Posts

Critical path Method

 What is the critical path in project management the critical path is the longest sequence of tasks that must to executed in order to complete the task the tasks on this path are called critical activities, if they are delayed, the entire project completion is delayed non-critical task sequences can be delayed without affecting overall project time, as long as they do not get delayed past the end of the critical path the critical path can be found using a method called CPM or critical path method, however it can now also be automatically calculated by project scheduling software equipped with Gantt charts Finding the critical path allows managers to: Accurately estimate total project duration identify the critical activities, to be able to closely supervise them likewise, find tasks that could be delayed or rescheduled without affecting the total time of the project create realistic schedules identify task dependencies, resource constraints and project risks

gantt charts

Image
Gantt chart A Gantt chart is a type of bar chart that illustrates a project schedule.  This chart lists the tasks to be performed on the vertical axis, and time intervals on the horizontal axis.  The width of the horizontal bars in the graph shows the duration of each activity.  Gantt charts illustrate the start and finish dates of the terminal elements and summary elements of a project.  Terminal elements and summary elements constitute the work breakdown structure of the project.  Modern Gantt charts also show the dependency relationships between activities. Gantt charts can be used to show current schedule status using percent-complete shadings and a vertical "TODAY" line. Progress Gannt chart In a progress Gantt chart, tasks are shaded in proportion to the degree of their completion: a task that is 60% complete would be 60% shaded, starting from the left.  A vertical line is drawn at the time index when the progress Gantt chart is created, and this line...

Culture - 2

The ethical and moral impacts of increased reliance of digital technology Impact of company culture can be seen across individuals, groups, and cultures and can more specifically be about changes in face to face communication changes in productivity and output changes in reach and sale of product - organic/paid/viral growth changes in staff monitoring adaptive working practices - increased productivity, reduced costs etc autonomous operation + cost effective + enhanced quality assurance + productivity + reduced risk to employees in hazardous conditions - loss of jobs - loss of human empathy Shift in skills needed Impacts on society loss of privacy - digital footprint, surveillance changing behaviours - social skills, remote engagement, digital/curated identity communication access - resistance to change, isolation Improved access to information Impact of unsafe usage of digital tech phycological - cyber bullying, mental health, addiction, stress Physical impacts- posture, eye strain, R...

Security - 10

Types of confidential info HR data - employee salaries, perks, data, medical info Client/customer data Profits Contracts Trade secrets CIA triad Confidentiality makes sure only authorised parties with sufficient privileges can view sensitive info, this is usually done with encryption.  If unauthorized individuals can access and view confidential data, confidentiality is breached. Integrity makes sure stored data has no been altered by malicious people or software, methods to keep integrity include error checking methods such as check sums and file hashing.  If data is modified without authorization, integrity is compromised. Availability makes sure data is easy to read and readily available out for authorised individuals.  If users cannot access the system or data when needed, availability is affected. The importance of maintaining CIA maintains trust with stakeholders, as it promotes a positive brand image avoids security risks and unauthorised access The consequences of...

Data - 3

 Types of data numeric data - representing using any number type text data - represented using text media data - represented using video or audio geospatial data - represents a location/area temporal data - represents a moment in time logical data (Boolean data) - has two choices A or B Sources of data Internal data - sales, marketing, financial, employee, customer, usage (website traffic, etc). data that is sourced internally and should be kept within the org. External data - public data government data, supplier, competitor, sector data. - data that can be found by anyone, companies still need this data Methods of Data storage - on premises Internal databases - with databases and relational databases Hard drives - HDDs, SSDs File server - (file structures) Network attached storage (NAS) - a storage device that is attached to a network and acts as a central point for storage, management and access of files Storage area network (SAN) - a network of interconnected storage devices Me...

Types of virtual switches

  Types of Hyper-V Virtual Switches Using Virtual Switch Manager, you can create three types of Hyper-V virtual switches: External  switches are bound to the physical network cards located in the host. They provide VMs located on them access to the physical network to which the Hyper-V host is connected. The External switch can also share management traffic and VM traffic on the same switch, which is one of the options that can be set when creating the external switch. Internal  switches are not bound to a physical network card. They only allow traffic between VMs and the host itself. However, in 2016, new functionality was added to allow external connectivity via NAT from the Hyper-V host: the NAT forwarding internal switch. Private  switches are only used for virtual machines to communicate with each other. This type can be useful for specific types of traffic such as a cluster network only if you are using one host (as it can’t be used between hosts).

ESP overview

  task number  focus  No. Of hours  Marks allocated  1  Trouble shooting and test planning  2 hours 30  22  2  Interview and communication  2 hours 10  12  3  Project proposal  4 hours  24  4  Post project review  3 hours 30  12    Task uno:  This focus on trouble shooting a fault based on a specified problems/issues and designing a test plan.   The troubleshooting document should include:  User details   Test dates  Computer specs and software  Proposed tests and expected outcomes   Record of diagnosis  The test plan should include:  Administrative details E.G. dates names.  Test dates   Hardwear specs and software   Actual and relevant tests carried out in a logical order including images/diagrams  Full and complete details of expected outcomes  Remedial action required   Task d...