Tag Archives: technology

Introduction to MySQL Query Expansion – Part 1

12 Sep

We all know that back in stone age, the cave-man had no issues with data incompatibility, storage and search because stones & leaves were the only medium for data storage and search but that is past and  today we are in 21st century where we have to dealt with tons and tons of data and the data searching becomes more important.

Today we are going to learn the basics of MySQL Query Expansion. There are some cases,  where you want to find some information based on limited knowledge that you have. You use some keywords to search for information, and typically those keywords are too short. To solve this problem and help users to find what they want based on the too-short keywords, MySQL full-text search engine introduces a concept called query expansion.

What is query expansion?

The term query expansion in MySQL is used to broaden the search result of the full-text searches based on automatic relevance feedback which is sometimes referred as blind query expansion. Let us understand  how MySQL full-text search engine performs the steps when the query expansion is used:

  • First, MySQL full-text search engine looks for all the rows that match the search query provided by you.
  • Second, it checks all rows in the search result and then it finds all the relevant words.
  • Third, it performs a search again but based on the relevant words instead of the original keywords provided by the users.

Since you understood the basic concepts of query expansion, it might be clear  that you can use the query expansion when the search results are too short. You need to  perform the searches again but with query expansion to offer users more information that are related and relevant to the user.

Lets us understand the syntax:

In order to use query expansion, you need to use the WITH QUERY EXPANSION search modifier in the AGAINST()function. The following illustrates the syntax of the query using the WITH QUERY EXPANSION search modifier.

SELECT column1, column2
FROM table1
WHERE MATCH(column1,column2)
      AGAINST(‘keyword’,WITH QUERY EXPANSION);
In the next post, I’ll be continuing this topic with relevant examples and will see some quick facts about the full- text search. Please share your feedback and share if you like this topic.
Advertisements

Categorization of CMMI Processes Area

6 Sep

Once again back with process improvement topic, when we though of process oriented organization, few of us think that it can be achieved easily but believe me it don’t happens over the night. There are teams who sweats day & night to establish a formal process and in every organizations there are people who don’t like changes but change in inevitable in nature and we must be ready for the same. CMMI is a framework for process improvement and today we are going to categories CMMI processes area.

CMMI Process area are divided into two categories respectively:

  1. Maturity Level wise
  2.  Category Level wise

Further if we categories maturity level, it can be divided into 5 maturity level. Any company or organization which is having no process is by default at level 1.

  1. Maturity Level 1 – Initial (Having no processes and nothing being followed)
  2. Maturity Level 2 – Managed
    1. Configuration Management
    2. Measurement & Analysis
    3. Project Monitoring & control
    4. Project Planning
    5. Process & Product Quality Assurance
    6. Supplier Agreement Management (SAM)
  3. Maturity Level 3 – Defined
    1. Decision Analysis & Resolution
    2. Integrated Project Plan
    3. Organizational Process Defination
    4. Organizational Training
    5. Organizational Process focus
    6. Producut Integration
    7. Requirement Development
    8. Risk Management
    9. Technical Solution
    10. Verification
    11. Validation
  4. Maturity Level 4- Quantitatively Managed
    1. Organization Process Performance
    2. Quantitative Project Management
  5. Maturity Level 5 – Optimizing 
    1. Casual Analysis & Resolution (CAR)
    2. Organizational Performance Management

If you want to divide category wise process area then it can be divided into four category ;

  1. Project Management
    1. Integrated Project Plan (IPP)
    2. Project Monitoring & Control (PMC)
    3. Project Plan (PP)
    4. Quantitative Project Management (QPM)
    5. Requirement Management (REQM)
    6. Risk Management (RM/RSKM)
    7. Supplier Agreement Management (SAM)
  2. Engineering
    1. Product Integration (PI)
    2. Requirement Development (RD)
    3. Technical Solution (TS)
    4. Validation (VAL)
    5. Verification (VER)
  3. Process Management
    1. Organizational Performance Management (OPM)
    2. Organizational Process Definition (OPD)
    3. Organizational Process Focus (OPF)
    4. Organizational Training (OT)
  4. Support
    1. Casual Analysis & Resolution (CAR)
    2. Configuration Management (CM)
    3. Decision Analysis & Resolution (DAR)
    4. Measurement & Analysis (MA)
    5. Product & Process Quality Assurance (PPQA)

If you have counted there are 22 process areas and each represent some activity in Maturity Level. If you want to learn more about these areas, I would encourage you to read my book on CMMI for Development.

 

If you are looking to hire an consultant for CMMI implementation, you can reach me on mukund002(at)gmail.com.

Top Misconceptions about PCI

5 Sep

Today I am going to focus on the major misconceptions that people have about PCI. So before getting started with the misconceptions, lets understand what is PCI & to whom it applies.

PCI DSS

What is PCI ?

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that all the companies that accept, process, store or transmit credit card information maintain a secure environment. The PCI Security Standards Council is a global forum for the ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection.

The PCI DSS is administered and managed by the PCI SSC (www.pcisecuritystandards.org), an independent body that was created by the major payment card brands (Visa, MasterCard, American Express, Discover and JCB card.)  Now since you have some knowledge about PCI, you might have understood that it applies to all the organizations regardless of  their size or the number of transactions, that accepts, transmits or stores any cardholder data.

Myth PCI

Let us now see the common misconceptions:

  • Since we don’t store credit card information, we don’t have to be PCI compliant. This statement is false as PCI DSS does not only apply to the storage of credit card data but it also applies to the handling of data while it is processed or transmitted over networks. Since you are not storing credit card data it does eliminate compliance requirements as the majority of the controls dictated by the DSS remain in effect. The only way to avoid PCI compliance is to transfer the risk entirely to someone else, such as third party payment,for example; PayPal’s Website Payments Standard service where customers interact with the PayPal SDK directly and credit card information never traverses to own servers.
  • The PCI Data Security Standards is only a recommendation and not a requirement. This is also a false statement. The Payment Card Industry Security Standards Council (PCI SSC) is a private regulatory body that enforce the PCI DSS standard for merchants and service providers, regardless of their number & size. If the company stores, processes, or transmits any of the information recorded on a credit or debit card then they must abide by the PCI DSS else they have to face significant fines, higher opex costs through increased compliance requirements, and potential suspension or expulsion from card processing networks.
  • Since we process a few number of credit cards only, so we don’t have to be compliant. Again a false statement. The merchants who process less than 20k transactions a year is not bound to seek the compliance validation  but the obligations of PCI compliance is still there as the data you store can be compromised and have serious consequences.
  • Since we use PayPal/Authorize.NET therefore we don’t have to be PCI complaint. People often thinks that we have transferred the burden of PCI compliance to the payment services provider but there are certain services (e.g. PayPal’s Website Payments Pro).If your website integrates with PayPal via an API then you are still liable for PCI compliance since your servers capture and transmit the credit card data first.
  • PCI  compliance only applies to eCommerce. The compliance is not applicable to any particular domain and hence it is applicable to every domain including eCommerce.

There are lots of other misconceptions about PCI which are not listed in this post. The purpose of the post is to share the general information and misconceptions of payment compliance. Please do share your feedback about this post.

References: 

https://www.pcisecuritystandards.org/document_library?association=PCI-DSS
https://www.pcisecuritystandards.org/

 

 

 

Planning & Implementing ISO 27001

3 Aug

In Today’s modern era security is still a big challenge for any sized organizations until you don’t have some form of control in place. These controls are necessary as information is one of the most valuable assets that a business owns. If you are IT services Provider and handling customers information then you must have to use security techniques such as Information Security Management System (ISMS).

What is ISMS?

In Layman term, ISMS is a framework of policies and procedures that include all legal, physical and technical controls involved in overall organization’s information risk management processes. Let us now move to the main focus area of this post which is planning & implementing ISO 27001.

Planning the Implementation 

Before implementation of ISO 27001, one needs to consider the cost of implementation, duration of the project, understanding of the model. In today’s time, every organization who wants to cut the cost without compromising the information security are looking at ISO 27001 certification as a promising means to provide knowledge about their IT security. The major cost involved in ISMS can be categorized as :

  • Internal Cost, such as resource cost including HR function, IT function, and support functions.
  • External Cost, such as consultants cost and this would be again to minimize the efforts required and reduce the cost.
  • Certification Cost, this is one of the costs which cannot be reduced as there are few companies providing certification and one has to pay the certification cost certifying bodies.
  • Implementation Cost, this can be analyzed by gap analysis and risk assessment procedure.

Another question may arise in your mind, how much time is required to complete this certification? On an average, the time four to nine months is required depending on how mature an organization is in term of Information security, and size & nature of the organizations.

As any standard practice, ISO 27001 requires a company to establish, implement and maintain a continuous improvement approach to manage its ISMS and it follows Plan-do-check-act (PDCA) Cycle.

PDCA

  1. Phase 1—Identify Business Objectives.
  2. Phase 2—Obtain Management Support.
  3. Phase 3—Select the Proper Scope of Implementation.
  4. Phase 4—Define a Method of Risk Assessment.
  5. Phase 5—Prepare an Inventory of Information Assets to Protect, and Rank Assets According to Risk and Classification Based on Risk Assessment.
  6. Phase 6—Manage the Risks, and Create a Risk Treatment Plan.
  7. Phase 7—Set Up Policies and Procedures to Control Risks.
  8. Phase 8—Allocate Resources, and Train the Staff.
  9. Phase 9—Monitor the Implementation of the ISMS.
  10. Phase 10—Prepare for the Certification Audit.
  11. Phase 11—Conduct Periodic Reassessment Audits

Conclusion: The success of ISO 27001 is its alignment with the business objectives and effectiveness in realizing those objectives. IT and other departments/functions play an important role in the implementation phase. An organization also needs to have the detailed understanding of PDCA implementation phases.

In the next article in the same series, I’ll try to explain each phases mentioned in PDCA Cycle and highlights on the importance of ISO 27001.

Thanks for reading this article, share your views.

What a Release Manager should focus on his first 90 Days

2 Dec

In my past posts, I have focused on Release Management and written lots of posts like Importance of pear process, Change Management Process, Release Management QA or Engineering and lot more. The focus of this post is about Release Manager job and What a Release Manager should focus on his first …

The Scope of E-Learning in India

28 Nov

Over the years, technology have played a key role in shaping our world. Technology is all around in every domain.  E-learning is one of the domain which have lots of potentials yet to come. This post will focus on the Socpe of E-Learning in India. It has eased the process of getting education to …

Magento version 1.8 available to Download

10 Oct

Finally wait is over for new version. New Magento version 1.8 is available,Are you happy with 1.7? if yes that’s good but you can try the newer version. Download it from here.
1. Security Updates :- The security feature of the system has witnessed a major overhaul with the recent update….