Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Gumz, Joy
Project Auditors
Rancho Santa Margarita, California
 
   Featured Reviewer
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Joy Gumz is the Director of Project Auditors, LLC, a project management, training, and quality assurance auditing firm. Her current projects include a quality assurance review of a Peoplesoft implementation at a United Nations organization, co-teaching software project management at the University of California, Irvine, and a data validation review for a major wireless telecommunications corporation.

Gumz has over 20 years of experience in technology development and management. Since 2001, she has specialized in advice on quality assurance issues and implementations of enterprise resource planning(ERP) applications. This expertise is grounded by her previous positions of increasing responsibility at major software firms and consulting companies. As a consultant for Peoplesoft, she provided advice to Fortune 1000 and Global 2000 corporations in the US and Switzerland. As an account manager for Plumtree Software, a portal software vendor, she provided real-world implementation advice to Fortune 500 and entrepreneurial firms. She has also served as a director of technology at Squaw Valley Ski Corp., a western US ski resort. Prior to moving west, Gumz worked at Ernst & Young in Chicago.

Gumz holds B.A. in Economics and Mathematics from Ripon College, Wisconsin, and is a Certified Public Accountant. With the increasing complexity of technology projects and the need for project management skills increasing, she is currently studying for her Project Management Institute (PMI) Project Management Professional (PMP) certification.

Gumz has written a number of project management and technical articles published in local and international print and online media.

Gumz is on the Council of Advisors to Institutional Fund Managers and Venture Capitalists, representing $300 billion in managed funds. She is a guest lecturer at the University of California, and a member of the Orange County Project Management Institute. She is fluent in French and German, and is currently studying Italian while on assignment with a United Nations organization in Rome, Italy. She is interested in nontechnical issues such as languages and translations, and has assisted with translations for Web sites and nonprofit organizations. When not doing technical work, she devotes time to educating others about the propagation and culture of edible tropical plants. She is a member of the Orange County Rare Fruit Grower organization and the Orange County Wine Society.

 
 
Options:
Date Reviewed  
 
1
- 10 of 20 reviews

   
  Combatting cybercrime and cyberterrorism: challenges, trends and priorities
Akhgar B., Brewster B., Springer International Publishing, New York, NY, 2016. 306 pp.  Type: Book (978-3-319389-29-5)

Cybercrime investigations are different from traditional crime investigation, requiring in-depth technical expertise and large-scale cross-jurisdictional effort. In May 2016, a well-organized group of 100 in Tokyo used stolen South Afr...

Oct 13 2016  
  A complete formalized knowledge representation model for advanced digital forensics timeline analysis
Chabot Y., Bertaux A., Nicolle C., Kechadi M. Digital Investigation: The International Journal of Digital Forensics & Incident Response 11S95-S105, 2014.  Type: Article

The purpose of a timeline is to graphically represent data in a way that allows one to more easily understand the sequence of events, their relationship to each other, and the incident as a whole. One of the most famous, and arguably t...

May 4 2015  
  Fraud and financial crime detection model using malware forensics
Kim A., Kim S., Park W., Lee D. Multimedia Tools and Applications 68(2): 479-496, 2014.  Type: Article

Fraud involving financial services transactions is on the rise. There are multiple reasons fraud is increasingly a concern. First, the volume of transactions is growing by double digits annually and the transaction volume is huge. In 2...

Nov 12 2014  
  Network intrusion analysis: methodologies, tools, and techniques for incident analysis and response
Fichera J., Bolt S., Syngress Publishing, Waltham, MA, 2013. 252 pp.  Type: Book (978-1-597499-62-0)

My expectations were high for this book, which seems to cover the territory I wanted it to. Reading it is similar to sitting with someone who is showing you how to use forensic tools on a networked personal computer (PC) running Window...

Jul 19 2013  
  Enterprise iPhone and iPad administrator’s guide
Edge C., Apress, Berkeley, CA, 2010. 392 pp.  Type: Book (978-1-430230-09-0)

In 2007, Forrester Research listed ten reasons why enterprises should not adopt the iPhone. Less than a year later, they were backtracking. This was a smart move since Apple now has 16 percent of the smartphone market and 40 percent of...

Aug 19 2011  
  Using the agile unified process in banking
Christou I., Ponis S., Palaiologou E. IEEE Software 27(3): 72-79, 2010.  Type: Article

Agile software development is “based on incremental and iterative development, where requirements and solutions evolve through collaboration between self-organizing, cross-functional teams” [1]. Although the term wa...

Dec 15 2010  
  JDBC metadata, MySQL, and Oracle recipes: a problem-solution approach (Expert’s Voice in Java)
Parsian M., Apress, Berkeley, CA, 2006. 504 pp.  Type: Book (9781590596371), Reviews: (1 of 2)

This sounds like a very technical book, and readers who expect one will not be disappointed. Originally announced by Sun Microsystems in 1996, JDBC is a database access application programming interface (API) that enables developers to...

Jan 29 2007  
   Economic analysis of information system investment in banking industry
Ukai Y. (ed), Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 235 pp.  Type: Book (9784431242048)

The Japanese banking crisis of the 1990s has received substantial attention from scholars and the business press. How could an economy so seemingly vigorous begin to fail? In the 1970s and 1980s, it seemed every product sold in the US ...

Sep 8 2006  
  Hacking mobile phones
Fadia A., Course Technology Press, Boston, MA, 2005. 320 pp.  Type: Book (9781598631067)

In 1987, Nokia produced the world’s first hand-portable phone: the Nokia Cityman. Who would have guessed that in 2006 there would be between one and two billion cellular phones in use worldwide? And where there is technol...

Aug 1 2006  
   Real digital forensics: computer security and incident response
Jones K., Bejtlich R., Rose C., Addison-Wesley Professional, Boston, MA, 2005. 688 pp.  Type: Book (9780321240699), Reviews: (2 of 2)

Working in the digital forensics field can be likened to the job of a firefighter: interminable periods of boredom punctuated by brief moments of intense stress. For those who are not deterred by that description, and who are seeking h...

Mar 16 2006  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy