Saturday, April 7, 2012

Generate Documentation for Your Project Source Code

Here is the detailed explanation for generating the documentation , class diagrams for your project.

https://developer.apple.com/library/ios/#featuredarticles/DoxygenXcode/_index.html

Automating the Code Quality Metrics for iOS Projects


I have been setting up a Hudson continuous integration (CI) build system for my Objective-C iPhone projects (iOS apps), and have compiled a varied list of tools that can be used to analyse my projects during a build:

Tuesday, March 22, 2011

Service-oriented architecture(SOA)


SOA:- 
It is an IT Strategy that organizes the discrete functions contained in enterprise applications into inter-operable standards based services that can be combined and reused quickly to meet business requirement. In simple words, we can say SOA is the integration of web services for implementing business logic.
Or more precisely, we can say "SOA is a strategy for developing and integrating systems through interoperable standards-based services."
Benefits:-                                           
· Reusability: Existing business functionality in an application can be reused to meet new business requirements. A business process is decomposed into discrete reusable functional components.
· Interoperability: Communication between services and the business process is not dependent on the platform and are standards enabled. The services are also not tightly coupled to the application. A consumer of service is decoupled from service provider.
· Scalability: Applications are flexible to the changing business requirements.
· Cost Efficiency: This is highly cost efficient as integrating the business resources is standards based.

Services:-
Services are the building blocks of SOA enabled application. It is basically an encapsulation of data and business logic. A service consists of an interface, has an implementation and exhibits certain pre-defined behavior.
The service interface defines a set of operations, which portrays (or exposes) its capabilities. Operations are the things that a service can do.

Standards Used by SOA Suite:-
· Services Component Architecture (SCA) assembly model:-
SCA specifications provide a programming model for building applications and systems based on an SOA approach.
SOA is a set of standards or strategies and SCA is an implementation of those standards or strategies.

· Service Data Object (SDO):-
An SDO is designed to simplify and unify the way in which applications handle data. An SDO exposes any data source as a service, which enables retrieval and manipulation of the data in an XML format through service operations. Using SDO, application programmers can uniformly access and manipulate data from heterogeneous data sources, including relational databases, XML data sources, Web services, and enterprise information systems. The task of connecting applications to data sources is performed by a data mediator service. SDO enables both a static (or strongly typed) programming model and a dynamic (or loosely typed) programming model.
· Business Process Execution Language (BPEL):-
It provides enterprises with an industry standard to orchestrate and execute business process. Using BPEL, we design a business process that integrates a series of discrete services into an end-to-end process flow.
· XSL Transformation (XSLT):-
It is a transformation language that helps in transforming one XML schema to another.
· Java Connector Architecture (JCA):-
It provides a java tech. solution to the problem of connectivity between many application servers in Enterprise Information System (EIS).
· Web Services Definition Language (WSDL):-
It provides all the description of a service for e.g. How to access the service, what all operations a service can perform, what are the inputs to the service and what output service is going to provide etc.
· Simple Object Access Protocol (SOAP):-
Exchange of data takes place using messages. These messages are defined and delivered using a network protocol that is known as SOAP.
· XML Schema Definition (XSD):-
It provides the definition of the xml that is used as input or output for a service. It defines all the elements that are there in an input or output file.

Add starShareShare with noteKeep unread

    Saturday, February 5, 2011

    IPv6 marks the next chapter in the history of the Internet

    In the same way your phone is associated with a unique number, your computer is assigned a unique Internet Protocol (IP) address when you connect to the Internet. The current protocol, IPv4, allows for approximately 4 billion unique addresses—and that number is about to run out.

    This morning the Internet Corporation for Assigned Names and Numbers (ICANN) announced (PDF) that it has distributed the last batch of its remaining IPv4 addresses to the world’s five Regional Internet Registries, the organizations that manage IP addresses in different regions. These Registries will begin assigning the final IPv4 addresses within their regions until they run out completely, which could come as soon as early 2012.

    As the last blocks of IPv4 addresses are assigned, adoption of a new protocol—IPv6—is essential to the continued growth of the open Internet. IPv6 will expand Internet address space to 128 bits, making room for approximately 340 trillion trillion trillion addresses (enough to last us for the foreseeable future).

    Google, along with others, has been working for years to implement the larger IPv6 format. We’re also participating in the planned World IPv6 Day, scheduled for June 8, 2011. On this day, all of the participating organizations will enable access to as many services as possible via IPv6.

    Today’s ICANN announcement marks a major milestone in the history of the Internet. IPv6, the next chapter, is now under way.


    Monday, September 20, 2010

    WEB 2.0

                            The term Web 2.0 is commonly associated with web applications that facilitate interactive information sharing, interoperability, user-centered design, and collaboration on the World Wide Web. A Web 2.0 site gives its users the free choice to interact or collaborate with each other in a social media dialogue as creators (prosumer) of user-generated content in a virtual community, in contrast to websites where users (consumer) are limited to the passive viewing of content that was created for them. Examples of Web 2.0 include social-networking sites, blogs, wikis, video-sharing sites, hosted services and  web-applications.

       Whether Web 2.0 is qualitatively different from prior web technologies has been challenged by World Wide Web inventor Tim Berners-Lee, who called the term a "piece of jargon", precisely because he intended the Web in his vision as "a collaborative medium, a place where we [could] all meet and read and write". He called it the 'Read/Write Web'.

    Characteristics:

        Web 2.0 websites allow users to do more than just retrieve information. By increasing what was already possible in "Web 1.0", they provide the user with more user-interface, software and storage facilities, all through their browser. This has been called "Network as platform" computing. Users can provide the data that is on a Web 2.0 site and exercise some control over that data. These sites may have an "Architecture of participation" that encourages users to add value to the application as they use it.


    Some of the most popular examples are:
    • Gmail
    • Google Maps
    • Flickr
    • Orkut
    • Windows Live
    • Facebook



    Friday, September 10, 2010

    What is Cloud Computing?

    Cloud computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth,In general..


    * The cloud is a group of servers.
    * A user interacts with the cloud without worrying about how it is implemented.
    * The cloud company does all the magic

    We use the cloud daily.
    * Google
    * Facebook
    * Windows Live

    Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.

    In general, cloud computing customers do not own the physical infrastructure, instead avoiding capital expenditure by renting usage from a third-party provider. They consume resources as a service and pay only for resources that they use. Many cloud-computing offerings employ the utility computing model, which is analogous to how traditional utility services (such as electricity) are consumed, whereas others bill on a subscription basis. Sharing "perishable and intangible" computing power among multiple tenants can improve utilization rates, as servers are not unnecessarily left idle (which can reduce costs significantly while increasing the speed of application development)


    2 types of clouds:

    * SaaS- Software as a service. Software that exists on the cloud. For example, Google documents allows users to create, edit, and share spreadsheets, text documents, and presentations similar to powerpoint. Or, Facebook. All of which is stored on the cloud.

    * HaaS- Hardware as a service. Allows anyone to purchase space on a cloud in which they can place applications, games, and almost any software that usually sits on one’s desktop. Now, those applications will run in the cloud instead of taking up space on your computer. Examples: Amazon ec2, SaleForce.com

    Wednesday, September 1, 2010

    INTERESTING FACTS ABOUT GOOGLE

    GOOGLE Inc is a multinational public cloud computing, Internet search, and advertising technologies corporation.

    Google hosts and develops a number of Internet-based services and products,and generates profit primarily from advertising through its AdWords program.

    The company was founded by Larry Page and Sergey Brin, often dubbed the "Google Guys", while the two were attending Stanford University as Ph.D. candidates.

    It was first incorporated as a privately held company on September 4, 1998.

    The company's stated mission from the outset was "to organize the world's information and make it universally accessible and useful".

    Google runs over one million servers in data centers around the world, and processes over one billion search requests and twenty petabytes of user-generated data every day.

    Ninety-nine percent of Google's revenue is derived from its advertising programs.

    Google's original homepage had a simple design since its founders were not experienced in HTML, the language for designing web pages.

    History:

    Google began in January 1996 as a research project by Larry Page and Sergey Brin when they were both PhD students at Stanford University in California.While conventional search engines ranked results by counting how many times the search terms appeared on the page, the two theorized about a better system that analyzed the relationships between websites. They called this new technology PageRank, where a website's relevance was determined by the number of pages, and the importance of those pages, that linked back to the original site.

    The name to Google, originating from a misspelling of the word "googol", the number one followed by one hundred zeros, which was meant to signify the amount of information the search engine was to handle.

    The first funding for Google was on August 1998 contribution of US$100,000 from Andy Bechtolsheim, co-founder of Sun Microsystems.

    Brin and Page decided that the search engine they had developed was taking up too much of their time from academic pursuits. They went to Excite CEO George Bell and offered to sell it to him for $1 million.But he rejected the offer.

    Tuesday, August 31, 2010

    Will BlackBerry face a ban in India?

    That's the big question in the minds of over 10 lakh (1 million) BlackBerry users in India. The government has now warned that it would block 'BlackBerry-to-BlackBerry messenger' service if the maker of BlackBerry -- Research In Motion(RIM) -- does not offer a solution to monitor messages within a week.
                                            
                                              The Indian government had raised security concerns over BlackBerry messages since 2008. However, BlackBerry still continues its services without complying to Indian security regulations.
    While the Indian government wants BlackBerry to allow monitoring of e-mails and SMS, RIM has said the security architecture for its enterprise customers is based on a symmetric key system whereby the customers create their own key and only they possess the copy of the encryption.


    BlackBerry's justification

    BlackBerry says the messages are encrypted. The smartphone's server is based in Canada where the encryption level is very high and extremely difficult to crack.
    And any message going through a Canada server is encrypted and, therefore, cannot be accessed by intelligence agencies in India.

    "RIM does not possess a master key nor does any back door exists in the system that would allow RIM or any third party to gain an unauthorised access to the key or corporate data," the company said.

    It, therefore, would be unable to accommodate any request for a copy of a customer's encryption key since at no time does RIM, or any wireless network operator, ever possess a copy of the key.


    The latest development indicates that security agencies are again finding it difficult to intercept or decipher messages sent through these phones, which use codes with an encryption of 256 bits.

    This encryption code first scrambles the emails sent from a BlackBerry device and unscrambles them when the message reaches its target.


     


    Saturday, August 28, 2010

    What is meant by RSS Feed?

    What is RSS? The term RSS is refers to "Really Simple Syndication", in general, sometimes used to refer to web feeds, an RSS document is called a "web feed or channel" includes full or summarized text, plus metadata such as publishing dates and authorship. This is where the reader can easily subscribe to get their favorite websites with interesting topics and updated contents on it and aggregate feeds from many sites into one place.

                      An RSS feed consists of software called RSS reader, feed reader, or aggregator which can be web-based or desktop-based. The users can subscribe to a feed by having feed's URL from a certain website into the reader or by clicking an RSS icon in a browser that initiates the subscription process. The RSS reader simply checks the user's subscribed feeds regularly for new work or post and read the feeds.

    HIDE YOUR FILES IN A JPEG FILE

    For this, you will only need to download WinRAR, and you just need to have a little knowledge about Command Prompt and have WinRAR installed. Ok, lets begin…

     1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden                   –                   RECOMMENDED).
     2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).
     3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.
    4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
    5. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) – Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both.
       6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive… This hack will allow you to hide files in jpegs’s without software installed.

    Friday, August 27, 2010

    KNOW THE IP ADDRESS OF A WEBSITE

    As i have said in earlier posts that every website have an unique IP address and it is named only for our convenience.Sometimes you want to know the IP address of a particular site to hack or to do something else.To satisfy your needs i tell the way to find the IP of a site from windows connected to internet.For example when you want to know the IP of google.com then goto run and type "cmd" the command prompt will open here type the following command.

    ping google.com

    and press ENTER.

    Now you will see the a number of lines indicating the status of connection including the IP address of the site.You cam find the IP of any site by using this method when you are currently connected to the internet.

    Thursday, August 26, 2010

    DNS ADDRESS

    DNS stands for Domain Name Server.The domain of each website has an ip address.As it is difficult remember the ip addresses each ip address is assigned a domain name.When we enter the url of our website in the browser the DNS will convert it into corresponding ip address then the page is loaded.You can also simply type the ip address of the website instead of the url.

    DIFFERENCE BETWEEN BLOG AND WEBSITE

    Though the blog and website are seem to be same there are many important differences between them.The main difference that differentiate the two is STATIC PAGES.The blog doesnt contain any static pages because it was initially invented to share the personal ideas of a person with his friends and relatives which is updated frequently.Also the blog doesnt contain the storage space and as a result it should provide external link for downloading of files.On the other hand websites contain static pages and also the storage space.The search engines will give high priority for blog compare to website as it is updated frequently.As a result the commercial organisation will employ both blog with a link to its website for better results.

    Sunday, August 22, 2010

    GOOGLE Search Techniques and Query Optimization

    Google supports several syntax and optimisation for the queries by which the user can get the desired output.I summarize some important features.


    1.There are certain circumstances when you require result from only a certain site excluding result from another sites.At that time try the following format using (site:) command.
    For ex[site:rajamanikanta.blogspot.com search]

    Try the above query without the brackets and see the result.


    2.Another important feature provided by google is built in calculator which performs mathematic operations.Try the following queries.


    1+100
    2*5

    3.When you want to know the meaning of certain word then try the following query.
    ex.[define word]
    Use the above query by replacing the word with word you want to know the meaning without the bracket.


    4.When you want to know the time of a certain city then use the following query.

    ex.[time Chennai]

    5.Google provides inbuilt unit conversion from one unit to another by simply providing a query in the following format.

    ex. [60kg to gram]

    Google supports many types of such a conversion from one unit to another.


    Apart from this it provides many services especially for U.S such as fligt status etc.

    WINDOWS-BATCH FILE

    Windows batch file is nothing but a line by line collection of commands that are executed in command prompt.To create a batch file open the notepad and type the commands line by line and save as of type .bat.For example consider the following example
    cd c:\\images
    del a.gif
    and save the file as example.bat.
    When you double click the above created batch file a.gif in the images folder is deleted.

    STEGANOGRAPHY

    Steganography is defined as the art of hidden way of writing whereas the cryptography is the secret way of writing.By using cryptography the third person will know something is crypted.The major advantage of Steganography over cryptography is that it is almost impossible to know that something is hidden.We know that every image is made up of several bits.The data to be hidden is also a series of bits. Steganography replaces the least visible bits in the image by the data bits which is unidentified by the human eyes.The bits to be replaced is generated by an algorithm shared by sender and receiver.The receiver user the same algorithm to generate the bits where his message is hidden.The message is usually compressed and then encrypted before hiding inside a image.As the terrorists extensively use this method for conspiracy the government has involved in extensive research in this field to counteract the terrorists.

    Revealing Wikipedia

    Most of the student and teaching community will opt for Wikipedia as the primary source of information.But most of us dont know many amazing facts about this fabulous site.The articles in this site are created and edited by billions of contributor like us around the world.
    Due to the above fact it suffers from vandalism(i.e some persons will utilize it for publishing their ads and make a link to anonymous site)and some of its articles contain fake and unverified information.Therefore some persons will not accept the references from Wikipedia.

    Despite of criticism and controversies by many experts around the world some of its features marked it apart.
    1)Wikipedia is the fifth most viewed website in the world.This may be due to google which gives highest priority to Wikipedia in its search results.
    2)It is non commercial which doesnt support ads of any kind in its pages.A survey discovered that when this site supports ads it will earn many billions per year.It will ask for voluntary donation once in a year for its expenses.
    3)It is available in more than 200 languages and contains more than billion articles on almost every topic and it is ever increasing.
    Last but not least it employs less than 35 persons for maintaining such a large site.
    Wikipedia has taken many steps to ensure the reliability of its contents which includes the inclusion of talk page and history page for contributors which is capable of rollback to previous states when it is damaged by vandals.

    Saturday, August 21, 2010

    Hi Friends...

    This blog is especially designed to share  knowledge regarding Computer science technologies,
     and  I welcome all u guys to share ur valuable intelligence ... 

    NEED FOR CAPTCHA

    When you creating an account in any website you are prompted to enter the words given in the picture in the box as it is.This is called captcha.It is necessary because some software will create numerous number of account which the account providers doesnt like therefore they provide captcha which will not be identified by the software.In gmail when you enter the wrong password for five times it will request to fill the captcha this is because there are softwares that will try all the combination of words and numbers to hack the account.