PinnedPublished inSophophilic MeFrom Parenthood to Pentester: Insights from a Woman in CybersecurityEarlier this year, I had the honor of interviewing Jennifer “Jen” Bate, a parent turned professional penetration tester who happens to be a…Oct 26, 2021Oct 26, 2021
Divergent Paths to Data Warehousing: Kimball vs Inmon ModelsData warehousing stands as a pivotal element in modern data management, especially in an era driven by big data analytics. Two predominant…Jan 17, 2024Jan 17, 2024
1 W5 — Descriptive Analysis Techniques in Data Science Bianca R S Sousa Southern States University…Sep 11, 2023Sep 11, 2023
How to Build Your First Cybersecurity LabAs a student, you may be wondering how to get started in the field of cybersecurity. One way to gain experience and knowledge is to build…Feb 21, 2023Feb 21, 2023
Select a specific data flow model or system.A data flow diagram (DFD) is a visual representation of how raw data is collected, stored, processed, and coverted into informaton. Think…Jun 28, 2021Jun 28, 2021
What data standards should you apply to your data dictionary for each project?“Data is the new gold,” those are the first five words that appear on nearly every About Me section on social media. This is because data…Jun 27, 2021Jun 27, 2021
Imagine you are managing multiple projects at different stages.As a full-time worker and a full-time student, I got a lot on my plate. Maybe not as much as most people (especially the ones with kids)…Jun 17, 2021Jun 17, 2021
What are the pros and cons of the waterfall method and what other project management methodology…The waterfall methodology is a project management planning process that uses a linear, sequential life cycle; whereby each phase of the…Jun 17, 2021Jun 17, 2021