If you have watched television of late, it is doubtful that you could have missed the war that is going on between the various wireless providers. This one is offering unlimited everything (but their coverage is pretty much nothing), that one is offering 10Gb to share at a low price, etc. Verizon® continues to tout [...] read more »
I was trying to add an email for the User account on one of the imported organization and getting the error seen below. I tried to resolve this and found information on this. Microsoft Dynamics CRM 2013 uses standard SQL Continue reading read more »
The news over recent years has become increasingly peppered with stories about large scale data breaches. Notable examples include:
Adobe - 152,000,000 records.
EBay - 145,000,000 records.
Target - 70,000,000 records.
JCPenny/Dow Jones/JeyBlue/etc - 160,000 records.
Sony PSN - 77,000,000 records.
Heartland Payments - 130,000,000 records.
TJ / TK Maxx - 94,000,000 records.
AOL (2014) - 2,400,000 records.
AOL (2006) - 20,000,000 records.
AOL (2005) - 92,000,000 records.
As you can see, these aren't small ... read more »
Some time ago, I wrote an article talking about security on a network, and how most people, including IT people in the field believe that a firewall and good antivirus is what is needed for their networks. They think a good intrusion detection system added into the mix makes them pretty secure. I debated these beliefs, and even took  read more »
Step 1: Define Business Objectives- This step is similar to any information system project. First of all, determine whether a data mining solution is really needed. State the objectives. Are we looking to improve our direct marketing campaigns? Do we want to detect fraud in credit card usage? Are we looking for associations between products that sell together? In this step, define expectations. read more »
Professor Peter Drucker, the senior guru of management practice, has admonished IT executives to look outside their enterprises for information. He remarked that the single biggest challenge is to organize outside data because change occurs from the outside. He predicted that the obsession with internal data would lead to being blindsided by external forces. The majority of data warehousing read more »
HP3000E Biometric Hand Punch Reader The HandPunch 3000E records and stores the three-dimensional shape of the human hand for comparison and identity verification. Upon verification, the HandPunch records the time, date, user ID number, and collected time and attendance data for collection by a host computer. The HandPunch3000E can communicate with a PayPunch Time and  read more »
Manipulation was done to facilitate research on how feeds affect users moods. read more »
One of the key questions to be answered by the database designer is: How can we design a database that allows unknown queries to be performant? This question encapsulates the differences between designing for a data warehouse and designing for an operational system. In a data warehouse one designs to support the business process rather than specific query requirements. In order to achieve this read more »
To facilitate strategic decision-making, we need a new breed of information delivery environment, called a data warehouse. The concept of a data warehouse given by Bill Inmon, the father of data warehousing, is depicted in Figure-1. Figure -1 : What is Data Warehousing ? The defining characteristics of a data warehouse are: Subject-orientation: Data warehouse data are arranged read more »