Programming help home

Monday 30 May 2016

Security Risks to Database System Assignment

1. Unauthorized or unintended activity or misuse by authorized database users, database administrators, or network/systems managers, or by unauthorized users or hackers (e.g. inappropriate access to sensitive data, metadata or functions within databases, or inappropriate changes to the database programs, structures or security configurations);
2. Malware infections causing incidents such as unauthorized access, leakage or disclosure of personal or proprietary data, deletion of or damage to the data or programs, interruption or denial of authorized access to the database, attacks on other systems and the unanticipated failure of database services;
3. Overloads, performance constraints and capacity issues resulting in the inability of authorized users to use databases as intended;
4. Physical damage to database servers caused by computer room fires or floods, overheating, lightning, accidental liquid spills, static discharge, electronic breakdowns/equipment failures and obsolescence;
5. Design flaws and programming bugs in databases and the associated programs and systems, creating various security vulnerabilities (e.g. unauthorized privilege escalation), data loss/corruption, performance degradation etc.;
6. Data corruption and/or loss caused by the entry of invalid data or commands, mistakes in database or system administration processes, sabotage/criminal damage etc.

Application of Data Security


In above example, transparent data encryption enables you to encrypt sensitive data, such as credit card numbers, stored in table columns. Encrypted data is transparently decrypted for a database user who has access to the data. Transparent data encryption helps protect data stored on media in the event that the storage media or data file gets stolen.
Above diagram illustrates how access control and encryption work together to provide data Security

Recovery

 The process of restoring the database to a correct state in the event of a failure
The storage of data generally includes four different types of media with an increasing degree of reliability:
Main memory
Magnetic disk
Magnetic tape
Optical disk
Recovery Technique
Maintain a log file containing transactions records that identify the start/end of transactions and the before-and after-images of the write operation.
Using deferred update, writes are done initially to the log only and log records are used to perform actual updates to the database.  
If the system fails, it examines the log to determine which transactions it needs to redo, but there is no need to undo any writes.
Using immediate updates, an update may be made to the database itself any time after a long record is written.  The log can be used to undo and redo transactions in the event of failure.

Recovery Application



The Active/Passive pattern is the choice that many companies favor. This pattern provides improvements to the RTO with a relatively small increase in cost over the redeploy pattern. In this scenario, there is again a primary and a secondary Datacenter. All of the traffic goes to the active deployment on the primary datacenter. The secondary datacenter is better prepared for disaster recovery because the database is running on both datacenters. Additionally, there is a synchronization mechanism in place between them. This standby approach can involve two variations: a database-only approach or a complete deployment in the secondary data center.

Concurrency

Its mean “Many transactions - at the same time and Databases shared!”
So: Transactions must be isolated => need of concurrency control to ensure no interference. 
We will look at:
3 classic problems on concurrent access
Locking mechanism
Deadlock resolution
Three classic problems 
PB:  two (more) transactions read / write on the same part of the db. Although transactions execute correctly, results may interleave in diff ways
3 classic problems
Lost Update
Uncommitted Dependency
Inconsistent Analysis

Example of concurrency


Best Example of Data concurrency is Ticket booking transaction




Get best programming help to score good marks. Our team of writers and scholars is expert in writing plagiarism free content. Get affordable Homework Help at Programming Assignment Help.

Sunday 22 May 2016

XML-based Applications Assignment Help

XML is a standard defined for writing data generating by an application such that it is both machine readable and human readable.
Before the advent of XML data was saved in binary formats which were highly format and programming language dependent. One example is Java serialization: which must be read by Java, reading & writing the data from a different language is cumbersome at best. It also poses problems when schema of the data changes its form. Binary data cannot also be easily edited without a hex editor and appears as a stream of strange looking ASCII characters in most editors.
XML overcomes these problems by defining a standard for exchanging data. The specification highlights:
1. Data must be represented using tags eg. <author> </author>
2. additional attributes may be represented as : <author name=”john”></author>
3. Every tag must have a corresponding closing tag.


XML Based applications:


Today XML is being used to store a very wide variety of data expect for where binary formats are more efficient
eg. SVG : it is a image storage format in which we use the mathematical equations and the parameters of those equations to store the drawing rather than the pixels, this allows us to zoom in the image at any level we want.
ODF, ODS, ODP: Open Documents format supported by open office are based on XML which do not allows vendor locking and any software can read them.
Web services: Popular services like Google maps, Google finance, Google docs all have XML based web service using which mash up application can be developed which utilize this XML and present it in a different format as required by the application.
Configuration files: Most complex software store their configuration and state in XML files which can later be read from and written to easily. The main advantage here is that users can also easily edit these files with a simple text editor. Read about Programming in Java.

Advantages:


1. Standards based data interchange format allows any compliant software to use the file.
2. Standard based tools can be developed which allow easy modification of XML
3. Both machine and human readable.
4. Data schema modification is very easy.

Disadvantages:


1. They are usually much less efficient in storage space than binary files.
2. They require a lot of CPU power to parse and write when the data to be serialized and de serialized is large.


Rich Interface Application tools (Ajax, JQuery, HTML5..)


Traditionally interface design was done in programming languages like Java, C++ etc. which were not really meant for user interface design and UI design was difficult in such languages.
Hence for the web they chose a markup language which was easy to write, understand and edit. Since it was designed for the purpose of page layout it was easy to understand by most people and hence the Internet grew to the size it is today.

But for a long time the pages designed using HTML were static and the internet was a large number of web pages linked to each other by links called hyperlinks. Some interactivity was possible using animated images but that was just about it. To address this problem scripting languages were introduced which would download and run on the client side and could modify the HTML elements on the fly. A further evolution brought a technology which allowed the script to fetch content from the server and dynamically change the appearance of the web page without refreshing the content. Very prominent examples which really allowed everybody to realize the potential of this new technology called ajax were: the Gmail interface and Google maps.

The next generation of evolution is HTML5. In the earlier generation Java script allows modification of the page but the language was fraught with cross browser issues. HTML5 is designed to address the cross browsers issue by inviting stake holders and then agreeing upon a common standard which all browsers will implement. HTML5 add a lot of features which will further make the Internet experience very fluid and interactive. Read about Website Designing and Testing Assignment.


Some major enhancements:


1. Provision for a standard video tag, videos can now be inserted without the need for flash, silverlight or any other third party plug in. eg. <video src=”file.ogg”/>
2. Allows for client side database stores which can allows for querying using standard SQL, a big improvement over cookies.
3. New tag enhancements, for eg to add captions to image tags in a semantic way, we can now use the figure tag : <figure><img/> <caption>some caption</caption</figure>
4. Plans for 3D graphics and sound directly into HTML code. 

Advantages:


1. Standards based: Since it an open standard made by a board comprising of major stakeholder of this technology, it ensures that there is no vendor lock in and that there is consistent implementation of the standard across all browser so that developers can confidently release their applications.
2. Portable: Since all browsers must conform to the standard, the application written for HTML5 will be portable
3. Easy : RIA technologies like JQuery are much easier to implement than traditional statically typed languages allowing for easy deployment
4. Fluid UI experience: the user get the feeling of using a desktop application since the page is never refreshed and all the data is fetched dynamically from the server.

Disadvantages:


1. Since the technology is still in the transition stages all browsers do not support the entire feature set.
2. The UI experience depends on the bandwidth : there may be a considerable delay between the user action and results to appear due to latency.
3. Require a constant Internet connection : These technology must have a Internet connection to operate, offline support is still in infancy.

Open Source software:


Open source was a phenomenon started by a group of hacker at MIT, Artificial Intelligence labs when they were forced to use and write software under restrictive licenses with Richard Stallman as their clear leader. It was he who started the movement by forming an organization called FSF(free software foundation) which started by writing a free Unix clone, which is today known as GNU/Linux. Slowly the idea of Linux spread across the globe primarily through the advent of the Internet which allows thousands of developer to collaborate together:

Open Source, today in the business sense of the word stands for software which has its source open for modification by anybody and the organization earn profit by providing services for the software

Key Ideas:
OSS grants users right by providing them with a license. Commercial closed source vendors provide a license in the form of EULA, or the end user license agreement which the user has to buy. The EULA basically states that any modification, or sharing of software after modification is illegal and the software is the sole proprietorship of the company which developed it. The license given to an end user is non transferable.
An open source license however states that:
1. The user has the freedom to use the software in any way he chooses.
2. The user has the right to modify the source code of the software and analyse it for any purpose.
3. The user has the right to distribute the software with any modifications he has made.

Many OSS licenses require that the end user must release the software again under the same OSS license so that the software can continue to be free.

Examples of Open Source Licences: GNU GPL, BSD License, Apache Public License, MIT License.

Revenue Model:   Since open source software give away their source code for free and is open for modification it definitely has to follow a different business model than selling software as intellectual property. Most companies which are in this business use the service model to generate revenue. They provide customized software solutions to enterprise and make modifications to the software for fees. They also provide technical support services, the prominent examples of this model are businesses like : Canonical , which makes Ubuntu and Redhat Inc, which makes the Redhat Enterprise server series.


Advantages:


1. OSS provides clear advantages as being cost effective, since the source is available for anybody to download there is no need to pay to any vendor for the software.
2. Availability of the source code allows easy modification of software for specific needs.
3. It creates a truly competitive market since companies can now compete on the better services rather than on the basis of monopoly.
4. No vendor lock in : e.g if you use .NET to develop your application your entire development tool chain must be from Microsoft and you cannot move to a different vendor if you do not like their serivces. This problem does not exist in open source.
5. Collective skills of thousands of programs can be used to allows rapid modification of the source code.

Disadvantages:


1. Since there is nobody who ‘owns’ the software in the business sense some times due to lack of money backing the project there may be issues like less market acceptance. For some projects it also means a loss of clear direction in which the project is going.

The technology should be evaluated on the contention that it:
1. Saves cost due to code availability
2. Allows for easy modification
3. disallows vendor locking

Programming Assignment Help provides plagiarism free assignments i.e. all our solutions are genuine and written by best technical assignment writers who have years of experience. 


Thursday 19 May 2016

Network Management System Assignment

Network Management Tools




Programming Assignment Help provides plagiarism free assignments i.e. all our solutions are genuine and written by best technical assignment writers who have years of experience.

Monday 16 May 2016

Hosting of Website on Web

Till now we have developed and tested this site on local machine, now its time to move this site to web so that it can be accessed over internet.

Before moving this website to web, I performed the above tests.

The web pages to be accessible over internet, this website to be hosted on web server which can be either from music school or from a web hosting company who can share the web server instance to host this web site. 

For this website, we suggest to host this website on a web hosting company as they are providing professional services to host the website and cost to host the website is also very minimal. The school can choose any web site hosting services provided by many web hosting services. One of the recommended web site hosting company is: http://www.heartinternet.co.uk/
HeartInternet is providing fast, reliable web hosting service at an affordable price of £2.49/month with secure servers, and 24/7 technical support. This list of services offered by them are:
·         My SQL Database System
·         SSH Access
·         400 MB Mail Box
·         1000 Webmail
·         30000 MB of monthly bandwidth
·         5000 MB web space
·         Cloud hosting platform
·         24*7 support
·         Backup and Restore of website
·         PHP support
·         Advanced data centre features supported


To upload the web site content to the remote server, there are many protocols available and Dreamweaver supports below protocols:
FTP (File Transfer Protocol);
SFTP (Secure File Transfer Protocol)
RDS (Remote Development Services)

FTP protocol is one of the most widely used protocol. We can use Dreamweaver or any other program such as FTPLite, to transfer the website content files to the web hosting platform. When the connection is established with the remote server, file transfer can be done and once all the contents are available on the hosting platform, website is available to use over web.

Get best programming help to score good marks. Our team of writers and scholars is expert in writing plagiarism free content. Get affordable Homework Help at Programming Assignment Help.

Thursday 5 May 2016

Inventory Management System Memorandum Assignment

TO:              Project Manager, FABILOUS FASHION

 FROM:       ABC Consulting, Database Analyst

SUBJECT:    Inventory Management System

The Inventory Management System is sufficiently to controls and manages inventory of Fabilous Fashion and better coordinate operations between their outlets and three warehouses in the three states. Inventory Management System has core concept to track the sale of items from the cash registers with additional features for interpreting the data.  It uses a client-server model with a connected database to allow data entry Admin, multiple outlets and warehouses to be connected.

Inventory Management System merely records sales and restocking data and provides notification of low stock at any location through email at a specified interval.  The goal is to reduce the strain of tracking rather than to handle all store maintenance.  Further features may include the ability to generate reports of sales, but again the interpretation is left to the management.  In addition, since theft does occasionally occur, the system provides solutions for confirming the store inventory and for correcting stock quantities.

Expectations of different Inventory Management System users as follows:


1.       Database Management Users: To manage data entry and company administration with Responsive UIs, easy to data backup / restore, Easy tool for data entry, data security / consistency, Information Management, High performance, Availability and reporting

2.       Store Managers: responsible for managing the overall functioning of the store and ensuring day to day operations of the store and ensures maximum profitability for his store. With expectation of easy outlet daily operations, Inventory Availability, Accurate monitoring of inventory in store, inventory planning ,managing profit and loss, Sale / Audits reports, Stock Control, Assurance Management , accurate Inventory Flow, managing outlets customer case and replacements.

3.       Warehouse Managers: Is a vital part of the supply chain process, system should support easy work operations in support of client manufactory, inventory Monitoring, and pack / shipping functions from multiple warehouses, fast pace distribution center, should manage replenishment of stock, support the receipt and dispersal of materials entering or leaving warehouse, support of report when ever required, Order Management from outlets, should fulfill all aspect of Supply chain Management.

We ensure system will fulfill all the expectation of IMS users.