Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
application , business , security

Application Fix Suggestions

March 29, 2010

Create or modify standardized processes or procedures for: Business requirements Project Management eCommerce Services Web Design (CSS) Development Coding Interdependent transactions Authentication Storybook’s Testing Use cases Acceptance processes Pre-production security scans and remediation Dependencies should be: Accurate Asset Management Accurate IP Control Reliable Network infrastructure Governance: Policies, Standard and...

Img
application , compliances , policies

RFP Considerations for Acquisitions and Technology Dependencies

March 29, 2010

The needs that lead to a consideration of new acquisitions arise from an organization’s day-to-day Business objectives and business operations. Investment and work process analyses articulate these needs and may recommend process changes, procurement of a new system, or both. If procurement of a new system is an option,...

Img
application , business

Success of your Business

March 24, 2010

Outsourced solutions insure the success of your business The road to profitability is paved with criteria that, if achieved successfully, can ensure your site’s success. In today’s Intranet economy, whether you are a service or content provider, you need to differentiate your offering from your competitors’ by: · Building...

Img
application , business , security , web-services

Application Development Services

March 21, 2010

ERP – CRM Sample details Common Corporate Departments: Application Architecture and Internal Consulting Application Development Tools Research and Deployment Application Development Training Coordination Application Needs Analysis and Project Identification Application Security and End User Access Control (Some Applications) Application Systems Development Application Systems Operational Support Applications Integration and Systems Interfaces...

Img
application , security , visio-stencils , web-services

Sample Visio – Application Testing

March 20, 2010

Unit Testing Unit testing of internal and external objects in the patch set or application release is conducted in the development environment by the application developers.  Unit testing ensures that the object will execute and desired outputs are produced.  Debugging and verification of output results are performed by the...

Img
application , security , web-services

Sample Simple Coding Project Plan

March 18, 2010

Finalize Packaging Publish High Level Assessment Prepare Project Schedule Scope Closure & Exec Approval Analysis & Design Publish Design Documentation Code and Unit Test Perl or script Distribution Compilation Proxy Compilations for Design Application Create XML File Update Development Testing System Testing Availability of Contractor Test Planning & Preparation...

Img
application , security

Sample Directory Services Consolidation Project

March 12, 2010

Directory Services is an integral component of the solutions an enterprise data center should offer its clients.  It is advisable to initiate a project to migrate and consolidate the Corporate departments, existing directory services, including Windows, Netware, and any others.  It is recommended to consolidate all directory services to...

Img
application , o-s , web-services

Sample Application Server Consolidation

March 12, 2010

File / Print / Utility Servers Ability to provide a more predictable and dense application consolidation which will result in a further reduction of server footprint Save time and money by accelerating costs savings through deeper consolidation Lower the risks involved in a higher density of applications per server...

Img
application , security , web-services

Sample – Shared Application Development and Testing Environment Project

March 12, 2010

The availability of a shared application development and testing environment will provide agencies parallel production-like environments without having to maintain and purchase equipment for the department sites. Multiple standard environments can quickly be provisioned into a server partition in less than 15 minutes (based on predefined server builds and the...

Img
application , projects , web-services

Software Security and SDLC Considerations

March 8, 2010

Technical security architecture Application security architecture Application security architecture document Architecture control board Data model Data security architecture document Data security architecture Platform security architecture Platform security architecture document Enterprise architecture governance Security in the system development lifecycle Security requirements of information systems Security requirements analysis and specification Define...

Img
application , security , web-services

Application Threats and Vulnerabilities

March 7, 2010

  Application Threats and Vulnerabilities    Oracle MS SQL Server Sybase Lotus Domino Denial of Service SNMP DoS   Malformed RPC Absolute value of numeric DoS Unicode DoS Redirection DoS   Request DoS   Select All DoS  IIOP DoS ID/Password Control Issues Default passwords Default passwords Default passwords Default passwords Brute force...

Img
application , web-services

Oracle Database Configuration & Performance Tips

March 7, 2010

Introduction This guide is aimed at those who wish to configure Oracle 10 – 11 databases to ensure that it can perform under large loads that may be placed upon it. SAP utilizes Oracle database technology to store SAP activity data, in form of transaction. It requires a transactional...

Img
application , web-services

Quick overview of HTTP Request messages

March 5, 2010

OPTIONS         Request information about available options GET                Retrieve document identified in URL HEAD              Retrieve meta information about document identified in URL POST              Give information (e.g., annotation) to server PUT                Store document under specified URL DELETE           Delete specified URL TRACE            Loopback request message CONNECT        For use by proxies HTTP response codes 1xx                Informational   Request...

Img
application , projects

Use Case to Relational Mapping Sample

March 2, 2010

  The following table describes shortly the single relations between the information entities (it’s worth to note that in principle each relationship is a many-to-many relationship): Source Destination Relationship Description Features Vision & Scope Rational A feature is traced back to a goal stated in Vision & Scope, i.e....

Img
application , security , web-services

Useful SQL Commands

February 28, 2010

SQL Commands Begin Statements that make up the block. Built In functions Most SQL data functions are supported within PL/SQL blocks. Code storage Blocks may be stored within an Oracle database as procedures, functions, packages (a group of blocks) and triggers. Composite Datatypes Records allow groups of fields to...

Img
application , security , web-services

SQL Design Considerations

February 28, 2010

In order to assist us in designing your database, please have your applications and dba review and answer the following questions. SQL: • Has SQL been explained/optimized? • Have ‘bind variables’ been used? ie select * from my.table where name = :b1; Bind variables are not actually substituted until...

Img
application , security , web-services

SQL Security Overview

February 28, 2010

SQL, maintains it own internal security umbrella including password encryption, password aging, minimum length restrictions on passwords and user account management resources. Integrated security relies on trusted connections, which are only available with both named pipes protocol and MS new RPC based multi-protocol net library. Because SQL Server supports...

Img
application , security

Database Security Assessment Overview

February 27, 2010

Oracle Security Assessment Checklist 1. Is the Oracle software owner account locked to prevent remote logins? 2. Are the Audit database user activities – logins and failures – logged? 3. Where is the Audit information stored? 4. Does the Oracle user own all of the files in $Oracle_root$/bin? 5. Are there any help and...

Img
application , security , web-services

Directx, Java and Activex runtime errors and diagnostics

February 25, 2010

52 Runtime Error This is a “bad file name or number” error in JavaScript. It means that the script cannot find a file it is looking for (web-page, course component) and is most likely a connectivity problem. Try to clear your temporary internet files which should resolve any further...

Img
application , security , web-services

Application Security Related Activities

November 9, 2009

Security Objectives. Define security objectives and requirements early in the process. Security objectives are goals and constraints that affect the confidentiality, integrity, and availability of your data and application. Design Guidelines for Security. To avoid many of the vulnerabilities introduced by poor design choices, your design activity should use...

Img
application , web-services

Application Testing

October 20, 2009

Testing plays a critical role in the development of the web site and its long-term maintenance. While smaller web sites—especially those with more limited budgets—may not need to follow the formal testing procedures that are required for large-scale, commercial web sites, every site needs to be thoroughly tested to...

Img
application , networking , web-services

OS Jobs Scripts Can Do

October 14, 2009

Windows Script Host provides objects for manipulation of your scripts. Here are some of the tasks that these objects and services can do for you: Map network drives Connect to printers Modify environment variables e.g. Temp Run basic functions such as CreateObject and GetObject Print a message to a...

Img
application , security , web-services

MySQL Installation Notes on Windows 200x and IIS 6 / 7

October 13, 2009

This document describes the steps necessary to do a basic mySQL database engine installation on a computer running Windows 2000x Server and IIS 6. What you’ll need Windows 200x Server running Internet Information Server (IIS) 6.0 A copy of the mySQL binary distribution for Windows NT / 200X The...

Img
application , security , web-services

Basic SQL Parameters

October 10, 2009

Memory, max size in 2 kb units available to SQL User connections, max number of worker threads that are available for SQL server process, default is 255. Max Worker Threads, the number of worker threads that are available for SQL server processes. Default is 255. SMP concurrency, controls the...

Img
application

Setting your MySQL Administrator password and creating Guest Passwords

October 8, 2009

Once MySQL installed & operational, you should immediately set the password for your administrator account (called “root”) and set up at least one guest account, which has limited privileges. Iin the case of the example specified below, the user named “guest” only has SELECT privileges for the database database_name...

Img
application , projects , web-services

Service-Oriented Architecture (SOA)

October 2, 2009

Service-Oriented Architecture (SOA) is an architectural style that supports service orientation. Service orientation is a way of thinking in terms of services and service-based development and the outcomes of services. A service: Is a logical representation of a repeatable business activity that has a specified outcome (e.g., check customer...

Img
application , security , web-services

Excellent Resource – Vulnerability Assessments

April 8, 2009

Excellent Links: http://www.juniper.net/techpubs/software/management/strm/2008_1/VA_Book.pdf      

Img
application , security , web-services

Application Security Testing Concerns / Advice

March 17, 2009

Cross Site Scripting Cross-site scripting allows hackers to: 1)      Execute malicious script in a client’s Web browser 2)      Embed <script>, <object>, <applet>, and <embed> tags 3)      Steal web session information 4)      Modify user’s screen a.       Any Dynamic HTML code based on content that users submit is vulnerable SQL Injection...

Img
application , policies , projects , security

Core XML Standards

August 19, 2008

Introduction to XML The eXtensible Markup Language (XML) is a specification introduced by the World Wide Web Consortium (W3C) for identifying and organizing elements of information in electronic documents. XML is the result of scaling down the Standard Generalised Markup Language or SGML for short an earlier standard for...

Img
application , projects

Rational Unified Process (RUP)

August 8, 2008

Rational Unified Process (RUP) RUP is a development concept developed by Rational to support development teams with a set of guidelines to successfully implement system applications. Its core principles can be summarised in the following six issues: Iterative development to lessen the risks already in the early phases of...

Img