-control-methods-a-comprehensive-guide"&gt;Access Control Methods: A Comprehensive Guide&lt;/h2&gt;
&lt;p&gt;Access control is a cornerstone of information security, protecting valuable data and assets by regulating who or what can access them. This includes both physical and digital spaces. Access control systems enforce these rules, supporting the fundamental principles of confidentiality, integrity, and availability.&lt;/p&gt;
&lt;p&gt;There are various access control categories:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Administrative controls:&lt;/strong&gt; Policies, procedures, security awareness training&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Physical controls:&lt;/strong&gt; Security cameras, guards, locked rooms.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Technical controls:&lt;/strong&gt; Encryption, smart cards, access control lists (ACLs).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Key access control models include:&lt;/p&gt;</description></item><item><title>Building Effective Security Awareness in Your Organization</title><link>https://www.billbrown.info/post/building-effective-security-awareness-in-your-organization/</link><pubDate>Wed, 24 Apr 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/building-effective-security-awareness-in-your-organization/</guid><description>
&lt;h2 id="building-effective-security-awareness-in-your-organization"&gt;Building Effective Security Awareness in Your Organization&lt;/h2&gt;
&lt;p&gt;In today's rapidly evolving technological landscape, security awareness is paramount. While technology improves, so do the tactics of bad actors. A robust security awareness program is essential for any organization to ensure that users understand and fulfill their information security responsibilities. This begins with clear policies and procedures, but must extend to continuous education and engagement. Effective security awareness empowers employees to recognize threats, protects valuable information assets, and fosters a strong security culture within the organization.&lt;/p&gt;</description></item><item><title>Symmetric, Asymmetric, and Hash Functions in Cryptography</title><link>https://www.billbrown.info/post/understanding-cryptography-symmetric-asymmetric-and-hash-functions/</link><pubDate>Tue, 23 Apr 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/understanding-cryptography-symmetric-asymmetric-and-hash-functions/</guid><description>
&lt;h2 id="understanding-cryptography-symmetric-asymmetric-and-hash-functions"&gt;Understanding Cryptography: Symmetric, Asymmetric, and Hash Functions&lt;/h2&gt;
&lt;p&gt;Cryptography, the practice of secure communication, encompasses several distinct approaches. Symmetric algorithms rely on a single, shared secret key between parties for both encryption and decryption. Asymmetric (public key) algorithms use a pair of keys – one public for encryption, and one private for decryption. Hash functions produce unique &amp;quot;fingerprints&amp;quot; of data, ensuring integrity and enabling applications like password storage. Understanding these distinct algorithms is crucial for choosing the appropriate method to protect sensitive information in various digital contexts.&lt;/p&gt;</description></item><item><title>Information Security &amp; Risk Management: Recommended Approach</title><link>https://www.billbrown.info/post/a-recommended-course-of-action-for-information-security-and-risk-management/</link><pubDate>Fri, 05 Apr 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/a-recommended-course-of-action-for-information-security-and-risk-management/</guid><description>
&lt;h2 id="a-recommended-course-of-action-for-information-security--risk-management"&gt;A Recommended Course of Action for Information Security &amp;amp; Risk Management&lt;/h2&gt;
&lt;p&gt;This blog post explores a recommended course of action for implementing information security risk management within an organization, drawing insights from ISO 27002.
keywords:&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;p&gt;Information security and risk management are vital to the safety of organizations. A recommended normal course of implementing security risk management and information security follows. Starting with security risk management and then discussing information security within an organization. The Organization's information security risk assessment and information security policy have a direct relationship as Layton (2016) described.&lt;/p&gt;</description></item><item><title>Why Your Company Needs an Information Security Program</title><link>https://www.billbrown.info/post/why-is-an-information-security-program-important-for-your-company/</link><pubDate>Thu, 04 Apr 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/why-is-an-information-security-program-important-for-your-company/</guid><description>
&lt;h2 id="why-is-an-information-security-program-important-for-your-company"&gt;Why is an Information Security Program Important for Your Company?&lt;/h2&gt;
&lt;p&gt;Understand why information security programs are crucial for businesses. Learn how they protect assets, raise awareness, and manage risks.&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;p&gt;&lt;strong&gt;Why is an information security program important?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Information security is relevant and essential to a company because it protects the organization's valuable resources. A few examples of organization assets to protect are computer hardware, applications code, legal documents, and physical security of the organization office, as Peltier (2013) discusses. The security team in the organization must pick and implement the appropriate safeguards that assist the company's mission by defending financial and physical resources, their reputation, the employees, and any other tangible or intangible assets. Some employees believe security, as Peltier (2013) points out, prevents organizational goals from being reached by putting poorly selected rules and procedures on members of the organization and systems in place. A set of well-written policies, standards, and procedures are put in place to protect assets and support all business objectives.&lt;/p&gt;</description></item><item><title>LTE Cat M1 The Future of Cellular Networks for IoT</title><link>https://www.billbrown.info/post/the-future-of-cellular-networks-for-iot/</link><pubDate>Thu, 14 Mar 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/the-future-of-cellular-networks-for-iot/</guid><description>
&lt;h2 id="the-cellular-lte-category-cat-m1-netorking-protocol-the-future-of-cellular-networks-for-iot"&gt;The Cellular LTE Category (cat) M1 Netorking Protocol The Future of Cellular Networks for IoT&lt;/h2&gt;
&lt;h3 id="this-blog-post-explores-the-emerging-role-of-lte-cat-m1-technology-in-the-internet-of-things-iot-landscape"&gt;This blog post explores the emerging role of LTE Cat M1 technology in the Internet of Things (IoT) landscape.&lt;/h3&gt;
&lt;p&gt;&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
A technology trend that is important in the local area network (LAN) or metro area network (MAN) is cellular data networks or Wireless Local Area Networks (WLAN). The cellular data technology Long Term Evolution (LTE) can deliver speeds up to 300 megabytes per second downstream and 75 megabytes a second upstream, as described by Comer (2014). Part of the LTE standards releases 13 by the 3rd Generation Partnership Project (3GPP) group is category M1.&lt;/p&gt;</description></item><item><title>Internet Routing: Algorithms, Protocols, and Security</title><link>https://www.billbrown.info/post/a-look-into-internet-routing-algorithms-protocols-and-security/</link><pubDate>Wed, 13 Mar 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/a-look-into-internet-routing-algorithms-protocols-and-security/</guid><description>
&lt;h2 id="reviewing-the-ibternet-routing-including-algorithms-protocols-and-security"&gt;Reviewing the Ibternet Routing: Including Algorithms, Protocols, and Security&lt;/h2&gt;
&lt;h3 id="explore-the-world-of-internet-routing-how-data-packets-navigate-the-complex-network-from-addressing-and-protocols-to-security-risks-and-router-trends"&gt;Explore the world of internet routing: how data packets navigate the complex network, from addressing and protocols to security risks and router trends.&lt;/h3&gt;
&lt;p&gt;Routing in the Internet and other networks (algorithms, standards, implementations, quality-of-service, security risks, router trends, etc.).
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Overview of Routing&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Routing is described by Zupan, Ramasamy &amp;amp; Medhi (2010) as enabling the electronic communication network to send packets or units of information from one point to another through a computer network. The network can achieve communications over the network quickly and efficiently.&lt;/p&gt;</description></item><item><title>VoIP's Impact on PSTN, Cellular Networks, and Beyond</title><link>https://www.billbrown.info/post/voip-the-future-is-now-impacting-pstn-cellular-networks-and-beyond/</link><pubDate>Thu, 07 Mar 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/voip-the-future-is-now-impacting-pstn-cellular-networks-and-beyond/</guid><description>
&lt;h2 id="voice-over-ip-voip-the-future-is-now---impacting-pstn-cellular-networks-and-beyond"&gt;Voice Over IP (VoIP) The Future is Now - Impacting PSTN, Cellular Networks, and Beyond&lt;/h2&gt;
&lt;h3 id="explore-the-present-state-of-voip-voice-over-internet-protocol-its-growing-influence-on-traditional-phone-lines-pstn-and-cellular-networks-and-its-promising-future"&gt;Explore the present state of VoIP (Voice over Internet Protocol), its growing influence on traditional phone lines (PSTN) and cellular networks, and its promising future.&lt;/h3&gt;
&lt;p&gt;The state of VoIP, its impact on the PSTN and cellular systems, and prediction of its future.&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;p&gt;VoIP is a very active. Many houses still have PSTN lines installed at the house. When our family moved back from New Zealand, we didn’t have a landline or PSTN line installed in the house. Only Comcast Internet was installed at the house.&lt;/p&gt;</description></item><item><title>IPv4 Address Exhaustion and the Case for IPv6 Adoption</title><link>https://www.billbrown.info/post/from-scarcity-to-abundance-unveiling-the-need-for-ipv6-adoption/</link><pubDate>Tue, 05 Mar 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/from-scarcity-to-abundance-unveiling-the-need-for-ipv6-adoption/</guid><description>
&lt;h2 id="the-need-for-ipv6-adoption"&gt;The Need for IPv6 Adoption&lt;/h2&gt;
&lt;h3 id="the-driving-force-behind-the-transition-from-ipv4-to-ipv6---the-exhaustion-of-ipv4-addresses-learn-about-the-challenges-and-the-urgency-for-both-industry-and-government-to-embrace-this-critical-shift"&gt;The driving force behind the transition from IPv4 to IPv6 - the exhaustion of IPv4 addresses. Learn about the challenges and the urgency for both industry and government to embrace this critical shift.&lt;/h3&gt;
&lt;p&gt;&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;strong&gt;The unique characteristics of IPv6 in fulfillment of IPv4's deficiencies, and the challenges confronting both the industry and the government in transitioning from IPv4 to IPv6.&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Internet of Things (IoT): Rise and Impact on Daily Life</title><link>https://www.billbrown.info/post/the-rise-of-the-internet-of-things-iot-and-its-impact-on-lives/</link><pubDate>Fri, 01 Mar 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/the-rise-of-the-internet-of-things-iot-and-its-impact-on-lives/</guid><description>
&lt;h2 id="internet-of-things-iot-and-its-impact-on-our-lives"&gt;Internet of Things (IoT) and its Impact on Our Lives&lt;/h2&gt;
&lt;p&gt;A technological trend that started in its infancy years ago is now proliferating: the use of the Internet of Things (IoT). The term IoT was coined in 1982, as described by research by Farooq, Waseem, Mazhar, Khairi, and Kamal (2015). They describe the first IoT project as a modified Coke machine, which was network-enabled and connected to the Internet. The Coke machine could remotely identify the number of cans in the machine and whether they were cold over the Internet. In 1991, Mark Weiser, a visionary who worked at Parc Xerox, had a contemporary vision of IoT, back then called ubiquitous computing. Weiser envisioned embedding microprocessors in everyday objects so they can communicate information. Kevin Ashton, in 1999, proposed the term “Internet of Things” to describe a system of interconnected devices. The basic idea of IoT is to allow the exchange of information between invisibly embedded different real-world devices around us.&lt;/p&gt;</description></item><item><title>Wired vs. Wireless Data Transmission: Impact and Differences</title><link>https://www.billbrown.info/post/understanding-data-transmission-wired-vs-wireless-and-their-impact/</link><pubDate>Thu, 29 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/understanding-data-transmission-wired-vs-wireless-and-their-impact/</guid><description>
&lt;h2 id="gain-an-understanding-data-transmission-wired-vs-wireless-and-their-impact"&gt;Gain an Understanding Data Transmission: Wired vs. Wireless and Their Impact&lt;/h2&gt;
&lt;p&gt;Transmissions are impacted by different problems depending on the method of data transmission. The two types of data communications or transmissions are guided and unguided transmission, as Comer (2014) discusses. Guided media or wire transmissions consist of fiber optic, coaxial cable, and copper or aluminum twisted pair wire, as Varrall (2011) discusses. Unguided media, also known as wireless communication, transports electromagnetic waves with no physical conductor. Instead of physical conductors, the signal is broadcast via air and, therefore, is made accessible to someone having a device capable of receiving them, as Shinde (2000) describes.&lt;/p&gt;</description></item><item><title>DSL, Cable, Fiber &amp; Cellular: Broadband Technologies Guide</title><link>https://www.billbrown.info/post/understanding-broadband-technologies-dsl-cable-fiber-cellular-and-more/</link><pubDate>Wed, 28 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/understanding-broadband-technologies-dsl-cable-fiber-cellular-and-more/</guid><description>
&lt;h2 id="what-is-broadband-different-types-of-broadband-technologies-explained"&gt;What is Broadband? Different Types of Broadband Technologies Explained&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;What Is Broadband?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Broadband has grown worldwide, promoted by policymakers, network operators, and content providers, but it does not have a single standardized definition worldwide, as described by Kelly (2012). Broadband can mean multiple aspects of the network and services. This may or may not include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The infrastructure used to deliver broadband services.&lt;/li&gt;
&lt;li&gt;High-speed access to the Internet.&lt;/li&gt;
&lt;li&gt;Services and applications available via broadband networks.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;As Kelly (2012) points out, many countries established broadband based on the speed of services and applications offered on the network. Due to each country’s unique needs and history, including economic, geographic, and regulatory factors, definitions of broadband vary widely.&lt;/p&gt;</description></item><item><title>Database Failure Types, Causes, and Recovery Solutions</title><link>https://www.billbrown.info/post/database-failures-types-and-solutions/</link><pubDate>Sat, 24 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/database-failures-types-and-solutions/</guid><description>
&lt;h2 id="types-of-computer-failures"&gt;Types of Computer Failures&lt;/h2&gt;
&lt;p&gt;Database failures can usually be categorized into transaction, system, or media failures. Failed transactions in the middle of the execution can occur for many reasons, as described by Elmasri &amp;amp; Navathe (2015).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Most Common Failures:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The most common failures are described as computer failure, transaction or system error, exception or local error, database concurrency, or deadlock.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Computer failure:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Computer failures, sometimes called system crashes by specialists, occur when a piece of hardware fails. In high-end systems, there are usually redundant hardware components to keep the failures from occurring, but they do happen. A software failure is another type of computer failure. The software failure could be due to a vendor defect or by an application programming defect introduced in the code. The last example of a computer failure would be a network failure. A network failure can occur when a firewall change is introduced, the Internet connection fails, the firmware is updated on the switch, or other networking issues.&lt;/p&gt;</description></item><item><title>Disaster Recovery from Catastrophic Database Failures</title><link>https://www.billbrown.info/post/disaster-recovery-from-catastrophic-database-failures/</link><pubDate>Fri, 23 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/disaster-recovery-from-catastrophic-database-failures/</guid><description>
&lt;h2 id="describe-how-disaster-recovery-from-catastrophic-failures-is-handled-illustrate-in-detail"&gt;Describe how disaster recovery from catastrophic failures is handled. Illustrate in detail&lt;/h2&gt;
&lt;p&gt;Catastrophes can be broken down into two subcategories: physical problems and catastrophes. Physical catastrophes can be air conditioner failures, power issues, fire, or hacking attacks. Catastrophic errors are usually caused by major disasters such as earthquakes or floods, which deem the data center no longer usable, as Elmasri &amp;amp; Navathe (2015) described.&lt;/p&gt;
&lt;p&gt;When a physical problem or failure occurs with the database, such as a power outage, the database has restart capabilities built into it at start-up. The server power is restored, and the database management system is started. When starting, the database will go into recovery mode and replay or REDO the transactions in flight when the power outage occurred.&lt;/p&gt;</description></item><item><title>Essential Measures for Preventing SQL Injection Attacks</title><link>https://www.billbrown.info/post/essential-measures-in-preventing-sql-injection-attacks/</link><pubDate>Thu, 22 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/essential-measures-in-preventing-sql-injection-attacks/</guid><description>
&lt;h2 id="preventive-measures-against-sql-injection-attacks"&gt;Preventive Measures Against SQL Injection Attacks&lt;/h2&gt;
&lt;p&gt;An SQL injection attack occurs by having an attacker inject a string input into the application; these changes or manipulate the SQL statement to the attacker’s advantage, as described by Elmasri &amp;amp; Navathe (2015). They indicate that an SQL injection attack inflicts damage to the database management system. Examples of ways damage could be done are unauthorized manipulation of data, retrieval of sensitive data, or execution of operating system-level commands.&lt;/p&gt;</description></item><item><title>Functional Dependency Closure Explained for Database Design</title><link>https://www.billbrown.info/post/what-is-meant-by-the-closure-of-a-set-of-functional-dependencies/</link><pubDate>Sat, 17 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/what-is-meant-by-the-closure-of-a-set-of-functional-dependencies/</guid><description>
&lt;h2 id="what-is-meant-by-the-closure-of-a-set-of-functional-dependencies"&gt;What Is Meant by the Closure of a Set of Functional Dependencies?&lt;/h2&gt;
&lt;p&gt;A functional dependency is a one-way dependency between two attributes at any given time. For a unique attribute&lt;/p&gt;
&lt;p&gt;of value A there is one value of the attribute B associated with it through the relation. Even if the values for the attribute change, there is only one, as described by Harrington(2009). A functional dependency, as explained by Elmasri &amp;amp; Navathe (2015), is a constraint between two sets of attributes from the database.&lt;/p&gt;</description></item><item><title>Variable-Length Records and Separator Characters Explained</title><link>https://www.billbrown.info/post/reasons-for-having-variable-length-records-and-the-use-of-separator-characters/</link><pubDate>Sat, 17 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/reasons-for-having-variable-length-records-and-the-use-of-separator-characters/</guid><description>
&lt;h2 id="the-reasons-for-having-variable-length-records-and-the-use-of-separator-characters"&gt;The Reasons For Having Variable-Length Records And The Use Of Separator Characters&lt;/h2&gt;
&lt;p&gt;There may be many reasons for a file having variable-length records, as described by Elmasri &amp;amp; Navathe (2015). They are described as one field that may need to be a varying size, a field that may contain a repeating group or value, a field that may be identified as an optional field, or a file that may contain more than one record type.&lt;/p&gt;</description></item><item><title>Database Anomalies: Insertion, Deletion, and Modification</title><link>https://www.billbrown.info/post/database-anomalies-insertion-deletion-and-odification/</link><pubDate>Fri, 16 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/database-anomalies-insertion-deletion-and-odification/</guid><description>
&lt;h2 id="insertion-deletion-and-modification-anomalies-are-considered-bad"&gt;Insertion, Deletion, and Modification Anomalies Are Considered Bad&lt;/h2&gt;
&lt;p&gt;An insertion anomaly is a situation that arises when one is prevented from inserting data into a relation because the complete primary key is not available. No part of a primary key can be null. Harrington (2009) points out that insertion anomalies usually occur in first-normal form relations that do not exist in the higher normal forms.&lt;/p&gt;
&lt;p&gt;Insertion anomalies occur because there is usually data about more than one entity in the relation. An example of customer, item, and orders will be used to show an example of an insertion anomaly.&lt;/p&gt;</description></item><item><title>Demystifying SQL Retrieval Queries A Step-by-Step Breakdown</title><link>https://www.billbrown.info/post/conceptually-the-steps-of-execution-of-six-sql-clauses/</link><pubDate>Thu, 15 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/conceptually-the-steps-of-execution-of-six-sql-clauses/</guid><description>
&lt;h2 id="how-is-sql-query-retrieved-and-conceptually-what-is-the-order-of-executing-each-of-the-six-clauses"&gt;How Is SQL Query Retrieved, and Conceptually, What Is The Order oF Executing Each of The Six Clauses?&lt;/h2&gt;
&lt;p&gt;SQL or the Structured Query Language described by Bowman, Emerson, &amp;amp; Darnovsky (1997) was proposed in 1970 by Dr. E. F. Codd at IBM and developed the SQL language over the next decade at research facilities and universities. IBM announced the first commercial SQL production database in 1981, called SQL/DS.&lt;/p&gt;
&lt;p&gt;The database management system (DBMS) is a complex application software. Before discussing conceptually how an SQL retrieval query is executed by specifying the conceptual order of executing each of the six clauses, let's understand how a DBMS processes SQL queries at a high level.&lt;/p&gt;</description></item><item><title>SQL Join Types: Inner vs. Outer Join Operations Explained</title><link>https://www.billbrown.info/post/what-are-the-various-inner-outer-join-operations-and-how-to-use/</link><pubDate>Wed, 14 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/what-are-the-various-inner-outer-join-operations-and-how-to-use/</guid><description>
&lt;h2 id="how-does-one-choose-between-the-sql-right-join-inner-vs-outer-in-sql"&gt;How Does One Choose Between the SQL Right Join Inner vs. Outer in SQL?&lt;/h2&gt;
&lt;p&gt;An SQL Join is an operation of accessing the data from two or more tables or relations. In simple terms, a join occurs whenever multiple tables or relations appear in the FROM clause of a query, as described by Bhanuprakash, Nijagunarya &amp;amp; Jayaram (2014).&lt;/p&gt;
&lt;p&gt;Any number of attributes or columns can be chosen in the SELECT clause. When two tables are joined, one must find the standard columns from both tables to join the tables with a relational operator. If a column has the same name in both tables, it must be qualified by the table name to avoid the uncertainty of which table the column’s data should be retrieved.&lt;/p&gt;</description></item><item><title>Attribute and Relationship Inheritance in EER Diagrams</title><link>https://www.billbrown.info/post/attribute-and-relationship-inheritance-in-eer-diagrams/</link><pubDate>Tue, 13 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/attribute-and-relationship-inheritance-in-eer-diagrams/</guid><description>
&lt;h2 id="the-mechanism-of-attributerelationship-inheritance-and-why-it-useful"&gt;The Mechanism of Attribute/Relationship Inheritance and Why it Useful&lt;/h2&gt;
&lt;p&gt;The enhanced entity-relationship (EER) diagram includes the principles of the entity-relationship diagram with the addition of some other concepts as described by Tupper (2011). The additional concepts include subclasses and superclasses, specialization and generalization, inheritance, and categories.&lt;/p&gt;
&lt;p&gt;With entities in a logical model, there are often sub-groups that are of critical interest to the business area that is modeled. For example, let's look at the entity vehicle. Vehicle entities include cars, sports utility vehicles, hybrids, crossovers, and trucks. The vehicle would be a superclass, and the car, sports utility vehicle, hybrid, crossover, and trucks are subclasses.&lt;/p&gt;</description></item><item><title>Earned Value Management vs. Agile Project Management</title><link>https://www.billbrown.info/post/earned-value-management-evm-and-gile-project-management-a-comparison/</link><pubDate>Mon, 12 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/earned-value-management-evm-and-gile-project-management-a-comparison/</guid><description>
&lt;h2 id="earned-value-management-evm-and-agile-project-management---a-comparison"&gt;Earned Value Management (EVM) and Agile Project Management - A Comparison&lt;/h2&gt;
&lt;h2 id="this-article-explores-the-similarities-and-differences-between-evm-and-burn-charts-in-traditional-and-agile-project-management-discussing-their-applications-and-benefits"&gt;This article explores the similarities and differences between EVM and burn charts in traditional and agile project management, discussing their applications and benefits.&lt;/h2&gt;
&lt;p&gt;Earned Value Management (EVM) provides one of the most effective methods for evaluating, then monitoring, and controlling a project's progress, as described by Norman, Brotherton, &amp;amp; Fried (2011). The project manager analyzes the planned project progress and spending and compares this to the actual progress and actual project spending; the project manager can clearly view the project's planned, current, and anticipated value by calculating the EVM.&lt;/p&gt;</description></item><item><title>EPM Model and Project Management Office (PMO) Explained</title><link>https://www.billbrown.info/post/summary-of-enterprise-project-management-epm-model-and-the-project-management-office/</link><pubDate>Sun, 11 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/summary-of-enterprise-project-management-epm-model-and-the-project-management-office/</guid><description>
&lt;h2 id="summarize-enterprise-project-management-epm-and-project-management-office-pmo"&gt;Summarize Enterprise Project Management (EPM) and Project Management Office (PMO)&lt;/h2&gt;
&lt;h2 id="summarize-the-enterprise-project-management-epm-model-and-project-management-office-pmo"&gt;This article summarizes the Enterprise Project Management (EPM) model and Project Management Office (PMO) and how they relate to Agile Scrum and the Scaled Agile Framework (SAFe).
Summarize the Enterprise Project Management (EPM) model and Project Management Office (PMO).&lt;/h2&gt;
&lt;p&gt;Enterprise project management (EPM) takes into account the organizational processes that are in place, any technology that the company is using, and the company organization hierarchy or structure, which assists the company in devising a strategy for running many projects at once as described by Verzuh (2015)&lt;/p&gt;</description></item><item><title>Mapping EER Model Constructs to Relations in Your Database</title><link>https://www.billbrown.info/post/options-for-mapping-eer-model-constructs-to-relations/</link><pubDate>Sat, 10 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/options-for-mapping-eer-model-constructs-to-relations/</guid><description>
&lt;h2 id="the-options-for-mapping-eer-model-constructs-to-relations"&gt;The Options for Mapping EER Model Constructs to Relations&lt;/h2&gt;
&lt;p&gt;There are many ways of mapping the constructs from the EER model into the relational model. There are mapping of specializations or generalizations, shared subclasses, or multiple inheritance and categories.&lt;/p&gt;
&lt;p&gt;Several options are available for mapping several subclasses that together form a specialization.
There are two main options for map specializations. The first is to map the whole specialization or subclasses to one single table. The second is to map the specialization or subclasses to multiple tables. Each option is a variation that depends on the constraints on the specialization/generalization, as Elmasri (2015) described. There are a few options for mapping specialization or generalization, as Elmasri (2015) points out.&lt;/p&gt;</description></item><item><title>Object vs. Relational Databases: Key Design Differences</title><link>https://www.billbrown.info/post/the-main-differences-between-designing-relational-and-object-databases/</link><pubDate>Fri, 09 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/the-main-differences-between-designing-relational-and-object-databases/</guid><description>
&lt;h2 id="the-main-differences-between-designing-relational-and-object-databases"&gt;The main differences between designing relational and object databases**&lt;/h2&gt;
&lt;p&gt;Object databases and (ODB) relationships have three distinct differences: how relationships are handled, how inheritance is handled, and the timing of specifying operations in object databases compared to relational databases as described by Elmasri &amp;amp; Navathe (2015).&lt;/p&gt;
&lt;p&gt;Relationships are handled differently between ODBs and RDBs. The ODB uses the Object Identifier commonly known as an OID. The OID reference is the relationship property, or reference attribute, that relates objects, as Elmasri &amp;amp; Navathe (2015) point out. OID references for a binary relationship can be declared in one direction or both directions depending on the required access needed. If the binary relations is specified in both directions, this is the same as creating a relational database constraint.&lt;/p&gt;</description></item><item><title>Cursors in Embedded SQL: Usage, Power, and Performance</title><link>https://www.billbrown.info/post/the-cursor-and-the-useage-in-embedded-sql/</link><pubDate>Thu, 08 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/the-cursor-and-the-useage-in-embedded-sql/</guid><description>
&lt;h2 id="the-cursor-and-usage-in-embedded-sql"&gt;The cursor and usage in embedded SQL&lt;/h2&gt;
&lt;p&gt;The SQL language, by default, uses set-at-a-time processing. While this is used in most SQL queries, sometimes there is a need to loop through the set and execute a stored procedure or many different SQL statements for each row fetched. SELECT statements that return more than one row can present a problem when embedding them in a program, as Harrington (2010) identified. The host language variables can only handle one value at a time, and the SQL command processor cannot work with the host language arrays. So, the cursor allows the host language to extract a row at a time for processing.&lt;/p&gt;</description></item><item><title>Understanding Parameter Types in Database Cost Functions</title><link>https://www.billbrown.info/post/different-parameters-types-used-in-cost-functions-and-where-information-is-stored/</link><pubDate>Wed, 07 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/different-parameters-types-used-in-cost-functions-and-where-information-is-stored/</guid><description>
&lt;h2 id="different-parameter-types-in-database-cost-functions-and-their-information-storage"&gt;Different Parameter Types in Database Cost Functions and Their Information Storage&lt;/h2&gt;
&lt;p&gt;The cost function is part of the query cost optimization module of the database management system. Elmasri &amp;amp; Navathe (2015) indicate that the optimizer heuristic rules or query transformations are not the only dependencies used for cost optimization.&lt;/p&gt;
&lt;p&gt;The cost-based optimizer will estimate and compare the cost of executing a query by taking advantage of different execution strategies and algorithms, and it then chooses the strategy with the lowest cost estimate.&lt;/p&gt;</description></item><item><title>Agile Scrum Communication: Essential Tools and Techniques</title><link>https://www.billbrown.info/post/agile-scrum-project-communications/</link><pubDate>Sat, 20 Jan 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/agile-scrum-project-communications/</guid><description>
&lt;h2 id="enhancing-project-communication-essential-tools-and-techniques-in-agile-scrum"&gt;Enhancing Project Communication Essential Tools and Techniques in Agile Scrum&lt;/h2&gt;
&lt;p&gt;Our company is using Agile Scrum to manage the project. The project communication for Agile Scrum is different from normal project communication. There are a few Agile Scrum techniques for increasing communications. This post covers three. The daily stand-up, iteration planning, and demo review sessions.&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;p&gt;The daily communication with team members is achieved during a morning stand-up, as Cooke (2010) describes. The standup is normally done standing up, so it will not last long, but on our team, many sit down. The standup is for team members to communicate and coordinate what’s going on, monitor progress, and identify any obstacles that may be inhibiting progress, as Cooke (2010) discusses. The scrum master on our team displays an electronic Scrum board on the large screen in the meeting room using Rally Development software, now known as Computer Associates Agile. The software enables teams to support work with organizational priorities, continuously communicate on all the project progress, and coordinate work across multiple teams and distributed sites in the spirit of enterprise agility as described by RallyDev (2017). The scrum master displays current stories, which are units of work defined for a sprint, and asks each team member to communicate three things at the stand-up that usually lasts fifteen to thirty minutes. First, what did you complete yesterday? Then, what do you plan to complete today? Finally, do you have any blockers? The scrum master's job is to be sure the team members have no roadblocks that get in the way of completing stories in a sprint, as Cooke (2010) points out. The scrum master facilitates the meeting, and anything outside of the task's status on the scrum board is held until the end of stand-up for further discussion. This is referred as putting that discussion in the parking lot. The parking lot items come up during communication of status unrelated to a story, topic, or issue a team member would like to discuss with the team.&lt;/p&gt;</description></item><item><title>Software Project Estimation: Top Tools and Techniques</title><link>https://www.billbrown.info/post/the-two-most-important-tools-and-techniques-used-in-estimating-software-projects/</link><pubDate>Fri, 19 Jan 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/the-two-most-important-tools-and-techniques-used-in-estimating-software-projects/</guid><description>
&lt;h2 id="a-summary-of-the-two-most-important-tools-and-techniques-used-in-estimating-software-project"&gt;A Summary of the two most important tools and techniques used in estimating software project&lt;/h2&gt;
&lt;p&gt;Estimating is attempting to look into the future and predict the time and money needed to produce a result, as Verzuh (2015) points out. Since an estimate is, well, an estimate, it can be wrong sometimes, and stakeholders normally don’t like when project estimates or budgets do not align with the final cost, as Verzuh (2015) points out.&lt;/p&gt;</description></item><item><title>Managing Project Risks Tools and Strategies from Experience</title><link>https://www.billbrown.info/post/summarize-project-risk-management-what-tools-can-assist-in-mitigation-of-risks/</link><pubDate>Tue, 16 Jan 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/summarize-project-risk-management-what-tools-can-assist-in-mitigation-of-risks/</guid><description>
&lt;h2 id="here-we-summarize-risk-management-in-a-project-identify-tools-that-can-be-used-to-assist-in-risk-management"&gt;Here we summarize risk management in a project. Identify tools that can be used to assist in risk management&lt;/h2&gt;
&lt;p&gt;Most projects are put together and identify significant deliverables and milestones to be delivered in a project, as Wills &amp;amp; Governance (2015) discuss. The deliverables and milestones are normally identified at the start of the project. As a project moves through the deliverables and milestones, risks and issues arise, actions must be taken, and decisions must be made. Risk should be managed the same as the project as Wills &amp;amp; Governance (2015) point out.&lt;/p&gt;</description></item><item><title>Stakeholder Identification and Engagement for Project Success</title><link>https://www.billbrown.info/post/how-will-you-identify-stakeholder-and-keep-them-engaged-and-informed/</link><pubDate>Mon, 15 Jan 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/how-will-you-identify-stakeholder-and-keep-them-engaged-and-informed/</guid><description>
&lt;h2 id="how-will-you-identify-stakeholders-how-will-you-keep-your-stakeholders-engaged-and-informed"&gt;How will you identify stakeholders? How will you keep your stakeholders engaged and informed?&lt;/h2&gt;
&lt;p&gt;** At first, stakeholder identification seems pretty straightforward – name the people who will affect the project or be affected. All too frequently, some very important stakeholders are forgotten.&lt;/p&gt;
&lt;p&gt;How will you identify stakeholders? How will you keep your stakeholders engaged and informed?&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;p&gt;There are many ways to identify the stakeholder. One can use organization charts or directories to look for stakeholders, as Measey (2015) points out. When gathering stakeholders, it can be best to create a stakeholder list of people who should be involved in product delivery. If previous projects exist around the same product, one may be able to leverage the stakeholders participating in past projects. Another way to identify stakeholders is to hold a brainstorming session to capture every name, organization, or type of stakeholder needed for the project. This kind of workshop can be a great way to identify stakeholders, as Measey (2015) points out.&lt;/p&gt;</description></item><item><title>IT Projects and Business Strategy: Why Alignment Matters</title><link>https://www.billbrown.info/post/why-is-it-critically-vital-to-support-it-projects-with-a-business-strategy/</link><pubDate>Sat, 13 Jan 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/why-is-it-critically-vital-to-support-it-projects-with-a-business-strategy/</guid><description>
&lt;h2 id="why-is-it-critically-vital-to-support-it-projects-with-a-business-strategy"&gt;Why is it critically vital to support IT projects with a business strategy?&lt;/h2&gt;
&lt;p&gt;A project consists of a beginning and end; in many cases, projects are used to achieve strategic organizational goals. A company may use projects to innovate, move into a new business market or use a project to drive down cost within the organization as described by Verzuh (2015).&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;p&gt;Information technology is critical to most thriving businesses today. Information technology, in many cases, is essential in assisting in automation or streamlining business operations. Categorizing information systems projects that deliver the greatest business benefits, organizations must develop an information system plan that is in line with the organizations overall high-level strategic plan. As Laudon &amp;amp; Laudon (2007) points out, the strategic plan provides the organization a road map. The plan contains a statement of corporate goals and specifies how information technology will support the attainment of those goals.&lt;/p&gt;</description></item><item><title>Project Success vs. Efficiency: Understanding the Difference</title><link>https://www.billbrown.info/post/the-relationship-between-project-success-and-project-efficiency/</link><pubDate>Wed, 10 Jan 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/the-relationship-between-project-success-and-project-efficiency/</guid><description>
&lt;h2 id="the-relationship-between-project-success-and-project-efficiency"&gt;The Relationship between Project Success and Project Efficiency&lt;/h2&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;A project is created to have a start and a conclusion or end. At the end of the project, the project manager is released from the project or moves onto the next project as Serrador &amp;amp;Turner (2015) discuss. Currently there two competing measures referred to as project efficiency and project success. Project efficiency takes into the account the budget, scope and time, which project management philosophy refers to as the triple constraint or the golden triangle. A majority of the literature on project management identify the project ends when it is delivered to the customer.&lt;/p&gt;</description></item><item><title>Triple Constraint in Project Management: Time, Cost, Quality</title><link>https://www.billbrown.info/post/what-is-a-triple-constraint-in-project-managemen/</link><pubDate>Sun, 07 Jan 2024 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/what-is-a-triple-constraint-in-project-managemen/</guid><description>
&lt;h2 id="the-intricate-dance-of-the-triple-constraint-balancing-time-cost-and-quality-in-project-management"&gt;The Intricate Dance of the Triple Constraint: Balancing Time, Cost, and Quality in Project Management&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Imagine a project as a three-legged stool. Each leg represents a crucial element for its success: &lt;strong&gt;Time, Cost, and Quality&lt;/strong&gt;. This interconnected trio, known as the Triple Constraint, forms the foundation of every project endeavor. As described by Verzuh (2015), effectively managing these variables dictates the project's outcome, and it's the project manager's responsibility to orchestrate this intricate dance.&lt;/p&gt;</description></item><item><title>IoT Security Threats: Smart Home Device Vulnerabilities</title><link>https://www.billbrown.info/post/internet-of-things-risks-smart-home-device-security-threats/</link><pubDate>Tue, 31 Jan 2017 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/internet-of-things-risks-smart-home-device-security-threats/</guid><description>
&lt;h2 id="internet-of-things-risks-smart-home-device-security-threats"&gt;Internet Of Things Risks: Smart Home Device Security Threats&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Abstract&lt;/p&gt;
&lt;p&gt;The Internet of Things (IoT) devices connected to the Internet in 2015 is estimated to be five billion.  This number is seen growing to twenty-five billion within the next five years and thought to be the third wave of the Internet boom as described by O’Brien (2015).  This paper focuses on the security risks associated with smart home devices. Most consumers are unable to maintain smart home IoT devices. These device vulnerabilities are a safety hazard that motivated writing this paper.  Weak authentication &amp;amp; authorization methods are security risks to IoT devices.  Denial of service attacks (DoS) affects IoT device security and availability.  The research includes the creation of a home network and sampling ten smart home IoT products. Vulnerability tests were conducted using system analysis software to determine if passwords are encrypted or clear text and to understand if a Denial of Service attack stopped the IoT device from providing service.  Passwords were found to be clear text 60% of the time connecting from a web client to an IoT device.  A DoS attack vulnerability test found 70% of the devices unusable. Ideas to resolve security issues would be adoption of an IoT device certification standard adopted by the industry IoT manufactures.  Requirements to be put in place for manufacturers to release software updates through automated patching.  The consumer’s smart home IoT security risk are growing as online device use explode, and IoT manufacturers must be held responsible for protecting consumers security and privacy.&lt;/p&gt;</description></item><item><title>Google Zeitgeist 2010: Top Internet Searches of the Year</title><link>https://www.billbrown.info/post/google-zeitgeist-2010-reveals-the-top-internet-searches-for-the-year/</link><pubDate>Thu, 09 Dec 2010 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/google-zeitgeist-2010-reveals-the-top-internet-searches-for-the-year/</guid><description>
&lt;h2 id="google-zeitgeist-2010-reveals-the-top-internet-searches-for-the-year"&gt;Google Zeitgeist 2010 Reveals The Top Internet Searches For The Year&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Always Interesting what people are searching for on the Internet.   &lt;a href="https://www.google.com/intl/en/press/zeitgeist2010/"&gt;Google Zeitgeist&lt;/a&gt; list the most searched words for 2010.  All Zeitgeist &lt;a href="https://www.google.com/intl/en/press/zeitgeist2010/regions/nz.html"&gt;New Zealand’s Zeitgeist's&lt;/a&gt; Ipad’s popular for sure world wide and Christchurch Earthquake seems to be up there in NZ.&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;h3 id="fastest-rising-worldwide"&gt;Fastest Rising Worldwide&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;chatroulette&lt;/li&gt;
&lt;li&gt;ipad&lt;/li&gt;
&lt;li&gt;justin bieber&lt;/li&gt;
&lt;li&gt;nick minaj&lt;/li&gt;
&lt;li&gt;friv&lt;/li&gt;
&lt;li&gt;myxer&lt;/li&gt;
&lt;li&gt;katy perry&lt;/li&gt;
&lt;li&gt;twitter&lt;/li&gt;
&lt;li&gt;gamezer&lt;/li&gt;
&lt;li&gt;facebook&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 id="fastest-rising-in-new-zealand"&gt;Fastest Rising in New Zealand&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;grabone&lt;/li&gt;
&lt;li&gt;chatroulette&lt;/li&gt;
&lt;li&gt;christchurch earthquake&lt;/li&gt;
&lt;li&gt;justin bieber&lt;/li&gt;
&lt;li&gt;geonet&lt;/li&gt;
&lt;li&gt;fifa&lt;/li&gt;
&lt;li&gt;facebook login&lt;/li&gt;
&lt;li&gt;youtube music&lt;/li&gt;
&lt;li&gt;lotto results&lt;/li&gt;
&lt;li&gt;avata&lt;/li&gt;
&lt;/ol&gt;</description></item><item><title>Removing Oracle RAC from Windows X64</title><link>https://www.billbrown.info/post/removing-oracle-rac-from-windows-x64/</link><pubDate>Sat, 17 May 2008 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/removing-oracle-rac-from-windows-x64/</guid><description>
&lt;h2 id="step-by-step-guide-on-how-to-remove-oracle-real-application-clusters-rac-from-a-windows-x64-system"&gt;Step-by-step guide on how to remove Oracle Real Application Clusters (RAC) from a Windows X64 system.&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;I had to remove Oracle 11g and reinstall Oracle 10gRel2 for a client recently.&lt;/p&gt;
&lt;p&gt;1a, b and d are required if you are using RAW devices for your OCR and Votedisk If you are using OCFS for these files, skip to step 1c followed by 1e.&lt;/p&gt;
&lt;p&gt;1. Remove the partitions that have been initialized for ocrcfg and votedsk&lt;/p&gt;</description></item><item><title>Settling In, Boulder to Christchurch - A Tale of Two Cities</title><link>https://www.billbrown.info/post/settling-in/</link><pubDate>Sat, 17 May 2008 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/settling-in/</guid><description>
&lt;h2 id="settling-in"&gt;Settling In&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Have been in Christchurch New Zealand since 27th Apr 2008. Getting bearings on which way is the sea and which way are the alps. Surfers looked pretty cold off the pier in Christchurch but seemed to be enjoying the surf in the cold fall water and wind. We have lived in 2 different house in the short time we have been here but enjoying the change in culture. Goodbye Boulder Colorado.. Hello Christchurch New Zealand&lt;/p&gt;</description></item><item><title>ColdFusion Nested cfloop Bug: outerqueryset.column1 Fix</title><link>https://www.billbrown.info/post/coldfusion-nested-cfloop-or-cfloop-within-a-cfloop/</link><pubDate>Tue, 08 Jan 2008 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/coldfusion-nested-cfloop-or-cfloop-within-a-cfloop/</guid><description>
&lt;h2 id="coldfusion-nested-cfloop-or-cfloop-within-a-cfloop"&gt;Coldfusion Nested Cfloop or Cfloop within a Cfloop&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Coldfusion Cfloop within a cfloop or gives interesting results. I couldn’t believe it was a bug. But looks to be true once tested. Thanks to Blog of &lt;a href="https://jehiah.cz/a/nested-cfloop-tags-scope-resolution"&gt;Jehiah Czebotar&lt;/a&gt; who bailed me out of this issue after looking at it for some time with eyes crossed and debugging.&lt;/p&gt;
&lt;p&gt;Here is the summary from Jehiah blog post. Thanks Again Jehiah!&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;p&gt;There is a bug in the processing of nested cfloop tags in Macromedia &lt;a href="https://helpx.adobe.com/coldfusion/cfml-reference/coldfusion-tags/tags-j-l/cfloop.html"&gt;Cfloop ColdFusion MX&lt;/a&gt;, as the example below shows. I have developed a workaround for this which is also below.&lt;/p&gt;</description></item><item><title>Oracle RAC on VMware ESX: Support Issues and Experiences</title><link>https://www.billbrown.info/post/oracle-rac-running-on-vmware-esx-using-lefthand-networks-san/</link><pubDate>Sun, 06 May 2007 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/oracle-rac-running-on-vmware-esx-using-lefthand-networks-san/</guid><description>
&lt;h2 id="this-article-explores-the-lack-of-official-support-for-oracle-rac-running-on-red-hat-under-vmware-esx-and-gathers-user-experiences-with-this-potentially-unsupported-configuration"&gt;This article explores the lack of official support for Oracle RAC running on Red Hat under VMware ESX and gathers user experiences with this potentially unsupported configuration&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;I am interested to find out from [vmware]https://www.vmware.com/) and &lt;a href="https://www.oracle.com/"&gt;oracle&lt;/a&gt; why Oracle RAC running on &lt;a href="https://www.redhat.com/"&gt;Red Hat&lt;/a&gt; under vmware esx is not supported by either company yet. I have spoke to both companies and there seems to be an indication that they will be certifying it soon. But no official response as to when.&lt;/p&gt;</description></item><item><title>Colorado Junk Mail Bill Failed: What Consumers Can Still Do</title><link>https://www.billbrown.info/post/colorado-anti-junk-mail-legislation-halted-consumers-can-still-stop-junk-mail-privately/</link><pubDate>Mon, 19 Mar 2007 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/colorado-anti-junk-mail-legislation-halted-consumers-can-still-stop-junk-mail-privately/</guid><description>
&lt;h2 id="colorado-anti-junk-mail-legislation-halted--consumers-can-still-stop-junk-mail-privately"&gt;Colorado Anti-Junk Mail Legislation Halted – Consumers can still stop junk mail privately&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;**BOULDER, COLO. Mar. 19, 2007 ** Legislative efforts to allow consumers to eliminate &lt;a href="https://www.paperkarma.com/ref/38/"&gt;junk mail&lt;/a&gt; from their mailboxes have been halted in Colorado. But Coloradoans still have options, such as &lt;a href="https://www.paperkarma.com/ref/38/"&gt;StopTheJunkMail.com&lt;/a&gt;, to remove themselves from mass mailing lists. Stopthejunkmail.com wants consumers everywhere to know that even though similar efforts throughout the country are being stifled, they can still &lt;a href="https://www.paperkarma.com/ref/38/"&gt;opt-out&lt;/a&gt; of getting direct mail using the company's private service.&lt;/p&gt;</description></item><item><title>Consumers Overwhelmed by Junk Mail, Survey Finds</title><link>https://www.billbrown.info/post/survey-shows-consumer-opinions-on-junk-mail/</link><pubDate>Tue, 13 Mar 2007 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/survey-shows-consumer-opinions-on-junk-mail/</guid><description>
&lt;h2 id="survey-shows-consumer-opinions-on-junk-mail"&gt;Survey Shows Consumer Opinions on Junk Mail&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Survey Shows Consumer Opinions on &lt;a href="https://www.paperkarma.com/ref/38/"&gt;Junk Mail&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;BOULDER, COLO. Mar. 7, 2007 Consumers think they are getting too much &lt;a href="https://www.paperkarma.com/ref/38/"&gt;junk mail&lt;/a&gt; according to &lt;a href="https://www.paperkarma.com/ref/38/"&gt;StopTheJunkMail.com's 2006 fourth quarter survey&lt;/a&gt;. Results show that the majority of survey participants receive at least 6-10 catalogs per week, almost all of which are discarded immediately, leaving many to question the impact of direct mail on their homes and businesses, as well as the environment.&lt;/p&gt;</description></item><item><title>Disabling the Oracle Recycle Bin in Oracle 10g</title><link>https://www.billbrown.info/post/turn-off-disable-oracle-recycle-bin/</link><pubDate>Thu, 04 Jan 2007 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/turn-off-disable-oracle-recycle-bin/</guid><description>
&lt;h2 id="turn-off-disable-oracle-recycle-bin"&gt;Turn Off Disable Oracle Recycle Bin&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;In a comment today about the &lt;a href="https://www.billbrown.info/2007/01/04/software/oracle-rac/empty-oracle-recycle-bin.html"&gt;Empty Oracle Recycle Bin&lt;/a&gt;, A person wanted to know how one turns off or disables the Oracle Recycle Bin?In &lt;strong&gt;ORACLE 10G Release 1&lt;/strong&gt; there is a knob to turn to disable the behavior of recycling bin. The “_recyclebin” which defaults to TRUE. We can disable it by setting it to FALSE.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Command to disable that would be:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-sql" data-lang="sql"&gt;&lt;span class="line"&gt;&lt;span class="ln"&gt;1&lt;/span&gt;&lt;span class="cl"&gt;&lt;span class="k"&gt;ALTER&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="k"&gt;SYSTEM&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="k"&gt;SET&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;“\&lt;/span&gt;&lt;span class="n"&gt;_recyclebin&lt;/span&gt;&lt;span class="err"&gt;”&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="k"&gt;FALSE&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="k"&gt;SCOPE&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="k"&gt;BOTH&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;strong&gt;ORACLE 10g RELEASE 2&lt;/strong&gt; the following syntax to turn the recycle bin off is:&lt;/p&gt;</description></item><item><title>Emptying the Oracle Recycle Bin in Oracle 10g Release 2</title><link>https://www.billbrown.info/post/empty-oracle-recycle-bin/</link><pubDate>Thu, 04 Jan 2007 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/empty-oracle-recycle-bin/</guid><description>
&lt;h2 id="empty-oracle-recycle-bin"&gt;Empty Oracle Recycle Bin&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;A new feature in Oracle 10g Release 2 was the Reycycle Bin. The recycle bin in the Oracle database is where all dropped objects reside. Underneath the covers the object are taking up the same space when they were created.   &lt;/p&gt;
&lt;p&gt; &amp;quot;DROP TABLE mytable&amp;quot;, it doesn't really drop it. It instead renames it to e.g.: BIN$67815682942.&lt;/p&gt;
&lt;p&gt;Dropped objects are not deleted they are just rename with a prefix of BIN$$. One can get access to the data in a dropeed table or even use a Flashback Query if you have this feature enabled on your version of Oracle.&lt;/p&gt;</description></item><item><title>Relink Oracle Database Software on a Unix/Linux RAC Cluster</title><link>https://www.billbrown.info/post/relink-oracle-database-software-on-unix-linux-rac-cluster/</link><pubDate>Mon, 01 Jan 2007 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/relink-oracle-database-software-on-unix-linux-rac-cluster/</guid><description>
&lt;h1 id="relink-oracle-database-software-on-unix-linux-rac-cluster"&gt;Relink Oracle Database Software on Unix Linux RAC Cluster&lt;/h1&gt;
&lt;p&gt;Had problems with running Oracle RAC on a cluster on &lt;a href="https://www.readhat.com/"&gt;Redhat Release 3 AS&lt;/a&gt;. So we started the conversion to Redhat Release 4 AS. We run a 2 node &lt;a href="https://www.oracle.com/"&gt;RAC Cluster&lt;/a&gt; on &lt;a href="https://www.hpe.com/"&gt;iSCSI Lefthand Networks SAN.&lt;/a&gt; The Oracle software is installed on a lun on each machine and the database is on lun’s of RAW disk manged by ASM. This allows flexability by moving the luns from OS to OS and recompiling the Oracle binaries when we need to move the Oracle Cluster to a new version of the OS.&lt;/p&gt;</description></item><item><title>IPTV Lacrosse TV: Interactive Television Networks Launch</title><link>https://www.billbrown.info/post/iptv-lacrosse-tv/</link><pubDate>Tue, 03 Jan 2006 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/iptv-lacrosse-tv/</guid><description>
&lt;h2 id="interactive-television-networks-inc-launches-iptv-lacrosse-tv"&gt;Interactive Television Networks, Inc Launches IPTV Lacrosse TV&lt;/h2&gt;
&lt;p&gt;Interactive Television Networks, Inc. ITVN Announces the launch of Lacrosse TV IpTV TV network for Lacrosse. This station is for the &lt;a href="https://www.nll.com/"&gt;National Lacrosse League&lt;/a&gt; to launch Lacrosse TV See &lt;a href="https://www.lacrossetv.com"&gt;www.lacrossetv.com&lt;/a&gt; for more infomration. The sound of TV across the Internet is appealing since we have a two houses. If we could share the box between both places we might be able to save some monthly charges.&lt;/p&gt;</description></item><item><title>New Year 2006: Reflections and New Beginnings</title><link>https://www.billbrown.info/post/new-year/</link><pubDate>Sun, 01 Jan 2006 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/new-year/</guid><description>
&lt;h2 id="new-year-2006"&gt;New Year 2006&lt;/h2&gt;
&lt;p&gt;Well a new year has come. 2006 is here to stay. I am trying to figure out how to use wordpress 2.0 just updated.&lt;/p&gt;
&lt;p&gt;Nice new features.&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;p&gt;Also tried to set-up publisher.yahoo.com rss feed. Seems to be working.&lt;/p&gt;</description></item><item><title>Installation Issue with Oracle Enterprise Edition Release 2</title><link>https://www.billbrown.info/post/oracle-enterprise-edition-release-2/</link><pubDate>Thu, 15 Dec 2005 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/oracle-enterprise-edition-release-2/</guid><description>
&lt;h2 id="oracle-enterprise-edition-release-2"&gt;Oracle Enterprise Edition Release 2&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Downloaded Oracle Enterprise Edition Release 2 from the &lt;a href="https://www.oracle.com/technology/index.html"&gt;oracle technology network&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It was 3 cds. Unzipped them into the oracle directory d1 d2 d3 for the 3 cds and tried install. Got Error.&lt;br&gt;
Nothing but trouble.&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;p&gt;Found a post on &lt;a href="https://metalink.oracle.com/"&gt;metalink&lt;/a&gt; that indicated a bug in the software and one needs to unzip all 3 cd’s into the same directory.&lt;/p&gt;</description></item><item><title>How to Enable Magic SysRq in Red Hat Linux</title><link>https://www.billbrown.info/post/red-hat-trouble-sysrq/</link><pubDate>Thu, 22 Sep 2005 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/red-hat-trouble-sysrq/</guid><description>
&lt;h2 id="red-hat-trouble-sysrq"&gt;Red Hat Trouble SYSrq&lt;/h2&gt;
&lt;hr&gt;
&lt;h2 id="sysrq"&gt;SysRq&lt;/h2&gt;
&lt;h3 id="how-to-enable-magic-sysrq-in-red-hat-linux"&gt;How to Enable Magic SysRq in Red Hat Linux&lt;/h3&gt;
&lt;p&gt;Magic SysRq key sequence is used to collect additional system information to aid in the troubleshooting of system hangs or panics.&lt;/p&gt;
&lt;p&gt;NOTE: Disable ASR so that ASR will not restart the server before the SysRq information can be captured.&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;p&gt;1. Ensure that “Kernel Hacking” has been compiled into the running kernel.&lt;br&gt;
CONFIG_MAGIC_SYSRQ=y This is required for SysRq to work. Itâ€™s enabled on all RHEL by default.&lt;/p&gt;</description></item><item><title>Setting Up a Netdump Server and Client</title><link>https://www.billbrown.info/post/redhat-trouble-netdump/</link><pubDate>Thu, 22 Sep 2005 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/redhat-trouble-netdump/</guid><description>
&lt;h2 id="redhat-trouble-netdump"&gt;RedHat Trouble netdump&lt;/h2&gt;
&lt;hr&gt;
&lt;h2 id="netdump-server-and-client-setup"&gt;Netdump Server and Client setup&lt;/h2&gt;
&lt;p&gt;netdump server: collard.alf.cpqcorp.net (16.113.5.139)&lt;br&gt;
netdump client: bubba.alf.cpqcorp.net (16.113.5.104)&lt;/p&gt;
&lt;h3 id="setup-netdump-server"&gt;Setup Netdump Server:&lt;/h3&gt;
&lt;p&gt;1. Check to see if the netdump-server is installed:&lt;br&gt;
#rpm â€“qa | grep â€“i netdump-server&lt;/p&gt;
&lt;p&gt;If it is not already installed, install the netdump-server package.&lt;br&gt;
#rpm â€“ivh netdump-server-0.6.11-3.i386.rpm&lt;/p&gt;
&lt;p&gt;2. Set a password for the netdump user.&lt;br&gt;
# passwd netdump&lt;br&gt;
Changing password for user netdump&lt;br&gt;
New password:&lt;br&gt;
Retype new password:&lt;br&gt;
passwd: all authentication tokens updated successfully&lt;/p&gt;</description></item><item><title>VMware Server vs. Microsoft Virtual Server: 2007 Review</title><link>https://www.billbrown.info/post/vmware-server-verse-microsoft-virtual-server/</link><pubDate>Thu, 22 Sep 2005 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/vmware-server-verse-microsoft-virtual-server/</guid><description>
&lt;h2 id="vmware-server-verse-microsoft-virtual-server"&gt;VMware Server verse Microsoft Virtual Server&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Seems much of 2006 was spent testing virtual server software. I find it interesting that for years on the mainframe we have been using virtual machines. I just read the article by M. T Jones on &lt;a href="https://www-128.ibm.com/developerworks/linux/library/l-linuxvirt/?ca=dgr-lnxw01Virtual-Linux"&gt;Virtual Linux&lt;/a&gt; and it talks about the history and kinds of virtualization.&lt;/p&gt;
&lt;p&gt;Spent much of 2006 working with &lt;a href="https://www.microsoft.com/windowsserversystem/virtualserver" title="MM"&gt;Microsoft Virtual Server(MVS)&lt;/a&gt; and &lt;a href="https://www.vmware.com/products/free_virtualization.html"&gt;VMware Server&lt;/a&gt; Most of my time was spent with MVS no that isn’t the MVS of the old days on an IBM mainframe.&lt;/p&gt;</description></item><item><title>Oracle RAC ASM ORACLE Home, Challenges and Recommendations</title><link>https://www.billbrown.info/post/oracle-rac-asm-oracle-home/</link><pubDate>Fri, 19 Aug 2005 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/oracle-rac-asm-oracle-home/</guid><description>
&lt;h2 id="oracle-rac-asm-oracle-home"&gt;Oracle RAC ASM ORACLE Home&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Oracle RAC Standard Edition Release 2 is up but not without a struggle getting ASM in its own Oracle Home as recommended by the Installation manual&lt;/p&gt;
&lt;script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1012089347386563"
crossorigin="anonymous"&gt;&lt;/script&gt;
&lt;ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-1012089347386563"
data-ad-slot="9168865232"
data-ad-format="auto"
data-full-width-responsive="true"&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;</description></item><item><title>Oracle RAC Standard Edition Installation Issues and Problems</title><link>https://www.billbrown.info/post/oracle-rac/</link><pubDate>Fri, 19 Aug 2005 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/oracle-rac/</guid><description>
&lt;h2 id="oracle-rac-standard-edition-installation-planning"&gt;Oracle RAC Standard Edition Installation Planning&lt;/h2&gt;
&lt;p&gt;Started planning new Oracle database using &lt;a href="https://www.oracle.com/technology/products/database/oracle10g/index.html"&gt;Oracle 10g RAC Standard Edtion&lt;/a&gt;. It has been interesting so far. Running &lt;a href="https://www.redhat.com/"&gt;Linux Red Hat AS 3.0&lt;/a&gt; and data is being put out on a &lt;a href="https://www.hpe.com/"&gt;LeftHand Networks SAN&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Configured the SAN and NSM to layout disks. Than used ISCSI drivers to connect the SAN Lun’s and Linux togather so we could stat building Oracle RAC. The hardest thing to come to terms with for Oracle 10g RAC Standard Edition is that the require the use of Oracle Automatic Storage Manger or Oracle ASM.&lt;/p&gt;</description></item></channel></rss>