Skip to content

Mountain Lake

Mountain Lake, originally uploaded by jfinke.


Here is the first part of an article I wrote that tries to explain what the Federal Information Security Management Act is. It gives a brief overview and the starts through the 7 steps.

Access Controls Article

Here is an article I wrote regarding the basics of Access Controls. It deals mostly with AC in Information Assurance.

PMP Equations

Here are some equations which are important points when studying for your PMP exam.

Program Evaluation Review Technique (PERT)
This equation takes three estimates, Optimistic, Realistic, and Pessimistic, and averages them out with a weight given to Realistic. (Continued)


This uses LaTeX to generate equations. Then an image is generated from the LaTeX.
Tutorials for this: