April 26, 2013

Five factors that affect formation of a software development project team.

Five factors and their respective importance are as follows:

1) Expertise in the relevant application domains where the system will be used. This is important because without this, the team members may not have an adequate understanding of the domain where the software is intended to operation. In addition this is needed when having initial discussions with the customers or commissioners of the system as the better their initial requirements are understood, the greater the chances of success.

2) Experience with specific hardware and software technologies to be used on the project. In a project, there may not be enough time to train the team in a new technology so it may be important to hire staff that already have experience in that technology. For example, if the system has to be developed in a particular programming language, then experience in that language may be considered important as losing time with inexperienced staff could lower the project’s chances of success.

3) Problem solving ability is needed as the team members will need to be able to solve technical problems throughout the lifetime of the project and be adaptable in their approach to problem solving working with other members of the team to collaboratively solve any large problems that threaten the project’s success.

4) Education and qualifications in software engineering are important as they indicate that team members are familiar with best practice and theory relevant to engineering software systems and also this indicates a willingness and ability to learn. All projects involve the team learning and failure to engage in learning can threaten the success of the project.

5) Ability to work in team and get along with the other team members is important as a team member who refuses to work with others and is disruptive can disturb the working of the whole team and threaten the project’s success.

April 25, 2013

Types of malicious software

Viruses and worms are two well-known types of malicious software. Many threats combine elements from different types of malicious software together,These blended threats don’t fit into any one class, so the term malware, short for malicious software,is used as a catch-all term to describe a number of malicious threats, including viruses, worms, and more. Malware presents arguably the largest security threat to computer users. It can be confusing to understand what the difference is between a virus and a Trojan,

Virus: A virus is malicious code that replicates itself. New viruses are dis-covered daily. Some exist simply to replicate themselves. Others can do serious damage such as erasing files or even rendering the computer itself inoperable.

Worm: A worm is similar to a virus.They replicate themselves like viruses, but do not alter files like viruses do.The main difference is that worms reside in memory and usually remain unnoticed until the rate of replication reduces system resources to the point that it becomes noticeable.

Trojan: A Trojan horse got its name from the story of the Trojan horse in Greek legend. It is a malicious program disguised as a normal application. Trojan horse programs do not replicate themselves like a virus, but they can be propagated as attachments to a virus.

Rootkit: A rootkit is a set of tools and utilities that a hacker can use to maintain access once they have hacked a system.The rootkit tools allow them to seek out usernames and passwords, launch attacks against remote systems, and conceal their actions by hiding their files and processes and erasing their activity from system logs and a plethora of other malicious stealth tools.

Bot/Zombie : A bot is a type of malware which allows an attacker to gain complete control over the affected computer. Computers that are infected with a bot are generally referred to as zombies.

Viruses, worms and other malware are a constant threat and the source of many problems and tremendous frustration for many users.

April 24, 2013

Security features in Outlook 2010

Outlook 2010 provides several features for ensuring the security of your data, messages, and identity. This is a brief overview of security features in Outlook 2010 to give you a basic understanding of the issues involved.

Protection Against Web Bugs

Many spammers (people who send unsolicited email) use web beacons to validate email addresses .The spammers send HTML-based email messages that contain links to external content on a website (the web bug), and when the recipient’s email client displays the remote content, the site validates the email address .The spammer then knows that the address is a valid one and continues to send messages to it.

Outlook 2010 blocks web beacons, displaying a red X instead of the external image .You can view blocked content selectively, on a per-message basis, or you can configure Outlook 2010 to view all content but control access to HTML content in other ways .You can also turn off web beacon blocking, if you want, and control external HTML content in other ways.

Attachment and Virus Security

Now!! You probably are aware that a virus is malicious code that infects your system and typically causes some type of damage .The action caused by a virus can be as innocuous as displaying a message or as damaging as deleting data from your hard disk .One especially insidious form of virus, called a worm, spreads itself automatically, often by mailing itself to every contact in the infected system’s address book .Because of the potential damage that can be caused by viruses and worms, it is critically important to guard against malicious code entering your system .

There are multiple possible points of defence against viruses and worms .For example, you might deploy perimeter protection in the form of one or more firewalls that scan traffic coming into your network and leaving it .Also you might have virus protection at the server level .You probably have a local antivirus client that checks the files on your computer and potentially also checks attachments that come into your Inbox . All of these are important options for protecting your network and your computer from infection .
An additional security feature that is new in Office 2010 is Protected View .When you open an attachment that is an Office file type (a Microsoft Word document, a Microsoft Excel spreadsheet, etc), the document opens in a separate sandbox instance of the application . For example, assume that you have Word open and are working on a document that you created .Then, you switch over to Outlook and open a Word document that arrived as an attachment to an email .Word opens a separate version to display that attachment, but this sandbox version of Word operates with greater restrictions and fewer rights and privileges than the version that you are using to modify your own document .You can’t save the file or edit it while it is running in this version, so the application displays a banner across the top labelled Protected View , and provides a button labelled Enable Editing that, when clicked, enables you to edit the document, save it, and so on
The combination of attachment blocking and Protected View will protect your computer from a wide variety of potential threats, but that combination can’t protect against all threats .For that reason, you should ensure that you have an updated antivirus client running on your computer as well as at your mail server .Adding protection at the perimeter of the network is a good idea as well .

Digital Signatures

Outlook 2010 allows you to add a certificate-based digital signature to a message to validate your identity to the message recipient .Because the signature is derived from a certificate that is issued to you and that you share with the recipient, the recipient can be guaranteed that the message originated with you, rather than with someone trying to impersonate your identity .

In addition to signing your outgoing messages, you can use secure message receipts that notify you that your message has been verified by the recipient’s system .The lack of a return receipt indicates that the recipient’s system did not validate your identity .In such a case, you can contact the recipient to make sure that he or she has a copy of your digital signature .

Message Encryption

Where the possibility of interception exists (whether someone intercepts your message before it reaches the intended recipient or someone else at the recipient’s end tries to read the message), Outlook 2010 message encryption can help you keep prying eyes away from sensitive messages .This feature also relies on your digital signature to encrypt the message and to allow the recipient to decrypt and read the message .Someone who receives the message without first having the appropriate encryption key from your certificate installed on his or her system sees a garbled message .

Message: Although you can configure Outlook 2010 to send a digital signature to a recipient, there is no guarantee that the recipient will add the digital signature to his or her contacts list. Until the recipient adds the signature, digitally signed messages are not validated, and the recipient cannot read encrypted messages from you.

April 23, 2013

Difference between the traditional and Rapid Application Development (RAD) approaches to the development of Management Information Systems (MIS)


Practically all early systems developments, and many current projects, use structured
methodologies. They generally consist of easily defined stages such as feasibility study,
analysis, design, implementation, testing and installation, each of which requires formal
completion before the next stage can commence. Generally, there are no tangible deliverables
until the last stage has been completed and then the whole system is provided.
Structured methodologies are suitable where:
  • Changes have to be implemented at one particular date, for example, regulatory purposes.
  • The requirements are well understood and are unlikely to change during the development
    period. Again, a regulatory requirement is an example.
  • It is impossible to break down the task into smaller component projects.
  • Provision of the system is contractual and to a fixed price.
  • The technology used is inherently inflexible and it is therefore necessary to determine the
    precise requirements at the outset of the development.
  • The required system is safety-critical (human life depends upon reliable operation).

RAD (Rapid Application Development)

  • RAD emerged in the wake of evolutionary systems and the arrival in the late eighties of software tools that could facilitate prototyping and program code generation.
  • Prototyping overcomes many of the problems associated with systems development, where any user may experience difficulties in understanding hypothetical situations and where systems designers could have difficulty in communicating their solutions.
  •  Prior to RAD, prototyping of systems was possible only at the expense of time and effort necessary to design and mimic screen layouts and the proposed reports.
  •  Changing the prototype was difficult and, when the design was agreed, the prototype had to be thrown away and the operational system developed. 
  • The introduction of graphical user interfaces (GUI) simplified the process of prototyping and RAD software tools enabled the completed prototype to form the basis of the system.
  •  For the first time, every percentage of effort resulted in the same percentage of the completed system. 
  • Current RAD methods and tools enable all stages of systems development to occur more or less in parallel. By prototyping a series of incremental system improvements, over a period of time each can evolve into a completed system.

April 13, 2013

How to Publicize your Blog and make most of internet. Part two

1.On your Contact Page ask people if they mind receiving your newsletter.

2.Send out a newsletter! use mailchimp.com for better publishing of newsletters.

3.Go to a free seminar for Website owners. You might learn something.

4.Find the quality and relevant blogs and leave a comment (with a link back to your site of course).

5.Don’t pay people to submit your site to search engines. It’s a waste of money.

6.YouTube , Vimeo are excellent portals on which to launch a viral campaign.

7.Giving away an eBook is an excellent way to generate word-of-mouth about your site.

8.Sponsor a WordPress theme or a blogger template. 

9.If you sell products that are advertised on television by the manufacturer, add “As Seen on TV” to your site!

10.Avoid proprietary technologies like Java and Active X.

11.Put downloadable content on your site, but make sure it’s not manufacturer specific - so .MP3 rather than .WMA.

12.Learn about CSS. It’s the new HTML. You can learn about CSS and HTML from these sites
Udemy.com, Codeacademy.com, Coursera.org, EDX.org

13.Contribute to related subject areas on Wikipedia. Ask bloggers and other Web site owners to review your site and/or products.

14.Have user-friendly page names - most tools come with some way to avoid it.

15.If you must have a Flash homepage, make sure you have a “Skip Intro” link.

16.Tell your local rag about your site. These newspapers are desperate for stories and you may well even get a pic of your ugly picture published.

17.Become a leading authority on your chosen subject A.K.A Subject Matter Expert.

18. Create a Twitter(@sanketjagtap) account and regularly publicize your blog posts using tweets. Use tools like hootsuite, buffer, for better management of your social media.
Use this tools to automate your social media - http://www.sanketj.com/2014/12/10-most-effective-social-media.html 

19. Write a post on Linkedin, Quora, Facebook and use it to publicize your views.

20. Take a blog improvement challenge with problogger.net


1)This is the part one of the 30 ways to publicize your blog. 

2)Blogging with windows Live writer: An amazing Blogging tool 

April 7, 2013

What are the Vision and Mission of Philips.


Sense and Simplicity

 This is a vision mission statement and information about one of the best innovative company in the world.
You could also make SWOT analysis out of it.


·         Koninklijke Philips Electronics N.V. (Royal Philips Electronics Inc.),
·         The foundations of Philips were laid in 1891 when Anton and Gerard Philips established Philips & Co. in Eindhoven, the Netherlands.
·         The company begun manufacturing carbon-filament lamps
·         By the turn of the century, had become one of the largest producers in Europe.
·         Philips’ first research laboratory started introducing its first innovations in the x-ray and radio technology.
·         For years, the list of inventions has only been growing to include new ideas that have continued to enrich people’s everyday lives.


·         Strive to make the world healthier and more sustainable through innovation.
·         Goal is to improve the lives of 3 billion people a year by 2025.
·         To be the best place to work for people who share same passion.
·         Deliver superior value for customers and shareholders.
·         Create  value  through  company’s  capabilities  to  develop  deep understanding of  customers’ needs
·         Apply advanced technologies to create innovative solutions

·         Improving people’s lives through meaningful innovation.
·         Keep innovation at as core of all activities
·         New application, a new business model or a unique customer proposition brought about by an innovative partnership is also an innovation.
·         Aim to help Philips grow by delivering innovations that really make a difference to people
·         Creating and developing ideas and technologies that lead to successful products is very important
·         Think about creating complete solutions.


Philips was success since its inception, but it faced poor financial performance during the 1990s due to the following reasons:
·        High manufacturing costs
·         Lack of competitive product price
·         Growing competition and Rapid changes in the external environment.
·         Philips embarked an improvement program called BEST (Business Excellent through Speed and Teamwork).
·         And also used several tools and approaches as a part of BEST.

Some of them were:

·         Philips Business Excellence Model (PBE)
·         Process Survey Tools (PST)
·         Balanced Scorecard (BSC)


·         Philips Lighting is a leading provider of solutions and applications for both professional and consumer markets.
·          With the new lighting technologies, such as LED technology, and the increasing demand for energy efficient solutions, Philips will continue shaping the future with ground-breaking new lighting applications.
·         Demand for (energy-efficient) lighting in emerging markets continues to grow
·         - Future LED solutions: application IP and luminaries will be essential

Consumer Lifestyle

·         Today, Philips is one of the biggest global players in consumer lifestyle in terms of turnover.
·         Insightful understanding of people, extraordinary competence in technology and design,
·         The many synergies within company's channels, partners and supply chain.
·         Philips delivers deeper experiences in touch with the social and emotional needs of customers in their homes: from a cup of coffee in the morning, to a relaxing evening with an Aurea TV.
·         Philips products are designed around their users and aim to improve people’s lives – every day.
Also Check out Philips HUE Smart LED BULB.


·         Philips Healthcare sector is dedicated to providing solutions designed around the needs of customers and patients.
·          A belief that Philips can make a difference by removing boundaries in healthcare with innovative and affordable technology solutions throughout the entire care cycle.
·         Combining unique clinical expertise with human insights to develop solutions that deliver value throughout the care cycle:
·         From disease prevention to screening and diagnosis, through to treatment, monitoring and health management – wherever care is given: in the hospital or at home.

Accolades and Awards

·         Equal highest-ever placing (41st) on the annual Interbrand ranking of the world’s most valuable brands·         Philips named ‘Supersector leader’ in the Dow Jones Sustainability Index for the second consecutive year·          Philips won a record-breaking number of 124 design awards in 2012·         UK consumer magazine which? ranked Philips kettles, irons and Gaggia espresso machines #1 for reliability·         CityTouch  online  outdoor  lighting  management  system honoured  as  a  top  sustainable  solution  at  Rio+20  United Nations Conference on Sustainable Development


·         Globally, Philips derives 34 per cent of its revenues from lighting, in India; the figure is 58 per cent.·          In health care, the global contribution is 40 per cent. In India, it is 18 per cent.·         In consumer lifestyle, the company gets 26 per cent of its overall revenues, in India, it is 24 per cent.·         Totally the Indian unit closed the fiscal ended March 2012 with revenues of Rs 5,579 crore, growing at a clip of about 23 per cent per annum.·         Analysts say that Philips is likely to retain this pace of growth this year too on the back of double-digit growth that the three core segments are seeing.