These blog is defined with different topics. Firstly, it is talk about internet security. Internet security is preventing important data. Now a day it becomes major issue. Companies must have to prevent client data. This risk become worse when there is no protection. IT security is very useful to the business users because it makes them feel secured and confident from any cyber crime. Concurrency is allowing simultaneous access of same data by different users. There are two types of concurrency exclusive and shared lock. Transaction is sequence of information exchanging and related work that is treated as a unit for the purposes of satisfying a request and data integrity. Business process modelling is software engineering is the activity of representing process of an entire organization. It is mainly using by analysts and managers who are improve process efficiency and quality. Modelling with UML is easy to solve the problems with the help of algorithm description for methods. M-commerce is about proving services for mobile clients. It is buying and selling of goods and services through wireless handheld devices such as cellular phone. In workshop it contains PHP and CORBA. PHP is Hypertext Pre-processor. It is server-side scripting language. Furthermore it defines syntax, variables and how to use PHP. Database connectivity is heart of the PHP. With the help of SQL connectivity organization can easily store client data in their system. CORBA is Common Object Request Broker Architecture. It is standard distributed object architecture developed by the object Management Group (OMG). A semaphore is a protected variable or abstract data type that constitutes a constitutes a classic method of controlling access by several processes to a common resource in a parallel programming environment.
Thursday, June 3, 2010
Friday, May 28, 2010
Task 4: Semaphore
Semaphore
A semaphore is a protected variable or abstract data type that constitutes a constitutes a classic method of controlling access by several processes to a common resource in a parallel programming environment. It generally takes one or two forms: binary and counting. A binary semaphore is a simple true and false that controls access to single resource.
There is one Pascal example is defined below
procedure V (S : Semaphore);
begin (* Atomic operation: increment the semaphore. *) S := S + 1; end; (* Atomic operation: decrement the semaphore. *) procedure P (S : Semaphore); begin (* Whole operation is atomic *) repeat Wait(); until S > 0; S := S - 1; end;Reference
Treese, GW & Stewart, LC 2003, Designing systems for Internet commerce, 2nd edn, Addison-Wesley, Boston, MA.
Task3: CORBA
CORBA
CORBA is Common Object Request Broker Architecture. It is standard distributed object architecture developed by the object Management Group (OMG).
CORBA object differ from typical programming language objects in these ways:
- CORBA objects can be located anywhere on a network.
- CORBA objects can interoperate with objects on other platforms.
- CORBA objects can be written in any programming language for which there is a mapping from OMG IDL to that language.
CORBA object Interface
All CORBA objects support an IDL interface. It defines as object type. An interface can inherit from one or more interface. It is very similar to Java and C++.
An IDL interface declares a set of client accessible operations, exceptions, and typed attributes (values). Each operation has a signature that defines its name, parameters, result, and exceptions. A simple IDL interface that describes the classic "Hello World" program, follows.
module HelloApp
{
interface Hello
{
string sayHello();
};
};
Reference
Krill, P (2008). Cobra language slithering to open source. Retrieved on 23/05/2010 from http://www.infoworld.com/d/developer-world/cobra-language-slithering-open-source-202
Task2: Variable and Connectivity with MySQL
Variables in PHP
To storing the values we are using variables, like text strings, numbers and arrays. We can use variable in whole programme. The variables start with $ sign.
Example
$var_name = value;
Rules for variable
- A variable name must start with a letter or an underscore "_"
- A variable name can only contain alpha-numeric characters and underscores (a-z, A-Z, 0-9, and _ )
- A variable name should not contain spaces. If a variable name is more than one word, it should be separated with an underscore ($my_string), or with capitalization ($myString)
MySQL Database
MySQL is database. MySQL is stored in database objects called tables. A table is a collection of related data entries and it consists of columns and rows.
MySQL Connection
In PHP, my connection function is:
mysql_connect(servername,username,password);
Example of MySQL connection in PHP
$con = mysql_connect("localhost","peter","abc123");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}
// some code
?>
if (!$con)
{
die('Could not connect: ' . mysql_error());
}
// some code
?>
Closing Connection
The connection will be closed automatically when the script ends.
$con = mysql_connect("localhost","peter","abc123");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}
// some code
mysql_close($con);
?>
if (!$con)
{
die('Could not connect: ' . mysql_error());
}
// some code
mysql_close($con);
?>
Reference
n.d (2010). PHP. Retrieved on 23/05/2010 from http://www.w3schools.com/php/default.asp
Task 1: PHP Introduction
PHP Introduction
1. PHP stands for Hypertext Preprocessor
2. It is server-side scripting language
3. It is executed on server
4. It supports many databases like MySQL, Oracle, Informix, Sybase, generic ODBC, etc
5. It is an open source software
6. It is free to download and use
What is PHP file?
It can contain text, HTML tags and scripts. It is returned to the file browser as plain HTML. PHP files have a file extension of “.PHP”, “.PHP3” or “.phtml”
Why PHP?
PHP returns on many platforms like windows, Linux, Unix. It is compatible with all servers which we are using today like apache, IIS, etc. It is easy to learn. It is easy to run on server side.
PHP syntax
A PHP scripting always start with .
Example:
?>
Php file normally contains HTML tags, just like HTML file and some php scripting code.
Comments in PHP
There are two types of comment we r using. First is single line and multiple line comments. To use single line comment we use //. Second is multiple line comments use /* and */.
For example
//This is a comment
/*
This is
a comment
block
*/
?>
Week 10- M-commerce
M-commerce
M-commerce is about proving services for mobile clients. It is buying and selling of goods and services through wireless handheld devices such as cellular phone. The emerging technology behind e-commerce is based on wireless application protocol. M-commerce market potentially handset manufacturer such as Nokia, Ericsson, Motorola are working with carriers such as AT&T wireless. As delivery purpose mobile device is very faster, more secure and scalable. There are lots of companies are affected by m-commerce like financial services which includes mobile banking. Telecommunications, in which service changes, bill payment and account reviews can all be conducted from the same handheld device. Service/retail, as consumers are given the ability to place and pay for orders on-the-fly. Information services, which include the delivery of financial news, sports figures and traffic updates to a single mobile device.
Reference
n.d (2000). M-commerce. Retrieved on 22/05/2010 from http://searchmobilecomputing.techtarget.com/definition/m-commerce
Week 9- Business process modelling
Business process modelling
It is software engineering is the activity of representing process of an entire organization. It is mainly using by analysts and managers who are improve process efficiency and quality. In this process they may not require information technology.
Business process modelling defines in:
• The various model elements may be joined together
• produces a coherent picture of a named business process
• includes the inputs, outputs, events, goals and other resources
which are of significance (Ince D,2004)
Value-added ethical design
Online system is very hard to maintain because e-commerce applications are growing quickly. It protects personal integrity, privacy, identity theft. Business process modelling is needed can include ethical values as a way of increasing value made by business process. Some people are still avoiding exchanging their information online. People value privacy and their personal integrity, but computerised record keeping in online databases can disturb feelings of trust in online information exchange.
Why modelling with UML
It is easy to solve the problems with the help of algorithm description for methods. The important for the event determined processes that may exist behind fields. The holistic model of the development environment is required and this process is part of object modelling technique. Object modelling consists of set of classes. The classes define the properties and actions of the object in present life. Once class is defined, many objects of that same class can be created. But in this case not every class is related to other class. The eight main diagrams used in UML are: (Conallen,2003)
1. Use Case
2. Class
3. Sequence
4. Collaboration
5. State chart
6. Activity
7. Component
8. Deployment diagrams
References
Ince, D 2004, 'Developing distributed and e-commerce applications', 2nd edn, Addison-Wesley, Harlow, Essex, UK.
Conallen, J 2003, Building web applications with UML, 2nd edn, Addison-Wesley, Reading, MA.
It is software engineering is the activity of representing process of an entire organization. It is mainly using by analysts and managers who are improve process efficiency and quality. In this process they may not require information technology.
Business process modelling defines in:
• The various model elements may be joined together
• produces a coherent picture of a named business process
• includes the inputs, outputs, events, goals and other resources
which are of significance (Ince D,2004)
Value-added ethical design
Online system is very hard to maintain because e-commerce applications are growing quickly. It protects personal integrity, privacy, identity theft. Business process modelling is needed can include ethical values as a way of increasing value made by business process. Some people are still avoiding exchanging their information online. People value privacy and their personal integrity, but computerised record keeping in online databases can disturb feelings of trust in online information exchange.
Why modelling with UML
It is easy to solve the problems with the help of algorithm description for methods. The important for the event determined processes that may exist behind fields. The holistic model of the development environment is required and this process is part of object modelling technique. Object modelling consists of set of classes. The classes define the properties and actions of the object in present life. Once class is defined, many objects of that same class can be created. But in this case not every class is related to other class. The eight main diagrams used in UML are: (Conallen,2003)
1. Use Case
2. Class
3. Sequence
4. Collaboration
5. State chart
6. Activity
7. Component
8. Deployment diagrams
References
Ince, D 2004, 'Developing distributed and e-commerce applications', 2nd edn, Addison-Wesley, Harlow, Essex, UK.
Conallen, J 2003, Building web applications with UML, 2nd edn, Addison-Wesley, Reading, MA.
Subscribe to:
Posts (Atom)

