Business Intelligence History

Business Intelligence History When did Business Intelligence first come into play? Before the Information Age of the late 20th century companies had to collect their information from non-automated sources. Those were the days that businesses lacked any type of sophisticated computing resources to enable them to properly analyze data. Due to the lack of today’s flourishing technologies organizations in that age made vital business decisions based purely on instinct, this could very often prove to be a fatal means of making a decision that concerned the well-being or livelihood of… Read More

High Level Data Link Control (HDLC)

High Level Data Link Control (HDLC) The High Level Data Link Control protocol was developed by the International Organization for Standardization (ISO).  It is used for switched and non-switched networks and is a bit oriented architecture. The High Level Data Link Control has been accepted and used widely because it supports almost all kinds of functionalities like half duplex, full duplex, point to point and multi-point networks. The bit patterns are standard in HDLC and therefore the information exchanged follows the same pattern. This minimizes the chances of any errors.… Read More

Business Intelligence Overview

Business Intelligence Overview What is Business Intelligence? Business Intelligence at first glance is a broad array of applications or technologies designed for storing, gathering, analyzing, and processing information. These applications also provide access to data for professionals and help them make better business decisions. It is the ability of in depth analysis and data mining of detailed business data to provide real and significant information to users. The software allows users to access and review large amounts of complex data. Yet this is only Business technology on the technical side… Read More

Business Intelligence Training

Business Intelligence Training In this training session you will learn about Business Intelligence – Business Intelligence Overview, Business Intelligence History, Business Intelligence Data Analysis, Business Intelligence Applications and more. Business Intelligence Business Intelligence Overview What is Business Intelligence? Business Intelligence at first glance is a broad array of applications or technologies designed for storing, gathering, analyzing, and … Business Intelligence History When did Business Intelligence first come into play? Before the Information Age of the late 20th century companies had to collect their information from non-automated sources. Those were the… Read More

SQA Planning and Requirements

SQA Planning and Requirements The scope of Software Quality Assurance or SQA starts from the planning of the application until it is being distributed for the actual operations. To successfully monitor the application build up process, the SQA team also has their written plan. In a regular SQA plan, the team will have enumerated all the possible functions, tools and metrics that will be expected from the application. SQA planning will be the basis of everything once the actual SQA starts. Without SQA planning, the team will never know what… Read More

SQA Approaches and Methodologies

SQA Approaches and Methodologies A scientific approach should have methods. As a scientific process, a stage or a step should be established or used to ensure the final product is according to the user’s specifications. The method is usually determined through the wishes of the clients, the available manpower and circumstances. It is not that the clients specify the actual method for a scientific approach but the client’s provider takes into consideration the need of the clients. Using the facts and data provided by the client, the method for developing… Read More

IPv6

IPv6 The Internet protocol Version 6 or the IPv6 is the next generation Internet protocol that will be replacing the current Internet protocol. The current version that is being used is the Internet Protocol; Version 4 which has almost lasted for almost 2 decades. Also the main reason for the upgradation to the Internet protocol Version 6 is because of the IP address problems. According to the InterNIC they have already exhausted IP addresses in Class A and Class B and now are down to Class C. Now they have… Read More

High-Speed Serial Interface (HSSI)

High-Speed Serial Interface (HSSI) HSSI is High Speed Serial Interface was first developed by Cisco systems and the main purpose was to solve high speed requirement issues. The main application of HSSI is on the Wide Area Networks and it helps to enhance the data flow speed on these networks. It can work on both physical and electrical devices using the DTE and the DCE interfaces. There are many features that contribute to the characteristics of the HSSI working model. HSSI Features On HSSI you can receive signals up to… Read More

SQA Analysis

SQA Analysis Software Quality Assurance is all about analysis. One of the major purposes of this discipline is to know the inner workings of an application. To do this, careful analysis has to be exercised at all times. Although there are programs and applications that aid in knowing the inner workings and the actual performance of an application, these are only numbers and they would be nothing if they are not used for analysis. Every person proficient in SQA needs to have that analytic personality for them to be successful… Read More

SQA Software and Tools

SQA Software and Tools In quality assurance, it is always important to get all the help we could get. In other industries, developers could easily check the products manually and discard those that do not meet the standard. The length and the width of the product are checked to maintain standardization of the product. Others use special machines to check the product. With tools and machines, they can easily set a standard with their products. That also goes the same with software and applications. Although it does not use physical… Read More

Frame Relay

Frame Relay Frame Relay is a concept where the information is sent using data frames in a digital format. Using this relay service the data can be sent in a fast and efficient manner through the internet. Frame Relay is also a cheaper way to send data from one point to another. The internet service providers use the Frame Relay Networks when transferring voice and data so that it is fast and also is commonly used in Local Area Networks and Wide Area Networks. Using the Frame Relay the end… Read More

Subnetting

Subnetting A Subnet is a directory listing of IP numbers that re used to address on the internet. The number is logical divided so that each part of the number represents a certain function. Usually these subnets contain arrange of IP numbers that are assigned to organizations. So numbers falling into a specific range of subnets can immediately be related to certain organizations. All the numbers allotted to a certain organization will start with the same binary sequence. In the current day internet scenario the network are increasing and as… Read More

SQA Project Metrics

SQA Project Metrics The application is only as good as its numbers. It is a harsh reality but everything has to come down to the numbers. Although we can enumerate tens or hundreds of features in a single application, it will all be for nothing if the metrics do not live up according to expectation. The SQA team should ensure that the expected metrics will be posted. At the same time, the SQA team should also select the right tool to gauge the application. There are hundreds of applications that… Read More

SQA Planning

SQA Planning Planning is one of the most important aspects of Software Quality Assurance. The entire operation of the SQA team depends on how well their planning is done. In smaller businesses, planning might not really dictate the flow of SQA but in larger businesses, SQA Planning takes on center stage. Without it, each component or department that works on the application will be affected and will never function. In gist, SQA Planning tackles almost every aspect of SQA’s operation. Through planning, each member and even non-member of the SQA… Read More

Switched Multi Megabit Data Service (SMDS)

Switched Multi Megabit Data Service (SMDS) SMDS or Switched Multi Megabit Data Service is used to communicate on the Public Data Networks using the WAN networking technology. The SMDS technology uses fiber or copper wires for networking. There are many components in the SMDS networking environment that make data transfer possible like the DQDB or the distributed queue dual bus. The functionality of SMDS is delivered through telecommunication services and it is capable of providing high speed connections, high level performances and data transport through packet switching. SMDS cannot be… Read More

Synchronous Data Link Control (SDLC)

Synchronous Data Link Control (SDLC) The SDLC or the Synchronous Data Link Control was first developed by IBM. It is basically a linked layer protocol which can be used with systems network architecture or the SNA environment. In this system all the functions in a network can be defined and slotted into layers. There are different types of layers and each of these layers has its own functionality which is some what similar to the OSI layers. For example the data is transferred without errors form the Data Link Control… Read More

SQA Principles

SQA Principles Developing a software is not just writing codes, they are essentially answers to pressing problems may it be in the office or just to cure boredom – just like in games. Underlying these answers to problems and needs are principles that guide the developers in their software development.   The SQA team also has to follow certain principles. As a provider of quality assurance for procedures and application, they need to have a strong foundation on what to believe in and what to stand for. These principles will… Read More

What is Software Quality Assurance?

What is Software Quality Assurance? Business software is never built overnight. It takes a lot of planning, consultation and testing to be able to come up with an initial version of the application. If a business hurries up the development of a certain application, they would end up spending more in addressing the problem the application brought than they have earned. This could even be more frustrating when the software being developed is set to be sold to customers or for public use. But a bug free program is not… Read More

Software Quality Assurance Training

Software Quality Assurance Training In this training session you will learn about SQA – Software Quality Assurance, SQA Principles, .SQA Planning, SQA Project Metrics, SQA Software and Tools, SQA Analysis, SQA Approaches and Methodologies, SQA Planning and Requirements, SQA Lifecycle Standards, SQA Implementation, SQA Costs and Benefits, Why SQA is required and more…   What is Software Quality Assurance? Business software is never built overnight. It takes a lot of planning, consultation and testing to be able to come up with an initial version of the application. If a business… Read More

Fiber Distributed Data Interface (FDDI)

Fiber Distributed Data Interface (FDDI) The Fiber Distributed data interface or the FDDI is a 100 mbps line using the LAN network and is connected through a fiber optic cable. The FDDI technology is used where the networks need a high speed bandwidth and need to cover huge distances than the copper wires usually cover. There are two kind of networks in this category, one is the fiber optic wire based and the other is the copper wire based called the Copper distributed data interface. The inside architecture of the… Read More

Point to Point Protocol (PPP)

Point to Point Protocol (PPP) The Point to Point Protocol is a platform that is used to connect any individual computer or a network to the internet service provider. The connection is established between two points only and that is why it is called Point to Point Protocol. The PPP is considered be the only best solution for connecting computers on the internet. The basic architecture of the PP is layered and the bottommost layer is the LCP or the Link Control Protocol. The Link Control Protocol is responsible for… Read More

Internet Protocols (IP)

Internet Protocols (IP) For the internet to work every computer and every system connecting to the internet must has an Internet Protocol. The internet protocol is a library of communication protocols which talk to networks and enable data transfers. The Internet Protocol is an open source protocol and is well suited for LAN and WAN networks. The internet communication protocols are of two kinds and the computers need both of them to communicate over the internet. They are called the TCP or the Transmission Control Protocol and the IP or… Read More

Tree Topology

Tree Topology Among all the Network Topologies we can derive that the Tree Topology is a combination of the bus and the Star Topology. The tree like structure allows you to have many servers on the network and you can branch out the network in many ways. This is particularly helpful for colleges, universities and schools so that each of the branches can identify the relevant systems in their own network and yet connect to the big network in some way. A Tree Structure suits best when the network is… Read More

Mesh Topology

Mesh Topology Mesh Network is a network where all the nodes are connected to each other and is a complete network. In a Mesh Network every node is connected to other nodes on the network through hops. Some are connected through single hops and some may be connected with more than one hope. While the data is traveling on the Mesh Network it is automatically configured to reach the destination by taking the shortest route which means the least number of hops. Data travels by hopping from one node to… Read More

Star Topology

Star Topology Star Topology is the most common type of network topology that is used in homes and offices. In the Star Topology there is a central connection point called the hub which is a computer hub or sometimes just a switch. In a Star Network the best advantage is when there is a failure in cable then only one computer might get affected and not the entire network. The Star Network Topology typically needs more cable to be networked than the usual Bus topology. A common cable that is… Read More