Wednesday, October 14, 2009

Babar Iqbal World’s Youngest MCTS , MCP , CIW-A & CWNA from Pakistan

A 12-year old student Babar Iqbal hailing from Dera Ismail Kahn made a fourth world record in field of computer, Geo News reported Friday.

Earlier, Babar, generally known as genius imagecyber kid, had set up three world records including Youngest Microsoft Certified Professional (MCP) at the age 9 years, Youngest Certified Wireless Network Administrator (CWNA) at the age 9 years and Youngest Certified Web Professional Associate (CIWA) at age 10 years.

While, the recent fourth record he made as Youngest Microsoft Certified Technology Specialist (MCTS) at the age 12 in Dubai.

The participants of this competition were aged from 20 to 35 years. By making this record, young Babar surprised the IT experts from all over the world. He also surpassed his compatriot Irfa Kareem Randhawa, who made this record at the age of 9 years and seven months.

Babar was born in surrounding overwhelmed with computers and monitors on March 2, 1997.

His two brothers and sisters (four in all) are Microsoft Certified Professional.

Website : http://www.babariqbal.com

Blog : http://www.youngestMSP.com

Gallery : http://www.youngestmsp.com/gallery/

Monday, October 5, 2009

Thousands of Hotmail passwords leaked online

More than 10,000 usernames and passwords for Windows Live Hotmail accounts were leaked online late last week, according to a report by Neowin.net, which claimed that they were posted by an anonymous user on pastebin.com last Thursday.

The post has since been taken down.

Neowin reported that it had seen part of the list. "Neowin has seen part of the list posted and can confirm the accounts are genuine and most appear to be based in Europe," said the site. "The list details over 10,000 accounts starting from A through to B, suggesting there could be additional lists."

Hotmail usernames and passwords are often used for more than logging into Microsoft's online e-mail service, however. Many people log onto a wide range of Microsoft's online properties -- including the trial version of the company's Web-based Office applications, the Connect beta test site and the Skydrive online storage service -- with their Hotmail passwords.

It was unknown how the usernames and passwords were obtained, but Neowin speculated that they were the result of either a hack of Hotmail or a massive phishing attack that had tricked users into divulging their log-on information.

Accounts with domains of @hotmail.com, @msn.com and @live.com were included in the list.

Microsoft representatives in the U.S. were not immediately able to confirm Neowin's account, or answer questions, including how the usernames and passwords were acquired. The BBC, however, reported early Monday that Microsoft U.K. is aware of the report that account information had been available on the Web, and said it's "actively investigating the situation and will take appropriate steps as rapidly as possible."

If Neowin's account is accurate, the Hotmail hack or phishing attack would be one of the largest suffered by a Web-based e-mail service.

Last year, a Tennessee college student was accused of breaking into former Alaska governor Sarah Palin's Yahoo Mail account in the run-up to the U.S. presidential election. Palin, the Republican vice presidential nominee at the time, lost control of her personal account when someone identified only as "rubico" reset her password after guessing answers to several security questions.

David Kernell was charged with a single count of accessing a computer without authorization by a federal grand jury last October. Kernell's case is ongoing.

Shortly after the Palin account hijack, Computerworld confirmed that the automated password-reset mechanisms used by Hotmail, Yahoo Mail and Google's Gmail could be abused by anyone who knew an account's username and could answer a single security question.

Thursday, September 10, 2009

CodeIt.Once - Refactoring Add-In for VS 2003 and VS 2005

I'm excited to announce our release of CodeIt.Once - Refactoring Add-In for VS 2003 and VS 2005.

CodeIt.Once functionally complete Beta for both Visual Studio 2003 and Visual Studio 2005 is currently available for download through our Beta Experience program. If you want download a copy for evaluation or to participate in Beta testing, fill out a simple form (name and email address) and we will contact you with download instructions.

Visit CodeIt.Once Refactoring Operations page for complete list of operations and their description.

When released, CodeIt.Once will be offered in a Community Edition (free) as well - the top 6 most frequently used refactoring operations will be available at no charge to VB developers within the VB 2005 IDE.

We consider the Community Edition to be extremely valuable to Visual Basic developers since Microsoft pulled refactoring from VB 2005. CodeIt.Once Community Edition will provide to VB developers the missing in VB 2005 refactorings just like the ones that come right out of the box with C#.

 

About Refactoring

For those who are not familiar with the term "refactoring", these are things you do every day and may not realize there is a term invented for that :)

Examples of refactoring operations are routine functions like 

  • renaming a variable, fields method, class or namespace
  • moving code fragment of a long method into a separate method
  • promoting local variable to a method parameter
  • moving class from one namespace to another
  • adding, removing method parameters or changing their order

Without automation tool all of the above can be done with the ordinary "search-and-replace" which typically turns into tedious and lengthy (several hours at times) process. The manual process also requires extensive testing to verify that the code still works.

Martin Fowler:

“The key to keeping code readable and modifiable is refactoring - for frameworks, in particular, but also for software in general.
So, what's the problem? Simply this: Refactoring is risky. It requires changes to working code that can introduce subtle bugs. Refactoring, if not done properly, can set you back days, even weeks.“

Here is where CodeIt.Once comes in handy - it will perform these operations for you in the matter of seconds while keep the source code syntactically correct and compilable. CodeIt.Once makes refactoring a snap!

 

About CodeIt.Once

CodeIt.Once provides the following refactoring commands to start with:

  • Rename
  • Extract Method
  • Encapsulate Field
  • Extract Interface
  • Promote Local Variable to Parameter
  • Remove Parameters
  • Reorder Parameters
  • Add Parameter
  • Method to Property
  • Property to Method
  • Inline Variable
  • Move Class
  • Decompose Conditional

Visit CodeIt.Once Refactoring Operations page for operations description.

Thursday, May 7, 2009

GMX Mail - Free Email Service Review

 

Visit Their Web Site

My email : waqar@gmx.us
The Bottom Line

GMX Mail is a reliable email service filtered well of spam and viruses whose 5 GB of online storage you can use not only through a rich web interface but also via POP or IMAP from a desktop email program.
More and smarter ways to organize mail could be nice.

Pros

  • GMX Mail can retrieve mail from your other accounts (including Yahoo! Mail and Windows Live Hotmail)
  • GMX Mail offers a rich web interface as well as POP and IMAP access in desktop programs
  • 5 GB online storage and messages up to 50 MB allow for lots of mail and large attachments

Cons

  • GMX Mail does not support encrypted mail and cannot display remote images per sender
  • You cannot label mail, find related messages fast or set up smart folders in GMX Mail
  • GMX Mail cannot sort mail based on past actions
Description
  • GMX Mail offers email accounts including 5 GB of online storage and POP as well as IMAP access.
  • You can read mail from other email accounts (including Gmail, Yahoo! Mail and Windows Live Hotmail) in GMX Mail.
  • All mail is scanned for viruses, and a learning spam filter keeps GMX Mail Inboxes clean.
  • Flexible filters can sort incoming mail into custom folders or forward it, for example.
  • GMX Mail's rich web interface includes drag and drop ease as well as rich-text email formatting.
  • While you're away from computers, GMX Mail can send a vacation auto-reply.
  • You can have GMX Mail delete mail from any folder (not just "Spam" and "Trash") after a certain number of days.
  • In addition to an address book, GMX Mail also includes a calendar and online storage.
Guide Review - GMX Mail - Free Email Service

GMX Mail opens in a new browser window — and into an experience much owed to desktop email programs. You get toolbars and drag-and-drop and menus and panes and folders and rich-text editing and keyboard shortcuts (which can be a tad cryptic).

Behind GMX Mail's polished interface are robust underpinnings: GMX Mail is highly reliable and comes with 5 GB of online storage. Its virus scanning is exemplary, and a host of spam filters perform solidly — albeit not perfectly. You can mark mail as junk easily, though, and the filters should learn.

If the GMX Mail web interface is not your thing or, maybe even more importantly, to get your mail into and out of GMX Mail, both POP and IMAP access are available. GMX Mail reaches out in the other direction, too: you can set it up to retrieve mail from multiple POP or even Windows Live Hotmail and Yahoo! Mail accounts. Of course, you can send mail with your any address in the From: line.

True to its solid desktop email program roots, GMX Mail gives you folders and filters for sorting mail. You cannot, alas, apply free-form labels or use search folders for even more flexible organizing. GMX Mail does include a handy and fast search feature, of course, including a few search operators. Shortcuts to finding related messages — in the same thread, for example, or mail exchanged with a sender — would be nice.

GMX Mail's address book works well and a lot like the Outlook contacts you love — or at least know. In addition to email and contacts, GMX Mail offers a mature calendar and file storage. The parts could integrate better, though.

Monday, April 27, 2009

Complete Project / FYP / RCBA Report

 

Download PDF Sample

Hay! Students…. Now its time to give complete Real Time Collaborative Business Application (RCBA) report.

Due to heave file size in MS.Word Format PDF file is uploaded if you need .docx File please email me. It would be honor for me to help you.

Thanks….

Sunday, April 26, 2009

Project Design Specification

 Download PDF Sample

Design specifications, like blueprints, provide detailed guidance on what the project outputs will look like and how they will be expected to perform. The key difference is that design specifications provide that guidance through the written word, coupled with graphics and drawings, whereas blueprints are strictly graphic in nature.

The purpose is to provide clear direction to the project organization on what the final outputs of the project must look like and the tolerances and standards those outputs must meet.

Here is Sample for you of my Final Year Project.

Project Requirement Analysis

 

Download File (MS Word 2007)

Requirements analysis in systems engineering and software engineering, encompasses those tasks that go into determining the needs or conditions to meet for a new or altered product, taking account of the possibly conflicting requirements of the various stakeholders, such as beneficiaries or users.

Requirements analysis is critical to the success of a development project. Requirements must be actionable, measurable, testable, related to identified business needs or opportunities, and defined to a level of detail sufficient for system design.

Hay friends here is my RCBA(Real Time Collaborative Business Application) sample file for your assistant.

jQuery HowTo's |How to get started

 e-Book (Learning jQuery 1.3 Paperback)

Starting with jQuery needs three basic steps:

  1. First, download jQuery and store it in a location your web page can access. Download the latest version here.
  2. Include jQuery into your HTML page.
  3. Make use of jQuery's functionality.

A sample web page might look something like this:

<html>
<
head>
<
title>My first jQuery</title>

<
script type="text/javascript" src="path/to/jquery.1.2.1.pack.js"></script>

<
script type="text/javascript">
//this is jQuery code
$(document).ready(function () {
alert("I came from jQuery!");
});
</script>

</
head>
<
body>
<
h2>
jQuery sample</h2>
</
body>
</
html>


 



The jQuery code you decide to use depends on your needs. The rest of the How-To's on this page help to highlight what can be done. These are more simplistic examples though. Please visit the jQuery documentation or the jQuery mailing list for more details. The more advanced things you see jQuery do are usually a combination of the basics though.



A note about the different jQuery files.

jQuery tries to accomodate all types of developers. Those who want to get their hands dirty and explore jQuery's inner workings should download the uncompressed version of the jQuery library. All others probably want to use the packed version as this has the smallest footprint that is supported by all browsers. The packed version removes all extra spaces and comments to compress the library, and then encodes it to make it even smaller. The minified version of the library does the same, except it does not encode it.

Friday, April 24, 2009

Blog This for Firefox 3.0

Since the first release of Windows Live Writer, we’ve had a Blog This add-on for Firefox. Currently it’s marked as compatible with Firefox 1.5-2.0, which means beta versions of Firefox 3 won’t load it. Turns out it works fine with Firefox 3 as well, if you mark it as such:

  1. Start Notepad
  2. Open this file:
    C:\Program Files\Windows Live\Writer\BlogThis\Mozilla Firefox\install.rdf
  3. Change the line
    <em:maxVersion>2.0+</em:maxVersion>
    to
    <em:maxVersion>3.0+</em:maxVersion>
  4. Rename install.rdf to install.rdf.gone
  5. Exit Firefox, if it’s running
  6. Start Firefox
  7. Exit Firefox
  8. Rename install.rdf.gone back to install.rdf
  9. Start Firefox

(Steps 4-9 are necessary to get Firefox to pick up the changes in install.rdf.)

When we get the chance, we’ll update the add-on so this isn’t necessary.

If you encounter any problems using Blog This with Firefox 3, please let me know in the comments.

Jquery

e-Book (Learning jQuery 1.3 Paperback)

jQuery is great in many ways. You probably first heard about the framework when browsing through a showcase of beautiful “ajax” scripts and became impressed with how easy it can be used to create advanced and delightful effects. But jQuery is much more than that. After you’ve seen all the fancy slides and animations and got to know the framework, you realize that it can do much more to assist you in building advanced, content-driven web sites and applications.

Here is a hand-picked list of useful jQuery scripts and utilities, created to make your web development easier. You won’t find any fancy slides or animations in here, instead I have compiled a list of the best, most well-written and useful jQuery components on the web that I would use myself.
Am I missing something? Let me know in the comments.

Friday, February 27, 2009

Project Planning & Scheduling

Download File

Project Planning & Scheduling (Word 2007)

Gant Chart Sample (Microsoft Project)

___________________________________

 

1 Table of Contents

2 Introduction. 3

2.1 Scope and Purpose: 3

2.2 Overall System Scope. 3

2.3 Project Motivation and Objectives. 3

3 Software Engineering. 4

3.1 Process Model 4

3.2 Project Team Structure. 6

4 Project Scheduling & Task. 7

4.1 Gantt Chart 7

4.2 Work Breakdown Structure (WBS) 8

5 Project Resources and Cost Estimation. 9

5.1 Calculating Function-Oriented Metrics. 9

5.1.1 Calculation of the unadjusted function points (UFP): 9

5.1.2 Calculate Adjusted Function Point 10

5.2 COCOMO EVALUATION.. 11

5.3 FUNCTION POINT BASED APPROXIMATIONS. 12

5.4 LOC BASED APPROXIMATIONS. 12

5.5 Summary. 13

6 Project Management Methods and Monitoring. 14

6.1 Project Monitoring Methods. 14

6.1.1 Weekly Team Meetings. 14

6.1.2 Schedule Tracking. 14

6.1.3 Meet with Customer. 14

6.1.4 Process Reviews. 14

6.2 Project Management Methods. 15

6.2.1 Risk Management 15

6.2.2 Requirements Management 15

6.2.3 Tracking and Oversight 15

6.2.4 Process Management 15

6.2.5 Training. 15

2 Introduction

2.1 Scope and Purpose:

RCBA is business oriented application targeting an organization and provide the solution for their employees and executive to communicate with each other via Unified Communication & Order Management System.

2.2 Overall System Scope

RCBA application will also available on PDA version that communicates with database underlying our web application. This tool allows the sales representative to capture the salient encounter information in real time, upload customer order forms and organize their meetings, contacts, calendar and local email of organization.

2.3 Project Motivation and Objectives

The solution is intended to increase the productivity of outside sales forces, whose products are installations and furnishings for homes, hotels, and office buildings. In the past during customer visits, sales representatives had to manually fill in sales orders on paper-based forms. This process was restrictive, time-consuming and source of errors, which need to be update using following object:

· Office Everywhere

· Unified Communication System

· Order Management System

· Conferencing

· Manage Personal Information

3 Software Engineering

3.1 Process Model

During software development the developer apparently has to undergo a certain process named the SDLC (system development life cycle) by using one out of several software process models. This is to establish “the order of the stages involved in software development and evolution and to establish the transition criteria for progressing from one stage to the next.” (Barry W. Boehm, A spiral model of software development and enhancement p.61).

The spiral model allows for a non-linear and more flexible development method. Phases can be revisited at any stage in the process and as many times as need be. The four phases in the spiral model are:

1. Planning

2. Evaluation

3. Risk analysis

4. Engineering

Although the waterfall model “looks very good on paper” better than the spiral method, a product development process is not this simple. It’s said that a waterfall model's success is determined by the “time spent early on” as there is no turning back. However when does one know that enough time has been spent? When is the cut-off period? In fact, it’s said that the closer a “particular plan... [is] followed” the more successful the development, however in the case of such a strict, non iterative model I think that the closer the waterfall model is followed the more chance of failure!

What makes the spiral so robust is the fact that not only does it begin with a hypothesis that if at any time fails then "the spiral is terminated" but also each cycle of the spiral begins with the aims identified, "alternative means of implementing...the product... [and] the constraints imposed". Progression is constantly under scrutiny so there is little chance of mishaps being overlooked. Moreover, the early steps involve a first prototype that is made from the preliminary design; its "strengths, weaknesses, and risks" are evaluated and a second prototype is constructed from this analysis and is tested. This prototype is also evaluated by the customer and the "preceding steps are iterated until the customer is satisfied."

SPIRAL MODEL

3.2 Project Team Structure

To make the team model's "team of peers" concept work, you need to understand and support the roles and dynamics of the team members. Rather than being directly responsible for the day-to-day project direction and tracking, the project manager becomes a facilitator. Depending on the corporate structure, this manager might be the designated Project Manager, Business Manager, or Information Systems Manager.

The following diagram illustrates an overall project structure that includes the suggested project team roles.

The Project Management team includes the Project Manager and the individual leads for each of the team roles. They share the responsibility for planning schedules and resources, assessing risks, and tracking the project. Because each team must deliver on its commitment by completing a set of tasks, each lead should participate in project planning and management. The following items describe examples of this participation.

  • Although the Project Manager might do an initial assessment of how the team model will be applied by considering the characteristics of the project, each team lead should have an opportunity to consider all the factors and determine if the risks are manageable.
  • All team leads participate in negotiating the functional specification. Any proposed changes to the functional specification baseline require agreement from all team leads.
  • Rather than having scheduling and estimating imposed from the top down, each key player should have an opportunity to contribute to the overall schedule and estimates.
  • As the project progresses, each team lead is responsible for assessing risks and participating in tradeoff decisions.

When necessary, the Project Manager may make top-down decisions if the team members cannot reach consensus. Obviously, this can have a tendency to migrate gradually to a more traditional top-down project management style. Only the corporate culture can assure that it will not.

4 Project Scheduling & Task

4.1 Gantt Chart

Gantt Chart

4.2 Work Breakdown Structure (WBS)

Work Breakdown Structure (WBS)

5 Project Resources and Cost Estimation

5.1 Calculating Function-Oriented Metrics

5.1.1 Calculation of the unadjusted function points (UFP):

image 

5.1.2 Calculate Adjusted Function Point

To calculate the Complexity adjustment value, several factors have to be considered, such as Backup and recovery, code design for reuse, etc.  All the factors and their estimated values in this project are shown in the following table.

The adjusted function point denoted by FP is given by the formula:

FP = total UFP * (0.65 + (0.01 * Total complexity adjustment value)) or

FP = total UFP * (Complexity adjustment factor)

Total complexity adjustment value is counted based on responses to questions called complexity weighting factors in the table below.  Each complexity weighting factor is assigned a value (complexity adjustment value) that ranges between 0 (not important) to 5 (absolutely essential). 

Table Adjusted Function Points

Sno.

Complexity Weighting Factor

Value

1

Backup and recovery

5

2

Data communications

5

3

Distributed processing

5

4

Performance critical

4

5

Existing operating environment

3

6

On-line data entry

4

7

Input transaction over multiple screens

1

8

Master files updated online

4

9

Information domain values complex

5

10

Internal processing complex

4

11

Code designed for reuse

4

12

Conversion/installation in design

4

13

Multiple installations

4

14

Application designed for change

4

Total complexity adjustment value

56

Calculate the Source Lines of Code (SLOC) and the formulas used

·       Total Unadjusted Function Points (UFP)        = 138

·       Product Complexity Adjustment (PC) = 0.65 + (0.01 *56) = 1.21

·       Total Adjusted Function Points (FP) = UFP * PC => (138 * 1.21) = 167

5.2 COCOMO EVALUATION

COCOMO is one of the most widely used and discussed software cost estimation models. LOC value will be calculated from FP to do the COCOMO calculation. To find LOC and effort we have to choose the programming language also. We will use .NET. LOC/FP for programming languages which we will use in .NET is approximately 46. This value is found from approximating LOC/FP’s for programming languages.

LOC = FP x 46

LOC = 167 x 46 = 7682 LOC ≈ 8 KLOC

According to COCOMO, effort E and duration D are

E = ai * KLOC bi * EAF

D = c E d

Where a, b, c and d are constants depending on your project type. We consider that our project will be embedded. For our project, EAF (Cost Driver) is approximately 1.01(after calculations).

E = 3.6 x (8)1.2 x 1.01

= 44 person-month

D = 2.5 x (44)0.32 = 8.39 months

Average staffing = (44 Person-Months) / (8.39 Months) ≈ 5 people

COMMENTS: In our project, we have 4 people in our team. According to calculations from COCOMO2, we found that we need 5 people to finish the whole project in 8.39 months. We believe that when we work hard, we can finish this project on time.

5.3 FUNCTION POINT BASED APPROXIMATIONS

This part is to use some other estimation techniques on the same FP information and to produce some other comparative approximation.

Albrecht and Gaffney Model: E = -13.39 + 0.0545 * FP

= -4.2885 person-month

Kemerer Model: E = 60.62 x 7.728 x 10-8* FP3

= 21.81 person-months

Matson, Barnet ,Mellichamp Model: E = 585.7 +15.12*FP

= 3110.74 person-month

These results are very far from the effort evaluated in the COCOMO estimation.

5.4 LOC BASED APPROXIMATIONS

We used two LOC based estimation techniques to produce a better approximation.

Walston-Felix Model: E = 5.2 x (KLOC) 0.91

= 34.49 person-months

Boehm Simple Model: E = 3.2 * (KLOC) 1.05

= 28.40 person-month

Doty Model: E = 5.288 * (KLOC) 1.047

= 46.64 person-month

All results are near to COCOMO estimation when compared with FP based estimations. We can use these results for further estimations.

5.5 Summary

Inputs

Development

Delivered Source Instructions (thousands) (KDSI)

8

Development Mode

Embedded

Average Cost Rate (Rs./PM)

10,000

Maintenance

KDSI added (annual)

0

KDSI modified (annual)

0

Average Cost Rate (Rs./PM)

0

Results

Effort

44

person-months (PM)

Schedule

8

months

Development Cost

440,000

Rs.

Productivity

182

instructions per person-month

Average Staffing

5.5

full-time-equivalent software personnel

Annual Maintenance Effort

0

person-months

Annual Maintenance Cost

0

Phase Distribution

Effort (PM)

Schedule (mo.)

Staff (avg.)

Cost

Plans and requirements *

3.5

2.2

1.6

35,000

Product Design

7.9

2.6

3

79,000

Programming

25.1

3.5

7.2

251,000

Detailed Design

11.9

119,000

Code and unit test

13.2

132,000

Integration and test

11

1.9

5.8

110,000

* The plans and requirements phase is calculated in addition to the nominal COCOMO estimate for effort and schedule.

6 Project Management Methods and Monitoring

6.1 Project Monitoring Methods

6.1.1 Weekly Team Meetings

Weekly team meetings will be facilitated by the project supervisor and attended by all team members. Each Team members will be required to submit a progress report for each of their respective teams. At this time problems or potential problems will also be discussed. Suggestions will be made for resolution.

6.1.2 Schedule Tracking

The schedule will be regularly reviewed comparing actual milestones to planned milestones as denoted in the project schedule. In addition, the task start dates will be reviewed to ensure the schedule is not slipping. If there are start date delays or if it looks like milestones may not be achieved on schedule, the appropriate Team Leader will be contacted to discuss and resolve the potential delays.

The critical path will be closely monitored to foresee any upcoming project delays. One method for minimizing these delays is maintaining a somewhat flexible schedule and by staffing the team with members who have both similar and complimentary skill sets.

6.1.3 Meet with Customer

There will be regular meetings with the customer to review the progress. Current requirements will be also reviewed to ensure that the project requirements have not changed.

6.1.4 Process Reviews

Monthly software process reviews will be performed to ensure that the project is headed in the intended direction and in a timely fashion.

6.2 Project Management Methods

6.2.1 Risk Management

As a part of risk management, sources of risk will be identified, addressed, and mitigated before they threaten successful completion of a project. The two primary risk management elements are risk assessment (identifying, analyzing, and prioritizing) and risk control (management planning, resolution, and monitoring).

6.2.2 Requirements Management

Initial requirements will be established but these requirements are subject to change and must be monitored and managed. Managing requirements will include capturing, tracking, and controlling requirements, as well as any changes to them. This will establish and maintain a common understanding, between the customer and development team, of the requirements to be addressed by the project. This agreement should be the basis for planning and managing the project.

6.2.3 Tracking and Oversight

The project accomplishments will be tracked and reviewed with respect to the project plan. Corrective action will be taken as necessary based on actual accomplishments and results.

6.2.4 Process Management

In addition to managing the project, the processes involved in managing the project will also be continuously monitored and reviewed. This will include to planning, defining, implementing, monitoring, measuring, and improving processes under project management and producing process documentation and improvement plans.

6.2.5 Training

The engineers working on the project will receive any necessary training to support product development. This will ensure individuals responsible for software engineering activities have the appropriate skills and knowledge relevant to procedures, tools, and domain knowledge.

Project Defense Presentation

Download File (Microsoft Office PowerPoint Presentation 2007) 

Slide1 Slide2 Slide3 Slide4 Slide5 Slide6 Slide7 Slide8 Slide9 Slide10 Slide11 Slide12 Slide13 Slide14 Slide15 Slide16 Slide17 Slide18

Project Proposal Sample

Download File... (Word 2007)

Real-time Collaborative Business Application

(RCBA)

By

  WAQAR ATTARI

2005-CS-14

KAMRAN USMANI

2005-CS-22

ZAKA UDDIN KHAN

2005-CS-17

AFAQ SHAKEEL

2005-CS-48

Department of Computer Science

Sir Syed University of Engineering & Technology, Karachi

Table of Contents

1 Motivation. 1

2 Overview.. 1

2.1 Significance of the Project 1

2.2 Description of the Project 1

2.3 Background of the Project 1

3 Methodology. 2

3.1 Designing Phase. 2

3.2 Implementation Phase. 2

3.3 Testing Phase. 2

3.4 Evaluation Phase. 3

4 Features. 3

5 Hardware and Software Requirements. 4

5.1 Hardware Requirement: 4

5.2 Software Requirement: 4

6 Diagrammatic Representation of the Overall System.. 5

7 Appendices. 6

7.1 Expected Internal Advisor. 6

7.2 Expected External Advisor. 6

8 Citations and References. 7

1 Motivation

Real-time Collaborative Business Application (RCBA) as title of project already defines meaning of project to provide a strong communication system for the employees and executives of an organization without concern of their region.

2 Overview

RCBA give the concept of Office Everywhere.

2.1 Significance of the Project

RCBA is business oriented application targeting an organization and provide the solution for their employees and executive to communicate with each other via Unified Communication & Order Management System.

2.2 Description of the Project

RCBA application will also available on PDA version that communicates with database underlying our web application. This tool allows the sales representative to capture the salient encounter information in real time, upload customer order forms and organize their meetings, contacts, calendar and local email of organization.

2.3 Background of the Project

The solution is intended to increase the productivity of outside sales forces, whose products are installations and furnishings for homes, hotels, and office buildings. In the past during customer visits, sales representatives had to manually fill in sales orders on paper-based forms. This process was restrictive, time-consuming and a source of error.

RCBA required an automated collection process to equip sales forces with Pocket PC devices, while requiring a Pocket PC-based custom application to automate order management.

3 Methodology

Our development process is a customized, multi-phase method of delivering projects on time and on budget. The methodology is designed to adapt to both the requirements of each individual engagement and the pressures of larger industry forces. Leveraging our technical knowledge with this methodology enables us to empower our clients, streamline decision-making processes, expedite production, and cut costs. (Akri Consulting n.d.)

3.1 Designing Phase

· Initial understanding is established with the targeted organization, by acquiring any existing document related to the software project.

· A preliminary software development timeline and the approximate cost are determined, based on the functional point analysis.

· The number of customer interactions required to finalize the project plan is determined.

· A project plan document is made.

· Exploring the sources of business knowledge.

· Evaluating the process logic and business rules.

· Outlining business model formally valid with the customer is made.

· Ensuring that the detailed business model is up to date.

· Designing of Entity Relationship Diagram (ERD) is brought forth, for consideration.

· Designing of end-user interfaces.

· The technical software design document is revisited if necessary.

3.2 Implementation Phase

· The final Technical Software Design Document is completed and freezed.

· Developing database on SQL Server 2005 based on ERD from previous phase.

· Coding is done by Programmers with class level, method level and inline software documentation.

· Establishing Intranet & Internet for RCBA.

3.3 Testing Phase

· White box Testing will be carried out.

· Unit testing by individual developers facilitated.

· 10 Orders will be placed manually as well as via RCBA for testing purpose.

· 10-15 emails will be sent via RCBA for testing purpose.

· Testing Data and system documents that are produced.

· Software design accuracy and completeness is verified.

3.4 Evaluation Phase

· Measuring performance of system with maximum no. of users.

· Comparing it with existing system.

· Addition of demanding features in RCBA.

4 Features

· Office Everywhere

RCBA give facilities to employees to access organization from anywhere.

· Unified Communication System

RCBA introduce authenticated communication system for an organization.

· Order Management System

RCBA can facilitate sales representative to book order from customer without any delay and paperless and update organization in real-time.

· Manage Personal Information

RCBA can facilitate employees to manage their contacts and meetings and email

5 Hardware and Software Requirements

5.1 Hardware Requirement:

Description

Requirements

Processor

PC with a Pentium III-class Processor, 1 GHz or above

Operating System

Windows Server 2003, Windows XP or later

RAM

512 MB (Recommended : 1GB)

Available Hard Disk Space

5 GB Approx

PDA

Required

Internet

Required

Headphone

Required

 

5.2 Software Requirement:

Description

Requirements

Platform

Windows® Server 2003, Windows XP or later

Front End (User Interface)

Microsoft Visual Studio 2005

Back End (Database)

SQL Server 2005

Database Connectivity

Microsoft ADO .Net

CASE Tools

MS Office

Smart Draw 2007

 

6 Diagrammatic Representation of the Overall System

RCBA NETWORK DIAGRAM

Figure 1. RCBA NETWORK DIAGRAM


7 Appendices

7.1 Expected Internal Advisor

Sir. Muhammad Kashif Khan

Project Coordinator

Sir Syed University of Engineering & Technology.

7.2 Expected External Advisor

Syed Fakkhi Iftikhar

G.M. Events Operation

Ecommerce Gateway Pakistan Pvt. Ltd.

fakkhi@ecgateway.net

8 Citations and References

Akri Consulting. Software Project Methodology. http://www.akriconsulting.com (accessed February 26, 2008).