Skip to main content

Posts

ERP Microsoft AX Certification,SAP Training Institutes in India

Microsoft Dynamics AX – 4.0 Ontrack ERP School, Y18, EP Block, Kolkata 700064 Sector V Salt Lake. Kolkata 700 091 Nearest Landmark- IEM Building at College More (The road between IEM & SIMOCO Mobile) Phone: 033-2357-2555/2556/2560 Email: erpco@ontrackindia.com Source Tek Solutions Computer Training in Begumpet, Hyderabad Provide Online Computer Training, Testing Tools, Java, .Net, Microsoft Share Point Server, Business Analyst in Hyderabad. For further details contact us @ 9848084140. V.S. Technologies Pvt. Ltd. Computer Training in Ameerpet, Hyderabad V.S. Technologies Pvt. Ltd. is the Offshore Training Center of V-Soft Consulting Group, Inc., headquartered in Louisville, Kentucky.V-Soft has a legacy of 8 years experience in virtually all aspects of the Information Technology business and... 1. KITS Computer Training in Ameerpet, Hyderabad The institute is established by software professionals with more than 15 years of experience in IT in USA. Training in a...

Evolution of wireless communication,electromagnetic waves, mobile phones, satellites, telecommunication

Evolution of wireless communication Communication between two  communications devices   can basically classified as   follows a. wired communication b. wireless communication           Our   focus is on only mobile phone and cell phone. Before mobile phone [wireless communication],   telephone came into existence. 1876 -telephone was invented by Alexander Graham bell 1881-in   Berlin   public telephone service was started [wired circuit switching network]. In early 18 century wireless communication was existing through optical medium. The wireless communication boomed only after invention of electromagnetic waves by Michael Farady. 1907-the first commercial transatlantic connection were setup using huge base stations. On both side. 1920-marconi discovery of short waves gets reflected ionosphere. This helps to sent wireless messages around the world bouncing at the iono...

FEATURES OF C++

FEATURES OF C++ Classes and Objects: Class defines the properties of an object. It is the group of similar objects. It defines data member and member functions. Variables of the class are called objects, each object has it own separate memory. Object is also called instance of a class when it is initialized. Encapsulation: It means binding of data members and member function in a class. Data hiding : We always the data members as private and member functions as public. Private members are not accessible outside the class they can only be accessed through the public member functions. Data Abstraction: We always define the essential properties of an object without going to the background details. ADT(abstract data types): A class defines only the essential properties of an object without going to the background details. Inheritance: We can inherit all the properties of a class instead of redefining all these properties again. Hence, inheritance provides the programmer with ...

Books name of visual studio .net and Networking

1. Dave Grundgeiger(2002)”Programming Visual Basic .NET” First Edition, O’Reilly, pp->311-345 2. Matthew A. Stoecker(2003)”Developing Windows-Based Applications “Second Edition,PHI,pp->359-399 3. S.Michel et al.(1998) ”Adaptive Web Caching: Towards A New Global Caching Architecture”, Computer Networks & ISDN Syst., 4. K. Thompson, G. Miller, and R. Wilder, "Wide-Area Internet Traffic Patterns and Characteristics," Proc. 3rd Int'l. Conf. Web Caching, 1998 5. Thuan Thai Hoang Q. Lam(2001)”.NET Framework Essentials”,O’Reilly,pp->183-207

SDLC Objectives and Testing Methodology

SDLC Objectives objectives include the following: To reduce the risk of project failure To consider system and data requirements throughout the entire life of the system To identify technical and management issues early To disclose all life cycle costs to guide business decisions To foster realistic expectations of what the systems will and will not provide To provide information to better balance programmatic, technical, management, and cost aspects of proposed system development or modification To encourage periodic evaluations to identify systems that are no longer effective To measure progress and status for effective corrective action To support effective resource management and budget planning To consider meeting current and future business requirements Testing Methodology To be truly robust, distributed applications require more than simple functional testing before release into production. You should perform at least one—and preferably all—of the following types...

Benefits of the re-engineered process

Benefits of the re-engineered process: The re-engineered process benefits an internal auditor in the following manner:- 1) Organized collection of data:- Use of audit logs ensures the auditor that the track of all the required transactions are made in an organized manner this reduces the time that the auditor will take in collecting data from the original source. Moreover the cost incurred will be less. The data collected will be more authentic as no manipulation can be made by any person to the data which is stored in the audit log since it can be retrieved only by the auditor 2) Reduction in time for completion of audit:- Timely and accurate data ensures that the audit is completed within the specified time limit, moreover frequent interaction with the external auditor ensures that corrective measures in the audit plan is made regularly. 3) Cost effective:- The auditor need not maintain separate files for all the working papers and audit trials since these will be there in th...

What is Digital signatures

What is Digital signatures   A major benefit of public key cryptography is that it provides a method for employing digital signatures. Digital signatures let the recipient of information verify the authenticity of the information’s origin, and also verify that the information was not altered while in transit. Thus, public key digital signatures provide authentication and data integrity. These features are every bit as fundamental to cryptography as privacy, if not more.  A digital signature serves the same purpose as a seal on a document, or a hand-written signature. However, because of the way it is created, it is superior to a seal or signature in an important way. A digital signature not only attests to the identity of the signer, but it also shows that the contents of the information signed has not been modified.  A physical seal or handwritten signature cannot do that. However, like a physical seal that can be created by anyone with possession of the sig...