...Danesh sk lane P.S – Shibpur,Dist – Howrah,West Bengal - 711109 |Career Objective | To work in a productive environment with ample opportunities to build strong technical and professional skills and to experience sustained career growth. |Professional Summary | • Having experience in developing client/server web application using Java/J2EE technology • Proficient in use of Struts , Spring and Hibernet Framework • Good knowledge in exposing and consuming Web services • Versatile in J2EE technologies specially Servlets, JSP, JDBC, EJB • Good Knowledge in Java server programming and MVC-architecture |Working Profile | . Worked at Platoon Technologies as Trainee Software Engineer (From 6th July 2009 to 7th June 2010 ) Bangalore, India. • Worked at Sasken Communication Technologies as Software Engineer (From 10th June 2010 to 29th March 2012) Bangalore, India |Software Proficiency ...
Words: 705 - Pages: 3
...How Can Web Based Applications Help and Influence Businesses Today? By Andrew Hansen # 297 349 April 6, 2012 Professor Frank Ezinga BUSI 370 Table of Contents I. Introduction of Topic II. Literature Review III. Discussion IV. Conclusion V. References VI. Appendices I. Introduction of Topic The ability for businesses today to effectively respond to changes in both their external and internal environments relate directly to their success. If a business has the ability to respond to changes in the external environment such as demands, trends and customer preference they can then structure their procedures and policies to maximize profit (Meyer 5). In the same sense if a firm is able to regulate and maintain an internal environment within the firm that is positive, influential and innovative then they will be able to more efficiently react to external changes and to stimulate new product ideas and efficiency from their employees. Businesses are continually searching for innovative ways to create a competitive advantage over their competitors. Ways that allow their firm to be able to respond better to their environment then others within their market (Table 1). This search is critical in relating to the future structure and success of the firm and will dictate whether or not this business will be able to survive in such a competitive economy. In the last few years the emergence of the Internet and other similar technology has changed the...
Words: 3667 - Pages: 15
...Telemark University College Department of Electrical Engineering, Information Technology and Cybernetics Using SQL Server in C# with Examples Hans-‐Petter Halvorsen, 2014.03.01 Faculty of Technology, Postboks 203, Kjølnes ring 56, N-3901 Porsgrunn, Norway. Tel: +47 35 57 50 00 Fax: +47 35 57 54 01 Table of Contents 1. Introduction ....................................................................................................................... 4 2. SQL Server .......................................................................................................................... 5 2.1. Database Systems ....................................................................................................... 5 2.2. Structured Query Language ........................................................................................ 5 3. Visual Studio ...................................................................................................................... 6 3.1. The .NET Framework ................................................................................................... 6 3.2. The C# Language ...........................
Words: 1390 - Pages: 6
...E-COMMERCE (TIT-501) UNIT I Introduction What is E-Commerce, Forces behind E-Commerce Industry Framework, Brief history of ECommerce, Inter Organizational E-Commerce Intra Organizational E-Commerce, and Consumer to Business Electronic Commerce, Architectural framework Network Infrastructure for E-Commerce Network Infrastructure for E-Commerce, Market forces behind I Way, Component of I way Access Equipment, Global Information Distribution Network, Broad band Telecommunication. UNIT-II Mobile Commerce Introduction to Mobile Commerce, Mobile Computing Application, Wireless Application Protocols, WAP Technology, Mobile Information Devices, Web Security Introduction to Web security, Firewalls & Transaction Security, Client Server Network, Emerging Client Server Security Threats, firewalls & Network Security. UNIT-III Encryption World Wide Web & Security, Encryption, Transaction security, Secret Key Encryption, Public Key Encryption, Virtual Private Network (VPM), Implementation Management Issues. UNIT - IV Electronic Payments Overview of Electronics payments, Digital Token based Electronics payment System, Smart Cards, Credit Card I Debit Card based EPS, Emerging financial Instruments, Home Banking, Online Banking. UNIT-V Net Commerce EDA, EDI Application in Business, Legal requirement in E -Commerce, Introduction to supply Chain Management, CRM, issues in Customer Relationship Management. References: 1. Greenstein and Feinman, “E-Commerce”, TMH 2. Ravi Kalakota, Andrew Whinston...
Words: 2913 - Pages: 12
...Training Curriculum Data Warehousing: • Introduction to Business Objects Enterprise Reporting • Fundamentals of Data warehouse Concepts • Introduction to Dimensional Modeling • Developing a Star Schema Reporting: • Building and editing queries with Web Intelligence • Performing on report analysis with Web Intelligence • Filtering Queries using conditions, prompts etc., • Using Combined Queries and merging dimensions • Displaying data in various formats (Ex: Tables, Charts etc.,) Advanced Reporting: • Calculations, Formulas and variables • Ranking Data, using Alerters to highlight data, Formatting numbers and Dates • Understanding Calculation Contexts • Web Intelligence Functions, Operators and Keywords • Calculating values with Smart Measures Universe Designer: • Designer and Universe Fundamentals • Creating a schema with Tables and Joins • Resolving Join problems in a schema • Defining Classes, Objects, hierarchies, using cascading list of values for hierarchies • Testing the universe • Working with OLAP universes Xcelsius 2008: • Application Overview • Creating and Updating Xcelsius visualizations • Using Xcelsius components ( Chart, Containers, Selectors etc.,) • Exporting Xcelsius visualizations to various applications (Power point, PDF, Flash • Creating templates, Alerts and Dynamic visibility • Using Data Manager ( Creating and configuring connections) • Live Office Connections, Query As A Web Service (QWAAS), XML data Connections ...
Words: 462 - Pages: 2
...Server development. Introduction An overview of DBMS technology * How data is accessed, organized and stored * The database development process * Query and application development tools * CASE tools for database analysis and design * Tables, attributes and relationships * Primary and foreign keys * Relational integrity constraints * Manipulating data: selection, projection, join, union, intersection, difference * An integrated, active data dictionary * The query optimizer * Developing the logical data model * Mapping the data model to the relational model * Specifying integrity constraints * Defining the data in the data dictionary * Capturing entities, attributes and identifiers * Describing relationships: one-to-one, one-to-many, many-to-many * Optional and mandatory relationships * Resolving many-to-many relationships for implementation * Generating the SQL to build the database * Reverse engineering to capture the design of an existing database * SQL Programming Language Introduction 1 Days * Write SQL code based on ANSI/ISO standards to build Microsoft SQL Server or Oracle database structures * Update database content with SQL and transaction handling * Retrieve data with filter conditions and from multiple tables using various types of join * Process data with row and aggregate functions * SQL Server Introductory Courses * SQL Server Introduction 1Days * Create...
Words: 1010 - Pages: 5
...Small Logo White Paper Introduction to Cloud Computing Introduction to Cloud Computing White Paper Executive Summary A common understanding of “cloud computing” is continuously evolving, and the terminology and concepts used to define it often need clarifying. Press coverage can be vague or may not fully capture the extent of what cloud computing entails or represents, sometimes reporting how companies are making their solutions available in the “cloud” or how “cloud computing” is the way forward, but not examining the characteristics, models, and services involved in understanding what cloud computing is and what it can become. This white paper introduces internet-based cloud computing, exploring the characteristics, service models, and deployment models in use today, as well as the benefits and challenges associated with cloud computing. Also discussed are the communications services in the cloud (including ways to access the cloud, such as web APIs and media control interfaces) and the importance of scalability and flexibility in a cloud-based environment. Also noted for businesses desiring to start using communication services, are the interface choices available, including Web 2.0 APIs, media control interfaces, Java interfaces, and XML based interfaces, catering to a wide range of application and service creation developers. Introduction to Cloud Computing Table of Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . ....
Words: 3208 - Pages: 13
...UNIT 1 A Introduction to computers Unit 1 WUC 117/03 Introduction to Computing and Internet Introduction to Computers B WAWASAN OPEN UNIVERSITY WUC 117/03 Introduction to Computing and Internet COURSE TEAM Course Team Coordinator: Mr. Kevin Tan Pooi Soo Content Writer: Ms. Parasathy Daivasigamani Instructional Designer: Ms. Jeanne Chow Academic Members: Mr. Chandarasageran a/l Natarajan and Mr. Ishan Sudeera Abeywardena COURSE COORDINATOR Mr. Kevin Tan Pooi Soo EXTERNAL COURSE ASSESSOR Associate Professor Norhaziah Md Salleh PRODUCTION Editor: Mr. Terence Too Yang-Yau In-house Editor: Ms. Jeanne Chow Graphic Designers: Ms. Patsy Yap and Ms. Leong Yin Ling Wawasan Open University is Malaysia’s first private not-for-profit tertiary institution dedicated to adult learners. It is funded by the Wawasan Education Foundation, a tax-exempt entity established by the Malaysian People’s Movement Party (Gerakan) and supported by the Yeap Chor Ee Charitable and Endowment Trusts, other charities, corporations and members of the public. The course material development of the university is funded by Yeap Chor Ee Charitable and Endowment Trusts. © 2008 Wawasan Open University First revision S1 2011 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission from WOU. Wawasan Open...
Words: 26839 - Pages: 108
...------------------------------------------------- COURSE CODE : STID1103 COURSE NAME : COMPUTER APPLICATIONS IN MANAGEMENT PRE-REQUISITES : NONE ------------------------------------------------- 1.0 SYNOPSIS This is an introductory course targeting to create awareness on various popular computer applications which are being used in organizations. Application such as accounting management, communications, and project management will be covered in this course. In addition, students will also be exposed to proper method of report writing, data gathering and compilation, as well as database management. The students will also be exposed to the methods in converting data to charts and graphs, preparing presentations, and presenting data. Besides using Internet applications, the students are required to build and maintain simple web pages. 2.0 OBJECTIVES Upon completion of this course, students are expected to 2.1. acquire basic knowledge on current ICT technology. 2.2. develop competency in using several management-related applications, which are popular among the professionals and entrepreneurs. 3.0 LEARNING OUTCOME Upon completion of this course, students will be able to 4.1 apply basic knowledge on computer technology in order to make a good decision when acquiring a computer . 4.2 use Internet technology to find required information 4.3 identify the use of different software applications for different management situation . 4.4 produce different...
Words: 831 - Pages: 4
...INTRODUCTION TO CLOUD COMPUTING ARCHITECTURE White Paper 1st Edition, June 2009 Abstract Cloud computing promises to increase the velocity with which applications are deployed, increase innovation, and lower costs, all while increasing business agility. Sun takes an inclusive view of cloud computing that allows it to support every facet, including the server, storage, network, and virtualization technology that drives cloud computing environments to the software that runs in virtual appliances that can be used to assemble applications in minimal time. This white paper discusses how cloud computing transforms the way we design, build, and deliver applications, and the architectural considerations that enterprises must make when adopting and using cloud computing technology. This page intentionally left blank. Sun Microsystems, Inc. Table of Contents Introduction................................................................................................... 1 Sun’s perspective ................................................................................................ 1 The Nature of Cloud Computing ....................................................................... 3 Building on established trends............................................................................. 3 Virtual machines as the standard deployment object ........................................ 3 The on-demand, self-service, pay-by-use model .....................................
Words: 11952 - Pages: 48
...the work environment, and how these tools have transformed the business processes of today’s organizations. Additionally, you will explore electronic commerce, and discuss the challenges this technology presents to businesses and their consumers. Databases, Network Applications, and E-Business OBJECTIVE: Describe how databases are used in the work environment. Resources: Ch. 4 and Technology Guide 2 of Introduction to Information Systems and Ch. 1 for Access in Microsoft® Office 2010 Content • Ch. 4: Data and Knowledge Management of Introduction to Information Systems o Managing Data • The Difficulties of Managing Data • The Data Life Cycle o The Database Approach • The Data Hierarchy • Designing the Database o Database Management Systems • The Relational Database Model • Databases in Action o Data Warehousing • Describing the Data Warehouse • Data Marts o Data Governance o Knowledge Management • Concepts and Definitions • Knowledge Management Systems • The Knowledge Management System Cycle • Technology Guide 2: Computer Software of Introduction to Information Systems o Significance of Software o Software Issues • Software Defects • Software Evaluation and Selection • Software Licensing • Open Systems • Open-source Software o Systems Software ...
Words: 610 - Pages: 3
...You are to enter all answers or Prtscrn requirements into this Word Document. You are not permitted to submit any other document format, e.g., Wordpad, PDFs, etc. that is not based on this original Word document. This document contains hidden internal markers and applications that will track the version of this assignment and your assignment progress. You MUST submit the assignments using the Word document(s) provided you. You may not use any other word processor, except Microsoft Word. Do not use Open Office DOCX files. When an instructor has possession of an electronic document it is very easy to detect plagiarism. Many instructors use Turnitin assignments, which is applicable to assignments that permit cut-and-paste as this assignment. It is very easy to compare multiple copies of word documents (see link below). Microsoft provides a variety of FREE anti-plagiarizing tools. And there is a wide variety of tools that can analyze hidden information within a Word document (see sample link below). Changing fonts, margins and spacing does not do it anymore. Even when individuals try to artificially change content, a Word document contains hidden markers that may provide an audit trail to find previous authors and computer systems who have edited the document. Comparing and merging Microsoft Word documents - http://support.microsoft.com/kb/306484 Compare documents side by side - http://office.microsoft.com/en-us/word-help/compare-documents-side-by-side-HA010102251...
Words: 6416 - Pages: 26
...Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access control - Authentication and Authorization Authentication Methods, Passwords, Biometric, Single – sign on, Authentication Protocol, Kerberos, Access control Matrix, ACLs, Multiple level security model, Multilateral security, Covert channel, CAPTCHA. 4. Software Security...
Words: 3868 - Pages: 16
...Data Mining: Concepts and Techniques (3rd ed.) Jiawei Han, Micheline Kamber, and Jian Pei University of Illinois at Urbana-Champaign & Simon Fraser University ©2011 Han, Kamber & Pei. All rights reserved. Adapted for CSE 347-447, Lecture 1b, Spring 2015 1 1 Introduction n n n n n n n n n n Why Data Mining? What Is Data Mining? A Multi-Dimensional View of Data Mining What Kind of Data Can Be Mined? What Kinds of Patterns Can Be Mined? What Technologies Are Used? What Kind of Applications Are Targeted? Major Issues in Data Mining A Brief History of Data Mining and Data Mining Society Summary 2 Why Data Mining? n The Explosive Growth of Data: from terabytes to petabytes n Data collection and data availability n Automated data collection tools, database systems, Web, computerized society n Major sources of abundant data n n n Business: Web, e-commerce, transactions, stocks, … Science: Remote sensing, bioinformatics, scientific simulation, … Society and everyone: news, digital cameras, YouTube n n We are drowning in data, but starving for knowledge! “Necessity is the mother of invention”—Data mining—Automated analysis of massive data sets 3 Evolution of Sciences: New Data Science Era n n Before 1600: Empirical science 1600-1950s: Theoretical science n Each discipline has grown a theoretical component. Theoretical models often motivate experiments and generalize our understanding...
Words: 3169 - Pages: 13
...Technology Bhopal, India Abstract-- When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information is captured by third party tools and techniques; it may cause a breach in end user privacy. In the Web environment, end user privacy is one of the most controversial legal issues. In this paper issues related to information leakage through SQL injection attacks are presented and protection mechanisms are also discussed. Keywords: - Privacy, Security, Code Injection, SQL Injection, web application security, Malicious Code, Vulnerability. I. INTRODUCTION As the Internet is growing day by day, most of the people are not aware of security and privacy. Internet is a widespread information infrastructure; it is basically an insecure channel for exchanging information. Web security is the set of rules and measures taken against web security threats. Web privacy is the ability of hiding end user’s information. Nowadays most of the applications have the vulnerability (weakness) that makes a threat possible. An attack may be possible due to poor design, configuration mistakes, or poor written code of the web application. A threat can be harmful for database, control of web application, and other components of web application, that are needed to be protected from all types of threat. All types...
Words: 1951 - Pages: 8