RezwanAhmed & His Team || Software Engineer

Archive for April, 2010

Aside

ATM::Asynchronous Transfer Mode


ATM

ATM or Asynchronous Transfer Mode
is a network technology based on transferring data in cells or packets of a fixed size. The cell used with ATM is relatively small compared to units used with older technologies. The small, constant cell size allows ATM equipment to transmit video, audio, and computer data over the same network, and assure that no single type of data hogs the line.

Some people think that ATM holds the answer to the Internet bandwidth problem, but others are sceptical. ATM creates a fixed channel, or route, between two points whenever data transfer begins. This differs from TCP/IP, in which messages are divided into packets and each packet can take a different route from source to destination. This difference makes it easier to track and bill data usage across an ATM network, but it makes it less adaptable to sudden surges in network traffic.

When purchasing ATM service, you generally have a choice of four different types of service:

Constant Bit Rate (CBR)

Variable Bit Rate (VBR)

Available Bit Rate (ABR)

Unspecified Bit Rate (UBR)

Constant Bit Rate (CBR)
Specifies a fixed Bit rate so that data is sent in a steady stream. This is analogous to a leased line.

Variable Bit Rate (VBR)
Provides a specified throughput capacity but data is not sent evenly. This is a popular choice for voice and videoconferencing data.

Available Bit Rate (ABR)
Provides a guaranteed minimum capacity but allows data to be busted at higher capacities when the network is free.

Unspecified Bit Rate (UBR)
UBR does not guarantee any throughput levels. This is used for applications, such as file transfer, that can tolerate delays.

Advertisements

DDR2 & DDR3 Memory Controllers for Bandwidth Applications


DDR2 and DDR3 memory controllers developed by GDA Technologies, Inc. are known for their highly efficient and configurable design for bandwidth applications like DSP processors, Video codec, graphics and general interfaces. Apart from being compliant with JEDEC DDR2/3 Standards, the other major highlights of the DDR2 & DDR3 Memory Controllers are Pipeline architecture to increase operational efficiency, flexible and programmable address mapping, and programmable timing parameters for RCD, RP, RFC, FAW, CCD, WR, RTP, RRD, MRD, WL, DAL.


Speed Up of Start Menu Of WINDOWS XP


Increase Up Speed of Start Menu Of Windows XP by REGISTRY EDITOR of Windows XP

For this process, at first Go to Run menu of START option & write regedit on the RUN menu. then enter press. when open regeditor, then write below term HKEY_CURRENT_USER\Control Panel\Desktop – & do click.

from the right side, click on Value Name: Menu Show Delay, then come Edit String. Now here Show Value Data 400 [different Value can Stay]. Change This Value at 0 “Zero”. Then click OK. Then Click On START Menu & See, quickly open The START Menu.

Note : Check This & get helpful….


Difference Between Pre-Paid & Post-Paid Roaming


Roaming for Pre-Paid customers is a more recent development and involves additional investment by operators. This is because Roaming signaling and billing systems are more complex for Pre-Paid services than they are for post-paid services.

For Pre-Paid Roaming, in addition to the initial authentication step, the call-related data must be exchanged in real-time between the visited network and the home network by using a special platform (called CAMEL – Customized Applications for Mobile networks Enhanced Logic), to prevent the balance of the roaming customer’s account from becoming overdrawn.

For Post-Paid Roaming, when the user first switches their phone on, the visited network checks in real-time whether the home network authenticates the customer and authorizes its use abroad. But the data records (CDRs) with the details on each SMS and data session are sent to the home operator with some delay (up to several days).


Software Development Life Cycle :: SDLC


Six Sigma is a methodology to manage process variations that use data and statistical analysis to measure and improve a company’s operational performance.

It works by identifying & eliminating defects in manufacturing and service-related processes. The maximum permissible defects is 3.4 per one million opportunities.

Domain Analysis ≡ Often the first step in attempting to design a new piece of software, whether it is an addition to an existing software, a new application, a new subsystem or a whole new system, is, what is generally referred to as “Domain Analysis”. Assuming that the developers (including the analysts) are not sufficiently knowledgeable in the subject area of the new software, the first task is to investigate the so-called “domain” of the software. The more knowledgeable they are about the domain already, the less work required. Another objective of this work is to make the analysts, who will later try to elicit and gather the requirements from the area experts, speak with them in the domain’s own terminology, facilitating a better understanding of what is being said by these experts. If the analyst does not use the proper terminology it is likely that they will not be taken seriously, thus this phase is an important prelude to extracting and gathering the requirements.

Software Elements Analysis ≡ The most important task in creating a software product is extracting the requirements. Customers typically have an abstract idea of what they want as an end result, but not what software should do. Incomplete, ambiguous, or even contradictory requirements are recognized by skilled and experienced software engineers at this point. Frequently demonstrating live code may help reduce the risk that the requirements are incorrect.

Scope Analysis ≡ Also known as Requirement Analysis. Once the general requirements are gleaned from the client, an analysis of the scope of the development should be determined and clearly stated. This is often called a scope document. Certain functionality may be out of scope of the project as a function of cost or as a result of unclear requirements at the start of development. If the development is done externally, this document can be considered a legal document so that if there are ever disputes, any ambiguity of what was promised to the client can be clarified.

Specification ≡ Specification is the task of precisely describing the software to be written, possibly in a rigorous way. In practice, most successful specifications are written to understand and fine-tune applications that were already well-developed, although safety-critical software systems are often carefully specified prior to application development. Specifications are most important for external interfaces that must remain stable. A good way to determine whether the specifications are sufficiently precise is to have a third party review the documents making sure that the requirements are logically sound.

Software Architecture ≡ The architecture of a software system refers to an abstract representation of that system. Architecture is concerned with making sure the software system will meet the requirements of the product, as well as ensuring that future requirements can be addressed. The architecture step also addresses interfaces between the software system and other software products, as well as the underlying hardware or the host operating system.
Implementation ≡ This is the part of the process where computer scientists actually program the code for the project.

Testing ≡ Testing software is an integral and important part of the software development process. This part of the process ensures that bugs are recognized as early as possible

Deployment  After the code is appropriately tested, it is approved for release and sold or otherwise distributed into a production environment.

Software Training and Support ≡ A large percentage of software projects fail because the developers fail to realize that it doesn’t matter how much time and planning a development team puts into creating software if nobody in an organization ends up using it. People are often resistant to change and avoid venturing into an unfamiliar area, so as a part of the deployment phase, it is very important to have training classes for new clients of your software.

Maintenance ≡ Maintaining and enhancing software to cope with newly discovered problems or new requirements can take far more time than the initial development of the software. It may be necessary to add code that does not fit the original design to correct an unforeseen problem or it may be that a customer is requesting more functionality and code can be added to accommodate their requests. It is during this phase that customer calls come in and you see whether your testing was extensive enough to uncover the problems before customers do.

Easily Save & Store File In Gmail


when any body want to save or Store any file In the On-line Storage, then It is more secure than General save in any Pc r CD or Disk Drive. Also files are stay safely & get free from lost or crash PC.

In web service Email is more attractive Storage media. but it is more problem save the important file by log in the mail account. but there have a way to store the file in The Gmail without enter the Gmail Account.

but for get this service need an extra Software Backup To EMail

when any user install this Software, then User give the User name & Password of Gmail, then the Mouse over any file or folder & click on Backup To EMail by the right button of Mouse, File should be save automatically. The Folder types File save as Zip file & the file go to the mail inbox.

but if wish to ave other place of the mail, then it should be done by filtering.

This software found in this website ::  http://backup2e.com/

requirement need :: Java must be stay or install in the PC..


Disk Organization


Disk Organization

Before discussing some of the issues it is necessary to outline briefly some basics about the way disks are organized.


Laptop Scenario In Bangladesh


Just a Few years ago…….

A Laptop was a dream for any person because for it’s high price. On That time Desktop PC Uses in all over & everywhere & each place. but Now in this modern technology generation, Laptop is best smart usages & more use in home & small office.
where before a one time which Laptop is very costly, now this Laptop is very low cost & also give best performance than other past time Laptop. Now in This Digital Generation, we cannot think to do a work without a Laptop or Net-book.
In BANGLADESH, now in this time more use Laptop. Also there are some reason for more use This Latest Laptop…
  • Lowest Prices,
  • Better Performance,
  • Easily Handle or move from one place to another,
  • New Stylish Design,
  • More Facility in a Laptop or Notebook PC such as 3G/4G network, WI-Fi, blue tooth, wireless net where this is absent in Desktop PC,
  • web-Camera,
  • long time Battery life.

some brand laptop is best they are ::

  • Lenevo,
  • DeLL
  • Fujitsu
  • Compaq
  • Toshiba
  • Acer
  • Asus
  • HP