{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"en":"Products","de":"die produkte","ru":"Продукты","_type":"localeString"},"introduction-popover":{"en":"introduction","ru":"внедрения","_type":"localeString"},"partners-popover":{"ru":"партнеры","_type":"localeString","en":"partners"},"update-profile-button":{"ru":"Обновить профиль","_type":"localeString","en":"Update profile"},"read-more-button":{"_type":"localeString","en":"Show more","ru":"Показать ещё"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"en":"Categories","ru":"Компетенции","_type":"localeString"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"_type":"localeString","en":"User","ru":"Пользователь"},"partnership-vendors":{"_type":"localeString","en":"Partnership with vendors","ru":"Партнерство с производителями"},"partnership-suppliers":{"_type":"localeString","en":"Partnership with suppliers","ru":"Партнерство с поставщиками"},"reference-bonus":{"_type":"localeString","en":"Bonus 4 reference","ru":"Бонус за референс"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"ru":"область деятельности","_type":"localeString","en":"branch"},"employees-popover":{"ru":"количество сотрудников","_type":"localeString","en":"number of employees"},"partnership-programme":{"_type":"localeString","en":"Partnership program","ru":"Партнерская программа"},"partner-discounts":{"en":"Partner discounts","ru":"Партнерские скидки","_type":"localeString"},"registered-discounts":{"_type":"localeString","en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"en":"Partner level requirements","ru":"Требования к уровню партнера","_type":"localeString"},"certifications":{"_type":"localeString","en":"Certification of technical specialists","ru":"Сертификация технических специалистов"},"sales-plan":{"ru":"Годовой план продаж","_type":"localeString","en":"Annual Sales Plan"},"partners-vendors":{"_type":"localeString","en":"Partners-vendors","ru":"Партнеры-производители"},"partners-suppliers":{"_type":"localeString","en":"Partners-suppliers","ru":"Партнеры-поставщики"},"all-countries":{"en":"All countries","ru":"Все страны","_type":"localeString"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"ru":"Производимые продукты","_type":"localeString","en":"Produced products"},"vendor-implementations":{"en":"Produced deployments","ru":"Производимые внедрения","_type":"localeString"},"supplier-implementations":{"en":"Supplied deployments","ru":"Поставляемые внедрения","_type":"localeString"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"en":"Events schedule","ru":"Pасписание событий","_type":"localeString"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"register":{"en":"Register","ru":"Регистрация ","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"auth-message":{"_type":"localeString","en":"To view company events please log in or register on the sit.","ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт."},"company-presentation":{"_type":"localeString","en":"Company presentation","ru":"Презентация компании"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"ru":"Вход","_type":"localeString","en":"Log in","de":"Einloggen"},"logout":{"_type":"localeString","en":"Sign out","ru":"Выйти"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My profile","ru":"Мои данные"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"translatable_meta":[{"translations":{"ru":"Компания","_type":"localeString","en":"Company"},"name":"title"},{"name":"description","translations":{"en":"Company description","ru":"Описание компании","_type":"localeString"}},{"translations":{"en":"Company keywords","ru":"Ключевые слова для компании","_type":"localeString"},"name":"keywords"}],"title":{"ru":"ROI4CIO: Компания","_type":"localeString","en":"ROI4CIO: Company"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"seasia-infotech":{"id":5906,"title":"Seasia Infotech","logoURL":"https://old.roi4cio.com/uploads/roi/company/Seasia_Infotech_1.png","alias":"seasia-infotech","address":"5858 Horton Street, Suite 101, Emeryville, CA 94608","roles":[{"id":2,"type":"supplier"},{"id":3,"type":"vendor"}],"description":"Seasia is the first choice of many large enterprises across more than ten industries for all things technical consulting, enterprise development, and marketing. We aim to identify and solve all the challenges that might be coming your way to operate at your maximum potential by enabling digital transformation and customized workflows. In addition to optimizing your current process for the highest efficiency, we ensure your business stays abreast of the latest innovation in technology. \r\n As a future-ready offshore enterprise development company, we utilize our expertise in technologies, such as the cloud, blockchain, and artificial intelligence to enhance efficiencies in business across all corners of the world. From conceptualization to implementation, Seasia can handle everything and help take your business to the next level.","companyTypes":["supplier","vendor"],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":1,"categories":{"3":{"id":3,"title":"MDM - Mobile Device Management","description":" <span style=\"font-weight: bold; \">Mobile device management (MDM)</span> is an industry term for the administration of mobile devices, such as smartphones, tablet computers and laptops. Device management system is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.\r\nMDM is typically a deployment of a combination of on-device applications and configurations, corporate policies and certificates, and backend infrastructure, for the purpose of simplifying and enhancing the IT management of end user devices. In modern corporate IT environments, the sheer number and diversity of managed devices (and user behavior) has motivated device management tools that allow the management of devices and users in a consistent and scalable way. The overall role of MDM is to increase device supportability, security, and corporate functionality while maintaining some user flexibility.\r\nMany organizations administer devices and applications using MDM products/services. Mobile device management software primarily deals with corporate data segregation, securing emails, securing corporate documents on devices, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories. MDM implementations may be either on-premises or cloud-based.\r\nMDM functionality can include over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. Most recently laptops and desktops have been added to the list of systems supported as Mobile Device Management becomes more about basic device management and less about the mobile platform itself. \r\nSome of the <span style=\"font-weight: bold; \">core functions</span> of mobile management software include:\r\n<ul><li>Ensuring that diverse user equipment is configured to a consistent standard/supported set of applications, functions, or corporate policies</li><li>Updating equipment, applications, functions, or policies in a scalable manner</li><li>Ensuring that users use applications in a consistent and supportable manner</li><li>Ensuring that equipment performs consistently</li><li>Monitoring and tracking equipment (e.g. location, status, ownership, activity)</li><li>Being able to efficiently diagnose and troubleshoot equipment remotely</li></ul>\r\nDevice management solutions are leveraged for both company-owned and employee-owned (Bring Your Own Device) devices across the enterprise or mobile devices owned by consumers. Consumer demand for BYOD is now requiring a greater effort for MDM and increased security for both the devices and the enterprise they connect to, especially since employers and employees have different expectations concerning the types of restrictions that should be applied to mobile devices.\r\nBy controlling and protecting the data and configuration settings of all mobile devices in a network, enterprise device management software can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime.\r\nWith mobile devices becoming ubiquitous and applications flooding the market, mobile monitoring is growing in importance. The use of mobile device management across continues to grow at a steady pace, and is likely to register a compound annual growth rate (CAGR) of nearly 23% through 2028. The US will continue to be the largest market for mobile device management globally. ","materialsDescription":"<h1 class=\"align-center\">How Mobile Device Management works?</h1>\r\nMobile device management relies on endpoint software called an MDM agent and an MDM server that lives in a data center. IT administrators configure policies through the MDM server's management console, and the server then pushes those policies over the air to the MDM agent on the device. The agent applies the policies to the device by communicating with application programming interfaces (APIs) built directly into the device operating system.\r\nSimilarly, IT administrators can deploy applications to managed devices through the MDM server. Mobile software management emerged in the early 2000s as a way to control and secure the personal digital assistants and smartphones that business workers began to use. The consumer smartphone boom that started with the launch of the Apple iPhone in 2007 led to the bring your own device trend, which fueled further interest in MDM.\r\nModern MDM management software supports not only smartphones but also tablets, Windows 10 and macOS computers and even some internet of things devices. The practice of using MDM to control PCs is known as unified endpoint management.\r\n<h1 class=\"align-center\">Key Benefits of Mobile Device Management Software</h1>\r\n<span style=\"font-weight: bold;\">Reduce IT Administration.</span> Instead of manually configuring and testing each new mobile device, mobile device software takes care of the repetitive tasks for you. That gives IT staff more time to work on challenging projects that improve productivity.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Improve End-user Productivity. </span>Mobile device management helps end users become more productive because the process of requesting new mobile devices can be cut down from days to hours. Once end users have the device in their hands, mobile device management program helps them get set up on their corporate network much faster. That means less time waiting to get access to email, internal websites, and calendars.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Reduce IT Risk.</span> Mobile devices, especially if your organization allows “Bring Your Own Device” (BYOD), create increased risk exposures. Typically, IT managers respond to these risks in one of two ways, neither of which help. First, you may say “no” to mobile device requests. That’s a fast way to become unpopular. Second, you may take a manual approach to review and oversee each device.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Enable Enterprise Growth. </span>If your enterprise added a thousand employees this quarter through hiring, acquisition, or other changes, could IT handle the challenge? If you’re honest, you can probably imagine going through plenty of struggles and missing SLAs. That kind of disappointment and missed service expectations make end users respect IT less. \r\nBy using enterprise device management thoroughly, you'll enable enterprise growth. You'll have the systems and processes to manage 100 users or 10,000 users. That means IT will be perceived as enabling growth not standing in the way.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MDM_Mobile_Device_Management.png","alias":"mdm-mobile-device-management"},"24":{"id":24,"title":"DLP - Data Leak Prevention","description":"Data leak prevention (DLP) is a suite of technologies aimed at stemming the loss of sensitive information that occurs in enterprises across the globe. By focusing on the location, classification and monitoring of information at rest, in use and in motion, this solution can go far in helping an enterprise get a handle on what information it has, and in stopping the numerous leaks of information that occur each day. DLP is not a plug-and-play solution. The successful implementation of this technology requires significant preparation and diligent ongoing maintenance. Enterprises seeking to integrate and implement DLP should be prepared for a significant effort that, if done correctly, can greatly reduce risk to the organization. Those implementing the solution must take a strategic approach that addresses risks, impacts and mitigation steps, along with appropriate governance and assurance measures.","materialsDescription":" <span style=\"font-weight: bold;\">How to protect the company from internal threats associated with leakage of confidential information?</span>\r\nIn order to protect against any threat, you must first realize its presence. Unfortunately, not always the management of companies is able to do this if it comes to information security threats. The key to successfully protecting against information leaks and other threats lies in the skillful use of both organizational and technical means of monitoring personnel actions.\r\n<span style=\"font-weight: bold;\">How should the personnel management system in the company be organized to minimize the risks of leakage of confidential information?</span>\r\nA company must have a special employee responsible for information security, and a large department must have a department directly reporting to the head of the company.\r\n<span style=\"font-weight: bold;\">Which industry representatives are most likely to encounter confidential information leaks?</span>\r\nMore than others, representatives of such industries as industry, energy, and retail trade suffer from leaks. Other industries traditionally exposed to leakage risks — banking, insurance, IT — are usually better at protecting themselves from information risks, and for this reason they are less likely to fall into similar situations.\r\n<span style=\"font-weight: bold;\">What should be adequate measures to protect against leakage of information for an average company?</span>\r\nFor each organization, the question of protection measures should be worked out depending on the specifics of its work, but developing information security policies, instructing employees, delineating access to confidential data and implementing a DLP system are necessary conditions for successful leak protection for any organization. Among all the technical means to prevent information leaks, the DLP system is the most effective today, although its choice must be taken very carefully to get the desired result. So, it should control all possible channels of data leakage, support automatic detection of confidential information in outgoing traffic, maintain control of work laptops that temporarily find themselves outside the corporate network...\r\n<span style=\"font-weight: bold;\">Is it possible to give protection against information leaks to outsourcing?</span>\r\nFor a small company, this may make sense because it reduces costs. However, it is necessary to carefully select the service provider, preferably before receiving recommendations from its current customers.\r\n<span style=\"font-weight: bold;\">What data channels need to be monitored to prevent leakage of confidential information?</span>\r\nAll channels used by employees of the organization - e-mail, Skype, HTTP World Wide Web protocol ... It is also necessary to monitor the information recorded on external storage media and sent to print, plus periodically check the workstation or laptop of the user for files that are there saying should not.\r\n<span style=\"font-weight: bold;\">What to do when the leak has already happened?</span>\r\nFirst of all, you need to notify those who might suffer - silence will cost your reputation much more. Secondly, you need to find the source and prevent further leakage. Next, you need to assess where the information could go, and try to somehow agree that it does not spread further. In general, of course, it is easier to prevent the leakage of confidential information than to disentangle its consequences.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Data_Leak_Prevention.png","alias":"dlp-data-leak-prevention"},"51":{"id":51,"title":"PaaS - Platform as a service","description":"<span style=\"font-weight: bold; \">Platform as a Service (PaaS)</span> or <span style=\"font-weight: bold; \">Application Platform as a Service (aPaaS)</span> or <span style=\"font-weight: bold; \">platform-based service</span> is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.\r\n<span style=\"font-weight: bold; \">PaaS can be delivered in three ways:</span>\r\n<span style=\"font-weight: bold;\">As a public cloud service</span> from a provider, where the consumer controls software deployment with minimal configuration options, and the provider provides the networks, servers, storage, operating system (OS), middleware (e.g. Java runtime, .NET runtime, integration, etc.), database and other services to host the consumer's application.\r\n<span style=\"font-weight: bold;\">As a private service</span> (software or appliance) behind a firewall.\r\n<span style=\"font-weight: bold;\">As software</span> deployed on a public infrastructure as a service.\r\n<span style=\"color: rgb(97, 97, 97); \">The original intent of PaaS technology was to simplify the code-writing process for developers, with the infrastructure and operations handled by the PaaS provider. Originally, all PaaSes were in the public cloud. Because many companies did not want to have everything in the public cloud, private and hybrid PaaS options (managed by internal IT departments) were created.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">PaaS provides an environment for developers and companies to create, host and deploy applications, saving developers from the complexities of the infrastructure side (setting up, configuring and managing elements such as servers and databases).</span>\r\n<span style=\"color: rgb(97, 97, 97); \">PaaS products can improve the speed of developing an app, and allow the consumer to focus on the application itself. With PaaS, the consumer manages applications and data, while the provider (in public PaaS) or IT department (in private PaaS) manages runtime, middleware, operating system, virtualization, servers, storage and networking.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">PaaS offerings may also include facilities for application design, application development, testing and deployment, as well as services such as team collaboration, web service integration, and marshalling, database integration, security, scalability, storage, persistence, state management, application versioning, application instrumentation, and developer community facilitation. Besides the service engineering aspects, PaaS solutions include mechanisms for service management, such as monitoring, workflow management, discovery and reservation.</span>\r\nThere are various types of PaaS providers. All offer application hosting and a deployment environment, along with various integrated services. Services offer varying levels of scalability and maintenance. Developers can write an application and upload it to a PaaS platform that supports their software language of choice, and the application runs on that PaaS.","materialsDescription":"<h1 class=\"align-center\">How PaaS works</h1>\r\n<p class=\"align-left\">PaaS does not replace a company's entire IT infrastructure for software development. It is provided through a cloud service provider's hosted infrastructure with users most frequently accessing the offerings through a web browser. PaaS can be delivered through public, private and hybrid clouds to deliver services such as application hosting and Java development.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Other PaaS services include:</span></p>\r\n<ul><li>Development team collaboration</li><li>Application design and development</li><li>Application testing and deployment</li><li>Web service integration</li><li>Information security</li><li>Database integration</li></ul>\r\n<p class=\"align-left\">Users pay for PaaS on a per-use basis. However, different platform as a service providers charge a flat monthly fee for access to the platform and its applications.</p>\r\n<h1 class=\"align-center\">What are the types of PaaS?</h1>\r\n<ul><li><span style=\"font-weight: bold; \">Public PaaS</span></li></ul>\r\nA public PaaS allows the user to control software deployment while the cloud provider manages the delivery of all other major IT components necessary to the hosting of applications, including operating systems, databases, servers and storage system networks. \r\nPublic PaaS vendors offer middleware that enables developers to set up, configure and control servers and databases without the necessity of setting up the infrastructure side of things. As a result, public PaaS and IaaS (infrastructure as a service) run together, with PaaS operating on top of a vendor's IaaS infrastructure while leveraging the public cloud. \r\n<ul><li><span style=\"font-weight: bold; \">Private PaaS</span></li></ul>\r\nA private PaaS is usually delivered as an appliance or software within the user's firewall which is frequently maintained in the company's on-premises data center. A private PaaS software can be developed on any type of infrastructure and can work within the company's specific private cloud. Private PaaS allows an organization to better serve developers, improve the use of internal resources and reduce the costly cloud sprawl that many companies face.\r\n<ul><li><span style=\"font-weight: bold; \">Hybrid PaaS </span></li></ul>\r\nCombines public PaaS and private PaaS to provide companies with the flexibility of infinite capacity provided by a public PaaS model and the cost efficiencies of owning an internal infrastructure in private PaaS. Hybrid PaaS utilizes a hybrid cloud.\r\n<ul><li><span style=\"font-weight: bold; \">Communication PaaS </span></li></ul>\r\nCPaaS is a cloud-based platform that allows developers to add real-time communications to their apps without the need for back-end infrastructure and interfaces. Normally, real-time communications occur in apps that are built specifically for these functions. Examples include Skype, FaceTime, WhatsApp and the traditional phone. CPaaS provides a complete development framework for the creation of real-time communications features without the necessity of a developer building their own framework.\r\n<ul><li><span style=\"font-weight: bold; \">Mobile PaaS</span> </li></ul>\r\nMPaaS is the use of a paid integrated development environment for the configuration of mobile apps. In an mPaaS, coding skills are not required. MPaaS is delivered through a web browser and typically supports public cloud, private cloud and on-premises storage. The service is usually leased with pricing per month, varying according to the number of included devices and supported features.\r\n<ul><li><span style=\"font-weight: bold; \">Open PaaS</span></li></ul>\r\nIt is a free, open source, business-oriented collaboration platform that is attractive on all devices and provides useful web apps, including calendar, contacts and mail applications. OpenPaaS was designed to allow users to quickly deploy new applications with the goal of developing a PaaS technology that is committed to enterprise collaborative applications, specifically those deployed on hybrid clouds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/PaaS_-_Platform_as_a_service.png","alias":"paas-platform-as-a-service"},"54":{"id":54,"title":"MDM - master data management","description":"<span style=\"font-weight: bold; \">Master data management (MDM)</span> is the core process used to manage, centralize, organize, categorize, localize, synchronize and enrich master data according to the business rules of the sales, marketing and operational strategies of your company. \r\nIt is a technology-enabled discipline in which business and IT work together to ensure the uniformity, accuracy, stewardship, semantic consistency and accountability of the enterprise’s official shared master data assets. Master data is the consistent and uniform set of identifiers and extended attributes that describes the core entities of the enterprise including customers, prospects, citizens, suppliers, sites, hierarchies and chart of accounts.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Essential Master Data Management Capabilities</span></p>\r\n<span style=\"font-weight: bold; \">Flexible and multi-domain.</span>An extensible master data repository with flexible data modeling features provides a centralized view of all relationships between data types, clarifying complex cross-domain relationships, providing a flexible and multi-domain master data software.\r\n<span style=\"font-weight: bold; \">Multi-style MDM.</span> Master Data Management platform should support all four main styles of MDM:\r\n<span style=\"font-style: italic;\">Centrally authored:</span> In this style data is authored in the MDM, other systems subscribe to the MDM for master data (or the MDM pushes the data into downstream applications).\r\n<span style=\"font-style: italic;\">Consolidation:</span> Source systems feed data into the MDM for consolidation into golden records\r\n<span style=\"font-style: italic;\">Coexistence:</span> A mashup of centrally authored and consolidation that allows for creation of data in multiple systems.\r\n<span style=\"font-style: italic;\">Registry:</span> Rather than consolidating records, joining/aligning unique identifiers from across all the systems into join tables.\r\n<span style=\"font-weight: bold; \">Real-time, secure data.</span> The top MDM software today allow you to publish and subscribe to data on demand, providing accurate master data to systems when and how you need it without compromising security. With real-time data, users can better react to the data and make faster decisions based on the insights discovered.\r\n<span style=\"font-weight: bold; \">Data and Workflow visualization.</span> Master Data Management software provides a data visualization component that allows you to identify and easily fix quality issues. The capability can also helps users collaborate to constantly make improvements, monitor processes, and create dashboards for actionable data analysis.\r\n<span style=\"font-weight: bold; \">A customizable, business-friendly user interface.</span> A zero coding visual design time environment allows you to develop custom UIs using simple drag and drop actions. You can design cleaner, simpler, and more flexible role-based user interfaces for your Master Database Management system.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Things to Look for in MDM Management Software</h1>\r\n<p class=\"align-left\">Because MDM is such a major task, you need the right software solution to assist you. The good news is that you have plenty of selections to choose from. The hard part is deciding on one. Here are a handful of features to look for:</p>\r\n<span style=\"font-weight: bold;\">Flexibility.</span> MDM isn’t a static issue. MDM software vendors continually updating products, so solutions will change rather dramatically over the course of a few months or years. With that being said, it’s smart to look at flexibility when it comes to master data management tools list. You may have a very specific need now, but will your solution allow you to address a future need that looks considerably different? \r\n<span style=\"font-weight: bold;\">Modeling.</span> Can you leverage the data model(s) of the member applications and eliminate the need to model? It could save you time, money, and help your master data be readily consumed without requiring additional transformation from an abstract data model to the data model in the member application(s). \r\n<span style=\"font-weight: bold;\">Cost.</span> While it shouldn’t be the only factor, money is obviously something that must be considered in the context of budgeting. This may be one of the first factors you use to narrow your choices. If you know you can only spend X dollars, then there’s no point in evaluating selections that cost more.\r\n <span style=\"font-weight: bold;\">Scalability.</span> How well does the solution scale? Your business is a fluid entity that will grow, contract, stagnate, grow again, etc. There’s no point in investing in thebest master data management tools that can only be used at your current size. Find one that easily grows and contracts in a cost-effective manner.\r\n <span style=\"font-weight: bold;\">Integration.</span> The final thing to think about is integration. Since the point of MDM software is to create a centralized destination for data, you need to carefully ensure that it will work with your current setup.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/MDM_-_master_data_management1.png","alias":"mdm-master-data-management"},"66":{"id":66,"title":"BPM - Business Process Management","description":"<span style=\"font-weight: bold; \">Business process management (BPM)</span> is a discipline in operations management in which people use various methods to discover, model, analyze, measure, improve, optimize, and automate business processes. BPM focuses on improving corporate performance by managing business processes. Any combination of methods used to manage a company's business processes is BPM. Processes can be structured and repeatable or unstructured and variable.\r\nAs an approach, BPM sees processes as important assets of an organization that must be understood, managed, and developed to announce and deliver value-added products and services to clients or customers. This approach closely resembles other total quality management or continuous improvement process methodologies. ISO 9000 promotes the process approach to managing an organization.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Successfully employing BPM usually involves the following:</span>\r\nOrganizing around outcomes not tasks to ensure the proper focus is maintained\r\nCorrecting and improving processes before (potentially) automating them; otherwise all you’ve done is make the mess run faster\r\nEstablishing processes and assigning ownership lest the work and improvements simply drift away – and they will, as human nature takes over and the momentum peters out\r\nStandardizing processes across the enterprise so they can be more readily understood and managed, errors reduced, and risks mitigated\r\nEnabling continuous change so the improvements can be extended and propagated over time\r\nImproving existing processes, rather than building radically new or “perfect” ones, because that can take so long as to erode or negate any gains achieved\r\n<span style=\"font-weight: bold; \">Business Process Management Software (BPMS)</span> is a process automation tool. It helps you map out your everyday processes to identify and eliminate bottlenecks, control your company’s costs, make your day-to-day processes as efficient as possible, and ensure the effectiveness of the people involved in your processes. A business process management solution to a company’s needs begins with the alignment of business goals with an eye toward creating value through process change initiatives. This alignment leads to a thorough understanding and design of representative processes typically following an industry standard framework \r\nA BPM based foundation provides for complete lifecycle management of business processes, integration across technologies, and imbeds efficiency among people, processes, and technologies.\r\nCommercial business process management tools tend to center on the automation of business processes, essentially moving them from manual pen-and-paper endeavors to effortless automated transactions. BPM software products track how business information is used and then maps the relevant business process and ensure that transactions are done accordingly. This effectively shows where data and process bottlenecks occur and highlights various deficiencies in business processes, including areas where resources are wasted, allowing managers streamline and optimize those processes.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">There are three key types of BPMS:</span></p>\r\n<span style=\"font-weight: bold; \">Efficiency Monitors:</span>Monitors every system of the enterprise for inefficiency in the processes by following it from start to finish. BPM program accurately pinpoints weakness and bottlenecks where customers might get frustrated and discontinue transactions and processes.\r\n<span style=\"font-weight: bold; \">Workflow Software:</span> Uses detailed maps of an existing processes and tries to streamline them by optimizing certain steps. BPM workflow software cannot suggest improvements to the process, only optimize it, so this software is only as good as the process itself.\r\n<span style=\"font-weight: bold; \">Enterprise Application Integration Tools:</span> A mixture of efficiency monitors, process and workflow management, EAI software is used to integrate legacy systems into new systems. This software can be used to map points for integrating old and new systems, optimizing their information-gathering characteristics and increasing the efficiency of system communications.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\">What Are the Types of Business Process Management Software?</h1>\r\n<p class=\"align-center\">There are <span style=\"font-weight: bold; \">three basic kinds</span> of BPM frameworks:</p>\r\n<span style=\"font-weight: bold; \">Horizontal frameworks.</span>They deal with design and development of business processes. They are generally focused on technology and reuse.\r\n<span style=\"font-weight: bold; \">Vertical BPM frameworks.</span> This focuses on specific sets of coordinated tasks, using pre-built templates which can be easily deployed and configured.\r\n<span style=\"font-weight: bold; \">Full-service BPM suites.</span> They have five basic components: Process discovery and project scoping; Process modeling and design; Business rules engine; Workflow engine; Simulation and testing.\r\n<p class=\"align-center\">There are <span style=\"font-weight: bold; \">two types of BPM software</span> as it pertains to deployment:<span style=\"font-weight: bold; \"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">On-premise</span> business process management (BPM). This has been the norm for most enterprises.</p>\r\n<span style=\"font-weight: bold; \">Software as a Service (SaaS).</span> Advances in cloud computing have led to an increased interest in various “software-on-demand” offerings.\r\n<h1 class=\"align-center\">What are BPM Tools?</h1>\r\n<span style=\"font-weight: bold; \">Business Process Management (BPM) tools</span> are used for automating, measuring and optimizing business processes. BPM automation tools use workflow and collaboration to provide meaningful metrics to business leaders.\r\n<span style=\"font-weight: bold; \">Misconceptions about BPM Tools.</span> There’s a common misconception that BPM tools do not easily demonstrate their benefit to the organization. While the benefit from using BPM tools can be hard to quantify, it can be expressed more effectively in terms of business value.\r\n<span style=\"font-weight: bold; \">Process Management Tools.</span> Tools that allow process managers (those that are responsible for organizing the process or activity) to secure the resources needed to execute it, and measure the results of the activity, providing rewards or corrective feedback when necessary. Process manager tools also allows process managers to change and improve the process whenever possible.\r\n<span style=\"font-weight: bold;\">Process Modeling Tools.</span> Software tools that let managers or analysts create business process diagrams. Simple tools only support diagramming. Professional Process Modeling Tools store each model element in a database so that they can be reused on other diagrams or updated. Many business process improvement software supports simulation or code generation.<br /><br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/BPM_-_Business_Process_Management.png","alias":"bpm-business-process-management"},"70":{"id":70,"title":"OLAP - online analytical processing","description":"<span style=\"font-weight: bold; \">OLAP (online analytical processing)</span> is a computing method that enables users to easily and selectively extract and query data in order to analyze it from different points of view. OLAP business intelligence queries often aid in trends analysis, financial reporting, sales forecasting, budgeting and other planning purposes.\r\nTo facilitate this kind of analysis, data is collected from multiple data sources and stored in data warehouses then cleansed and organized into <span style=\"font-weight: bold; \">data cubes.</span> Each OLAP cube contains data categorized by dimensions (such as customers, geographic sales region and time period) derived by dimensional tables in the data warehouses. Dimensions are then populated by members (such as customer names, countries and months) that are organized hierarchically.\r\nAnalysts can then perform five types of online analytical processing system operations against these multidimensional databases: \r\n<ol><li><span style=\"font-weight: bold; \">Roll-up.</span> Also known as consolidation, or drill-up, this operation summarizes the data along the dimension.</li><li><span style=\"font-weight: bold; \">Drill-down.</span> This allows analysts to navigate deeper among the dimensions of data, for example drilling down from "time period" to "years" and "months" to chart sales growth for a product.</li><li><span style=\"font-weight: bold; \">Slice. </span>This enables an analyst to take one level of information for display</li><li><span style=\"font-weight: bold; \">Dice. </span>This allows an analyst to select data from multiple dimensions to analyze</li><li><span style=\"font-weight: bold; \">Pivot.</span> Analysts can gain a new view of data by rotating the data axes of the cube.</li></ol>\r\nOLAP software then locates the intersection of dimensions, such as all products sold in the Eastern region above a certain price during a certain time period, and displays them. The result is the "measure"; each OLAP cube has at least one to perhaps hundreds of measures, which are derived from information stored in fact tables in the data warehouse.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Types of OLAP: </span></p>\r\n<ul><li><span style=\"font-weight: bold;\">Relational online analytical processing (ROLAP):</span> ROLAP is an extended RDBMS along with multidimensional data mapping to perform the standard relational operation.</li><li><span style=\"font-weight: bold;\">Multidimensional OLAP (MOLAP):</span> MOLAP Implementes operation in multidimensional data.</li><li><span style=\"font-weight: bold;\">Hybrid OnlineAnalytical Processing (HOLAP):</span> In HOLAP approach the aggregated totals are stored in a multidimensional database while the detailed data is stored in the relational database. This offers both data efficiency of the ROLAP model and the performance of the MOLAP model.</li><li><span style=\"font-weight: bold;\">Desktop OLAP (DOLAP):</span> In Desktop OLAP system, a user downloads a part of the data from the database locally, or on their desktop and analyze it. DOLAP is relatively cheaper to deploy as it offers very few functionalities compares to other OLAP tools.</li><li><span style=\"font-weight: bold;\">Web based OLAP (WOLAP):</span> Web OLAP which is OLAP system accessible via the web browser. WOLAP is a three-tiered architecture. It consists of three components: client, middleware, and a database server.</li><li><span style=\"font-weight: bold;\">Mobile OLAP:</span> Mobile OLAP process helps users to access and analyze OLAP data using their mobile devices</li><li><span style=\"font-weight: bold;\">Spatial OLAP:</span> SOLAP is created to facilitate management of both spatial and non-spatial data in a Geographic Information system (GIS) </li></ul>","materialsDescription":"<h1 class=\"align-center\">Implementing an OLAP Solution</h1>\r\nImplementation of OLAP depends not only on the type of software, but also on underlying data sources and the intended business objective(s). Each industry or business area is specific and requires some degree of customized modeling to create multidimensional “cubes” for data loading and reporting building, at minimum. An OLAP program might be intended for dynamic reporting for finance professionals, with source data originating in an ERP system. Or a solution might address a medical institution’s activities as concerns patient analysis. All of which is to say that customers need to have clear objectives in mind for an intended solution, and start to consider product selection on that basis. Another factor to consider in an OLAP implementation is the delivery to end users: does the initial user base want to adopt a new front end, or is there a preference for utilizing a dashboard? Or perhaps users are better served by a dynamic spreadsheet “delivery” system to achieve, for example, a collaborative budgeting and forecasting solution.\r\n<h1 class=\"align-center\">Advantages and Disadvantages of OLAP</h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Advantages</span></p>\r\n<ul><li>OLAP is a platform for all type of business includes planning, budgeting, reporting, and analysis.</li><li>Information and calculations are consistent in an OLAP cube. This is a crucial benefit.</li><li>Quickly create and analyze "What if" scenarios</li><li>Easily search OLAP database for broad or specific terms.</li><li>OLAP provides the building blocks for business modeling tools, Data mining tools, performance reporting tools.</li><li>Allows users to do slice and dice cube data all by various dimensions, measures, and filters.</li><li>It is good for analyzing time series.</li><li>Finding some clusters and outliers is easy with OLAP.</li><li> It is a powerful visualization online analytical process system which provides faster response times</li></ul>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Disadvantages</span></p>\r\n<ul><li>OLAP requires organizing data into a star or snowflake schema. These schemas are complicated to implement and administer.</li><li>You cannot have large number of dimensions in a single OLAP cube.</li><li>Transactional data cannot be accessed with OLAP system.</li><li>Any modification in an OLAP cube needs a full update of the cube. This is a time-consuming process.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/OLAP_-__online_analytical_processing.png","alias":"olap-online-analytical-processing"},"74":{"id":74,"title":"BRMS - Business Rule Management System","description":"A<span style=\"font-weight: bold; \"> BRMS (Business Rule Management System)</span> is an operating principle, practice or policy of an organisation. It has to be adhered to in order to satisfy either a required common approach to a particular event or regulatory requirements for the industry that the organisation is part of. It is a statement of truth about an organisation and is an attempt to describe the operations of an organisation, not an attempt to prescribe how an organisation should operate.\r\nBusiness Rules Management Software is a software component that is used to define, register, verify consistency, deploy, execute, monitor and manage the variety and complexity of decision logic that is used by operational systems within an organisation or enterprise. This logic, also referred to as business rules, includes policies, requirements, and conditional statements that are used to determine the tactical actions that take place in applications and systems. The BRMS software also provides the ability to define the relationships between different rules, and relate some of these rules to IT applications that are affected or need to enforce one or more of the rules.\r\nA Business Rules Management System Software acts as a central repository for business rules. Decision owners and IT employees can collaborate to develop, version, and edit rules in a single-sourced environment. A BRMS helps businesses automate tasks, improve consistency, and shorten turnaround on policy changes. BRMS vendors provide tools for developing, tracking, and editing business rules. Often, these tools support both programmers and non-programmers. Vendors also provide an engine to simulate and validate business rules before they are implemented. \r\n<p class=\"align-center\">Business Rule Management System includes, at minimum:</p>\r\n<ul><li>A repository, allowing the defined rules to be managed in terms of versions and variants and be available for reuse;</li><li>A development environment, which provides tools for both technical developers and business experts to define and manage the business rules;</li><li>A runtime environment, allowing applications to invoke business rules management and execute it using a business rules engine;</li><li>A management environment that provides the ability to not only monitor the development and runtime environments, but also manage them both.</li></ul>","materialsDescription":"<h1 class=\"align-center\">What are the business rules?</h1>\r\n<div>Business rules are statements that will guide the proper functioning of your business. BRMS rules may be simple, or more complex, even involving rules of logic. But they have the function of basically defining what, where, when, why, and how something must be done within an organization.\r\nBusiness rule management system <span style=\"font-weight: bold;\">example:</span> if your company provides 10% discounts on purchases made through your website on a customer’s birthday, that’s a business rule.\r\nThis benefit (what) should be applied on the customer’s birthday (when), needs to happen in purchases through the site (where), with a value of 10% (how) to please the customer on their day – and, who knows, maybe persuade them (why).\r\nBut you must understand that the rules are as varied as possible and must always be in accordance with the policies, objectives, and specificities of each company.\r\nThey may create advantages associated with:</div>\r\n<ul><li>Reducing costs</li><li>Making company strategies stronger;</li><li>Assisting in decision-making processes;</li><li>Providing greater process control;</li><li>Providing benefits to customers in a controlled and well-planned manner;</li><li>Increasing process agility;</li><li>Reducing problems with customer defaults.</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Why use a Business Rules Management System?</span></h1>\r\nA BRMS empowers companies to define and maintain the rules guiding a system’s decision workflow to determine what actions are enabled in any given circumstance. With logic outside the programming code, these systems deliver a profound boost to business agility, productivity and logic accuracy—and in so doing, deliver reliable cost savings and faster rules changes when necessary.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/BRMS_-_Business_Rule_Management_System__1_.png","alias":"brms-business-rule-management-system"},"76":{"id":76,"title":"CPM - Corporate Performance Management","description":"<span style=\"font-weight: bold; \">Corporate performance management (CPM)</span> is an umbrella term that describes the methodologies, metrics, processes and systems used to monitor and manage the business performance of an enterprise. Applications that enable CPM translate strategically focused information to operational plans and send aggregated results. These applications are also integrated into many elements of the planning and control cycle, or they address BAM or customer relationship optimization needs.\r\nCPM must be supported by a suite of analytical applications that provide the functionality to support these processes, methodologies and metrics.\r\n A CPM system is software that monitors and manages an organization's performance, according to key performance indicators. These can be revenue, return on investment, or other corporate strategic goals, such as increasing operational efficiency or improving corporate strategy.\r\nCorporate performance management system supports financial budgeting, planning and forecasting, and help leaders manage strategy and track the company’s financial health against goals. Corporate performance management tools are commonly used by the finance department, but are increasingly designed to be used across the enterprise. All in all, financial corporate performance management helps CFOs and other leaders maintain a clear picture of organizational performance.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">CPM Software Comparison</span></p>\r\nTo compare different CPM tools, you might want to consider evaluating options based on these factors:\r\n<span style=\"font-weight: bold; \">Finance vs Strategy:</span> Do you care more about strategic planning or financials (such as consolidation and close, reporting, etc)? Financial corporate performance management products rarely do both of these well, so depending on which is your priority, compare tools based on both capabilities. Look at feature ratings for budgeting, planning and forecasting, versus consolidation and close and reporting.\r\n<span style=\"font-weight: bold; \">Deployment type:</span> Corporate performance management solutions may be cloud-based, on-premise, or offer both deployment types.\r\n<span style=\"font-weight: bold; \">Usability:</span> Ease of use is an important factor, even more so if your use of the CPM software will extend beyond the Finance team. Look for comments about usability in pros & cons sections of reviews, and compare how the products rate for usability.\r\n<span style=\"font-weight: bold; \">Reporting:</span> Corporate performance management software is very centered on reporting and the ability to build custom reports. Reviewers often comment on the quality of reporting, and are asked to rate products based on reporting features.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Why is CPM important and who is CPM important for?</h1>\r\nRecent studies have shown that strategy execution is the number one area of focus for senior executives today and CPM performance management is a way to help ensure your strategies get executed. By integrating organizational goals, metrics, and projects, your company is aligned around strategic priorities and can focus on the key drivers of the business.\r\nCPM is important for every company, but especially those looking to:\r\n<ul><li>Remodel their budget</li><li>Reduce costs</li><li>Better align KPIs</li><li>Upgrade their organizational strategy</li><li>Improve the financial planning process<span style=\"font-weight: bold; \"></span></li></ul>\r\n<h1 class=\"align-center\">Importance of Corporate Performance Management Software</h1>\r\nIn the era of business management intelligence, it’s important that corporations embrace processes automation. Here are some of the benefits of adopting an enterprise and corporate performance management solution.\r\n<span style=\"font-weight: bold;\">1. Real-time feedback.</span> Performance management software has smart dashboards which contain every measurable metric a management team may need to use in its decision-making. However, the detail is not in the variety. It’s in the ability to read and use data as changes happen in real-time across all parts of the organization. \r\n<span style=\"font-weight: bold;\">2. Data consolidation for easy management.</span> The tools have the intelligence to gather, group, and combine data from multiple sources, be it departments, spreadsheets, or even companies. \r\n<span style=\"font-weight: bold;\">3. Provide ease of risk management.</span> One significant advantage of CPM is the integration of tools like what-if models. For instance, the model empowers managers to mitigate risks and make informed decisions based on the simulation of the best-worst case scenarios. \r\n<span style=\"font-weight: bold;\">4. Provide simple data feedback and access.</span> Performance management tools enable managers to have ease of access to information while still fostering accuracy and quality. \r\n<span style=\"font-weight: bold;\">5. Ease of collaboration.</span> CPM tools are not only locally integrated but also cloud connected to allows all users to stay in sync across all departments.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CPM_-_Corporate_Performance_Management.png","alias":"cpm-corporate-performance-management"},"77":{"id":77,"title":"SOC - Situation Centre","description":"One of the most pressing tasks facing government bodies and commercial structures is to increase the efficiency of management activities. A modern tool for solving this problem is situational centers, which are complex hardware and software systems for collecting, analyzing and displaying information in a form convenient for making critical decisions.\r\nSituational centers are created for the heads of federal, regional and municipal government bodies, ministries and departments, and large companies. Their main task is to provide information and analytical support for procedures and processes that allow managers to make effective decisions on the current management of headed structures, formulating their development strategies, as well as preventing or eliminating crisis and emergency situations. The structure and composition of the situational site are determined by the specifics of the tasks being solved. As a rule, this is a complex technical complex that includes many subsystems.\r\nThere are many types of command centers. They include: data center management, business application management, civil management, emergency (crisis) management.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Security Operations Center (SOC)?</span>\r\nA SOC is an outsourced office that is completely dedicated to analyzing traffic flow and monitoring for threats and attacks. In today’s world of cyberattacks and data breaches, companies of all sizes need to place an emphasis on securing their technology assets. But due to budget constraints and competing priorities, many organizations can’t afford to employ a full-time in-house IT security team. The smart solution to this problem is to look at partnering with a SOC or security operations center.\r\n<span style=\"font-weight: bold;\">How does a security operations center work?</span>\r\nUntil the recent rise of cloud computing, standard security practice was for a company to choose a traditional software as a product (SaaP) malware scanning solution either via download or, in ancient days, a CD-Rom that arrived via mail. They’d add to that a firewall installed at the edge of the network, and trust that those measures would keep their data and systems safe. Today’s reality is a far different environment, with threats being cast all across the net as hackers invent new ways to launch profitable and sophisticated attacks like ransomware.\r\nA SOC is an example of the software as a service (SaaS) software model in that it operates in the cloud as a subscription service. In this context, it provides a layer of rented expertise to a company’s cybersecurity strategy that operates 24/7 so that networks and endpoints are constantly being monitored. If a vulnerability is found or an incident is discovered, the SOC will engage with the on-site IT team to respond to the issue and investigate the root cause.\r\nIndividual SOC cybersecurity providers offer different suites of products and services. However, there is a core set of operational functions that a SOC must perform in order to add value to an organization.\r\n<ol><li><span style=\"font-weight: bold;\">Asset Survey:</span> In order for a SOC to help a company stay secure, they must have a complete understanding of what resources they need to protect. Otherwise, they may not be able to protect the full scope of the network. An asset survey should identify every server, router, firewall under enterprise control, as well as any other cybersecurity tools actively in use.</li><li><span style=\"font-weight: bold;\">Log Collection:</span> Data is the most important thing for a SOC to function properly and logs serve as the key source of information regarding network activity. The SOC should set up direct feeds from enterprise systems so that data is collected in real-time. Obviously, humans cannot digest such large amounts of information, which is why log scanning tools powered by artificial intelligence algorithms are so valuable for SOCs, though they do pose some interesting side effects that humanity is still trying to iron out.</li><li><span style=\"font-weight: bold;\">Preventative Maintenance:</span> In the best-case scenario, the SOC is able to prevent cyberattacks from occurring by being proactive with their processes. This includes installing security patches and adjusting firewall policies on a regular basis. Since some cyberattacks actually begin as insider threats, a SOC must also look within the organization for risks also.</li><li><span style=\"font-weight: bold;\">Continuous Monitoring:</span> In order to be ready to respond to a cybersecurity incident, the SOC must be vigilant in its monitoring practices. A few minutes can be the difference between blocking an attack and letting it take down an entire system or website. SOC tools run scans across the company’s network to identify potential threats and other suspicious activity.</li><li><span style=\"font-weight: bold;\">Alert Management:</span> Automated systems are great at finding patterns and following scripts. But the human element of a SOC proves it's worth it when it comes to analyzing automated alerts and ranking them based on their severity and priority. SOC staff must know what responses to take and how to verify that an alert is legitimate.</li><li><span style=\"font-weight: bold;\">Root Cause Analysis:</span> After an incident occurs and is resolved, the job of the SOC is just beginning. Cybersecurity experts will analyze the root cause of the problem and diagnose why it occurred in the first place. This feeds into a process of continuous improvement, with security tools and rules being modified to prevent future occurrences of the same incident.</li><li><span style=\"font-weight: bold;\">Compliance Audits:</span> Companies want to know that their data and systems are safe but also that they are being managed in a lawful manner. SOC providers must perform regular audits to confirm their compliance in the regions where they operate. What is a SOC report and what is a SOC audit? Anything that pulls data or records from cybersecurity functions of an organization. What is SOC 2? It’s a special auditing procedure related to information security and privacy.</li></ol>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/SOC_-_Situation_Centre.png","alias":"soc-situation-centre"},"152":{"id":152,"title":"Contact Center","description":"A contact center is a central point from where you can contact.\r\nThe contact center typically includes one or more call centers but may include other types of customer contact, as well. A contact center is generally part of an enterprise's overall customer relationship management (CRM) strategy.<br />Contact centers and call centers are both centers for customer service, and the two terms are often used interchangeably, but a contact center supports more services than a typical call center.\r\nContact centers offer omnichannel customer support, including email, chat, voice over IP (VoIP) and website support. A call center typically uses phones as the main channel of communication and can handle a mass volume of calls.<br />Contact centers are used for inbound communication, outbound communication or a hybrid of both. Contact center agents also interact with customers via web chat, phone, email or other communication channels.\r\nThe contact center infrastructure that is necessary to support communications may be located on the same premises as the contact center, or it can be located externally.\r\nIn an on-premises scenario, the company that owns the contact center also owns and manages its own hardware and software. This requires staffing and IT investments that some companies choose to forgo by outsourcing those tasks to cloud providers or hosting companies.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Call Center?</span>\r\nTraditionally, a call center is an office where a large number of call center agents provide customer service over the telephone. Inbound call centers receive calls for customer support and often serve as a knowledge base for tech support, billing questions, and other customer service issues. These call centers focus on quick call resolution times and agent productivity. In outbound call centers, agents make calls rather than receive them. These could be sales calls, marketing offers, surveys, fundraising requests, or debt collection, for example.\r\nThe term “call center” conjures an image for many people of waiting on perpetual hold or being routed through an endless IVR that never gives them what they need. Because so many consumers have had a dreadful customer service experience along these lines, call centers have developed a bad rap. But as legacy phone systems give way to newer digital technologies, call centers are evolving.\r\n<span style=\"font-weight: bold;\">What is a Contact Center?</span>\r\nThe term "contact center" (or “contact centre”) reflects the modern reality that there are many other ways to connect with a customer these days besides by telephone. The combined trends of increased customer expectations and newer technologies that allow for many channels of communication are creating a shift in the traditional call center model which has existed for decades. Consumers want more ways to reach businesses, and businesses are looking for new ways to improve customer experience.\r\nWhile call center agents generally focus on inbound and outbound calls, either on traditional phone lines or over VoIP, contact center agents handle a wide variety of communications. In a modern multichannel contact center, technical support might be delivered over in-app chat or video, while order status updates are delivered via SMS, event promotions are sent as push notifications, surveys are deployed over Facebook Messenger, and sales inquiries received by email are sent directly to an agent to connect by phone. Call centers handle voice communications, contact centers handle all communications.\r\nA company’s contact center is usually integrated with their customer relationship management (CRM) system, where all interactions between the organization and the public are tracked, coordinated, and managed. Depending on the infrastructure and ecosystem, it could be comprised of an alphabet soup of complex components. Many companies have purchased off-the-shelf systems or a highly customized network of technologies from multiple vendors. Some companies have adopted a cloud-based solution or two, but they remain siloed from the rest of their systems and can’t talk to each other.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Contact_Center1.png","alias":"contact-center"},"168":{"id":168,"title":"EAM - Enterprise Asset Management","description":"<span style=\"font-weight: bold; \"><span style=\"font-weight: bold; \">EAM</span> (Enterprise asset management)</span> involves the management of the maintenance of physical assets of an organization throughout each asset's lifecycle. EAM management system is used to plan, optimize, execute, and track the needed maintenance activities with the associated priorities, skills, materials, tools, and information. This covers the design, construction, commissioning, operations, maintenance and decommissioning or replacement of plant, equipment and facilities.\r\n"Enterprise" refers to the scope of the assets in an Enterprise across departments, locations, facilities and, potentially, supporting business functions eg; Finance & GL, Human Resources and Payroll. \r\n<span style=\"font-weight: bold; \">Enterprise asset management software </span>is a computer software that handles every aspect of running a public works or asset-intensive organization. Maintenance management software collects and analyzes data for physical assets during all phases of the asset lifecycle, including the acquisition, maintenance, and disposal phase. EAM software is used by large organizations that have outgrown basic CMMS software. These organizations have hundreds of physical assets (machinery, equipment, etc) and employees that are responsible for managing the asset lifecycle. These employees, referred to as asset managers, are also responsible for making decisions that require them to track warranties, depreciation, and downtime.\r\nIn terms of features, the lines are becoming blurred between CMMS and EAM solutions as some CMMS products allow asset managers to track these items. But true EAM program gives asset managers the ability to track every phase of an asset’s lifecycle and provide full transparency about its historical and present state to other departments. \r\n<span style=\"font-weight: bold; \">Enterprise asset management system includes</span> elements of design perspectives centered on the idea that by creating digital models, companies can optimize how they utilize each asset that they invest money in according to its build and the greater context around its use. This helps companies better predict asset depreciation and never be surprised by unexpected asset failure.\r\nEAM asset management tools also include insurance and warranty information. They look at things like the environmental performance of an asset or piece of machinery to assist with audit trails and environmental impact reports. They also integrate with inventory and supply chain software to reduce menial data entry tasks and perform inventory management tasks. Another way to describe the key use of EAM solutions is they ensure change never affects the total cost of ownership (TCO) of an asset.","materialsDescription":"<h1 class=\"align-center\"> What is EAM?</h1>\r\n<span style=\"font-weight: bold; \">EAM (Enterprise Asset Management)</span> system is the management of the assets of an enterprise across departments, facilities, business units and geographical locations. Enterprise asset management market integrates techniques for holistic control and optimization throughout asset life cycles, including design, commissioning, operations and replacement:\r\n<span style=\"font-weight: bold; \">EAM definition allows to categorize it as follows</span>:\r\n<ul><li>Physical asset and infrastructure management</li><li>IT service management</li><li>Digital asset (electronic media and content) management</li><li>Fixed asset management and accounting</li><li>Emerging asset management</li></ul>\r\nThe EAM framework optimizes and extends asset life cycles and reduces Total Cost of Ownership (TCO) while maximizing Overall Asset Productivity (OAP) and Return on Assets (ROA), which is key for manufacturing and similar industries with high-value equipment. EAM arose as an extension of the <span style=\"font-weight: bold; \">computerized maintenance management system </span>(CMMS) which is usually defined as a system for the computerisation of the maintenance of physical assets.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Asset Management is geared toward the following results:</span> </p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Asset lifecycle management.</span> Keep all asset data and documentation at your fingertips, so it’s there when you need it — regardless of where you are in the asset’s lifecycle.</span></li><li><span style=\"font-weight: bold; \">Work order management.</span> Diagnose a problem, and quickly assign specific technicians to the job. Schedule and organize work orders for employees and contractors, and keep track of upcoming work.</li><li><span style=\"font-weight: bold; \">MRO materials management.</span> Control costs with full oversight into inventory procurement and management. Understand the demand for materials at your facility and manage parts accordingly.</li><li><span style=\"font-weight: bold; \">Labor management. </span>Manage assessment, training, and certification for employees and contractors responsible for asset management in your organization.</li><li><span style=\"font-weight: bold; \">Service contract management. </span>Control compliance and spending at every step of the contract lifecycle. Create and manage contracts and service agreements with customers, vendors, partners, and employees.</li><li><span style=\"font-weight: bold; \">Financial management.</span> Gather data on work order costs, and integrate with finance software to manage accounting and project spending.</li><li><span style=\"font-weight: bold; \">Reporting and analytics. </span>Analyze asset performance to spot issues before they become bigger problems. Collect key performance indicators for your entire facility to make better business decisions. </li></ul>\r\n<h1 class=\"align-center\">Some of popular EAM software features include:</h1>\r\n<span style=\"font-weight: bold; \">Downtime tracking and </span><span style=\"font-weight: bold; \">asset tracking system.</span> When equipment breaks down, asset managers can manually log downtime in the EAM software based on the timestamps on fault codes or work requests. Also, when equipment is marked as non-operational by technicians during repairs and PMs, downtime is automatically tracked by the software. \r\n<span style=\"font-weight: bold; \">Lockout-tagout.</span> This is a safety feature that documents and enforces the physical lockout-tagout devices that are used during maintenance on dangerous machinery. By tracking lockout-tagout and check in/out procedures in the EAM software, everyone in a facility knows when an asset is unavailable. \r\n<span style=\"font-weight: bold; \">Maintenance reports. </span>Data that’s logged in maintenance software solutions shows the performance of assets in terms of reliability rather than production output. Seeing how reliable a machine is over time informs asset managers and procurement whether that machine model should be purchased again. \r\n<span style=\"font-weight: bold; \">Financial audits.</span> Asset managers can connect their software to financial software to align their efforts with the organization’s financial department. This data-sync streamlines financial audits and helps organizations manage the complete asset lifecycle without requiring financial departments to learn how to navigate the EAM software.\r\n<h1 class=\"align-center\">What’s the difference between EAM and CMMS software? EAM vs CMMS comparison</h1>\r\n<p class=\"align-left\">At first glance, the differences between EAM and CMMS software are minimal—both help organizations move from a reactive to a preventive maintenance strategy by automating maintenance activities, inventory management, and work orders.</p>\r\n<p class=\"align-left\">But as the name indicates, a <span style=\"font-weight: bold; \">computerized maintenance management system (CMMS)</span> is used primarily to manage maintenance during the operational part of an asset’s life—the time when it’s up and running and working as a productive part of a facility.</p>\r\nEAM asset management software, on the other hand, manages the entire lifecycle of an asset, from creation or procurement through to disposal. It is often used by organizations with a larger number of users across multiple sites and includes capabilities like lifecycle planning.\r\n<p class=\"align-left\">Basically, <span style=\"font-weight: bold; \">EAM lets you see a much bigger picture.</span> It gives you an overview of priorities and lets you see what tools—including finances, skills, materials, and information—are at your disposal to meet those priorities.</p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/EAM_-_Enterprise_Asset_Management.png","alias":"eam-enterprise-asset-management"},"176":{"id":176,"title":"E-government","description":"E-government (short for electronic government) is the use of electronic communications devices, such as computers and the Internet to provide public services to citizens and other persons in a country or region. According to Jeong, 2007 the term consists of the digital interactions between a citizen and their government (C2G), between governments and other government agencies (G2G), between government and citizens (G2C), between government and employees (G2E), and between government and businesses/commerces (G2B). E-government delivery models can be broken down into the following categories: This interaction consists of citizens communicating with all levels of government (city, state/province, national, and international), facilitating citizen involvement in governance using information and communication technology (ICT) (such as computers and websites) and business process re-engineering (BPR). Brabham and Guth (2017) interviewed the third party designers of e-government tools in North America about the ideals of user interaction that they build into their technologies, which include progressive values, ubiquitous participation, geolocation, and education of the public.\r\nOther definitions are more away from technology as an object, to see them simply as facilitators or instruments and focus on specific changes in Public Administration issues, and in the internal transformation of a Government, is the case of the definition that established the specialist technologist Mauro D. Ríos in the paper "In search of a definition of Electronic Government", he says: "Digital Government is a new way of organization and management of public affairs, introducing positive transformational processes in management and the structure itself of the organization chart, adding value to the procedures and services provided, all through the introduction and continued appropriation of information and communication technologies as a facilitator of these transformations."","materialsDescription":" <span style=\"font-weight: bold;\">What is e-government?</span>\r\nE-government refers to the use of information technology by government agencies (such as global networks, the Internet, and mobile computers) to transform relationships with citizens, businesses, visitors, and the government for:\r\n<ul><li>expanding the provision of public services to citizens;</li><li>improve interaction with the business community;</li><li>empowering citizens through access to information;</li><li>more effective public administration</li></ul>\r\n<span style=\"font-weight: bold;\">What is open data?</span>\r\nOpen data - information about the activities of state bodies and local governments, placed on the Internet in the form of data files in a format that ensures their automatic processing for reuse without a prior change by a person (machine-readable format), and on the terms of its free (free) use.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/E-government.png","alias":"e-government"},"231":{"id":231,"title":"Deployment-Centric Application Platforms","description":" Deployment-centric application platforms are driving benefits for organizations embarking on their digital transformation journey.\r\nAs demand for applications increases, businesses need to make sure they have an effective application development platform in place to help them continue to capitalize on the benefits they can provide and meet customer demand. This platform has an integrated development environment that provides tools that allow the developer to program, test and implement applications.","materialsDescription":" <span style=\"font-weight: bold;\">What is software deployment?</span>\r\nSoftware deployment is all of the activities that make a software system available for use.\r\nThe general deployment process consists of several interrelated activities with possible transitions between them. These activities can occur at the producer side or on the consumer side or both. Because every software system is unique, the precise processes or procedures within each activity can hardly be defined. Therefore, "deployment" should be interpreted as a general process that has to be customized according to specific requirements or characteristics.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Deployment-Centric_Application_Platforms.png","alias":"deployment-centric-application-platforms"},"233":{"id":233,"title":"Transaction Processing Monitors","description":" <span style=\"font-weight: bold; \">A transaction processing monitor (TPM)</span> is a program that monitors transactions from one stage to the next, ensuring that each one completes successfully; if not, or if an error occurs, the TM Monitor takes the appropriate action. A transaction processing monitor’s main purpose/objective is to allow resource sharing and assure optimal use of the resources by applications. This term is sometimes shortened to TP monitor.\r\nA transaction processing monitor is critical in multi-tier architectures. With processes running on different platforms, a given transaction may be forwarded to any one of several servers. Generally, the TP monitor handles all load balancing. After completing each transaction, the TPM can process another transaction without being influenced by the prior transaction. In other words the TPM model essentially is stateless.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Transaction Processing Monitor architecture</span></p>\r\n<p class=\"align-left\">In the TP Monitor Architecture, ACID transactions are initiated by a Begin-Transaction call and terminated by either a Commit-Transaction or an Abort-Transaction call. When initiated, each transaction is assigned a unique identiier and entered into a transaction table managed by the Transaction Manager. Each entry in the transaction table contains the transaction identiier (TRID), the transaction status, and other information. When a transaction calls a transaction control operation, such as Commit-Transaction, the Transaction Manager is responsible for carrying out the execution of the command and recording information in the transaction table. </p>\r\n<ul><li><span style=\"font-weight: bold; \">Process per client model</span> - instead of individual login session per terminal, server process communicates with the terminal, handles authentication, and executes actions.</li><li><span style=\"font-weight: bold; \">Single process model</span> - all remote terminals connect to a single server process. Used in client-server environments.</li><li><span style=\"font-weight: bold; \">Many-server single-router model</span> - multiple application server processes access a common database; clients communicate with the application through a single communication process that routes requests.</li><li><span style=\"font-weight: bold; \">Many server many-router model</span> - multiple processes communicate with clients.</li></ul>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">In general, a TPM provides the following functionality:</span></p>\r\n<ul><li>Coordinating resources</li><li>Balancing loads</li><li>Creating new processes as/when needed</li><li>Providing secure access to services</li><li>Routing services</li><li>Wrapping data messages into messages</li><li>Unwrapping messages into data packets/structures</li><li>Monitoring operations/transactions</li><li>Managing queues</li><li>Handling errors through such actions as process restarting</li><li>Hiding interprocess communications details from programmers</li></ul>\r\n<br /><br /><br />\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Advantages of TP Monitors </h1>\r\nComplex applications are often built on top of several resource managers (such as DBMSs, operating systems, user interfaces, and messaging software). A TPM is a middleware component that provides access to the services of a number of resource managers and provides a uniform interface for programmers who are developing transactional software. \r\n<ul><li>Transaction routing the TP Monitor can increase scalability by directing transactions to specific DBMSs. </li><li> Managing distributed transactions the TP Monitor can manage transactions that require access to data held in multiple, possibly heterogeneous, DBMSs. For example, a transaction my require to update data items held in an Oracle DBMS at site 1, an Informix DBMS at site 2,and an IMS DBMS at site 3. TP Monitors normally control transactions using the X/Open Distributed Transactions Processing (DTP) standard. A DBMS that supports this standard can function as a resource manager under the control of a TP Monitor acting as a transaction manager.</li><li> Load balancing the TP Monitor can balance client requests across multiple DBMSs on one or more computers by directing client service calls to the least loaded server. In addition, it can dynamically bring in additional DBMSs as required to provide the necessary performance.</li><li>Funnelling in environments with a large number of users, it may sometimes be difficult for all users to be logged on simultaneously to the DBMS. In many cases, we would find that users generally do not need continuous access to the DBMS. Instead of each user connecting to the DBMS, the TP Monitor can establish connections with the DBMSs as and when required, and can funnel user requests through these connections. This allows a larger number of users to access the available DBMSs with a potentially much smaller number of connections, which in turn would mean less resource usage. </li><li> Increased reliability the TP Monitor acts as a transaction manager, performing the necessary actions to maintain the consistency of the database, with the DBMS acting as a resource manager. If the DBMS fails, the TP Monitor may be able to resubmit the transaction to another DBMS or can hold the transaction until the DBMS becomes available again.</li></ul>\r\nTP Monitors are typically used in environments with a very high volume of transactions, where the TP Monitor can be used to offload processes from the DBMS server. Prominent examples of TP Monitors include CICS and Encina from IBM (which are primarily used on IBM AIX or Windows NT and bundled now in the IBM TXSeries) and Tuxedo from BEA Systems.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Transaction_Processing_Monitors.png","alias":"transaction-processing-monitors"},"239":{"id":239,"title":"Relational Database Management Systems","description":" Relational Database Management System (RDBMS) is a DBMS designed specifically for relational databases. Therefore, RDBMSes are a subset of DBMSes.\r\nA relational database refers to a database that stores data in a structured format, using rows and columns. This makes it easy to locate and access specific values within the database. It is "relational" because the values within each table are related to each other. Tables may also be related to other tables. The relational structure makes it possible to run queries across multiple tables at once.\r\nWhile a relational database describes the type of database an RDMBS manages, the RDBMS refers to the database program itself. It is the software that executes queries on the data, including adding, updating, and searching for values.\r\nAn RDBMS may also provide a visual representation of the data. For example, it may display data in a tables like a spreadsheet, allowing you to view and even edit individual values in the table. Some relational database softwareallow you to create forms that can streamline entering, editing, and deleting data.\r\nMost well known DBMS applications fall into the RDBMS category. Examples include Oracle Database, MySQL, Microsoft SQL Server, and IBM DB2. Some of these programs support non-relational databases, but they are primarily used for relational database management.\r\nExamples of non-relational databases include Apache HBase, IBM Domino, and Oracle NoSQL Database. These type of databases are managed by other DMBS programs that support NoSQL, which do not fall into the RDBMS category.\r\nElements of the relational DBMS that overarch the basic relational database are so intrinsic to operations that it is hard to dissociate the two in practice.\r\nThe most basic features of RDBMS are related to create, read, update and delete operations, collectively known as CRUD. They form the foundation of a well-organized system that promotes consistent treatment of data.\r\nThe RDBMS typically provides data dictionaries and metadata collections useful in data handling. These programmatically support well-defined data structures and relationships. Data storage management is a common capability of the RDBMS, and this has come to be defined by data objects that range from binary large object (blob) strings to stored procedures. Data objects like this extend the scope of basic relational database operations and can be handled in a variety of ways in different RDBMSes.\r\nThe most common means of data access for the RDBMS is via SQL. Its main language components comprise data manipulation language (DML) and data definition language (DDL) statements. Extensions are available for development efforts that pair SQL use with common programming languages, such as COBOL (Common Business-Oriented Language), Java and .NET.\r\nRDBMSes use complex algorithms that support multiple concurrent user access to the database, while maintaining data integrity. Security management, which enforces policy-based access, is yet another overlay service that the RDBMS provides for the basic database as it is used in enterprise settings.\r\nRDBMSes support the work of database administrators (DBAs) who must manage and monitor database activity. Utilities help automate data loading and database backup. RDBMS systems manage log files that track system performance based on selected operational parameters. This enables measurement of database usage, capacity and performance, particularly query performance. RDBMSes provide graphical interfaces that help DBAs visualize database activity.\r\nRelational database management systems are central to key applications, such as banking ledgers, travel reservation systems and online retailing. As RDBMSes have matured, they have achieved increasingly higher levels of query optimization, and they have become key parts of reporting, analytics and data warehousing applications for businesses as well. \r\nRDBMSes are intrinsic to operations of a variety of enterprise applications and are at the center of most master data management (MDM) systems.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What are the advantages of a Relational Database Management System?</span></h1>\r\nA Relational Database Management System (RDBMS) is a software system that provides access to a relational database. The software system is a collection of software applications that can be used to create, maintain, manage and use the database. A "relational database" is a database structured on the "relational" model. Data are stored and presented in a tabular format, organized in rows and columns with one record per row.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Data Structure.</span> The table format is simple and easy for database users to understand and use. Relational database management software provide data access using a natural structure and organization of the data. Database queries can search any column for matching entries.</li></ul>\r\n<dl></dl>\r\n<ul><li><span style=\"font-weight: bold;\">Multi-User Access.</span> RDBMS database program allow multiple database users to access a database simultaneously. Built-in locking and transactions management functionality allow users to access data as it is being changed, prevents collisions between two users updating the data, and keeps users from accessing partially updated records.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Privileges. </span>Authorization and privilege control features in an RDBMS allow the database administrator to restrict access to authorized users, and grant privileges to individual users based on the types of database tasks they need to perform. Authorization can be defined based on the remote client IP address in combination with user authorization, restricting access to specific external computer systems.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Network Access.</span> RDBMSs provide access to the database through a server daemon, a specialized software program that listens for requests on a network, and allows database clients to connect to and use the database. Users do not need to be able to log in to the physical computer system to use the database, providing convenience for the users and a layer of security for the database. Network access allows developers to build desktop tools and Web applications to interact with databases.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Speed.</span> The relational database model is not the fastest data structure. RDBMS software advantages, such as simplicity, make the slower speed a fair trade-off. Optimizations built into an RDBMS, and the design of the databases, enhance performance, allowing RDBMSs to perform more than fast enough for most applications and data sets. Improvements in technology, increasing processor speeds and decreasing memory and storage costs allow systems administrators to build incredibly fast systems that can overcome any database performance shortcomings.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Maintenance. </span>RDBMSs feature maintenance utilities that provide database administrators with tools to easily maintain, test, repair and back up the databases housed in the system. Many of the functions can be automated using built-in automation in the RDBMS, or automation tools available on the operating system.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Language.</span> RDBMSs support a generic language called "Structured Query Language" (SQL). The SQL syntax is simple, and the language uses standard English language keywords and phrasing, making it fairly intuitive and easy to learn. Many RDBMSs add non-SQL, database-specific keywords, functions and features to the SQL language.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Relational_Database_Management_Systems.png","alias":"relational-database-management-systems"},"240":{"id":240,"title":"Non-relational Database Management Systems","description":" A non-relational database is a database that does not incorporate the table/key model that relational database management systems (RDBMS) promote. These kinds of databases require data manipulation techniques and processes designed to provide solutions to big data problems that big companies face. The most popular emerging non-relational database is called NoSQL (Not Only SQL).\r\nMost non-relational databases are incorporated into websites such as Google, Yahoo!, Amazon and Facebook. These websites introduce a slew of new applications every single day with millions and millions of users, so they would not be able to handle large traffic spikes with existing RDBMS solutions. Since RDBMS cannot handle the problem, they’ve switched to a new kind of DBMS that is capable of handling Web-scale data in a non-relational way.<br /><br />An interesting aspect of a non-relational database such as NoSQL is scalability. NoSQL uses the BASE system (basically available, soft-state, eventually consistent). Non-relational databases forgo the table form of rows and columns relational databases use in favor of specialized frameworks to store data, which can be accessed by special query APIs. Persistence is an important element in these databases. To enable fast throughput of vast amounts of data the best option for performance is "in memory," rather than reading and writing from disks.<br /><br />Relational databases use the ACID system, which ensures consistency of data in all situations of data management but obviously takes longer to process because of all those relations and its branching nature. However, the BASE system loosened up the requirements on consistency to achieve better availability and partitioning for better scalability.","materialsDescription":" <span style=\"font-weight: bold; \">What are NoSQL databases?</span>\r\nNoSQL databases are purpose built for specific data models and have flexible schemas for building modern applications. NoSQL databases are widely recognized for their ease of development, functionality, and performance at scale. They use a variety of data models, including document, graph, key-value, in-memory, and search. This page includes resources to help you better understand NoSQL databases and to get started.\r\n<span style=\"font-weight: bold; \">How Does a NoSQL (nonrelational) Database Work?</span>\r\nNoSQL databases use a variety of data models for accessing and managing data, such as document, graph, key-value, in-memory, and search. These types of databases are optimized specifically for applications that require large data volume, low latency, and flexible data models, which are achieved by relaxing some of the data consistency restrictions of other databases.\r\nConsider the example of modeling the schema for a simple book database:\r\n<ul><li>In a relational database, a book record is often dissembled (or “normalized”) and stored in separate tables, and relationships are defined by primary and foreign key constraints. In this example, the Books table has columns for ISBN, Book Title, and Edition Number, the Authors table has columns for AuthorID and Author Name, and finally the Author-ISBN table has columns for AuthorID and ISBN. The relational model is designed to enable the database to enforce referential integrity between tables in the database, normalized to reduce the redundancy, and generally optimized for storage.</li><li>In a NoSQL database, a book record is usually stored as a JSON document. For each book, the item, ISBN, Book Title, Edition Number, Author Name, and AuthorID are stored as attributes in a single document. In this model, data is optimized for intuitive development and horizontal scalability.</li></ul>\r\n<span style=\"font-weight: bold; \">Why should you use a NoSQL database?</span>\r\nNoSQL databases are a great fit for many modern applications such as mobile, web, and gaming that require flexible, scalable, high-performance, and highly functional databases to provide great user experiences.\r\n<ul><li><span style=\"font-weight: bold; \">Flexibility:</span> NoSQL databases generally provide flexible schemas that enable faster and more iterative development. The flexible data model makes NoSQL databases ideal for semi-structured and unstructured data.</li><li><span style=\"font-weight: bold; \">Scalability:</span> NoSQL databases are generally designed to scale out by using distributed clusters of hardware instead of scaling up by adding expensive and robust servers. Some cloud providers handle these operations behind-the-scenes as a fully managed service.</li><li><span style=\"font-weight: bold; \">High-performance:</span> NoSQL database are optimized for specific data models (such as document, key-value, and graph) and access patterns that enable higher performance than trying to accomplish similar functionality with relational databases.</li><li><span style=\"font-weight: bold; \">Highly functional:</span> NoSQL databases provide highly functional APIs and data types that are purpose built for each of their respective data models.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the types of NoSQL Databases?</span>\r\n<ul><li><span style=\"font-weight: bold;\">Key-value:</span> Key-value databases are highly partitionable and allow horizontal scaling at scales that other types of databases cannot achieve. Use cases such as gaming, ad tech, and IoT lend themselves particularly well to the key-value data model.</li><li><span style=\"font-weight: bold;\">Document:</span> In application code, data is represented often as an object or JSON-like document because it is an efficient and intuitive data model for developers. Document databases make it easier for developers to store and query data in a database by using the same document model format that they use in their application code. The flexible, semistructured, and hierarchical nature of documents and document databases allows them to evolve with applications’ needs. The document model works well with catalogs, user profiles, and content management systems where each document is unique and evolves over time.</li><li><span style=\"font-weight: bold;\">Graph:</span> A graph database’s purpose is to make it easy to build and run applications that work with highly connected datasets. Typical use cases for a graph database include social networking, recommendation engines, fraud detection, and knowledge graphs.</li><li><span style=\"font-weight: bold;\">In-memory:</span> Gaming and ad-tech applications have use cases such as leaderboards, session stores, and real-time analytics that require microsecond response times and can have large spikes in traffic coming at any time. Amazon ElastiCache offers Memcached and Redis, to serve low-latency, high-throughput workloads, such as McDonald’s, that cannot be served with disk-based data stores.</li><li><span style=\"font-weight: bold;\">Search:</span> Many applications output logs to help developers troubleshoot issues.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Nonrelational_Database_Management_Systems1.png","alias":"non-relational-database-management-systems"},"243":{"id":243,"title":"Database Development and Management Tools","description":" Many companies create various multi-functional applications to facilitate the management, development and administration of databases.\r\nMost relational databases consist of two separate components: a “back-end” where data is stored and a “front-end” —a user interface for interacting with data. This type of design is smart enough, as it parallels a two-level programming model that separates the data layer from the user interface and allows you to concentrate the software market directly on improving its products. This model opens doors for third parties who create their own applications for interacting with various databases.\r\nDatabase development tools can be used to create varieties of the following programs:\r\n<ul><li>client programs;</li><li>database servers and their individual components;</li><li>custom applications.</li></ul>\r\nThe programs of the first and second types are rather small since they are intended mainly for system programmers. The third type packages are much larger, but smaller than full-featured DBMS.\r\nThe development tools for custom applications include programming systems, various program libraries for various programming languages, and development automation packages (including client-server systems).<br />Database management system, abbr. DBMS (Eng. Database Management System, abbr. DBMS) - a set of software and linguistic tools for general or special purposes, providing management of the creation and use of databases.\r\nDBMS - a set of programs that allow you to create a database (DB) and manipulate data (insert, update, delete and select). The system ensures the safety, reliability of storage and data integrity, as well as provides the means to administer the database.","materialsDescription":" <span style=\"font-weight: bold;\">The main functions of the DBMS:</span>\r\n<ul><li>data management in external memory (on disk);</li><li>data management in RAM using disk cache;</li><li>change logging, backup and recovery of databases after failures;</li><li>support for database languages (data definition language, data manipulation language).</li></ul>\r\n<span style=\"font-weight: bold;\">The composition of the DBMS:</span>\r\nUsually, a modern DBMS contains the following components:\r\n<ul><li>the core, which is responsible for managing data in external and RAM and logging;</li><li>database language processor, which provides the optimization of requests for the extraction and modification of data and the creation, as a rule, of a machine-independent executable internal code;</li><li>a run-time support subsystem that interprets data manipulation programs that create a user interface with a DBMS;<br />service programs (external utilities) that provide a number of additional capabilities for maintaining an information system.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Database_Development_and_Management_Tools.png","alias":"database-development-and-management-tools"},"249":{"id":249,"title":"Development Languages, Environments, and Tools","description":" Free software development environments have different purposes: educational, developmental, educational, and the like. Their students can be schoolchildren, students, novice programmers.\r\nScientists propose the following classification of free software development environments:\r\n<ul><li>Environments that support one programming language;</li><li>Environments with support for multiple programming languages;</li><li>Development environments for web systems and applications;</li><li>Environments aimed at a children's audience.</li></ul>\r\nOf the free environments focused on a single programming language, the following tools should be highlighted: Lazarus, PyScripter, DrPython, Wing IDE.\r\nAmong the free software development tools designed for several programming languages, the following should be noted: CodeLite, Dev-C, Anjuta, Eric, Eclipse, HiAsm, Kylix, MonoDevelop, NetBeans, SharpDevelop, Xcode, etc.\r\nFrom the list of free environments for creating web applications, you can select the following: AJAX.OOP, MooTools Code :: Blocks, Codelobster PHP Edition, Geany, Ultimate, Symfony, Grails. With their help, experts also produce the creation of websites and Internet interfaces.\r\nAmong the development tools intended for children's audiences, the following environments can be singled out: Algo, Alice, EToys, Scratch, Squeak, etc. The main purpose of their use is to encourage children to learn to program.\r\nAn integrated development environment (IDE) is a software application that provides comprehensive facilities to computer programmers for software development. An IDE normally consists of at least a source code editor, build automation tools, and a debugger. Some IDEs, such as NetBeans and Eclipse, contain the necessary compiler, interpreter, or both; others, such as SharpDevelop and Lazarus, do not.\r\nThe boundary between an IDE and other parts of the broader software development environment is not well-defined; sometimes a version control system or various tools to simplify the construction of a graphical user interface (GUI) are integrated. Many modern IDEs also have a class browser, an object browser, and a class hierarchy diagram for use in object-oriented software development.\r\nIntegrated development environments are designed to maximize programmer productivity by providing tight-knit components with similar user interfaces. IDEs present a single program in which all development is done. This program typically provides many features for authoring, modifying, compiling, deploying and debugging software. This contrasts with software development using unrelated tools, such as vi, GCC or make.\r\nOne aim of the IDE is to reduce the configuration necessary to piece together multiple development utilities, instead it provides the same set of capabilities as one cohesive unit. Reducing setup time can increase developer productivity, especially in cases where learning to use the IDE is faster than manually integrating and learning all of the individual tools. Tighter integration of all development tasks has the potential to improve overall productivity beyond just helping with setup tasks. For example, code can be continuously parsed while it is being edited, providing instant feedback when syntax errors are introduced. Allowing developers to debug code much faster and easier with an IDE.\r\nSome IDEs are dedicated to a specific programming language, allowing a feature set that most closely matches the programming paradigms of the language. However, there are many multiple-language IDEs.\r\nWhile most modern IDEs are graphical, text-based IDEs such as Turbo Pascal were in popular use before the widespread availability of windowing systems like Microsoft Windows and the X Window System (X11). They commonly use function keys or hotkeys to execute frequently used commands or macros.","materialsDescription":" <span style=\"font-weight: bold;\">What is "software development tools"?</span>\r\nSoftware development tools - a set of techniques, methods, techniques, as well as a set of tool programs (compilers, application/system libraries, etc.) used by the developer to create program code for the program that meets the specified requirements.\r\n<span style=\"font-weight: bold;\">What does "program development" mean?</span>\r\nProgram development is a complex process, the main purpose of which is to create and maintain a program code that provides the necessary level of reliability and quality. To achieve the main goal of software development, software development tools are used.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Development_Languages_Environments_and_Tools.png","alias":"development-languages-environments-and-tools"},"251":{"id":251,"title":"Software Construction Components","description":" The software construction components market, which is ruled by client experience and representation software components, is relied upon to keep on growing. Software construction components allude to the inexactly coupled individual components which are merged into a bigger software framework. As far as engineering disciplines, software construction with the divided components is known as component-based software engineering (CBSE). These components might be as a software bundle, a web administration, asset or a module that contains related information or capacities.\r\nComponents from a pre-built software are autonomously removed and sold independently by the software designers themselves or through outsiders to help in building another software framework. The primary reason for component-based software construction is re ease of use in other software frameworks for construction and redesigning of existing software frameworks.\r\nSoftware Construction Components Market is rendered by expanding interest for new applications with enlarged highlights and customization capacities. The requirement for decreasing many-sided quality and expanding efficiency is fortifying the development of the software construction components market. The coming of the internet of things (IoT) has made software advancement a bigger and complex process.\r\nThe consequence of data analytics to the operation and functioning of a business has risen to a large extent in the last few years. With the rising spread of the internet, huge volumes of data are being generated on a regular basis, which creates the need for advanced tools for data management. With the increasing popularity of smart technology these days, global Software Construction Components Market has thus become prominent creators of digital information. These systems let users collate, collect, and analyze the generated data, which subsequently has triggered the rapid development of the global market in the last few years.","materialsDescription":" \r\n<span style=\"font-weight: bold;\">What is software construction?</span>\r\nSoftware construction is a software engineering discipline. It is the detailed creation of working meaningful software through a combination of coding, verification, unit testing, integration testing, and debugging. It is linked to all the other software engineering disciplines, most strongly to software design and software testing.\r\n<span style=\"font-weight: bold;\">Software construction fundamentals</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Minimizing complexity</span></span>\r\nThe need to reduce complexity is mainly driven by limited ability of most people to hold complex structures and information in their working memories. Reduced complexity is achieved through emphasizing the creation of code that is simple and readable rather than clever. Minimizing complexity is accomplished through making use of standards, and through numerous specific techniques in coding. It is also supported by the construction-focused quality techniques.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Anticipating change</span></span>\r\nAnticipating change helps software engineers build extensible software, which means they can enhance a software product without disrupting the underlying structure. Research over 25 years showed that the cost of rework can be 10 to 100 times (5 to 10 times for smaller projects) more expensive than getting the requirements right the first time. Given that 25% of the requirements change during development on average project, the need to reduce the cost of rework elucidates the need for anticipating change.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Constructing for verification</span></span>\r\nConstructing for verification means building software in such a way that faults can be ferreted out readily by the software engineers writing the software, as well as during independent testing and operational activities. Specific techniques that support constructing for verification include following coding standards to support code reviews, unit testing, organizing code to support automated testing, and restricted use of complex or hard-to-understand language structures, among others.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reuse</span></span>\r\nSystematic reuse can enable significant software productivity, quality, and cost improvements. Reuse has two closely related facets:\r\n<ul><li>Construction for reuse: Create reusable software assets.</li><li>Construction with reuse: Reuse software assets in the construction of a new solution.</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Standards in construction</span></span>\r\nStandards, whether external (created by international organizations) or internal (created at the corporate level), that directly affect construction issues include:\r\n<ul><li>Communication methods: Such as standards for document formats and contents.</li><li>Programming languages</li><li>Coding standards</li><li>Platforms</li><li>Tools: Such as diagrammatic standards for notations like UML.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Software_Construction_Components.png","alias":"software-construction-components"},"255":{"id":255,"title":"Modeling and Architecture Tools","description":" Enterprise Architecture (EA) is a discipline that has gained and will continue to gain huge importance to master enterprise organization and its IT support.\r\nEnterprise Architecture is a complete expression of the enterprise, a master plan which “acts as a collaboration force” between aspects of business planning (such as goals, visions, strategies and governance principles), aspects of business operations (such as business terms, organization structures, processes, and data), aspects of automation (such as information systems and databases) and the enabling technological infrastructure of the business (such as computers, operating systems, and networks).\r\nEnterprise architects use various business methods, analytical techniques and conceptual tools to understand and document the structure and dynamics of an enterprise. In doing so, they produce lists, drawings, documents, and models, together called "artifacts". These artifacts describe the logical organization of business functions, business capabilities, business processes, people, information resources, business systems, software applications, computing capabilities, information exchange and communications infrastructure within the enterprise.","materialsDescription":" <span style=\"font-weight: bold; \">What is enterprise architecture?</span>\r\nEnterprise architecture (EA) is "a well-defined practice for conducting enterprise analysis, design, planning, and implementation, using a comprehensive approach at all times, for the successful development and execution of strategy. Enterprise architecture applies architecture principles and practices to guide organizations through the business, information, process, and technology changes necessary to execute their strategies. These practices utilize the various aspects of an enterprise to identify, motivate, and achieve these changes."\r\nPractitioners of enterprise architecture, enterprise architects, are responsible for performing the analysis of business structure and processes and are often called upon to draw conclusions from the information collected to address the goals of enterprise architecture: effectiveness, efficiency, agility, and continuity of complex business operations.\r\n<span style=\"font-weight: bold; \">What are the terms "enterprise" and "architecture"?</span>\r\nThe term enterprise can be defined as describing an organizational unit, organization, or collection of organizations that share a set of common goals and collaborate to provide specific products or services to customers.\r\nIn that sense, the term enterprise covers various types of organizations, regardless of their size, ownership model, operational model, or geographical distribution. It includes those organizations' complete socio-technical systems, including people, information, processes, and technologies.\r\nThe term architecture refers to fundamental concepts or properties of a system in its environment, embodied in its elements, relationships, and in the principles of its design and evolution.\r\nUnderstood as a socio-technical system, the term enterprise defines the scope of enterprise architecture.\r\n<span style=\"font-weight: bold;\">What are the benefits?</span>\r\nThe benefits of enterprise architecture are achieved through its direct and indirect contributions to organizational goals. It has been found that the most notable benefits of enterprise architecture can be observed in the following areas:\r\n<ul><li><span style=\"font-style: italic;\">Organizational design</span> - Enterprise architecture provides support in the areas related to design and re-design of the organizational structures during mergers, acquisitions or during general organizational change.</li><li><span style=\"font-style: italic;\">Organizational processes and process standards</span> - Enterprise architecture helps enforce discipline and standardization of business processes, and enable process consolidation, reuse, and integration.</li><li><span style=\"font-style: italic;\">Project portfolio management</span> - Enterprise architecture supports investment decision-making and work prioritization.</li><li><span style=\"font-style: italic;\">Project management</span> - Enterprise architecture enhances the collaboration and communication between project stakeholders. Enterprise architecture contributes to efficient project scoping and defining more complete and consistent project deliverables.</li><li><span style=\"font-style: italic;\">Requirements Engineering</span> - Enterprise architecture increases the speed of requirement elicitation and the accuracy of requirement definitions, through the publishing of the enterprise architecture documentation.</li><li><span style=\"font-style: italic;\">System development</span> - Enterprise architecture contributes to optimal system designs and efficient resource allocation during system development and testing.</li><li><span style=\"font-style: italic;\">IT management and decision making</span> - Enterprise architecture is found to help enforce discipline and standardization of IT planning activities and to contribute to a reduction in time for technology-related decision making.</li><li><span style=\"font-style: italic;\">IT value</span> - Enterprise architecture helps reduce the system's implementation and operational costs and minimize the replication of IT infrastructure services across business units.</li><li><span style=\"font-style: italic;\">IT complexity</span> - Enterprise architecture contributes to a reduction in IT complexity, consolidation of data and applications, and to better interoperability of the systems.</li><li><span style=\"font-style: italic;\">IT openness</span> - Enterprise architecture contributes to more open and responsive IT as reflected through increased accessibility of data for regulatory compliance, and increased transparency of infrastructure changes.</li><li><span style=\"font-style: italic;\">IT risk management</span> - Enterprise architecture contributes to the reduction of business risks from system failures and security breaches. Enterprise architecture helps reduce risks of project delivery.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Modeling_and_Architecture_Tools.png","alias":"modeling-and-architecture-tools"},"257":{"id":257,"title":"Web Design and Development Tools","description":" If your business is not active on the internet, then you can miss the great opportunity to get the various benefits. A website of a business is a must for gaining popularity and profits. Through a business website, you can easily sell your products and services. In the present, every single person is active on the internet and searches the services through the internet or Google search engine. If you would like to build a website, then you have to hire the best web design and development services. Web design is collecting ideas and implementing them, guided by certain principles for specific purposes. Web design contains various parameters such as layout, color, graphics, fonts, and contents.\r\nWeb development is different than web design, but the main task of web development is maintaining and building the website. It gives actual life to design files. If you want to get the best web design and development services to create the perfect and unique website of your business, then you have to hire a professional company. If you don’t want to hire a professional, then you can get the help of tools. On the internet, several web design and development tools are available which helps to build your effective business website at a reasonable cost. With the help of the designing tool, you can easily save your money and time.\r\nWeb designers use a variety of different tools depending on what part of the production process they are involved in. These tools are updated over time by newer standards and software but the principles behind them remain the same. Web designers use both vector and raster graphics editors to create web-formatted imagery or design prototypes. Technologies used to create websites include W3C standards like HTML and CSS, which can be hand-coded or generated by WYSIWYG editing software. Other tools web designers might use include mark up validators and other testing tools for usability and accessibility to ensure their websites meet web accessibility guidelines.","materialsDescription":"<span style=\"font-weight: bold;\"> What is included in a creation of website design?</span>\r\nWeb design has very big differences from ordinary printing design. Creating a website design is usually a certain process, which takes into account various requirements of not only artistic but also technical nature. Such a process may include several stages:\r\n<ul><li>development of an attractive, easily perceived design of the start page, as well as other sections and subsequent levels (including various forms of registrations, baskets, etc.);</li><li>development and coordination of a well-designed structure of the entire site;</li><li>designing a convenient, fairly simple site navigation;</li><li>correctly positioned text on the pages;</li><li>availability of opportunities for simple support and expansion of the site.</li></ul>\r\n<span style=\"font-weight: bold;\">What design to choose when creating a site?</span>\r\nWhen creating a website design, you must take into account its theme.\r\nSo, a commercial website should attract visitors with its memorable look and corporate identity that is specific to your company. And, at the same time, be convenient and contain all the information necessary for the user about you and your goods, services. Not to mention the fact that various forms of receiving on-line consultations, placing orders, etc. are welcome on such a site. The presence of such functions and their intuitiveness and accessibility for the site user significantly increases what is commonly called the "site conversion". Those. how much your site will be "selling", and whether it can not only be an analogue of your company's business card on the Internet, but also attract new, by no means virtual clients for your business. Therefore, the creation of a website design of this kind should be carried out very carefully in order to fully reflect the individuality of the image of the company.\r\nSometimes it is recommended to adhere to a concise style, which is able to emphasize your uniqueness and stability as a company. In other cases (for example, if we are talking about the sites of wedding agencies), a certain tone is considered to be a certain romance and tenderness of the color scheme, combined with joyful, bright elements. And sites that appeal to potential customers with unusual requests are simply obliged to have a unique, sometimes very extravagant design (while maintaining, however, the basic principles of good usability - the simplicity and convenience of using your Internet resource).\r\nIf you plan, for example, to launch an information site, then its design should be designed in a strict style, without flashy colors, since in this case it is the content that is more important than the design.\r\nHowever, the last statement is true for any site. Indeed, sometimes it doesn’t matter how beautiful the wrapper is, if instead of candy inside the user finds a dummy. The content of the site, its content and how convenient it is for the user to receive the information he needs on your site is the most important thing! Alas, in the Russian Internet zone, so far, 9 out of 10 sites (even with an excellent initial design) are simply “killed” by inappropriate or uninteresting user content. And then, simply, its absence.\r\n<span style=\"font-weight: bold;\">Web design when creating sites: beauty or functionality?</span>\r\nWhen creating the design of the future site, it is important to remember, first of all, the functionality and the tasks that the future site will have to solve. And, therefore, remember about those for whom you are creating it - about future users. An overly elaborate design or an inconvenient menu, the difficulty of finding the necessary information on the site - this can lead to the fact that your visitor will go to other sites. Those. to your competitors.\r\nThe user of the Internet network often does not care about designer delights or the “coolness” of a programmer who has implemented non-standard site navigation, which you can’t even figure out without additional instructions. A site visitor came to you for information. And it is important, first of all, how quickly he found her, how much she met his needs, how much she helped in solving him, the user of the problem.\r\nThen the site will be remembered, and the visitor will not only return to you himself, but also, perhaps, will bring friends.\r\nA good web designer is not only, and not so much an artist, as a very thoughtful and experienced Internet resource designer who will attract attention, while remaining convenient and in demand within the framework of your marketing policy.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Web_Design_and_Development_Tools.png","alias":"web-design-and-development-tools"},"261":{"id":261,"title":"Automated Software Quality Tools","description":" Some software testing tasks, such as extensive low-level interface regression testing, can be laborious and time-consuming to do manually. In addition, a manual approach might not always be effective in finding certain classes of defects. Test automation offers a possibility to perform these types of testing effectively. Once automated tests have been developed, they can be run quickly and repeatedly. Many times, this can be a cost-effective method for regression testing of software products that have a long maintenance life. Even minor patches over the lifetime of the application can cause existing features to break which were working at an earlier point in time.\r\nThere are many approaches to test automation, however below are the general approaches used widely:\r\n<ul><li>Graphical user interface testing. A testing framework that generates user interface events such as keystrokes and mouse clicks, and observes the changes that result in the user interface, to validate that the observable behavior of the program is correct.</li><li>API driven testing. A testing framework that uses a programming interface to the application to validate the behaviour under test. Typically API driven testing bypasses application user interface altogether. It can also be testing public (usually) interfaces to classes, modules or libraries are tested with a variety of input arguments to validate that the results that are returned are correct.</li></ul>\r\nTest automation tools can be expensive, and are usually employed in combination with manual testing. Test automation can be made cost-effective in the long term, especially when used repeatedly in regression testing. A good candidate for test automation is a test case for common flow of an application, as it is required to be executed (regression testing) every time an enhancement is made in the application. Test automation reduces the effort associated with manual testing. Manual effort is needed to develop and maintain automated checks, as well as reviewing test results.\r\nIn automated testing the test engineer or software quality assurance person must have software coding ability, since the test cases are written in the form of source code which, when run, produce output according to the assertions that are a part of it. Some test automation tools allow for test authoring to be done by keywords instead of coding, which do not require programming.\r\nOne way to generate test cases automatically is model-based testing through use of a model of the system for test case generation, but research continues into a variety of alternative methodologies for doing so. In some cases, the model-based approach enables non-technical users to create automated business test cases in plain English so that no programming of any kind is needed in order to configure them for multiple operating systems, browsers, and smart devices.\r\nWhat to automate, when to automate, or even whether one really needs automation are crucial decisions which the testing (or development) team must make. A multi-vocal literature review of 52 practitioner and 26 academic sources found that five main factors to consider in test automation decision are: 1) System Under Test (SUT), 2) the types and numbers of tests, 3) test-tool, 4) human and organizational topics, and 5) cross-cutting factors. The most frequent individual factors identified in the study were: need for regression testing, economic factors, and maturity of SUT.","materialsDescription":" <span style=\"font-weight: bold;\">Unit testing</span>\r\nA growing trend in software development is the use of unit testing frameworks such as the xUnit frameworks (for example, JUnit and NUnit) that allow the execution of unit tests to determine whether various sections of the code are acting as expected under various circumstances. Test cases describe tests that need to be run on the program to verify that the program runs as expected.\r\nTest automation mostly using unit testing is a key feature of extreme programming and agile software development, where it is known as test-driven development (TDD) or test-first development. Unit tests can be written to define the functionality before the code is written. However, these unit tests evolve and are extended as coding progresses, issues are discovered and the code is subjected to refactoring. Only when all the tests for all the demanded features pass is the code considered complete. Proponents argue that it produces software that is both more reliable and less costly than code that is tested by manual exploration. It is considered more reliable because the code coverage is better, and because it is run constantly during development rather than once at the end of a waterfall development cycle. The developer discovers defects immediately upon making a change, when it is least expensive to fix. Finally, code refactoring is safer when unit testing is used; transforming the code into a simpler form with less code duplication, but equivalent behavior, is much less likely to introduce new defects when the refactored code is covered by unit tests.\r\n<span style=\"font-weight: bold;\">Graphical User Interface (GUI) testing</span>\r\nMany test automation tools provide record and playback features that allow users to interactively record user actions and replay them back any number of times, comparing actual results to those expected. The advantage of this approach is that it requires little or no software development. This approach can be applied to any application that has a graphical user interface. However, reliance on these features poses major reliability and maintainability problems. Relabelling a button or moving it to another part of the window may require the test to be re-recorded. Record and playback also often adds irrelevant activities or incorrectly records some activities.\r\nA variation on this type of tool is for testing of web sites. Here, the "interface" is the web page. However, such a framework utilizes entirely different techniques because it is rendering HTML and listening to DOM Events instead of operating system events. Headless browsers or solutions based on Selenium Web Driver are normally used for this purpose.\r\nAnother variation of this type of test automation tool is for testing mobile applications. This is very useful given the number of different sizes, resolutions, and operating systems used on mobile phones. For this variation, a framework is used in order to instantiate actions on the mobile device and to gather results of the actions.\r\nAnother variation is script-less test automation that does not use record and playback, but instead builds a model of the application and then enables the tester to create test cases by simply inserting test parameters and conditions, which requires no scripting skills.\r\n<span style=\"font-weight: bold; \">API driven testing</span>\r\nAPI testing is also being widely used by software testers due to the difficulty of creating and maintaining GUI-based automation testing. It involves directly testing APIs as part of integration testing, to determine if they meet expectations for functionality, reliability, performance, and security. Since APIs lack a GUI, API testing is performed at the message layer. API testing is considered critical when an API serves as the primary interface to application logic since GUI tests can be difficult to maintain with the short release cycles and frequent changes commonly used with agile software development and DevOps.\r\n<span style=\"font-weight: bold;\">Continuous testing</span>\r\nContinuous testing is the process of executing automated tests as part of the software delivery pipeline to obtain immediate feedback on the business risks associated with a software release candidate. For Continuous Testing, the scope of testing extends from validating bottom-up requirements or user stories to assessing the system requirements associated with overarching business goals.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Automated_Software_Quality_Tools1.png","alias":"automated-software-quality-tools"},"263":{"id":263,"title":"Software Configuration Management Tools","description":"<span style=\"font-weight: bold; \">Software configuration management</span> (SCM) is a set of processes, policies, and tools that organizes the development process. It simultaneously maintains the current state of the software (called the “baseline”), while enabling developers to work on new versions for features or fixes.\r\nIn software engineering, <span style=\"font-weight: bold; \">software configuration management process</span> is the task of tracking and controlling changes in the software, part of the larger cross-disciplinary field of configuration management. SCM practices include revision control and the establishment of baselines. If something goes wrong, SCM can determine what was changed and who changed it. If a configuration is working well, SCM can determine how to replicate it across many hosts. \r\nThe acronym "SCM" is also expanded as <span style=\"font-weight: bold; \">source configuration management process</span> and <span style=\"font-weight: bold; \">software change and configuration management.</span> However, "configuration" is generally understood to cover changes typically made by a system administrator. \r\nSoftware configuration control usually includes the updates and the versions that have been applied to software packages, as well as locations and network addresses of hardware devices. When a system needs a software or hardware upgrade, the user can access the configuration management program and database to see what is currently installed and then make a more informed decision about the upgradation needed. Configuration management tools list have been divided into three categories: <span style=\"font-weight: bold;\">tracking</span>, <span style=\"font-weight: bold;\">version management</span>, and r<span style=\"font-weight: bold;\">elease tools.</span>\r\nThe SCM configuration management traces changes and verifies that the software has all of the planned changes that are supposed to be included in a new release. It includes four procedures that should be defined for each software project to ensure that a reliable software configuration management process is utilized. The four procedures typically found in a reliable system configuration management tools are:\r\n<span style=\"font-weight: bold; \">Configuration identification. </span>It is the procedure by which attributes are identified that defines all the properties of a configuration item. A configuration item referred to as an object is a product (hardware and/or software) that supports use by an end user. These attributes are recorded in configuration documents or database tables and baselined. A baseline is an approved configuration object, such as a project plan, that has been authorized for implementation.\r\n<span style=\"font-weight: bold; \">Configuration control.</span> It is a set of processes and approval stages required to change a configuration object’s attributes and to rebaseline them.<span style=\"font-weight: bold; \"><br /></span>\r\n<span style=\"font-weight: bold; \">Configuration status documentation. </span>Configuration status accounting is the ability to record and report on the configuration baselines associated with each configuration object at any point in time.\r\n<span style=\"font-weight: bold; \">Configuration audits. </span>Configuration audits are divided into functional and physical configuration audits. An audit occurs at the time of delivery of a project or at the time a change is made. A functional configuration audit is intended to make sure that functional and performance attributes of a configuration object are achieved. A physical configuration audit attempts to ensure that a configuration object is installed based on the requirements of its design specifications.\r\n<span style=\"font-weight: bold; \">The advantages of software configuration management system are:</span>\r\n<ul><li>It reduces redundant work</li><li>It effectively manages simultaneous updates</li><li>It avoids configuration related problems</li><li>It simplifies coordination between team members</li><li>It is helpful in tracking defects</li></ul>\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the outcomes of well-implemented configuration management?</h1>\r\n<ul><li><span style=\"font-weight: bold; \">Disaster Recovery<br /></span></li></ul>\r\nIf the worst does happen, automated configuration management tools ensures that our assets are easily recoverable. The same applies to rollbacks. Configuration management makes it so that when we’ve put out bad code, we can go back to the state of our software before the change.\r\n<ul><li><span style=\"font-weight: bold; \">Uptime and Site Reliability</span></li></ul>\r\nThe term “site reliability” refers to how often your service is up. A frequent cause of downtime is bad deployments, which can be caused by differences in running production servers to test servers. With our configuration managed properly, our test environments can mimic production, so there’s less chance of a nasty surprise.\r\n<ul><li><span style=\"font-weight: bold; \">Easier Scaling</span></li></ul>\r\nProvisioning is the act of adding more resources (usually servers) to our running application. Сonfiguration automation tools ensure that we know what a good state of our service is. That way, when we want to increase the number of servers that we run, it’s simply a case of clicking a button or running a script. The goal is really to make provisioning a non-event.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Software_Configuration_Management_Tools.png","alias":"software-configuration-management-tools"},"339":{"id":339,"title":"Marketing","description":" Marketing is the study and management of exchange relationships. It is the business process of creating relationships with and satisfying customers. Because marketing is used to attract customers, it is one of the primary components of business management and commerce. Marketers can direct product to other businesses (B2B marketing) or directly to consumers (B2C marketing).\r\nRegardless of who is being marketed to, several factors, including the perspective the marketers will use. These market orientations determine how marketers will approach the planning stage of marketing. This leads into the marketing mix, which outlines the specifics of the product and how it will be sold. This can in turn, be affected by the environment surrounding the product, the results of marketing research and market research, and the characteristics of the product's target market.\r\nOnce these factors are determined, marketers must then decide what methods will be used to market the product. This decision is based on the factors analyzed in the planning stage as well as where the product is in the product life cycle.\r\nMarketing is defined by the American Marketing Association as "the activity, set of institutions, and processes for creating, communicating, delivering, and exchanging offerings that have value for customers, clients, partners, and society at large". The term developed from the original meaning which referred literally to going to market with goods for sale. From a sales process engineering perspective, marketing is "a set of processes that are interconnected and interdependent with other functions of a business aimed at achieving customer interest and satisfaction".\r\nPhilip Kotler defined marketing as "Satisfying needs and wants through an exchange process", and a decade later defines it as “a social and managerial process by which individuals and groups obtain what they want and need through creating, offering and exchanging products of value with others.”\r\nThe Chartered Institute of Marketing defines marketing as "the management process responsible for identifying, anticipating and satisfying customer requirements profitably". A similar concept is the value-based marketing which states the role of marketing to contribute to increasing shareholder value. In this context, marketing can be defined as "the management process that seeks to maximise returns to shareholders by developing relationships with valued customers and creating a competitive advantage".\r\nIn the past, marketing practice tended to be seen as a creative industry, which included advertising, distribution and selling. However, because the academic study of marketing makes extensive use of social sciences, psychology, sociology, mathematics, economics, anthropology and neuroscience, the profession is now widely recognized as a science, allowing numerous universities to offer Master-of-Science (MSc) programs.\r\nThe process of marketing is that of bringing a product to market, which includes these steps: broad market research; market targeting and market segmentation; determining distribution, pricing and promotion strategies; developing a communications strategy; budgeting; and visioning long-term market development goals. Many parts of the marketing process (e.g. product design, art director, brand management, advertising, inbound marketing, copywriting etc.) involve use of the creative arts.","materialsDescription":"<span style=\"font-weight: bold; \">What the differences between B2B and B2C Marketing?</span>\r\nThe different goals of B2B and B2C marketing lead to differences in the B2B and B2C markets. The main differences in these markets are demand, purchasing volume, amount of customers, customer concentration, distribution, buying nature, buying influences, negotiations, reciprocity, leasing and promotional methods.\r\n<span style=\"font-style: italic; \">Demand:</span> B2B demand is derived because businesses buy products based on how much demand there is for the final consumer product. Businesses buy products based on customer's wants and needs. B2C demand is primarily because customers buy products based on their own wants and needs.\r\n<span style=\"font-style: italic; \">Purchasing Volume:</span> Businesses buy products in large volumes to distribute to consumers. Consumers buy products in smaller volumes suitable for personal use.\r\n<span style=\"font-style: italic; \">Amount of Customers:</span> There are relatively fewer businesses to market to than direct consumers.\r\n<span style=\"font-style: italic; \">Customer Concentration:</span> Businesses that specialize in a particular market tend to be geographically concentrated while customers that buy products from these businesses are not concentrated.\r\n<span style=\"font-style: italic; \">Distribution:</span> B2B products pass directly from the producer of the product to the business while B2C products must additionally go through a wholesaler or retailer.\r\n<span style=\"font-style: italic; \">Buying Nature:</span> B2B purchasing is a formal process done by professional buyers and sellers while B2C purchasing is informal.\r\n<span style=\"font-style: italic; \">Buying Influences:</span> B2B purchasing is influenced by multiple people in various departments such as quality control, accounting, and logistics while B2C marketing is only influenced by the person making the purchase and possibly a few others.\r\n<span style=\"font-style: italic; \">Negotiations:</span> In B2B marketing, negotiating for lower prices or added benefits is commonly accepted while in B2C marketing (particularly in Western cultures) prices are fixed.\r\n<span style=\"font-style: italic; \">Reciprocity:</span> Businesses tend to buy from businesses they sell to. For example, a business that sells printer ink is more likely to buy office chairs from a supplier that buys the business's printer ink. In B2C marketing, this does not occur because consumers are not also selling products.\r\n<span style=\"font-style: italic; \">Leasing:</span> Businesses tend to lease expensive items while consumers tend to save up to buy expensive items.\r\n<span style=\"font-style: italic; \">Promotional Methods:</span> In B2B marketing, the most common promotional method is personal selling. B2C marketing mostly uses sales promotion, public relations, advertising, and social media.\r\n<span style=\"font-weight: bold; \">What are marketing orientations?</span>\r\nA marketing orientation has been defined as a "philosophy of business management." or "a corporate state of mind" or as an "organization[al] culture". Although scholars continue to debate the precise nature of specific orientations that inform marketing practice, the most commonly cited orientations are as follows:\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Product</span></span>\r\nA firm employing a product orientation is mainly concerned with the quality of its product. A product orientation is based on the assumption that all things being equal, consumers will purchase products of superior quality. The approach is most effective when the firm has deep insights into customer needs and desires as derived from research and/or intuition and understands consumer's quality expectations and price consumers are willing to pay. Although the product orientation has largely been supplanted by the marketing orientation, firms practicing a product orientation can still be found in haute couture and arts marketing.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Sales</span></span>\r\nA sales orientation focuses on the selling/promotion of the firm's existing products, rather than developing new products to satisfy unmet needs or wants. This orientation seeks to attain the highest possible sales through promotion and direct sales techniques. The sales orientation "is typically practiced with unsought goods." One study found that industrial companies are more likely to hold a sales orientation than consumer goods companies. The approach may also suit scenarios in which a firm holds dead stock, or otherwise sells a product that is in high demand, with little likelihood of changes in consumer tastes diminishing demand.\r\nA 2011 meta-analyses found that the factors with the greatest impact on sales performance are a salesperson's sales-related knowledge (knowledge of market segments, sales presentation skills, conflict resolution, and products), degree of adaptiveness (changing behavior based on the aforementioned knowledge), role clarity (salesperson's role is to expressly to sell), cognitive aptitude (intelligence) and work engagement (motivation and interest in a sales role).\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Production</span></span>\r\nA firm focusing on a production orientation specializes in producing as much as possible of a given product or service in order to achieve economies of scale or economies of scope. A production orientation may be deployed when a high demand for a product or service exists, coupled with certainty that consumer tastes and preferences remain relatively constant (similar to the sales orientation). The so-called production era is thought to have dominated marketing practice from the 1860s to the 1930s, but other theorists argue that evidence of the production orientation can still be found in some companies or industries. Specifically, Kotler and Armstrong note that the production philosophy is "one of the oldest philosophies that guides sellers... [and] is still useful in some situations."\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Marketing</span></span>\r\nThe marketing orientation is the most common orientation used in contemporary marketing. It is a customer-centric approach that involves a firm basing its marketing program around products that suit new consumer tastes. Firms adopting a marketing orientation typically engage in extensive market research to gauge consumer desires, use R&D (Research & Development) to develop a product attuned to the revealed information, and then utilize promotion techniques to ensure consumers are aware of the product's existence and the benefits it can deliver. Scales designed to measure a firm's overall market orientation have been developed and found to be robust in a variety of contexts.\r\nThe marketing orientation has three prime facets, which are:\r\n<span style=\"font-style: italic; \">Customer orientation:</span> A firm in the market economy can survive by producing goods that people are willing and able to buy. Consequently, ascertaining consumer demand is vital for a firm's future viability and even existence as a going concern.\r\n<span style=\"font-style: italic; \">Organizational orientation:</span> The marketing department is of prime importance within the functional level of an organization. Information from the marketing department is used to guide the actions of a company's other departments.\r\nAs an example, a marketing department could ascertain (via marketing research) that consumers desired a new type of product or a new usage for an existing product. With this in mind, the marketing department would inform the R&D department to create a prototype of a product/service based on consumers' new desires.\r\nThe production department would then start to manufacture the product, while the marketing department would focus on the promotion, distribution, pricing, etc. of the product. Additionally, a firm's finance department would be consulted, with respect to securing appropriate funding for the development, production, and promotion of the product. Finance may oppose the required capital expenditure since it could undermine a healthy cash flow for the organization.\r\n<span style=\"font-style: italic;\">Mutually beneficial exchange:</span> In a transaction in the market economy, a firm gains revenue, which thus leads to more profits, market shares, and/or sales. A consumer, on the other hand, gains the satisfaction of a need/want, utility, reliability and value for money from the purchase of a product or service.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Societal marketing</span></span>\r\nA number of scholars and practitioners have argued that marketers have a greater social responsibility than simply satisfying customers and providing them with superior value. Marketing organizations that have embraced the societal marketing concept typically identify key stakeholder groups such as employees, customers, and local communities. Companies that adopt a societal marketing perspective typically practice triple bottom line reporting whereby they publish social impact and environmental impact reports alongside financial performance reports. Sustainable marketing or green marketing is an extension of societal marketing.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Marketing.png","alias":"marketing"},"341":{"id":341,"title":"Customer Service","description":" Customer service is the process of ensuring customer satisfaction with a product or service. Often, customer service takes place while performing a transaction for the customer, such as making a sale or returning an item. Customer service can take the form of in-person interaction, a phone call, self-service systems, or by other means.\r\nCustomer service is an important part of maintaining ongoing client relationships, which is key to continuing revenue. For this reason, many companies have worked hard to increase their customer satisfaction levels.\r\nMost successful businesses recognize the importance of providing outstanding customer service. Courteous and empathetic interaction with a trained customer service representative can mean the difference between losing or retaining a customer.\r\nWhen problems arise, customers should receive timely attention to the issue. Prompt attention to emails and phone calls is critical to maintaining good relations. Requiring customers to stand in long lines or sit on hold can sour an interaction before it begins.\r\nIdeally, customer service should be a one-stop endeavor for the consumer. For example, if a customer calls a helpline regarding a problem with a product, the customer service representative should follow through with the customer until the issue is fully resolved.\r\nThis may entail scheduling appointments with in-person repair personnel if the problem cannot be resolved on the phone, or transferring a call to skilled technicians in another department. Proactively following up with the customer to ensure that he or she is fully satisfied is another smart move.","materialsDescription":" What are customer service standards?\r\nCustomer service standards are an internal corporate set of rules governing the company's customer service activities, an algorithm for communicating with customers, and general standards for responding to unusual situations. The standard of customer service is an integral part of the corporate standard of the company.\r\nFunctions of customer service standards:\r\n<ol><li>To order. The client does not encounter problems, does not see them, which means that he is confident that all the staff without exception are professionals who know their business.</li><li>To control. It is difficult to assess and monitor the work of each manager if there are no clear criteria for evaluation. At the same time, the implementation of the sales plan cannot be the only parameter of the assessment; you need to know whether the manager of customer service standards adopted in this company adheres.</li><li>To adapt. Among other things, the availability of customer service standards simplifies the procedure.</li></ol>\r\nCustomer service standards are effective if the customer does not see the difference between the work of two (or more) managers, and sees only “proprietary” service, always the same, regardless of any external factors or circumstances. The customer service standard, which has been tested in practice, backed up by experience (perhaps even someone else's), created on the basis of analytical studies and recognized methods, can be called "gold". It allows you to increase profits, improve the image of the company, attract new customers.\r\nCustomer service standards are an important part of the company's brand. But, in addition, the standards are necessary and other units, in particular, the department to work with staff. Therefore, their development must take into account the needs of all interested services of the company.\r\n<span style=\"font-weight: bold; \">What is the purpose of introducing customer service standards in the company?</span>\r\nThe objectives of implementing the standards are as follows:\r\n<ul><li>For employees with experience: minimize the number of erroneous and unnecessary actions. The result of this will be saving time of each employee (no errors - no need to spend time correcting them). And, as a result, increased productivity.</li><li>For novice employees: customer service standards allow you to transfer the necessary knowledge in the most concise manner and in a short time.</li><li>For the company: the abolition of dependence on the old-timers. Not all employees who have worked in the company for many years (or even since the day of foundation) are able to resist the so-called star disease. Having knowledge and experience, a person loses the ability to objectively evaluate his work, he begins to think that he is the best manager in the company. It can end very badly - in the event of dismissal, such an employee will take the base, and turn clients against the company. Standards for customer service are needed to ensure that all employees can be assessed on a single scale, based on the actual benefits they bring to the company, as well as the attitude of the employee to the company.</li><li>For the company: the uniformity of control activities of managers. Standards are unequivocal, exclude double interpretations, and therefore cannot cause controversy about the rightness of an employee or employer.</li><li>For managers: the standards of uniform customer service are the same for all managers, and this makes it possible to make the pay of each manager absolutely transparent and intelligible. Realizing that there will be no double interpretations, the manager may not be afraid that he will be paid less than expected - all his mistakes and achievements are immediately visible and understandable.</li></ul>\r\n<span style=\"font-weight: bold; \">The application of service standards allows you:</span>\r\n<ul><li>to develop a company style in dealing with clients;</li><li>to increase the effectiveness of the work of managers with new customers;</li><li>to bring the quality of communication with customers to a higher level;</li><li>to create a positive opinion of the company about the company, so that it can be recommended to its acquaintances, thus increasing the number of potential and then real customers;</li><li>to minimize conflicts between the manager and the customer;</li><li>to develop a technology for training newcomers;</li><li>to transfer the assessment of the work of the manager from the subjective to the objective, transparent and understandable to everyone;</li><li>to establish a procedure for controlling the work of personnel;</li><li>to increase the motivation of managers to work.</li></ul>\r\n<span style=\"font-weight: bold;\">Benefits of applying service standards</span>\r\n<ul><li>The accumulation of experience: the entire base focuses on the company, and not on the hands of managers, "old-timers." Thus, the departure of one or several “old” employees does not become a “natural disaster” for the company.</li><li>Motivation, analysis and control: customer service standards make it possible to develop a transparent scheme of managers' motivation based on a clear, almost mathematical analysis of their work. The sales process is optimized.</li><li>Setting goals. With the help of standards, the company has the ability to set clear, reasonable plans. This allows you to keep the atmosphere in the team friendly and stable, and the lack of "muffled" tasks - to increase the loyalty of managers to the company.</li><li>Standards of customer service is a fairly mobile system that allows you to immediately detect errors in working with clients and quickly eliminate them. In addition, at any stage of working with a client, the head of the sales department can intervene in the process, noticing an error in the work of the manager, and even be proactive in order to prevent an error to which the manager is heading.</li><li>Quick and easy start for beginners. Customer service standards are actually a knowledge base, collected, analyzed, and streamlined. Such information is easily transmitted and assimilated by beginners, which means that the beginner quickly gets to work and starts to make a profit. In addition, a newbie will not spoil relations with a client by awkward actions, since he already knows what to do in any conflict and problem situations.</li><li>Customer confidence. Customer service standards allow the latter to feel confident in the company - no matter where the customer is, he will always easily recognize “his” company by brand features and can be absolutely sure that in a small town they will be served as qualitatively as in a million-plus city, because that the company is well aware of their work. So, such a company can be trusted.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Customer_Service.png","alias":"customer-service"},"391":{"id":391,"title":"Cloud Testing/ASQ PaaS","description":" With the growing technological advancements, there is a requirement of continuous testing of an application. The conventional mode of application testing is very time consuming, and cost associated with such kind of testing solution is also high. That is why demand for a solution to test application on the cloud and for the cloud is rising significantly as high quality, well-performing software across platforms drive business innovation and competitive positioning. Software vendors across the globe are investing a huge amount of money in research and development of software that can provide more software-centric IT infrastructure to their customer. These software vendors are looking for automated software testing (ASQ), software as a Service (SaaS) and adaptive infrastructure support in the cloud.\r\nCloud testing and ASQ software facilitates quick access to both superiority solution and support infrastructure to sustain complex software sourcing and dynamic development. Cloud testing solutions require fewer resources and less infrastructure investment than on-premise ASQ solutions.\r\nThe continuous development in cloud computing space is driving the growth of the global cloud testing and ASQ software market. Cloud computing is creating a new shift in IT model. Cloud computing facilitates organizations to adopt software as a Service at a very low cost. Software as a Service providers business organization a more agile framework and increase their efficiency, at the same time, software as a service is a complex phenomenon and requires continuous monitoring. As an organization is deploying more enterprise mobility solution and mobile application, cloud testing and ASQ software vendors are seeing a huge opportunity in the market.\r\nHowever, business organizations’ software needs are changing very frequently, and to cope with these rapidly changing software advancements is very difficult for cloud testing ASQ software vendors, and this is the biggest challenge cloud testing and ASQ software market is facing.","materialsDescription":" <span style=\"font-weight: bold; \">What is Cloud testing?</span>\r\nCloud testing is a form of software testing in which web applications use cloud computing environments (a "cloud") to simulate real-world user traffic.\r\nCloud testing uses cloud infrastructure for software testing. Organizations pursuing testing in general and load, performance testing and production service monitoring, in particular, are challenged by several problems like limited test budget, meeting deadlines, high costs per test, a large number of test cases, and little or no reuse of tests and geographical distribution of users add to the challenges. Moreover, ensuring high-quality service delivery and avoiding outages requires testing in one's datacenter, outside the data-center, or both. Cloud Testing is the solution to all these problems. Effective unlimited storage, quick availability of the infrastructure with scalability, flexibility and availability of a distributed testing environment reduce the execution time of testing of large applications and lead to cost-effective solutions.\r\nTraditional approaches to test a software incurs a high cost to simulate user activity from different geographic locations. Testing firewalls and load balancers involve expenditure on hardware, software and its maintenance. In the case of applications where the rate of increase in a number of users is unpredictable or there is variation in deployment environment depending on client requirements, cloud testing is more effective.\r\n<span style=\"font-weight: bold; \">What are the types of testing?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Stress</span></span>\r\nStress Test is used to determine the ability of the application to maintain a certain level of effectiveness beyond the breaking point. It is essential for any application to work even under excessive stress and maintain stability. Stress testing assures this by creating peak loads using simulators. But the cost of creating such scenarios is enormous. Instead of investing capital in building on-premises testing environments, cloud testing offers an affordable and scalable alternative.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Load</span></span>\r\nLoad testing of an application involves the creation of heavy user traffic and measuring its response. There is also a need to tune the performance of any application to meet certain standards. However, a number of tools are available for that purpose.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Performance</span></span>\r\nFinding out thresholds, bottlenecks & limitations is a part of performance testing. For this, testing performance under a particular workload is necessary. By using cloud testing, it is easy to create such an environment and vary the nature of traffic on-demand. This effectively reduces cost and time by simulating thousands of geographically targeted users.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Functional</span></span>\r\nFunctional testing of both internet and non-internet applications can be performed using cloud testing. The process of verification against specifications or system requirements is carried out in the cloud instead of on-site software testing.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Compatibility</span></span>\r\nUsing a cloud environment, instances of different Operating Systems can be created on demand, making compatibility testing effortless.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Browser performance</span></span>\r\nTo verify the application's support for various browser types and performance in each type can be accomplished with ease. Various tools enable automated website testing from the cloud.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Latency</span></span>\r\nCloud testing is utilized to measure the latency between the action and the corresponding response for any application after deploying it on the cloud.\r\n<span style=\"font-weight: bold; \">What are the keys to successful testing?</span>\r\n<ol><li>Understanding a platform provider's elasticity model/dynamic configuration method</li><li>Staying abreast of the provider's evolving monitoring services and Service Level Agreements (SLAs)</li><li>Potentially engaging the service provider as an ongoing operations partner if producing commercial off-the-shelf (COTS) software</li><li>Being willing to be used as a case study by the cloud service provider. The latter may lead to cost reductions.</li></ol>\r\nCloud testing is often seen as only performance or load tests, however, as discussed earlier it covers many other types of testing. Cloud computing itself is often referred to as the marriage of software as a service (SaaS) and utility computing. In regard to test execution, the software offered as a service may be a transaction generator and the cloud provider's infrastructure software, or may just be the latter. Distributed Systems and Parallel Systems mainly use this approach for testing, because of their inherent complex nature. D-Cloud is an example of such a software testing environment.\r\nFor testing non-internet applications, virtual instances of testing environment can be quickly set up to do automated testing of the application. The cloud testing service providers provide an essential testing environment as per the requirement of the application under test. The actual testing of applications is performed by the testing team of the organization which owns the application or third-party testing vendors.\r\n<span style=\"font-weight: bold;\">What are the benefits?</span>\r\nThe ability and cost to simulate web traffic for software testing purposes have been an inhibitor to overall web reliability. The low cost and accessibility of the cloud's extremely large computing resources provide the ability to replicate real-world usage of these systems by geographically distributed users, executing wide varieties of user scenarios, at scales previously unattainable in traditional testing environments. Minimal start-up time along with quality assurance can be achieved by cloud testing.\r\nFollowing are some of the key benefits:\r\n<ul><li>Reduction in capital expenditure</li><li>Highly scalable</li></ul>\r\n<span style=\"font-weight: bold;\">What are the issues?</span>\r\nThe initial setup cost for migrating testing to a cloud is very high as it involves modifying some of the test cases to suit the cloud environment. This makes the decision of migration crucial. Therefore, cloud testing is not necessarily the best solution to all testing problems.\r\nLegacy systems & services need to be modified in order to be tested on the cloud. Usage of robust interfaces with these legacy systems may solve this problem. Also like any other cloud services, cloud testing is vulnerable to security issues.\r\nThe test results may not be accurate due to the varying performance of the service providers’ network and the internet. In many cases, service virtualization can be applied to simulate the specific performance and behaviors required for accurate and thorough testing.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Cloud_Testing.png","alias":"cloud-testingasq-paas"},"393":{"id":393,"title":"Embedded Database Management Systems","description":" An embedded database is a database technology in which database management solutions are built into an application rather than provided as standalone tools. In many cases, this effectively "hides" the database management tools from the end user.\r\nAn embedded database system can be set up in many ways. It can include traditional relational database designs or other kinds of storage formats. It can utilize different solutions as well; for example, a popular type of embedded architecture uses MS Access for storage and relies on VBA forms to handle data requests. Many of these systems also use various APIs and SQL tools to perform data-related tasks.\r\nEmbedded database designs are used for various purposes. Embedded database tools, for example, can be used for email archive searches, for presentation of gaming statistics or other stored game data, and for industry-specific tools like tax-preparation software packages.\r\nIT professionals also sometimes use the term embedded database to refer to database solutions that run on mobile devices.","materialsDescription":" <span style=\"font-weight: bold; \">What do "Embedded Database Management Systems" mean?</span>\r\nAn embedded database system is a database management system (DBMS) which is tightly integrated with an application software that requires access to stored data, such that the database system is "hidden" from the application’s end-user and requires little or no ongoing maintenance.\r\n<span style=\"font-weight: bold;\">What does it include?</span>\r\nIt is actually a broad technology category that includes\r\n<ul><li>database systems with differing application programming interfaces (SQL as well as proprietary, native APIs),</li><li>database architectures (client-server and in-process),</li><li>storage modes (on-disk, in-memory, and combined),</li><li>database models (relational, object-oriented, entity–attribute–value model, network/CODASYL),</li><li>target markets.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Embedded_Database_Management_Systems.png","alias":"embedded-database-management-systems"},"395":{"id":395,"title":"Agile Application Life-Cycle Management Software","description":" Agile software development is an approach to software development under which requirements and solutions evolve through the collaborative effort of self-organizing and cross-functional teams and their customer(s)/end user(s). It advocates adaptive planning, evolutionary development, empirical knowledge, and continual improvement, and it encourages rapid and flexible response to change.\r\nThe term agile (sometimes written Agile) was popularized, in this context, by the Manifesto for Agile Software Development. The values and principles espoused in this manifesto were derived from and underpin a broad range of software development frameworks, including Scrum and Kanban.\r\nThere is significant anecdotal evidence that adopting agile practices and values improves the agility of software professionals, teams and organizations; however, some empirical studies have found no scientific evidence.\r\nAgile application lifecycle management (Agile ALM) is all the tools and processes that are used to manage software development projects based on flexible methodology. The traditional cascade design model uses a phase approach to the development life cycle. This approach means that no project phase starts earlier than the previous one ends. For example, the design does not begin before the collection of requirements ends. Development does not begin until the design is completed. Testing does not begin until development is fully completed. There are many tools to manage what is in the input and output of each phase.","materialsDescription":" Agile ALM brings together two seemingly contradictory development strategies. Agile promotes flexibility, rapid release cycles and quick response to change. Application lifecycle management (ALM) emphasizes tracking and documenting changes in an application -- from inception to retirement. Its processes are more controlled and less adaptive than the Agile methodology. That said, when put together, Agile and ALM act as complements, rending ALM more flexible and Agile more disciplined.\r\n<span style=\"font-weight: bold;\">What is Agile ALM?</span>\r\nDevelopment expert Yvette Francino described Agile ALM as ALM tools and processes that are used to manage Agile software development projects. For example, rather than using Waterfall's phased approach, Agile ALM offers an approach to software development in which design, code and requirements are all handled by the same team.\r\n<span style=\"font-weight: bold;\">How do you integrate Agile into an ALM framework?</span>\r\nAccording to Gerie Owen's article on Agile and ALM, adopting Agile means both a change to the ALM approach and a change to an organization's mind-set. An Agile ALM strategy will focus on the customer and will have the ability to adapt to shifting requirements -- from project planning to release management. For example, instead of just implementing controls to force early feedback from testers and business analysts, an organization would also foster a culture of collaboration.\r\n<span style=\"font-weight: bold;\">Are there tools that can help me achieve this?</span>\r\nALM tools are widely available but must be chosen with care, according to Yvette Francino, SearchSoftwareQuality contributor. Organizations should look for tools that facilitate the process without impeding acceptance of changing requirements. They would also need to integrate throughout the application lifecycle and be easy to maintain. In other words, the tool should manage the development process in an Agile way. In an article for SearchSoftwareQuality.com, Amy Reichert provides a list of Agile ALM tools and identifies their strengths and weaknesses. Rally Software, for example, offers a product that works well with Agile but, according to Reichert, does not provide an intuitive workflow. VersionOne, on the other hand, offers a tool that is more user-friendly but less compatible with Agile. Which one is best will depend on the company's needs.\r\n<span style=\"font-weight: bold;\">Are there challenges to Agile ALM that I should be aware of?</span>\r\nThe primary challenge to Agile ALM is in finding a balance between the two methodologies. A common pitfall is to over-ALM the development process. In other words, when developers and testers start to find workarounds to the software rules -- as they often do -- some react by creating more rules in order to more strictly enforce them. Meanwhile, processes lose their agility.\r\n<span style=\"font-weight: bold;\">How can I overcome these challenges?</span>\r\nTesting expert Amy Reichert cautions development teams to keep track of how many rules they add and how those rules are communicated. She also suggests having a discussion with the team, asking them why they are circumventing the process. Once everyone's role has been clarified, project managers can then decide which rules, if any, to add.\r\n<span style=\"font-weight: bold;\">Is Agile ALM a good approach for mobile development?</span>\r\nMobile development is faster and more competitive than traditional software development. It has newer technologies and higher-speed application cycles. These qualities could make mobile an excellent candidate for Agile ALM, but only if the methodology is amended to accommodate the challenges inherent in a more restrictive development process. In an article on mobile ALM, site editor James Denman suggested an ALM approach that focuses on smaller pieces of software and authenticates results as each part is finished. That way, teams can quickly discern whether the app will effectively serve its purpose or if it needs to be taken in a different direction.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Agile_Application_Life_Cycle_Management_Software.png","alias":"agile-application-life-cycle-management-software"},"397":{"id":397,"title":"Mobile Testing","description":" Mobile application testing is the process through which applications are tested for required quality, functionality, compatibility, usability, performance and other characteristics.\r\nIt includes a broad range of application testing and evaluation techniques that encompasses both standard software testing and mobile-platform-specific testing procedures.\r\nMobile application testing is typically performed by mobile application developers after a mobile application is developed or before it is released to consumers. Typically, the key objectives of mobile application testing are:\r\n<span style=\"font-style: italic;\">Hardware compatibility and functionality</span> - The mobile application’s response to a mobile device's physical input and interaction with components. This includes a touch screen, keyboard, display, sensors, network and more.\r\n<span style=\"font-style: italic;\">OS compatibility</span> - Evaluates and ensures that the application is completely compatible with different OS platforms.\r\n<span style=\"font-style: italic;\">Source code evaluation</span> - Identifies and resolves any code errors and bugs within the application.\r\n<span style=\"font-style: italic;\">Usability and Functionality</span> - The application is easy to use and provides all desired functionalities.","materialsDescription":" <span style=\"font-weight: bold;\">How is mobile application testing different from mobile testing?</span>\r\nWhen you are asked to do mobile testing, you must test the mobile phone itself. It may include protocol testing, battery testing, network connectivity testing, software compatibility testing and more.\r\nOn the other hand, mobile application testing is to test applications and software built for mobile phones. In this case, the application needs to be tested to verify whether it meets the specified functional and non-functional requirements.\r\n<span style=\"font-weight: bold;\">What are the different types of mobile application testing?</span>\r\n<ol><li>Functional Testing</li><li>User Interface Testing</li><li>Usability Testing</li><li>Performance Testing</li><li>Stress Testing</li><li>Compatibility Testing</li><li>Interruption Testing</li></ol>\r\n<span style=\"font-weight: bold;\">What is the most important type of mobile application testing?</span>\r\nWhile you cannot neglect any of the above testing types; some of them definitely deserve more attention than the others. For example, user interface testing must be done extensively to make sure that the application’s color schemes, consistency, menu styles, navigation, etc. are perfect.\r\nApart from the listed ones, it is also important to carry out monkey testing of the application to examine the stability of application when continuous invalid user inputs are provided.\r\nAnother important aspect of mobile application testing is to examine how the application reacts when there is no or little network coverage.\r\n<span style=\"font-weight: bold;\">What are the best ways to carry out mobile application testing?</span>\r\nMobile application testing is not just about writing test cases and executing them. Below are some pointers that can help a tester test mobile applications in the most effective manner.\r\n<ul><li>Explore and learn about mobile phones and their attributes. Domain knowledge will really help you see beyond the obvious.</li><li>Understand when, how and where the application will be used and then create test cases.</li><li>Study the mobile phones on which the applications will run and write appropriate test cases.</li><li>Use simulators as often as possible to execute the test cases.</li><li>Use remote device services (RDA) as well.</li></ul>\r\n<span style=\"font-weight: bold;\">Can mobile application testing be automated?</span>\r\nYes, it can. The fact that mobile application testing is gradually grasping the attention of the IT industry may be the reason why mobile test automation tools are being released into the market. It is best to keep your options open and explore all forms of mobile application testing and choose the ones that best suit your needs.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mobile_Testing.png","alias":"mobile-testing"},"399":{"id":399,"title":"Requirements Visualization, Definition, and Management","description":" Requirements management is the process of documenting, analyzing, tracing, prioritizing and agreeing on requirements and then controlling change and communicating to relevant stakeholders. It is a continuous process throughout a project. A requirement is a capability to which a project outcome (product or service) should conform.\r\nThe purpose of requirements management is to ensure that an organization documents, verifies, and meets the needs and expectations of its customers and internal or external stakeholders. Requirements management begins with the analysis and elicitation of the objectives and constraints of the organization. Requirements management further includes supporting planning for requirements, integrating requirements and the organization for working with them (attributes for requirements), as well as relationships with other information delivering against requirements, and changes for these.\r\nThe traceability thus established is used in managing requirements to report back fulfilment of company and stakeholder interests in terms of compliance, completeness, coverage, and consistency. Traceabilities also support change management as part of requirements management in understanding the impacts of changes through requirements or other related elements (e.g., functional impacts through relations to functional architecture), and facilitating introducing these changes.\r\nRequirements management involves communication between the project team members and stakeholders, and adjustment to requirements changes throughout the course of the project. To prevent one class of requirements from overriding another, constant communication among members of the development team is critical. For example, in software development for internal applications, the business has such strong needs that it may ignore user requirements, or believe that in creating use cases, the user requirements are being taken care of.\r\nRequirements traceability is concerned with documenting the life of a requirement. It should be possible to trace back to the origin of each requirement and every change made to the requirement should therefore be documented in order to achieve traceability. Even the use of the requirement after the implemented features have been deployed and used should be traceable.\r\nRequirements come from different sources, like the business person ordering the product, the marketing manager and the actual user. These people all have different requirements for the product. Using requirements traceability, an implemented feature can be traced back to the person or group that wanted it during the requirements elicitation. This can, for example, be used during the development process to prioritize the requirement, determining how valuable the requirement is to a specific user. It can also be used after the deployment when user studies show that a feature is not used, to see why it was required in the first place.","materialsDescription":"<span style=\"font-weight: bold; \">Requirements activities</span>\r\nAt each stage in a development process, there are key requirements management activities and methods. To illustrate, consider a standard five-phase development process with Investigation, Feasibility, Design, Construction, and Test, and Release stages.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Investigation</span></span>\r\nIn Investigation, the first three classes of requirements are gathered from the users, from the business, and from the development team. In each area, similar questions are asked; what are the goals, what are the constraints, what are the current tools or processes in place, and so on. Only when these requirements are well understood can functional requirements be developed.\r\nIn the common case, requirements cannot be fully defined at the beginning of the project. Some requirements will change, either because they simply weren’t extracted, or because internal or external forces at work affect the project in mid-cycle.\r\nThe deliverable from the Investigation stage is a requirements document that has been approved by all members of the team. Later, in the thick of development, this document will be critical in preventing scope creep or unnecessary changes. As the system develops, each new feature opens a world of new possibilities, so the requirements specification anchors the team to the original vision and permits a controlled discussion of scope change.\r\nWhile many organizations still use only documents to manage requirements, others manage their requirements baselines using software tools. These tools allow requirements to be managed in a database, and usually have functions to automate traceability (e.g., by allowing electronic links to be created between parent and child requirements, or between test cases and requirements), electronic baseline creation, version control, and change management. Usually, such tools contain an export function that allows a specification document to be created by exporting the requirements data into a standard document application.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Feasibility</span></span>\r\nIn the Feasibility stage, the costs of the requirements are determined. For user requirements, the current cost of work is compared to the future projected costs once the new system is in place. Questions such as these are asked: “What are data entry errors costing us now?” Or “What is the cost of scrap due to operator error with the current interface?” Actually, the need for the new tool is often recognized as these questions come to the attention of financial people in the organization.\r\nBusiness costs would include, “What department has the budget for this?” “What is the expected rate of return on the new product in the marketplace?” “What’s the internal rate of return in reducing the costs of training and support if we make a new, easier-to-use system?”\r\nTechnical costs are related to software development costs and hardware costs. “Do we have the right people to create the tool?” “Do we need new equipment to support expanded software roles?” This last question is an important type. The team must inquire into whether the newest automated tools will add sufficient processing power to shift some of the burdens from the user to the system in order to save people time.\r\nThe question also points out a fundamental point about requirements management. A human and a tool form a system, and this realization is especially important if the tool is a computer or a new application on a computer. The human mind excels in parallel processing and interpretation of trends with insufficient data. The CPU excels in serial processing and accurate mathematical computation. The overarching goal of the requirements management effort for a software project would thus be to make sure the work being automated gets assigned to the proper processor. For instance, “Don’t make the human remember where she is in the interface. Make the interface report the human’s location in the system at all times.” Or “Don’t make the human enter the same data in two screens. Make the system store the data and fill in the second screen as needed.”\r\nThe deliverable from the Feasibility stage is the budget and schedule for the project.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Design</span></span>\r\nAssuming that costs are accurately determined and benefits to be gained are sufficiently large, the project can proceed to the Design stage. In Design, the main requirements management activity is comparing the results of the design against the requirements document to make sure that work is staying in scope.\r\nAgain, flexibility is paramount to success. Here’s a classic story of scope change in mid-stream that actually worked well. Ford auto designers in the early ‘80s were expecting gasoline prices to hit $3.18 per gallon by the end of the decade. Midway through the design of the Ford Taurus, prices had centered to around $1.50 a gallon. The design team decided they could build a larger, more comfortable, and more powerful car if the gas prices stayed low, so they redesigned the car. The Taurus launch set nationwide sales records when the new car came out, primarily because it was so roomy and comfortable to drive.\r\nIn most cases, however, departing from the original requirements to that degree does not work. So the requirements document becomes a critical tool that helps the team make decisions about design changes.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Construction and test</span></span>\r\nIn the construction and testing stage, the main activity of requirements management is to make sure that work and cost stay within schedule and budget, and that the emerging tool does, in fact, meet requirements. A main tool used in this stage is prototype construction and iterative testing. For a software application, the user interface can be created on paper and tested with potential users while the framework of the software is being built. The results of these tests are recorded in a user interface design guide and handed off to the design team when they are ready to develop the interface. This saves time and makes their jobs much easier.\r\nVerification: This effort verifies that the requirement has been implemented correctly. There are 4 methods of verification: analysis, inspection, testing, and demonstration. Numerical software execution results or through-put on a network test, for example, provides analytical evidence that the requirement has been met. Inspection of vendor documentation or spec sheets also verifies requirements. Actually testing or demonstrating the software in a lab environment also verifies the requirements: a test type of verification will occur when test equipment not normally part of the lab (or system under test) is used. Comprehensive test procedures which outline the steps and their expected results clearly identify what is to be seen as a result of performing the step. After the step or set of steps is completed the last step's expected result will call out what has been seen and then identify what requirements or requirements have been verified (identified by number). The requirement number, title, and verbiage are tied together in another location in the test document.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Requirements change management</span></span>\r\nHardly would any software development project be completed without some changes being asked of the project. The changes can stem from changes in the environment in which the finished product is envisaged to be used, business changes, regulation changes, errors in the original definition of requirements, limitations in technology, changes in the security environment and so on. The activities of requirements change management include receiving the change requests from the stakeholders, recording the received change requests, analyzing and determining the desirability and process of implementation, implementation of the change request, quality assurance for the implementation and closing the change request. Then the data of change requests be compiled, analyzed and appropriate metrics are derived and dovetailed into the organizational knowledge repository.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Release</span></span>\r\nRequirements management does not end with product release. From that point on, the data coming in about the application’s acceptability is gathered and fed into the Investigation phase of the next generation or release. Thus the process begins again.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Requirements_Visualization.png","alias":"requirements-visualization-definition-and-management"},"401":{"id":401,"title":"Service-Oriented Architecture and Web Services","description":" Service-oriented architecture (SOA) is a style of software design where services are provided to the other components by application components, through a communication protocol over a network. An SOA service is a discrete unit of functionality that can be accessed remotely and acted upon and updated independently, such as retrieving a credit card statement online. SOA is also intended to be independent of vendors, products and technologies.\r\nA service has four properties according to one of many definitions of SOA:\r\n<ul><li>It logically represents a business activity with a specified outcome.</li><li>It is self-contained.</li><li>It is a black box for its consumers, meaning the consumer does not have to be aware of the service's inner workings.</li><li>It may consist of other underlying services.</li></ul>\r\nDifferent services can be used in conjunction to provide the functionality of a large software application,[4] a principle SOA shares with modular programming. Service-oriented architecture integrates distributed, separately maintained and deployed software components. It is enabled by technologies and standards that facilitate components' communication and cooperation over a network, especially over an IP network.\r\nSOA is related to the idea of an application programming interface (API), an interface or communication protocol between different parts of a computer program intended to simplify the implementation and maintenance of software. An API can be thought of as the service, and the SOA the architecture that allows the service to operate.","materialsDescription":" <span style=\"font-weight: bold;\">What is Service-Oriented Architecture?</span>\r\nService-oriented architecture (SOA) is a software architecture style that supports and distributes application components that incorporates discovery, data mapping, security and more. Service-oriented architecture has two main functions:\r\n<ol><li>Create an architectural model that defines goals of applications and methods that will help achieve those goals.</li><li>Define implementations specifications linked through WSDL (Web Services Description Language) and SOAP (Simple Object Access Protocol) specifications.</li></ol>\r\nService-oriented architecture principles are made up of nine main elements:\r\n<ol><li>Standardized Service Contract where services are defined making it easier for client applications to understand the purpose of the service.</li><li>Loose Coupling is a way to interconnecting components within the system or network so that the components can depend on one another to the least extent acceptable. When a service functionality or setting changes there is no downtime or breakage of the application running.</li><li>Service Abstraction hides the logic behind what the application is doing. It only relays to the client application what it is doing, not how it executes the action.</li><li>Service Reusability divides the services with the intent of reusing as much as possible to avoid spending resources on building the same code and configurations.</li><li>Service Autonomy ensures the logic of a task or a request is completed within the code.</li><li>Service Statelessness whereby services do not withhold information from one state to another in the client application.</li><li>Service Discoverability allows services to be discovered via a service registry.</li><li>Service Composability breaks down larger problems into smaller elements, segmenting the service into modules, making it more manageable.</li><li>Service Interoperability governs the use of standards (e.g. XML) to ensure larger usability and compatibility.</li></ol>\r\n<span style=\"font-weight: bold;\">How Does Service-Oriented Architecture Work?</span>\r\nA service-oriented architecture (SOA) works as a components provider of application services to other components over a network. Service-oriented architecture makes it easier for software components to work with each other over multiple networks.\r\nA service-oriented architecture is implemented with web services (based on WSDL and SOAP), to be more accessible over standard internet protocols that are on independent platforms and programming languages.\r\nService-oriented architecture has 3 major objectives all of which focus on parts of the application cycle:\r\n<ol><li>Structure process and software components as services – making it easier for software developers to create applications in a consistent way.</li><li>Provide a way to publish available services (functionality and input/output requirements) – allowing developers to easily incorporate them into applications.</li><li>Control the usage of these services for security purposes – mainly around the components within the architecture, and securing the connections between those components.</li></ol>\r\nMicroservices architecture software is largely an updated implementation of service-oriented architecture (SOA). The software components are created as services to be used via APIs ensuring security and best practices, just as in traditional service-oriented architectures.\r\n<span style=\"font-weight: bold;\">What are the benefits of Service-Oriented Architecture?</span>\r\nThe main benefits of service-oriented architecture solutions are:\r\n<ul><li>Extensibility – easily able to expand or add to it.</li><li>Reusability – opportunity to reuse multi-purpose logic.</li><li>Maintainability – the ability to keep it up to date without having to remake and build the architecture again with the same configurations.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Service_Oriented_Architecture_and_Web_Services.png","alias":"service-oriented-architecture-and-web-services"},"403":{"id":403,"title":"Software Quality Analysis and Measurement","description":" Software quality measures whether the software satisfies its requirements. Software requirements are classified as either functional or non-functional.\r\nFunctional requirements specify what the software should do. Functional requirements could be calculations, technical details, data manipulation, and processing, or any other specific function that defines what an application is meant to accomplish.\r\nNon-functional requirements specify how the system should work. Also known as “quality attributes” non-functional requirements include things like disaster recovery, portability, privacy, security, supportability, and usability.\r\nNote that most factors indicating software quality fit into the non-functional requirements category. And, while it’s obviously important that software does what it’s built to do, this is the bare minimum you would expect from any application.\r\nBelow are some examples of test metrics and methods for measuring the important aspects of software quality. Efficient measuring and testing of your software for quality is the only way to maximize the chances of releasing high-quality software in today’s fast-paced development environments.\r\nYou can measure reliability by counting the number of high priority bugs found in production. You can also use load testing, which assesses how well the software functions under ordinary conditions of use. It’s important to note that “ordinary conditions of use” can vary between low loads and high loads—the point is that such environments are expected.\r\nLoad testing is also useful for measuring performance efficiency. Stress testing is an important variation on load testing used to determine the maximum operating capacity of an application.\r\nStress testing is conducted by inundating software with requests far exceeding its normal and expected patterns of use to determine how far a system can be pushed before it breaks. With stress testing, you get insight into the recoverability of the software when it breaks—ideally, a system that fails should have a smooth recovery.\r\nYou can measure security by assessing how long it takes to patch or fix software vulnerabilities. You can also check actual security incidents from previous software versions, including whether the system was breached and if any breaches caused downtime for users. All previous security issues should, of course, be addressed in future releases.\r\nCounting the number of lines of code is a simple measure of maintainability—software with more lines of code is harder to maintain, meaning changes are more likely to lead to errors.\r\nThere are several detailed test metrics used to check the complexity of code, such as cyclomatic complexity, which counts the amount of linearly independent paths through a program’s source code.\r\nYou can check the rate of delivery by counting the number of software releases. Another measure is the number of “stories” or user requirements shipped to the user.\r\nYou can test the GUI to make sure it’s simple and not frustrating for end-users. The problem is that GUI testing is complex and time-consuming – there are many possible GUI operations and sequences that require testing in most software. And that means it takes a long time to design test cases.\r\nThe complexity of GUI testing competes with the objective of releasing software quickly, which has necessitated the implementation of automated testing. Several test suites that completely simulate user behavior are available.","materialsDescription":" <span style=\"font-weight: bold;\">What is Software Quality Metrics?</span>\r\nThe word 'metrics' refers to standards for measurements. Software Quality Metrics means a measurement of attributes, pertaining to software quality along with its process of development.\r\nThe term "software quality metrics" illustrate the picture of measuring the software qualities by recording the number of defects or security loopholes present in the software. However, quality measurement is not restricted to the counting defects or vulnerabilities but also covers other aspects of qualities such as maintainability, reliability, integrity, usability, customer satisfaction, etc.\r\n<span style=\"font-weight: bold;\">Why Software Quality Metrics?</span>\r\n<ol><li>To define and categorize elements in order to have a better understanding of each and every process and attribute.</li><li>To evaluate and assess each of these processes and attribute against the given requirements and specifications.</li><li>Predicting and planning the next move w.r.t software and business requirements.</li><li>Improving the Overall quality of the process and product, and subsequently of project.</li></ol>\r\n<span style=\"font-weight: bold;\">Software Quality Metrics: a sub-category of Software Metrics</span>\r\nIt is basically, a subclass of software metrics that mainly emphasizes on quality assets of the software product, process and project. A software metric is a broader concept that incorporates software quality metrics in it, and mainly consists of three types of metrics:\r\n<ul><li><span style=\"font-weight: bold;\">Product Metrics:</span> it includes size, design, complexity, performance and other parameters that are associated with the product's quality.</li><li><span style=\"font-weight: bold;\">Process Metrics:</span> it involves parameters like time-duration in locating and removing defects, response time for resolving issues, etc.</li><li><span style=\"font-weight: bold;\">Project Metrics:</span> it may include a number of teams, developers involved, cost and duration for the project, etc.</li></ul>\r\n<span style=\"font-weight: bold;\">Features of good Software Quality Metrics:</span>\r\n<ul><li>Should be specific to measure the particular attribute or an attribute of greater importance.</li><li>Comprehensive for a wide variety of scenarios.</li><li>Should not consider attributes that have already been measured by some other metric.</li><li>Reliable to work similarly in all conditions.</li><li>Should be easy and simple to understand and operate.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Software_Quality_Analysis_and_Measurement.png","alias":"software-quality-analysis-and-measurement"},"405":{"id":405,"title":"Mobile Enterprise Application Platforms","description":"<span style=\"font-weight: bold; \">A mobile enterprise application platform (MEAP)</span> is a development environment that provides tools and middleware to develop, test, deploy and manage corporate software running on mobile devices.\r\nEnterprise mobile application development addresses the difficulties of developing mobile software by managing the diversity of devices, networks and user groups at the time of deployment and throughout the mobile computing technology lifecycle. Unlike standalone apps, an enterprise mobile app development services a comprehensive, long-term approach to deploying mobility. Cross-platform considerations are one big driver behind using MEAPs. For example, a company can use an enterprise mobile app development to develop the mobile application once and deploy it to a variety of mobile devices (including smart phones, tablets, notebooks and ruggedized handhelds) with no changes to the underlying business logic.\r\nPlatform applications are best for companies that wish to deploy multiple applications on a single infrastructure, scaled to the size of their current mobile field force and available in an online and offline mode. Enterprise mobile app platform provides higher level languages and easy development templates to simplify and speed the mobile application development timeframe, requiring less programming knowledge for mobile business application deployment.\r\nThere are many advantages associated with enterprise mobile application development platform. First of all, it can be run on the cloud. Without maintaining separate sets of code, mobile enterprise application platforms can support multiple types of operating systems and mobile devices. This means a company can deploy a mobile application to different mobile devices with the help of mobile enterprise application platforms without having to worry about compatibility. As most enterprise mobile development platforms have a tool set for modifications, creation of custom app extensions is quite easy and convenient. Enterprise mobile application platforms can centrally manage mobile applications and can also help in integration with multiple server data sources.","materialsDescription":"<h1 class=\"align-center\">What are the benefits of enterprise mobile app platform? </h1>\r\n<ul><li>Create apps and complex forms for any type of mobile device and OS without having to maintain separate sets of code.</li><li>Create tailor-made apps for specific user groups, giving them exactly what they need; usually, a mash-up of reading/writing access to your backend systems, publicly available web services and device features such as camera, GPS, sign-on screen, etc.</li><li>Requires basic and limited coding skills e.g. HTML and CSS.</li><li>Allows a high degree of re-use of the code and interactions developed.</li><li>Provide the offline capability for mobile users in areas without WiFi or cellular coverage.</li><li>Once the platform is integrated into the important back-end systems, creating new apps and forms can be done in hours rather than weeks or months.</li><li>Enterprise mobile application development services can be run on the cloud and purchased on a subscription basis.</li></ul>\r\n<h1 class=\"align-center\">Pros and cons of MEAP</h1>\r\nAlong with the benefits described above, a mobile enterprise application platform extends beyond fourth-generation language (4GL) tools for app development to use a graphical environment and dedicated script language. The tool makes business apps accessible to users from any location at any time. For ease of IT management, some MEAP products can run as a cloud service.\r\nA MEAP, like any technology, comes with challenges. The initial investment is high - it's expensive to begin with, though the total cost of ownership (TCO) goes down with use over time - and it requires IT to perform additional tasks such as updating content, securing data, maintaining applications with updates and managing user authentication.\r\n<h1 class=\"align-center\">Important features</h1>\r\nIn general, a MEAP has two important features:\r\n<ul><li>A mobile application development environment and back-end web services to manage those mobile applications and link them to enterprise applications and databases.</li><li>A centralized management component that enables an administrator to control which users can access an application and what enterprise databases that application can pull data from.</li></ul>\r\nSometimes, organizations will use a mobile enterprise application platform in conjunction with enterprise mobility management (EMM) or mobile device management (MDM). MDM manages mobile devices, while MEAP products manage the enterprise applications running on those devices - although there is sometimes overlap between the functionalities of these two technologies.\r\n<br /><br /> ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mobile_Enterprise_Application_Platforms.png","alias":"mobile-enterprise-application-platforms"},"415":{"id":415,"title":"Mobile Enterprise Applications","description":"The term <span style=\"font-weight: bold; \">enterprise mobile application</span> is used in context of mobile apps created/brought by individual organizations for their workers to carry out functions required to run the organization.\r\nAn enterprise mobile app belonging to an organization is expected to be used by only the workers of that organization. The definition of enterprise mobility apps do not include the mobile apps that an organization create for its customers or consumers of the products or services generated by the organization. \r\nProviders of mobile enterprise application solutions create and develop apps for individual organizations that can buy instead of creating the apps themselves. Reasons for Organizations buying the apps include time and cost savings, technical expertise. Today Enterprise Mobility is playing track role for enterprise transformation.\r\nCompanies are rapidly incorporating mobile applications into their larger IT strategies, allowing them to grow their mobile presence further. Big data, the Internet of Things (IoT), and machine learning are all propelling this growth.\r\nNeed for enterprise mobility applications arose with mobile devices becoming essential in the day to day life and with employees using mobile devices for business purposes. This lead companies to adapt to either Bring Your Own Device (BYOD) or Corporate Owned, Personally Enabled (COPE) approach for Enterprise Mobility. BYOD is making significant progress in the business world, with employees using their own technology at work.\r\nOrganizations having their internal mobile teams develop the apps internally and deploy them. However, some organizations go for enterprise mobile app development company with wide experience in creating Mobile strategies and deploying the apps for Medium to Large Scale Enterprises. These companies provide options for Pre built and custom built turn-key suite of apps. ","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What are corporate mobile apps?</span></h1>\r\nConventionally, corporate mobile applications can be divided into several groups.\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The first group</span></span> is applications designed only for work. Their main goal is to reduce company costs, optimize business processes, and, as a result, increase profits. Another option is an application to increase the efficiency of the analytical department, giving its users the opportunity to improve monitoring of the market, competitors, quickly collect and process data on prices, points of sale of goods, etc.</li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The second group</span></span> is applications that integrate work and communication. These include corporate social networks, so popular recently. Created in the image and likeness of social networks familiar to everyone, they successfully combine work functionality and allow employees to communicate with each other, create personal pages, workgroups, communities, keep blogs, receive news about the company, share important files, create a common information base and use it at any time. </li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The third group</span></span> is applications for monitoring remote employees. Office workers are easy to control: most of the day they are at their workplace, and if necessary, you can organize a system of electronic passes. Remote employees are left to their own devices - it’s very difficult to check whether they arrived at the site on time and reached at all, how many points they visited in a day, and whether they used company materials and equipment to fulfill “left” orders. </li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The fourth group</span></span> is Service Desk and Help Desk, designed to automate the processing of client requests while providing technical support to users of IT departments. Most of these systems are online, because it is important for the user to solve the problem as quickly as possible. With their help, you can provide customer support directly from your mobile device. Applications provide an opportunity in the background to access the list of applications, view in detail individual applications, make changes to them, respond and work with comments.</li></ul>\r\n<h1 class=\"align-center\">Top 5 enterprise mobility app features you must know</h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Centrally Moderated and Strongly Secured Data Infrastructure.</span> Security must never be at bay when it comes to enterprise mobility apps. In the age of information, data is undoubtedly the most valuable commodity, losing which can result in a massive loss for business enterprises. Data sharing done via enterprise mobility apps or solutions need to be monitored. Construct a centrally moderated and highly secure (multi-level security) infrastructure for enterprise mobility solutions. This approach enhances trust and ensures that critical business data remains safe always.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Automation of Processes.</span> Automation is the main factor behind the adoption of enterprise mobility in the core business processes by the organizations. Businesses aim to streamline their operations with minimal human intervention and cut back on time/cost. The number of device usage in the enterprise domain is increasing year-after-year. The growth showcases the seriousness of organizations to adopt top enterprise mobile apps for enhancing automation and processes for better efficiency. </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Real-Time Analytics and Connectivity.</span> The integration of enterprise mobility applications in the existing system leverages the technology benefits for seeking better insights into the ongoing processes. Every enterprise app must have cognitive analytical capabilities to succeed. Modern organizations have to manage thousands of procedures, offerings and deal with hundreds of stakeholders at any point in time. In case of such massive data overloads, every enterprise aims to have a real-time data analysis to make better decisions for growth in the future.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Incredible User Experience. </span>An enterprise mobility app must deliver an intuitive user experience. Not only should it focus on making the functionality better, but also on offering the best experience to the users. This step, in turn, will boost app adoption within the enterprise, fulfilling the organization’s aim for automation. The app must contain futuristic features such as in-app notifications, multi-platform support, offline functionality, etc., to offer an incredible user experience. <br /><span style=\"font-weight: bold; \">Event-Driven Approach. </span>Event-driven approach and architecture is the main differentiator, which fuels digital business transformation. This approach mainly revolves around the delivery of solutions that fulfill organizational objectives by offering rapid response to specific events. Moreover, the event-driven approach aims to transform the task flow based on particular circumstances. Businesses would be able to leverage dynamic opportunities to the maximum potential and provide real-time solutions by choosing the event-driven approach for their enterprise mobility applications. </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mobile_Enterprise_Applications.jpg","alias":"mobile-enterprise-applications"},"595":{"id":595,"title":"iOS Software Development","description":"iOS is Apple’s mobile OS that runs on an iPhone, iPad, iPod Touch hardware. Apple provides tools and resources for creating iOS apps and accessories for these devices. As an iOS developer, you can program in native languages such as Swift or Objective-C or build cross-platform native applications using React Native (JavaScript) or Xamarin (C# & F#).<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Developer Requirements.</span> To develop iOS apps, you need a Mac computer running the latest version of Xcode. Xcode is Apple’s IDE (Integrated Development Environment) for both Mac and iOS apps. Xcode is the graphical interface you'll use to write iOS apps. Xcode includes the iOS SDK, tools, compilers, and frameworks you need specifically to design, develop, write code, and debug an app for iOS. For native mobile app development on iOS, Apple suggests using the modern Swift programming language. It is important to note that Xcode only runs on Mac OS X and the only supported way to develop iOS apps. Like desktop software, iOS development software are designed using a range of programming languages and frameworks.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">iOS software development kit. </span>Mobile iOS app creation software requires access to software development kits (SDKs) that provide an environment through which programmers can design and test code in a simulated mobile environment. Some iOS SDK essentials are the Cocoa Touch frameworks that include the UIKit, GameKit, PushKit, Foundation Kit, and MapKit. These frameworks and others allow you manipulate the iPhone or iPad camera, add voice interaction using SiriKit, explore music with MusicKit, expand viewing and listening via AirPlay 2, and even add iMessage Business Chat to your application. iOS 11 added the power of machine learning with Core ML and augmented reality (AR) experiences with ARKit.\r\n<p id=\"Beta_Testing\" style=\" color:#232f3e; \"><span style=\"font-weight: bold; \">Beta Testing.</span> <span style=\"font-weight: normal; \">Once you have built and tested (using XCTest framework or iOS Unit test) your app, you can invite users to your apps and collect feedback using TestFlight prior to deploying to the App Store. This is a good time for testing Push Notifications, data storage using Core Data, and making network calls to 3rd party APIs. To get going, you simply upload a beta build of your app, and use iTunes Connect to add the name and email of testers. <br /></span></p>\r\n<p id=\"Beta_Testing\" style=\" color:#232f3e; \"><span style=\"font-weight: bold; \">Cloud Testing.</span><span style=\"font-weight: normal; \">Testing your iOS app on real devices is critically important since the performance of the real device, different operating system versions, modifications made by manufacturer and carriers firmware may lead to unexpected issues with your app. Testing on real device gives you a more accurate understanding of how your users interact with your app. On the other hand, obtaining physical devices for testing is a logistical challenge. This is where cloud testing comes into play. With cloud testing, you can test your application on real devices that are accessible on the cloud. <br /></span></p>\r\n<p id=\"Beta_Testing\" style=\" color:#232f3e; \"><span style=\"font-weight: bold; \">Deployment.</span> <span style=\"font-weight: normal; \">Once you have built, tested, and beta tested your iOS app, you can deploy to the App Store. At this point, you must join the Apple Developer Program. As a member, you’ll get access to beta iOS app development software, advanced app capabilities, extensive beta testing tools, and app analytics.</span></p>\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What are the advantages of iOS App Development?</span></h1>\r\n<ul><li><span style=\"font-weight: bold;\">iOS is easy to use interface.</span> Apple’s iPhone becomes the dream of many smartphone users, providing high customer service and become a market leader for offering unmatched devices. You can attract your Apple users easily if an application will be created on a synchronized environment Apple’s platform. These special flexible User Interface of the features of the iOS app can make your business application more desirable and boost up their sales and earn maximum benefits.</li><li><span style=\"font-weight: bold;\">iOS has more security.</span> iOS platform offers its users stay safe from external threats which is the best part and advantage of this platform. While developing an app for the business, providing a powerful shield against malware, virus and other internet threats for app development of a business. iOS applications are secured applications, allows effortless transaction facilities app without spending more time on testing different devices.</li><li>For <span style=\"font-weight: bold;\">business</span>, there are multiple options available in the highly popular iOS app making software market, this is because important to attract new customers to increase sales and chance to empower your business in the global market. The web is not a safe place for so thanks to a well-developed iPhone app Development Company can increase their availability and protect your customer’s information. With an iOS mobile app, always been an attractive device to the public with constant acknowledgment from App Store and business can flourish on a regular basis.</li><li>iOS users are usually <span style=\"font-weight: bold;\">happy users,</span> an efficiently developed iOS app helps to promote your brand or your organization to enhance productivity with profitability services to reach your targeted audience. iOS application builds a strong relationship with customers and clients, and the great audience to deliver your product and solutions to achieve their goals. Better the application is, strong would be the relationship with the superior brand in consumer electronics.</li><li>iOS applications are <span style=\"font-weight: bold;\">innovation </span>and the latest technology used globally and this can help your business to expand the most secure way. With best iOS app development software is accepted globally, you may transforming traditional business processes in a modern way and find customers from every part of the world.</li></ul>\r\n<h1 class=\"align-center\">What is IDE?</h1>\r\nIDE is the acronym for Integrated Development Environment. This contains a set of tools, resources and programming essentials within itself. It helps software/web/ mobile app developers to create new programs. This is a comprehensive solution for creating software or mobile app independently. These resources make development, deployment and debugging processes very simple. Choosing an IDE for iPhone app development is dependent on the budget, kind of programming language you prefer, etc. There are so many functionalities in an IDE that gives you a lot of benefits for app development.\r\nThe IDE makes strategies and streamlines the development phase for your entire team. It has many tools for automation, programming, debugging, compiling and for interpretation. There are three general types of IDE available. They are cloud-based, software as a service (SaaS) type and installing on the server type. IDE for iOS application development software is preferred bycompanies to reduce development time and costs. It helps in accurate testing and easy coding. Integration is also possible with these IDEs. It is as simple as a word processing program used by developers to create robust mobile applications.<br /> ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_iOS_Software_Development.png","alias":"ios-software-development"},"597":{"id":597,"title":"Android Software Application","description":" Android software development is the process by which new applications are created for devices running the Android operating system. Google states that "Android apps can be written using Kotlin, Java, and C++ languages" using the Android software development kit (SDK), while using other languages is also possible. All non-JVM languages, such as Go, JavaScript, C, C++ or assembly, need the help of JVM language code, that may be supplied by tools, likely with restricted API support. Some languages/programming tools allow cross-platform app support, i.e. for both Android and iOS. Third party tools, development environments and language support have also continued to evolve and expand since the initial SDK was released in 2008. In addition, with major business entities like Walmart, Amazon, Bank of America etc. eyeing to engage and sell through mobiles, mobile application development is witnessing a transformation.\r\nAndroid was created by the Open Handset Alliance, which is led by Google. The early feedback on developing applications for the Android platform was mixed. Issues cited include bugs, lack of documentation, inadequate QA infrastructure, and no public issue-tracking system. In December 2007, MergeLab mobile startup founder Adam MacBeth stated, "Functionality is not there, is poorly documented or just doesn't work... It's clearly not ready for prime time." Despite this, Android-targeted applications began to appear the week after the platform was announced. The first publicly available application was the Snake game.\r\nA preview release of the Android SDK was released on November 12, 2007. On July 15, 2008, the Android Developer Challenge Team accidentally sent an email to all entrants in the Android Developer Challenge announcing that a new release of the SDK was available in a "private" download area. The email was intended for winners of the first round of the Android Developer Challenge. The revelation that Google was supplying new SDK releases to some developers and not others (and keeping this arrangement private) led to widely reported frustration within the Android developer community at the time.\r\nOn August 18, 2008, the Android 0.9 SDK beta was released. This release provided an updated and extended API, improved development tools and an updated design for the home screen. Detailed instructions for upgrading are available to those already working with an earlier release. On September 23, 2008, the Android 1.0 SDK (Release 1) was released. According to the release notes, it included "mainly bug fixes, although some smaller features were added." It also included several API changes from the 0.9 version. Multiple versions have been released since it was developed.\r\nOn December 5, 2008, Google announced the first Android Dev Phone, a SIM-unlocked and hardware-unlocked device that is designed for advanced developers. It was a modified version of HTC's Dream phone. While developers can use regular consumer devices to test and use their applications, some developers may choose a dedicated unlocked or no-contract device.\r\nAs of July 2013, more than one million applications have been developed for Android, with over 25 billion downloads. A June 2011 research indicated that over 67% of mobile developers used the platform, at the time of publication. Android smartphone shipments are forecast to exceed 1.2 billion units in 2018 with an 85% market share.","materialsDescription":" <span style=\"font-weight: bold;\">Where does Android come from?</span>\r\nIt comes from Google, who actually acquired Android in 2005 (no, Google didn't invent it). The search giant performs regular updates along with an annual major update.\r\nThe operating system is based on the Linux kernel – if you have friends who work in IT, you may have heard of it. This is the GNU / Linux operating system based structure, which is a unix type system (portable operating system, multitasking and multi-user). The Linux kernel is one of the most prominent examples of free software.\r\n<span style=\"font-weight: bold;\">Why does Android look different on each phone?</span>\r\nAndroid doesn't look different on every device, but it does have a number of different versions. Android is open-source, which means that manufacturers are free to customize the software and make it their own.\r\nThe 'purest' version of Android is often referred to as 'stock Android' and it's often preferred by the Android community: it's the original software as Google intended.\r\nOther user interfaces (UI) include Samsung's TouchWiz, Sony's Xperia, and Huawei's Emotion. See what they all look like in our Android UI comparison.\r\n<span style=\"font-weight: bold;\">What are the advantages of Android?</span>\r\nChoice. For example, if you want iOS, you have a choice of iPhone, iPhone or iPhone. If you go for Android there are stacks of great devices to choose from, from cheap and cheerful handsets to really impressive flagships. Those flagships are often cheaper than the equivalent Apple devices, too.\r\nAndroid’s choice isn’t just about hardware. It’s about everything else too. Android is incredibly easy to customize, both in terms of how it looks and how it works, and the various app stores aren’t as tightly controlled as its rivals’ stores, like Apple.\r\n<span style=\"font-weight: bold;\">What’s with the candy names?</span>\r\nEach new version of Android gets a code name based on consecutive letters of the alphabet. The most recent version is known as Marshmallow because it is the Android M release. Previous versions have included Lollipop, KitKat, Jelly Bean and Gingerbread.\r\n<span style=\"font-weight: bold;\">What’s the best thing about Android?</span>\r\nOptions, many options. With Android, you have hundreds of gadgets at your disposal, the cheapest, the most expensive and innovative market. Android is also incredibly customizable, both in their roles, as in his appearance. You can really make a unique mobile experience for yourself with this OS.\r\n<span style=\"font-weight: bold;\">What’s the worst thing about Android?</span>\r\nGetting updates. In many cases, manufacturers don’t seem to care about providing software updates for devices they’ve already sold you. Even when they do provide updates they take their sweet time about it. That’s why some consider rooting: you can download the updates yourself and apply them instead of waiting for the manufacturer to get around to it.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Android_Software_Application.png","alias":"android-software-application"},"598":{"id":598,"title":"Mobile Website Development","description":" Today, virtually no company can effectively conduct its business without having its own website. A site is not just the face of the company, which should be nice to look at, not an attribute of doing business, but an urgent need. If the company has its own website, then it:\r\n<ul><li>facilitates potential customers and partners access to information about themselves;</li><li>attracts the target audience from the Internet;</li><li>significantly increases market coverage;</li><li>increases brand awareness;</li><li>facilitates communication both with partners and with the target audience;</li><li>improves customer feedback;</li><li>increases customer loyalty.</li></ul>\r\nHowever, the main advantage of owning a website, of course, is that it helps to significantly increase sales, and, consequently, profit. In general, now having a website is almost a prerequisite for successful business development.\r\nComputers, smartphones, tablets, other mobile devices, and the Internet have penetrated all spheres of our lives. A variety of mobile devices are especially popular, and that is why it is no longer possible to limit oneself to a PC version of a site. The website version for the PC is bad for mobile devices, and this, as you might guess, negatively affects sales and profits. If the site is uncomfortable to use, then the potential client will not rack their brains, but simply use the services of competitors. The vast majority will not even try to find something on the site if it is not adapted for mobile devices.\r\nA separate mobile version of the site is a site specifically designed for mobile users. As a rule, a mobile version of a site is hosted on a dedicated subdomain.\r\nThe mobile version of the site, in most cases, is simply a greatly reduced version of the site for the PC. Only those functions that, according to the developers, maybe needed by those users who access the site with a smartphone or tablets, are left on the mobile site.\r\nThe mobile version of the site is good in that it does not depend on the main one, can be easily changed and edited, loads quickly is quite convenient for users, and also has the option of switching to the main version of the site.","materialsDescription":" <span style=\"font-weight: bold;\">What’s a mobile website?</span>\r\nMobile devices have transformed the way we live, putting the digital world at our fingertips 24 hours a day, wherever we are.\r\nThis means establishing your mobile presence is more important now than ever as you have the opportunity to put your business in the pockets of your consumers and create more meaningful interactions with your users. Almost 80% of people use smartphones to search the internet, so if your business is lacking a mobile website or app, you are missing out on a huge market opportunity.\r\nThere are two types of mobile development – responsive mobile sites and mobile applications. We build easy to use, intuitive and responsive mobile apps and websites, designed for optimization across all devices to keep you ahead of your competitors.\r\nA mobile website is a website with a responsive, fluid design, that is user-friendly on multiple devices and web browsers. A study conducted by Google and Galaxy in June 2015 found that 74% of Australians rely on their phones at least as much as they rely on desktops when searching for information, ideas or advice. This is when responsive design plays a huge role.\r\n<span style=\"font-weight: bold;\">Why do I need a mobile website?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mobile traffic has taken over</span></span>\r\nAs mobile traffic has taken over desktop traffic in 2015, more and more people only browse the internet on mobile phones. This means that businesses now need to adopt a mobile-first approach to their online strategies.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Search engines are pushing for better UX</span></span>\r\nMobile users tend to have poor experiences on desktop websites. This is something that search engines such as Google have understood, and are putting initiatives in place to improve mobile web experiences. For example, Google released its mobile-friendly update in 2015 and is switching its search index to mobile-first.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Competitive advantage</span></span>\r\nWebsite owners now need to provide compelling experiences to their mobile users. This is something that is now vital in order to reach business goals and lead users to conversion. As a result, the fast adoption of a mobile strategy is a competitive advantage.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mobile_Website_development.png","alias":"mobile-website-development"},"603":{"id":603,"title":"MacOS Development","description":" The key to great app development lies in having a solid foundation, ideally laid in having a good operating system, to begin with on which your app will stand on and initiate all its operations. For a long time, Windows was the dominating operating system of the nineties.\r\nWhy Should You Use Mac OS X in App Development? A reason for this system’s stagnation in progress is the brand’s fear in offending its corporate clients; therefore every tech change has to be introduced painfully slowly so as to be assimilated by its clients.\r\nApple, on the other hand, has slowly crept up and overtaken Windows and other operating systems primarily because they are not afraid of taking giant leaps. Their “it’s our way or the high way” approach to their operating system has enabled them to make significant improvements in their software, which other operating systems are almost incapable of attaining.\r\nMAC OS X software is essentially a two-layered system. Its impressive GUI sits on top of a UNIX core, and UNIX is notorious for its impressive security features. UNIX makes it’s nearly impossible to install a Trojan or a virus to the system unless the user gives it root access to the system by essentially typing in the admin password into the system.\r\nThe beauty of MAC OS X built-in firewall is that it operates out the box, while at the same time being highly flexible. While MAC users should ideally remain vigilant about foreign files and consequentially never allow them into the system by giving them an admin pass, they then do not need special software to block out these viruses.\r\nMAC OS interface is simple, you can pin as many apps as possible to dock at the bottom of your screen, plus they are always available to you. Besides this, you can run multiple desktops, make use of your iCloud chain to decipher your credit card information, share various files wirelessly through Airdrop, and still monitor the operating system via a set of in-built high-grade utility tools.\r\nThe system also has a rapid start-up resume time. All this is essentially made possible by MAC OS powerful stability. Even though systemic degradation is expected over time, as is the case with just about every operating system, the rate is significantly reduced on MAC products and freezing and crashing are not a common everyday occurrence as is the case with a few operating systems.\r\nMAC’s impressive reliability can be primarily attributed to the fact that the operating system was built from the ground up. Apple essentially controls the production of its software and hardware products from start to finish, and so every part of the system is designed and tested out to work cohesively together.\r\nThose who complain that Apple forces its consumers to use its proprietary software couldn’t be more misguided. MAC OS automatically recognizes and works well with other Apple products including iPads, iPhones, etc.","materialsDescription":"<span style=\"font-weight: bold;\">What is Mac OS X?</span>\r\nMac OS X is an operating system created by Apple for Mac computers (the first version was introduced in 2001), which replaced the then outdated Mac OS 9.\r\nThis is a POSIX-compatible system, that is, all Unix operations can be performed in it. Built on the basis of the XNU core with the Aqua graphical interface.\r\nStarting with version 10.8 it is called OS X.\r\n<span style=\"font-weight: bold; \">What are the advantages of macOS?</span>\r\n<span style=\"font-style: italic; \">Fewer virus attacks:</span>\r\nAs macOS is the second most used operating system and has fewer active users so it has fewer virus attacks also. The other reason for virus safety is its UNIX relationship which is more secure than Windows OS.\r\n<span style=\"font-style: italic; \">Good customer support:</span>\r\nMac users get a good response from their support team as compared to other operating systems. Apple has skilled engineers which help the user in fixing the issues in their hardware and software.\r\n<span style=\"font-style: italic; \">Similar GUI for all the products:</span>\r\nmacOS has the same graphical user interface (GUI) as found in other Apple products like iPhone and tablets. Users feel comfortable in using macOS if they shifted from other Apple products.\r\n<span style=\"font-style: italic; \">Performance and long life:</span>\r\nAs Apple makes both hardware and software so it’s hardware communication is very efficient and it improves performance. The operating system and hardware work great. Apple computer has a longer life than other computers. The battery timing of mac laptops is also longer.\r\n<span style=\"font-style: italic; \">Default apps:</span>\r\nIf you install Windows then it comes with pre-installed apps that slow down your computer e.g. Onedrive slows your computer. But this is not the case with macOS, it comes with powerful apps which don’t affect the performance of your system. Some of the pre-installed apps of macOS are iPhoto and iMovie.\r\n<span style=\"font-style: italic; \">Support NTFS and FAT:</span>\r\nmacOS support Windows file system formats including both NTFS and FAT.\r\n<span style=\"font-style: italic; \">Can run Windows:</span>\r\nYou can run the Windows operating system if you have macOS installed by using Bootcamp or parallels software.\r\n<span style=\"font-weight: bold; \">What are the disadvantages of macOS?</span>\r\n<span style=\"font-style: italic; \">Expensive:</span>\r\nThe minimum cost of a Mac PC is higher than $1000. You can get a good Windows PC at $1000 with more hardware specifications.\r\n<span style=\"font-style: italic; \">Fewer games and software:</span>\r\nMost game developers prefer to make games for the Windows OS because they have more percentages of users. Mac users have fewer games available. Also, mac computers have low graphics capability to run high graphics games. There is some software that is available for Windows and not available for mac users e.g. adobe premiere pro etc.\r\n<span style=\"font-style: italic; \">No hardware customization:</span>\r\nIf you buy any Mac computer/laptop then you cannot change its hardware parts like processor, graphics card, etc. For some mac computers, you can change hardware and RAM but it is not for all mac computers. It is also not possible to change other hardware accessories like internal computer parts, the only choice you have is to buy a new mac computer. On every major release of your operating system you have to change your computer else 50% of your operating system features not work.\r\n<span style=\"font-style: italic; \">Windows cannot read the macOS file system:</span>\r\nmacOS can read NTFS and FAT Windows format but Windows cannot read the macOS file system. You need to install 3rd party software in Windows to do so. Some other software like footnotes has compatibility issues while moving files from macOS to Windows.\r\n<span style=\"font-style: italic; \">Less hardware used:</span>\r\nThe new version of macOS computer supports fewer USB ports and they also not shipped with CD/DVD writer.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MacOS_Development.png","alias":"macos-development"},"605":{"id":605,"title":"Java Development","description":" Java is a general-purpose programming language that is class-based, object-oriented, and designed to have as few implementation dependencies as possible. It is intended to let application developers write once, run anywhere (WORA), meaning that compiled Java code can run on all platforms that support Java without the need for recompilation. Java applications are typically compiled to bytecode that can run on any Java virtual machine (JVM) regardless of the underlying computer architecture. The syntax of Java is similar to C and C++, but it has fewer low-level facilities than either of them. As of 2019, Java was one of the most popular programming languages in use according to GitHub, particularly for client-server web applications, with a reported 9 million developers.\r\nJava was originally developed by James Gosling at Sun Microsystems (which has since been acquired by Oracle) and released in 1995 as a core component of Sun Microsystems' Java platform. The original and reference implementation Java compilers, virtual machines, and class libraries were originally released by Sun under proprietary licenses. As of May 2007, in compliance with the specifications of the Java Community Process, Sun had relicensed most of its Java technologies under the GNU General Public License. Meanwhile, others have developed alternative implementations of these Sun technologies, such as the GNU Compiler for Java (bytecode compiler), GNU Classpath (standard libraries), and IcedTea-Web (browser plugin for applets).\r\nThe latest versions are Java 13, released in September 2019, and Java 11, a currently supported long-term support (LTS) version, released on September 25, 2018; Oracle released for the legacy Java 8 LTS the last free public update in January 2019 for commercial use, while it will otherwise still support Java 8 with public updates for personal use up to at least December 2020. Oracle (and others) highly recommend uninstalling older versions of Java because of serious risks due to unresolved security issues. Since Java 9 (and 10 and 12) is no longer supported, Oracle advises its users to immediately transition to the latest version (currently Java 13) or an LTS release.","materialsDescription":"<span style=\"font-weight: bold; \">What is Java technology and what is its application?</span>\r\nJava is a programming language and computing platform that was first launched by Sun Microsystems in 1995. There are many applications and websites that do not work when Java is not installed, and the number of such websites and applications is increasing every day. Java is fast, highly secure, and reliable. From laptops to data centers, from game consoles to supercomputers used for scientific research, from cell phones to the Internet - Java is everywhere!\r\n<span style=\"font-weight: bold;\">What is the performance of Java?</span>\r\nPrograms written in Java have a reputation for being slower and taking up more RAM than those written in C. Nevertheless, the speed of execution of programs written in Java has been significantly improved with the release of the so-called JIT compiler in 1997-1998. in version 1.1, in addition to other language features to support better code analysis (such as inner classes, StringBuffer class, simplified logic calculations, and so on). In addition, the Java virtual machine was optimized - since 2000, the HotSpot virtual machine has been used for this. As of February 2012, Java 7 code is approximately 1.8 times slower than C code.\r\nSome platforms offer hardware runtime support for Java. For example, microcontrollers that run Java code on hardware instead of software JVMs, as well as ARM-based processors that support Java bytecode through the Jazelle option.\r\n<span style=\"font-weight: bold;\">What are the main features of Java?</span>\r\n<ul><li>Automatic memory management.</li><li>Advanced exception handling capabilities.</li><li>A rich set of I/O filtering tools.</li><li>A set of standard collections: array, list, stack, etc.</li><li>The presence of simple tools for creating network applications (including using the RMI protocol).</li><li>The presence of classes that allow you to perform HTTP requests and process responses.</li><li>Built-in language tools for creating multi-threaded applications, which were then ported to many languages (for example, Python).</li><li>Unified access to databases: at the level of individual SQL queries - based on JDBC, SQLJ; at the level of the concept of objects with the ability to store in the database - based on Java Data Objects (English) and Java Persistence API.</li><li>Generalization support (since version 1.5).</li><li>Support for lambdas, closures, built-in functional programming features.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Java_Development.png","alias":"java-development"},"607":{"id":607,"title":"C/C++ Development","description":" C++ is a general-purpose object-oriented programming (OOP) language, developed by Bjarne Stroustrup, and is an extension of the C language. It is therefore possible to code C++ in a "C style" or "object-oriented style." In certain scenarios, it can be coded in either way and is thus an effective example of a hybrid language.\r\nC++ is considered to be an intermediate-level language, as it encapsulates both high- and low-level language features. Initially, the language was called "C with classes" as it had all the properties of the C language with an additional concept of "classes." However, it was renamed C++ in 1983.\r\nC++ is one of the most popular languages primarily utilized with system/application software, drivers, client-server applications and embedded firmware.\r\nThe main highlight of C++ is a collection of predefined classes, which are data types that can be instantiated multiple times. The language also facilitates declaration of user-defined classes. Classes can further accommodate member functions to implement specific functionality. Multiple objects of a particular class can be defined to implement the functions within the class. Objects can be defined as instances created at run time. These classes can also be inherited by other new classes which take in the public and protected functionalities by default.\r\nC++ includes several operators such as comparison, arithmetic, bit manipulation and logical operators. One of the most attractive features of C++ is that it enables the overloading of certain operators such as addition.\r\nA few of the essential concepts within the C++ programming language include polymorphism, virtual and friend functions, templates, namespaces and pointers.","materialsDescription":"<span style=\"font-weight: bold; \"> Bjarne Stroustrup's FAQ</span>\r\n<span style=\"font-weight: bold; \">C is better than C++ for small projects, right?</span>\r\nNot in my opinion. I never saw a project for which C was better than C++ for any reason but the lack of a good C++ compiler.\r\n<span style=\"font-weight: bold; \">Is C a subset of C++?</span>\r\nIn the strict mathematical sense, C isn't a subset of C++. There are programs that are valid C but not valid C++ and even a few ways of writing code that has a different meaning in C and C++. However, C++ supports every programming technique supported by C. Every C program can be written in essentially the same way in C++ with the same run-time and space efficiency. It is not uncommon to be able to convert tens of thousands of lines of ANSI C to C-style C++ in a few hours. Thus, C++ is as much a superset of ANSI C as ANSI C is a superset of K&R C and much as ISO C++ is a superset of C++ as it existed in 1985.\r\n<span style=\"font-weight: bold; \">What is the difference between C and C++?</span>\r\nC++ is a direct descendant of C that retains almost all of C as a subset. C++ provides stronger type checking than C and directly supports a wider range of programming styles than C. C++ is "a better C" in the sense that it supports the styles of programming done using C with better type checking and more notational support (without loss of efficiency). In the same sense, ANSI C is a better C than K&R C. In addition, C++ supports data abstraction, object-oriented programming, and generic programming (see my books).\r\nI have never seen a program that could be expressed better in C than in C++ (and I don't think such a program could exist - every construct in C has an obvious C++ equivalent). However, there still exist a few environments where the support for C++ is so weak that there is an advantage to using C instead.\r\n<span style=\"font-weight: bold; \">Do you really think that C and C++ could be merged into a single language?</span>\r\nI think that it would be a very good thing for the C/C++ community if they were. That is, if the C/C++ incompatibilities were systematically and completely eliminated and that future evolution was organized so as to prevent new incompatibilities from emerging. Whether that's possible is another matter.\r\nMy basic point is that the current C/C++ incompatibilities are "accidents of history" that have no fundamental reasons behind them (though they all "looked like a good idea at the time" to some competent and well-meaning people). The C/C++ incompatibilities provide no benefits to the community at large, cause serious problems to a large section of the C/C++ community, and could - with great difficulty - be eliminated.\r\nFor a far more detailed presentation of my views on C/C++ compatibility, see the series of papers I wrote about this:\r\n<ul><li>B. Stroustrup: C and C++: Case Studies in Compatibility. The C/C++ Users Journal. September 2002.</li><li>B. Stroustrup: C and C++: A Case for Compatibility. The C/C++ Users Journal. August 2002.</li><li>B. Stroustrup: C and C++: Siblings. The C/C++ Users Journal. July 2002.</li><li>B. Stroustrup: Sibling rivalry: C and C++. AT&T Labs - Research Technical Report. TD-54MQZY. January 2002. </li></ul>\r\nI imagine that if incompatibilities were eliminated (by making changes to both C and C++), there would still be entities called C and C++, but then C really would be defined as a subset of C++.\r\n<span style=\"font-weight: bold; \">Why did you make C++ (almost) compatible with C?</span>\r\nI wanted C++ to be compatible with a complete language with sufficient performance and flexibility for even the most demanding systems programming.\r\nAt the time, I considered C the best systems programming language available. That was not as obvious then (1979) as it later became, but I had experts such as Dennis Ritchie, Steve Johnson, Sandy Fraser, Greg Chesson, Doug McIlroy, and Brian Kernighan down the corridor from whom I could learn and get feedback. Without their help and advice, and without C, C++ would have been stillborn.\r\nContrary to repeated rumors, I was never told that I had to use C; nor was I ever told not to use C. In fact, the first C++ manual grew from troff source of the C manual that Dennis gave me. Many new languages were designed at Bell labs; in "Research" at least, there were no rules enforcing language bigotry.\r\n<span style=\"font-weight: bold; \">What do you think of C/C++?</span>\r\nNo that's not really a question I often get. In that sense, it is the only "fake FAQ" in this FAQ. However, it ought to be a FAQ because people use "C/C++" as if it meant something specific and as if they knew what it meant, leading to much confusion and misery. People should ask "What is C/C++?" and then on reflection stop using the term. It does harm.\r\nThere is no language called "C/C++". The phrase is usually used by people who don't have a clue about programming (e.g. HR personnel and poor managers). Alternatively, it's used by people who simple do not know C++ (and often not C either). When used by programmers, it typically indicates a "C++ is C with a few useful and a lot of useless complicated features added" attitude. Often, that is the point of view of people who like to write their own strings and hash tables with little knowledge of the standard library beyond printf and memcpy. There are people who stick to a restricted subset of C++ for perfectly good reasons, but they (as far as I have noticed) are not the people who say "C/C++".\r\nI use C/C++ only in phrases such as "C/C++ compatibility" and "C/C++ community".\r\n<span style=\"font-weight: bold;\">When was C++ invented?</span>\r\nI started work on what became C++ in 1979. The initial version was called "C with Classes". The first version of C++ was used internally in AT&T in August 1983. The name "C++" was used late that year. The first commercial implementation was released October 1985 at the same time as the publication of the 1st edition of The C++ Programming Language. Templates and exception handling were included later in the 1980's and documented in The Annotated C++ Reference Manual and The C++ Programming Language (2rd Edition). The first ISO C++ standard was C++98 as described in The C++ Programming Language (3rd Edition).\r\nThe current definition of C++ The 2011 ISO C++ Standard described in The C++ Programming Language (4th Edition).\r\nYou can find a more complete timeline and more detailed explanations in The Design and Evolution of C++ and A History of C++: 1979-1991 and Evolving a language in and for the real world: C++ 19.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_C_C_Development.png","alias":"cc-development"},"609":{"id":609,"title":".Net Development","description":" .NET Framework is a software framework developed by Microsoft that runs primarily on Microsoft Windows. It includes a large class library named Framework Class Library (FCL) and provides language interoperability (each language can use code written in other languages) across several programming languages. Programs written for .NET Framework execute in a software environment (in contrast to a hardware environment) named Common Language Runtime (CLR), an application virtual machine that provides services such as security, memory management, and exception handling. As such, computer code written using .NET Framework is called "managed code". FCL and CLR together constitute the .NET Framework.\r\nFCL provides user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. Programmers produce software by combining their source code with .NET Framework and other libraries. The framework is intended to be used by most new applications created for the Windows platform. Microsoft also produces an integrated development environment largely for .NET software called Visual Studio.\r\n.NET Framework began as proprietary software, although the firm worked to standardize the software stack almost immediately, even before its first release. Despite the standardization efforts, developers, mainly those in the free and open-source software communities, expressed their unease with the selected terms and the prospects of any free and open-source implementation, especially regarding software patents. Since then, Microsoft has changed .NET development to more closely follow a contemporary model of a community-developed software project, including issuing an update to its patent promising to address the concerns.\r\n.NET Framework led to a family of .NET platforms targeting mobile computing, embedded devices, alternative operating systems, and web browser plug-ins. A reduced version of the framework, .NET Compact Framework, is available on Windows CE platforms, including Windows Mobile devices such as smartphones. .NET Micro Framework is targeted at very resource-constrained embedded devices. Silverlight was available as a web browser plugin. Mono is available for many operating systems and is customized into popular smartphone operating systems (Android and iOS) and game engines. .NET Core targets the Universal Windows Platform (UWP), and cross-platform and cloud computing workloads.","materialsDescription":"When Microsoft formally introduced its .NET strategy in mid-2000, analysts were confused about how the company would pull off such a massive platform shift. Over two years later, they're still wondering. But .NET isn't vaporware, and it's not a pipe dream. In fact, .NET is happening today.\r\n<span style=\"font-weight: bold; \">What is .NET?</span>\r\nActually, .NET is many things, but primarily it's a marketing term for a set of products and technologies that Microsoft is creating to move personal and enterprise computing beyond the PC desktop and into a distributed Internet-based environment. So .NET--which was originally called Next Generation Windows Services (NGWS)--is also a platform, one that Microsoft sees as the successor to Windows. The .NET platform is based on Web services which are, in turn, defined by a language called XML.\r\n<span style=\"font-weight: bold; \">What is XML?</span>\r\nXML--the eXtensible Markup Language--is a self-descriptive, data definition language. It's structure is similar to HTML, the language of the Web, but it's far more powerful because it's not limited to a static list of language constructs ("tags") that the language's authors supply. Instead, XML is extensible and dynamic: Programmers can define new types of data using XML and then describe that data so that others will know how to use it.\r\n<span style=\"font-weight: bold; \">What are Web services?</span>\r\nWeb services are functions exposed by server-side applications. They are programmable units that other applications (and Web services) can access over the Internet.\r\n<span style=\"font-weight: bold; \">Does .NET require Windows?</span>\r\nTechnically, no, but realistically, yes. It's possible the .NET platform could be ported to other operating systems, such as Linux, FreeBSD, the Macintosh, or whatever, and indeed, some work is being done now in this area. However, .NET very much requires Windows today, on both the server and the client. One might say that .NET and Windows have a symbiotic relationship going forward.\r\n<span style=\"font-weight: bold; \">Is .NET is being ported to Linux?</span>\r\nYes. A company called Ximian is porting the standards-based parts of .NET to Linux as you read this, and the work is amazingly far along. Code-named Mono, this project seeks to bring the C# programming language, the Common Language Runtime (CLR, see below), and other .NET features to Linux.\r\nOn a related note, Microsoft has contracted Corel (makers of CorelDRAW and Word Perfect) to port .NET to FreeBSD.\r\n<span style=\"font-weight: bold; \">Isn't .NET just another name for COM, COM+, Windows DNA, or some other previous Windows technology?</span>\r\nActually, no. Microsoft spent considerable time and effort developing and promoting a set of Windows technologies that was at various times called OLE, COM, COM+, and Windows DNA (Distributed InterNet Architecture) but .NET is not the next iteration. Windows DNA, which was the final umbrella term for this set of technologies, was based around a concept where Windows-based software components could expose their services for other local and remote Windows software components. But though this sounds passingly similar to .NET, Windows DNA is very much based on proprietary Windows technologies. By comparison, .NET is based on open standards (XML and various related technologies), so it will be much easier for other vendors to adopt the platform and write compatible software. So we can eventually expect to see .NET clients and servers on platforms other than Windows.\r\n<span style=\"font-weight: bold; \">So what technologies are part of .NET?</span>\r\n.NET is comprised of several related technologies, including:\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">.NET Framework</span></span> - A runtime environment and set of standard services which .NET capable applications and services can utilize. Implemented as a code library, the .NET Framework includes the Common Language Runtime (CLR), the .NET run-time environment; ASP .NET, a Web applications platform; and ADO .NET, for data store access.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">.NET Compact Framework</span></span> - A subset of the .NET Framework designed for Pocket PCs, Microsoft Smart Phones, and other Windows CE .NET-based mobile devices.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">MSN consumer services</span></span> - Microsoft will use its consumer-oriented MSN online service to expose Web services to individuals. The current version, MSN 8, includes the .NET Passport's authentication services, email, address book, calendaring and tasks, and other similar services.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">.NET Enterprise Servers</span></span> - An extensive set of Microsoft server software that runs on Windows servers, including Application Server, BizTalk Server, Exchange Server, Host Integration Server, Internet Security and Acceleration Server, SQL Server, and many others. Microsoft is currently shipping many such server products, but they are all based on Windows DNA currently, not .NET. Future server products--beginning with Windows .NET Server 2003, due in April 2003--will actually be based on .NET technologies for the first time.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Visual Studio .NET</span></span> - Microsoft's .NET development environment, with support for languages such as Visual Basic .NET, Visual C++ .NET, Visual C# .NET, and Visual J#, which all target the .NET Framework. Other vendors can add other language capabilities to Visual Studio .NET, and the suite can be used to target a wide range of applications and services, including .NET Web services, Windows applications, and Web applications. Note that Visual Studio .NET is not required to create .NET applications and services: Developers can download the .NET Framework for free; this download includes compilers for Visual Basic .NET, Visual C++ .NET and Visual C# .NET.\r\n<span style=\"font-weight: bold;\">OK, so what's the point? How does this make my life better?</span>\r\nWith apologies to Microsoft for stealing the term, .NET enables a better PC ecosystem. That is, by making life easier for everyone involved with PCs, the benefits are cross-pollinated. Here's how .NET makes life easier on various groups:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Programmers</span></span> - Because developers now have a consistent, language-neutral programming environment, they can create better applications and services more quickly. And because .NET encompasses such a wider range of functionality, those applications and services can be connected to back-end services via the Internet, offering better, and more exciting functionality.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">IT administrators</span></span> - Because .NET applications and services do away with the "DLL Hell" found in previous Windows applications, they are amazingly easy to distribute and install.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">End users</span></span> - For the reasons listed above, and many others, a new generation of .NET applications and services will provide new types of connected functionality. Access your email from anywhere. Pay for products online without typing in your credit card information. Access weather, traffic, music, and other personal information from a variety of devices, from anywhere in the world. The future is all connected, and .NET will get us there.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Net_Development.png","alias":"net-development"},"611":{"id":611,"title":"ObjectiveC Development","description":"Objective-C is a general-purpose, object-oriented programming language that adds Smalltalk-style messaging to the C programming language. It was the main programming language supported by Apple for the macOS, iOS and iPadOS operating systems, and their respective application programming interfaces (APIs) Cocoa and Cocoa Touch until the introduction of Swift in 2014.\r\nThe language was originally developed in the early 1980s. It was later selected as the main language used by NeXT for its NeXTSTEP operating system, from which macOS and iOS are derived. Portable Objective-C programs that do not use Apple libraries, or those using parts that may be ported or reimplemented for other systems, can also be compiled for any system supported by GNU Compiler Collection (GCC) or Clang.\r\nObjective-C source code 'implementation' program files usually have .m filename extensions, while Objective-C 'header/interface' files have .h extensions, the same as C header files. Objective-C++ files are denoted with a .mm file extension.\r\nObjective-C was invented in the early 1980s as a means to add Object-Oriented programming capabilities to C. The inventors, Brad Cox and Tom Love, thought that Smalltalk (an early OO language) could provide the tools needed for truly re-usable code and for creating development environments for systems developers.\r\nCox began by writing a pre-processor for C that allowed for the inclusion of Smalltalk-like code, which would then be rendered into compilable C. This turned into a fully-Object-Oriented C extension.\r\nObjective-C was eventually fully defined and described in the book Object-Oriented Programming: An Evolutionary Approach.\r\nNeXT licensed Objective-C in 1988 and developed several tools based on it. These tools eventually became (after several intermediate steps) the Cocoa development environment, which is used by several Apple systems: Mac OS X, iOS, Apple WatchOS.\r\nFor several years now, apps are written for one of these Apple operating systems needed to be written (or compiled to, or run on top of) Objective-C. That situation is changing now as Apple moves its platform to Swift.\r\nIn addition to Cocoa, Objective-C is also used in the GNUstep platform, which can run on Linux, Unix, BSD, and Windows environment, and which closely mirrors Cocoa.","materialsDescription":" <span style=\"font-weight: bold;\">What is Objective-C?</span>\r\nObjective-C is a general-purpose, object-oriented programming language that adds Smalltalk-style messaging to the C programming language. This is the main programming language used by Apple for the OS X and iOS operating systems and their respective APIs, Cocoa and Cocoa Touch. This reference will take you through a simple and practical approach while learning Objective-C Programming language.\r\n<span style=\"font-weight: bold;\">What is OOP?</span>\r\nOOP means Object Oriented Programming; it is a type of programming technique that helps to manage a set of objects in a system. With the help of various programming languages, this method helps to develop several computer programs and applications.\r\n<span style=\"font-weight: bold;\">What Objective-C program consists of?</span>\r\nThe objective-c program basically consists of:\r\n<ul><li>Preprocessor commands</li><li>Interface</li><li>Implementation</li><li>Method</li><li>Variables</li><li>Statements & Expressions</li><li>Comments</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_ObjectiveC_Development.png","alias":"objectivec-development"},"613":{"id":613,"title":"C# Development","description":" C#, (C-Sharp) is a programming language that combines object-oriented and aspect-oriented concepts. Developed in 1998–2001 by a group of engineers under the leadership of Anders Hejlsberg at Microsoft as the main language for developing applications for the Microsoft .NET platform. The compiler with C# is included in the standard installation of the .NET itself, so programs on it can be created and compiled even without tools like Visual Studio.\r\nC# refers to a family of languages with a C-like syntax, of which its syntax is closest to C++ and Java. The language has strict static typing, supports polymorphism, operator overloading, pointers to member functions of classes, attributes, events, properties, exceptions, comments in XML format. Having taken a lot from their predecessors - C++, Java, Delphi, Modula and Smalltalk - C#, based on the practice of using them, excludes some models that have proven to be problematic when developing software systems: thus, C # does not support multiple class inheritance (unlike C ++).\r\nC# was developed as an application level programming language for the CLR and, as such, depends primarily on the capabilities of the CLR itself. This concerns, first of all, the C # type system, which reflects FCL. The presence or absence of certain expressive features of the language is dictated by whether a particular language feature can be translated into the corresponding CLR constructs. So, with the development of the CLR from version 1.1 to 2.0, C # itself was significantly enriched; similar interaction should be expected in the future. (However, this pattern was broken with the release of C # 3.0, which are language extensions that do not rely on .NET platform extensions.) The CLR provides C #, like all other .NET-oriented languages, many of the features that the “classical” programming languages lack. For example, garbage collection is not implemented in C # itself, but the CLR is done for programs written in C # just like it is done for programs on VB.NET, J #, and others.","materialsDescription":"<span style=\"font-weight: bold;\"> Why is it necessary to study the C# programming language?</span>\r\n<span style=\"font-weight: bold;\">Reason # 1. Language program C# develops.</span>\r\nNew programming languages appear annually. And the main demand is expanding and progressing. Since the C# programming language was created and accompanied by Microsoft, this technological “hippopotamus” periodically makes improvable with the addition of useful functions in C #, and you can be sure that it will perform many, many iterations ... Also, billions of lines of code are written all over the world not only under Microsoft, so the work is foreseen to everyone who wants to learn the C # programming language.\r\n<span style=\"font-weight: bold;\">Reason # 2. Your bright future with C#.</span>\r\nThis item smoothly continues the previous one. According to the ratings of the domestic DOU, it is clear that the C# programming language in Ukraine is in 3rd place in 2018 among programming languages. And in the world charts on the 4th place by PYPL PopularitY of Programming Language is a rating using Google Trends.\r\n<span style=\"font-weight: bold;\">Reason # 3. The possibility of greater profits.</span>\r\nOf course, this statement should be evaluated relatively by comparison. Today they like to say: “A programmer’s working time is more expensive than additional memory or a more powerful computer processor. It is recommended to choose more modern tools that don’t over-brain a programmer.”\r\nOn the other hand, when they talk about C#, they always mean speed and large, valuable, serious projects, even Megaprojects. For example, in C#, the Linux kernel, Unix, libraries, environment, interpreters of many modern programming languages are written.\r\n<span style=\"font-weight: bold;\">Reason # 4. C# has a huge set of use cases.</span>\r\n<ul><li>The C # programming language is mainly used to create corporate software, financial projects, for example, for banks and stock exchanges, in particular, mobile applications, cloud services.</li><li>Compared to Java, C# interacts more easily with code written in other languages. And it is precisely in C# that extensions are often written for other programming languages used as a layer between the C # library and the language, the possibilities of which are planned to be extended for specific purposes.</li><li>A pretty popular blockchain in C#.</li><li>C# is widely used in developing games on Unity. Have you ever heard of Unity? Unity is a popular game engine. This means that hundreds of thousands of games, including the most popular, were created using C#.</li><li>C# is good for working with iron, the so-called embedded. Asking what is embedded technology? Embedded system - a specialized computer system or computing device designed to perform a limited number of functions, from Wikipedia: traffic lights, cash registers, vending machines, set-top boxes, test equipment, etc.</li><li>The popular C# programming language is equally good for IoT. Again, what is IoT? IoT (Internet of Things) is a concept of a comprehensive Internet, Internet connection of refrigerators, air conditioners, cars and even sneakers with the aim of providing its owner with greater comfort, and on the other hand increasing their retailers' profits, calculating the amount of what, how much and when availability in warehouses, obtaining certain information about a person and his habits, about the environment.</li><li>Science and its application, for example, conducting complex experimental calculations, cryptography, pattern recognition, and the like.</li></ul>\r\n<span style=\"font-weight: bold;\">Reason # 5. C# is strongly typed, so it is easier for them to master beginners</span>\r\nAs for the comparison of programming languages, it should be noted that the C# programming language is multi-level. This means that it is somewhat similar to English. The C# programming language has strong static typing, supports polymorphism, operator overloading, pointers to member functions of classes, attributes, events, properties, exceptions, comments in XML format. Having adopted a lot from their predecessors - C++, Delphi, Modula, Smalltalk - in C #, relying on the practice of using them, deliberately excluded some models that proved to be problematic when developing software systems in the above-mentioned programming languages.\r\nThe syntax is quite minimalistic - with manual memory management. This is inconvenient for many, but tracking the correctness of functions, understanding the transmission of arguments is closely related to the study of the C# programming language.\r\nSince the syntax of C# is close to C, C++ and Java, then, fluent in C #, you can later learn them in one breath.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_C_Development.png","alias":"c-development"},"617":{"id":617,"title":"Joomla Development","description":"Joomla is a free and open-source content management system (CMS) for publishing web content, developed by Open Source Matters, Inc. It is built on a model–view–controller web application framework that can be used independently of the CMS.\r\nJoomla is written in PHP, uses object-oriented programming techniques (since version 1.5) and software design patterns, stores data in a MySQL, MS SQL (since version 2.5), or PostgreSQL (since version 3.0) database, and includes features such as page caching, RSS feeds, printable versions of pages, news flashes, blogs, search, and support for language internationalization.\r\nOver 8,000 free and commercial extensions are available from the official Joomla Extensions Directory, and more are available from other sources. As of 2019, it was estimated to be the fourth most used content management system on the Internet, after WordPress and Drupal.\r\nJoomla has thousands of verified third party extensions which can be found on the Joomla Extensions Directory - extensions.joomla.org. There are also thousands of high end templates available, many of which are free. Paid templates are also available and come with support. Many templates provide a graphical user interface which allow you to change colors, fonts, layouts and features. Joomla has SEO tools built in. Includes Metadata and Keywords, Mod_rewrite support for SEF URLs and Menu creation for clear and consistent sitemaps.\r\n<ul><li>Multilingual: Offering over 75 languages.</li><li>Search Engine Optimization: Out of the box SEO & SEF.</li><li>Flexible: Make a blog, business website, intranet, community website… From the simplest to the most complex website.</li><li>Free: Joomla is free to use under GPL.</li><li>Extendable: Extensions are available to extend website functionality.</li><li>User Management: Access Control Lists allow management of the users of a website, and different groups.</li><li>Menu management: Create as many menus and menu items as you need.</li><li>Cache management: Caching for performance.</li></ul>","materialsDescription":" <span style=\"font-weight: bold; \">What is Joomla?</span>\r\nJoomla has been on the web since 2005 and has gained a massive number of users; over 50 million downloads according to www.joomla.org. It makes this CMS (content management system) the second most popular after WordPress.\r\n<span style=\"font-weight: bold; \">What are the key features of Joomla?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Responsive.</span></span> Responsiveness is a “must have” for any up-to-date website. You, as well as almost every other Internet user today, expect the website to scale gracefully to any screen resolution and that is what Joomla is totally capable of doing.\r\nMobile devices, desktops, tablets - your website is not going to look “broken” on any of them.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Multilingual.</span></span> Do you operate in a non-English market? No problemo. Localizing the Joomla engine to your language is easier than it is with most of its competitors in the CMS world.\r\nThere are almost 70 language packs in Joomla which are just several clicks away from being installed and used.\r\nEven if a theme you use has some words that aren’t translatable with the language pack, you can translate the rest of them in a language override tool. This is great because in some other popular CMSs you’d need to go to your server and operate in the theme’s files directly.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Easy to update.</span></span> Joomla is one of the most frequently updated engines and that’s a good thing because the Joomla developer’s team brings us new features and new useful functions each time.\r\nWhat is even better, you can apply the update in two-three clicks from your admin panel. I can’t stress this point enough!\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Well Supported.</span></span> Joomla is an open-source platform, which enables anyone to contribute on a volunteer basis.\r\nThe downside to it is the fact that you can’t get on live chat or call someone from Joomla to get a free consultation for your site.\r\nLuckily, the Joomla team developed very detailed Joomla Documentation. If you’re more of a social type, you’ll enjoy Joomla User Forum.\r\n<span style=\"font-weight: bold; \">What makes Joomla stand out?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Joomla Media Manager</span></span>\r\nJoomla Media Manager is a tool that allows you to operate your media files in your Joomla admin panel. Media Manager in Joomla is one of the most intuitive and easy to use among similar tools.\r\nUnlike other CMS systems, you can easily create new folders on your server and upload files there. It would require going to FTP or Cpanel in most other CMSs.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Joomla Contact Manager</span></span>\r\nJoomla is well prepared for being a corporate site that has numerous users with different roles and capabilities. Joomla contact manager enables you to create users in different departments and categories.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Joomla Content Management</span></span>\r\nEven though I’ve heard customers saying Joomla has a longer learning curve, compared to WordPress, it’s so worth it, because with Joomla comes greater flexibility and content combining possibilities.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Joomla Extensions (8000+)</span></span>\r\nJoomla has one of the most powerful extension databases among both CMS and eCommerce platforms.<br />You can find a plugin or module to do almost anything. What is remarkable regarding Joomla extensions - a lot of great plugins and modules are free, while most paid ones come with a free lite version and there is the possibility to upgrade to a premium version whenever you decide to do so.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Front-end Editing</span></span>\r\nI left it till the very end of the guide as it’s my favorite one. That’s what bugs me about WordPress and what cheers me up when working with Joomla - there is no need to go to the admin panel to edit some piece of content.\r\nIf you enabled front-end editing of your site, there will be a gear wheel next to any module and by clicking on it you’ll be able to make changes on the go. It’s a thrill in this bustling world in which we live.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Joomla_Development.png","alias":"joomla-development"},"619":{"id":619,"title":"Drupal Development","description":" Drupal is a content management software. It's used to make many of the websites and applications you use every day. Drupal has great standard features, like easy content authoring, reliable performance, and excellent security. But what sets it apart is its flexibility; modularity is one of its core principles. Its tools help you build the versatile, structured content that dynamic web experiences need.\r\nIt's also a great choice for creating integrated digital frameworks. You can extend it with anyone, or many, of thousands of add-ons. Modules expand Drupal's functionality. Themes let you customize your content's presentation. Distributions are packaged Drupal bundles you can use as starter-kits. Mix and match these components to enhance Drupal's core abilities. Or, integrate Drupal with external services and other applications in your infrastructure. No other content management software is this powerful and scalable.\r\nThe Drupal project is open source software. Anyone can download, use, work on, and share it with others. It's built on principles like collaboration, globalism, and innovation. It's distributed under the terms of the GNU General Public License (GPL). There are no licensing fees, ever. Drupal will always be free.","materialsDescription":" <span style=\"font-weight: bold;\">What can Drupal do? And why is it different from other CMS?</span>\r\nThere are many reasons why Drupal is the top three most used CMS, and why tons of small to big complex systems have made it their options. Here are those:\r\n<ul><li><span style=\"font-weight: bold;\">Reliability.</span> Drupal is one of the top three most popular content management systems in the world. It has a longstanding history. Though Drupal is a work in progress, it has been stable along the way. We have Drupal 7 now while Drupal 8 is going to be released. But you can be assured that you will be supported for Drupal previous version at least 5 years. Meanwhile, the resources will stay there for goods.</li><li><span style=\"font-weight: bold;\">Available resources.</span> Nearly anything you want to do with the system has been priorly created and done absolutely well by other people. Other great news is nearly all of the most useful modules (Drupal add-ons) are contributed to the Drupal community. This is invaluable because, in many CMS, you have to pay for important features. As a user, you have benefited greatly from someone’s efforts, and experience.</li><li><span style=\"font-weight: bold;\">A huge dedicated community.</span> The Drupal community is large, dynamic and has functioned well since 2001. As a newbie or a senior developer, Drupal.org is a must-have resource where you dig in for learning material, upcoming news, or ask for support from contributors, and specialists.</li><li><span style=\"font-weight: bold;\">Robust and convenience.</span> Be assured that the source code for building your Drupal sites has been precisely written, and designed by Drupal experts. When you have an intention to do more complex and advanced work, you will find it easy and convenient to modify the system. This grants users a great advantage over other CMS.</li><li><span style=\"font-weight: bold;\">Flexibility.</span> It’s not a chance that Drupal is considered the most flexible CMS. We have always thought that if you have an idea about any functions, contents, you can certainly create it with Drupal. Seriously. You can create any content on site. You can customize anything to fit your taste. You can create any website type that you want.</li><li><span style=\"font-weight: bold;\">Scalability.</span> By scalability, we mean that you can extend your Drupal core to a higher level with a variety of contributed Drupal modules. What’s great with the Drupal modules is that they integrate perfectly well with Drupal core. They also connect absolutely efficiently with the modules. This is regardless of the fact many modules are totally different. It is due to the natural structure & built-in system of Drupal. This thereby enhances the power of extending your Drupal website. It is also a core strength of Drupal compared with other CMS. Meanwhile, Drupal is an open source. So suppose the modules you want don’t exist, you can create one, edit an existing module, or hire someone to do the job.</li><li><span style=\"font-weight: bold;\">Security.</span> Drupal has been meticulously tested up to strict security rules by Drupal experts and contributors. Its built-in security is strong. Drupal will lock down whatever directory installed, rendering important data, configuration files unable to be accessed directly. No wonder that many big sites with extreme security are using Drupal, namely - whitehouse.org, commerce.gov, weforum.org,...</li></ul>\r\n<span style=\"font-weight: bold;\">What are the uses of Drupal?</span>\r\nAs stated, due to its flexibility and extensibility, Drupal is not limited to any kind. Browse these lists to see the wide range of things that Drupal can build:\r\n<ul><li>Personal or corporate Web sites</li><li>Community portal sites</li><li>Intranet/Corporate sites</li><li>Blogs, art, portfolio, music, multimedia sites</li><li>Forums</li><li>International sites (websites with multi languages)</li><li>E-commerce sites</li><li>Resource directories</li><li>Social networking sites</li></ul>\r\n<span style=\"font-weight: bold;\">When Drupal isn't right?</span>\r\nIf it is necessary to know about a system before we set our foot on, it’s never been less important to explore its cons. Here we bring some of our caveats for the system:\r\n<ul><li>There’s a little learning curve. You will not learn and work with Drupal in a few days. Accept this fact. It’s harder to start compared with other CMS like Wordpress. But once you learn some basic things, it’s easy, and the flow is smoother.</li><li>It is not for those who have insufficient time to educate themselves about this system, or little money to pay a Drupal developer to carry out the work.</li><li>Finding a good Drupal developer is harder to find than that of Wordpress or other systems. It’s not hard to guess this considering the number of Wordpress developers compared with Drupal.</li></ul>\r\nIt always takes some investments to learn about something. For a new user, it would be a huge opportunity cost - what you will gain and lose working with one system and leave others behind.\r\nBut after all the choice is always yours.We expect it would be worth. The CMS you will spend thousands hours working. The system through this you make a living. The option that yields energy and satisfaction.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Drupal_Development__1_.png","alias":"drupal-development"},"621":{"id":621,"title":"WordPress","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WordPress.png","alias":"wordpress"},"623":{"id":623,"title":"Magento Development","description":" Magento is an open-source e-commerce platform written in PHP. It is one of the most popular open e-commerce systems in the network. This software is created using the Zend Framework. Magento source code is distributed under an Open Source Initiative (OSI) approved by the Open Software License (OSL) v3.0, which is similar to the AGPL but not GPL compliant.\r\nThe software was originally developed by Varien, Inc, a US private company headquartered in Culver City, California, with assistance from volunteers.\r\nMore than 100,000 online stores have been created on this platform. The platform code has been downloaded more than 2.5 million times, and $155 billion worth of goods have been sold through Magento-based systems in 2019. Two years ago, Magento accounted for about 30% of the total market share.\r\nVarien published the first general-availability release of the software on March 31, 2008. Roy Rubin, the former CEO of Varien, later sold a share of the company to eBay, which eventually completely acquired and then sold the company to Permira; Permira later sold it to Adobe.\r\nOn November 17, 2015, Magento 2.0 was released. Among the features changed in V2 are the following: reduced table locking issues, improved page caching, enterprise-grade scalability, inbuilt rich snippets for structured data, new file structure with easier customization, CSS Preprocessing using LESS & CSS URL resolver, improved performance and a more structured code base. Magento employs the MySQL or MariaDB relational database management system, the PHP programming language, and elements of the Zend Framework. It applies the conventions of object-oriented programming and model–view–controller architecture. Magento also uses the entity–attribute–value model to store data. On top of that, Magento 2 introduced the Model-View-ViewModel pattern to its front-end code using the JavaScript library Knockout.js.","materialsDescription":" <span style=\"font-weight: bold;\">What is Magento? What is the benefit of choosing an Open Source platform?</span>\r\nMagento is an open-source eCommerce platform that enables the online business owners to control their online store and add powerful and flexible tools for marketing, catalog management, and search engine optimization.\r\nThe open-source platform offers much more innovation, customization, quality, support and agility at a very low cost. It enables the users to share and access the platform, add rich features according to the needs, thereby making changes more effective and easier.\r\n<span style=\"font-weight: bold;\">How can my Magento site be at par with the latest mobile trends and activities?</span>\r\nResponsive designs, device-specific applications have brought a great change in the business world over the past few years. Magento’s latest version includes a responsive template, and it offers great features that meet the needs of the mobile world both for the B2B and the B2C businesses.\r\n<span style=\"font-weight: bold;\">What should be included in my eCommerce Magento strategy?</span>\r\nBefore you plan to start with your Magento project, it is very important to write down the business goals of your website. This will help you to measure success. Once you are done with this, you can plan for the remaining strategies that include target audience, personalization, content plan, mobile strategy, third party add-ons and support services that you would require to keep your site running and performing.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Magento_Development.png","alias":"magento-development"},"625":{"id":625,"title":"Typo3 Development","description":" TYPO3 is a free and open-source Web content management system written in PHP. It is released under the GNU General Public License. It can run on several web servers, such as Apache or IIS, on top of many operating systems, among them Linux, Microsoft Windows, FreeBSD, macOS and OS/2.\r\nTYPO3 is, along with Drupal, Joomla! and WordPress, among the most popular content management systems worldwide, however it is more widespread in Europe than in other regions. The biggest market share can be found in German-speaking countries.\r\nTYPO3 is credited to be highly flexible, as code and content are operated separately. It can be extended by new functions without writing any program code. Also, the software is available in more than 50 languages and has a built-in localization system, therefore supports publishing content in multiple languages. Due to its features like editorial workplace and workflow, advanced frontend editing, scalability and maturity, TYPO3 is used to build and manage websites of different types and size ranges, from small sites for individuals or nonprofit organizations to multilingual enterprise solutions for large corporations. According to the ability to support a corporate environment, it classifies itself as an enterprise level content management system.\r\nTYPO3 was initially authored by the Dane Kasper Skårhøj in 1997. It is now developed by over 300 contributors under the lead of Benjamin Mack (Core team leader) and Mathias Schreiber (Product Owner).\r\nCalculations from the TYPO3 Association show that it is currently used in more than 500,000 installations. The number of installations detected by the public website "CMS Crawler" was around 384,000 by February 2017.","materialsDescription":" <span style=\"font-weight: bold; \">What is the official site of TYPO3?</span>\r\nhttps://typo3.org/ :: TYPO3 — the Professional, Flexible Content Management System. TYPO3 CMS is an Open Source Enterprise Content Management System with a large global community, backed by the approximately 900 members of the TYPO3 Association.\r\n<span style=\"font-weight: bold; \">Where did the name TYPO3 come from?</span>\r\nTYPO3 creator Kasper Skårhøj remembers it something like this:\r\nBack in the late 1990s, while still working on the initial version of his new CMS, he was looking for a name for the new software. At the time, the name “freestyle” appealed to him, but it posed some problems through its over-association with certain activities, products and trademarks. So the issue of naming stayed on the back burner for want of a better idea.\r\nThen, one Friday evening while he was alone in the office after hours coding, Kasper inadvertently typed an error into the command line of his Linux server and accidentally deleted a whole week work. He recalls that feeling you get of a cold rush through the body, when you realize something dreadful has happened. Slowly he got up, walked to the other end of the room and sat down in the couch looking back across the office at the laptop on his desk.\r\nHe stayed like this for a while, just staring out into the room. Then, after the initial shock had subsided, he walked back, sat down, and began to recreate the lost code. This went surprisingly quickly; as such things do when you have them fully worked out in your head. And it was during this new rush of adrenaline and the satisfaction that all was not actually lost, that he began to put the incident into perspective. The recreated programming was going smoothly and cleanly, which made him wonder how ironic it would be if a typo ended up actually improving the product! It was this thought that first brought up the expression “typo” as a possible name. It seemed to fit especially well because\r\n<ul><li>“typo”, as in typography, had something to do with layout and content and</li><li>“typo”, as in a typing mistake, now had a quirky share in the product’s history.</li></ul>\r\nThe newborn child now had a name.\r\nOriginally there were Typo versions 1, 2 and 2.5. But with the success of version 3, which had branded itself more or less by default, a “3” was eventually appended to the product title itself. Since the launch of “TYPO3 version 4”, TYPO3 has remained as the product name for all future versions. So, TYPO3 it is called … and TYPO3 it will continue to be.\r\n<span style=\"font-weight: bold; \">What is TYPO3?</span>\r\nTYPO3 is a free and open-source Web content management system written in PHP. It is released under the GNU General Public License. It can run on several web servers, such as Apache or IIS, on top of many operating systems, among them Linux, Microsoft Windows, FreeBSD, macOS and OS/2.\r\n<span style=\"font-weight: bold; \">Why use TYPO3?</span>\r\nBecause TYPO3 is the CMS for you! TYPO3 is an Enterprise Content Management System. If you need to create, manage and output any kind of digital content, TYPO3 is the right tool for you. You can start small and grow fast, but while your business case might change - you'll never need to change the Content Management System since TYPO3 adapts to your needs.\r\n<span style=\"font-weight: bold;\">What are the system requirements?</span>\r\n<ul><li>Operating System: Linux, Windows or Mac, or common cloud infrastructure setups</li><li>Webserver: Apache httpd, Nginx, Microsoft IIS, Caddy Server</li><li>PHP: PHP >= 7.2</li><li>Database: PostgreSQL //Microsoft SQL Server //MariaDB(>= 10.2) //MySQL(>= 5) //SQLite</li><li>Hardware: RAM >= 256 MB</li><li>Supported Browsers: Chrome (latest) //Firefox (latest) //Safari (latest) //Edge (latest) //Internet Explorer (>= 11)</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Typo3_Development.png","alias":"typo3-development"},"627":{"id":627,"title":"CSS Development","description":" Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language like HTML. CSS is a cornerstone technology of the World Wide Web, alongside HTML and JavaScript.\r\nCSS is designed to enable the separation of presentation and content, including layout, colors, and fonts. This separation can improve content accessibility, provide more flexibility and control in the specification of presentation characteristics, enable multiple web pages to share formatting by specifying the relevant CSS in a separate .css file, and reduce complexity and repetition in the structural content.\r\nSeparation of formatting and content also makes it feasible to present the same markup page in different styles for different rendering methods, such as on-screen, in print, by voice (via speech-based browser or screen reader), and on Braille-based tactile devices. CSS also has rules for alternate formatting if the content is accessed on a mobile device.\r\nThe name cascading comes from the specified priority scheme to determine which style rule applies if more than one rule matches a particular element. This cascading priority scheme is predictable.\r\nThe CSS specifications are maintained by the World Wide Web Consortium (W3C). Internet media type (MIME type) text/css is registered for use with CSS by RFC 2318 (March 1998). The W3C operates a free CSS validation service for CSS documents.\r\nIn addition to HTML, other markup languages support the use of CSS including XHTML, plain XML, SVG, and XUL.\r\nBefore CSS, nearly all presentational attributes of HTML documents were contained within the HTML markup. All font colors, background styles, element alignments, borders and sizes had to be explicitly described, often repeatedly, within the HTML. CSS lets authors move much of that information to another file, the style sheet, resulting in considerably simpler HTML.","materialsDescription":" <span style=\"font-weight: bold;\">Which is better: plain HTML or HTML with CSS?</span>\r\nMany site developers wonder why you need CSS if you can use plain HTML. Most likely, they only know the development of the site and have a number of gaps in knowledge. The bottom line is that HTML is used to structure the content of a page. And CSS allows you to format this content, make it more attractive to users.\r\nWhen the World Wide Web was created, the developers used only one language - HTML. It was used as a means of outputting structured text. The author had scant functional at his disposal. The maximum that could be done - to designate the title, select the paragraph. Tags were not enough.\r\nIn connection with the development of the Internet, the base of HTML language tags was expanded to allow the appearance of documents to be adjusted. At the same time, the structure remained unchanged.\r\nStructuring tags, for example <table>, began to spread. It was they who were more often chosen to design the pages instead of the structure itself. Some browsers offered their own tags, which only they could reproduce.\r\nThus, users often stumbled upon the message: "To view a page, you need to use browser XXX."\r\nTo correct the situation and create a single database of tags for formatting was created CSS. He allowed refusing to bind tags to browsers.\r\nUsing HTML with CSS is more convenient than using plain HTML. CSS provides the following benefits:\r\n<ul><li>Designed to the smallest detail.</li><li>Using a single table, you can manage various documents.</li><li>You can customize the page display options for different devices: computer screen, smartphone screen, etc.</li></ul>\r\n<span style=\"font-weight: bold;\">Website Promotion with CSS</span>\r\nThe emergence and development of CSS have made the development of web resources more efficient and effective. Now it’s much easier and more convenient to control the design. Also, using CSS, we managed to reduce the code of the pages, their size. This had a positive impact on the download speed, the indexing also began to pass faster. The use of an adaptive approach allowed us to make a breakthrough in the field of mobile versions of Internet resources.\r\nTo improve the website promotion, experts recommend placing the CSS style sheets in a separate document so as not to increase the amount of code. You can create one or more such files.\r\nPreviously, search engines could not read style sheets, which made it possible to use them in black SEO, for example, to create invisible texts. Now it is better to abandon the use of CSS for other purposes.\r\nCSS has several advantages and allows you to improve the site, making it more attractive to visitors. However, it is important to correctly register all the elements.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CSS_Development.png","alias":"css-development"},"629":{"id":629,"title":"PHP Development","description":"PHP is a general-purpose programming language originally designed for web development. It was originally created by Rasmus Lerdorf in 1994; the PHP reference implementation is now produced by The PHP Group. PHP originally stood for Personal Home Page, but it now stands for the recursive initialism PHP: Hypertext Preprocessor.\r\nPHP code may be executed with a command line interface (CLI), embedded into HTML code, or used in combination with various web template systems, web content management systems, and web frameworks. PHP code is usually processed by a PHP interpreter implemented as a module in a web server or as a Common Gateway Interface (CGI) executable. The web server outputs the results of the interpreted and executed PHP code, which may be any type of data, such as generated HTML code or binary image data. PHP can be used for many programming tasks outside of the web context, such as standalone graphical applications and robotic drone control.\r\nThe standard PHP interpreter, powered by the Zend Engine, is free software released under the PHP License. PHP has been widely ported and can be deployed on most web servers on almost every operating system and platform, free of charge.\r\nThe PHP language evolved without a written formal specification or standard until 2014, with the original implementation acting as the de facto standard which other implementations aimed to follow. Since 2014, work has gone on to create a formal PHP specification.\r\nAs of September 2019, over 60% of sites on the web using PHP are still on discontinued/"EOLed" version 5.6 or older; versions prior to 7.2 are no longer officially supported by The PHP Development Team, but security support is provided by third parties, such as Debian.","materialsDescription":" <span style=\"font-weight: bold; \">What is PHP?</span>\r\nPHP stands for Hypertext Preprocessor. It is an open-source server-side scripting language that is widely used for web development. It supports many databases like MySQL, Oracle, Sybase, Solid, PostgreSQL, generic ODBC, etc.\r\n<span style=\"font-weight: bold; \">What is PEAR in PHP?</span>\r\nPEAR is a framework and repository for reusable PHP components. PEAR stands for PHP Extension and Application Repository. It contains all types of PHP code snippets and libraries. It also provides a command-line interface to install "packages" automatically.\r\n<span style=\"font-weight: bold; \">Who is known as the father of PHP?</span>\r\nRasmus Lerdorf.\r\n<span style=\"font-weight: bold; \">What was the old name of PHP?</span>\r\nThe old name of PHP was Personal Home Page.\r\n<span style=\"font-weight: bold; \">Explain the difference b/w static and dynamic websites?</span>\r\nIn static websites, content can't be changed after running the script. You can't change anything on the site. It is predefined.\r\nIn dynamic websites, the content of a script can be changed at the run time. Its content is regenerated every time a user visits or reload. Google, yahoo and every search engine is an example of a dynamic website.\r\n<span style=\"font-weight: bold; \">What is the name of the scripting engine in PHP?</span>\r\nThe scripting engine that powers PHP is called Zend Engine 2.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_PHP_Development.png","alias":"php-development"},"631":{"id":631,"title":"CakePHP Development","description":" CakePHP is an open-source web framework. It follows the model–view–controller (MVC) approach and is written in PHP, modeled after the concepts of Ruby on Rails, and distributed under the MIT License.\r\nCakePHP uses well-known software engineering concepts and software design patterns, such as convention over configuration, model–view–controller, active record, association data mapping, and front controller.\r\nCakePHP started in April 2005, when a Polish programmer Michal Tatarynowicz wrote a minimal version of a rapid application development in PHP, dubbing it Cake. He published the framework under the MIT license, and opened it up to the online community of developers. In December 2005, L. Masters and G. J. Woodworth founded the Cake Software Foundation to promote development related to CakePHP. Version 1.0 was released on May 2006.\r\nOne of the project's inspirations was Ruby on Rails, using many of its concepts. The community has since grown and spawned several sub-projects.\r\nIn October 2009, project manager Woodworth and developer N. Abele resigned from the project to focus on their own projects, including the Lithium web framework (previously part of the CakePHP project). The remaining development team continued to focus on the original roadmap that was previously defined.","materialsDescription":" <span style=\"font-weight: bold;\">What is CakePHP? Why it’s Useful?</span>\r\nCakePHP is a free, open-source, rapid development framework for PHP. It’s a fundamental framework for developers to produce web applications.\r\nCakePHP has an active developer team and also the community, bringing terrific worth to the job. Along with maintaining you from wheel-reinventing, utilizing CakePHP suggests your application’s core is well examined as well as is being continuously boosted.\r\nBelow’s a quick listing of functions you’ll delight in when using CakePHP:\r\n<ul><li>Active, friendly community</li><li>Flexible licensing</li><li>Suitable with variations 4 and also 5 of PHP</li><li>Integrated CRUD for database Interaction</li><li>Application scaffolding</li><li>Code generation</li><li>MVC architecture</li><li>Request dispatcher with clean, customized URLs as well as routes</li><li>Integrated validation</li><li>Fast and also adaptable template (PHP phrase framework, with helpers)</li><li>Look for Helpers for AJAX, JavaScript, HTML Forms as well as a lot more</li><li>Email, Cookie, Security, Session, and also Request Handling Components</li><li>Flexible ACL</li><li>Data Sanitization</li><li>Flexible Caching</li><li>Localization</li><li>Works from any kind of web site directory site, with little to no Apache setup involved</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CakePHP_Development.png","alias":"cakephp-development"},"633":{"id":633,"title":"Ruby on Rails Development","description":" Ruby on Rails, or Rails, is a server-side web application framework written in Ruby under the MIT License. Rails is a model–view–controller (MVC) framework, providing default structures for a database, a web service, and web pages. It encourages and facilitates the use of web standards such as JSON or XML for data transfer, HTML, CSS and JavaScript for user interfacing. In addition to MVC, Rails emphasizes the use of other well-known software engineering patterns and paradigms, including convention over configuration (CoC), don't repeat yourself (DRY), and the active record pattern.\r\nRuby on Rails' emergence in the 2000s greatly influenced web app development, through innovative features such as seamless database table creations, migrations, and scaffolding of views to enable rapid application development. Ruby on Rails' influence on other web frameworks remains apparent today, with many frameworks in other languages borrowing its ideas, including Django in Python, Catalyst in Perl, Laravel and CakePHP in PHP, Phoenix in Elixir, Play in Scala, and Sails.js in Node.js.\r\nRuby on Rails is intended to emphasize Convention over Configuration (CoC), and the Don't Repeat Yourself (DRY) principle.\r\n"Convention over Configuration" means a developer only needs to specify unconventional aspects of the application. For example, if there is a class Sale in the model, the corresponding table in the database is called sales by default. It is only if one deviates from this convention, such as calling the table "products sold", that the developer needs to write code regarding these names. Generally, Ruby on Rails conventions lead to less code and less repetition.\r\n"Don't repeat yourself" means that information is located in a single, unambiguous place. For example, using the ActiveRecord module of Rails, the developer does not need to specify database column names in class definitions. Instead, Ruby on Rails can retrieve this information from the database based on the class name.\r\n"Fat models, skinny controllers" means that most of the application logic should be placed within the model while leaving the controller as light as possible.","materialsDescription":" <span style=\"font-weight: bold;\">What is Ruby on Rails?</span>\r\nRails is a development tool that gives web developers a framework, providing structure for all the code they write. The Rails framework helps developers to build websites and applications because it abstracts and simplifies common repetitive tasks.\r\nRails are written in Ruby, the programming language which is also used alongside Rails. Ruby is to Rails as PHP is to Symfony and Zend, or as Python is to Django. The appeal of Ruby to developers lies in the elegance and terseness of the language.\r\nOne of the key principles of Ruby on Rails development (henceforth ‘Rails’) is convention over configuration. This means that the programmer does not have to spend a lot of time configuring files in order to get set up, Rails comes with a set of conventions which help speed up development.\r\nAnother characteristic of Rails is the emphasis on RESTful application design. REST (Representational State Transfer) is a style of software architecture based around the client-server relationship. It encourages a logical structure within applications, which means they can easily be exposed as an API (Application Programming Interface).\r\nFrom a project management point of view, the Ruby on Rails community advocate Agile web development – an iterative development method, that encourages collaborative and flexible approach, which is particularly well-suited for web application development with fast-changing requirements.\r\nOver the last few years Ruby on Rails has gained a large and enthusiastic following, but let’s consider the main arguments for and against Rails.\r\n<span style=\"font-weight: bold;\">Why is it necessary to use Ruby on Rails?</span>\r\n<ul><li>The process of programming is much faster than with other frameworks and languages, partly because of the object-oriented nature of Ruby and the vast collection of open source code available within the Rails community.</li><li>The Rails conventions also make it easy for developers to move between different Rails projects, as each project will tend to follow the same structure and coding practices.</li><li>Rails are good for rapid application development (RAD), as the framework makes it easy to accommodate changes.</li><li>Ruby code is very readable and mostly self-documenting. This increases productivity, as there is less need to write out separate documentation, making it easier for other developers to pick up existing projects.</li><li>Rails have developed a strong focus on testing and have good testing frameworks.</li><li>Rails and most of its libraries are open sources, so unlike other commercial development frameworks, there are no licensing costs involved.</li></ul>\r\n<span style=\"font-weight: bold;\">Potential Rails problems and limitations and how to overcome them:</span>\r\n<ul><li>Not all website hosts can support Rails</li><li>Java and PHP are more widely used, and there are more developers in these languages</li><li>Performance and Scalability</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Ruby_on_Rails_Development.png","alias":"ruby-on-rails-development"},"635":{"id":635,"title":"Python Development","description":" Python is an interpreted, high-level, general-purpose programming language. Created by Guido van Rossum and first released in 1991, Python's design philosophy emphasizes code readability with its notable use of significant whitespace. Its language constructs and object-oriented approach aim to help programmers write clear, logical code for small and large-scale projects.\r\nPython is dynamically typed and garbage-collected. It supports multiple programming paradigms, including procedural, object-oriented, and functional programming. Python is often described as a "batteries included" language due to its comprehensive standard library.\r\nPython was conceived in the late 1980s as a successor to the ABC language. Python 2.0, released in 2000, introduced features like list comprehensions and a garbage collection system capable of collecting reference cycles. Python 3.0, released in 2008, was a major revision of the language that is not completely backward-compatible, and much Python 2 code does not run unmodified on Python 3.\r\nThe Python 2 language, i.e. Python 2.7.x, was officially discontinued on 1 January 2020 (first planned for 2015) after which security patches and other improvements will not be released for it. With Python 2's end-of-life, only Python 3.5.x and later are supported.\r\nPython interpreters are available for many operating systems. A global community of programmers develops and maintains CPython, an open source reference implementation. A non-profit organization, the Python Software Foundation, manages and directs resources for Python and CPython development.\r\nPython is a multi-paradigm programming language. Object-oriented programming and structured programming are fully supported, and many of its features support functional programming and aspect-oriented programming (including by metaprogramming and metaobjects (magic methods)). Many other paradigms are supported via extensions, including design by contract and logic programming.\r\nPython uses dynamic typing and a combination of reference counting and a cycle-detecting garbage collector for memory management. It also features dynamic name resolution (late binding), which binds method and variable names during program execution.\r\nPython's design offers some support for functional programming in the Lisp tradition. It has filter, map, and reduce functions; list comprehensions, dictionaries, sets, and generator expressions. The standard library has two modules (itertools and functools) that implement functional tools borrowed from Haskell and Standard ML.","materialsDescription":" <span style=\"font-weight: bold;\">What is Python?</span>\r\nPython is an interpreted, interactive, object-oriented programming language. It incorporates modules, exceptions, dynamic typing, very high level dynamic data types, and classes. Python combines remarkable power with very clear syntax. It has interfaces to many system calls and libraries, as well as to various window systems, and is extensible in C or C++. It is also usable as an extension language for applications that need a programmable interface. Finally, Python is portable: it runs on many Unix variants, on the Mac, and on Windows 2000 and later.\r\n<span style=\"font-weight: bold;\">What is the Python Software Foundation?</span>\r\nThe Python Software Foundation is an independent non-profit organization that holds the copyright on Python versions 2.1 and newer. The PSF’s mission is to advance open source technology related to the Python programming language and to publicize the use of Python. The PSF’s home page is at <link https://www.python.org/psf/.>https://www.python.org/psf/.</link>\r\n<span style=\"font-weight: bold;\">Are there copyright restrictions on the use of Python?</span>\r\nYou can do anything you want with the source, as long as you leave the copyrights in and display those copyrights in any documentation about Python that you produce. If you honor the copyright rules, it’s OK to use Python for commercial use, to sell copies of Python in source or binary form (modified or unmodified), or to sell products that incorporate Python in some form. We would still like to know about all commercial use of Python, of course.\r\n<span style=\"font-weight: bold;\">What is Python good for?</span>\r\nPython is a high-level general-purpose programming language that can be applied to many different classes of problems.\r\nThe language comes with a large standard library that covers areas such as string processing (regular expressions, Unicode, calculating differences between files), Internet protocols (HTTP, FTP, SMTP, XML-RPC, POP, IMAP, CGI programming), software engineering (unit testing, logging, profiling, parsing Python code), and operating system interfaces (system calls, filesystems, TCP/IP sockets). Look at the table of contents for The Python Standard Library to get an idea of what’s available. A wide variety of third-party extensions are also available. Consult the Python Package Index to find packages of interest to you.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Python_Development.png","alias":"python-development"},"637":{"id":637,"title":"eCommerce development","description":" Electronic commerce is an online transaction of buying and selling products through World Wide Web-based websites and mobile applications. The examples of eCommerce business include supply chain, funds transfer, banking and electronic data interchange (EDI) and others. The electronic transactions are carried out through many eCommerce software platforms and eCommerce applications that are integrated with online websites with the help of eCommerce developers. The eCommerce applications are linked with the payment gateways for a smooth transfer of credit from one entity to another one.\r\nAn eCommerce developer is a very important role in eCommerce app development and web services to realize the power of online sales and marketing in all domains of businesses. The eCommerce developers are normally the web developers with additional exposure to the eCommerce tools and platforms commonly used in online businesses. HTML, CSS, JavaScript, Python, PHP, Ruby on Rail and related technologies are the fundamental components of eCommerce developer skills. In addition to those skills, the knowledge of eCommerce software platforms and API integration is very important for a good eCommerce developer resume.\r\nA good eCommerce website should be highly professional looking with great features and intuitive interface for the checkout process. This is only possible with the help of professional eCommerce developers. You need to evaluate a lot of things before you decide to hire eCommerce developers such as the backend technologies of your website, type of eCommerce, a domain of business, type of database and many others. Once you have decided about all these things, you need to match the eCommerce web developer resume, which is under consideration, with those factors to find a good eCommerce developer.","materialsDescription":" <span style=\"font-weight: bold;\">Why is it important for business owners to create an eСommerce site?</span>\r\nToday, people have very less time to purchase items, by going to physical stores. They prefer to browse their mobile devices or PC and shop online. Having an e-commerce site for your business will help you to capture this market base and keep your customers informed about all your latest products and services.\r\n<span style=\"font-weight: bold;\">How can I choose the best platform for my eСommerce business website?</span>\r\nBefore getting started with your eСommerce web development, consider the few fundamentals that can help to choose the best platform. Always consider the items that you are selling. Some eСommerce platforms can handle inventory tracking and multiple product options while some others will not. Consider the design options, payment gateways, the security of the site, integration with other tools, features and pricing before finalizing on the platform.\r\n<span style=\"font-weight: bold;\">How should I promote my eСommerce site?</span>\r\nThere are various ways to do this and the first thing to do is to promote the site to all the customers. This will help to increase your customer base. Your website address should be present in every advertisement that your company invests in. Register with the search engines and optimize your website as this will affect the traffic of your site.\r\n<span style=\"font-weight: bold;\">What are the important things that can turn browsers into buyers?</span>\r\nCreate your site so that it is much more oriented towards sales rather than marketing. Let your visitors see your products immediately instead of hiding them behind lots of marketing copy. Make a page that reads the terms and conditions as it will offer a professional look. Provide your contact details and explain your return policies, security, encryption methods, and payment options.\r\n<span style=\"font-weight: bold;\">How to create an impressive website?</span>\r\nThe beauty of a site lies in the way it operates and how user-friendly it is. Ensure that your site is fast, easy to use, professional and attractive. Also, make sure that you are able to fulfill the orders very promptly without any delay. In case you are unable to offer the service, make sure that your customer is informed about it via email.\r\n<span style=\"font-weight: bold;\">What are the security risks that are involved with eСommerce sites?</span>\r\neCommerce website owners should always keep in mind the three dimensions of security - confidentiality, integrity, and availability. Business owners should develop a good strategy that can help to make the site and transactions secured. To avoid any hackers gain access to important confidential data, include encryption methods for any data transactions.\r\n<span style=\"font-weight: bold;\">Is there any limit on the size of my product or customer database?</span>\r\nNo, as such there are no limits on the size. The biggest benefit of having an online store is that you can add unlimited products and catalogs and at the same time you can grow your customer base as you require.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_eCommerce_development.png","alias":"ecommerce-development"},"639":{"id":639,"title":"HTML Development","description":" Hypertext Markup Language (HTML) is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets (CSS) and scripting languages such as JavaScript.\r\nWeb browsers receive HTML documents from a web server or from local storage and render the documents into multimedia web pages. HTML describes the structure of a web page semantically and originally included cues for the appearance of the document.\r\nHTML elements are the building blocks of HTML pages. With HTML constructs, images and other objects such as interactive forms may be embedded into the rendered page. HTML provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. HTML elements are delineated by tags, written using angle brackets. Tags such as <img /> and <input /> directly introduce content into the page. Other tags such as <p> surround and provide information about document text and may include other tags as sub-elements. Browsers do not display the HTML tags, but use them to interpret the content of the page.\r\nHTML can embed programs written in a scripting language such as JavaScript, which affects the behavior and content of web pages. Inclusion of CSS defines the look and layout of content. The World Wide Web Consortium (W3C), former maintainer of the HTML and current maintainer of the CSS standards, has encouraged the use of CSS over explicit presentational HTML since 1997.","materialsDescription":" <span style=\"font-weight: bold;\">What is HTML5?</span>\r\nHTML5 contains powerful capabilities for Web-based applications with more powerful interaction, video support, graphics, more styling effects, and a full set of APIs. HTML5 adapts to any device, whether desktop, mobile, tablet, or television. HTML5 is an open platform developed under royalty-free licensing terms.\r\nPeople use the term HTML5 in two ways:\r\n<ul><li>to refer to a set of technologies that together form the future Open Web Platform. These technologies include HTML5 specification, CSS3, SVG, MathML, Geolocation, XmlHttpRequest, Context 2D, Web Fonts (WOFF) and others. The boundary of this set of technologies is informal and changes over time;</li><li>to refer to the HTML5 specification, which is, of course, also part of the Open Web Platform.</li></ul>\r\nAlthough it would be great if people used one term to refer to the specification and another term to refer to a set of specifications, in practice people use the term both ways.\r\n<span style=\"font-weight: bold;\">HTML5 has been cited by many thought leaders as the future of the Web. Why is HTML5 generating this excitement?</span>\r\nThere is huge demand for open standards that allow the creation of rich internet applications. Watching videos, finding the nearest restaurant, accessing emails while being offline are just some of the powerful new capabilities enabled by the set of specifications in development at W3C.\r\nOne aspect that interests W3C, in particular, is enabling people to combine different technologies. W3C works to ensure not just interoperable support in the software of a single specification, but compatibility among specifications.\r\nEven though HTML5 is still a draft, browser vendors are deploying features and generating a lot of excitement in the IT industry. This experience, in turn, allows W3C to revise its drafts. In this way, the final standard can transparently inform implementers where they need to pay close attention to security and privacy issues.\r\n<span style=\"font-weight: bold;\">When can I use HTML5?</span>\r\nPeople can already use parts of the platform that interoperate, but W3C's mission is global interoperable, to ensure that the web is available to all. Not all elements are fully implemented yet and some of them provide builtin fallback mechanisms, such as <video> or <input>. One can use HTML5 today, knowing the existing limitations and ensuring proper fallbacks.\r\n<span style=\"font-weight: bold;\">Which Web Browsers support HTML5?</span>\r\nW3C encourages implementation and testing long before a specification becomes a standard to ensure that two people can read a specification independently and write interoperable software. Early adopters provide implementers and W3C with tremendously valuable feedback because they help identify where interoperability issues exist.\r\n<span style=\"font-weight: bold;\">Do you think that the benefits of HTML5, such as its neutrality, rich graphics, no need plug-ins, outweigh the security risk it carries?</span>\r\nNow entering its third decade, the Web has evolved from a Web of documents into a formidable platform for networked applications that let us share information and services over the Internet. In this highly connected environment, it is important that powerful Web applications be designed with sensitivity to user privacy and security needs. The risks associated with modern Web applications are familiar to the HTML5 community.\r\nHTML5 and related specifications are being developed in W3C's open standards process. This process allows an expert review of features along with their security and privacy implications. Rich functionality that was previously available only through proprietary plugins is now documented in an open specification for all experts to review and improve. We're pleased to see the HTML5 specifications subject to rigorous public review since that helps make the Web a more secure environment.\r\nSome security issues are not confined to HTML5. W3C and IETF are working closely to specify technologies and protocol extensions to mitigate some issues (such as cross-site request forgery and cross-site scripting).\r\n<span style=\"font-weight: bold;\">Will there be an HTML6?</span>\r\nNo work is currently happening on HTML6 but feature requests that are not planned to be addressed in HTML5 are available at listed under HTML.next.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_HTML_Development.png","alias":"html-development"},"641":{"id":641,"title":"XML Development","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_XML_Development.png","alias":"xml-development"},"643":{"id":643,"title":"AJAX Development","description":" Ajax (also AJAX; short for asynchronous JavaScript and XML) is a set of web development techniques using many web technologies on the client side to create asynchronous web applications. With Ajax, web applications can send and retrieve data from a server asynchronously (in the background) without interfering with the display and behavior of the existing page. By decoupling the data interchange layer from the presentation layer, Ajax allows web pages and, by extension, web applications, to change content dynamically without the need to reload the entire page. In practice, modern implementations commonly utilize JSON instead of XML.\r\nAjax is not a single technology, but rather a group of technologies. HTML and CSS can be used in combination to mark up and style information. The webpage can then be modified by JavaScript to dynamically display—and allow the user to interact with—the new information. The built-in XMLHttpRequest object within JavaScript is commonly used to execute Ajax on webpages allowing websites to load content onto the screen without refreshing the page. Ajax is not a new technology, or different language, just existing technologies used in new ways.\r\nThe term Ajax has come to represent a broad group of Web technologies that can be used to implement a Web application that communicates with a server in the background, without interfering with the current state of the page. In the article that coined the term Ajax, Jesse James Garrett explained that the following technologies are incorporated:\r\n<ul><li>HTML (or XHTML) and CSS for presentation</li><li>The Document Object Model (DOM) for dynamic display of and interaction with data</li><li>JSON or XML for the interchange of data, and XSLT for its manipulation</li><li>The XMLHttpRequest object for asynchronous communication</li><li>JavaScript to bring these technologies together</li></ul>\r\nSince then, however, there have been a number of developments in the technologies used in an Ajax application, and in the definition of the term Ajax itself. XML is no longer required for data interchange and, therefore, XSLT is no longer required for the manipulation of data. JavaScript Object Notation (JSON) is often used as an alternative format for data interchange, although other formats such as preformatted HTML or plain text can also be used. A variety of popular JavaScript libraries, including JQuery, include abstractions to assist in executing Ajax requests.\r\nAsynchronous HTML and HTTP (AHAH) involves using XMLHTTPRequest to retrieve (X)HTML fragments, which are then inserted directly into the Web page.","materialsDescription":" <span style=\"font-weight: bold;\">What Is AJAX?</span>\r\nAJAX is an acronym that stands for Asynchronous JavaScript and XML, and it describes a set of development techniques used for building websites and web applications. According to web developer and Skillcrush WordPress instructor Ann Cascarano, the best way to understand AJAX is to start with identifying its specific purpose in the web development process. AJAX’s core function is to update web content asynchronously (the “A” of AJAX), meaning a user’s web browser doesn’t need to reload an entire web page when only a small portion of content on the page needs to change.\r\nOne of the most ubiquitous examples of asynchronous updating is Google’s “Google Suggest” feature. When you enter a search query into Google’s search bar and the Google website automatically begins offering auto-complete options while you type, that’s AJAX in action. The content on the page changes (in this case, the auto-complete options in the search bar) without having to manually refresh the page (something that would make Google Suggest impractical to use). Features like Google Suggest are a fundamental part of contemporary web browsing, which points to how essential AJAX is in web development. In addition to Google Suggest, Cascarano says that AJAX is commonly used to update features like status and notification bars, online forms, comments sections, and surveys and polls. But what exactly are the “J” and “X” of AJAX and how do they make asynchronous updating possible?\r\n<span style=\"font-weight: bold;\">JavaScript and XML</span>\r\nAs mentioned above, the “J” in AJAX stands for JavaScript. JavaScript is a type of scripting language—coding languages used to automate website processes so web developers don’t have to individually program each instance of the process that appears on a page. In JavaScript’s case, it’s used specifically to create, add, and manage dynamic website content. In other words, after markup languages like HTML and CSS are used to build and display static web features (headers, fonts, paragraphs, etc.), JavaScript is then used to control features that require real time updates while a visitor is viewing a page (think interactive maps, animated graphics, scrolling video, jukeboxes, etc). Since JavaScript is in the business of updating page content without requiring viewers to manually reload entire pages, it’s a critical component for AJAX’s asynchronous updating.\r\nThe “X” in AJAX is XML (Extensible Markup Language). As its name suggests, XML is a markup language, which means it’s in the same family as languages like HTML and CSS. Markup languages are coding languages used to annotate parts of a web document that are intended to give web browsers instructions about how to understand, process, and display a web page, versus the actual text intended to be displayed on the page. While HTML and CSS focus on instructing how page content is displayed (paragraphs, headers, fonts, colors, etc.), XML is used to transfer data stored on the page to the browsers that view it. Individual computer systems are often incompatible with one another and can’t understand or interact with data formatted by a different system. XML allows developers to bypass this obstacle by storing data in plain text format between XML tags. By doing this, XML offers a way of storing, moving, and sharing data that isn’t dependent on a particular software or hardware system (something that’s crucial for the internet, where data needs to be available and understandable across all software and hardware platforms). RSS feeds—subscription web feeds that allow users to access content from blogs and news sources as they are updated in real time—are built with XML and are an example of the language’s practical data-sharing capabilities. But how does XML combine with JavaScript to form AJAX?\r\n<span style=\"font-weight: bold;\">How Does AJAX Work?</span>\r\nAccording to Cascarano, JavaScript and XML combine to make asynchronous updating happen through the use of something called an XMLHttpRequest object. When a user visits a web page designed to make use of AJAX and a prescribed event occurs (the user loads the page, clicks a button, fills out a form, etc.) JavaScript creates an XMLHttpRequest object, which then transfers data in an XML format between a web browser (the program being used to view the website) and a web server (the software or hardware where a website’s data is stored). The XMLHttpRequest object sends a request for updated page data to the web server, the server process the request, a response is created server-side and sent back to the browser, which then uses JavaScript to process the response and display it on the screen as updated content.\r\nTo recap: JavaScript automates the updating process, the request for updated content is formatted in XML to make it universally understandable, and JavaScript again kicks in to refresh the relevant content for the user viewing the page. Cascarano notes that the AJAX technique ignores extraneous page data and only handles requests for updated information and the updated information itself. This is really the heart of AJAX’s effectiveness, making websites and applications that use AJAX faster and more responsive for users.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_AJAX_Development.png","alias":"ajax-development"},"645":{"id":645,"title":"JavaScript development","description":" JavaScript, often abbreviated as JS, is a high-level, just-in-time compiled, object-oriented programming language that conforms to the ECMAScript specification. JavaScript has curly-bracket syntax, dynamic typing, prototype-based object-orientation, and first-class functions.\r\nAlongside HTML and CSS, JavaScript is one of the core technologies of the World Wide Web. JavaScript enables interactive web pages and is an essential part of web applications. The vast majority of websites use it, and major web browsers have a dedicated JavaScript engine to execute it.\r\nAs a multi-paradigm language, JavaScript supports event-driven, functional, and imperative (including object-oriented and prototype-based) programming styles. It has APIs for working with text, arrays, dates, regular expressions, and the DOM, but the language itself does not include any I/O, such as networking, storage, or graphics facilities. It relies upon the host environment in which it is embedded to provide these features.\r\nInitially only implemented client-side in web browsers, JavaScript engines are now embedded in many other types of host software, including server-side in web servers and databases, and in non-web programs such as word processors and PDF software, and in runtime environments that make JavaScript available for writing mobile and desktop applications, including desktop widgets.\r\nThe terms Vanilla JavaScript and Vanilla JS refer to JavaScript not extended by any frameworks or additional libraries. Scripts written in Vanilla JS are plain JavaScript code.\r\nAlthough there are similarities between JavaScript and Java, including language name, syntax, and respective standard libraries, the two languages are distinct and differ greatly in design. JavaScript was influenced by programming languages such as Self and Scheme. The JSON serialization format, used to store data structures in files or transmit them across networks, is based on JavaScript.\r\n"JavaScript" is a trademark of Oracle Corporation in the United States. It is used under license for technology invented and implemented by Netscape Communications and current entities such as the Mozilla Foundation.","materialsDescription":" <span style=\"font-weight: bold;\">What is JavaScript?</span>\r\nJavaScript is a client-side as well as a server-side scripting language that can be inserted into HTML pages and is understood by web browsers. JavaScript is also an Object-based Programming language.\r\n<span style=\"font-weight: bold;\">What are the differences between Java and JavaScript?</span>\r\nJava is a complete programming language. In contrast, JavaScript is a coded program that can be introduced to HTML pages. These two languages are not at all inter-dependent and are designed for different intent. Java is an object-oriented programming (OOPS) or structured programming languages like C++ or C whereas JavaScript is a client-side scripting language.\r\n<span style=\"font-weight: bold;\">Do I have to buy JavaScript?</span>\r\nNo--there is nothing to buy. The JavaScript interpreter is included in all major Internet Browsers--so as long as you have an Internet Browser, you're all set. JavaScript source files are written using an ordinary text editor, such as Notepad.\r\n<span style=\"font-weight: bold;\">What is JScript?</span>\r\nJScript is Microsoft's version of Netscape's JavaScript. Each Internet Browser vendor creates their own version of what is collectively known as JavaScript---however, the latest versions of these browsers are moving towards the ECMA Script standard.\r\n<span style=\"font-weight: bold;\">Who 'owns' JavaScript?</span>\r\nECMA governs the standard features of JavaScript---however, each vendor writes the code for their own versions of JavaScript.\r\n<span style=\"font-weight: bold;\">What are the features of JavaScript?</span>\r\n<ul><li>JavaScript is a lightweight, interpreted programming language.</li><li>JavaScript is designed for creating network-centric applications.</li><li>JavaScript is complementary to and integrated with Java.</li><li>JavaScript is complementary to and integrated with HTML.</li><li>JavaScript is open and cross-platform.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_JavaScript_development.png","alias":"javascript-development"},"649":{"id":649,"title":"QA - Quality assurance","description":" <span style=\"font-weight: bold; \">Quality Assurance (QA)</span> is defined as an activity to ensure that an organization is providing the best possible product or service to customers. QA focuses on improving the processes to deliver Quality Products to the customer. An organization has to ensure, that processes are efficient and effective as per the quality standards defined for software products. Quality Assurance is popularly known as <span style=\"font-weight: bold; \">QA Testing. </span>\r\nQA establishes and maintains set requirements for developing or manufacturing reliable products. A quality assurance system is meant to increase customer confidence and a company's credibility, while also improving work processes and efficiency, and it enables a company to better compete with others.\r\nQuality assurance helps a company create products and services that meet the needs, expectations and requirements of customers. It yields high-quality product offerings that build trust and loyalty with customers. The standards and procedures defined by a quality assurance program help prevent product defects before they arise.\r\n<span style=\"font-weight: bold; \">Quality assurance utilizes one of three methods:</span>\r\n<span style=\"font-weight: bold; \">Failure testing, </span>which continually tests a product to determine if it breaks or fails. For physical products that need to withstand stress, this could involve testing the product under heat, pressure or vibration. For software products, failure testing might involve placing the software under high usage or load conditions.\r\n<span style=\"font-weight: bold; \">Statistical process control (SPC),</span> a methodology based on objective data and analysis and developed by Walter Shewhart at Western Electric Company and Bell Telephone Laboratories in the 1920's and 1930's. This methodology uses statistical methods to manage and control the production of products.\r\n<span style=\"font-weight: bold; \">Total quality management (TQM),</span> which applies quantitative methods as the basis for continuous improvement. TQM relies on facts, data and analysis to support product planning and performance reviews.\r\n<span style=\"font-weight: bold; \">Quality assurance in software.</span> Software quality assurance management (SQA) systematically finds patterns and the actions needed to improve development cycles. Finding and fixing coding errors can carry unintended consequences; it is possible to fix one thing, yet break other features and functionality at the same time.\r\nSQA software has become important for developers as a means of avoiding errors before they occur, saving development time and expenses. Even with SQA processes in place, an update to software can break other features and cause defects - commonly known as bugs.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> Differences between Software testing and SQA services</h1>\r\n<ul><li><span style=\"font-weight: bold; \">SQA tools</span></li></ul>\r\n- Is about engineering process that ensures quality\r\n- Involve activities related to the implementation of processes, procedures, and standards.\r\n- Process focused \r\n- Preventive technique\r\n- Proactive measure\r\n- The scope of software quality testing tools applied to all products that will be created by the organization\r\n<ul><li><span style=\"font-weight: bold; \">Software Testing</span></li></ul>\r\n- Software Testing is to test a product for problems before the product goes live\r\n- Involves actives concerning verification of product Example - Review Testing\r\n- Product focused\r\n - Corrective technique\r\n- Reactive measure\r\n- The scope of Software Testing applies to a particular product being tested\r\n<h1 class=\"align-center\">Manual QA testing services Vs Automated Quality Assurance Testing</h1>\r\nSoftware testing is a huge domain, but it can be broadly categorized into two areas: manual testing and automated testing. Both of them can be used to achieve the best results, but it is always worth knowing the difference between the two. Each testing type – manual and automated – comes with its own set of advantages and disadvantages. \r\nYou can choose between manual and quality assurance testing services based on a variety of factors. These include:\r\n- Project requirements\r\n- Timeline\r\n- Budget\r\n- Expertise\r\n- Suitability<br /> \r\n<ul><li><span style=\"font-weight: bold; \">Manual Testing </span></li></ul>\r\n<span style=\"font-weight: bold; \">Exploratory Testing:</span> This scenario requires a tester’s expertise, creativity, knowledge, analytical and logical reasoning skills. With poorly written specifications and short execution time, human skills are a must to test in this scenario.\r\n<span style=\"font-weight: bold; \">Ad-Hoc Testing:</span> It is an unplanned method of testing where the biggest difference maker is a tester’s insight that can work without a specific approach.\r\n<span style=\"font-weight: bold; \">Usability Testing:</span> Here you need to check the level of user-friendliness and check the software for convenience. Human observation is a must to make the end user’s experience convenient.\r\n<ul><li><span style=\"font-weight: bold; \">Quality Assurance automation tools</span></li></ul>\r\n<span style=\"font-weight: bold; \">Repeated Execution:</span> When you need to execute a use case repeatedly, automated testing is a better option.\r\n<span style=\"font-weight: bold; \">Regression Testing:</span> Automated automated QA software is better here because the code changes frequently and the regressions can be run in a timely manner\r\n<span style=\"font-weight: bold; \">Performance:</span> You need an automated QA testing software when thousands of concurrent users are simulated at the same time. Additionally, it is a better solution for load testing.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Quality_assurance.png","alias":"qa-quality-assurance"},"651":{"id":651,"title":"Interface Testing","description":"When an application or a software or a website is developed, then there are several components of it. Those components can be server, database etc. The connection which integrates and facilitates the communication between these components is termed as an <span style=\"font-weight: bold;\">Interface</span>.\r\n<span style=\"font-weight: bold;\">Interface Testing</span> is performed to evaluate whether systems or components pass data and control correctly to one another. It is to verify if all the interactions between these modules are working properly and errors are handled properly.\r\n<span style=\"font-weight: bold; \">Interface Testing - Checklist</span>\r\n<ul><li>Verify that communication between the systems are done correctly</li><li>Verify if all supported hardware/software has been tested</li><li>Verify if all linked documents be supported/opened on all platforms</li><li>Verify the security requirements or encryption while communication happens between systems</li><li>Check if a Solution can handle network failures between Web site and application server</li></ul>\r\n<span style=\"font-weight: bold; \">Phases of Interface Testing. </span>\r\nThere are 2 components involved in Interface testing: 1) web server and application server interface and 2) web server and database server interface.\r\nBasically, 3 phases are involved in the Interface testing which is mentioned below:\r\n<b>Configuration and Development. </b>After the configuration of the interface and the development initialization, the configuration is needed to be verified as per the requirement. In simple words, verification takes place.\r\n<p style=\" text-align: justify; \"><b>Validation. </b>After the configuration and development stage, validation of the interface is necessary.</p>\r\n<p style=\" text-align: justify; \"><b>Maintenance.</b> After the completion of the project, when the project reaches it’s working stage, the interface is set to be monitored for its performance.</p>\r\n<p style=\" text-align: justify; \"></p>\r\n<p style=\"text-align: justify; \"><a name=\"StepsinvolvedinInterfaceTesting\"></a></p>","materialsDescription":"<h1 class=\"align-center\">Types of Interface Testing </h1>\r\nDuring Interface Testing various types of testing done on the interface which may include:\r\n<span style=\"font-weight: bold; \">Workflow:</span> It ensures that the interface engine handles your standard workflows as expected.\r\n<span style=\"font-weight: bold; \">Edge cases -unexpected values:</span> This is considered when testing include date, month and day reversed.\r\n<span style=\"font-weight: bold; \">Performance, load, and network testing:</span> A high-volume interface may require more Load Testing than a low-volume interface, depending on the interface engine and connectivity infrastructure.\r\n<span style=\"font-weight: bold; \">Individual system interface testing:</span> This includes testing each system individually. For example, billing system and inventory management system for the retail store should be able to operate separately.\r\n<h1 class=\"align-center\">What is Graphic User Interface (GUI) Testing?</h1>\r\nGraphic User Interface Testing (GUI) testing is the process of ensuring proper functionality of the graphical user interface (GUI) for a specific application. This involves making sure it behaves in accordance with its requirements and works as expected across the range of supported platforms and devices.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">GUI Testing Approaches</span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Manual Based Testing: </span>Under this approach, the screens of the application are checked manually by testers. They are being confirmed with the requirements that are stated in the business requirements. The UI is also matched with the designs that are provided during the documentation phase of the application.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Automation Based Testing:</span> Automated user interface testing approach is performed in 2 steps i.e, record and play. While doing this, the steps are captured/recorded with the help of the automation tool while performing the first round of testing. And during playback, that recorded steps script is run when the application is under test. If the position of any button or image changes that during the playback, it does not get tracked and the test fails.</p>\r\n<h1 class=\"align-center\">What Features Should I Look for in a GUI Testing Tool?</h1>\r\nObviously the first answer is to choose a tool that can automate the specific technologies you’re testing, otherwise your automation is doomed to fail. Secondly you should choose a tool that has some of the following characteristics:\r\n<ul><li>Good interface testing software that makes it easy for your automation engineers to write tests, make changes, find issues and be able to deploy the tests on all the environments you need to test.</li><li>A tool that is well supported by the manufacturer and is keeping up to date with new web browsers, operating systems and technologies that you will need to test in the future. </li><li>An object abstraction layer so that your test analysts can write the tests in the way most natural for them and your automation engineers can create objects that point to physical items in the application that will be robust and not change every time you resort a grid or add data to the system.</li><li>Support for data-driven testing since as we have discussed, one of the big benefits of automation is the ability to run the same test thousands of times with different sets of data.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Interface_Testing.png","alias":"interface-testing"},"655":{"id":655,"title":"Perl Development","description":" Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages. "Perl" refers to Perl 5, but from 2000 to 2019 it also referred to its redesigned "sister language", Perl 6, before the latter's name was officially changed to Raku in October 2019.\r\nThough Perl is not officially an acronym, there are various backronyms in use, including "Practical Extraction and Reporting Language". Perl was originally developed by Larry Wall in 1987 as a general-purpose Unix scripting language to make report processing easier. Since then, it has undergone many changes and revisions. Raku, which began as a redesign of Perl 5 in 2000, eventually evolved into a separate language. Both languages continue to be developed independently by different development teams and liberally borrow ideas from one another.\r\nThe Perl languages borrow features from other programming languages including C, shell script (sh), AWK, and sed; Wall also alludes to BASIC and Lisp in the introduction to Learning Perl (Schwartz & Christiansen) and so on. They provide text processing facilities without the arbitrary data-length limits of many contemporary Unix command line tools, facilitating manipulation of text files. Perl 5 gained widespread popularity in the late 1990s as a CGI scripting language, in part due to its unsurpassed regular expression and string parsing abilities.\r\nIn addition to CGI, Perl 5 is used for system administration, network programming, finance, bioinformatics, and other applications, such as for GUIs. It has been nicknamed "the Swiss Army chainsaw of scripting languages" because of its flexibility and power, and also its ugliness. In 1998, it was also referred to as the "duct tape that holds the Internet together," in reference to both its ubiquitous use as a glue language and its perceived inelegance.\r\nAccording to Wall, Perl has two slogans. The first is "There's more than one way to do it," commonly known as TMTOWTDI. The second slogan is "Easy things should be easy and hard things should be possible".\r\nThe overall structure of Perl derives broadly from C. Perl is procedural in nature, with variables, expressions, assignment statements, brace-delimited blocks, control structures, and subroutines.\r\nPerl also takes features from shell programming. All variables are marked with leading sigils, which allow variables to be interpolated directly into strings. However, unlike the shell, Perl uses sigils on all accesses to variables, and unlike most other programming languages that use sigils, the sigil doesn't denote the type of the variable but the type of the expression. So for example, to access a list of values in a hash, the sigil for an array ("@") is used, not the sigil for a hash ("%"). Perl also has many built-in functions that provide tools often used in shell programming (although many of these tools are implemented by programs external to the shell) such as sorting, and calling operating system facilities.\r\nPerl takes lists from Lisp, hashes ("associative arrays") from AWK, and regular expressions from sed. These simplify and facilitate many parsing, text-handling, and data-management tasks. Also shared with Lisp are the implicit return of the last value in a block, and the fact that all statements have a value, and thus are also expressions and can be used in larger expressions themselves.\r\nAll versions of Perl do automatic data-typing and automatic memory management. The interpreter knows the type and storage requirements of every data object in the program; it allocates and frees storage for them as necessary using reference counting (so it cannot deallocate circular data structures without manual intervention). Legal type conversions — for example, conversions from number to string — are done automatically at run time; illegal type conversions are fatal errors.","materialsDescription":" <span style=\"font-weight: bold;\">What is Perl?</span>\r\n<ul><li>Perl is a stable, cross-platform programming language.</li><li>Though Perl is not officially an acronym few people used it as <span style=\"font-weight: bold;\">Practical Extraction and Report Language</span>.</li><li>It is used for mission-critical projects in the public and private sectors.</li><li>Perl is an Open Source software, licensed under its Artistic License, or the <span style=\"font-style: italic;\">GNU General Public License (GPL)</span>.</li><li>Perl was created by Larry Wall.</li><li>Perl 1.0 was released to Usenet's alt.comp.sources in 1987.</li><li>Perl is listed in the Oxford English Dictionary.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the features of Perl programming?</span>\r\n<ul><li>Perl takes the best features from other languages, such as C, awk, sed, sh, and BASIC, among others.</li><li>Perl's database integration interface DBI supports third-party databases including Oracle, Sybase, Postgres, MySQL, and others.</li><li>Perl works with HTML, XML, and other mark-up languages.</li><li>Perl supports Unicode.</li><li>Perl is Y2K compliant.</li><li>Perl supports both procedural and object-oriented programming.</li><li>Perl interfaces with external C/C++ libraries through XS or SWIG.</li><li>Perl is extensible. There are over 20,000 third party modules available from the Comprehensive Perl Archive Network (CPAN).</li><li>The Perl interpreter can be embedded into other systems.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the benefits of Perl programming in using it in web-based applications?</span>\r\n<ul><li>Perl used to be the most popular web programming language due to its text manipulation capabilities and rapid development cycle.</li><li>Perl is widely known as " the duct-tape of the Internet".</li><li>Perl can handle encrypted Web data, including e-commerce transactions.</li><li>Perl can be embedded into web servers to speed up processing by as much as 2000%.</li><li>Perl's mod_perl allows the Apache web server to embed a Perl interpreter.</li><li>Perl's DBI package makes web-database integration easy.</li></ul>\r\n<span style=\"font-weight: bold;\">Is Perl a case sensitive language?</span>\r\nYes. Perl is a case sensitive programming language.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Perl_Development.png","alias":"perl-development"},"657":{"id":657,"title":"Oracle Applications Development","description":" Oracle Applications comprise the applications software or business software of the Oracle Corporation. The term refers to the non-database and non-middleware parts.\r\nOracle sells many functional modules that use the Oracle RDBMS as a back-end, notably Oracle Financials, Oracle HRMS, Oracle SCM, Oracle Projects, Oracle CRM and Oracle Procurement.\r\nOracle initially launched its application suite with financial software in the late 1980s. The offering as of 2009 extends to supply-chain management, human resource management, warehouse-management, customer-relationship management, call-center services, product lifecycle management, and many other areas. Both in-house expansion and the acquisition of other companies have vastly expanded Oracle's application software business.\r\nOracle released Oracle E-Business Suite (EBS/e-BS) Release 12 (R12) – a bundling of several Oracle Applications – in February 2007. The release date coincided with new releases of other Oracle-owned products: JD Edwards EnterpriseOne, Siebel Systems and PeopleSoft.","materialsDescription":" <span style=\"font-weight: bold;\">What is Oracle E-Business Suite?</span>\r\nOracle E-Business Suite is a replicated integrated application software package manufactured by Oracle, which includes functional blocks ERP, CRM, PLM. Designed to automate the main activities of enterprises, including finance, production, personnel management, logistics, marketing, sales and sales, customer service, relationships with suppliers and customers, and others.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Oracle_Applicatons_Development.png","alias":"oracle-applications-development"},"659":{"id":659,"title":"SAP Applications Development","description":" ABAP is the SAP programming language. The syntax of the programming language is similar to COBOL, but it is very different from languages such as Java, C, or Python. Since ABAP is a non-standardized programming language, it is only used in connection with SAP programs. However, ABAP has powerful concepts for developing business applications in this environment. Since 1990, ABAP has also been a so-called object-oriented programming language.\r\nAs an SAP developer, you work closely with other software engineers. Together, you will develop, implement and maintain the modules and features of the software that works for your customer or employer. Specifically, these can be architectures, applications, and specific solutions.\r\nABAP is one of the many application-specific fourth-generation languages (4GLs) first developed in the 1980s. It was originally the report language for SAP R/2, a platform that enabled large corporations to build mainframe business applications for materials management and financial and management accounting. ABAP establish integration between independent software.\r\nABAP used to be an abbreviation of Allgemeiner Berichts-Aufbereitungs-Prozessor, German for "generic report preparation processor", but was later renamed to the English Advanced Business Application Programming. ABAP was one of the first languages to include the concept of Logical Databases (LDBs), which provides a high level of abstraction from the basic database level(s),which supports every platform, language and units.\r\nThe ABAP language was originally used by developers to develop the SAP R/3 platform. It was also intended to be used by SAP customers to enhance SAP applications – customers can develop custom reports and interfaces with ABAP programming. The language was geared towards more technical customers with programming experience.\r\nABAP remains as the language for creating programs for the client-server R/3 system, which SAP first released in 1992. As computer hardware evolved through the 1990s, more and more of SAP's applications and systems were written in ABAP. By 2001, all but the most basic functions were written in ABAP. In 1999, SAP released an object-oriented extension to ABAP called ABAP Objects, along with R/3 release 4.6.\r\nSAP's current development platform NetWeaver supports both ABAP and Java.\r\nABAP has an abstraction between the business applications, the operating system and database. This ensures that applications do not depend directly upon a specific server or database platform and can easily be ported from one platform to another.\r\nSAP Netweaver currently runs on UNIX (AIX, HP-UX, Solaris, Linux), Microsoft Windows, i5/OS on IBM System i (formerly iSeries, AS/400), and z/OS on IBM System z (formerly zSeries, S/390). Supported databases are HANA, SAP ASE (formerly Sybase), IBM DB2, Informix, MaxDB, Oracle, and Microsoft SQL Server (support for Informix was discontinued in SAP Basis release 7.00).","materialsDescription":" <span style=\"font-weight: bold;\">What is a SAP Developer?</span>\r\nSAP is the #1 creator of business software solutions. It's the fourth largest software company globally -- just a couple notches behind Microsoft. What this means is that there's a huge market for developers who are knowledgeable of SAP solutions -- outside of the parent company and outside of Germany. Among these solutions are SAP Business Warehouse, SAP Business Objects, and Sybase mobile.\r\nSAP has contributed to one thing that most software companies haven’t – its own computer language. One possible role for a SAP developer is to write programs using Advanced Business Application Programming (ABAP). Some SAP projects are also developed in Java.\r\nMany U.S. companies use SAP technologies. By perusing job posting, you may find some big names: Costco, REI, Nike, even Raytheon.\r\nThere are a lot of different roles from SAP systems analyst to SAP architect. It can be surprising just how much know-how and education these positions require.\r\n<span style=\"font-weight: bold;\">Education</span>\r\nThe bachelor’s degree is the typical entry point for a career in software development. Industry-specific knowledge can be important – in the case of a SAP developer, it is often finance or business.\r\nMany nationally advertised SAP positions favor candidates with master’s degrees; depending on the position, the master’s maybe in business administration or a more technical field.\r\nHigher-level software development positions typically ask for experience taking a software product through the lifecycle. They may ask for knowledge of specific models -- e.g. the Full Lifecycle Model.\r\nThose with SAP expertise often go on to work as consultants. There are two types: functional consultant and technical consultant. The functional consultant is focused on meeting business needs and the technical consultant, well you can guess what their focus is.\r\n<span style=\"font-weight: bold;\">SAP Certification</span>\r\nLike its "big brothers" Microsoft and Oracle, SAP offers a host of certifications. They are available in technology, development, and application.\r\nIt is possible to simultaneously earn a master's degree and SAP certification. The masters may be in any of several fields, including business engineering and computer science.\r\nJob advancement takes more than just technical skills. A 2012 survey of SAP professionals asked what skills were most important for advancement and raises. Project management topped the list. Business skills and communication skills were also seen as important.\r\nDevelopers can find lots of resources on the site of the SAP Community Network.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_SAP_Applications_Development.png","alias":"sap-applications-development"},"661":{"id":661,"title":"Sharepoint Development","description":" SharePoint is a web-based collaborative platform that integrates with Microsoft Office. Launched in 2001, SharePoint is primarily sold as a document management and storage system, but the product is highly configurable and usage varies substantially among organizations.\r\nSharePoint infuses AI into the mobile app experience to keep you focused and productive while on the go. AI builds an understanding of what you work on, how you work, and how your colleagues' work relates to you. When you need expertise, content, or resources when you're on the go, SharePoint is a great place to start looking.\r\nSharePoint is comprised of a multipurpose set of technologies that has tight integration with Office 365 as well as handy document management capabilities.\r\nAccording to Microsoft, SharePoint is used by 78% of Fortune 500 companies. Between 2006 and 2011, Microsoft sold over 36.5 million user licenses.\r\nSharePoint is a collection of software products and components that includes:\r\n<ul><li>a set of web applications for organizing collaboration;</li><li>functionality for creating web portals;</li><li>module for searching information in documents and information systems;</li><li>workflow management functionality and enterprise-wide content management system;</li><li>module for creating forms for entering information;</li><li>functionality for business analysis.</li></ul>\r\nMicrosoft states that SharePoint has 190 million users across 200,000 customer organizations.","materialsDescription":" <span style=\"font-weight: bold;\">Why is Microsoft SharePoint important?</span>\r\nSharePoint’s core functions are\r\n<ul><li>a) to store documents in a more effective format than a regular folder system, and</li><li>b) bring an organization together so that everyone receives critical information that’s relevant to them.</li></ul>\r\nHere are some benefits your organization can get from using SharePoint:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Context around documents and folders</span></span>\r\nA traditional document storage facility is usually a folder on a server somewhere. The reason why SharePoint is more effective than the traditional method is that it brings context around the folder itself by tracking versions of the document. For example, in a traditional folder setup, you can’t have a running version history for each document or see any changes to the file name. Whereas with SharePoint, there’s more information provided about the file. It’s not just some file sitting in a folder; it’s an evolving piece of information that has a history as well as context.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Enable constant communication with all staff</span></span>\r\nIn the past, you might send a group email and copy everyone. The problem with that approach is a lot of information gets ignored or even lost, so some people might not get the information they need. For example, maybe you lost a company document and you missed an important discussion. Or maybe you did read it but afterward, it was very difficult to find and reference that information. SharePoint brings collaboration to the table so that all staff can see the important information and communication accordingly.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Store all information in a central location</span></span>\r\nThis can range from things such as updates from the CEO to important meetings or events. SharePoint brings all the information to one internal place so staff can quickly find the information they need. Other use cases might be general warnings about particular customers or even incidents that everyone needs to be aware of. With SharePoint, simply post the message and everyone can access it from there. Forget email or announcement boards; simply post it on SharePoint.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Encourage collaboration</span></span>\r\nSharePoint is really designed around getting the organization into a central point where they can collaborate. This is particularly important for organizations that are not geographically connected. With some branches working in a very isolated format, SharePoint provides staff with the ability to connect with each other via a portal. Where in the past some staff might only interact with the company during a company meeting, SharePoint brings those people together so everyone can work together, all the time. Collaboration fosters innovation and builds a company culture that spawns creative ideas.\r\n<span style=\"font-weight: bold;\">What are the challenges of Microsoft SharePoint?</span>\r\n<span style=\"font-weight: bold;\">Support for certain industry standards.</span> SharePoint's records-management capabilities give it the ability to save documents for legal or historical reasons. This can be a challenge in some industries (medical and financial) where there are complex regulatory requirements for record-keeping. In those cases, you should consult a professional about an industry-specific solution.\r\n<span style=\"font-weight: bold;\">Customize out of the box with third-party solutions.</span> Some organizations won’t find what they need out of the box. A third-party solution can help you build something you want. This can be easily achieved if you work with an IT service provider that has SharePoint experience. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Sharepoint_Development.png","alias":"sharepoint-development"},"665":{"id":665,"title":"User Interface Development","description":" User interface design (UI) or user interface engineering is the design of user interfaces for machines and software, such as computers, home appliances, mobile devices, and other electronic devices, with the focus on maximizing usability and the user experience. The goal of user interface design is to make the user's interaction as simple and efficient as possible, in terms of accomplishing user goals (user-centered design).\r\nGood user interface design facilitates finishing the task at hand without drawing unnecessary attention to itself. Graphic design and typography are utilized to support its usability, influencing how the user performs certain interactions and improving the aesthetic appeal of the design; design aesthetics may enhance or detract from the ability of users to use the functions of the interface. The design process must balance technical functionality and visual elements (e.g., mental model) to create a system that is not only operational but also usable and adaptable to changing user needs.\r\nInterface design is involved in a wide range of projects from computer systems, to cars, to commercial planes; all of these projects involve much of the same basic human interactions yet also require some unique skills and knowledge. As a result, designers tend to specialize in certain types of projects and have skills centered on their expertise, whether it is a software design, user research, web design, or industrial design.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Graphical User Interface?</span>\r\nThe graphical user interface, developed in the late 1970s by the Xerox Palo Alto research laboratory and deployed commercially in Apple’s Macintosh and Microsoft’s Windows operating systems, was designed as a response to the problem of inefficient usability in early, text-based command-line interfaces for the average user.\r\nGraphical user interfaces would become the standard of user-centered design in software application programming, providing users the capability to intuitively operate computers and other electronic devices through the direct manipulation of graphical icons such as buttons, scroll bars, windows, tabs, menus, cursors, and the mouse pointing device. Many modern graphical user interfaces feature touchscreen and voice-command interaction capabilities.\r\n<span style=\"font-weight: bold;\">How Does a Graphical User Interface Work?</span>\r\nGraphical user interface design principles conform to the model–view–controller software pattern, which separates internal representations of information from the manner in which information is presented to the user, resulting in a platform where users are shown which functions are possible rather than requiring the input of command codes. Users interact with information by manipulating visual widgets, which are designed to respond in accordance with the type of data they hold and support the actions necessary to complete the user’s task.\r\nThe appearance, or “skin,” of an operating system or application software may be redesigned at will due to the nature of graphical user interfaces being independent from application functions. Applications typically implement their own unique graphical user interface display elements in addition to graphical user interface elements already present on the existing operating system. A typical graphical user interface also includes standard formats for representing graphics and text, making it possible to share data between applications running under common graphical user interface design software.\r\nGraphical user interface testing refers to the systematic process of generating test cases in order to evaluate the functionality of the system and its design elements. Graphical user interface testing tools, which are either manual or automated and typically implemented by third-party operators, are available under a variety of licenses and are supported by a variety of platforms. Popular examples include: Tricentis Tosca, Squish GUI Tester, Unified Functional Testing (UFT), Maveryx, Appium, and eggPlant Functional.\r\n<span style=\"font-weight: bold;\">Graphical User Interface Examples</span>\r\nSketchpad, believed to be the first graphical computer-aided design program, was developed in 1962 by Ivan Sutherland while he was at MIT, and consisted of a light pen that enabled users to create and manipulate objects in engineering drawings in real-time with coordinated graphics.\r\nModern operating systems and graphical user interfaces are incorporated into nearly every interactive application, such as ATMs, self-service checkouts, airline self-ticketing and check-in, video games, smartphones, and desktops. Some popular, modern graphical user interface examples include Microsoft Windows, macOS, Ubuntu Unity, and GNOME Shell for desktop environments, and Android, Apple's iOS, BlackBerry OS, Windows 10 Mobile, Palm OS-WebOS, and Firefox OS for smartphones.\r\n<span style=\"font-weight: bold;\">Advantages of Graphical User Interfaces</span>\r\nThe advantage of a graphical user interface is a stark improvement in useability for the average person. The features of a graphical user interface leverage familiar metaphors, such as drag-and-drop for transferring files, and use familiar icons, such as a trash bin for deleted files, creating an environment in which computer operations are intuitive and easily mastered without any prior practice or knowledge of computing machinery or languages. Graphical user interface applications are self descriptive, feedback is typically immediate, and visual cues encourage and steer discoverability.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_User_Interface_Development.png","alias":"user-interface-development"},"669":{"id":669,"title":"MySQL Development","description":" MySQL is an open-source relational database management system (RDBMS). Its name is a combination of "My", the name of co-founder Michael Widenius's daughter, and "SQL", the abbreviation for Structured Query Language.\r\nMySQL is free and open-source software under the terms of the GNU General Public License, and is also available under a variety of proprietary licenses. MySQL was owned and sponsored by the Swedish company MySQL AB, which was bought by Sun Microsystems (now Oracle Corporation). In 2010, when Oracle acquired Sun, Widenius forked the open-source MySQL project to create MariaDB.\r\nMySQL is a component of the LAMP web application software stack (and others), which is an acronym for Linux, Apache, MySQL, Perl/PHP/Python. MySQL is used by many database-driven web applications, including Drupal, Joomla, phpBB, and WordPress. MySQL is also used by many popular websites, including Facebook, Flickr, MediaWiki, Twitter, and YouTube.\r\nMySQL is written in C and C++. Its SQL parser is written in yacc, but it uses a home-brewed lexical analyzer. MySQL works on many system platforms, including AIX, BSDi, FreeBSD, HP-UX, eComStation, i5/OS, IRIX, Linux, macOS, Microsoft Windows, NetBSD, Novell NetWare, OpenBSD, OpenSolaris, OS/2 Warp, QNX, Oracle Solaris, Symbian, SunOS, SCO OpenServer, SCO UnixWare, Sanos and Tru64. A port of MySQL to OpenVMS also exists.\r\nThe MySQL server software itself and the client libraries use dual-licensing distribution. They are offered under GPL version 2, or a proprietary license.\r\nSupport can be obtained from the official manual. Free support additionally is available in different IRC channels and forums. Oracle offers paid support via its MySQL Enterprise products. They differ in the scope of services and in price. Additionally, a number of third party organisations exist to provide support and services, including MariaDB and Percona.\r\nMySQL has received positive reviews, and reviewers noticed it "performs extremely well in the average case" and that the "developer interfaces are there, and the documentation (not to mention feedback in the real world via Web sites and the like) is very, very good". It has also been tested to be a "fast, stable and true multi-user, multi-threaded sql database server".","materialsDescription":" <span style=\"font-weight: bold; \">What is MySQL?</span>\r\n<span style=\"font-style: italic; \">MySQL is a database management system.</span>\r\nA database is a structured collection of data. It may be anything from a simple shopping list or a picture gallery or the vast amounts of information in a corporate network. To add, access, and process data stored in a computer database, you need a database management system such as MySQL Server. Since computers are very good at handling large amounts of data, database management plays a central role in computing, as stand-alone utilities, or as parts of other applications.\r\n<span style=\"font-style: italic; \">MySQL is a relational database management system.</span>\r\nA relational database stores data in separate tables rather than putting all the data in one big storeroom. This adds speed and flexibility. The tables are linked by defined relations making it possible to combine data from several tables on request. The SQL part of "MySQL" stands for "Structured Query Language" the most common standardised language used to access databases.\r\nMySQL, the most popular Open Source SQL database, is developed and provided by MySQL AB. The MySQL web site ( http://www.mysql.com ) provides the latest information about MySQL software and MySQL AB.\r\n<span style=\"font-weight: bold;\">Why do I need MySQL?</span>\r\nIf you have any information such as products, dates, customers, pictures, or any data that is not static, a database is an efficient way to manage that information. Sites that contain message boards, guest books, dynamic galleries, contact lists, or online product information can greatly benefit by storing their information on our fast, reliable and secure database server.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MySQL_Development.png","alias":"mysql-development"},"671":{"id":671,"title":"Oracle Database Development","description":" Oracle Database (commonly referred to as Oracle RDBMS or simply as Oracle) is a proprietary multi-model database management system produced and marketed by Oracle Corporation.\r\nIt is a database commonly used for running online transaction processing (OLTP), data warehousing (DW) and mixed (OLTP & DW) database workloads. The latest generation, Oracle Database 19c, is available on-prem, on-cloud, or in a hybrid-Cloud environment. 19c may also be deployed on Oracle Engineered Systems (e.g. Exadata) on-prem, on Oracle (public) cloud or (private) cloud at a customer. At Openworld 2017 in San Francisco, Executive Chairman of the Board and CTO, Larry Ellison announced the next database generation, Oracle Autonomous Database.\r\nA 2016 Gartner report claimed to show Oracle holding #1 RDBMS market share worldwide based on the revenue share ahead of its four closest competitors – Microsoft, IBM, SAP, and Teradata.\r\nIn the market for relational databases, Oracle Database competes against commercial products such as IBM's DB2 UDB and Microsoft SQL Server. Oracle and IBM tend to battle for the mid-range database market on Unix and Linux platforms, while Microsoft dominates the mid-range database market on Microsoft Windows platforms. However, since they share many of the same customers, Oracle and IBM tend to support each other's products in many middleware and application categories (for example WebSphere, PeopleSoft, and Siebel Systems CRM), and IBM's hardware divisions work closely with Oracle on performance-optimizing server-technologies (for example, Linux on IBM Z). Niche commercial competitors include Teradata (in data warehousing and business intelligence), Software AG's ADABAS, Sybase, and IBM's Informix, among many others.\r\nIncreasingly, the Oracle database products compete against such open-source software relational and non-relational database systems like PostgreSQL, MongoDB, Couchbase, Neo4j, and others. Oracle acquired Innobase, supplier of the InnoDB codebase to MySQL, in part to compete better against open source alternatives, and acquired Sun Microsystems, owner of MySQL, in 2010. Database products licensed as open-source are, by the legal terms of the Open Source Definition, free to distribute and free of royalty or other licensing fees. ","materialsDescription":" <span style=\"font-weight: bold;\">Why is Oracle Such a Popular Relational Database?</span>\r\nIn the Oracle Bigdata base, a collection of data is treated as one. The purpose of a database is to store and retrieve organized information. In general, an Oracle server manages a huge amount of data in a multiuser environment so that many users can concurrently access the same data and all this is delivered with high performance. Prevention of unauthorized access and efficient solutions for failure recovery is also provided by the Oracle server.\r\nThe most flexible and cost-effective way to manage information and applications is offered by Oracle Database and is the first database designed for enterprise grid computing. Enterprise grid computing enables the creation of a large pool of industry-standard, modular storage, and servers.\r\nThis architecture enables every new system to be quickly provisioned from the collection or pool of components. Peak workloads are not required since capacity can easily be added or reallocated from the resource pool as required.\r\nThe database has logical and physical structures. Because the physical and logical structures are separate, the physical storage of data can be managed without affecting the access to logical storage structures.\r\n<span style=\"font-weight: bold;\">Oracle Database Features</span>\r\nFollowing are the features of Oracle Database:\r\n<ul><li>Scalability and Performance;</li><li>Manageability;</li><li>Database Backup and Recovery;</li><li>High Availability;</li><li>Business Intelligence;</li><li>Content Management;</li><li>Security;</li><li>Data Integrity and Triggers;</li><li>Information Integration.</li></ul>\r\n<span style=\"font-weight: bold;\">Oracle Database Application Development</span>\r\nOracle Database is a simple, widely understood, unified data model. It is used as a standalone in many applications, but it is also invoked directly from Java (JDBC), Oracle Call Interface (OCI), Oracle C++ Call Interface (OCCI), or XSU (XML SQL Utility). Stored packages, procedures, and triggers can all be written in PL/SQL or in Java.\r\nSQL and PL/SQL are the core of Oracle’s application development stack. Most enterprises run SQL in back-ends and Web applications accessing databases do so by utilizing SQL (wrapped by Java classes as JDBC). Enterprise Application Integration applications generate XML from SQL queries, and content repositories are built on top of SQL tables.\r\nOracle server covers the following:\r\n<ul><li> Oracle SQL;</li><li>PL/SQL;</li><li>Application Programming Languages (APIs);</li><li>Transactions;</li><li>Datatypes;</li><li>Globalization.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Oracle_Datase_Development.png","alias":"oracle-database-development"},"673":{"id":673,"title":"MS SQL Development","description":" Microsoft SQL Server is a relational database management system, or RDBMS, that supports a wide variety of transaction processing, business intelligence and analytics applications in corporate IT environments. It's one of the three market-leading database technologies, along with Oracle Database and IBM's DB2.\r\nLike other RDBMS technologies, SQL Server is primarily built around a row-based table structure that connects related data elements in different tables to one another, avoiding the need to redundantly store data in multiple places within a database. The relational model also provides referential integrity and other integrity constraints to maintain data accuracy; those checks are part of a broader adherence to the principles of atomicity, consistency, isolation, and durability - collectively known as the ACID properties and designed to guarantee that database transactions are processed reliably.\r\nThe advanced security features supported in all editions of Microsoft SQL Server starting with SQL Server 2016 SP1 include three technologies added to the 2016 release: Always Encrypted, which lets user update encrypted data without having to decrypt it first; row-level security, which enables data access to be controlled at the row level in database tables; and dynamic data masking, which automatically hides elements of sensitive data from users without full access privileges.","materialsDescription":" <span style=\"font-weight: bold;\">What is MS SQL?</span>\r\nMS SQL is short for Microsoft SQL Server. It is a relational web hosting database that is used to store web site information like blog posts or user information. MS SQL is the most popular type of database on Windows servers. It is not free but it has many advanced features that make it suitable for businesses.\r\n<span style=\"font-weight: bold;\">What are the features of MS SQL?</span>\r\nIn basic terms, an MS SQL database is capable of storing any type of data that you want. It will let you quickly store and retrieve information and multiple web site visitors can use it at one time. You will use SQL statements to accomplish all of this. In more technical terms, most versions of MS SQL have the following features:\r\n<ul><li>Buffer management</li><li>Logging and Transaction</li><li>Concurrency and locking</li><li>Replication services</li><li>Analysis services</li><li>Notification services</li><li>Integration services</li><li>Full-text search service</li><li>Stored procedures</li><li>Triggers</li><li>Views</li><li>Sub-SELECTs (i.e. nested SELECTs)</li></ul>\r\n<span style=\"font-weight: bold;\">What is MS SQL used for?</span>\r\nMS SQL is the database of choice for web applications on a Windows platform (using .NET or ASP). These languages make is extremely easy to connect to the MS SQL database. It is also used for many popular content management systems and other scripts.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MS_SQL_Development.png","alias":"ms-sql-development"},"675":{"id":675,"title":"MariaDB Development","description":" MariaDB is a community-developed, commercially supported fork of the MySQL relational database management system (RDBMS), intended to remain free and open-source software under the GNU General Public License. Development is led by some of the original developers of MySQL, who forked it due to concerns over its acquisition by Oracle Corporation in 2009.\r\nMariaDB intended to maintain high compatibility with MySQL, ensuring a drop-in replacement capability with library binary parity and exact matching with MySQL APIs and commands. However, new features diverge more. It includes new storage engines like Aria, ColumnStore, and MyRocks.\r\nIts lead developer/CTO is Michael "Monty" Widenius, one of the founders of MySQL AB and the founder of Monty Program AB. On 16 January 2008, MySQL AB announced that it had agreed to be acquired by Sun Microsystems for approximately $1 billion. The acquisition completed on 26 February 2008. MariaDB is named after Monty's younger daughter, Maria. (MySQL is named after his other daughter, My.)","materialsDescription":" <span style=\"font-weight: bold;\">What is MariaDB?</span>\r\nMariaDB is a backward compatible, drop-in replacement of the MySQL® Database Server. It includes all major open source storage engines.\r\nThe source code for MariaDB is publically available on GitHub. Binaries and packages are also available.\r\n<span style=\"font-weight: bold;\">What is MariaDB's Release Policy and Schedule?</span>\r\nThe <link https://mariadb.com/kb/en/plans/ - external-link-new-window \"Opens internal link in current window\">MariaDB Development Plans</link> page links to plans for future versions of MariaDB.\r\nThe release schedule for upcoming MariaDB releases can be found on the <link https://jira.mariadb.org/projects/MDEV?selectedItem=com.atlassian.jira.jira-projects-plugin:release-page - external-link-new-window \"Opens internal link in current window\">MariaDB Jira release page</link>.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MariaDB_Development.png","alias":"mariadb-development"},"676":{"id":676,"title":"PostgreSQL Development","description":" PostgreSQL, also known as Postgres, is a free and open-source relational database management system (RDBMS) emphasizing extensibility and technical standards compliance. It is designed to handle a range of workloads, from single machines to data warehouses or Web services with many concurrent users. It is the default database for macOS Server, and is also available for Linux, FreeBSD, OpenBSD, and Windows.\r\nPostgreSQL features transactions with Atomicity, Consistency, Isolation, Durability (ACID) properties, automatically updatable views, materialized views, triggers, foreign keys, and stored procedures. PostgreSQL is developed by the PostgreSQL Global Development Group, a diverse group of many companies and individual contributors.\r\nPostgreSQL's developers pronounce PostgreSQL as /ˈpoʊstɡrɛs ˌkjuː ˈɛl/. It is abbreviated as Postgres because of ubiquitous support for the SQL standard among relational databases. Originally named POSTGRES, the name (Post Ingres) refers to the project's origins in that RDBMS that originated at University of California, Berkeley. After a review the PostgreSQL Core Team announced in 2007 that the product would continue to use the name PostgreSQL.\r\nPostgreSQL manages concurrency through multiversion concurrency control (MVCC), which gives each transaction a "snapshot" of the database, allowing changes to be made without affecting other transactions. This largely eliminates the need for read locks, and ensures the database maintains ACID principles. PostgreSQL offers three levels of transaction isolation: Read Committed, Repeatable Read and Serializable. Because PostgreSQL is immune to dirty reads, requesting a Read Uncommitted transaction isolation level provides read committed instead. PostgreSQL supports full serializability via the serializable snapshot isolation (SSI) method.\r\nPostgreSQL is available for the following operating systems: Linux (all recent distributions), 64-bit installers available for macOS (OS X) version 10.6 and newer – Windows (with installers available for 64-bit version; tested on latest versions and back to Windows 2012 R2, while for PostgreSQL version 10 and older a 32-bit installer is available and tested down to 32-bit Windows 2008 R1; compilable by e.g. Visual Studio, version 2013 up up to most recent 2019 version) – FreeBSD, OpenBSD, NetBSD, AIX, HP-UX, Solaris, and UnixWare; and not officially tested: DragonFly BSD, BSD/OS, IRIX, OpenIndiana, OpenSolaris, OpenServer, and Tru64 UNIX. Most other Unix-like systems could also work; most modern do support.\r\nPostgreSQL works on any of the following instruction set architectures: x86 and x86-64 on Windows and other operating systems; these are supported on other than Windows: IA-64 Itanium (external support for HP-UX), PowerPC, PowerPC 64, S/390, S/390x, SPARC, SPARC 64, ARMv8-A (64-bit) and older ARM (32-bit, including older such as ARMv6 in Raspberry Pi), MIPS, MIPSel, and PA-RISC. It was also known to work, but not tested in a while, on Alpha (dropped in 9.5), M68k, M32R, NS32k, and VAX. Beyond these, it is possible to build PostgreSQL for an unsupported CPU by disabling spinlocks.","materialsDescription":" <span style=\"font-weight: bold;\">What is PostgreSQL? How is it pronounced? What is Postgres?</span>\r\nPostgreSQL is pronounced Post-Gres-Q-L.\r\nPostgreSQL is an object-relational database system that has the features of traditional proprietary database systems with enhancements to be found in next-generation DBMS systems. PostgreSQL is free and the complete source code is available.\r\nPostgreSQL development is performed by a team of mostly volunteer developers spread throughout the world and communicating via the Internet. It is a community project and is not controlled by any company.\r\nPostgres is a widely-used nickname for PostgreSQL. It was the original name of the project at Berkeley and is strongly preferred over other nicknames. If you find 'PostgreSQL' hard to pronounce, call it 'Postgres' instead.\r\n<span style=\"font-weight: bold;\">Who controls PostgreSQL?</span>\r\nIf you are looking for a PostgreSQL gatekeeper, central committee, or controlling company, give up --- there isn't one. We do have a core committee and git committers, but these groups are more for administrative purposes than control. The project is directed by the community of developers and users, which anyone can join. All you need to do is subscribe to the mailing lists and participate in the discussions.\r\n<span style=\"font-weight: bold;\">Who is the PostgreSQL Global Development Group?</span>\r\nThe "PGDG" is an international, unincorporated association of individuals and companies who have contributed to the PostgreSQL project. The PostgreSQL Core Team generally act as spokespeople for the PGDG.\r\n<span style=\"font-weight: bold;\">Who is the PostgreSQL Core Team?</span>\r\nA committee of five to seven (currently six) senior contributors to PostgreSQL who do the following for the project: (a) set release dates, (b) handle confidential matters for the project, (c) act as spokespeople for the PGDG when required, and (d) arbitrate community decisions which are not settled by consensus. The current Core Team is listed on top of the contributor's page.\r\n<span style=\"font-weight: bold;\">What about the various PostgreSQL foundations?</span>\r\nWhile the PostgreSQL project utilizes non-profit corporations in the USA, Europe, Brazil, and Japan for fundraising and project coordination, these entities do not own the PostgreSQL code.\r\n<span style=\"font-weight: bold;\">What is the license of PostgreSQL?</span>\r\nPostgreSQL is distributed under a license similar to BSD and MIT. Basically, it allows users to do anything they want with the code, including reselling binaries without the source code. The only restriction is that you not hold us legally liable for problems with the software. There is also the requirement that this copyright appears in all copies of the software.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_PostgesSQL_Development.png","alias":"postgresql-development"},"679":{"id":679,"title":"Games Development","description":" Video game development is the process of creating a video game. The effort is undertaken by a developer, ranging from a single person to an international team dispersed across the globe. Development of traditional commercial PC and console games is normally funded by a publisher, and can take several years to reach completion. Indie games usually take less time and money and can be produced by individuals and smaller developers. The independent game industry has been on the rise, facilitated by the growth of accessible game development software such as Unity platform and Unreal Engine and new online distribution systems such as Steam and Uplay, as well as the mobile game market for Android and iOS devices.\r\nThe first video games, developed in the 1960s, were noncommercial. They required mainframe computers to run and were not available to the general public. Commercial game development began in the '70s with the advent of first-generation video game consoles and early home computers like the Apple I. At that time, owing to low costs and low capabilities of computers, a lone programmer could develop a full and complete game. However, in the late '80s and '90s, ever-increasing computer processing power and heightened expectations from gamers made it difficult for a single person to produce a mainstream console or PC game. The average cost of producing a triple-A video game slowly rose, from US$1–4 million in 2000, to over $5 million in 2006, then to over $20 million by 2010.\r\nMainstream commercial PC and console games are generally developed in phases: first, in pre-production, pitches, prototypes, and game design documents are written; if the idea is approved and the developer receives funding, then full-scale development begins. The development of a complete game usually involves a team of 20–100 individuals with various responsibilities, including designers, artists, programmers, and testers.\r\nThe game revenue from retails is divided among the parties along the distribution chain, such as — developer, publisher, retail, manufacturer and console royalty. Many developers fail to profit from this and go bankrupt. Many developers seek alternative economic models through Internet marketing and distribution channels to improve returns., as through a mobile distribution channel the share of a developer can be up to 70% of the total revenue and through an online distribution channel almost 100%.","materialsDescription":" <span style=\"font-weight: bold;\">How important are games?</span>\r\nThe popularity of smart gadgets like smartphones, tablets etc have opened up a new avenue of entertainment in the software industry and that is the domain of the mobile gaming sector. And now the games market is a big part of the mobile ecosystem and is estimated to reach $14.4 billion by 2017.\r\n<span style=\"font-weight: bold;\">Which are the gaming platforms available?</span>\r\nDifferent smart gadgets are running on different operating systems or platforms and the popular ones are:\r\n<ul><li>Smartphone: Apple iOS, Android, Windows;</li><li>Desktop: PC (Windows), Mac & Linux;</li><li>Online: Browser and Facebook games.</li></ul>\r\n<span style=\"font-weight: bold;\">How I will get revenue from games?</span>\r\nAs soon as your game is live, you will start earning your revenue and profits by selling your game (paid games) and in-app purchases.\r\n<span style=\"font-weight: bold;\">How to start my game development project?</span>\r\nFor staring your own game development project, you just need an initial spark or a core idea that will be worked upon by a team of developers to transform it into an addictive gaming experience.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Games_Development.png","alias":"games-development"},"681":{"id":681,"title":"Software Architecture Design","description":" Software architecture refers to the fundamental structures of a software system and the discipline of creating such structures and systems. Each structure comprises software elements, relations among them, and properties of both elements and relations. The architecture of a software system is a metaphor, analogous to the architecture of a building. It functions as a blueprint for the system and the developing project, laying out the tasks necessary to be executed by the design teams.\r\nSoftware architecture is about making fundamental structural choices that are costly to change once implemented. Software architecture choices include specific structural options from possibilities in the design of the software. For example, the systems that controlled the Space Shuttle launch vehicle had the requirement of being very fast and very reliable. Therefore, an appropriate real-time computing language would need to be chosen. Additionally, to satisfy the need for reliability the choice could be made to have multiple redundant and independently produced copies of the program, and to run these copies on independent hardware while cross-checking results.\r\nDocumenting software architecture facilitates communication between stakeholders, captures early decisions about the high-level design, and allows the reuse of design components between projects.","materialsDescription":" <span style=\"font-weight: bold; \">What is the scope of software architecture?</span>\r\nOpinions vary as to the scope of software architectures:\r\n<ul><li>Macroscopic system structure: this refers to architecture as a higher-level abstraction of a software system that consists of a collection of computational components together with connectors that describe the interaction between these components.</li><li>The important stuff—whatever that is: this refers to the fact that software architects should concern themselves with those decisions that have a high impact on the system and its stakeholders.</li><li>That is fundamental to understanding a system in its environment.</li><li>Things that people perceive as hard to change: since designing the architecture takes place at the beginning of a software system's lifecycle, the architect should focus on decisions that "have to" be right the first time. Following this line of thought, architectural design issues may become non-architectural once their irreversibility can be overcome.</li><li>A set of architectural design decisions: software architecture should not be considered merely a set of models or structures, but should include the decisions that lead to these particular structures, and the rationale behind them. This insight has led to substantial research into software architecture knowledge management.</li></ul>\r\n<span style=\"font-weight: bold; \">What are the characteristics of software architecture?</span>\r\nSoftware architecture exhibits the following:\r\n<span style=\"font-weight: bold; \">A multitude of stakeholders:</span> software systems have to cater to a variety of stakeholders such as business managers, owners, users, and operators. These stakeholders all have their own concerns with respect to the system. Balancing these concerns and demonstrating that they are addressed is part of designing the system. This implies that architecture involves dealing with a broad variety of concerns and stakeholders, and has a multidisciplinary nature.\r\n<span style=\"font-weight: bold; \">Separation of concerns:</span> the established way for architects to reduce complexity is to separate the concerns that drive the design. Architecture documentation shows that all stakeholder concerns are addressed by modeling and describing the architecture from separate points of view associated with the various stakeholder concerns. These separate descriptions are called architectural views.\r\n<span style=\"font-weight: bold; \">Quality-driven:</span> classic software design approaches (e.g. Jackson Structured Programming) were driven by required functionality and the flow of data through the system, but the current insight is that the architecture of a software system is more closely related to its quality attributes such as fault-tolerance, backward compatibility, extensibility, reliability, maintainability, availability, security, usability, and other such –ilities. Stakeholder concerns often translate into requirements on these quality attributes, which are variously called non-functional requirements, extra-functional requirements, behavioral requirements, or quality attribute requirements.\r\n<span style=\"font-weight: bold; \">Recurring styles:</span> like building architecture, the software architecture discipline has developed standard ways to address recurring concerns. These "standard ways" are called by various names at various levels of abstraction. Common terms for recurring solutions are architectural style, tactic, reference architecture and architectural pattern.\r\n<span style=\"font-weight: bold; \">Conceptual integrity:</span> a term introduced by Fred Brooks in The Mythical Man-Month to denote the idea that the architecture of a software system represents an overall vision of what it should do and how it should do it. This vision should be separated from its implementation. The architect assumes the role of "keeper of the vision", making sure that additions to the system are in line with the architecture, hence preserving conceptual integrity.\r\n<span style=\"font-weight: bold; \">Cognitive constraints:</span> an observation first made in a 1967 paper by computer programmer Melvin Conway that organizations which design systems are constrained to produce designs which are copies of the communication structures of these organizations. As with conceptual integrity, it was Fred Brooks who introduced it to a wider audience when he cited the paper and the idea in his elegant classic The Mythical Man-Month, calling it "Conway's Law."\r\n<span style=\"font-weight: bold;\">What is the motivation of software architecture?</span>\r\nSoftware architecture is an "intellectually graspable" abstraction of a complex system. This abstraction provides a number of benefits:\r\n<ul><li><span style=\"font-style: italic;\">It gives a basis for an analysis of software systems' behavior before the system has been built.</span> The ability to verify that a future software system fulfills its stakeholders' needs without actually having to build it represents substantial cost-saving and risk-mitigation. A number of techniques have been developed to perform such analyses, such as ATAM.</li><li><span style=\"font-style: italic;\">It provides a basis for the re-use of elements and decisions.</span> A complete software architecture or parts of it, like individual architectural strategies and decisions, can be re-used across multiple systems whose stakeholders require similar quality attributes or functionality, saving design costs and mitigating the risk of design mistakes.</li><li><span style=\"font-style: italic;\">It supports early design decisions that impact a system's development, deployment, and maintenance life.</span> Getting the early, high-impact decisions right is important to prevent schedule and budget overruns.</li><li><span style=\"font-style: italic;\">It facilitates communication with stakeholders, contributing to a system that better fulfills their needs.</span> Communicating about complex systems from the point of view of stakeholders helps them understand the consequences of their stated requirements and the design decisions based on them. Architecture gives the ability to communicate about design decisions before the system is implemented when they are still relatively easy to adapt.</li><li><span style=\"font-style: italic;\">It helps in risk management.</span> Software architecture helps to reduce risks and the chance of failure.</li><li><span style=\"font-style: italic;\">It enables cost reduction.</span> Software architecture is a means to manage risk and costs in complex IT projects.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Software_Architecture_Design.png","alias":"software-architecture-design"},"806":{"id":806,"title":"Functional testing tools","description":"Functional testing is the stage of product development when software is tested for compliance. Functional testing can be manual or automatic. Functional testing software usually provides some input so that you can evaluate the output to see how the software works.\r\nFunctional testing is one of the types of testing aimed at checking the compliance of the functional requirements of the software with its actual characteristics. The main objective of functional testing is to confirm that the developed software product has all the functionality required by the customer.\r\nDepending on the purpose, functional testing may be conducted:\r\nBased on the functional requirements specified in the requirements specification. At the same time, test cases are created for testing (test cases), the compilation of which takes into account the priority of software functions that must be covered by tests. Thus, we can make sure that all the functions of the developed product work correctly with different types of input data, their combinations, quantities, etc.\r\nBased on the business processes that the application must provide. In this case, we are not interested in the performance of individual software functions, as we are the correctness of the operations performed, in terms of system usage scenarios. Thus, testing in this case will be based on options for using the system (use cases).\r\nThe aspects described above are implemented using the following types and levels of testing:\r\n<ul><li>Modular (component).</li><li>Integration.</li><li>Systemic.</li><li>Regression.</li><li>Acceptance.</li></ul>\r\nAss well, there are many other types that provide complete and comprehensive testing of functional requirements for software.\r\nChoosing the right functional testing tool for projects is key. Highly qualified testing professionals constantly update the set of tools used, as well as develop their own.","materialsDescription":"<span style=\"font-weight: bold;\">What is functional testing?</span>\r\nFunctional testing is a segment of security testing. The security mechanisms of the system are tested, under operational conditions, for correct operation.\r\nFunctional testing verifies that the end user gets what they want from the application. It involves testing to ensure that the tasks or the steps required for complete functionality work well. Functional testing involves testing of functional requirements as per the specification.\r\n<span style=\"font-weight: bold;\">What are the differences between system and functional testing?</span>\r\nSystem testing has classifications like functional and non-functional testing. Hence the functional testing is a part of system testing.\r\nSystem testing allows the testers to test the typical end product. Every single module, interface and every minute detail are needed to be tested in system testing.\r\nFunctional testing is aimed at testing the functionalities of the product being tested. These functionalities include volume, stress, load, security, scalability, performance, etc. Hardware and software are not concerned with functional testing.\r\nFunctional testing involves testing of functional requirements as per the specification. On the other hand, system testing involves testing the system as a whole. This may involve testing of proper installation and uninstalling of the application. System testing tests for all internal and external components that make the system.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_functional_testing_tools.png","alias":"functional-testing-tools"},"808":{"id":808,"title":"Bug tracking systems","description":" A bug tracking system or defect tracking system is a software application that keeps track of reported software bugs in software development projects. It may be regarded as a type of issue tracking system.\r\nMany bug tracking systems, such as those used by most open-source software projects, allow end-users to enter bug reports directly. Other systems are used only internally in a company or organization doing software development. Typically bug tracking systems are integrated with other project management software.\r\nA bug tracking system is usually a necessary component of a good software development infrastructure, and consistent use of a bug or issue tracking system is considered one of the "hallmarks of a good software team".\r\nA major component of a bug tracking system is a database that records facts about known bugs. Facts may include the time a bug was reported, its severity, the erroneous program behavior, and details on how to reproduce the bug; as well as the identity of the person who reported it and any programmers who may be working on fixing it.\r\nTypical bug tracking systems support the concept of the life cycle for a bug which is tracked through the status assigned to the bug. A bug tracking system should allow administrators to configure permissions based on status, move the bug to another status, or delete the bug. The system should also allow administrators to configure the bug statuses and to what extent a bug in a particular status can be moved. Some systems will e-mail interested parties, such as the submitter and assigned programmers, when new records are added or the status changes.\r\nThe main benefit of a bug-tracking system is to provide a clear centralized overview of development requests (including both bugs and improvements, the boundary is often fuzzy), and their state. The prioritized list of pending items (often called backlog) provides valuable input when defining the product road map, or maybe just "the next release".\r\nIn a corporate environment, a bug-tracking system may be used to generate reports on the productivity of programmers at fixing bugs. However, this may sometimes yield inaccurate results because different bugs may have different levels of severity and complexity. The severity of a bug may not be directly related to the complexity of fixing the bug. There may be different opinions among the managers and architects.\r\nA local bug tracker (LBT) is usually a computer program used by a team of application support professionals (often a help desk) to keep track of issues communicated to software developers. Using an LBT allows support professionals to track bugs in their "own language" and not the "language of the developers." In addition, an LBT allows a team of support professionals to track specific information about users who have called to complain — this information may not always be needed in the actual development queue. Thus, there are two tracking systems when an LBT is in place.","materialsDescription":" <span style=\"font-weight: bold;\">What does Bug Tracking mean?</span>\r\nBug tracking is a process used by quality assurance personnel and programmers to keep track of software problems and resolutions. A bug tracking system is normally put in place to store information about reported bugs. This type of issue-tracking system provides a clear, centralized overview of development requests and their corresponding states.\r\nBug tracking enables users to enter bug reports directly into a system that logs and tracks them. Diligent use of a bug tracking system provides a record of a software team's effectiveness. Local bug trackers are often used by teams of application support professionals to keep track of issues communicated to software developers.\r\nBug tracking systems include a database, which keeps track of facts pertaining to each bug. These facts might include the time a bug was reported, its severity, incorrect program behavior, details on how to recreate the bug,who reported the bug and what the programmers did to fix it. Bug tracking systems are associated with a bug's life cycle, which is tracked through the status assigned to each bug. This allows administrators to set permissions based on a bug's status, move bugs to other statuses or delete them.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon-bug-tracking-systems.png","alias":"bug-tracking-systems"},"842":{"id":842,"title":"Chatbot Development","description":"A chatbot is a piece of software that conducts a conversation via auditory or textual methods. Such programs are often designed to convincingly simulate how a human would behave as a conversational partner, although as of 2019, they are far short of being able to pass the Turing test. Chatbots are typically used in dialog systems for various practical purposes including customer service or information acquisition. Some chatbots use sophisticated natural language processing systems, but many simpler ones scan for keywords within the input, then pull a reply with the most matching keywords, or the most similar wording pattern, from a database.\r\nThe term "ChatterBot" was originally coined by Michael Mauldin (creator of the first Verbot, Julia) in 1994 to describe these conversational programs. Today, most chatbots are accessed via virtual assistants such as Google Assistant and Amazon Alexa, via messaging apps such as Facebook Messenger or WeChat, or via individual organizations' apps and websites. Chatbots can be classified into usage categories such as conversational commerce (e-commerce via chat), analytics, communication, customer support, design, developer tools, education, entertainment, finance, food, games, health, HR, marketing, news, personal, productivity, shopping, social, sports, travel and utilities.\r\nBeyond chatbots, Conversational AI refers to the use of messaging apps, speech-based assistants and chatbots to automate communication and create personalized customer experiences at scale.\r\nThe process of building, testing and deploying chatbots can be done on cloud-based chatbot development platforms offered by cloud Platform as a Service (PaaS) providers such as Oracle Cloud Platform SnatchBot and IBM Watson. These cloud platforms provide Natural Language Processing, Artificial Intelligence and Mobile Backend as a Service for chatbot development.\r\nSome Companies like Microsoft Azure and AARC are currently providing their Bot Engines through which chatbot Platforms or Software can be developed.","materialsDescription":"New tools designed to simplify the interaction between humans and computers have hit the market: Chatbots or Virtual Assistants. In banking, chatbots and virtual assistants are some of the industry’s newest tools designed to simplify the interaction between humans and computers.\r\n<span style=\"font-weight: bold;\">What is a chatbot?</span>\r\nA chatbot is artificial intelligence (AI) software that can simulate a conversation (or a chat) with a user in natural language through messaging applications, websites, mobile apps or through the telephone.\r\n<span style=\"font-weight: bold;\">Why are chatbots important?</span>\r\nA chatbot is often described as one of the most advanced and promising expressions of interaction between humans and machines. However, from a technological point of view, a chatbot only represents the natural evolution of a Question-Answering system leveraging Natural Language Processing (NLP). Formulating responses to questions in natural language is one of the most typical examples of Natural Language Processing applied in various enterprises’ end-use applications.\r\n<span style=\"font-weight: bold;\">How does a chatbot work?</span>\r\nThere are two different tasks at the core of a chatbot:\r\n<ol><li>user request analysis</li><li>returning the response</li></ol>\r\nUser request analysis: this is the first task that a chatbot performs. It analyzes the user’s request to identify the user intent and to extract relevant entities.\r\nThe ability to identify the user’s intent and extract data and relevant entities contained in the user’s request is the first condition and the most relevant step at the core of a chatbot: If you are not able to correctly understand the user’s request, you won’t be able to provide the correct answer.\r\nReturning the response: once the user’s intent has been identified, the chatbot must provide the most appropriate response for the user’s request. The answer may be:\r\n<ul><li>a generic and predefined text;</li><li>a text retrieved from a knowledge base that contains different answers;</li><li>a contextualized piece of information based on data the user has provided;</li><li>data stored in enterprise systems;</li><li>the result of an action that the chatbot performed by interacting with one or more backend application;</li><li>a disambiguating question that helps the chatbot to correctly understand the user’s request.</li></ul>\r\n<span style=\"font-weight: bold;\">In what is the benefit of chatbots?</span>\r\nChatbot applications streamline interactions between people and services, enhancing the customer experience. At the same time, they offer companies new opportunities to improve the customer's engagement process and operational efficiency by reducing the typical cost of customer service.\r\nTo be successful, a chatbot solution should be able to effectively perform both of these tasks. Human support plays a key role here: Regardless of the kind of approach and the platform, human intervention is crucial in configuring, training and optimizing the chatbot system.\r\n<span style=\"font-weight: bold;\">Which chatbot application is right for you?</span>\r\nThere are different approaches and tools that you can use to develop a chatbot. Depending on the use case you want to address, some chatbot technologies are more appropriate than others. In order to achieve the desired results, the combination of different AI forms such as natural language processing, machine learning, and semantic understanding may be the best option.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Chatbot_Development.png","alias":"chatbot-development"},"850":{"id":850,"title":"Mobile Data Protection (BYOD)","description":"The first and best defense in securing BYODs begins with the same requirements you apply to devices that are already on your network. These security measures include enforcing strong passcodes on all devices, antivirus protection and data loss prevention (DLP), full-disk encryption for disk, removable media and cloud storage, mobile device management (MDM) to wipe sensitive data when devices are lost or stolen, and application control.\r\nYou should always extend encryption to both data in transit and data at rest. Protecting your devices with strong passwords means you make it incredibly difficult for someone to break in and steal data. But if somehow your device-level password is compromised, encrypting the data stored on the device provides a second level of security a hacker must get through in order to steal your data.\r\nYou should encourage users to think of the extra layers of security as helpful tools that give them the ability to use their own devices within the workplace. By password protecting devices, a user acknowledges accountability and responsibility for protecting their data.\r\nIn addition to applying passcodes and antivirus prevention to your devices, you should apply a custom level of application control to BYODs. If applications are available to employees on the internal network, they should be able to access them offsite through a VPN or email software.\r\nA successful BYOD program allows your users to be productive outside of their scheduled work hours while also giving them the flexibility to do the things they like to do when they’re not working—like update their status or enjoy playing an interactive game.\r\nWhatever decision you make for your BYOD policy, be sure that it’s enforceable and enables IT to deploy software remotely.","materialsDescription":" <span style=\"font-weight: bold;\">How can I control apps on BYOD devices?</span>\r\nThe best way IT can control apps on BYOD devices is to have an acceptable use policy in place. Since BYOD adoption has picked up, IT pros have less control over the apps employees use. A policy that lays out expectations and consequences for users can improve the success of your BYOD initiative. Mobile device management (MDM) systems also offer application controls through their blacklisting and whitelisting features. In addition, those with auto-quarantine or remote wipe capabilities also help in the event that a user installs non-compliant apps on his or her device.\r\n<span style=\"font-weight: bold;\">How can my organization create a BYOD policy?</span>\r\nEvery organization’s BYOD policy is a little different because policies are most effective when they’re organization-specific. The most important thing you can do is create a policy as soon as you decide to allow users to bring their own devices to work. The basic points of good BYOD programs address the same things: how users should protect devices, what they can and can’t access and what will happen if and when they leave the company.\r\nA strong BYOD policy should also consider device selection, reimbursement, MDM, device security and mobile application security. Also think about how you’ll enforce BYOD policy once it’s in place.\r\n<span style=\"font-weight: bold;\">What mobile app delivery options does my department have?</span>\r\nThere are four good mobile app delivery approaches, but each has pitfalls.\r\nEnterprise app stores give IT licensing and compliance control and let users download pre-approved mobile applications, but they require a lot of maintenance and resources. Web apps are compatible with different devices and don’t need a distribution system, but without an Internet connection, they aren’t practical. Cloud file-sharing services are good for app delivery since most employees are already familiar with services such as Dropbox. If you chose the cloud option, you’ll have to use or develop cloud-based mobile apps or pay for cloud storage services. And mobile desktop virtualization lets users connect to a PC environment and stores all sensitive data on servers instead of devices. But for desktop virtualization on mobile devices to work, users need a reasonably large screen and a reliable Internet connection.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_BYOD.png","alias":"mobile-data-protection-byod"},"862":{"id":862,"title":"Time Tracking Software","description":"Any business owner knows that they have to keep track of their employees. Their hours must be documented for payroll and, naturally, you would like to know where they are.\r\nTime-tracking software is a category of computer software that allows its employees to record time spent on tasks or projects. The software is used in many industries, including those who employ freelancers and hourly workers. It is also used by professionals who bill their customers by the hour. These include lawyers, freelancers and accountants. The tool could be used as a stand-alone or be integrated with other applications like project management software, customer support and accounting to name just a few. Time tracking software is the electronic version of the traditional paper timesheet. Tracking time can increase productivity, as businesses can track time spent on tasks and get a better understanding of what practices causes their employees to waste time. Time tracking software enhances accountability by documenting the time it takes to finish given tasks. The data is collected in a database and could be used for data analysis by the human resources department. Features offered by time-tracking software include:\r\n<ul><li>Automatic generation of invoices to the professional's clients or customers based on the time spent.</li><li>Tracking of cost overruns for fixed cost projects.</li><li>Workforce management packages that track attendance, employee absences, human resource issues, payroll, talent management and labor analytics.</li></ul>","materialsDescription":"<span style=\"font-weight: bold;\">What are the types of time-tracking software?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Timesheet.</span></span> Allows users to manually enter time spent on tasks.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Time-tracking/recording.</span></span> Automatically records activities performed on a computer.\r\nTime-tracking software can be:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Standalone.</span></span> Used only to record timesheets and generate reports.\r\n<span style=\"font-style: italic;\">Integrated as part of:</span>\r\n<ul><li>Accounting systems, e.g. timesheet data fed directly to company accounts.</li><li>Billing systems, e.g. to generate invoices, especially for contractors, lawyers, etc.</li><li>Project management systems, e.g. timesheet data used by project management software to visualize the effort being spent on projects or tasks.</li><li>Payroll systems, e.g. to pay employees based on time worked.</li><li>Resource scheduling, e.g. bi-directional integration allows schedulers to schedule staff to tasks, which, once complete, can be confirmed and converted to timesheets.</li></ul>\r\n<span style=\"font-weight: bold;\">What is timesheet software?</span>\r\nTimesheet software is software used to maintain timesheets. It was popularized when computers were first introduced to the office environment with the goal of automating heavy paperwork needs for big organizations. Timesheet software allows documenting time spent performing different tasks.\r\nWhen used within companies, employees enter the time they've spent on tasks into electronic timesheets. These timesheets can then be approved or rejected by supervisors or project managers.\r\nSince 2006, timesheet software has been moving to mobile platforms (smartphones, tablets, smartwatches, etc.) enabling better tracking of employees whose work involves multiple locations.\r\n<span style=\"font-weight: bold;\">What is a time-tracking/recording software?</span>\r\nTime-tracking/recording software automates the time-tracking process by recording the activities performed on a computer and the time spent on each of them. This software is intended to be an improvement over timesheet software. Its goal is to offer a general picture of computer usage. Automatic time-tracking/recording software records and shows the usage of applications, documents, games, websites, etc.\r\nWhen used within companies, this software allows monitoring the productivity of employees by recording the tasks they perform on their computers. It can be used to help fill out timesheets.\r\nWhen used by freelancers, this software helps to create reports for clients (e.g. timesheets and invoices) or to prove work was done.\r\n<span style=\"font-weight: bold;\">What are the time-tracking methods?</span>\r\nThere are several ways companies track employee time using time tracking software.\r\n<span style=\"font-style: italic;\">Durational.</span> Employees enter the duration of the task but not the times when it was performed.<br /><span style=\"font-style: italic;\">Chronological.</span> Employees enter start and end times for the task.\r\n<span style=\"font-style: italic;\">Automatic.</span> The system automatically calculates time spent on tasks or whole projects, using a connected device or a personal computer and user input using start and stop buttons. Users can retrieve logged tasks and view the duration or the start and stop times.\r\n<span style=\"font-style: italic;\">Exception-based.</span> The system automatically records standard working hours except for approved time off or LOA.\r\n<span style=\"font-style: italic;\">Clock-in clock-out.</span> Employees manually record arrival and departure times.\r\n<span style=\"font-style: italic;\">Monitoring.</span> The system records the active and idle time of employees. It might also record screen captures.<br /><span style=\"font-style: italic;\">Location-based.</span> The system determines the working status of employees based on their location.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/time.png","alias":"time-tracking-software"},"864":{"id":864,"title":"Virtual Event Platforms","description":" Virtual events are on the rise. As technology progresses, it has made it possible for companies to host amazing online events - ones that even rival in-person versions. This has led to many benefits for both event planners and attendees alike.\r\nA virtual event, also known as an online event, is an interactive gathering that happens on the internet. Unlike in-person events, virtual ones aren't restricted to a single location. A remote attendee can join and participate from anywhere in the world, given he or she has access to the web.\r\nSome events are completely virtual and every guest attends sessions from the comfort of their own home, favorite coffee shop, or wherever they might be. Others have both in-person and virtual components. Some attendees visit the actual event location and others stream the festivities from their computer.\r\nThere are many reasons why virtual events are valuable. First off, virtual events allow the individuals or companies hosting them to reach a wider audience. Were you to host your event in New York City, for example, not every person in your audience would be able to attend due to the cost of travel. With a virtual event, travel isn't an issue.\r\nIn general, virtual events are also much cheaper to put on. Event planners don't have to book a giant venue or hire a bunch of temporary staff. These cost savings can then be passed on to each virtual attendee in the form of lower ticket prices.\r\nLastly, virtual events are extremely measurable. Companies can easily learn which sessions were the most popular, how many people attended, where those attendees live, how they paid for their tickets, and much more. Just about every attendee action can be easily tracked and analyzed. This information can then be used to improve event strategy.","materialsDescription":" <span style=\"font-weight: bold; \">What is a virtual event?</span>\r\nIn an industry with lots of jargon and acronyms flying about, it’s easy to become bamboozled by terminology. However, in the case of virtual events, there’s little room for ambiguity – they are as they sound – events that take place completely online. Supported by specialist AV technology, virtual events negate the need for a physical location and work to bring people together virtually from across the world. Whilst a virtual event can’t replace the power and value of in-person interactions, they’re an effective tool that can be an engaging and immersive alternative to delivering business content and information.\r\n<span style=\"font-weight: bold; \">How many people can attend a virtual event?</span>\r\nVirtual events have the capacity to facilitate large audience numbers: from hundreds of thousands to thousands, hundreds or smaller groups. Understanding, from the outset, what you want to achieve from your event and the complexity of the program, will provide a good guide to how many attendees should be invited.\r\n<span style=\"font-weight: bold; \">How do attendees gain access to a virtual event?</span>\r\nIn theory, this is an easy one to answer: attendees will receive an invite with access details, which will allow them to enter the virtual event on the date and time outlined. However, before this happens, there are some important things for you to consider first, including:\r\n<ul><li>Are you charging an entry fee for the event?</li><li>Will the event be live, on-demand or a combination of the two?</li><li>How will you market your event, so your audience knows it’s taking place and want to be part of it?</li><li>Is your audience tech-savvy? Might they need a pre-event virtual guide/tour, so they are familiar with how to join and the features of a virtual event set up?</li></ul>\r\nHaving questions like these answered will define the platform required, help maximize attendance and optimize your delegates overall experience of the virtual event offering.\r\n<span style=\"font-weight: bold; \">What are the main benefits of a virtual event?</span>\r\n<ul><li><span style=\"font-weight: bold; \">Scope:</span> Whilst not all events will suit a virtual treatment, many programs can be adapted into a digital format. It really comes down to your objectives and whether or not these can be achieved through holding an online event.</li><li><span style=\"font-weight: bold; \">Accessibility:</span> Expand the reach of your brand without the need for travel. Not only can virtual events connect you with a global audience in real-time, but with event recording, event content can be made available on-demand; providing more opportunities for people to consume your content at a time that suits their schedule best. What’s more, all that attendees and speakers need to attend/talk is a computer, laptop, or mobile device and a good, reliable internet connection.</li><li><span style=\"font-weight: bold; \">Engagement:</span> In-person events are unrivaled in their ability to engage and facilitate real human-to-human connections through creative interactions. For this reason, you might be concerned that virtual events can’t engage audiences. Whilst there’s no escaping the fact that there are limitations vs face-to-face meetings, there are lots of potentials to mix rich content with live polling, Q&As and whiteboards to keep engagement levels high throughout sessions. Social media can also be employed as a great engagement tool – use event hashtags, encourage attendees to post images of their highlights from the event, and get imaginative with other ways a sense of community can be created via social channels.</li><li><span style=\"font-weight: bold; \">Multiple or Single Content Experiences:</span> As with physical events, virtual events offer the opportunity to run multiple content streams concurrently; allowing different speakers to host sessions simultaneously and giving attendees the option to select sessions most relevant to them. If this isn’t required for your event, then a multiple single content experience may be a better fit.</li><li><span style=\"font-weight: bold; \">Networking:</span> While there’s no escaping the fact that in-person events are the most conducive way to network and make meaningful business connections, networking can still be factored into a virtual event program. Give attendees the chance to schedule one-on-one time or assemble into group breakouts, where they can speak to each other, your team, sponsors or speakers over the internet. A range of tools can be used to ensure attendees can leverage the best from their interactions.</li><li><span style=\"font-weight: bold; \">Insight:</span> The metrics and data insights that can be captured from virtual event platforms can help measure ROI and success against pre-defined KPIs. Information derived can be used to articulate if your event was successful and to influence future event decision making.</li></ul>\r\n<span style=\"font-weight: bold; \">Is there a potential to incorporate sponsorship?</span>\r\nYes. Virtual event spaces, presentations and other assets can be customised to reflect your branding and the branding of any sponsors you may partner with. This maximises brand exposure and maintains a sponsor revenue stream coming into your event.\r\n<span style=\"font-weight: bold;\">Can virtual events be used as part of a hybrid event strayegy?</span>\r\nAbsolutely. Incorporating virtual events with a holistic approach can be a good way to enhance your existing event strategy. Integrating virtual events into your wider events and meetings program will give you an additional tool to utilize alongside your live events; extending reach and engagement with your audience further.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/1999104__1_.png","alias":"virtual-event-platforms"},"872":{"id":872,"title":"Telemedicine","description":"Telehealth is the distribution of health-related services and information via electronic information and telecommunication technologies. It allows long-distance patient and clinician contact, care, advice, reminders, education, intervention, monitoring, and remote admissions. Telemedicine is sometimes used as a synonym, or is used in a more limited sense to describe remote clinical services, such as diagnosis and monitoring. When rural settings, lack of transport, a lack of mobility, decreased funding, or a lack of staff restrict access to care, telehealth may bridge the gap as well as provider distance-learning; meetings, supervision, and presentations between practitioners; online information and health data management and healthcare system integration.\r\nHealthcare systems, physician practices, and skilled nursing facilities are using telemedicine to provide care more efficiently. Technologies that comes integrated with telemedicine software like electronic medical records, AI diagnosis and medical streaming devices, can better assist providers in diagnosis and treatment. The latter allows providers to monitor patients in real-time and adjust treatment plans when necessary. Ultimately, this leads to better patient outcomes. \r\nBecause of telemedicine, patients who previously had limited access to health care services can now see a physician without leaving their home. Seniors who would prefer to age in place can now do so with the use of medical streaming devices. The spread of disease is reduced as individuals with contagious diseases don’t have to expose it to others in crowded waiting rooms. \r\nThanks to telemedicine, physicians have the wonderful opportunity to connect with clients wherever they are. Patients who once could not see a physician due to access to care issues, can now do so almost seamlessly. Threre are 3 main types of telemedicine: \r\n<ul> <li>Interactive medicine, also known as “live telemedicine”, allows patients and physicians to communicate in real-time while also maintaining HIPAA compliance. </li> <li>Store and Forward, which allows providers to share patient information with a practitioner in another location. </li> <li>Remote Patient Monitoring, where using patient portals, a physician can gather and share information with their patient. </li> </ul>\r\nAlthough telemedicine brings with it many benefits, there are some downsides to it as well. Providers, payers, and policymakers alike know that there are some gray areas that are difficult to keep up with. While the field will grow exponentially over the next decade, it will bring with it both practical and technological challenges. ","materialsDescription":"Telemedicine refers to the practice of caring for patients remotely when the provider and patient are not physically present with each other. Modern technology has enabled doctors to consult patients by using HIPAA compliant video-conferencing tools.\r\n<b>What is telemedicine?</b>\r\nA tool that makes healthcare more accessible, cost-effective, and that increases patient engagement – is telemedicine. Since making its debut in the late 1950’s, advances in telemedicine has contributed to seniors having the choice to age in place. In addition, the patients that reside in rural areas that previously had difficulties accessing a physician, can now reach them virtually. \r\n<b>What are the benefits of telemedicine? </b>\r\nHealthcare systems, physician practices, and skilled nursing facilities are using telemedicine to provide care more efficiently. Technologies that comes integrated with telemedicine software like electronic medical records, AI diagnosis and medical streaming devices, can better assist providers in diagnosis and treatment. The latter allows providers to monitor patients in real-time and adjust treatment plans when necessary. Ultimately, this leads to better patient outcomes. Because of telemedicine, patients who previously had limited access to health care services can now see a physician without leaving their home. Seniors who would prefer to age in place can now do so with the use of medical streaming devices. The spread of disease is reduced as individuals with contagious diseases don’t have to expose it to others in crowded waiting rooms. \r\n<b>What are the applications of telemedicine? </b>\r\nThanks to telemedicine, physicians have the wonderful opportunity to connect with clients wherever they are. Patients who once could not see a physician due to access to care issues, can now do so almost seamlessly. \r\n<b>What do you need to start telemedicine? </b>\r\nDeciding to start a telemedicine practice is a big decision and requires a very well-thought out plan. While there are wonderful benefits to starting a telemedicine practice, there are also some drawbacks. It is an endeavor that requires up-to-date equipment, trained staff, and an understanding of telemedicine laws. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/49087__1_.png","alias":"telemedicine"},"878":{"id":878,"title":"Remote Desktop Software","description":"The term remote desktop refers to a software or operating system feature that allows a personal computer's desktop environment to be run remotely on one system (usually a PC, but the concept applies equally to a server), while being displayed on a separate client device. Remote desktop applications have varying features. Some allow attaching to an existing user's session (i.e., a running desktop) and "remote controlling", either displaying the remote control session or blanking the screen. Taking over a desktop remotely is a form of remote administration.\r\nRemote access can also be explained as remote control of a computer by using another device connected via the Internet or another network. This is widely used by many computer manufacturers and large businesses' help desks for technical troubleshooting of their customers' problems.\r\nRemote desktop software captures the mouse and keyboard inputs from the local computer (client) and sends them to the remote computer (server). The remote computer in turn sends the display commands to the local computer. When applications with many graphics including video or 3D models need to be controlled remotely, a remote workstation software that sends the pixels rather than the display commands must be used to provide a smooth, like-local experience. HP Remote Graphics Software is one such remote workstation solution.\r\nRemote desktop sharing is accomplished through a common client/server model. The client, or VNC viewer, is installed on a local computer and then connects via a network to a server component, which is installed on the remote computer. In a typical VNC session, all keystrokes and mouse clicks are registered as if the client were actually performing tasks on the end-user machine.\r\nThe target computer in a remote desktop scenario is still able to access all of its core functions. Many of these core functions, including the main clipboard, can be shared between the target computer and remote desktop client.\r\nA main use of remote desktop software is remote administration and remote implementation. This need arises when software buyers are far away from their software vendor. Most remote access software can be used for "headless computers": instead of each computer having its own monitor, keyboard and mouse or using a KVM switch, one computer can have a monitor, keyboard, mouse, and remote control software, and control many headless computers. The duplicate desktop mode is useful for user support and education. Remote control software combined with telephone communication can be nearly as helpful for novice computer-users as if the support staff were actually there.\r\nSince the advent of cloud computing, remote desktop software can be housed on USB hardware devices, allowing users to connect the device to any PC connected to their network or the Internet and recreate their desktop via a connection to the cloud. This model avoids one problem with remote desktop software, which requires the local computer to be switched on at the time when the user wishes to access it remotely. (It is possible with a router with C2S VPN support, and Wake on LAN equipment, to establish a virtual private network (VPN) connection with the router over the Internet, if not connected to the LAN, switch on a computer connected to the router, then connect to it.)\r\nRemote desktop products are available in three models: hosted service, software, and appliance.","materialsDescription":"<span style=\"font-weight: bold;\">What is Remote Desktop Software?</span>\r\nRemote Desktop Software is a tool that uses Virtual Network Computing (VNC) to allow one computer to remotely access and control another computer over an internet/network connection.\r\n<span style=\"font-weight: bold;\">How does Remote Desktop Software Work?</span>\r\nRemote Desktop Software uses a client-server model to connect to and control a computer remotely:\r\n<ul><li><span style=\"font-weight: bold;\">Server:</span> The server is a remote device that is being controlled.</li><li><span style=\"font-weight: bold;\">Client:</span> The client is the local device used to control the server.</li></ul>\r\nThe server's UI is displayed on the client monitor which enables the client to control the server via keyboard and mouse inputs. These inputs are executed in the server's environment, and the UI is updated in the client's display accordingly.\r\n<span style=\"font-weight: bold;\">Why is Remote Desktop Software used?</span>\r\nRemote desktop software is a tool that allows you to use the remote desktop feature seamlessly. It is used mainly for the following purposes:\r\n<ul><li><span style=\"font-weight: bold;\">Troubleshooting:</span> IT Admins are on call 24/7 and a remote access tool helps them save time and effort by allowing them to fix issues remotely within a few minutes.</li><li><span style=\"font-weight: bold;\">Help Desk:</span> Help Desk technicians' primary responsibility is to resolve any issues that customers might face while using their product, and this more often than not involves taking remote control of their customers' devices. Work from home: People that work from home often need to remotely connect to and use their corporate devices for various purposes.</li><li><span style=\"font-weight: bold;\">Personal use:</span> You can remotely access a computer at your home when you're on the move, to access files or personal documents you may require urgently.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/remote.png","alias":"remote-desktop-software"},"897":{"id":897,"title":"Contact Tracing Solutions","description":"<span style=\"font-weight: bold;\">Contact tracing</span> is a set of techniques and tools that enable people and organizations to document contact events that may result in infection and notify the affected people. As outlined by the WHO, contact tracing comprises three steps:\r\n<ul><li>Contact identification</li><li>Contact listing</li><li>Contact follow-up</li></ul>\r\nThe basic function of any contact tracing system is to identify potential exposures and notify people who need to know. A more comprehensive solution provides preventive controls and advice that guides people through the process of identifying symptoms, reporting test results, and responding appropriately.\r\nThe two contact tracing methods that have received the most attention are manual tracing and proximity tracing using mobile apps. <span style=\"font-weight: bold;\">The manual approach</span> employs people to call the contacts of newly diagnosed patients, notify them that they are at risk, offer advice on courses of action, and follow up until they’re in the clear. The problem with the manual approach is that it’s slow, expensive, time-consuming, and certainly not applicable for every vertical and industry. <span style=\"font-weight: bold;\">Mobile proximity tracing</span> automatically logs contacts between people who are running compatible apps on their phones. While app-based anonymous proximity tracing has great value, its potential scope is limited by the fact that people must opt into using the app and the built-in privacy features make the solution unsuitable for situations in which people’s must be known, which is often the case in scenarios like a business complex or school campus\r\nTwo other approaches to contact tracing have received less attention but have a unique value. <span style=\"font-weight: bold;\">Location-based tracing </span>can leverage location data that an organization typically already collects, albeit for other purposes. That can include badge swipes and meeting calendars as well as passive data collection sources such as phone SIM cards, GPS signals, Wi-Fi location monitoring, and temperature readings. <span style=\"font-weight: bold;\">Area monitoring</span> is a preventive technique that enforces area density and capacity controls to ensure physical distancing. It can include sensor data such as temperature, ventilation, and humidity readings that might indicate that too many people are gathered in one location, or to identify individuals with elevated temperatures.<br /><br />","materialsDescription":"<h1 class=\"align-center\">Why do I need a contact tracing solution?</h1>\r\nHealth authorities advise organizations to promptly identify and isolate potentially infectious individuals as a critical step in protecting employees, customers and visitors at a worksite. If someone was at your site and later reports that they are infected with COVID-19, you need a process to help identify the people and areas that may have been exposed to potential infection. Having a comprehensive contact tracing solution can help determine who was in contact with an infected person at your worksite, and when the interaction occurred. This can help minimize the risk of a potentially infected person spreading the virus to others, and can help mitigate the risk of multiple infected employees, which could impact your business productivity. Contact tracing puts your employees and visitors at ease knowing that they will be notified if they have been exposed to an infected person, enabling them to take appropriate steps to quarantine and/or be tested for the virus. \r\n<h1 class=\"align-center\">What technologies are available to help with contact tracing, and will they integrate with my current security system?</h1>\r\nIf you have an existing security access system, you may not realize that it can be used to supplement your contact tracing program. Access systems can track an employee or visitor and determine who else was in the same area at the same time. They provide timely information which is critical for contact protocols. You can choose the amount of time to track. If an employee or visitor displays virus symptoms, these tools can tell you who that person may have come into contact with, and provide the data to notify other individuals who may have been exposed. Ongoing reports can be generated to maintain compliance and meet ever-changing regulations. As these systems are designed for employees and visitors to provide basic contact information, they can be used to generate a prescribed report as to who was in the building, when they were there and with whom they met. Contact tracing benefits come from the basic information a user would enter when prompted, creating a contact list and a record of compliance as to who had entered, when they did and a phone number to reach them.\r\n<h1 class=\"align-center\">What important points that any returning to work plan and contact tracing policy should address?</h1>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Easy Accessibility</span></p>\r\nContact tracing solutions need to be easy to use and, as much as possible, be compatible with the tools organizations are already using. CIO’s and human resource (HR) departments are more likely to consider solutions from companies with whom they already have relationships, or with whom their employees are already familiar. That's especially true when a quick deployment time is important. That said, solutions with a unique value proposition (certainly the case with many contact tracing tools) can solve a variety of problems faster, and so also need to be considered. If your company requires a wearable solution, for example, due to higher-than-average access security concerns, then vendors that can provide all the components of such a solution (the wearables, readers, tracking software, and signal beacons) will be a more compelling requirement than compatibility with other on-site tools.\r\nThe key is determining your needs prior to purchase. That means due diligence with building and facilities staff as well as a dedicated team to manage compliance with state and municipal COVID-19 business guidelines. Once those are determined, you can match them against the needs of your particular business and make a detailed list of the contact tracing features most important to you.\r\n<p class=\"align-center\"> <span style=\"font-weight: bold; \">Data Aggregation</span></p>\r\nNo matter what your individual business needs might be, any contact tracing solution needs to make it easy to both track and collect information. Generally, this is done via some combination of apps, wearables, Wi-Fi networking, and self-reporting. However, business analytics capabilities, in particular, should allow organizations to quickly process collected data for imminent risk and then reach out to potentially impacted employees.\r\nThat means assessing the status of exposed contacts and providing easy ways to understand the risk levels for returning employees across different worksites. IT professionals should look for solutions where the contact tracing data flow is quick and efficient all the way from collection to insight translation. And you should pay special attention to final data presentation so you can make sure it's easy for managers to understand and make quick decisions.\r\nAggregating data from attendance logs, shift management apps, and other HR management solutions is a fairly easy part of the process. Where it gets difficult is being able to effectively time-stamp and cross-reference this data with not only your various office locations but also who was in those locations at any given time. And once that hurdle is crossed, the solution also needs to use the data to determine the risk levels now faced by other employees. Each business’ needs will vary depending on location, the nature of the workforce (meaning size, distribution, and task orientation), and the complexities of the business when it comes to compliance needs and regulation. So, again, that brings you back to the importance of a thorough due diligence process before deciding on one of these solutions.\r\n<p class=\"align-center\"> <span style=\"font-weight: bold; \">Privacy and Security</span></p>\r\nOne of the key factors for businesses when considering any contact tracing application or technology is to make sure it’s in line with data protection and privacy regulations. For buyers, that means it’s essential for any contact tracing solution to maintain the company's data privacy policies, which usually also means obtaining consent from employees.\r\nThis is even more critical when it involves employees’ personal health information. Employees need to know that their personal information is only being collected for health purposes and that it will never be shared with any outside agencies, like law enforcement or immigration.\r\nAn effective, though a usually pricier option, is to select a system that's token-based. Such solutions ensure that only key data points are collected, and they generally go a long way in convincing employees to participate in the necessary data collection while still feeling comfortable from a privacy perspective.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Breaking the Participation Barrier</span></p>\r\nSuccessful contact tracing requires both participation and privacy. Clearly articulating the benefits and being transparent about how an individual’s data is used is critical to successful implementation.\r\nSo when making a buying decision, you need to put focus on not just data collection but the features you'll need to ensure buy-in from employees. To help, some contact tracing tools provide features akin to an email marketing app that give managers the ability to send out health-oriented email newsletters to employees. Others offer tight integration with team messaging and online survey apps, such as Slack or Microsoft Teams.\r\nYou should use evaluation versions and detailed conversations with sales staff to determine which ones best suit your organization. But do it soon as none of these solutions can be put in place without some significant lead times, since you'll need to handle not only customization and data integration, but also employee training and buy-in challenges.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/contact_tracing.png","alias":"contact-tracing-solutions"}},"companyUrl":"https://www.seasiainfotech.com","countryCodes":["AUS","CAN","GBR","GHA","IND","USA"],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":true,"presenterCodeLng":"","seo":{"title":"Seasia Infotech","keywords":"","description":"Seasia is the first choice of many large enterprises across more than ten industries for all things technical consulting, enterprise development, and marketing. We aim to identify and solve all the challenges that might be coming your way to operate at your ma","og:title":"Seasia Infotech","og:description":"Seasia is the first choice of many large enterprises across more than ten industries for all things technical consulting, enterprise development, and marketing. We aim to identify and solve all the challenges that might be coming your way to operate at your ma","og:image":"https://old.roi4cio.com/uploads/roi/company/Seasia_Infotech_1.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}