Immigration Financial Information Bangladesh Gateway General World Cup Entertainment Programing University and College Scholarship Job Interview Health Job

Thursday, June 20, 2013

Active Directory



Active Directory (AD) is a directory service
Created by Microsoft for Windows domain networks
It is included in most Windows Server operating systems
Server computers that run Active Directory are called domain controllers
An AD domain controller authenticates and authorizes all users and computers in a Windows domain type network
—Assigning and enforcing security policies for all computers and installing or updating software. For example, when a user logs into a computer that is part of a Windows domain, Active Directory checks the submitted password and determines whether the user is a system administrator or normal user.
Active Directory makes use of Lightweight Directory Access Protocol (LDAP) versions 2 and 3, Kerberos and DNS.
The Lightweight Directory Access Protocol (LDAP; pron.: /ˈɛldæp/) is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.
Directory services may provide any organized set of records, often with a hierarchical structure, such as a corporate email directory. Similarly, a telephone directory is a list of subscribers with an address and a phone number.

Project Management - Basics



Data Architecture
Models, policies, rules, or standards that govern which data is collected, and how it is stored, arranged, and put to use in a database system, and/or in an organization.
Data architecture is one of the pillars of Enterprise Architecture. The other pillars are the Application Architecture, Business Architecture and Integration Architecture. The Data Architecture pillar is the definition or blueprint of the data design which will be used in achieving the implementation of a physical database.
The data architecture can be compared to a house design where all the descriptions of the house structure to be built – from the choice of materials, sizes and style of the rooms and roofing, lay out of the plumbing and electrical structures – are described in the blueprint.

MindTools
Project Management Framework - Project Management Phases and Processes, Log frames and the Logical Framework Approach, Theory of Change for evaluation, Project Initiation Documents, The RFP, also referred to as Invitation to Tender (ITT) or Request for Information (RFI), forms the cornerstone of this bidding process. Risk Impact/Probability Chart.


     



Scheduling - Gantt Charts, Gap Analysis, Critical Path Analysis and PERT Charts


PERT (Program Evaluation and Review Technique)
PERT is a variation on Critical Path Analysis that takes a slightly more skeptical view of time estimates made for each project stage. To use it, estimate the shortest possible time each activity will take, the most likely length of time, and the longest time that might be taken if the activity takes longer than expected.
Use the formula below to calculate the time to use for each project stage:
Shortest time + 4 x likely time + longest time
-----------------------------------------------------------
6

This helps to bias time estimates away from the unrealistically short time-scales normally assumed.

Scope Management - Business Requirements Analysis
Building Support for Your Projects


               
The RACI Matrix
A RACI matrix is a very important tool that can help in the implementation and correct functioning of a process. The RACI matrix is mostly used to align the human elements in the process. Usually there are many different people involved in any process and they have differing responsibilities. A RACI matrix makes an explicit documentation of this and keeps as a ready reference to be used at different stages in the process. Here is how the RACI matrix can be utilized.
Responsible: This is the class of people who are ultimately responsible for getting the work done. This may refer to the individual workers that perform the given task or it could refer to the system in case the task is automated.
Accountable: This is the class of people that are accountable to oversee that the work gets done. This usually means the immediate manager overseeing the work.
Consulted: These may be subject matter exerts who need to be consulted at the time of an exception. There is a possibility that am unanticipated scenario arises in a process. These are the people who will do the thinking and suggest any deviations from the Standard Operating Procedure (SOP).

Informed: This is the class of people who have some interest in the performance of a given task. This may be a manager trying to control the execution of the task at hand. Also this could be an input signal to the other process.
Rules for using RACI Matrix
  • Only One Responsible and Accountable Person: It is essential that only person be assigned the R/A roles. Having more than one person responsible for the same task increases ambiguity and the chances of the work not being performed. It could also lead to duplication of work and wastage of efforts and costs.
Having more than one accountable person means again leads to the same problem. However, having only person accountable also leads to a problem. If the assigned person is incompetent the whole process may go for a toss. It is for this reason that there is often a hierarch of accountable people in place.
  • Responsible-Accountable Is Mandatory: The consult or inform roles are not mandatory for every activity. It is possible that some activities may not require them at all. But the responsible accountable roles must be assigned. Even if the system is performing the tasks automatically, someone must be made accountable to see that it does get done.
  • Communication with the Consultant: There must be a two way channel of communication with the consultant. This communication is itself a task and must be explicitly listed having its own responsible accountable persons. The important aspect is that the communication be two-way. Hence one has to ensure that adequate follow up is done and minimum time lag is required to complete this communication.
  • Inform the Required Stakeholders: This is a one way channel of communication. It is usually meant to be a signal for some other process to begin or as a control metric to ensure smooth functioning of the same process. Usually this is automated but needs accountability like other automated tasks.
Influence maps are a natural extension of Stakeholder Analysis. Your project's success can depend on identifying its key stakeholders and then managing the various relationships between them. Stakeholders have the power to help or hurt your initiatives, so stakeholder management is an important aspect of project management.


Communication - Project Milestone Reporting, Dashboards

Change Management

Project Improvement and Review

Monday, February 25, 2013

LINQ


Innovation introduced in Visual Studio 2008 and .NET Framework version 3.5

Language-Integrated Query (LINQ) is a set of features that extends powerful query capabilities to the language syntax of C# and Visual Basic.

DLinq (also referred to as LINQ to SQL) is specifically the version of LINQ that focuses on querying data from relational data sources. XLinq (LINQ to XML) is that aspect of LINQ that is geared towards querying XML data.

In addition, the query functionality is not just restricted to SQL or XML data; you can apply LINQ to query any class as long as that class implements IEnumerable class.

WPF, XAML



Introduction to Windows Presentation Foundation - WPF (http://www.wpftutorial.net/WPFIntroduction.html)
Introduction to XAML (http://www.wpftutorial.net/XAML.html)

Tuesday, February 19, 2013

What is wi-fi 802.11 b/g/n?

802.11n is the newest Wi-Fi that have a bandwidth of about 300Mbps (sometime it is more than that).

802.11g have a bandwidth of 54Mbps. For routers and hot spots, this is the most supported since it had been around for awhile already.

802.11b is the oldest with a bandwidth of 11Mbps.

I am not too sure but 802.11n might have better range then the others.

If you are thinking of buying an adapter, routers and laptop, I suggest you buy anything with 802.11n since it usually will also have support for 802.11g (and to a less extent 802.11b).