Category: Articles

Why Negotiations Fail?

Mismanagement of expectations Imagine going to a pizza shop and then being told it only serves sushi; disappointment is likely. The same goes for negotiations. If expectations aren’t managed properly, disappointment or frustration may ensue from a misalignment of expectations

Posted in Articles, Project Management

Risk Management Failure – Why does it happen?

  Big projects more often fail because of poor evaluation than poor execution. But many organizations focus on improving only the latter. As a result, they don’t identify the projects that pose the greatest risks of delay, budget overruns, missed

Posted in Articles, Project Management

Why does the risk management matter?

Why does the risk management matter? The last thing that any project will want to face is risks. Projects are designed to take advantage of resources and opportunities and with these, come uncertainty, challenges and risk. Hence Risk Management becomes a

Posted in Articles

The triple constraint in Project Management

The triple constraint in Project Management They are the key attributes that must be handled effectively for successful completion and closure of any project. These constraints are: TIME…..COST…..SCOPE If we consider the below scenario: (Note X, Y & Z are

Posted in Articles

system requirements document in story form example

the humble story of Tafe course enquirer   A long time ago, there was this man TAFE who was sitting on a bench. You can see the sadness in his eyes by his troubled past.   “I’m sorry TAFE we

Posted in Articles, Requirement Engineering

Why thinking of information security makes sense?

To fully understand why information security is important, we need to understand both the value of information and the consequences of such information being compromised. The Value of Information To understand the value of information, let’s start by examining some

Posted in Articles

Sensitive data ,Cloud data and the data privacy

Sensitive Data and Data privacy Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization. There are three main types of sensitive information: Personal information: Sensitive personally identifiable

Posted in Articles Tagged with:

Overengineering in IT projects

Software developers throw around this word, “overengineering,” “That code was overengineered.” “This is an overengineered solution.” Strangely enough, though, it’s hard to find an actual definition for the word. People are always giving examples of overengineered code, but rarely do

Posted in Articles Tagged with:

Australian Census 2016 Who Is Liable?

It was a dreary day in August, you were trying to finish work early to get home before the Census night deadline or risk paying a fine of $180 or more. You rushed home and sat down in front of

Posted in Articles

Ensuring data security with cloud encryption

  Cryptography has been with us since the dawn of human civilization.  People have wanted to keep sensitive information… from prying eyes long before the invention of the complex, computer-based encryption methods that we utilize today.  The ancient Greek protected

Posted in Articles