Computer

SAP Software System at Rahimafrooz Superstores Limited

sap-software-system-at-rahimafrooz-superstores-limited

SAP Software System at Rahimafrooz Superstores Limited  Rahimafrooz Superstores Limited is a subsidiary of Rahimafrooz Group and the owner of Agora, the first retail chain store in our country. They are a trusted name in the business and have enjoyed huge market despite tough competition. Howeve.....

Read More »

Common Alerting Protocol

common-alerting-protocol

Common Alerting Protocol was created by the emergency management community and is available free-of-charge to both public and private sectors. It is an XML-based data format for exchanging public warnings and emergencies between alerting technologies. It increases warning effectiveness and simpli.....

Read More »

Software Analytics

software-analytics

Software Analytics is an area of explosive growth, which gathering billions and billions of metrics from live production software, including user clickstreams, mobile activity, end user experiences and transactions, and then making sense of those—providing with business insights. It’s met.....

Read More »

Spectral Clustering

spectral-clustering

This article talks about Spectral Clustering, which is a techniques to make use of the spectrum (eigenvalues) of the similarity matrix of the data to perform dimensionality reduction before clustering in fewer dimensions. The goal of spectral clustering is to cluster data that is connected but no.....

Read More »

Data Stream Clustering

data-stream-clustering

Data Stream Clustering analyzes the advantages as well as limitations of data stream algorithms and suggests potential areas for future research. It faces many challenges and have to satisfy constraints such as bounded memory, single-pass, real-time response, and concept-drift detection. It is us.....

Read More »

Literate Programming

literate-programming

Literate Programming can be regarded as an essayist, whose main concern is with exposition and excellence of style. Literate programming paradigm, the central activity of programming becomes that of conveying meaning to other intelligent beings rather than merely convincing the computer to behave.....

Read More »

Template Processor

template-processor

This article talks about Template Processor, which is also known as a template engine or template parser. It is typically include features common to most high-level programming languages, with an emphasis on features for processing plain text. It is used in various contexts for different purposes.....

Read More »

Self Modifying Code

self-modifying-code

This article talks about Self Modifying Code, which is a piece of software which achieves its goal by rewriting itself as it goes along. It is executing – usually to reduce the instruction path length and improve performance or simply to reduce otherwise repetitively similar code, thus simp.....

Read More »

Port Scanner

port-scanner

Port Scanner is the name for the technique used to identify open ports and services available on a network host. It is a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port; this is not a nefarious process in and of […]<.....

Read More »

Ping of Death

ping-of-death

This article describe about Ping of Death, which is a type of network attack in which an attacker sends a network packet that is larger than what the target computer can handle. It is a method of using the ping command to freeze or reboot the computer by sending a packet greater than 65536 bytes......

Read More »

End-of-File

end-of-file

End-of-File is a code placed by a computer after a file’s last byte of data. It is either determined when the reader returns null as seen in Java’s BufferedReader, or sometimes people will manually insert an EOF character of their choosing to signal when the file has ended. EOF marks .....

Read More »

Buffer Overflow

buffer-overflow

Buffer Overflow is probably the best known form of software security vulnerability. It occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. It can be triggered by inputs that are designed to execute code, or alter the wa.....

Read More »