IAStorDataSvc Using Too Much CPU in Windows 10

Unfortunately for a number of applications, Windows 10 tends to have a problem with excessive CPU usage (often caused by a memory leak). In the case of IAStorDataSvc (Intel Rapid Storage Technology Service), the issue resides in the way the application is continually running in the “background” of Windows. The tell-tale sign of a […]

Continue Reading

Crypto TREND 2017-01

Everyone has heard how Bitcoin and other crypto currencies have made millionaires of those who bought as recently as a year ago. Gains of 1,000% or more are not just possible, they have been common place with many of these crypto currencies. Someone who bought Bitcoin in May 2016 at less than $500, would […]

Continue Reading

Security Metal Detectors

For ages, man has hammered against rock to obtain precious materials from the earth’s surface. This can coal, ore, diamonds and other minerals but during that time, metal detectors were both crude and primitive. It is only by hitting the ground and listening to the sound that will determine if there was something underneath. […]

Continue Reading

CMM and Project Management – Tracking and Oversight

The goal of the Software Project Tracking and Oversight Key Process Area (KPA) is to provide sufficient insight into project performance so that the project manager can detect variances between performance and the plan and take preventive or corrective action. This KPA influences all PMBOK knowledge areas and is most closely associated with the […]

Continue Reading

A Guide to Research and Thesis Writing: A Structured Approach for Master's and Doctoral Students

Thesis Writing should identify 3 aspects of the thesis: the {topic}, the {issue} and the {scope}. Once these aspects are determined, the researcher should synthesize {Type} {Topic} {Modifier} {Issue} {Scope} to generate the thesis title. Note that {Type} and {Modifier} are available available and not specific to any particular research. Following this, the title […]

Continue Reading