Thursday 29 December 2011

Tips for Effective Software Reuse :


Tips for Effective Software Reuse:

Anyone who has spent time building software in an organization will tell you that achieving software reuse is extremely challenging. Large scale, systematic reuse is even harder in an organization. As a developer with deadlines to meet and functionality to deliver it is challenging to keep reuse as a priority. If you are a team lead this situation is worse - now you have to meet sponsor needs, deliver functionality on time and within budget, and manage the development team. Reuse, what reuse?

Reuse-Based Software Engineering :


Reuse-based software engineering:
      Application system reuse
      The whole of an application system may be reused either by incorporating it without change into other systems or by developing application families
      Component reuse
      Components of an application from sub-systems to single objects may be reused
      Function reuse
      Software components that implement a single well-defined function may be reused

Examples of Software Reuse:


Example: 1 . ENGINEER'S TASKS
Reuse requires new job roles and different tasks for the engineer. This will be illustrated with an analogy to the task of home construction. The advent of prefabricated parts for home construction has provided home builders with a less costly alternative to construction from scratch. Home builders can rely upon standard parts which may be used to construct homes in a much shorter time than historically possible. However before such prefabricated parts are made available to the home builder, they must be specified, designed and created.

Process of Software Reuse :


PROCESS OF REUSE
Experience has shown that reuse is not merely creating a repository, having engineers deposit assets and hoping that other engineers will reuse the repository's contents. Rather, successful implementation of reuse requires an infrastructure to support reuse. A critical aspect of the infrastructure is the process of reuse.
Process of Software Reuse
In its simplest form, the process of reuse consists of four major activities: manage the reuse infrastructure (MRI), produce reusable assets (PRA), broker reusable assets (BRA) and consume reusable assets (CRA).

Types of Software Reuse, Software Assets?


Types of Software Reuse:
Opportunistic reuse - While getting ready to begin a project, the team realizes that there are existing components that they can reuse.
      Planned reuse - A team strategically designs components so that they'll be reusable in future projects.
Opportunistic reuse can be categorized further:
  • Internal reuse - A team reuses its own components. This may be a business decision, since the team may want to control a component critical to the project.
  • External reuse - A team may choose to license a third-party component. Licensing a third-party component typically costs the team 1 to 20 percent of what it would cost to develop internally. The team must also consider the time it takes to find, learn and integrate the component.

What is Software Reuse?


Software reuse: Ad hoc code reuse has been practiced from the earliest days of programming. Programmers have always reused sections of code, templates, functions, and procedures. Software reuse as a recognized area of study in software engineering, however, dates only from 1968 when Douglas McIlroy of Bell Laboratories proposed basing the software industry on reusable components.

What is FTP?


INTRODUCTION
PURPOSE : FTP (File Transfer Protocol) is the generic term for a group of computer programs aimed at facilitating the transfer of files or data from one computer to another. It originated in the Massachusetts Institute of Technology (MIT) in the early 1970s when mainframes, dumb terminals and time-sharing were the standard.

Wednesday 28 December 2011

What are General Purpose Processors?


GENERAL PURPOSE PROCESSOR:
The designer of a general purpose processor builds a programmable device suitable for a variety of applications.
        One feature of such a processor is a program memory the designer of such a processor does not know about what program will run on the processor, so the program cannot be built into a digital circuit.
       Another feature is a general data path – the data path must be general enough to handle a variety of computations, so such a data path typically has a large register file and one or more general purpose ALU’s. An embedded system designer however need not be concerned about its design. He simply programs it to carry out required functionality. Hence it is referred as a software portion.

What is Single Purpose Processor?


SINGLE PURPOSE PROCESSOR:-
     A single purpose processor is a digital; circuit designed to execute exactly one program. An embedded system designer may obtain several benefits by choosing to use a custom single purpose processor to implement a computation task.
    A basic processor consists of a controller and a data path.
The data path stores and manipulates a system’s data. The data path contains registers units, functional units and connection like wires and multiplexers.

What are Embedded Systems?


EMBEDDED SYSTEMS
INTRODUCTION:
Computing systems are everywhere. It is probably no surprise that millions of computing system are built every year, destined for desktop computers, laptops, servers etc.
What may be surprising is that there are billions of computing systems built for a single purpose; they are embedded within larger electronic devices, performing single function and often going completely unrecognized by the user. These are called EMBEDDED SYSTEMS.

Tuesday 27 December 2011

Working of Liquid Cooled PC


Cooling with Liquid
A liquid-cooling system for a PC is a lot like a cooling system for a car. Coolant flows through channels in a car's engine block, and the rest of the cooling system incorporates:
·         A pump that moves coolant through the system
·         A radiator that dispels heat into the air
·         A fan that moves air over the radiator
·         A coolant reservoir that holds extra fluid and allows easy addition of coolant
·         Hoses that connect the different parts of the system

Liquid Cooled PC


What are Liquid-Cooled PCs: Whether you're using a desktop or laptop computer, there's a good chance that if you stop what you're doing and listen carefully, you'll hear the whirring of a small fan. If your computer has a high-end video card and lots of processing power, you might even hear more than one.

Wednesday 21 December 2011

What is JSP?



Architecturally, JSP may be viewed as a high-level abstraction of Java servlets JSP pages are loaded in the server and operated from a structured special installed Java server packet called a Java EE Web Application, often packaged as a .war or .ear file archive.

Tuesday 20 December 2011

Mode and Manner of Committing Cyber Crime:

1.       Theft of information contained in electronic form: This includes information stored in computer hard disk, removable storage media etc. Theft may be either by appropriating the data physically or by tempering them through the virtual medium.
2.       Email Bombing: This kind of activity refers to sending large number of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing.

Reasons for Cyber Crime


Reasons for Cyber Crime: Hart in this work “The Concept of Law” has said “human beings are vulnerable so rule of law is required to protect them”. Applying this to the cyber crime we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber crime. The reasons for vulnerability of computers may be said to be:

Monday 19 December 2011

What is Cyber Crime?


Cyber Crime: The term cyber crime is a misnomer. This term has nowhere been defined in any statue/ Act passed or enacted by the Indian Parliament. The concept of cyber crime is not radically different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the sanction of the state.

Wisenet a Wireless Sensor Network

WISENET : WISENET is a wireless sensor network that monitors the environmental conditions such as light, temperature and humidity. This network is comprised of nodes called “motes” that form an ad-hoc network to transmit this data to a computer that function as a server. The server stores the data in the database where it can later be retrieved and analyzed via a web based interface. The network works successfully with an implementation of one sensor mote.

Sunday 18 December 2011

Virtual Brain " Blue Brain"

Human Brain is the most valuable creation of God. The man is called intelligent because of the brain. Today we are developed because we can think that other animals cannot do. But we loss the knowledge of a brain when the body is destroyed after the death of man. That knowledge might have been used for the development of the human society. What happen if we create a brain and upload the contents of natural brain into it?