Month: November 2016

Apple black Friday event 25/11/2016

hello everyone. Apple is having a massive sale on Friday. If you are interested in apple product now is the time. If you are a part of the cult of Apple mark the date 25/11/2016 on your calendar. good luck

Posted in Uncategorized Tagged with: , ,

system requirements document in story form example

the humble story of Tafe course enquirer   A long time ago, there was this man TAFE who was sitting on a bench. You can see the sadness in his eyes by his troubled past.   “I’m sorry TAFE we

Posted in Articles, Requirement Engineering

Why should we use dummy data instead of live data?

Dummy data is benign information that does not contain any useful data, but serves to reserve space where real data is nominally present. It can be used as a placeholder for both testing and operational purposes. Dummy data must be rigorously

Posted in Uncategorized

Under what circumstances will you hold your TFN

Tax file numbers are unique numbers issued by the Australian Taxation Office (ATO) to identify individuals, corporations and others who lodge income tax returns with the ATO. Once you get a tax file number (TFN), you need to keep it

Posted in Uncategorized

Why thinking of information security makes sense?

To fully understand why information security is important, we need to understand both the value of information and the consequences of such information being compromised. The Value of Information To understand the value of information, let’s start by examining some

Posted in Articles

Sensitive data ,Cloud data and the data privacy

Sensitive Data and Data privacy Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization. There are three main types of sensitive information: Personal information: Sensitive personally identifiable

Posted in Articles Tagged with:

Overengineering in IT projects

Software developers throw around this word, “overengineering,” “That code was overengineered.” “This is an overengineered solution.” Strangely enough, though, it’s hard to find an actual definition for the word. People are always giving examples of overengineered code, but rarely do

Posted in Articles Tagged with:

Australian Census 2016 Who Is Liable?

It was a dreary day in August, you were trying to finish work early to get home before the Census night deadline or risk paying a fine of $180 or more. You rushed home and sat down in front of

Posted in Articles

Ensuring data security with cloud encryption

  Cryptography has been with us since the dawn of human civilization.  People have wanted to keep sensitive information… from prying eyes long before the invention of the complex, computer-based encryption methods that we utilize today.  The ancient Greek protected

Posted in Articles

Cloud Concepts and the Impact on Business Analysts

Cloud Computing is generating significant interest and momentum. The cloud eco-system requires new considerations for the business analysis community to fully take advantage of cloud computing opportunities. This article provides links to key NIST Reference Architectures to provide a stable

Posted in Articles