{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"role-supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"products-popover":{"en":"Products","de":"die produkte","ru":"Продукты","_type":"localeString"},"introduction-popover":{"en":"introduction","ru":"внедрения","_type":"localeString"},"partners-popover":{"ru":"партнеры","_type":"localeString","en":"partners"},"update-profile-button":{"en":"Update profile","ru":"Обновить профиль","_type":"localeString"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"_type":"localeString","en":"Categories","ru":"Компетенции"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"role-user":{"_type":"localeString","en":"User","ru":"Пользователь"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"_type":"localeString","en":"Bonus 4 reference","ru":"Бонус за референс"},"partner-status":{"en":"Partner status","ru":"Статус партнёра","_type":"localeString"},"country":{"_type":"localeString","en":"Country","ru":"Страна"},"partner-types":{"_type":"localeString","en":"Partner types","ru":"Типы партнеров"},"branch-popover":{"ru":"область деятельности","_type":"localeString","en":"branch"},"employees-popover":{"en":"number of employees","ru":"количество сотрудников","_type":"localeString"},"partnership-programme":{"_type":"localeString","en":"Partnership program","ru":"Партнерская программа"},"partner-discounts":{"ru":"Партнерские скидки","_type":"localeString","en":"Partner discounts"},"registered-discounts":{"ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString","en":"Additional benefits for registering a deal"},"additional-advantages":{"_type":"localeString","en":"Additional Benefits","ru":"Дополнительные преимущества"},"additional-requirements":{"ru":"Требования к уровню партнера","_type":"localeString","en":"Partner level requirements"},"certifications":{"_type":"localeString","en":"Certification of technical specialists","ru":"Сертификация технических специалистов"},"sales-plan":{"_type":"localeString","en":"Annual Sales Plan","ru":"Годовой план продаж"},"partners-vendors":{"en":"Partners-vendors","ru":"Партнеры-производители","_type":"localeString"},"partners-suppliers":{"en":"Partners-suppliers","ru":"Партнеры-поставщики","_type":"localeString"},"all-countries":{"_type":"localeString","en":"All countries","ru":"Все страны"},"supplied-products":{"en":"Supplied products","ru":"Поставляемые продукты","_type":"localeString"},"vendored-products":{"ru":"Производимые продукты","_type":"localeString","en":"Produced products"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"ru":"Поставляемые внедрения","_type":"localeString","en":"Supplied deployments"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"not-yet-converted":{"_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"register":{"en":"Register","ru":"Регистрация ","_type":"localeString"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"auth-message":{"_type":"localeString","en":"To view company events please log in or register on the sit.","ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт."},"company-presentation":{"_type":"localeString","en":"Company presentation","ru":"Презентация компании"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"ru":"Вход","_type":"localeString","en":"Log in","de":"Einloggen"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить"},"calculate":{"ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"_type":"localeString","en":"Company name","ru":"Компания"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}],"translatable_meta":[{"name":"title","translations":{"_type":"localeString","en":"Company","ru":"Компания"}},{"name":"description","translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"}},{"name":"keywords","translations":{"ru":"Ключевые слова для компании","_type":"localeString","en":"Company keywords"}}],"title":{"en":"ROI4CIO: Company","ru":"ROI4CIO: Компания","_type":"localeString"}}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"soft-xpansion-international":{"id":4451,"title":"soft Xpansion","logoURL":"https://old.roi4cio.com/uploads/roi/company/Group_73_1.png","alias":"soft-xpansion-international","address":"","roles":[{"id":2,"type":"supplier"},{"id":3,"type":"vendor"}],"description":"<p><span data-contrast=\"auto\"><strong>soft Xpansion</strong> – международная компания с более чем 20-летним опытом разработки и внедрения программного обеспечения, систем электронного документооборота, электронных архивов, автоматизации бизнес-процессов, электронных сервисов и порталов, технологии PDF, данных и аналитических решений.</span></p>\r\n<p><span data-ccp-props=\"{"201341983":0,"335559739":160,"335559740":259}\"> </span></p>\r\n<p><span data-contrast=\"auto\">Наши решения базируются на лучших практиках в соответствии с современными требованиями и стандартами ЕС. Качество наших услуг подтверждается сертификатом соответствия требованиям ISO 9001:2015 «Системы</span><span data-contrast=\"auto\"> управления </span><span data-contrast=\"auto\">качеств</span><span data-contrast=\"auto\">ом</span><span data-contrast=\"auto\">. Требования». Уровень безопасности подтверждается сертификатом соответствия требованиям ISO 27001. Информационная безопасность.</span><span data-ccp-props=\"{"201341983":0,"335559739":160,"335559740":259}\"> </span></p>\r\n<p><span data-ccp-props=\"{"201341983":0,"335559739":160,"335559740":259}\"></span></p>\r\n<p><span data-contrast=\"auto\">Мы </span><span data-contrast=\"auto\">форусируемся</span><span data-contrast=\"auto\"> на использовании наиболее современных и эффективных программных платформ: Alfresco Community Edition, K2 Nintex, Microsoft SharePoint, OpenText Documentum, PDF Xpansion и связанных с ними технологий.</span><span data-ccp-props=\"{"201341983":0,"335559739":160,"335559740":259}\"> </span></p>\r\n<p><span data-ccp-props=\"{"201341983":0,"335559739":160,"335559740":259}\"></span></p>\r\n<p><span data-contrast=\"auto\">Продуктовая линейка <strong>sX-Space</strong> представлена группой современных программных решений для компаний разных отраслей бизнеса (финансы, агро, промышленность и т.</span><span data-contrast=\"auto\">д</span><span data-contrast=\"auto\">.) и государственных органов. Наши программные продукты позволяют построить единое информационное пространство организаций и предприятий для решения с</span><span data-contrast=\"auto\">обственн</span><span data-contrast=\"auto\">ых бизнес-задач: <strong><a href=\"https://sx-space.com/\" target=\"_blank\" rel=\"noopener\">https://sx-space.com/</a></strong></span></p>\r\n<p><span data-contrast=\"auto\"></span></p>\r\n<p><span data-contrast=\"auto\">Продуктовая линейка <strong>PDF & Print Products</strong> состоит из следующих продуктов и библиотек Perfect PDF, Perfect Print, Windows Store Apps, PDF Xpansion SDK, E-Invoicing, Print to Document, PDF server solutions: <strong>https://soft-xpansion.com/</strong></span><strong> </strong></p>\r\n<p><span data-ccp-props=\"{"201341983":0,"335559739":160,"335559740":259}\"> </span></p>\r\n<p><strong>Наше главное преимущество – наш опыт: </strong></p>\r\n<p><span data-contrast=\"auto\">20+ лет успешной работы на мировом рынке программного обеспечения</span><span data-ccp-props=\"{"201341983":0,"335559739":160,"335559740":259}\"> </span></p>\r\n<p><span data-contrast=\"auto\">250+ программных продуктов, разработанных нашими специалистами</span><span data-ccp-props=\"{"201341983":0,"335559739":160,"335559740":259}\"> </span></p>\r\n<p><span data-contrast=\"auto\">20+ стран, на территории которых внедрены наши решения</span><span data-ccp-props=\"{"201341983":0,"335559739":160,"335559740":259}\"> </span></p>\r\n<p><span data-contrast=\"auto\">1 млн+ успешно инсталлированных продуктов</span><span data-ccp-props=\"{"201341983":0,"335559739":160,"335559740":259}\"> </span></p>\r\n<p><span data-contrast=\"auto\">200+ успешно выполненных проектов для бизнеса, корпоративных клиентов и государственного сектора</span><span data-ccp-props=\"{"201341983":0,"335559739":160,"335559740":259}\"> </span></p>","companyTypes":["supplier","vendor"],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":41,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":2,"supplierPartnersCount":0,"b4r":1,"categories":{"32":{"id":32,"title":"IT outsourcing","description":"<span style=\"font-weight: bold; \">IT outsourcing</span> is the use of external service providers to effectively deliver IT-enabled business process, application service and infrastructure solutions for business outcomes.\r\nOutsourcing, which also includes utility services, software as a service and cloud-enabled outsourcing, helps clients to develop the right sourcing strategies and vision, select the right IT service providers, structure the best possible contracts, and govern deals for sustainable win-win relationships with external providers.\r\nOutsourcing can enable enterprises to reduce costs, accelerate time to market, and take advantage of external expertise, assets and/or intellectual property. IT outsourcing can be implemented both ways: outsides or within the country. \r\nIT outsourcing vendors can provide either a fully managed service, meaning they take full responsibility of all IT maintenance and support, or they can provide additional support for an internal IT team when needed, which is known as co-sourced IT support. A company using IT outsourcing can choose to use one provider for all their IT functions or split the work among multiple providers. \r\n<span style=\"font-weight: bold;\">Specific IT services typically outsourced include:</span>\r\n<ul><li>Application development</li><li>Web hosting</li><li>Application support</li><li>Database development</li><li>Telecommunications</li><li>Networking</li><li>Disaster recovery</li><li>Security</li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Reasons for Outsourcing</span></p>\r\n<span style=\"font-weight: bold; \">To Reduce Cost.</span> More often than not, outsourcing means saving money. This is often due to lower labor costs, cheaper infrastructure, or an advantageous tax system in the outsourcing location.<br /><span style=\"font-weight: bold; \">To Access Skills That Are Unavailable Locally.</span> Resources that are scarce at home can sometimes be found in abundance elsewhere, meaning you can easily reach them through outsourcing.<br /><span style=\"font-weight: bold; \">To Better Use Internal Resources</span>. By delegating some of your business processes to a third party, you’ll give your in-house employees the opportunity to focus on more meaningful tasks.<br /><span style=\"font-weight: bold; \">To Accelerate Business Processes.</span> When you stop wasting time on mundane, time-consuming processes, you’ll be able to move forward with your core offering a lot faster.<br /><span style=\"font-weight: bold; \">To Share Risks.</span> When you delegate a part of non-focus functionality by outsourcing it to a third-party vendor, you give away the responsibility and related risks.","materialsDescription":"<h3 class=\"align-center\">What are the Types of IT Outsourcing?</h3>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Project-Based Model.</span> The client hires a team to implement the part of work that is already planned and defined. The project manager from the outsourced team carries full responsibility for the quality and performance of the project.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Dedicated Team Model.</span> The client hires a team that will create a project for them, and they will work only on that project. Unlike the project-based model, a dedicated team is more engaged in your project. In this model, an outsourced team becomes your technical and product advisor. So it can offer ideas and suggest alternative solutions.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Outstaff Model.</span> It's a type of outsourcing in IT when you don't need a full-fledged development team and hire separate specialists. Sometimes the project requires finding a couple of additional professionals, and you're free to hire outstaff workers to cover that scope of work.</p>\r\n<h3 class=\"align-center\"><span style=\"font-weight: bold; \">What are IT Outsourcing examples?</span></h3>\r\nThe individual or company that becomes your outsourcing partner can be located anywhere in the world — one block away from your office or on another continent.\r\nA Bay Area-based startup partnering with an app development team in Utah and a call center in the Philippines, or a UK-based digital marketing agency hiring a Magento developer from Ukraine are both examples of outsourcing.\r\n<h3 class=\"align-center\">Why You Should Use IT Outsourcing</h3>\r\nNow that you know what IT outsourcing is, its models, and types, it's time to clarify why you need to outsource and whether you really need it. Let's go over a few situations that suggest when to opt for IT outsourcing.\r\n<ul><li><span style=\"font-weight: bold;\">You are a domain expert with idea</span></li></ul>\r\nIf you're an industry expert with the idea that solves a real problem, IT outsourcing is your choice. In this case, your main goal is to enter the market and test the solution fast. An outsourced team will help you validate the idea, build an MVP to check the hypothesis, and implement changes in your product according to market needs. It saves you money, time and lets you reach the goal.\r\n<ul><li><span style=\"font-weight: bold;\">You have an early-stage startup</span></li></ul>\r\nIt's a common case that young startups spend money faster than they get a solid team and a ready-to-market product. The Failory found that financial problems are the 3rd reason why startup fails. So it makes more sense to reduce costs by hiring an outsourced team of professionals while your business lives on investor's money. You may employ a full-cycle product development studio covering all the blind spots and bringing your product to life.\r\n<ul><li><span style=\"font-weight: bold;\">You need a technical support</span></li></ul>\r\nEven if you already have a ready solution, but it demands some technical improvements – frameworks for backend components, new language, integrations with enterprise software, UX&UI design – it makes more sense to find an experienced partner. There are many functions that IT outsourcing can cover, and again it saves you the time you'd otherwise spend on looking for qualified staff.<br /><br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IT_outsourcing.png","alias":"it-outsourcing"},"595":{"id":595,"title":"iOS Software Development","description":"iOS is Apple’s mobile OS that runs on an iPhone, iPad, iPod Touch hardware. Apple provides tools and resources for creating iOS apps and accessories for these devices. As an iOS developer, you can program in native languages such as Swift or Objective-C or build cross-platform native applications using React Native (JavaScript) or Xamarin (C# & F#).<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Developer Requirements.</span> To develop iOS apps, you need a Mac computer running the latest version of Xcode. Xcode is Apple’s IDE (Integrated Development Environment) for both Mac and iOS apps. Xcode is the graphical interface you'll use to write iOS apps. Xcode includes the iOS SDK, tools, compilers, and frameworks you need specifically to design, develop, write code, and debug an app for iOS. For native mobile app development on iOS, Apple suggests using the modern Swift programming language. It is important to note that Xcode only runs on Mac OS X and the only supported way to develop iOS apps. Like desktop software, iOS development software are designed using a range of programming languages and frameworks.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">iOS software development kit. </span>Mobile iOS app creation software requires access to software development kits (SDKs) that provide an environment through which programmers can design and test code in a simulated mobile environment. Some iOS SDK essentials are the Cocoa Touch frameworks that include the UIKit, GameKit, PushKit, Foundation Kit, and MapKit. These frameworks and others allow you manipulate the iPhone or iPad camera, add voice interaction using SiriKit, explore music with MusicKit, expand viewing and listening via AirPlay 2, and even add iMessage Business Chat to your application. iOS 11 added the power of machine learning with Core ML and augmented reality (AR) experiences with ARKit.\r\n<p id=\"Beta_Testing\" style=\" color:#232f3e; \"><span style=\"font-weight: bold; \">Beta Testing.</span> <span style=\"font-weight: normal; \">Once you have built and tested (using XCTest framework or iOS Unit test) your app, you can invite users to your apps and collect feedback using TestFlight prior to deploying to the App Store. This is a good time for testing Push Notifications, data storage using Core Data, and making network calls to 3rd party APIs. To get going, you simply upload a beta build of your app, and use iTunes Connect to add the name and email of testers. <br /></span></p>\r\n<p id=\"Beta_Testing\" style=\" color:#232f3e; \"><span style=\"font-weight: bold; \">Cloud Testing.</span><span style=\"font-weight: normal; \">Testing your iOS app on real devices is critically important since the performance of the real device, different operating system versions, modifications made by manufacturer and carriers firmware may lead to unexpected issues with your app. Testing on real device gives you a more accurate understanding of how your users interact with your app. On the other hand, obtaining physical devices for testing is a logistical challenge. This is where cloud testing comes into play. With cloud testing, you can test your application on real devices that are accessible on the cloud. <br /></span></p>\r\n<p id=\"Beta_Testing\" style=\" color:#232f3e; \"><span style=\"font-weight: bold; \">Deployment.</span> <span style=\"font-weight: normal; \">Once you have built, tested, and beta tested your iOS app, you can deploy to the App Store. At this point, you must join the Apple Developer Program. As a member, you’ll get access to beta iOS app development software, advanced app capabilities, extensive beta testing tools, and app analytics.</span></p>\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What are the advantages of iOS App Development?</span></h1>\r\n<ul><li><span style=\"font-weight: bold;\">iOS is easy to use interface.</span> Apple’s iPhone becomes the dream of many smartphone users, providing high customer service and become a market leader for offering unmatched devices. You can attract your Apple users easily if an application will be created on a synchronized environment Apple’s platform. These special flexible User Interface of the features of the iOS app can make your business application more desirable and boost up their sales and earn maximum benefits.</li><li><span style=\"font-weight: bold;\">iOS has more security.</span> iOS platform offers its users stay safe from external threats which is the best part and advantage of this platform. While developing an app for the business, providing a powerful shield against malware, virus and other internet threats for app development of a business. iOS applications are secured applications, allows effortless transaction facilities app without spending more time on testing different devices.</li><li>For <span style=\"font-weight: bold;\">business</span>, there are multiple options available in the highly popular iOS app making software market, this is because important to attract new customers to increase sales and chance to empower your business in the global market. The web is not a safe place for so thanks to a well-developed iPhone app Development Company can increase their availability and protect your customer’s information. With an iOS mobile app, always been an attractive device to the public with constant acknowledgment from App Store and business can flourish on a regular basis.</li><li>iOS users are usually <span style=\"font-weight: bold;\">happy users,</span> an efficiently developed iOS app helps to promote your brand or your organization to enhance productivity with profitability services to reach your targeted audience. iOS application builds a strong relationship with customers and clients, and the great audience to deliver your product and solutions to achieve their goals. Better the application is, strong would be the relationship with the superior brand in consumer electronics.</li><li>iOS applications are <span style=\"font-weight: bold;\">innovation </span>and the latest technology used globally and this can help your business to expand the most secure way. With best iOS app development software is accepted globally, you may transforming traditional business processes in a modern way and find customers from every part of the world.</li></ul>\r\n<h1 class=\"align-center\">What is IDE?</h1>\r\nIDE is the acronym for Integrated Development Environment. This contains a set of tools, resources and programming essentials within itself. It helps software/web/ mobile app developers to create new programs. This is a comprehensive solution for creating software or mobile app independently. These resources make development, deployment and debugging processes very simple. Choosing an IDE for iPhone app development is dependent on the budget, kind of programming language you prefer, etc. There are so many functionalities in an IDE that gives you a lot of benefits for app development.\r\nThe IDE makes strategies and streamlines the development phase for your entire team. It has many tools for automation, programming, debugging, compiling and for interpretation. There are three general types of IDE available. They are cloud-based, software as a service (SaaS) type and installing on the server type. IDE for iOS application development software is preferred bycompanies to reduce development time and costs. It helps in accurate testing and easy coding. Integration is also possible with these IDEs. It is as simple as a word processing program used by developers to create robust mobile applications.<br /> ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_iOS_Software_Development.png","alias":"ios-software-development"},"597":{"id":597,"title":"Android Software Application","description":" Android software development is the process by which new applications are created for devices running the Android operating system. Google states that "Android apps can be written using Kotlin, Java, and C++ languages" using the Android software development kit (SDK), while using other languages is also possible. All non-JVM languages, such as Go, JavaScript, C, C++ or assembly, need the help of JVM language code, that may be supplied by tools, likely with restricted API support. Some languages/programming tools allow cross-platform app support, i.e. for both Android and iOS. Third party tools, development environments and language support have also continued to evolve and expand since the initial SDK was released in 2008. In addition, with major business entities like Walmart, Amazon, Bank of America etc. eyeing to engage and sell through mobiles, mobile application development is witnessing a transformation.\r\nAndroid was created by the Open Handset Alliance, which is led by Google. The early feedback on developing applications for the Android platform was mixed. Issues cited include bugs, lack of documentation, inadequate QA infrastructure, and no public issue-tracking system. In December 2007, MergeLab mobile startup founder Adam MacBeth stated, "Functionality is not there, is poorly documented or just doesn't work... It's clearly not ready for prime time." Despite this, Android-targeted applications began to appear the week after the platform was announced. The first publicly available application was the Snake game.\r\nA preview release of the Android SDK was released on November 12, 2007. On July 15, 2008, the Android Developer Challenge Team accidentally sent an email to all entrants in the Android Developer Challenge announcing that a new release of the SDK was available in a "private" download area. The email was intended for winners of the first round of the Android Developer Challenge. The revelation that Google was supplying new SDK releases to some developers and not others (and keeping this arrangement private) led to widely reported frustration within the Android developer community at the time.\r\nOn August 18, 2008, the Android 0.9 SDK beta was released. This release provided an updated and extended API, improved development tools and an updated design for the home screen. Detailed instructions for upgrading are available to those already working with an earlier release. On September 23, 2008, the Android 1.0 SDK (Release 1) was released. According to the release notes, it included "mainly bug fixes, although some smaller features were added." It also included several API changes from the 0.9 version. Multiple versions have been released since it was developed.\r\nOn December 5, 2008, Google announced the first Android Dev Phone, a SIM-unlocked and hardware-unlocked device that is designed for advanced developers. It was a modified version of HTC's Dream phone. While developers can use regular consumer devices to test and use their applications, some developers may choose a dedicated unlocked or no-contract device.\r\nAs of July 2013, more than one million applications have been developed for Android, with over 25 billion downloads. A June 2011 research indicated that over 67% of mobile developers used the platform, at the time of publication. Android smartphone shipments are forecast to exceed 1.2 billion units in 2018 with an 85% market share.","materialsDescription":" <span style=\"font-weight: bold;\">Where does Android come from?</span>\r\nIt comes from Google, who actually acquired Android in 2005 (no, Google didn't invent it). The search giant performs regular updates along with an annual major update.\r\nThe operating system is based on the Linux kernel – if you have friends who work in IT, you may have heard of it. This is the GNU / Linux operating system based structure, which is a unix type system (portable operating system, multitasking and multi-user). The Linux kernel is one of the most prominent examples of free software.\r\n<span style=\"font-weight: bold;\">Why does Android look different on each phone?</span>\r\nAndroid doesn't look different on every device, but it does have a number of different versions. Android is open-source, which means that manufacturers are free to customize the software and make it their own.\r\nThe 'purest' version of Android is often referred to as 'stock Android' and it's often preferred by the Android community: it's the original software as Google intended.\r\nOther user interfaces (UI) include Samsung's TouchWiz, Sony's Xperia, and Huawei's Emotion. See what they all look like in our Android UI comparison.\r\n<span style=\"font-weight: bold;\">What are the advantages of Android?</span>\r\nChoice. For example, if you want iOS, you have a choice of iPhone, iPhone or iPhone. If you go for Android there are stacks of great devices to choose from, from cheap and cheerful handsets to really impressive flagships. Those flagships are often cheaper than the equivalent Apple devices, too.\r\nAndroid’s choice isn’t just about hardware. It’s about everything else too. Android is incredibly easy to customize, both in terms of how it looks and how it works, and the various app stores aren’t as tightly controlled as its rivals’ stores, like Apple.\r\n<span style=\"font-weight: bold;\">What’s with the candy names?</span>\r\nEach new version of Android gets a code name based on consecutive letters of the alphabet. The most recent version is known as Marshmallow because it is the Android M release. Previous versions have included Lollipop, KitKat, Jelly Bean and Gingerbread.\r\n<span style=\"font-weight: bold;\">What’s the best thing about Android?</span>\r\nOptions, many options. With Android, you have hundreds of gadgets at your disposal, the cheapest, the most expensive and innovative market. Android is also incredibly customizable, both in their roles, as in his appearance. You can really make a unique mobile experience for yourself with this OS.\r\n<span style=\"font-weight: bold;\">What’s the worst thing about Android?</span>\r\nGetting updates. In many cases, manufacturers don’t seem to care about providing software updates for devices they’ve already sold you. Even when they do provide updates they take their sweet time about it. That’s why some consider rooting: you can download the updates yourself and apply them instead of waiting for the manufacturer to get around to it.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Android_Software_Application.png","alias":"android-software-application"},"598":{"id":598,"title":"Mobile Website Development","description":" Today, virtually no company can effectively conduct its business without having its own website. A site is not just the face of the company, which should be nice to look at, not an attribute of doing business, but an urgent need. If the company has its own website, then it:\r\n<ul><li>facilitates potential customers and partners access to information about themselves;</li><li>attracts the target audience from the Internet;</li><li>significantly increases market coverage;</li><li>increases brand awareness;</li><li>facilitates communication both with partners and with the target audience;</li><li>improves customer feedback;</li><li>increases customer loyalty.</li></ul>\r\nHowever, the main advantage of owning a website, of course, is that it helps to significantly increase sales, and, consequently, profit. In general, now having a website is almost a prerequisite for successful business development.\r\nComputers, smartphones, tablets, other mobile devices, and the Internet have penetrated all spheres of our lives. A variety of mobile devices are especially popular, and that is why it is no longer possible to limit oneself to a PC version of a site. The website version for the PC is bad for mobile devices, and this, as you might guess, negatively affects sales and profits. If the site is uncomfortable to use, then the potential client will not rack their brains, but simply use the services of competitors. The vast majority will not even try to find something on the site if it is not adapted for mobile devices.\r\nA separate mobile version of the site is a site specifically designed for mobile users. As a rule, a mobile version of a site is hosted on a dedicated subdomain.\r\nThe mobile version of the site, in most cases, is simply a greatly reduced version of the site for the PC. Only those functions that, according to the developers, maybe needed by those users who access the site with a smartphone or tablets, are left on the mobile site.\r\nThe mobile version of the site is good in that it does not depend on the main one, can be easily changed and edited, loads quickly is quite convenient for users, and also has the option of switching to the main version of the site.","materialsDescription":" <span style=\"font-weight: bold;\">What’s a mobile website?</span>\r\nMobile devices have transformed the way we live, putting the digital world at our fingertips 24 hours a day, wherever we are.\r\nThis means establishing your mobile presence is more important now than ever as you have the opportunity to put your business in the pockets of your consumers and create more meaningful interactions with your users. Almost 80% of people use smartphones to search the internet, so if your business is lacking a mobile website or app, you are missing out on a huge market opportunity.\r\nThere are two types of mobile development – responsive mobile sites and mobile applications. We build easy to use, intuitive and responsive mobile apps and websites, designed for optimization across all devices to keep you ahead of your competitors.\r\nA mobile website is a website with a responsive, fluid design, that is user-friendly on multiple devices and web browsers. A study conducted by Google and Galaxy in June 2015 found that 74% of Australians rely on their phones at least as much as they rely on desktops when searching for information, ideas or advice. This is when responsive design plays a huge role.\r\n<span style=\"font-weight: bold;\">Why do I need a mobile website?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mobile traffic has taken over</span></span>\r\nAs mobile traffic has taken over desktop traffic in 2015, more and more people only browse the internet on mobile phones. This means that businesses now need to adopt a mobile-first approach to their online strategies.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Search engines are pushing for better UX</span></span>\r\nMobile users tend to have poor experiences on desktop websites. This is something that search engines such as Google have understood, and are putting initiatives in place to improve mobile web experiences. For example, Google released its mobile-friendly update in 2015 and is switching its search index to mobile-first.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Competitive advantage</span></span>\r\nWebsite owners now need to provide compelling experiences to their mobile users. This is something that is now vital in order to reach business goals and lead users to conversion. As a result, the fast adoption of a mobile strategy is a competitive advantage.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mobile_Website_development.png","alias":"mobile-website-development"},"603":{"id":603,"title":"MacOS Development","description":" The key to great app development lies in having a solid foundation, ideally laid in having a good operating system, to begin with on which your app will stand on and initiate all its operations. For a long time, Windows was the dominating operating system of the nineties.\r\nWhy Should You Use Mac OS X in App Development? A reason for this system’s stagnation in progress is the brand’s fear in offending its corporate clients; therefore every tech change has to be introduced painfully slowly so as to be assimilated by its clients.\r\nApple, on the other hand, has slowly crept up and overtaken Windows and other operating systems primarily because they are not afraid of taking giant leaps. Their “it’s our way or the high way” approach to their operating system has enabled them to make significant improvements in their software, which other operating systems are almost incapable of attaining.\r\nMAC OS X software is essentially a two-layered system. Its impressive GUI sits on top of a UNIX core, and UNIX is notorious for its impressive security features. UNIX makes it’s nearly impossible to install a Trojan or a virus to the system unless the user gives it root access to the system by essentially typing in the admin password into the system.\r\nThe beauty of MAC OS X built-in firewall is that it operates out the box, while at the same time being highly flexible. While MAC users should ideally remain vigilant about foreign files and consequentially never allow them into the system by giving them an admin pass, they then do not need special software to block out these viruses.\r\nMAC OS interface is simple, you can pin as many apps as possible to dock at the bottom of your screen, plus they are always available to you. Besides this, you can run multiple desktops, make use of your iCloud chain to decipher your credit card information, share various files wirelessly through Airdrop, and still monitor the operating system via a set of in-built high-grade utility tools.\r\nThe system also has a rapid start-up resume time. All this is essentially made possible by MAC OS powerful stability. Even though systemic degradation is expected over time, as is the case with just about every operating system, the rate is significantly reduced on MAC products and freezing and crashing are not a common everyday occurrence as is the case with a few operating systems.\r\nMAC’s impressive reliability can be primarily attributed to the fact that the operating system was built from the ground up. Apple essentially controls the production of its software and hardware products from start to finish, and so every part of the system is designed and tested out to work cohesively together.\r\nThose who complain that Apple forces its consumers to use its proprietary software couldn’t be more misguided. MAC OS automatically recognizes and works well with other Apple products including iPads, iPhones, etc.","materialsDescription":"<span style=\"font-weight: bold;\">What is Mac OS X?</span>\r\nMac OS X is an operating system created by Apple for Mac computers (the first version was introduced in 2001), which replaced the then outdated Mac OS 9.\r\nThis is a POSIX-compatible system, that is, all Unix operations can be performed in it. Built on the basis of the XNU core with the Aqua graphical interface.\r\nStarting with version 10.8 it is called OS X.\r\n<span style=\"font-weight: bold; \">What are the advantages of macOS?</span>\r\n<span style=\"font-style: italic; \">Fewer virus attacks:</span>\r\nAs macOS is the second most used operating system and has fewer active users so it has fewer virus attacks also. The other reason for virus safety is its UNIX relationship which is more secure than Windows OS.\r\n<span style=\"font-style: italic; \">Good customer support:</span>\r\nMac users get a good response from their support team as compared to other operating systems. Apple has skilled engineers which help the user in fixing the issues in their hardware and software.\r\n<span style=\"font-style: italic; \">Similar GUI for all the products:</span>\r\nmacOS has the same graphical user interface (GUI) as found in other Apple products like iPhone and tablets. Users feel comfortable in using macOS if they shifted from other Apple products.\r\n<span style=\"font-style: italic; \">Performance and long life:</span>\r\nAs Apple makes both hardware and software so it’s hardware communication is very efficient and it improves performance. The operating system and hardware work great. Apple computer has a longer life than other computers. The battery timing of mac laptops is also longer.\r\n<span style=\"font-style: italic; \">Default apps:</span>\r\nIf you install Windows then it comes with pre-installed apps that slow down your computer e.g. Onedrive slows your computer. But this is not the case with macOS, it comes with powerful apps which don’t affect the performance of your system. Some of the pre-installed apps of macOS are iPhoto and iMovie.\r\n<span style=\"font-style: italic; \">Support NTFS and FAT:</span>\r\nmacOS support Windows file system formats including both NTFS and FAT.\r\n<span style=\"font-style: italic; \">Can run Windows:</span>\r\nYou can run the Windows operating system if you have macOS installed by using Bootcamp or parallels software.\r\n<span style=\"font-weight: bold; \">What are the disadvantages of macOS?</span>\r\n<span style=\"font-style: italic; \">Expensive:</span>\r\nThe minimum cost of a Mac PC is higher than $1000. You can get a good Windows PC at $1000 with more hardware specifications.\r\n<span style=\"font-style: italic; \">Fewer games and software:</span>\r\nMost game developers prefer to make games for the Windows OS because they have more percentages of users. Mac users have fewer games available. Also, mac computers have low graphics capability to run high graphics games. There is some software that is available for Windows and not available for mac users e.g. adobe premiere pro etc.\r\n<span style=\"font-style: italic; \">No hardware customization:</span>\r\nIf you buy any Mac computer/laptop then you cannot change its hardware parts like processor, graphics card, etc. For some mac computers, you can change hardware and RAM but it is not for all mac computers. It is also not possible to change other hardware accessories like internal computer parts, the only choice you have is to buy a new mac computer. On every major release of your operating system you have to change your computer else 50% of your operating system features not work.\r\n<span style=\"font-style: italic; \">Windows cannot read the macOS file system:</span>\r\nmacOS can read NTFS and FAT Windows format but Windows cannot read the macOS file system. You need to install 3rd party software in Windows to do so. Some other software like footnotes has compatibility issues while moving files from macOS to Windows.\r\n<span style=\"font-style: italic; \">Less hardware used:</span>\r\nThe new version of macOS computer supports fewer USB ports and they also not shipped with CD/DVD writer.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MacOS_Development.png","alias":"macos-development"},"605":{"id":605,"title":"Java Development","description":" Java is a general-purpose programming language that is class-based, object-oriented, and designed to have as few implementation dependencies as possible. It is intended to let application developers write once, run anywhere (WORA), meaning that compiled Java code can run on all platforms that support Java without the need for recompilation. Java applications are typically compiled to bytecode that can run on any Java virtual machine (JVM) regardless of the underlying computer architecture. The syntax of Java is similar to C and C++, but it has fewer low-level facilities than either of them. As of 2019, Java was one of the most popular programming languages in use according to GitHub, particularly for client-server web applications, with a reported 9 million developers.\r\nJava was originally developed by James Gosling at Sun Microsystems (which has since been acquired by Oracle) and released in 1995 as a core component of Sun Microsystems' Java platform. The original and reference implementation Java compilers, virtual machines, and class libraries were originally released by Sun under proprietary licenses. As of May 2007, in compliance with the specifications of the Java Community Process, Sun had relicensed most of its Java technologies under the GNU General Public License. Meanwhile, others have developed alternative implementations of these Sun technologies, such as the GNU Compiler for Java (bytecode compiler), GNU Classpath (standard libraries), and IcedTea-Web (browser plugin for applets).\r\nThe latest versions are Java 13, released in September 2019, and Java 11, a currently supported long-term support (LTS) version, released on September 25, 2018; Oracle released for the legacy Java 8 LTS the last free public update in January 2019 for commercial use, while it will otherwise still support Java 8 with public updates for personal use up to at least December 2020. Oracle (and others) highly recommend uninstalling older versions of Java because of serious risks due to unresolved security issues. Since Java 9 (and 10 and 12) is no longer supported, Oracle advises its users to immediately transition to the latest version (currently Java 13) or an LTS release.","materialsDescription":"<span style=\"font-weight: bold; \">What is Java technology and what is its application?</span>\r\nJava is a programming language and computing platform that was first launched by Sun Microsystems in 1995. There are many applications and websites that do not work when Java is not installed, and the number of such websites and applications is increasing every day. Java is fast, highly secure, and reliable. From laptops to data centers, from game consoles to supercomputers used for scientific research, from cell phones to the Internet - Java is everywhere!\r\n<span style=\"font-weight: bold;\">What is the performance of Java?</span>\r\nPrograms written in Java have a reputation for being slower and taking up more RAM than those written in C. Nevertheless, the speed of execution of programs written in Java has been significantly improved with the release of the so-called JIT compiler in 1997-1998. in version 1.1, in addition to other language features to support better code analysis (such as inner classes, StringBuffer class, simplified logic calculations, and so on). In addition, the Java virtual machine was optimized - since 2000, the HotSpot virtual machine has been used for this. As of February 2012, Java 7 code is approximately 1.8 times slower than C code.\r\nSome platforms offer hardware runtime support for Java. For example, microcontrollers that run Java code on hardware instead of software JVMs, as well as ARM-based processors that support Java bytecode through the Jazelle option.\r\n<span style=\"font-weight: bold;\">What are the main features of Java?</span>\r\n<ul><li>Automatic memory management.</li><li>Advanced exception handling capabilities.</li><li>A rich set of I/O filtering tools.</li><li>A set of standard collections: array, list, stack, etc.</li><li>The presence of simple tools for creating network applications (including using the RMI protocol).</li><li>The presence of classes that allow you to perform HTTP requests and process responses.</li><li>Built-in language tools for creating multi-threaded applications, which were then ported to many languages (for example, Python).</li><li>Unified access to databases: at the level of individual SQL queries - based on JDBC, SQLJ; at the level of the concept of objects with the ability to store in the database - based on Java Data Objects (English) and Java Persistence API.</li><li>Generalization support (since version 1.5).</li><li>Support for lambdas, closures, built-in functional programming features.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Java_Development.png","alias":"java-development"},"607":{"id":607,"title":"C/C++ Development","description":" C++ is a general-purpose object-oriented programming (OOP) language, developed by Bjarne Stroustrup, and is an extension of the C language. It is therefore possible to code C++ in a "C style" or "object-oriented style." In certain scenarios, it can be coded in either way and is thus an effective example of a hybrid language.\r\nC++ is considered to be an intermediate-level language, as it encapsulates both high- and low-level language features. Initially, the language was called "C with classes" as it had all the properties of the C language with an additional concept of "classes." However, it was renamed C++ in 1983.\r\nC++ is one of the most popular languages primarily utilized with system/application software, drivers, client-server applications and embedded firmware.\r\nThe main highlight of C++ is a collection of predefined classes, which are data types that can be instantiated multiple times. The language also facilitates declaration of user-defined classes. Classes can further accommodate member functions to implement specific functionality. Multiple objects of a particular class can be defined to implement the functions within the class. Objects can be defined as instances created at run time. These classes can also be inherited by other new classes which take in the public and protected functionalities by default.\r\nC++ includes several operators such as comparison, arithmetic, bit manipulation and logical operators. One of the most attractive features of C++ is that it enables the overloading of certain operators such as addition.\r\nA few of the essential concepts within the C++ programming language include polymorphism, virtual and friend functions, templates, namespaces and pointers.","materialsDescription":"<span style=\"font-weight: bold; \"> Bjarne Stroustrup's FAQ</span>\r\n<span style=\"font-weight: bold; \">C is better than C++ for small projects, right?</span>\r\nNot in my opinion. I never saw a project for which C was better than C++ for any reason but the lack of a good C++ compiler.\r\n<span style=\"font-weight: bold; \">Is C a subset of C++?</span>\r\nIn the strict mathematical sense, C isn't a subset of C++. There are programs that are valid C but not valid C++ and even a few ways of writing code that has a different meaning in C and C++. However, C++ supports every programming technique supported by C. Every C program can be written in essentially the same way in C++ with the same run-time and space efficiency. It is not uncommon to be able to convert tens of thousands of lines of ANSI C to C-style C++ in a few hours. Thus, C++ is as much a superset of ANSI C as ANSI C is a superset of K&R C and much as ISO C++ is a superset of C++ as it existed in 1985.\r\n<span style=\"font-weight: bold; \">What is the difference between C and C++?</span>\r\nC++ is a direct descendant of C that retains almost all of C as a subset. C++ provides stronger type checking than C and directly supports a wider range of programming styles than C. C++ is "a better C" in the sense that it supports the styles of programming done using C with better type checking and more notational support (without loss of efficiency). In the same sense, ANSI C is a better C than K&R C. In addition, C++ supports data abstraction, object-oriented programming, and generic programming (see my books).\r\nI have never seen a program that could be expressed better in C than in C++ (and I don't think such a program could exist - every construct in C has an obvious C++ equivalent). However, there still exist a few environments where the support for C++ is so weak that there is an advantage to using C instead.\r\n<span style=\"font-weight: bold; \">Do you really think that C and C++ could be merged into a single language?</span>\r\nI think that it would be a very good thing for the C/C++ community if they were. That is, if the C/C++ incompatibilities were systematically and completely eliminated and that future evolution was organized so as to prevent new incompatibilities from emerging. Whether that's possible is another matter.\r\nMy basic point is that the current C/C++ incompatibilities are "accidents of history" that have no fundamental reasons behind them (though they all "looked like a good idea at the time" to some competent and well-meaning people). The C/C++ incompatibilities provide no benefits to the community at large, cause serious problems to a large section of the C/C++ community, and could - with great difficulty - be eliminated.\r\nFor a far more detailed presentation of my views on C/C++ compatibility, see the series of papers I wrote about this:\r\n<ul><li>B. Stroustrup: C and C++: Case Studies in Compatibility. The C/C++ Users Journal. September 2002.</li><li>B. Stroustrup: C and C++: A Case for Compatibility. The C/C++ Users Journal. August 2002.</li><li>B. Stroustrup: C and C++: Siblings. The C/C++ Users Journal. July 2002.</li><li>B. Stroustrup: Sibling rivalry: C and C++. AT&T Labs - Research Technical Report. TD-54MQZY. January 2002. </li></ul>\r\nI imagine that if incompatibilities were eliminated (by making changes to both C and C++), there would still be entities called C and C++, but then C really would be defined as a subset of C++.\r\n<span style=\"font-weight: bold; \">Why did you make C++ (almost) compatible with C?</span>\r\nI wanted C++ to be compatible with a complete language with sufficient performance and flexibility for even the most demanding systems programming.\r\nAt the time, I considered C the best systems programming language available. That was not as obvious then (1979) as it later became, but I had experts such as Dennis Ritchie, Steve Johnson, Sandy Fraser, Greg Chesson, Doug McIlroy, and Brian Kernighan down the corridor from whom I could learn and get feedback. Without their help and advice, and without C, C++ would have been stillborn.\r\nContrary to repeated rumors, I was never told that I had to use C; nor was I ever told not to use C. In fact, the first C++ manual grew from troff source of the C manual that Dennis gave me. Many new languages were designed at Bell labs; in "Research" at least, there were no rules enforcing language bigotry.\r\n<span style=\"font-weight: bold; \">What do you think of C/C++?</span>\r\nNo that's not really a question I often get. In that sense, it is the only "fake FAQ" in this FAQ. However, it ought to be a FAQ because people use "C/C++" as if it meant something specific and as if they knew what it meant, leading to much confusion and misery. People should ask "What is C/C++?" and then on reflection stop using the term. It does harm.\r\nThere is no language called "C/C++". The phrase is usually used by people who don't have a clue about programming (e.g. HR personnel and poor managers). Alternatively, it's used by people who simple do not know C++ (and often not C either). When used by programmers, it typically indicates a "C++ is C with a few useful and a lot of useless complicated features added" attitude. Often, that is the point of view of people who like to write their own strings and hash tables with little knowledge of the standard library beyond printf and memcpy. There are people who stick to a restricted subset of C++ for perfectly good reasons, but they (as far as I have noticed) are not the people who say "C/C++".\r\nI use C/C++ only in phrases such as "C/C++ compatibility" and "C/C++ community".\r\n<span style=\"font-weight: bold;\">When was C++ invented?</span>\r\nI started work on what became C++ in 1979. The initial version was called "C with Classes". The first version of C++ was used internally in AT&T in August 1983. The name "C++" was used late that year. The first commercial implementation was released October 1985 at the same time as the publication of the 1st edition of The C++ Programming Language. Templates and exception handling were included later in the 1980's and documented in The Annotated C++ Reference Manual and The C++ Programming Language (2rd Edition). The first ISO C++ standard was C++98 as described in The C++ Programming Language (3rd Edition).\r\nThe current definition of C++ The 2011 ISO C++ Standard described in The C++ Programming Language (4th Edition).\r\nYou can find a more complete timeline and more detailed explanations in The Design and Evolution of C++ and A History of C++: 1979-1991 and Evolving a language in and for the real world: C++ 19.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_C_C_Development.png","alias":"cc-development"},"609":{"id":609,"title":".Net Development","description":" .NET Framework is a software framework developed by Microsoft that runs primarily on Microsoft Windows. It includes a large class library named Framework Class Library (FCL) and provides language interoperability (each language can use code written in other languages) across several programming languages. Programs written for .NET Framework execute in a software environment (in contrast to a hardware environment) named Common Language Runtime (CLR), an application virtual machine that provides services such as security, memory management, and exception handling. As such, computer code written using .NET Framework is called "managed code". FCL and CLR together constitute the .NET Framework.\r\nFCL provides user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. Programmers produce software by combining their source code with .NET Framework and other libraries. The framework is intended to be used by most new applications created for the Windows platform. Microsoft also produces an integrated development environment largely for .NET software called Visual Studio.\r\n.NET Framework began as proprietary software, although the firm worked to standardize the software stack almost immediately, even before its first release. Despite the standardization efforts, developers, mainly those in the free and open-source software communities, expressed their unease with the selected terms and the prospects of any free and open-source implementation, especially regarding software patents. Since then, Microsoft has changed .NET development to more closely follow a contemporary model of a community-developed software project, including issuing an update to its patent promising to address the concerns.\r\n.NET Framework led to a family of .NET platforms targeting mobile computing, embedded devices, alternative operating systems, and web browser plug-ins. A reduced version of the framework, .NET Compact Framework, is available on Windows CE platforms, including Windows Mobile devices such as smartphones. .NET Micro Framework is targeted at very resource-constrained embedded devices. Silverlight was available as a web browser plugin. Mono is available for many operating systems and is customized into popular smartphone operating systems (Android and iOS) and game engines. .NET Core targets the Universal Windows Platform (UWP), and cross-platform and cloud computing workloads.","materialsDescription":"When Microsoft formally introduced its .NET strategy in mid-2000, analysts were confused about how the company would pull off such a massive platform shift. Over two years later, they're still wondering. But .NET isn't vaporware, and it's not a pipe dream. In fact, .NET is happening today.\r\n<span style=\"font-weight: bold; \">What is .NET?</span>\r\nActually, .NET is many things, but primarily it's a marketing term for a set of products and technologies that Microsoft is creating to move personal and enterprise computing beyond the PC desktop and into a distributed Internet-based environment. So .NET--which was originally called Next Generation Windows Services (NGWS)--is also a platform, one that Microsoft sees as the successor to Windows. The .NET platform is based on Web services which are, in turn, defined by a language called XML.\r\n<span style=\"font-weight: bold; \">What is XML?</span>\r\nXML--the eXtensible Markup Language--is a self-descriptive, data definition language. It's structure is similar to HTML, the language of the Web, but it's far more powerful because it's not limited to a static list of language constructs ("tags") that the language's authors supply. Instead, XML is extensible and dynamic: Programmers can define new types of data using XML and then describe that data so that others will know how to use it.\r\n<span style=\"font-weight: bold; \">What are Web services?</span>\r\nWeb services are functions exposed by server-side applications. They are programmable units that other applications (and Web services) can access over the Internet.\r\n<span style=\"font-weight: bold; \">Does .NET require Windows?</span>\r\nTechnically, no, but realistically, yes. It's possible the .NET platform could be ported to other operating systems, such as Linux, FreeBSD, the Macintosh, or whatever, and indeed, some work is being done now in this area. However, .NET very much requires Windows today, on both the server and the client. One might say that .NET and Windows have a symbiotic relationship going forward.\r\n<span style=\"font-weight: bold; \">Is .NET is being ported to Linux?</span>\r\nYes. A company called Ximian is porting the standards-based parts of .NET to Linux as you read this, and the work is amazingly far along. Code-named Mono, this project seeks to bring the C# programming language, the Common Language Runtime (CLR, see below), and other .NET features to Linux.\r\nOn a related note, Microsoft has contracted Corel (makers of CorelDRAW and Word Perfect) to port .NET to FreeBSD.\r\n<span style=\"font-weight: bold; \">Isn't .NET just another name for COM, COM+, Windows DNA, or some other previous Windows technology?</span>\r\nActually, no. Microsoft spent considerable time and effort developing and promoting a set of Windows technologies that was at various times called OLE, COM, COM+, and Windows DNA (Distributed InterNet Architecture) but .NET is not the next iteration. Windows DNA, which was the final umbrella term for this set of technologies, was based around a concept where Windows-based software components could expose their services for other local and remote Windows software components. But though this sounds passingly similar to .NET, Windows DNA is very much based on proprietary Windows technologies. By comparison, .NET is based on open standards (XML and various related technologies), so it will be much easier for other vendors to adopt the platform and write compatible software. So we can eventually expect to see .NET clients and servers on platforms other than Windows.\r\n<span style=\"font-weight: bold; \">So what technologies are part of .NET?</span>\r\n.NET is comprised of several related technologies, including:\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">.NET Framework</span></span> - A runtime environment and set of standard services which .NET capable applications and services can utilize. Implemented as a code library, the .NET Framework includes the Common Language Runtime (CLR), the .NET run-time environment; ASP .NET, a Web applications platform; and ADO .NET, for data store access.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">.NET Compact Framework</span></span> - A subset of the .NET Framework designed for Pocket PCs, Microsoft Smart Phones, and other Windows CE .NET-based mobile devices.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">MSN consumer services</span></span> - Microsoft will use its consumer-oriented MSN online service to expose Web services to individuals. The current version, MSN 8, includes the .NET Passport's authentication services, email, address book, calendaring and tasks, and other similar services.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">.NET Enterprise Servers</span></span> - An extensive set of Microsoft server software that runs on Windows servers, including Application Server, BizTalk Server, Exchange Server, Host Integration Server, Internet Security and Acceleration Server, SQL Server, and many others. Microsoft is currently shipping many such server products, but they are all based on Windows DNA currently, not .NET. Future server products--beginning with Windows .NET Server 2003, due in April 2003--will actually be based on .NET technologies for the first time.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Visual Studio .NET</span></span> - Microsoft's .NET development environment, with support for languages such as Visual Basic .NET, Visual C++ .NET, Visual C# .NET, and Visual J#, which all target the .NET Framework. Other vendors can add other language capabilities to Visual Studio .NET, and the suite can be used to target a wide range of applications and services, including .NET Web services, Windows applications, and Web applications. Note that Visual Studio .NET is not required to create .NET applications and services: Developers can download the .NET Framework for free; this download includes compilers for Visual Basic .NET, Visual C++ .NET and Visual C# .NET.\r\n<span style=\"font-weight: bold;\">OK, so what's the point? How does this make my life better?</span>\r\nWith apologies to Microsoft for stealing the term, .NET enables a better PC ecosystem. That is, by making life easier for everyone involved with PCs, the benefits are cross-pollinated. Here's how .NET makes life easier on various groups:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Programmers</span></span> - Because developers now have a consistent, language-neutral programming environment, they can create better applications and services more quickly. And because .NET encompasses such a wider range of functionality, those applications and services can be connected to back-end services via the Internet, offering better, and more exciting functionality.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">IT administrators</span></span> - Because .NET applications and services do away with the "DLL Hell" found in previous Windows applications, they are amazingly easy to distribute and install.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">End users</span></span> - For the reasons listed above, and many others, a new generation of .NET applications and services will provide new types of connected functionality. Access your email from anywhere. Pay for products online without typing in your credit card information. Access weather, traffic, music, and other personal information from a variety of devices, from anywhere in the world. The future is all connected, and .NET will get us there.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Net_Development.png","alias":"net-development"},"611":{"id":611,"title":"ObjectiveC Development","description":"Objective-C is a general-purpose, object-oriented programming language that adds Smalltalk-style messaging to the C programming language. It was the main programming language supported by Apple for the macOS, iOS and iPadOS operating systems, and their respective application programming interfaces (APIs) Cocoa and Cocoa Touch until the introduction of Swift in 2014.\r\nThe language was originally developed in the early 1980s. It was later selected as the main language used by NeXT for its NeXTSTEP operating system, from which macOS and iOS are derived. Portable Objective-C programs that do not use Apple libraries, or those using parts that may be ported or reimplemented for other systems, can also be compiled for any system supported by GNU Compiler Collection (GCC) or Clang.\r\nObjective-C source code 'implementation' program files usually have .m filename extensions, while Objective-C 'header/interface' files have .h extensions, the same as C header files. Objective-C++ files are denoted with a .mm file extension.\r\nObjective-C was invented in the early 1980s as a means to add Object-Oriented programming capabilities to C. The inventors, Brad Cox and Tom Love, thought that Smalltalk (an early OO language) could provide the tools needed for truly re-usable code and for creating development environments for systems developers.\r\nCox began by writing a pre-processor for C that allowed for the inclusion of Smalltalk-like code, which would then be rendered into compilable C. This turned into a fully-Object-Oriented C extension.\r\nObjective-C was eventually fully defined and described in the book Object-Oriented Programming: An Evolutionary Approach.\r\nNeXT licensed Objective-C in 1988 and developed several tools based on it. These tools eventually became (after several intermediate steps) the Cocoa development environment, which is used by several Apple systems: Mac OS X, iOS, Apple WatchOS.\r\nFor several years now, apps are written for one of these Apple operating systems needed to be written (or compiled to, or run on top of) Objective-C. That situation is changing now as Apple moves its platform to Swift.\r\nIn addition to Cocoa, Objective-C is also used in the GNUstep platform, which can run on Linux, Unix, BSD, and Windows environment, and which closely mirrors Cocoa.","materialsDescription":" <span style=\"font-weight: bold;\">What is Objective-C?</span>\r\nObjective-C is a general-purpose, object-oriented programming language that adds Smalltalk-style messaging to the C programming language. This is the main programming language used by Apple for the OS X and iOS operating systems and their respective APIs, Cocoa and Cocoa Touch. This reference will take you through a simple and practical approach while learning Objective-C Programming language.\r\n<span style=\"font-weight: bold;\">What is OOP?</span>\r\nOOP means Object Oriented Programming; it is a type of programming technique that helps to manage a set of objects in a system. With the help of various programming languages, this method helps to develop several computer programs and applications.\r\n<span style=\"font-weight: bold;\">What Objective-C program consists of?</span>\r\nThe objective-c program basically consists of:\r\n<ul><li>Preprocessor commands</li><li>Interface</li><li>Implementation</li><li>Method</li><li>Variables</li><li>Statements & Expressions</li><li>Comments</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_ObjectiveC_Development.png","alias":"objectivec-development"},"613":{"id":613,"title":"C# Development","description":" C#, (C-Sharp) is a programming language that combines object-oriented and aspect-oriented concepts. Developed in 1998–2001 by a group of engineers under the leadership of Anders Hejlsberg at Microsoft as the main language for developing applications for the Microsoft .NET platform. The compiler with C# is included in the standard installation of the .NET itself, so programs on it can be created and compiled even without tools like Visual Studio.\r\nC# refers to a family of languages with a C-like syntax, of which its syntax is closest to C++ and Java. The language has strict static typing, supports polymorphism, operator overloading, pointers to member functions of classes, attributes, events, properties, exceptions, comments in XML format. Having taken a lot from their predecessors - C++, Java, Delphi, Modula and Smalltalk - C#, based on the practice of using them, excludes some models that have proven to be problematic when developing software systems: thus, C # does not support multiple class inheritance (unlike C ++).\r\nC# was developed as an application level programming language for the CLR and, as such, depends primarily on the capabilities of the CLR itself. This concerns, first of all, the C # type system, which reflects FCL. The presence or absence of certain expressive features of the language is dictated by whether a particular language feature can be translated into the corresponding CLR constructs. So, with the development of the CLR from version 1.1 to 2.0, C # itself was significantly enriched; similar interaction should be expected in the future. (However, this pattern was broken with the release of C # 3.0, which are language extensions that do not rely on .NET platform extensions.) The CLR provides C #, like all other .NET-oriented languages, many of the features that the “classical” programming languages lack. For example, garbage collection is not implemented in C # itself, but the CLR is done for programs written in C # just like it is done for programs on VB.NET, J #, and others.","materialsDescription":"<span style=\"font-weight: bold;\"> Why is it necessary to study the C# programming language?</span>\r\n<span style=\"font-weight: bold;\">Reason # 1. Language program C# develops.</span>\r\nNew programming languages appear annually. And the main demand is expanding and progressing. Since the C# programming language was created and accompanied by Microsoft, this technological “hippopotamus” periodically makes improvable with the addition of useful functions in C #, and you can be sure that it will perform many, many iterations ... Also, billions of lines of code are written all over the world not only under Microsoft, so the work is foreseen to everyone who wants to learn the C # programming language.\r\n<span style=\"font-weight: bold;\">Reason # 2. Your bright future with C#.</span>\r\nThis item smoothly continues the previous one. According to the ratings of the domestic DOU, it is clear that the C# programming language in Ukraine is in 3rd place in 2018 among programming languages. And in the world charts on the 4th place by PYPL PopularitY of Programming Language is a rating using Google Trends.\r\n<span style=\"font-weight: bold;\">Reason # 3. The possibility of greater profits.</span>\r\nOf course, this statement should be evaluated relatively by comparison. Today they like to say: “A programmer’s working time is more expensive than additional memory or a more powerful computer processor. It is recommended to choose more modern tools that don’t over-brain a programmer.”\r\nOn the other hand, when they talk about C#, they always mean speed and large, valuable, serious projects, even Megaprojects. For example, in C#, the Linux kernel, Unix, libraries, environment, interpreters of many modern programming languages are written.\r\n<span style=\"font-weight: bold;\">Reason # 4. C# has a huge set of use cases.</span>\r\n<ul><li>The C # programming language is mainly used to create corporate software, financial projects, for example, for banks and stock exchanges, in particular, mobile applications, cloud services.</li><li>Compared to Java, C# interacts more easily with code written in other languages. And it is precisely in C# that extensions are often written for other programming languages used as a layer between the C # library and the language, the possibilities of which are planned to be extended for specific purposes.</li><li>A pretty popular blockchain in C#.</li><li>C# is widely used in developing games on Unity. Have you ever heard of Unity? Unity is a popular game engine. This means that hundreds of thousands of games, including the most popular, were created using C#.</li><li>C# is good for working with iron, the so-called embedded. Asking what is embedded technology? Embedded system - a specialized computer system or computing device designed to perform a limited number of functions, from Wikipedia: traffic lights, cash registers, vending machines, set-top boxes, test equipment, etc.</li><li>The popular C# programming language is equally good for IoT. Again, what is IoT? IoT (Internet of Things) is a concept of a comprehensive Internet, Internet connection of refrigerators, air conditioners, cars and even sneakers with the aim of providing its owner with greater comfort, and on the other hand increasing their retailers' profits, calculating the amount of what, how much and when availability in warehouses, obtaining certain information about a person and his habits, about the environment.</li><li>Science and its application, for example, conducting complex experimental calculations, cryptography, pattern recognition, and the like.</li></ul>\r\n<span style=\"font-weight: bold;\">Reason # 5. C# is strongly typed, so it is easier for them to master beginners</span>\r\nAs for the comparison of programming languages, it should be noted that the C# programming language is multi-level. This means that it is somewhat similar to English. The C# programming language has strong static typing, supports polymorphism, operator overloading, pointers to member functions of classes, attributes, events, properties, exceptions, comments in XML format. Having adopted a lot from their predecessors - C++, Delphi, Modula, Smalltalk - in C #, relying on the practice of using them, deliberately excluded some models that proved to be problematic when developing software systems in the above-mentioned programming languages.\r\nThe syntax is quite minimalistic - with manual memory management. This is inconvenient for many, but tracking the correctness of functions, understanding the transmission of arguments is closely related to the study of the C# programming language.\r\nSince the syntax of C# is close to C, C++ and Java, then, fluent in C #, you can later learn them in one breath.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_C_Development.png","alias":"c-development"},"617":{"id":617,"title":"Joomla Development","description":"Joomla is a free and open-source content management system (CMS) for publishing web content, developed by Open Source Matters, Inc. It is built on a model–view–controller web application framework that can be used independently of the CMS.\r\nJoomla is written in PHP, uses object-oriented programming techniques (since version 1.5) and software design patterns, stores data in a MySQL, MS SQL (since version 2.5), or PostgreSQL (since version 3.0) database, and includes features such as page caching, RSS feeds, printable versions of pages, news flashes, blogs, search, and support for language internationalization.\r\nOver 8,000 free and commercial extensions are available from the official Joomla Extensions Directory, and more are available from other sources. As of 2019, it was estimated to be the fourth most used content management system on the Internet, after WordPress and Drupal.\r\nJoomla has thousands of verified third party extensions which can be found on the Joomla Extensions Directory - extensions.joomla.org. There are also thousands of high end templates available, many of which are free. Paid templates are also available and come with support. Many templates provide a graphical user interface which allow you to change colors, fonts, layouts and features. Joomla has SEO tools built in. Includes Metadata and Keywords, Mod_rewrite support for SEF URLs and Menu creation for clear and consistent sitemaps.\r\n<ul><li>Multilingual: Offering over 75 languages.</li><li>Search Engine Optimization: Out of the box SEO & SEF.</li><li>Flexible: Make a blog, business website, intranet, community website… From the simplest to the most complex website.</li><li>Free: Joomla is free to use under GPL.</li><li>Extendable: Extensions are available to extend website functionality.</li><li>User Management: Access Control Lists allow management of the users of a website, and different groups.</li><li>Menu management: Create as many menus and menu items as you need.</li><li>Cache management: Caching for performance.</li></ul>","materialsDescription":" <span style=\"font-weight: bold; \">What is Joomla?</span>\r\nJoomla has been on the web since 2005 and has gained a massive number of users; over 50 million downloads according to www.joomla.org. It makes this CMS (content management system) the second most popular after WordPress.\r\n<span style=\"font-weight: bold; \">What are the key features of Joomla?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Responsive.</span></span> Responsiveness is a “must have” for any up-to-date website. You, as well as almost every other Internet user today, expect the website to scale gracefully to any screen resolution and that is what Joomla is totally capable of doing.\r\nMobile devices, desktops, tablets - your website is not going to look “broken” on any of them.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Multilingual.</span></span> Do you operate in a non-English market? No problemo. Localizing the Joomla engine to your language is easier than it is with most of its competitors in the CMS world.\r\nThere are almost 70 language packs in Joomla which are just several clicks away from being installed and used.\r\nEven if a theme you use has some words that aren’t translatable with the language pack, you can translate the rest of them in a language override tool. This is great because in some other popular CMSs you’d need to go to your server and operate in the theme’s files directly.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Easy to update.</span></span> Joomla is one of the most frequently updated engines and that’s a good thing because the Joomla developer’s team brings us new features and new useful functions each time.\r\nWhat is even better, you can apply the update in two-three clicks from your admin panel. I can’t stress this point enough!\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Well Supported.</span></span> Joomla is an open-source platform, which enables anyone to contribute on a volunteer basis.\r\nThe downside to it is the fact that you can’t get on live chat or call someone from Joomla to get a free consultation for your site.\r\nLuckily, the Joomla team developed very detailed Joomla Documentation. If you’re more of a social type, you’ll enjoy Joomla User Forum.\r\n<span style=\"font-weight: bold; \">What makes Joomla stand out?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Joomla Media Manager</span></span>\r\nJoomla Media Manager is a tool that allows you to operate your media files in your Joomla admin panel. Media Manager in Joomla is one of the most intuitive and easy to use among similar tools.\r\nUnlike other CMS systems, you can easily create new folders on your server and upload files there. It would require going to FTP or Cpanel in most other CMSs.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Joomla Contact Manager</span></span>\r\nJoomla is well prepared for being a corporate site that has numerous users with different roles and capabilities. Joomla contact manager enables you to create users in different departments and categories.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Joomla Content Management</span></span>\r\nEven though I’ve heard customers saying Joomla has a longer learning curve, compared to WordPress, it’s so worth it, because with Joomla comes greater flexibility and content combining possibilities.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Joomla Extensions (8000+)</span></span>\r\nJoomla has one of the most powerful extension databases among both CMS and eCommerce platforms.<br />You can find a plugin or module to do almost anything. What is remarkable regarding Joomla extensions - a lot of great plugins and modules are free, while most paid ones come with a free lite version and there is the possibility to upgrade to a premium version whenever you decide to do so.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Front-end Editing</span></span>\r\nI left it till the very end of the guide as it’s my favorite one. That’s what bugs me about WordPress and what cheers me up when working with Joomla - there is no need to go to the admin panel to edit some piece of content.\r\nIf you enabled front-end editing of your site, there will be a gear wheel next to any module and by clicking on it you’ll be able to make changes on the go. It’s a thrill in this bustling world in which we live.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Joomla_Development.png","alias":"joomla-development"},"619":{"id":619,"title":"Drupal Development","description":" Drupal is a content management software. It's used to make many of the websites and applications you use every day. Drupal has great standard features, like easy content authoring, reliable performance, and excellent security. But what sets it apart is its flexibility; modularity is one of its core principles. Its tools help you build the versatile, structured content that dynamic web experiences need.\r\nIt's also a great choice for creating integrated digital frameworks. You can extend it with anyone, or many, of thousands of add-ons. Modules expand Drupal's functionality. Themes let you customize your content's presentation. Distributions are packaged Drupal bundles you can use as starter-kits. Mix and match these components to enhance Drupal's core abilities. Or, integrate Drupal with external services and other applications in your infrastructure. No other content management software is this powerful and scalable.\r\nThe Drupal project is open source software. Anyone can download, use, work on, and share it with others. It's built on principles like collaboration, globalism, and innovation. It's distributed under the terms of the GNU General Public License (GPL). There are no licensing fees, ever. Drupal will always be free.","materialsDescription":" <span style=\"font-weight: bold;\">What can Drupal do? And why is it different from other CMS?</span>\r\nThere are many reasons why Drupal is the top three most used CMS, and why tons of small to big complex systems have made it their options. Here are those:\r\n<ul><li><span style=\"font-weight: bold;\">Reliability.</span> Drupal is one of the top three most popular content management systems in the world. It has a longstanding history. Though Drupal is a work in progress, it has been stable along the way. We have Drupal 7 now while Drupal 8 is going to be released. But you can be assured that you will be supported for Drupal previous version at least 5 years. Meanwhile, the resources will stay there for goods.</li><li><span style=\"font-weight: bold;\">Available resources.</span> Nearly anything you want to do with the system has been priorly created and done absolutely well by other people. Other great news is nearly all of the most useful modules (Drupal add-ons) are contributed to the Drupal community. This is invaluable because, in many CMS, you have to pay for important features. As a user, you have benefited greatly from someone’s efforts, and experience.</li><li><span style=\"font-weight: bold;\">A huge dedicated community.</span> The Drupal community is large, dynamic and has functioned well since 2001. As a newbie or a senior developer, Drupal.org is a must-have resource where you dig in for learning material, upcoming news, or ask for support from contributors, and specialists.</li><li><span style=\"font-weight: bold;\">Robust and convenience.</span> Be assured that the source code for building your Drupal sites has been precisely written, and designed by Drupal experts. When you have an intention to do more complex and advanced work, you will find it easy and convenient to modify the system. This grants users a great advantage over other CMS.</li><li><span style=\"font-weight: bold;\">Flexibility.</span> It’s not a chance that Drupal is considered the most flexible CMS. We have always thought that if you have an idea about any functions, contents, you can certainly create it with Drupal. Seriously. You can create any content on site. You can customize anything to fit your taste. You can create any website type that you want.</li><li><span style=\"font-weight: bold;\">Scalability.</span> By scalability, we mean that you can extend your Drupal core to a higher level with a variety of contributed Drupal modules. What’s great with the Drupal modules is that they integrate perfectly well with Drupal core. They also connect absolutely efficiently with the modules. This is regardless of the fact many modules are totally different. It is due to the natural structure & built-in system of Drupal. This thereby enhances the power of extending your Drupal website. It is also a core strength of Drupal compared with other CMS. Meanwhile, Drupal is an open source. So suppose the modules you want don’t exist, you can create one, edit an existing module, or hire someone to do the job.</li><li><span style=\"font-weight: bold;\">Security.</span> Drupal has been meticulously tested up to strict security rules by Drupal experts and contributors. Its built-in security is strong. Drupal will lock down whatever directory installed, rendering important data, configuration files unable to be accessed directly. No wonder that many big sites with extreme security are using Drupal, namely - whitehouse.org, commerce.gov, weforum.org,...</li></ul>\r\n<span style=\"font-weight: bold;\">What are the uses of Drupal?</span>\r\nAs stated, due to its flexibility and extensibility, Drupal is not limited to any kind. Browse these lists to see the wide range of things that Drupal can build:\r\n<ul><li>Personal or corporate Web sites</li><li>Community portal sites</li><li>Intranet/Corporate sites</li><li>Blogs, art, portfolio, music, multimedia sites</li><li>Forums</li><li>International sites (websites with multi languages)</li><li>E-commerce sites</li><li>Resource directories</li><li>Social networking sites</li></ul>\r\n<span style=\"font-weight: bold;\">When Drupal isn't right?</span>\r\nIf it is necessary to know about a system before we set our foot on, it’s never been less important to explore its cons. Here we bring some of our caveats for the system:\r\n<ul><li>There’s a little learning curve. You will not learn and work with Drupal in a few days. Accept this fact. It’s harder to start compared with other CMS like Wordpress. But once you learn some basic things, it’s easy, and the flow is smoother.</li><li>It is not for those who have insufficient time to educate themselves about this system, or little money to pay a Drupal developer to carry out the work.</li><li>Finding a good Drupal developer is harder to find than that of Wordpress or other systems. It’s not hard to guess this considering the number of Wordpress developers compared with Drupal.</li></ul>\r\nIt always takes some investments to learn about something. For a new user, it would be a huge opportunity cost - what you will gain and lose working with one system and leave others behind.\r\nBut after all the choice is always yours.We expect it would be worth. The CMS you will spend thousands hours working. The system through this you make a living. The option that yields energy and satisfaction.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Drupal_Development__1_.png","alias":"drupal-development"},"621":{"id":621,"title":"WordPress","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WordPress.png","alias":"wordpress"},"623":{"id":623,"title":"Magento Development","description":" Magento is an open-source e-commerce platform written in PHP. It is one of the most popular open e-commerce systems in the network. This software is created using the Zend Framework. Magento source code is distributed under an Open Source Initiative (OSI) approved by the Open Software License (OSL) v3.0, which is similar to the AGPL but not GPL compliant.\r\nThe software was originally developed by Varien, Inc, a US private company headquartered in Culver City, California, with assistance from volunteers.\r\nMore than 100,000 online stores have been created on this platform. The platform code has been downloaded more than 2.5 million times, and $155 billion worth of goods have been sold through Magento-based systems in 2019. Two years ago, Magento accounted for about 30% of the total market share.\r\nVarien published the first general-availability release of the software on March 31, 2008. Roy Rubin, the former CEO of Varien, later sold a share of the company to eBay, which eventually completely acquired and then sold the company to Permira; Permira later sold it to Adobe.\r\nOn November 17, 2015, Magento 2.0 was released. Among the features changed in V2 are the following: reduced table locking issues, improved page caching, enterprise-grade scalability, inbuilt rich snippets for structured data, new file structure with easier customization, CSS Preprocessing using LESS & CSS URL resolver, improved performance and a more structured code base. Magento employs the MySQL or MariaDB relational database management system, the PHP programming language, and elements of the Zend Framework. It applies the conventions of object-oriented programming and model–view–controller architecture. Magento also uses the entity–attribute–value model to store data. On top of that, Magento 2 introduced the Model-View-ViewModel pattern to its front-end code using the JavaScript library Knockout.js.","materialsDescription":" <span style=\"font-weight: bold;\">What is Magento? What is the benefit of choosing an Open Source platform?</span>\r\nMagento is an open-source eCommerce platform that enables the online business owners to control their online store and add powerful and flexible tools for marketing, catalog management, and search engine optimization.\r\nThe open-source platform offers much more innovation, customization, quality, support and agility at a very low cost. It enables the users to share and access the platform, add rich features according to the needs, thereby making changes more effective and easier.\r\n<span style=\"font-weight: bold;\">How can my Magento site be at par with the latest mobile trends and activities?</span>\r\nResponsive designs, device-specific applications have brought a great change in the business world over the past few years. Magento’s latest version includes a responsive template, and it offers great features that meet the needs of the mobile world both for the B2B and the B2C businesses.\r\n<span style=\"font-weight: bold;\">What should be included in my eCommerce Magento strategy?</span>\r\nBefore you plan to start with your Magento project, it is very important to write down the business goals of your website. This will help you to measure success. Once you are done with this, you can plan for the remaining strategies that include target audience, personalization, content plan, mobile strategy, third party add-ons and support services that you would require to keep your site running and performing.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Magento_Development.png","alias":"magento-development"},"625":{"id":625,"title":"Typo3 Development","description":" TYPO3 is a free and open-source Web content management system written in PHP. It is released under the GNU General Public License. It can run on several web servers, such as Apache or IIS, on top of many operating systems, among them Linux, Microsoft Windows, FreeBSD, macOS and OS/2.\r\nTYPO3 is, along with Drupal, Joomla! and WordPress, among the most popular content management systems worldwide, however it is more widespread in Europe than in other regions. The biggest market share can be found in German-speaking countries.\r\nTYPO3 is credited to be highly flexible, as code and content are operated separately. It can be extended by new functions without writing any program code. Also, the software is available in more than 50 languages and has a built-in localization system, therefore supports publishing content in multiple languages. Due to its features like editorial workplace and workflow, advanced frontend editing, scalability and maturity, TYPO3 is used to build and manage websites of different types and size ranges, from small sites for individuals or nonprofit organizations to multilingual enterprise solutions for large corporations. According to the ability to support a corporate environment, it classifies itself as an enterprise level content management system.\r\nTYPO3 was initially authored by the Dane Kasper Skårhøj in 1997. It is now developed by over 300 contributors under the lead of Benjamin Mack (Core team leader) and Mathias Schreiber (Product Owner).\r\nCalculations from the TYPO3 Association show that it is currently used in more than 500,000 installations. The number of installations detected by the public website "CMS Crawler" was around 384,000 by February 2017.","materialsDescription":" <span style=\"font-weight: bold; \">What is the official site of TYPO3?</span>\r\nhttps://typo3.org/ :: TYPO3 — the Professional, Flexible Content Management System. TYPO3 CMS is an Open Source Enterprise Content Management System with a large global community, backed by the approximately 900 members of the TYPO3 Association.\r\n<span style=\"font-weight: bold; \">Where did the name TYPO3 come from?</span>\r\nTYPO3 creator Kasper Skårhøj remembers it something like this:\r\nBack in the late 1990s, while still working on the initial version of his new CMS, he was looking for a name for the new software. At the time, the name “freestyle” appealed to him, but it posed some problems through its over-association with certain activities, products and trademarks. So the issue of naming stayed on the back burner for want of a better idea.\r\nThen, one Friday evening while he was alone in the office after hours coding, Kasper inadvertently typed an error into the command line of his Linux server and accidentally deleted a whole week work. He recalls that feeling you get of a cold rush through the body, when you realize something dreadful has happened. Slowly he got up, walked to the other end of the room and sat down in the couch looking back across the office at the laptop on his desk.\r\nHe stayed like this for a while, just staring out into the room. Then, after the initial shock had subsided, he walked back, sat down, and began to recreate the lost code. This went surprisingly quickly; as such things do when you have them fully worked out in your head. And it was during this new rush of adrenaline and the satisfaction that all was not actually lost, that he began to put the incident into perspective. The recreated programming was going smoothly and cleanly, which made him wonder how ironic it would be if a typo ended up actually improving the product! It was this thought that first brought up the expression “typo” as a possible name. It seemed to fit especially well because\r\n<ul><li>“typo”, as in typography, had something to do with layout and content and</li><li>“typo”, as in a typing mistake, now had a quirky share in the product’s history.</li></ul>\r\nThe newborn child now had a name.\r\nOriginally there were Typo versions 1, 2 and 2.5. But with the success of version 3, which had branded itself more or less by default, a “3” was eventually appended to the product title itself. Since the launch of “TYPO3 version 4”, TYPO3 has remained as the product name for all future versions. So, TYPO3 it is called … and TYPO3 it will continue to be.\r\n<span style=\"font-weight: bold; \">What is TYPO3?</span>\r\nTYPO3 is a free and open-source Web content management system written in PHP. It is released under the GNU General Public License. It can run on several web servers, such as Apache or IIS, on top of many operating systems, among them Linux, Microsoft Windows, FreeBSD, macOS and OS/2.\r\n<span style=\"font-weight: bold; \">Why use TYPO3?</span>\r\nBecause TYPO3 is the CMS for you! TYPO3 is an Enterprise Content Management System. If you need to create, manage and output any kind of digital content, TYPO3 is the right tool for you. You can start small and grow fast, but while your business case might change - you'll never need to change the Content Management System since TYPO3 adapts to your needs.\r\n<span style=\"font-weight: bold;\">What are the system requirements?</span>\r\n<ul><li>Operating System: Linux, Windows or Mac, or common cloud infrastructure setups</li><li>Webserver: Apache httpd, Nginx, Microsoft IIS, Caddy Server</li><li>PHP: PHP >= 7.2</li><li>Database: PostgreSQL //Microsoft SQL Server //MariaDB(>= 10.2) //MySQL(>= 5) //SQLite</li><li>Hardware: RAM >= 256 MB</li><li>Supported Browsers: Chrome (latest) //Firefox (latest) //Safari (latest) //Edge (latest) //Internet Explorer (>= 11)</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Typo3_Development.png","alias":"typo3-development"},"627":{"id":627,"title":"CSS Development","description":" Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language like HTML. CSS is a cornerstone technology of the World Wide Web, alongside HTML and JavaScript.\r\nCSS is designed to enable the separation of presentation and content, including layout, colors, and fonts. This separation can improve content accessibility, provide more flexibility and control in the specification of presentation characteristics, enable multiple web pages to share formatting by specifying the relevant CSS in a separate .css file, and reduce complexity and repetition in the structural content.\r\nSeparation of formatting and content also makes it feasible to present the same markup page in different styles for different rendering methods, such as on-screen, in print, by voice (via speech-based browser or screen reader), and on Braille-based tactile devices. CSS also has rules for alternate formatting if the content is accessed on a mobile device.\r\nThe name cascading comes from the specified priority scheme to determine which style rule applies if more than one rule matches a particular element. This cascading priority scheme is predictable.\r\nThe CSS specifications are maintained by the World Wide Web Consortium (W3C). Internet media type (MIME type) text/css is registered for use with CSS by RFC 2318 (March 1998). The W3C operates a free CSS validation service for CSS documents.\r\nIn addition to HTML, other markup languages support the use of CSS including XHTML, plain XML, SVG, and XUL.\r\nBefore CSS, nearly all presentational attributes of HTML documents were contained within the HTML markup. All font colors, background styles, element alignments, borders and sizes had to be explicitly described, often repeatedly, within the HTML. CSS lets authors move much of that information to another file, the style sheet, resulting in considerably simpler HTML.","materialsDescription":" <span style=\"font-weight: bold;\">Which is better: plain HTML or HTML with CSS?</span>\r\nMany site developers wonder why you need CSS if you can use plain HTML. Most likely, they only know the development of the site and have a number of gaps in knowledge. The bottom line is that HTML is used to structure the content of a page. And CSS allows you to format this content, make it more attractive to users.\r\nWhen the World Wide Web was created, the developers used only one language - HTML. It was used as a means of outputting structured text. The author had scant functional at his disposal. The maximum that could be done - to designate the title, select the paragraph. Tags were not enough.\r\nIn connection with the development of the Internet, the base of HTML language tags was expanded to allow the appearance of documents to be adjusted. At the same time, the structure remained unchanged.\r\nStructuring tags, for example <table>, began to spread. It was they who were more often chosen to design the pages instead of the structure itself. Some browsers offered their own tags, which only they could reproduce.\r\nThus, users often stumbled upon the message: "To view a page, you need to use browser XXX."\r\nTo correct the situation and create a single database of tags for formatting was created CSS. He allowed refusing to bind tags to browsers.\r\nUsing HTML with CSS is more convenient than using plain HTML. CSS provides the following benefits:\r\n<ul><li>Designed to the smallest detail.</li><li>Using a single table, you can manage various documents.</li><li>You can customize the page display options for different devices: computer screen, smartphone screen, etc.</li></ul>\r\n<span style=\"font-weight: bold;\">Website Promotion with CSS</span>\r\nThe emergence and development of CSS have made the development of web resources more efficient and effective. Now it’s much easier and more convenient to control the design. Also, using CSS, we managed to reduce the code of the pages, their size. This had a positive impact on the download speed, the indexing also began to pass faster. The use of an adaptive approach allowed us to make a breakthrough in the field of mobile versions of Internet resources.\r\nTo improve the website promotion, experts recommend placing the CSS style sheets in a separate document so as not to increase the amount of code. You can create one or more such files.\r\nPreviously, search engines could not read style sheets, which made it possible to use them in black SEO, for example, to create invisible texts. Now it is better to abandon the use of CSS for other purposes.\r\nCSS has several advantages and allows you to improve the site, making it more attractive to visitors. However, it is important to correctly register all the elements.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CSS_Development.png","alias":"css-development"},"629":{"id":629,"title":"PHP Development","description":"PHP is a general-purpose programming language originally designed for web development. It was originally created by Rasmus Lerdorf in 1994; the PHP reference implementation is now produced by The PHP Group. PHP originally stood for Personal Home Page, but it now stands for the recursive initialism PHP: Hypertext Preprocessor.\r\nPHP code may be executed with a command line interface (CLI), embedded into HTML code, or used in combination with various web template systems, web content management systems, and web frameworks. PHP code is usually processed by a PHP interpreter implemented as a module in a web server or as a Common Gateway Interface (CGI) executable. The web server outputs the results of the interpreted and executed PHP code, which may be any type of data, such as generated HTML code or binary image data. PHP can be used for many programming tasks outside of the web context, such as standalone graphical applications and robotic drone control.\r\nThe standard PHP interpreter, powered by the Zend Engine, is free software released under the PHP License. PHP has been widely ported and can be deployed on most web servers on almost every operating system and platform, free of charge.\r\nThe PHP language evolved without a written formal specification or standard until 2014, with the original implementation acting as the de facto standard which other implementations aimed to follow. Since 2014, work has gone on to create a formal PHP specification.\r\nAs of September 2019, over 60% of sites on the web using PHP are still on discontinued/"EOLed" version 5.6 or older; versions prior to 7.2 are no longer officially supported by The PHP Development Team, but security support is provided by third parties, such as Debian.","materialsDescription":" <span style=\"font-weight: bold; \">What is PHP?</span>\r\nPHP stands for Hypertext Preprocessor. It is an open-source server-side scripting language that is widely used for web development. It supports many databases like MySQL, Oracle, Sybase, Solid, PostgreSQL, generic ODBC, etc.\r\n<span style=\"font-weight: bold; \">What is PEAR in PHP?</span>\r\nPEAR is a framework and repository for reusable PHP components. PEAR stands for PHP Extension and Application Repository. It contains all types of PHP code snippets and libraries. It also provides a command-line interface to install "packages" automatically.\r\n<span style=\"font-weight: bold; \">Who is known as the father of PHP?</span>\r\nRasmus Lerdorf.\r\n<span style=\"font-weight: bold; \">What was the old name of PHP?</span>\r\nThe old name of PHP was Personal Home Page.\r\n<span style=\"font-weight: bold; \">Explain the difference b/w static and dynamic websites?</span>\r\nIn static websites, content can't be changed after running the script. You can't change anything on the site. It is predefined.\r\nIn dynamic websites, the content of a script can be changed at the run time. Its content is regenerated every time a user visits or reload. Google, yahoo and every search engine is an example of a dynamic website.\r\n<span style=\"font-weight: bold; \">What is the name of the scripting engine in PHP?</span>\r\nThe scripting engine that powers PHP is called Zend Engine 2.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_PHP_Development.png","alias":"php-development"},"631":{"id":631,"title":"CakePHP Development","description":" CakePHP is an open-source web framework. It follows the model–view–controller (MVC) approach and is written in PHP, modeled after the concepts of Ruby on Rails, and distributed under the MIT License.\r\nCakePHP uses well-known software engineering concepts and software design patterns, such as convention over configuration, model–view–controller, active record, association data mapping, and front controller.\r\nCakePHP started in April 2005, when a Polish programmer Michal Tatarynowicz wrote a minimal version of a rapid application development in PHP, dubbing it Cake. He published the framework under the MIT license, and opened it up to the online community of developers. In December 2005, L. Masters and G. J. Woodworth founded the Cake Software Foundation to promote development related to CakePHP. Version 1.0 was released on May 2006.\r\nOne of the project's inspirations was Ruby on Rails, using many of its concepts. The community has since grown and spawned several sub-projects.\r\nIn October 2009, project manager Woodworth and developer N. Abele resigned from the project to focus on their own projects, including the Lithium web framework (previously part of the CakePHP project). The remaining development team continued to focus on the original roadmap that was previously defined.","materialsDescription":" <span style=\"font-weight: bold;\">What is CakePHP? Why it’s Useful?</span>\r\nCakePHP is a free, open-source, rapid development framework for PHP. It’s a fundamental framework for developers to produce web applications.\r\nCakePHP has an active developer team and also the community, bringing terrific worth to the job. Along with maintaining you from wheel-reinventing, utilizing CakePHP suggests your application’s core is well examined as well as is being continuously boosted.\r\nBelow’s a quick listing of functions you’ll delight in when using CakePHP:\r\n<ul><li>Active, friendly community</li><li>Flexible licensing</li><li>Suitable with variations 4 and also 5 of PHP</li><li>Integrated CRUD for database Interaction</li><li>Application scaffolding</li><li>Code generation</li><li>MVC architecture</li><li>Request dispatcher with clean, customized URLs as well as routes</li><li>Integrated validation</li><li>Fast and also adaptable template (PHP phrase framework, with helpers)</li><li>Look for Helpers for AJAX, JavaScript, HTML Forms as well as a lot more</li><li>Email, Cookie, Security, Session, and also Request Handling Components</li><li>Flexible ACL</li><li>Data Sanitization</li><li>Flexible Caching</li><li>Localization</li><li>Works from any kind of web site directory site, with little to no Apache setup involved</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CakePHP_Development.png","alias":"cakephp-development"},"633":{"id":633,"title":"Ruby on Rails Development","description":" Ruby on Rails, or Rails, is a server-side web application framework written in Ruby under the MIT License. Rails is a model–view–controller (MVC) framework, providing default structures for a database, a web service, and web pages. It encourages and facilitates the use of web standards such as JSON or XML for data transfer, HTML, CSS and JavaScript for user interfacing. In addition to MVC, Rails emphasizes the use of other well-known software engineering patterns and paradigms, including convention over configuration (CoC), don't repeat yourself (DRY), and the active record pattern.\r\nRuby on Rails' emergence in the 2000s greatly influenced web app development, through innovative features such as seamless database table creations, migrations, and scaffolding of views to enable rapid application development. Ruby on Rails' influence on other web frameworks remains apparent today, with many frameworks in other languages borrowing its ideas, including Django in Python, Catalyst in Perl, Laravel and CakePHP in PHP, Phoenix in Elixir, Play in Scala, and Sails.js in Node.js.\r\nRuby on Rails is intended to emphasize Convention over Configuration (CoC), and the Don't Repeat Yourself (DRY) principle.\r\n"Convention over Configuration" means a developer only needs to specify unconventional aspects of the application. For example, if there is a class Sale in the model, the corresponding table in the database is called sales by default. It is only if one deviates from this convention, such as calling the table "products sold", that the developer needs to write code regarding these names. Generally, Ruby on Rails conventions lead to less code and less repetition.\r\n"Don't repeat yourself" means that information is located in a single, unambiguous place. For example, using the ActiveRecord module of Rails, the developer does not need to specify database column names in class definitions. Instead, Ruby on Rails can retrieve this information from the database based on the class name.\r\n"Fat models, skinny controllers" means that most of the application logic should be placed within the model while leaving the controller as light as possible.","materialsDescription":" <span style=\"font-weight: bold;\">What is Ruby on Rails?</span>\r\nRails is a development tool that gives web developers a framework, providing structure for all the code they write. The Rails framework helps developers to build websites and applications because it abstracts and simplifies common repetitive tasks.\r\nRails are written in Ruby, the programming language which is also used alongside Rails. Ruby is to Rails as PHP is to Symfony and Zend, or as Python is to Django. The appeal of Ruby to developers lies in the elegance and terseness of the language.\r\nOne of the key principles of Ruby on Rails development (henceforth ‘Rails’) is convention over configuration. This means that the programmer does not have to spend a lot of time configuring files in order to get set up, Rails comes with a set of conventions which help speed up development.\r\nAnother characteristic of Rails is the emphasis on RESTful application design. REST (Representational State Transfer) is a style of software architecture based around the client-server relationship. It encourages a logical structure within applications, which means they can easily be exposed as an API (Application Programming Interface).\r\nFrom a project management point of view, the Ruby on Rails community advocate Agile web development – an iterative development method, that encourages collaborative and flexible approach, which is particularly well-suited for web application development with fast-changing requirements.\r\nOver the last few years Ruby on Rails has gained a large and enthusiastic following, but let’s consider the main arguments for and against Rails.\r\n<span style=\"font-weight: bold;\">Why is it necessary to use Ruby on Rails?</span>\r\n<ul><li>The process of programming is much faster than with other frameworks and languages, partly because of the object-oriented nature of Ruby and the vast collection of open source code available within the Rails community.</li><li>The Rails conventions also make it easy for developers to move between different Rails projects, as each project will tend to follow the same structure and coding practices.</li><li>Rails are good for rapid application development (RAD), as the framework makes it easy to accommodate changes.</li><li>Ruby code is very readable and mostly self-documenting. This increases productivity, as there is less need to write out separate documentation, making it easier for other developers to pick up existing projects.</li><li>Rails have developed a strong focus on testing and have good testing frameworks.</li><li>Rails and most of its libraries are open sources, so unlike other commercial development frameworks, there are no licensing costs involved.</li></ul>\r\n<span style=\"font-weight: bold;\">Potential Rails problems and limitations and how to overcome them:</span>\r\n<ul><li>Not all website hosts can support Rails</li><li>Java and PHP are more widely used, and there are more developers in these languages</li><li>Performance and Scalability</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Ruby_on_Rails_Development.png","alias":"ruby-on-rails-development"},"635":{"id":635,"title":"Python Development","description":" Python is an interpreted, high-level, general-purpose programming language. Created by Guido van Rossum and first released in 1991, Python's design philosophy emphasizes code readability with its notable use of significant whitespace. Its language constructs and object-oriented approach aim to help programmers write clear, logical code for small and large-scale projects.\r\nPython is dynamically typed and garbage-collected. It supports multiple programming paradigms, including procedural, object-oriented, and functional programming. Python is often described as a "batteries included" language due to its comprehensive standard library.\r\nPython was conceived in the late 1980s as a successor to the ABC language. Python 2.0, released in 2000, introduced features like list comprehensions and a garbage collection system capable of collecting reference cycles. Python 3.0, released in 2008, was a major revision of the language that is not completely backward-compatible, and much Python 2 code does not run unmodified on Python 3.\r\nThe Python 2 language, i.e. Python 2.7.x, was officially discontinued on 1 January 2020 (first planned for 2015) after which security patches and other improvements will not be released for it. With Python 2's end-of-life, only Python 3.5.x and later are supported.\r\nPython interpreters are available for many operating systems. A global community of programmers develops and maintains CPython, an open source reference implementation. A non-profit organization, the Python Software Foundation, manages and directs resources for Python and CPython development.\r\nPython is a multi-paradigm programming language. Object-oriented programming and structured programming are fully supported, and many of its features support functional programming and aspect-oriented programming (including by metaprogramming and metaobjects (magic methods)). Many other paradigms are supported via extensions, including design by contract and logic programming.\r\nPython uses dynamic typing and a combination of reference counting and a cycle-detecting garbage collector for memory management. It also features dynamic name resolution (late binding), which binds method and variable names during program execution.\r\nPython's design offers some support for functional programming in the Lisp tradition. It has filter, map, and reduce functions; list comprehensions, dictionaries, sets, and generator expressions. The standard library has two modules (itertools and functools) that implement functional tools borrowed from Haskell and Standard ML.","materialsDescription":" <span style=\"font-weight: bold;\">What is Python?</span>\r\nPython is an interpreted, interactive, object-oriented programming language. It incorporates modules, exceptions, dynamic typing, very high level dynamic data types, and classes. Python combines remarkable power with very clear syntax. It has interfaces to many system calls and libraries, as well as to various window systems, and is extensible in C or C++. It is also usable as an extension language for applications that need a programmable interface. Finally, Python is portable: it runs on many Unix variants, on the Mac, and on Windows 2000 and later.\r\n<span style=\"font-weight: bold;\">What is the Python Software Foundation?</span>\r\nThe Python Software Foundation is an independent non-profit organization that holds the copyright on Python versions 2.1 and newer. The PSF’s mission is to advance open source technology related to the Python programming language and to publicize the use of Python. The PSF’s home page is at <link https://www.python.org/psf/.>https://www.python.org/psf/.</link>\r\n<span style=\"font-weight: bold;\">Are there copyright restrictions on the use of Python?</span>\r\nYou can do anything you want with the source, as long as you leave the copyrights in and display those copyrights in any documentation about Python that you produce. If you honor the copyright rules, it’s OK to use Python for commercial use, to sell copies of Python in source or binary form (modified or unmodified), or to sell products that incorporate Python in some form. We would still like to know about all commercial use of Python, of course.\r\n<span style=\"font-weight: bold;\">What is Python good for?</span>\r\nPython is a high-level general-purpose programming language that can be applied to many different classes of problems.\r\nThe language comes with a large standard library that covers areas such as string processing (regular expressions, Unicode, calculating differences between files), Internet protocols (HTTP, FTP, SMTP, XML-RPC, POP, IMAP, CGI programming), software engineering (unit testing, logging, profiling, parsing Python code), and operating system interfaces (system calls, filesystems, TCP/IP sockets). Look at the table of contents for The Python Standard Library to get an idea of what’s available. A wide variety of third-party extensions are also available. Consult the Python Package Index to find packages of interest to you.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Python_Development.png","alias":"python-development"},"637":{"id":637,"title":"eCommerce development","description":" Electronic commerce is an online transaction of buying and selling products through World Wide Web-based websites and mobile applications. The examples of eCommerce business include supply chain, funds transfer, banking and electronic data interchange (EDI) and others. The electronic transactions are carried out through many eCommerce software platforms and eCommerce applications that are integrated with online websites with the help of eCommerce developers. The eCommerce applications are linked with the payment gateways for a smooth transfer of credit from one entity to another one.\r\nAn eCommerce developer is a very important role in eCommerce app development and web services to realize the power of online sales and marketing in all domains of businesses. The eCommerce developers are normally the web developers with additional exposure to the eCommerce tools and platforms commonly used in online businesses. HTML, CSS, JavaScript, Python, PHP, Ruby on Rail and related technologies are the fundamental components of eCommerce developer skills. In addition to those skills, the knowledge of eCommerce software platforms and API integration is very important for a good eCommerce developer resume.\r\nA good eCommerce website should be highly professional looking with great features and intuitive interface for the checkout process. This is only possible with the help of professional eCommerce developers. You need to evaluate a lot of things before you decide to hire eCommerce developers such as the backend technologies of your website, type of eCommerce, a domain of business, type of database and many others. Once you have decided about all these things, you need to match the eCommerce web developer resume, which is under consideration, with those factors to find a good eCommerce developer.","materialsDescription":" <span style=\"font-weight: bold;\">Why is it important for business owners to create an eСommerce site?</span>\r\nToday, people have very less time to purchase items, by going to physical stores. They prefer to browse their mobile devices or PC and shop online. Having an e-commerce site for your business will help you to capture this market base and keep your customers informed about all your latest products and services.\r\n<span style=\"font-weight: bold;\">How can I choose the best platform for my eСommerce business website?</span>\r\nBefore getting started with your eСommerce web development, consider the few fundamentals that can help to choose the best platform. Always consider the items that you are selling. Some eСommerce platforms can handle inventory tracking and multiple product options while some others will not. Consider the design options, payment gateways, the security of the site, integration with other tools, features and pricing before finalizing on the platform.\r\n<span style=\"font-weight: bold;\">How should I promote my eСommerce site?</span>\r\nThere are various ways to do this and the first thing to do is to promote the site to all the customers. This will help to increase your customer base. Your website address should be present in every advertisement that your company invests in. Register with the search engines and optimize your website as this will affect the traffic of your site.\r\n<span style=\"font-weight: bold;\">What are the important things that can turn browsers into buyers?</span>\r\nCreate your site so that it is much more oriented towards sales rather than marketing. Let your visitors see your products immediately instead of hiding them behind lots of marketing copy. Make a page that reads the terms and conditions as it will offer a professional look. Provide your contact details and explain your return policies, security, encryption methods, and payment options.\r\n<span style=\"font-weight: bold;\">How to create an impressive website?</span>\r\nThe beauty of a site lies in the way it operates and how user-friendly it is. Ensure that your site is fast, easy to use, professional and attractive. Also, make sure that you are able to fulfill the orders very promptly without any delay. In case you are unable to offer the service, make sure that your customer is informed about it via email.\r\n<span style=\"font-weight: bold;\">What are the security risks that are involved with eСommerce sites?</span>\r\neCommerce website owners should always keep in mind the three dimensions of security - confidentiality, integrity, and availability. Business owners should develop a good strategy that can help to make the site and transactions secured. To avoid any hackers gain access to important confidential data, include encryption methods for any data transactions.\r\n<span style=\"font-weight: bold;\">Is there any limit on the size of my product or customer database?</span>\r\nNo, as such there are no limits on the size. The biggest benefit of having an online store is that you can add unlimited products and catalogs and at the same time you can grow your customer base as you require.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_eCommerce_development.png","alias":"ecommerce-development"},"639":{"id":639,"title":"HTML Development","description":" Hypertext Markup Language (HTML) is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets (CSS) and scripting languages such as JavaScript.\r\nWeb browsers receive HTML documents from a web server or from local storage and render the documents into multimedia web pages. HTML describes the structure of a web page semantically and originally included cues for the appearance of the document.\r\nHTML elements are the building blocks of HTML pages. With HTML constructs, images and other objects such as interactive forms may be embedded into the rendered page. HTML provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. HTML elements are delineated by tags, written using angle brackets. Tags such as <img /> and <input /> directly introduce content into the page. Other tags such as <p> surround and provide information about document text and may include other tags as sub-elements. Browsers do not display the HTML tags, but use them to interpret the content of the page.\r\nHTML can embed programs written in a scripting language such as JavaScript, which affects the behavior and content of web pages. Inclusion of CSS defines the look and layout of content. The World Wide Web Consortium (W3C), former maintainer of the HTML and current maintainer of the CSS standards, has encouraged the use of CSS over explicit presentational HTML since 1997.","materialsDescription":" <span style=\"font-weight: bold;\">What is HTML5?</span>\r\nHTML5 contains powerful capabilities for Web-based applications with more powerful interaction, video support, graphics, more styling effects, and a full set of APIs. HTML5 adapts to any device, whether desktop, mobile, tablet, or television. HTML5 is an open platform developed under royalty-free licensing terms.\r\nPeople use the term HTML5 in two ways:\r\n<ul><li>to refer to a set of technologies that together form the future Open Web Platform. These technologies include HTML5 specification, CSS3, SVG, MathML, Geolocation, XmlHttpRequest, Context 2D, Web Fonts (WOFF) and others. The boundary of this set of technologies is informal and changes over time;</li><li>to refer to the HTML5 specification, which is, of course, also part of the Open Web Platform.</li></ul>\r\nAlthough it would be great if people used one term to refer to the specification and another term to refer to a set of specifications, in practice people use the term both ways.\r\n<span style=\"font-weight: bold;\">HTML5 has been cited by many thought leaders as the future of the Web. Why is HTML5 generating this excitement?</span>\r\nThere is huge demand for open standards that allow the creation of rich internet applications. Watching videos, finding the nearest restaurant, accessing emails while being offline are just some of the powerful new capabilities enabled by the set of specifications in development at W3C.\r\nOne aspect that interests W3C, in particular, is enabling people to combine different technologies. W3C works to ensure not just interoperable support in the software of a single specification, but compatibility among specifications.\r\nEven though HTML5 is still a draft, browser vendors are deploying features and generating a lot of excitement in the IT industry. This experience, in turn, allows W3C to revise its drafts. In this way, the final standard can transparently inform implementers where they need to pay close attention to security and privacy issues.\r\n<span style=\"font-weight: bold;\">When can I use HTML5?</span>\r\nPeople can already use parts of the platform that interoperate, but W3C's mission is global interoperable, to ensure that the web is available to all. Not all elements are fully implemented yet and some of them provide builtin fallback mechanisms, such as <video> or <input>. One can use HTML5 today, knowing the existing limitations and ensuring proper fallbacks.\r\n<span style=\"font-weight: bold;\">Which Web Browsers support HTML5?</span>\r\nW3C encourages implementation and testing long before a specification becomes a standard to ensure that two people can read a specification independently and write interoperable software. Early adopters provide implementers and W3C with tremendously valuable feedback because they help identify where interoperability issues exist.\r\n<span style=\"font-weight: bold;\">Do you think that the benefits of HTML5, such as its neutrality, rich graphics, no need plug-ins, outweigh the security risk it carries?</span>\r\nNow entering its third decade, the Web has evolved from a Web of documents into a formidable platform for networked applications that let us share information and services over the Internet. In this highly connected environment, it is important that powerful Web applications be designed with sensitivity to user privacy and security needs. The risks associated with modern Web applications are familiar to the HTML5 community.\r\nHTML5 and related specifications are being developed in W3C's open standards process. This process allows an expert review of features along with their security and privacy implications. Rich functionality that was previously available only through proprietary plugins is now documented in an open specification for all experts to review and improve. We're pleased to see the HTML5 specifications subject to rigorous public review since that helps make the Web a more secure environment.\r\nSome security issues are not confined to HTML5. W3C and IETF are working closely to specify technologies and protocol extensions to mitigate some issues (such as cross-site request forgery and cross-site scripting).\r\n<span style=\"font-weight: bold;\">Will there be an HTML6?</span>\r\nNo work is currently happening on HTML6 but feature requests that are not planned to be addressed in HTML5 are available at listed under HTML.next.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_HTML_Development.png","alias":"html-development"},"641":{"id":641,"title":"XML Development","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_XML_Development.png","alias":"xml-development"},"643":{"id":643,"title":"AJAX Development","description":" Ajax (also AJAX; short for asynchronous JavaScript and XML) is a set of web development techniques using many web technologies on the client side to create asynchronous web applications. With Ajax, web applications can send and retrieve data from a server asynchronously (in the background) without interfering with the display and behavior of the existing page. By decoupling the data interchange layer from the presentation layer, Ajax allows web pages and, by extension, web applications, to change content dynamically without the need to reload the entire page. In practice, modern implementations commonly utilize JSON instead of XML.\r\nAjax is not a single technology, but rather a group of technologies. HTML and CSS can be used in combination to mark up and style information. The webpage can then be modified by JavaScript to dynamically display—and allow the user to interact with—the new information. The built-in XMLHttpRequest object within JavaScript is commonly used to execute Ajax on webpages allowing websites to load content onto the screen without refreshing the page. Ajax is not a new technology, or different language, just existing technologies used in new ways.\r\nThe term Ajax has come to represent a broad group of Web technologies that can be used to implement a Web application that communicates with a server in the background, without interfering with the current state of the page. In the article that coined the term Ajax, Jesse James Garrett explained that the following technologies are incorporated:\r\n<ul><li>HTML (or XHTML) and CSS for presentation</li><li>The Document Object Model (DOM) for dynamic display of and interaction with data</li><li>JSON or XML for the interchange of data, and XSLT for its manipulation</li><li>The XMLHttpRequest object for asynchronous communication</li><li>JavaScript to bring these technologies together</li></ul>\r\nSince then, however, there have been a number of developments in the technologies used in an Ajax application, and in the definition of the term Ajax itself. XML is no longer required for data interchange and, therefore, XSLT is no longer required for the manipulation of data. JavaScript Object Notation (JSON) is often used as an alternative format for data interchange, although other formats such as preformatted HTML or plain text can also be used. A variety of popular JavaScript libraries, including JQuery, include abstractions to assist in executing Ajax requests.\r\nAsynchronous HTML and HTTP (AHAH) involves using XMLHTTPRequest to retrieve (X)HTML fragments, which are then inserted directly into the Web page.","materialsDescription":" <span style=\"font-weight: bold;\">What Is AJAX?</span>\r\nAJAX is an acronym that stands for Asynchronous JavaScript and XML, and it describes a set of development techniques used for building websites and web applications. According to web developer and Skillcrush WordPress instructor Ann Cascarano, the best way to understand AJAX is to start with identifying its specific purpose in the web development process. AJAX’s core function is to update web content asynchronously (the “A” of AJAX), meaning a user’s web browser doesn’t need to reload an entire web page when only a small portion of content on the page needs to change.\r\nOne of the most ubiquitous examples of asynchronous updating is Google’s “Google Suggest” feature. When you enter a search query into Google’s search bar and the Google website automatically begins offering auto-complete options while you type, that’s AJAX in action. The content on the page changes (in this case, the auto-complete options in the search bar) without having to manually refresh the page (something that would make Google Suggest impractical to use). Features like Google Suggest are a fundamental part of contemporary web browsing, which points to how essential AJAX is in web development. In addition to Google Suggest, Cascarano says that AJAX is commonly used to update features like status and notification bars, online forms, comments sections, and surveys and polls. But what exactly are the “J” and “X” of AJAX and how do they make asynchronous updating possible?\r\n<span style=\"font-weight: bold;\">JavaScript and XML</span>\r\nAs mentioned above, the “J” in AJAX stands for JavaScript. JavaScript is a type of scripting language—coding languages used to automate website processes so web developers don’t have to individually program each instance of the process that appears on a page. In JavaScript’s case, it’s used specifically to create, add, and manage dynamic website content. In other words, after markup languages like HTML and CSS are used to build and display static web features (headers, fonts, paragraphs, etc.), JavaScript is then used to control features that require real time updates while a visitor is viewing a page (think interactive maps, animated graphics, scrolling video, jukeboxes, etc). Since JavaScript is in the business of updating page content without requiring viewers to manually reload entire pages, it’s a critical component for AJAX’s asynchronous updating.\r\nThe “X” in AJAX is XML (Extensible Markup Language). As its name suggests, XML is a markup language, which means it’s in the same family as languages like HTML and CSS. Markup languages are coding languages used to annotate parts of a web document that are intended to give web browsers instructions about how to understand, process, and display a web page, versus the actual text intended to be displayed on the page. While HTML and CSS focus on instructing how page content is displayed (paragraphs, headers, fonts, colors, etc.), XML is used to transfer data stored on the page to the browsers that view it. Individual computer systems are often incompatible with one another and can’t understand or interact with data formatted by a different system. XML allows developers to bypass this obstacle by storing data in plain text format between XML tags. By doing this, XML offers a way of storing, moving, and sharing data that isn’t dependent on a particular software or hardware system (something that’s crucial for the internet, where data needs to be available and understandable across all software and hardware platforms). RSS feeds—subscription web feeds that allow users to access content from blogs and news sources as they are updated in real time—are built with XML and are an example of the language’s practical data-sharing capabilities. But how does XML combine with JavaScript to form AJAX?\r\n<span style=\"font-weight: bold;\">How Does AJAX Work?</span>\r\nAccording to Cascarano, JavaScript and XML combine to make asynchronous updating happen through the use of something called an XMLHttpRequest object. When a user visits a web page designed to make use of AJAX and a prescribed event occurs (the user loads the page, clicks a button, fills out a form, etc.) JavaScript creates an XMLHttpRequest object, which then transfers data in an XML format between a web browser (the program being used to view the website) and a web server (the software or hardware where a website’s data is stored). The XMLHttpRequest object sends a request for updated page data to the web server, the server process the request, a response is created server-side and sent back to the browser, which then uses JavaScript to process the response and display it on the screen as updated content.\r\nTo recap: JavaScript automates the updating process, the request for updated content is formatted in XML to make it universally understandable, and JavaScript again kicks in to refresh the relevant content for the user viewing the page. Cascarano notes that the AJAX technique ignores extraneous page data and only handles requests for updated information and the updated information itself. This is really the heart of AJAX’s effectiveness, making websites and applications that use AJAX faster and more responsive for users.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_AJAX_Development.png","alias":"ajax-development"},"645":{"id":645,"title":"JavaScript development","description":" JavaScript, often abbreviated as JS, is a high-level, just-in-time compiled, object-oriented programming language that conforms to the ECMAScript specification. JavaScript has curly-bracket syntax, dynamic typing, prototype-based object-orientation, and first-class functions.\r\nAlongside HTML and CSS, JavaScript is one of the core technologies of the World Wide Web. JavaScript enables interactive web pages and is an essential part of web applications. The vast majority of websites use it, and major web browsers have a dedicated JavaScript engine to execute it.\r\nAs a multi-paradigm language, JavaScript supports event-driven, functional, and imperative (including object-oriented and prototype-based) programming styles. It has APIs for working with text, arrays, dates, regular expressions, and the DOM, but the language itself does not include any I/O, such as networking, storage, or graphics facilities. It relies upon the host environment in which it is embedded to provide these features.\r\nInitially only implemented client-side in web browsers, JavaScript engines are now embedded in many other types of host software, including server-side in web servers and databases, and in non-web programs such as word processors and PDF software, and in runtime environments that make JavaScript available for writing mobile and desktop applications, including desktop widgets.\r\nThe terms Vanilla JavaScript and Vanilla JS refer to JavaScript not extended by any frameworks or additional libraries. Scripts written in Vanilla JS are plain JavaScript code.\r\nAlthough there are similarities between JavaScript and Java, including language name, syntax, and respective standard libraries, the two languages are distinct and differ greatly in design. JavaScript was influenced by programming languages such as Self and Scheme. The JSON serialization format, used to store data structures in files or transmit them across networks, is based on JavaScript.\r\n"JavaScript" is a trademark of Oracle Corporation in the United States. It is used under license for technology invented and implemented by Netscape Communications and current entities such as the Mozilla Foundation.","materialsDescription":" <span style=\"font-weight: bold;\">What is JavaScript?</span>\r\nJavaScript is a client-side as well as a server-side scripting language that can be inserted into HTML pages and is understood by web browsers. JavaScript is also an Object-based Programming language.\r\n<span style=\"font-weight: bold;\">What are the differences between Java and JavaScript?</span>\r\nJava is a complete programming language. In contrast, JavaScript is a coded program that can be introduced to HTML pages. These two languages are not at all inter-dependent and are designed for different intent. Java is an object-oriented programming (OOPS) or structured programming languages like C++ or C whereas JavaScript is a client-side scripting language.\r\n<span style=\"font-weight: bold;\">Do I have to buy JavaScript?</span>\r\nNo--there is nothing to buy. The JavaScript interpreter is included in all major Internet Browsers--so as long as you have an Internet Browser, you're all set. JavaScript source files are written using an ordinary text editor, such as Notepad.\r\n<span style=\"font-weight: bold;\">What is JScript?</span>\r\nJScript is Microsoft's version of Netscape's JavaScript. Each Internet Browser vendor creates their own version of what is collectively known as JavaScript---however, the latest versions of these browsers are moving towards the ECMA Script standard.\r\n<span style=\"font-weight: bold;\">Who 'owns' JavaScript?</span>\r\nECMA governs the standard features of JavaScript---however, each vendor writes the code for their own versions of JavaScript.\r\n<span style=\"font-weight: bold;\">What are the features of JavaScript?</span>\r\n<ul><li>JavaScript is a lightweight, interpreted programming language.</li><li>JavaScript is designed for creating network-centric applications.</li><li>JavaScript is complementary to and integrated with Java.</li><li>JavaScript is complementary to and integrated with HTML.</li><li>JavaScript is open and cross-platform.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_JavaScript_development.png","alias":"javascript-development"},"649":{"id":649,"title":"QA - Quality assurance","description":" <span style=\"font-weight: bold; \">Quality Assurance (QA)</span> is defined as an activity to ensure that an organization is providing the best possible product or service to customers. QA focuses on improving the processes to deliver Quality Products to the customer. An organization has to ensure, that processes are efficient and effective as per the quality standards defined for software products. Quality Assurance is popularly known as <span style=\"font-weight: bold; \">QA Testing. </span>\r\nQA establishes and maintains set requirements for developing or manufacturing reliable products. A quality assurance system is meant to increase customer confidence and a company's credibility, while also improving work processes and efficiency, and it enables a company to better compete with others.\r\nQuality assurance helps a company create products and services that meet the needs, expectations and requirements of customers. It yields high-quality product offerings that build trust and loyalty with customers. The standards and procedures defined by a quality assurance program help prevent product defects before they arise.\r\n<span style=\"font-weight: bold; \">Quality assurance utilizes one of three methods:</span>\r\n<span style=\"font-weight: bold; \">Failure testing, </span>which continually tests a product to determine if it breaks or fails. For physical products that need to withstand stress, this could involve testing the product under heat, pressure or vibration. For software products, failure testing might involve placing the software under high usage or load conditions.\r\n<span style=\"font-weight: bold; \">Statistical process control (SPC),</span> a methodology based on objective data and analysis and developed by Walter Shewhart at Western Electric Company and Bell Telephone Laboratories in the 1920's and 1930's. This methodology uses statistical methods to manage and control the production of products.\r\n<span style=\"font-weight: bold; \">Total quality management (TQM),</span> which applies quantitative methods as the basis for continuous improvement. TQM relies on facts, data and analysis to support product planning and performance reviews.\r\n<span style=\"font-weight: bold; \">Quality assurance in software.</span> Software quality assurance management (SQA) systematically finds patterns and the actions needed to improve development cycles. Finding and fixing coding errors can carry unintended consequences; it is possible to fix one thing, yet break other features and functionality at the same time.\r\nSQA software has become important for developers as a means of avoiding errors before they occur, saving development time and expenses. Even with SQA processes in place, an update to software can break other features and cause defects - commonly known as bugs.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> Differences between Software testing and SQA services</h1>\r\n<ul><li><span style=\"font-weight: bold; \">SQA tools</span></li></ul>\r\n- Is about engineering process that ensures quality\r\n- Involve activities related to the implementation of processes, procedures, and standards.\r\n- Process focused \r\n- Preventive technique\r\n- Proactive measure\r\n- The scope of software quality testing tools applied to all products that will be created by the organization\r\n<ul><li><span style=\"font-weight: bold; \">Software Testing</span></li></ul>\r\n- Software Testing is to test a product for problems before the product goes live\r\n- Involves actives concerning verification of product Example - Review Testing\r\n- Product focused\r\n - Corrective technique\r\n- Reactive measure\r\n- The scope of Software Testing applies to a particular product being tested\r\n<h1 class=\"align-center\">Manual QA testing services Vs Automated Quality Assurance Testing</h1>\r\nSoftware testing is a huge domain, but it can be broadly categorized into two areas: manual testing and automated testing. Both of them can be used to achieve the best results, but it is always worth knowing the difference between the two. Each testing type – manual and automated – comes with its own set of advantages and disadvantages. \r\nYou can choose between manual and quality assurance testing services based on a variety of factors. These include:\r\n- Project requirements\r\n- Timeline\r\n- Budget\r\n- Expertise\r\n- Suitability<br /> \r\n<ul><li><span style=\"font-weight: bold; \">Manual Testing </span></li></ul>\r\n<span style=\"font-weight: bold; \">Exploratory Testing:</span> This scenario requires a tester’s expertise, creativity, knowledge, analytical and logical reasoning skills. With poorly written specifications and short execution time, human skills are a must to test in this scenario.\r\n<span style=\"font-weight: bold; \">Ad-Hoc Testing:</span> It is an unplanned method of testing where the biggest difference maker is a tester’s insight that can work without a specific approach.\r\n<span style=\"font-weight: bold; \">Usability Testing:</span> Here you need to check the level of user-friendliness and check the software for convenience. Human observation is a must to make the end user’s experience convenient.\r\n<ul><li><span style=\"font-weight: bold; \">Quality Assurance automation tools</span></li></ul>\r\n<span style=\"font-weight: bold; \">Repeated Execution:</span> When you need to execute a use case repeatedly, automated testing is a better option.\r\n<span style=\"font-weight: bold; \">Regression Testing:</span> Automated automated QA software is better here because the code changes frequently and the regressions can be run in a timely manner\r\n<span style=\"font-weight: bold; \">Performance:</span> You need an automated QA testing software when thousands of concurrent users are simulated at the same time. Additionally, it is a better solution for load testing.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Quality_assurance.png","alias":"qa-quality-assurance"},"651":{"id":651,"title":"Interface Testing","description":"When an application or a software or a website is developed, then there are several components of it. Those components can be server, database etc. The connection which integrates and facilitates the communication between these components is termed as an <span style=\"font-weight: bold;\">Interface</span>.\r\n<span style=\"font-weight: bold;\">Interface Testing</span> is performed to evaluate whether systems or components pass data and control correctly to one another. It is to verify if all the interactions between these modules are working properly and errors are handled properly.\r\n<span style=\"font-weight: bold; \">Interface Testing - Checklist</span>\r\n<ul><li>Verify that communication between the systems are done correctly</li><li>Verify if all supported hardware/software has been tested</li><li>Verify if all linked documents be supported/opened on all platforms</li><li>Verify the security requirements or encryption while communication happens between systems</li><li>Check if a Solution can handle network failures between Web site and application server</li></ul>\r\n<span style=\"font-weight: bold; \">Phases of Interface Testing. </span>\r\nThere are 2 components involved in Interface testing: 1) web server and application server interface and 2) web server and database server interface.\r\nBasically, 3 phases are involved in the Interface testing which is mentioned below:\r\n<b>Configuration and Development. </b>After the configuration of the interface and the development initialization, the configuration is needed to be verified as per the requirement. In simple words, verification takes place.\r\n<p style=\" text-align: justify; \"><b>Validation. </b>After the configuration and development stage, validation of the interface is necessary.</p>\r\n<p style=\" text-align: justify; \"><b>Maintenance.</b> After the completion of the project, when the project reaches it’s working stage, the interface is set to be monitored for its performance.</p>\r\n<p style=\" text-align: justify; \"></p>\r\n<p style=\"text-align: justify; \"><a name=\"StepsinvolvedinInterfaceTesting\"></a></p>","materialsDescription":"<h1 class=\"align-center\">Types of Interface Testing </h1>\r\nDuring Interface Testing various types of testing done on the interface which may include:\r\n<span style=\"font-weight: bold; \">Workflow:</span> It ensures that the interface engine handles your standard workflows as expected.\r\n<span style=\"font-weight: bold; \">Edge cases -unexpected values:</span> This is considered when testing include date, month and day reversed.\r\n<span style=\"font-weight: bold; \">Performance, load, and network testing:</span> A high-volume interface may require more Load Testing than a low-volume interface, depending on the interface engine and connectivity infrastructure.\r\n<span style=\"font-weight: bold; \">Individual system interface testing:</span> This includes testing each system individually. For example, billing system and inventory management system for the retail store should be able to operate separately.\r\n<h1 class=\"align-center\">What is Graphic User Interface (GUI) Testing?</h1>\r\nGraphic User Interface Testing (GUI) testing is the process of ensuring proper functionality of the graphical user interface (GUI) for a specific application. This involves making sure it behaves in accordance with its requirements and works as expected across the range of supported platforms and devices.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">GUI Testing Approaches</span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Manual Based Testing: </span>Under this approach, the screens of the application are checked manually by testers. They are being confirmed with the requirements that are stated in the business requirements. The UI is also matched with the designs that are provided during the documentation phase of the application.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Automation Based Testing:</span> Automated user interface testing approach is performed in 2 steps i.e, record and play. While doing this, the steps are captured/recorded with the help of the automation tool while performing the first round of testing. And during playback, that recorded steps script is run when the application is under test. If the position of any button or image changes that during the playback, it does not get tracked and the test fails.</p>\r\n<h1 class=\"align-center\">What Features Should I Look for in a GUI Testing Tool?</h1>\r\nObviously the first answer is to choose a tool that can automate the specific technologies you’re testing, otherwise your automation is doomed to fail. Secondly you should choose a tool that has some of the following characteristics:\r\n<ul><li>Good interface testing software that makes it easy for your automation engineers to write tests, make changes, find issues and be able to deploy the tests on all the environments you need to test.</li><li>A tool that is well supported by the manufacturer and is keeping up to date with new web browsers, operating systems and technologies that you will need to test in the future. </li><li>An object abstraction layer so that your test analysts can write the tests in the way most natural for them and your automation engineers can create objects that point to physical items in the application that will be robust and not change every time you resort a grid or add data to the system.</li><li>Support for data-driven testing since as we have discussed, one of the big benefits of automation is the ability to run the same test thousands of times with different sets of data.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Interface_Testing.png","alias":"interface-testing"},"655":{"id":655,"title":"Perl Development","description":" Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages. "Perl" refers to Perl 5, but from 2000 to 2019 it also referred to its redesigned "sister language", Perl 6, before the latter's name was officially changed to Raku in October 2019.\r\nThough Perl is not officially an acronym, there are various backronyms in use, including "Practical Extraction and Reporting Language". Perl was originally developed by Larry Wall in 1987 as a general-purpose Unix scripting language to make report processing easier. Since then, it has undergone many changes and revisions. Raku, which began as a redesign of Perl 5 in 2000, eventually evolved into a separate language. Both languages continue to be developed independently by different development teams and liberally borrow ideas from one another.\r\nThe Perl languages borrow features from other programming languages including C, shell script (sh), AWK, and sed; Wall also alludes to BASIC and Lisp in the introduction to Learning Perl (Schwartz & Christiansen) and so on. They provide text processing facilities without the arbitrary data-length limits of many contemporary Unix command line tools, facilitating manipulation of text files. Perl 5 gained widespread popularity in the late 1990s as a CGI scripting language, in part due to its unsurpassed regular expression and string parsing abilities.\r\nIn addition to CGI, Perl 5 is used for system administration, network programming, finance, bioinformatics, and other applications, such as for GUIs. It has been nicknamed "the Swiss Army chainsaw of scripting languages" because of its flexibility and power, and also its ugliness. In 1998, it was also referred to as the "duct tape that holds the Internet together," in reference to both its ubiquitous use as a glue language and its perceived inelegance.\r\nAccording to Wall, Perl has two slogans. The first is "There's more than one way to do it," commonly known as TMTOWTDI. The second slogan is "Easy things should be easy and hard things should be possible".\r\nThe overall structure of Perl derives broadly from C. Perl is procedural in nature, with variables, expressions, assignment statements, brace-delimited blocks, control structures, and subroutines.\r\nPerl also takes features from shell programming. All variables are marked with leading sigils, which allow variables to be interpolated directly into strings. However, unlike the shell, Perl uses sigils on all accesses to variables, and unlike most other programming languages that use sigils, the sigil doesn't denote the type of the variable but the type of the expression. So for example, to access a list of values in a hash, the sigil for an array ("@") is used, not the sigil for a hash ("%"). Perl also has many built-in functions that provide tools often used in shell programming (although many of these tools are implemented by programs external to the shell) such as sorting, and calling operating system facilities.\r\nPerl takes lists from Lisp, hashes ("associative arrays") from AWK, and regular expressions from sed. These simplify and facilitate many parsing, text-handling, and data-management tasks. Also shared with Lisp are the implicit return of the last value in a block, and the fact that all statements have a value, and thus are also expressions and can be used in larger expressions themselves.\r\nAll versions of Perl do automatic data-typing and automatic memory management. The interpreter knows the type and storage requirements of every data object in the program; it allocates and frees storage for them as necessary using reference counting (so it cannot deallocate circular data structures without manual intervention). Legal type conversions — for example, conversions from number to string — are done automatically at run time; illegal type conversions are fatal errors.","materialsDescription":" <span style=\"font-weight: bold;\">What is Perl?</span>\r\n<ul><li>Perl is a stable, cross-platform programming language.</li><li>Though Perl is not officially an acronym few people used it as <span style=\"font-weight: bold;\">Practical Extraction and Report Language</span>.</li><li>It is used for mission-critical projects in the public and private sectors.</li><li>Perl is an Open Source software, licensed under its Artistic License, or the <span style=\"font-style: italic;\">GNU General Public License (GPL)</span>.</li><li>Perl was created by Larry Wall.</li><li>Perl 1.0 was released to Usenet's alt.comp.sources in 1987.</li><li>Perl is listed in the Oxford English Dictionary.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the features of Perl programming?</span>\r\n<ul><li>Perl takes the best features from other languages, such as C, awk, sed, sh, and BASIC, among others.</li><li>Perl's database integration interface DBI supports third-party databases including Oracle, Sybase, Postgres, MySQL, and others.</li><li>Perl works with HTML, XML, and other mark-up languages.</li><li>Perl supports Unicode.</li><li>Perl is Y2K compliant.</li><li>Perl supports both procedural and object-oriented programming.</li><li>Perl interfaces with external C/C++ libraries through XS or SWIG.</li><li>Perl is extensible. There are over 20,000 third party modules available from the Comprehensive Perl Archive Network (CPAN).</li><li>The Perl interpreter can be embedded into other systems.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the benefits of Perl programming in using it in web-based applications?</span>\r\n<ul><li>Perl used to be the most popular web programming language due to its text manipulation capabilities and rapid development cycle.</li><li>Perl is widely known as " the duct-tape of the Internet".</li><li>Perl can handle encrypted Web data, including e-commerce transactions.</li><li>Perl can be embedded into web servers to speed up processing by as much as 2000%.</li><li>Perl's mod_perl allows the Apache web server to embed a Perl interpreter.</li><li>Perl's DBI package makes web-database integration easy.</li></ul>\r\n<span style=\"font-weight: bold;\">Is Perl a case sensitive language?</span>\r\nYes. Perl is a case sensitive programming language.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Perl_Development.png","alias":"perl-development"},"657":{"id":657,"title":"Oracle Applications Development","description":" Oracle Applications comprise the applications software or business software of the Oracle Corporation. The term refers to the non-database and non-middleware parts.\r\nOracle sells many functional modules that use the Oracle RDBMS as a back-end, notably Oracle Financials, Oracle HRMS, Oracle SCM, Oracle Projects, Oracle CRM and Oracle Procurement.\r\nOracle initially launched its application suite with financial software in the late 1980s. The offering as of 2009 extends to supply-chain management, human resource management, warehouse-management, customer-relationship management, call-center services, product lifecycle management, and many other areas. Both in-house expansion and the acquisition of other companies have vastly expanded Oracle's application software business.\r\nOracle released Oracle E-Business Suite (EBS/e-BS) Release 12 (R12) – a bundling of several Oracle Applications – in February 2007. The release date coincided with new releases of other Oracle-owned products: JD Edwards EnterpriseOne, Siebel Systems and PeopleSoft.","materialsDescription":" <span style=\"font-weight: bold;\">What is Oracle E-Business Suite?</span>\r\nOracle E-Business Suite is a replicated integrated application software package manufactured by Oracle, which includes functional blocks ERP, CRM, PLM. Designed to automate the main activities of enterprises, including finance, production, personnel management, logistics, marketing, sales and sales, customer service, relationships with suppliers and customers, and others.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Oracle_Applicatons_Development.png","alias":"oracle-applications-development"},"659":{"id":659,"title":"SAP Applications Development","description":" ABAP is the SAP programming language. The syntax of the programming language is similar to COBOL, but it is very different from languages such as Java, C, or Python. Since ABAP is a non-standardized programming language, it is only used in connection with SAP programs. However, ABAP has powerful concepts for developing business applications in this environment. Since 1990, ABAP has also been a so-called object-oriented programming language.\r\nAs an SAP developer, you work closely with other software engineers. Together, you will develop, implement and maintain the modules and features of the software that works for your customer or employer. Specifically, these can be architectures, applications, and specific solutions.\r\nABAP is one of the many application-specific fourth-generation languages (4GLs) first developed in the 1980s. It was originally the report language for SAP R/2, a platform that enabled large corporations to build mainframe business applications for materials management and financial and management accounting. ABAP establish integration between independent software.\r\nABAP used to be an abbreviation of Allgemeiner Berichts-Aufbereitungs-Prozessor, German for "generic report preparation processor", but was later renamed to the English Advanced Business Application Programming. ABAP was one of the first languages to include the concept of Logical Databases (LDBs), which provides a high level of abstraction from the basic database level(s),which supports every platform, language and units.\r\nThe ABAP language was originally used by developers to develop the SAP R/3 platform. It was also intended to be used by SAP customers to enhance SAP applications – customers can develop custom reports and interfaces with ABAP programming. The language was geared towards more technical customers with programming experience.\r\nABAP remains as the language for creating programs for the client-server R/3 system, which SAP first released in 1992. As computer hardware evolved through the 1990s, more and more of SAP's applications and systems were written in ABAP. By 2001, all but the most basic functions were written in ABAP. In 1999, SAP released an object-oriented extension to ABAP called ABAP Objects, along with R/3 release 4.6.\r\nSAP's current development platform NetWeaver supports both ABAP and Java.\r\nABAP has an abstraction between the business applications, the operating system and database. This ensures that applications do not depend directly upon a specific server or database platform and can easily be ported from one platform to another.\r\nSAP Netweaver currently runs on UNIX (AIX, HP-UX, Solaris, Linux), Microsoft Windows, i5/OS on IBM System i (formerly iSeries, AS/400), and z/OS on IBM System z (formerly zSeries, S/390). Supported databases are HANA, SAP ASE (formerly Sybase), IBM DB2, Informix, MaxDB, Oracle, and Microsoft SQL Server (support for Informix was discontinued in SAP Basis release 7.00).","materialsDescription":" <span style=\"font-weight: bold;\">What is a SAP Developer?</span>\r\nSAP is the #1 creator of business software solutions. It's the fourth largest software company globally -- just a couple notches behind Microsoft. What this means is that there's a huge market for developers who are knowledgeable of SAP solutions -- outside of the parent company and outside of Germany. Among these solutions are SAP Business Warehouse, SAP Business Objects, and Sybase mobile.\r\nSAP has contributed to one thing that most software companies haven’t – its own computer language. One possible role for a SAP developer is to write programs using Advanced Business Application Programming (ABAP). Some SAP projects are also developed in Java.\r\nMany U.S. companies use SAP technologies. By perusing job posting, you may find some big names: Costco, REI, Nike, even Raytheon.\r\nThere are a lot of different roles from SAP systems analyst to SAP architect. It can be surprising just how much know-how and education these positions require.\r\n<span style=\"font-weight: bold;\">Education</span>\r\nThe bachelor’s degree is the typical entry point for a career in software development. Industry-specific knowledge can be important – in the case of a SAP developer, it is often finance or business.\r\nMany nationally advertised SAP positions favor candidates with master’s degrees; depending on the position, the master’s maybe in business administration or a more technical field.\r\nHigher-level software development positions typically ask for experience taking a software product through the lifecycle. They may ask for knowledge of specific models -- e.g. the Full Lifecycle Model.\r\nThose with SAP expertise often go on to work as consultants. There are two types: functional consultant and technical consultant. The functional consultant is focused on meeting business needs and the technical consultant, well you can guess what their focus is.\r\n<span style=\"font-weight: bold;\">SAP Certification</span>\r\nLike its "big brothers" Microsoft and Oracle, SAP offers a host of certifications. They are available in technology, development, and application.\r\nIt is possible to simultaneously earn a master's degree and SAP certification. The masters may be in any of several fields, including business engineering and computer science.\r\nJob advancement takes more than just technical skills. A 2012 survey of SAP professionals asked what skills were most important for advancement and raises. Project management topped the list. Business skills and communication skills were also seen as important.\r\nDevelopers can find lots of resources on the site of the SAP Community Network.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_SAP_Applications_Development.png","alias":"sap-applications-development"},"661":{"id":661,"title":"Sharepoint Development","description":" SharePoint is a web-based collaborative platform that integrates with Microsoft Office. Launched in 2001, SharePoint is primarily sold as a document management and storage system, but the product is highly configurable and usage varies substantially among organizations.\r\nSharePoint infuses AI into the mobile app experience to keep you focused and productive while on the go. AI builds an understanding of what you work on, how you work, and how your colleagues' work relates to you. When you need expertise, content, or resources when you're on the go, SharePoint is a great place to start looking.\r\nSharePoint is comprised of a multipurpose set of technologies that has tight integration with Office 365 as well as handy document management capabilities.\r\nAccording to Microsoft, SharePoint is used by 78% of Fortune 500 companies. Between 2006 and 2011, Microsoft sold over 36.5 million user licenses.\r\nSharePoint is a collection of software products and components that includes:\r\n<ul><li>a set of web applications for organizing collaboration;</li><li>functionality for creating web portals;</li><li>module for searching information in documents and information systems;</li><li>workflow management functionality and enterprise-wide content management system;</li><li>module for creating forms for entering information;</li><li>functionality for business analysis.</li></ul>\r\nMicrosoft states that SharePoint has 190 million users across 200,000 customer organizations.","materialsDescription":" <span style=\"font-weight: bold;\">Why is Microsoft SharePoint important?</span>\r\nSharePoint’s core functions are\r\n<ul><li>a) to store documents in a more effective format than a regular folder system, and</li><li>b) bring an organization together so that everyone receives critical information that’s relevant to them.</li></ul>\r\nHere are some benefits your organization can get from using SharePoint:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Context around documents and folders</span></span>\r\nA traditional document storage facility is usually a folder on a server somewhere. The reason why SharePoint is more effective than the traditional method is that it brings context around the folder itself by tracking versions of the document. For example, in a traditional folder setup, you can’t have a running version history for each document or see any changes to the file name. Whereas with SharePoint, there’s more information provided about the file. It’s not just some file sitting in a folder; it’s an evolving piece of information that has a history as well as context.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Enable constant communication with all staff</span></span>\r\nIn the past, you might send a group email and copy everyone. The problem with that approach is a lot of information gets ignored or even lost, so some people might not get the information they need. For example, maybe you lost a company document and you missed an important discussion. Or maybe you did read it but afterward, it was very difficult to find and reference that information. SharePoint brings collaboration to the table so that all staff can see the important information and communication accordingly.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Store all information in a central location</span></span>\r\nThis can range from things such as updates from the CEO to important meetings or events. SharePoint brings all the information to one internal place so staff can quickly find the information they need. Other use cases might be general warnings about particular customers or even incidents that everyone needs to be aware of. With SharePoint, simply post the message and everyone can access it from there. Forget email or announcement boards; simply post it on SharePoint.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Encourage collaboration</span></span>\r\nSharePoint is really designed around getting the organization into a central point where they can collaborate. This is particularly important for organizations that are not geographically connected. With some branches working in a very isolated format, SharePoint provides staff with the ability to connect with each other via a portal. Where in the past some staff might only interact with the company during a company meeting, SharePoint brings those people together so everyone can work together, all the time. Collaboration fosters innovation and builds a company culture that spawns creative ideas.\r\n<span style=\"font-weight: bold;\">What are the challenges of Microsoft SharePoint?</span>\r\n<span style=\"font-weight: bold;\">Support for certain industry standards.</span> SharePoint's records-management capabilities give it the ability to save documents for legal or historical reasons. This can be a challenge in some industries (medical and financial) where there are complex regulatory requirements for record-keeping. In those cases, you should consult a professional about an industry-specific solution.\r\n<span style=\"font-weight: bold;\">Customize out of the box with third-party solutions.</span> Some organizations won’t find what they need out of the box. A third-party solution can help you build something you want. This can be easily achieved if you work with an IT service provider that has SharePoint experience. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Sharepoint_Development.png","alias":"sharepoint-development"},"665":{"id":665,"title":"User Interface Development","description":" User interface design (UI) or user interface engineering is the design of user interfaces for machines and software, such as computers, home appliances, mobile devices, and other electronic devices, with the focus on maximizing usability and the user experience. The goal of user interface design is to make the user's interaction as simple and efficient as possible, in terms of accomplishing user goals (user-centered design).\r\nGood user interface design facilitates finishing the task at hand without drawing unnecessary attention to itself. Graphic design and typography are utilized to support its usability, influencing how the user performs certain interactions and improving the aesthetic appeal of the design; design aesthetics may enhance or detract from the ability of users to use the functions of the interface. The design process must balance technical functionality and visual elements (e.g., mental model) to create a system that is not only operational but also usable and adaptable to changing user needs.\r\nInterface design is involved in a wide range of projects from computer systems, to cars, to commercial planes; all of these projects involve much of the same basic human interactions yet also require some unique skills and knowledge. As a result, designers tend to specialize in certain types of projects and have skills centered on their expertise, whether it is a software design, user research, web design, or industrial design.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Graphical User Interface?</span>\r\nThe graphical user interface, developed in the late 1970s by the Xerox Palo Alto research laboratory and deployed commercially in Apple’s Macintosh and Microsoft’s Windows operating systems, was designed as a response to the problem of inefficient usability in early, text-based command-line interfaces for the average user.\r\nGraphical user interfaces would become the standard of user-centered design in software application programming, providing users the capability to intuitively operate computers and other electronic devices through the direct manipulation of graphical icons such as buttons, scroll bars, windows, tabs, menus, cursors, and the mouse pointing device. Many modern graphical user interfaces feature touchscreen and voice-command interaction capabilities.\r\n<span style=\"font-weight: bold;\">How Does a Graphical User Interface Work?</span>\r\nGraphical user interface design principles conform to the model–view–controller software pattern, which separates internal representations of information from the manner in which information is presented to the user, resulting in a platform where users are shown which functions are possible rather than requiring the input of command codes. Users interact with information by manipulating visual widgets, which are designed to respond in accordance with the type of data they hold and support the actions necessary to complete the user’s task.\r\nThe appearance, or “skin,” of an operating system or application software may be redesigned at will due to the nature of graphical user interfaces being independent from application functions. Applications typically implement their own unique graphical user interface display elements in addition to graphical user interface elements already present on the existing operating system. A typical graphical user interface also includes standard formats for representing graphics and text, making it possible to share data between applications running under common graphical user interface design software.\r\nGraphical user interface testing refers to the systematic process of generating test cases in order to evaluate the functionality of the system and its design elements. Graphical user interface testing tools, which are either manual or automated and typically implemented by third-party operators, are available under a variety of licenses and are supported by a variety of platforms. Popular examples include: Tricentis Tosca, Squish GUI Tester, Unified Functional Testing (UFT), Maveryx, Appium, and eggPlant Functional.\r\n<span style=\"font-weight: bold;\">Graphical User Interface Examples</span>\r\nSketchpad, believed to be the first graphical computer-aided design program, was developed in 1962 by Ivan Sutherland while he was at MIT, and consisted of a light pen that enabled users to create and manipulate objects in engineering drawings in real-time with coordinated graphics.\r\nModern operating systems and graphical user interfaces are incorporated into nearly every interactive application, such as ATMs, self-service checkouts, airline self-ticketing and check-in, video games, smartphones, and desktops. Some popular, modern graphical user interface examples include Microsoft Windows, macOS, Ubuntu Unity, and GNOME Shell for desktop environments, and Android, Apple's iOS, BlackBerry OS, Windows 10 Mobile, Palm OS-WebOS, and Firefox OS for smartphones.\r\n<span style=\"font-weight: bold;\">Advantages of Graphical User Interfaces</span>\r\nThe advantage of a graphical user interface is a stark improvement in useability for the average person. The features of a graphical user interface leverage familiar metaphors, such as drag-and-drop for transferring files, and use familiar icons, such as a trash bin for deleted files, creating an environment in which computer operations are intuitive and easily mastered without any prior practice or knowledge of computing machinery or languages. Graphical user interface applications are self descriptive, feedback is typically immediate, and visual cues encourage and steer discoverability.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_User_Interface_Development.png","alias":"user-interface-development"},"669":{"id":669,"title":"MySQL Development","description":" MySQL is an open-source relational database management system (RDBMS). Its name is a combination of "My", the name of co-founder Michael Widenius's daughter, and "SQL", the abbreviation for Structured Query Language.\r\nMySQL is free and open-source software under the terms of the GNU General Public License, and is also available under a variety of proprietary licenses. MySQL was owned and sponsored by the Swedish company MySQL AB, which was bought by Sun Microsystems (now Oracle Corporation). In 2010, when Oracle acquired Sun, Widenius forked the open-source MySQL project to create MariaDB.\r\nMySQL is a component of the LAMP web application software stack (and others), which is an acronym for Linux, Apache, MySQL, Perl/PHP/Python. MySQL is used by many database-driven web applications, including Drupal, Joomla, phpBB, and WordPress. MySQL is also used by many popular websites, including Facebook, Flickr, MediaWiki, Twitter, and YouTube.\r\nMySQL is written in C and C++. Its SQL parser is written in yacc, but it uses a home-brewed lexical analyzer. MySQL works on many system platforms, including AIX, BSDi, FreeBSD, HP-UX, eComStation, i5/OS, IRIX, Linux, macOS, Microsoft Windows, NetBSD, Novell NetWare, OpenBSD, OpenSolaris, OS/2 Warp, QNX, Oracle Solaris, Symbian, SunOS, SCO OpenServer, SCO UnixWare, Sanos and Tru64. A port of MySQL to OpenVMS also exists.\r\nThe MySQL server software itself and the client libraries use dual-licensing distribution. They are offered under GPL version 2, or a proprietary license.\r\nSupport can be obtained from the official manual. Free support additionally is available in different IRC channels and forums. Oracle offers paid support via its MySQL Enterprise products. They differ in the scope of services and in price. Additionally, a number of third party organisations exist to provide support and services, including MariaDB and Percona.\r\nMySQL has received positive reviews, and reviewers noticed it "performs extremely well in the average case" and that the "developer interfaces are there, and the documentation (not to mention feedback in the real world via Web sites and the like) is very, very good". It has also been tested to be a "fast, stable and true multi-user, multi-threaded sql database server".","materialsDescription":" <span style=\"font-weight: bold; \">What is MySQL?</span>\r\n<span style=\"font-style: italic; \">MySQL is a database management system.</span>\r\nA database is a structured collection of data. It may be anything from a simple shopping list or a picture gallery or the vast amounts of information in a corporate network. To add, access, and process data stored in a computer database, you need a database management system such as MySQL Server. Since computers are very good at handling large amounts of data, database management plays a central role in computing, as stand-alone utilities, or as parts of other applications.\r\n<span style=\"font-style: italic; \">MySQL is a relational database management system.</span>\r\nA relational database stores data in separate tables rather than putting all the data in one big storeroom. This adds speed and flexibility. The tables are linked by defined relations making it possible to combine data from several tables on request. The SQL part of "MySQL" stands for "Structured Query Language" the most common standardised language used to access databases.\r\nMySQL, the most popular Open Source SQL database, is developed and provided by MySQL AB. The MySQL web site ( http://www.mysql.com ) provides the latest information about MySQL software and MySQL AB.\r\n<span style=\"font-weight: bold;\">Why do I need MySQL?</span>\r\nIf you have any information such as products, dates, customers, pictures, or any data that is not static, a database is an efficient way to manage that information. Sites that contain message boards, guest books, dynamic galleries, contact lists, or online product information can greatly benefit by storing their information on our fast, reliable and secure database server.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MySQL_Development.png","alias":"mysql-development"},"671":{"id":671,"title":"Oracle Database Development","description":" Oracle Database (commonly referred to as Oracle RDBMS or simply as Oracle) is a proprietary multi-model database management system produced and marketed by Oracle Corporation.\r\nIt is a database commonly used for running online transaction processing (OLTP), data warehousing (DW) and mixed (OLTP & DW) database workloads. The latest generation, Oracle Database 19c, is available on-prem, on-cloud, or in a hybrid-Cloud environment. 19c may also be deployed on Oracle Engineered Systems (e.g. Exadata) on-prem, on Oracle (public) cloud or (private) cloud at a customer. At Openworld 2017 in San Francisco, Executive Chairman of the Board and CTO, Larry Ellison announced the next database generation, Oracle Autonomous Database.\r\nA 2016 Gartner report claimed to show Oracle holding #1 RDBMS market share worldwide based on the revenue share ahead of its four closest competitors – Microsoft, IBM, SAP, and Teradata.\r\nIn the market for relational databases, Oracle Database competes against commercial products such as IBM's DB2 UDB and Microsoft SQL Server. Oracle and IBM tend to battle for the mid-range database market on Unix and Linux platforms, while Microsoft dominates the mid-range database market on Microsoft Windows platforms. However, since they share many of the same customers, Oracle and IBM tend to support each other's products in many middleware and application categories (for example WebSphere, PeopleSoft, and Siebel Systems CRM), and IBM's hardware divisions work closely with Oracle on performance-optimizing server-technologies (for example, Linux on IBM Z). Niche commercial competitors include Teradata (in data warehousing and business intelligence), Software AG's ADABAS, Sybase, and IBM's Informix, among many others.\r\nIncreasingly, the Oracle database products compete against such open-source software relational and non-relational database systems like PostgreSQL, MongoDB, Couchbase, Neo4j, and others. Oracle acquired Innobase, supplier of the InnoDB codebase to MySQL, in part to compete better against open source alternatives, and acquired Sun Microsystems, owner of MySQL, in 2010. Database products licensed as open-source are, by the legal terms of the Open Source Definition, free to distribute and free of royalty or other licensing fees. ","materialsDescription":" <span style=\"font-weight: bold;\">Why is Oracle Such a Popular Relational Database?</span>\r\nIn the Oracle Bigdata base, a collection of data is treated as one. The purpose of a database is to store and retrieve organized information. In general, an Oracle server manages a huge amount of data in a multiuser environment so that many users can concurrently access the same data and all this is delivered with high performance. Prevention of unauthorized access and efficient solutions for failure recovery is also provided by the Oracle server.\r\nThe most flexible and cost-effective way to manage information and applications is offered by Oracle Database and is the first database designed for enterprise grid computing. Enterprise grid computing enables the creation of a large pool of industry-standard, modular storage, and servers.\r\nThis architecture enables every new system to be quickly provisioned from the collection or pool of components. Peak workloads are not required since capacity can easily be added or reallocated from the resource pool as required.\r\nThe database has logical and physical structures. Because the physical and logical structures are separate, the physical storage of data can be managed without affecting the access to logical storage structures.\r\n<span style=\"font-weight: bold;\">Oracle Database Features</span>\r\nFollowing are the features of Oracle Database:\r\n<ul><li>Scalability and Performance;</li><li>Manageability;</li><li>Database Backup and Recovery;</li><li>High Availability;</li><li>Business Intelligence;</li><li>Content Management;</li><li>Security;</li><li>Data Integrity and Triggers;</li><li>Information Integration.</li></ul>\r\n<span style=\"font-weight: bold;\">Oracle Database Application Development</span>\r\nOracle Database is a simple, widely understood, unified data model. It is used as a standalone in many applications, but it is also invoked directly from Java (JDBC), Oracle Call Interface (OCI), Oracle C++ Call Interface (OCCI), or XSU (XML SQL Utility). Stored packages, procedures, and triggers can all be written in PL/SQL or in Java.\r\nSQL and PL/SQL are the core of Oracle’s application development stack. Most enterprises run SQL in back-ends and Web applications accessing databases do so by utilizing SQL (wrapped by Java classes as JDBC). Enterprise Application Integration applications generate XML from SQL queries, and content repositories are built on top of SQL tables.\r\nOracle server covers the following:\r\n<ul><li> Oracle SQL;</li><li>PL/SQL;</li><li>Application Programming Languages (APIs);</li><li>Transactions;</li><li>Datatypes;</li><li>Globalization.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Oracle_Datase_Development.png","alias":"oracle-database-development"},"673":{"id":673,"title":"MS SQL Development","description":" Microsoft SQL Server is a relational database management system, or RDBMS, that supports a wide variety of transaction processing, business intelligence and analytics applications in corporate IT environments. It's one of the three market-leading database technologies, along with Oracle Database and IBM's DB2.\r\nLike other RDBMS technologies, SQL Server is primarily built around a row-based table structure that connects related data elements in different tables to one another, avoiding the need to redundantly store data in multiple places within a database. The relational model also provides referential integrity and other integrity constraints to maintain data accuracy; those checks are part of a broader adherence to the principles of atomicity, consistency, isolation, and durability - collectively known as the ACID properties and designed to guarantee that database transactions are processed reliably.\r\nThe advanced security features supported in all editions of Microsoft SQL Server starting with SQL Server 2016 SP1 include three technologies added to the 2016 release: Always Encrypted, which lets user update encrypted data without having to decrypt it first; row-level security, which enables data access to be controlled at the row level in database tables; and dynamic data masking, which automatically hides elements of sensitive data from users without full access privileges.","materialsDescription":" <span style=\"font-weight: bold;\">What is MS SQL?</span>\r\nMS SQL is short for Microsoft SQL Server. It is a relational web hosting database that is used to store web site information like blog posts or user information. MS SQL is the most popular type of database on Windows servers. It is not free but it has many advanced features that make it suitable for businesses.\r\n<span style=\"font-weight: bold;\">What are the features of MS SQL?</span>\r\nIn basic terms, an MS SQL database is capable of storing any type of data that you want. It will let you quickly store and retrieve information and multiple web site visitors can use it at one time. You will use SQL statements to accomplish all of this. In more technical terms, most versions of MS SQL have the following features:\r\n<ul><li>Buffer management</li><li>Logging and Transaction</li><li>Concurrency and locking</li><li>Replication services</li><li>Analysis services</li><li>Notification services</li><li>Integration services</li><li>Full-text search service</li><li>Stored procedures</li><li>Triggers</li><li>Views</li><li>Sub-SELECTs (i.e. nested SELECTs)</li></ul>\r\n<span style=\"font-weight: bold;\">What is MS SQL used for?</span>\r\nMS SQL is the database of choice for web applications on a Windows platform (using .NET or ASP). These languages make is extremely easy to connect to the MS SQL database. It is also used for many popular content management systems and other scripts.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MS_SQL_Development.png","alias":"ms-sql-development"},"675":{"id":675,"title":"MariaDB Development","description":" MariaDB is a community-developed, commercially supported fork of the MySQL relational database management system (RDBMS), intended to remain free and open-source software under the GNU General Public License. Development is led by some of the original developers of MySQL, who forked it due to concerns over its acquisition by Oracle Corporation in 2009.\r\nMariaDB intended to maintain high compatibility with MySQL, ensuring a drop-in replacement capability with library binary parity and exact matching with MySQL APIs and commands. However, new features diverge more. It includes new storage engines like Aria, ColumnStore, and MyRocks.\r\nIts lead developer/CTO is Michael "Monty" Widenius, one of the founders of MySQL AB and the founder of Monty Program AB. On 16 January 2008, MySQL AB announced that it had agreed to be acquired by Sun Microsystems for approximately $1 billion. The acquisition completed on 26 February 2008. MariaDB is named after Monty's younger daughter, Maria. (MySQL is named after his other daughter, My.)","materialsDescription":" <span style=\"font-weight: bold;\">What is MariaDB?</span>\r\nMariaDB is a backward compatible, drop-in replacement of the MySQL® Database Server. It includes all major open source storage engines.\r\nThe source code for MariaDB is publically available on GitHub. Binaries and packages are also available.\r\n<span style=\"font-weight: bold;\">What is MariaDB's Release Policy and Schedule?</span>\r\nThe <link https://mariadb.com/kb/en/plans/ - external-link-new-window \"Opens internal link in current window\">MariaDB Development Plans</link> page links to plans for future versions of MariaDB.\r\nThe release schedule for upcoming MariaDB releases can be found on the <link https://jira.mariadb.org/projects/MDEV?selectedItem=com.atlassian.jira.jira-projects-plugin:release-page - external-link-new-window \"Opens internal link in current window\">MariaDB Jira release page</link>.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MariaDB_Development.png","alias":"mariadb-development"},"676":{"id":676,"title":"PostgreSQL Development","description":" PostgreSQL, also known as Postgres, is a free and open-source relational database management system (RDBMS) emphasizing extensibility and technical standards compliance. It is designed to handle a range of workloads, from single machines to data warehouses or Web services with many concurrent users. It is the default database for macOS Server, and is also available for Linux, FreeBSD, OpenBSD, and Windows.\r\nPostgreSQL features transactions with Atomicity, Consistency, Isolation, Durability (ACID) properties, automatically updatable views, materialized views, triggers, foreign keys, and stored procedures. PostgreSQL is developed by the PostgreSQL Global Development Group, a diverse group of many companies and individual contributors.\r\nPostgreSQL's developers pronounce PostgreSQL as /ˈpoʊstɡrɛs ˌkjuː ˈɛl/. It is abbreviated as Postgres because of ubiquitous support for the SQL standard among relational databases. Originally named POSTGRES, the name (Post Ingres) refers to the project's origins in that RDBMS that originated at University of California, Berkeley. After a review the PostgreSQL Core Team announced in 2007 that the product would continue to use the name PostgreSQL.\r\nPostgreSQL manages concurrency through multiversion concurrency control (MVCC), which gives each transaction a "snapshot" of the database, allowing changes to be made without affecting other transactions. This largely eliminates the need for read locks, and ensures the database maintains ACID principles. PostgreSQL offers three levels of transaction isolation: Read Committed, Repeatable Read and Serializable. Because PostgreSQL is immune to dirty reads, requesting a Read Uncommitted transaction isolation level provides read committed instead. PostgreSQL supports full serializability via the serializable snapshot isolation (SSI) method.\r\nPostgreSQL is available for the following operating systems: Linux (all recent distributions), 64-bit installers available for macOS (OS X) version 10.6 and newer – Windows (with installers available for 64-bit version; tested on latest versions and back to Windows 2012 R2, while for PostgreSQL version 10 and older a 32-bit installer is available and tested down to 32-bit Windows 2008 R1; compilable by e.g. Visual Studio, version 2013 up up to most recent 2019 version) – FreeBSD, OpenBSD, NetBSD, AIX, HP-UX, Solaris, and UnixWare; and not officially tested: DragonFly BSD, BSD/OS, IRIX, OpenIndiana, OpenSolaris, OpenServer, and Tru64 UNIX. Most other Unix-like systems could also work; most modern do support.\r\nPostgreSQL works on any of the following instruction set architectures: x86 and x86-64 on Windows and other operating systems; these are supported on other than Windows: IA-64 Itanium (external support for HP-UX), PowerPC, PowerPC 64, S/390, S/390x, SPARC, SPARC 64, ARMv8-A (64-bit) and older ARM (32-bit, including older such as ARMv6 in Raspberry Pi), MIPS, MIPSel, and PA-RISC. It was also known to work, but not tested in a while, on Alpha (dropped in 9.5), M68k, M32R, NS32k, and VAX. Beyond these, it is possible to build PostgreSQL for an unsupported CPU by disabling spinlocks.","materialsDescription":" <span style=\"font-weight: bold;\">What is PostgreSQL? How is it pronounced? What is Postgres?</span>\r\nPostgreSQL is pronounced Post-Gres-Q-L.\r\nPostgreSQL is an object-relational database system that has the features of traditional proprietary database systems with enhancements to be found in next-generation DBMS systems. PostgreSQL is free and the complete source code is available.\r\nPostgreSQL development is performed by a team of mostly volunteer developers spread throughout the world and communicating via the Internet. It is a community project and is not controlled by any company.\r\nPostgres is a widely-used nickname for PostgreSQL. It was the original name of the project at Berkeley and is strongly preferred over other nicknames. If you find 'PostgreSQL' hard to pronounce, call it 'Postgres' instead.\r\n<span style=\"font-weight: bold;\">Who controls PostgreSQL?</span>\r\nIf you are looking for a PostgreSQL gatekeeper, central committee, or controlling company, give up --- there isn't one. We do have a core committee and git committers, but these groups are more for administrative purposes than control. The project is directed by the community of developers and users, which anyone can join. All you need to do is subscribe to the mailing lists and participate in the discussions.\r\n<span style=\"font-weight: bold;\">Who is the PostgreSQL Global Development Group?</span>\r\nThe "PGDG" is an international, unincorporated association of individuals and companies who have contributed to the PostgreSQL project. The PostgreSQL Core Team generally act as spokespeople for the PGDG.\r\n<span style=\"font-weight: bold;\">Who is the PostgreSQL Core Team?</span>\r\nA committee of five to seven (currently six) senior contributors to PostgreSQL who do the following for the project: (a) set release dates, (b) handle confidential matters for the project, (c) act as spokespeople for the PGDG when required, and (d) arbitrate community decisions which are not settled by consensus. The current Core Team is listed on top of the contributor's page.\r\n<span style=\"font-weight: bold;\">What about the various PostgreSQL foundations?</span>\r\nWhile the PostgreSQL project utilizes non-profit corporations in the USA, Europe, Brazil, and Japan for fundraising and project coordination, these entities do not own the PostgreSQL code.\r\n<span style=\"font-weight: bold;\">What is the license of PostgreSQL?</span>\r\nPostgreSQL is distributed under a license similar to BSD and MIT. Basically, it allows users to do anything they want with the code, including reselling binaries without the source code. The only restriction is that you not hold us legally liable for problems with the software. There is also the requirement that this copyright appears in all copies of the software.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_PostgesSQL_Development.png","alias":"postgresql-development"},"679":{"id":679,"title":"Games Development","description":" Video game development is the process of creating a video game. The effort is undertaken by a developer, ranging from a single person to an international team dispersed across the globe. Development of traditional commercial PC and console games is normally funded by a publisher, and can take several years to reach completion. Indie games usually take less time and money and can be produced by individuals and smaller developers. The independent game industry has been on the rise, facilitated by the growth of accessible game development software such as Unity platform and Unreal Engine and new online distribution systems such as Steam and Uplay, as well as the mobile game market for Android and iOS devices.\r\nThe first video games, developed in the 1960s, were noncommercial. They required mainframe computers to run and were not available to the general public. Commercial game development began in the '70s with the advent of first-generation video game consoles and early home computers like the Apple I. At that time, owing to low costs and low capabilities of computers, a lone programmer could develop a full and complete game. However, in the late '80s and '90s, ever-increasing computer processing power and heightened expectations from gamers made it difficult for a single person to produce a mainstream console or PC game. The average cost of producing a triple-A video game slowly rose, from US$1–4 million in 2000, to over $5 million in 2006, then to over $20 million by 2010.\r\nMainstream commercial PC and console games are generally developed in phases: first, in pre-production, pitches, prototypes, and game design documents are written; if the idea is approved and the developer receives funding, then full-scale development begins. The development of a complete game usually involves a team of 20–100 individuals with various responsibilities, including designers, artists, programmers, and testers.\r\nThe game revenue from retails is divided among the parties along the distribution chain, such as — developer, publisher, retail, manufacturer and console royalty. Many developers fail to profit from this and go bankrupt. Many developers seek alternative economic models through Internet marketing and distribution channels to improve returns., as through a mobile distribution channel the share of a developer can be up to 70% of the total revenue and through an online distribution channel almost 100%.","materialsDescription":" <span style=\"font-weight: bold;\">How important are games?</span>\r\nThe popularity of smart gadgets like smartphones, tablets etc have opened up a new avenue of entertainment in the software industry and that is the domain of the mobile gaming sector. And now the games market is a big part of the mobile ecosystem and is estimated to reach $14.4 billion by 2017.\r\n<span style=\"font-weight: bold;\">Which are the gaming platforms available?</span>\r\nDifferent smart gadgets are running on different operating systems or platforms and the popular ones are:\r\n<ul><li>Smartphone: Apple iOS, Android, Windows;</li><li>Desktop: PC (Windows), Mac & Linux;</li><li>Online: Browser and Facebook games.</li></ul>\r\n<span style=\"font-weight: bold;\">How I will get revenue from games?</span>\r\nAs soon as your game is live, you will start earning your revenue and profits by selling your game (paid games) and in-app purchases.\r\n<span style=\"font-weight: bold;\">How to start my game development project?</span>\r\nFor staring your own game development project, you just need an initial spark or a core idea that will be worked upon by a team of developers to transform it into an addictive gaming experience.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Games_Development.png","alias":"games-development"},"681":{"id":681,"title":"Software Architecture Design","description":" Software architecture refers to the fundamental structures of a software system and the discipline of creating such structures and systems. Each structure comprises software elements, relations among them, and properties of both elements and relations. The architecture of a software system is a metaphor, analogous to the architecture of a building. It functions as a blueprint for the system and the developing project, laying out the tasks necessary to be executed by the design teams.\r\nSoftware architecture is about making fundamental structural choices that are costly to change once implemented. Software architecture choices include specific structural options from possibilities in the design of the software. For example, the systems that controlled the Space Shuttle launch vehicle had the requirement of being very fast and very reliable. Therefore, an appropriate real-time computing language would need to be chosen. Additionally, to satisfy the need for reliability the choice could be made to have multiple redundant and independently produced copies of the program, and to run these copies on independent hardware while cross-checking results.\r\nDocumenting software architecture facilitates communication between stakeholders, captures early decisions about the high-level design, and allows the reuse of design components between projects.","materialsDescription":" <span style=\"font-weight: bold; \">What is the scope of software architecture?</span>\r\nOpinions vary as to the scope of software architectures:\r\n<ul><li>Macroscopic system structure: this refers to architecture as a higher-level abstraction of a software system that consists of a collection of computational components together with connectors that describe the interaction between these components.</li><li>The important stuff—whatever that is: this refers to the fact that software architects should concern themselves with those decisions that have a high impact on the system and its stakeholders.</li><li>That is fundamental to understanding a system in its environment.</li><li>Things that people perceive as hard to change: since designing the architecture takes place at the beginning of a software system's lifecycle, the architect should focus on decisions that "have to" be right the first time. Following this line of thought, architectural design issues may become non-architectural once their irreversibility can be overcome.</li><li>A set of architectural design decisions: software architecture should not be considered merely a set of models or structures, but should include the decisions that lead to these particular structures, and the rationale behind them. This insight has led to substantial research into software architecture knowledge management.</li></ul>\r\n<span style=\"font-weight: bold; \">What are the characteristics of software architecture?</span>\r\nSoftware architecture exhibits the following:\r\n<span style=\"font-weight: bold; \">A multitude of stakeholders:</span> software systems have to cater to a variety of stakeholders such as business managers, owners, users, and operators. These stakeholders all have their own concerns with respect to the system. Balancing these concerns and demonstrating that they are addressed is part of designing the system. This implies that architecture involves dealing with a broad variety of concerns and stakeholders, and has a multidisciplinary nature.\r\n<span style=\"font-weight: bold; \">Separation of concerns:</span> the established way for architects to reduce complexity is to separate the concerns that drive the design. Architecture documentation shows that all stakeholder concerns are addressed by modeling and describing the architecture from separate points of view associated with the various stakeholder concerns. These separate descriptions are called architectural views.\r\n<span style=\"font-weight: bold; \">Quality-driven:</span> classic software design approaches (e.g. Jackson Structured Programming) were driven by required functionality and the flow of data through the system, but the current insight is that the architecture of a software system is more closely related to its quality attributes such as fault-tolerance, backward compatibility, extensibility, reliability, maintainability, availability, security, usability, and other such –ilities. Stakeholder concerns often translate into requirements on these quality attributes, which are variously called non-functional requirements, extra-functional requirements, behavioral requirements, or quality attribute requirements.\r\n<span style=\"font-weight: bold; \">Recurring styles:</span> like building architecture, the software architecture discipline has developed standard ways to address recurring concerns. These "standard ways" are called by various names at various levels of abstraction. Common terms for recurring solutions are architectural style, tactic, reference architecture and architectural pattern.\r\n<span style=\"font-weight: bold; \">Conceptual integrity:</span> a term introduced by Fred Brooks in The Mythical Man-Month to denote the idea that the architecture of a software system represents an overall vision of what it should do and how it should do it. This vision should be separated from its implementation. The architect assumes the role of "keeper of the vision", making sure that additions to the system are in line with the architecture, hence preserving conceptual integrity.\r\n<span style=\"font-weight: bold; \">Cognitive constraints:</span> an observation first made in a 1967 paper by computer programmer Melvin Conway that organizations which design systems are constrained to produce designs which are copies of the communication structures of these organizations. As with conceptual integrity, it was Fred Brooks who introduced it to a wider audience when he cited the paper and the idea in his elegant classic The Mythical Man-Month, calling it "Conway's Law."\r\n<span style=\"font-weight: bold;\">What is the motivation of software architecture?</span>\r\nSoftware architecture is an "intellectually graspable" abstraction of a complex system. This abstraction provides a number of benefits:\r\n<ul><li><span style=\"font-style: italic;\">It gives a basis for an analysis of software systems' behavior before the system has been built.</span> The ability to verify that a future software system fulfills its stakeholders' needs without actually having to build it represents substantial cost-saving and risk-mitigation. A number of techniques have been developed to perform such analyses, such as ATAM.</li><li><span style=\"font-style: italic;\">It provides a basis for the re-use of elements and decisions.</span> A complete software architecture or parts of it, like individual architectural strategies and decisions, can be re-used across multiple systems whose stakeholders require similar quality attributes or functionality, saving design costs and mitigating the risk of design mistakes.</li><li><span style=\"font-style: italic;\">It supports early design decisions that impact a system's development, deployment, and maintenance life.</span> Getting the early, high-impact decisions right is important to prevent schedule and budget overruns.</li><li><span style=\"font-style: italic;\">It facilitates communication with stakeholders, contributing to a system that better fulfills their needs.</span> Communicating about complex systems from the point of view of stakeholders helps them understand the consequences of their stated requirements and the design decisions based on them. Architecture gives the ability to communicate about design decisions before the system is implemented when they are still relatively easy to adapt.</li><li><span style=\"font-style: italic;\">It helps in risk management.</span> Software architecture helps to reduce risks and the chance of failure.</li><li><span style=\"font-style: italic;\">It enables cost reduction.</span> Software architecture is a means to manage risk and costs in complex IT projects.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Software_Architecture_Design.png","alias":"software-architecture-design"},"713":{"id":713,"title":"IT Trainings","description":" IT Training is specific to the Information Technology (IT) industry, or to the skills necessary for performing information technology jobs. IT Training includes courses related to the application, design, development, implementation, support or management of computer-based information systems.\r\nThe IT training market is segmented into six broad market segments. Based on TrainingIndustry.com research, these segments reflect how IT training companies focus their suite of offerings and from which areas they derive most of their revenue.\r\n<ul><li>IT Infrastructure Training focuses on building, sustaining, and managing technical infrastructure.</li><li>Programming and Database Training involves database construction and management, programming language, and similar areas.</li><li>Enterprise Business Applications Training involves software applications that manage organizations’ processes, such as ERP, CRM, call center management, automated billing systems, etc.</li><li>Desktop Applications Training focuses on how to use programs and applications for desktop users.</li><li>Certification Training includes certifications, compliance, exam preparation, or boot camp style training programs.</li><li>Cyber Security Training involves courses and training programs centered on IT network and system security.</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">What is IT Training?</span>\r\nThe organized activity aimed at imparting information and/or instructions to improve the recipient's performance or to help him or her attain a required level of knowledge or skill in the IT-sphere.\r\n<span style=\"font-weight: bold;\">Who is an information technology (IT) trainer?</span>\r\nInformation technology trainers may teach IT administrative support staff or an organization's non-technical business users how to operate, configure, and maintain new technology. Employed either in-house as part of the IT department or by a technology vendor, the information technology trainer helps a company get the most value from its investment in an IT solution.\r\nAn information technology degree helps IT professionals build a foundation for a technical training career. In addition, IT trainers must stay up to date with evolving technology. IT certification programs such as MCSE certification allow trainers to build expertise in specific vendor technologies and systems components. According to the Bureau of Labor Statistics, training and development specialists in all fields earned a mean annual salary of $55,310 in 2009. Software publishing was among the top-paying industries for trainers, with a salary of $71,960.\r\n<span style=\"font-weight: bold;\">What is the target audience of IT Training?</span>\r\nStudents of IT training programs are predominately those who work in jobs related to computer science, network administration, information technology management, cloud computing, telecommunications, etc.\r\nGeneral business professionals and consumers who use IT applications, and computer and software products are other important audiences for IT training. IT training, more so than most other content segments of the training market, contains a substantial amount of business to consumer (B2C) training. Consumer training occurs when a student (or purchaser of a training program) completes the training on their own, without the recommendation, supervision, or support of an employer. This includes individuals aiming to improve their IT skill set or to gain certifications.\r\nThere is also a considerable amount of government spending in the IT training market, predominately in the area of cybersecurity.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IT_Trainings.png","alias":"it-trainings"},"715":{"id":715,"title":"Business Training","description":"Business training is the most popular form of training. Business training helps employees acquire certain knowledge or skills. Through such training, they can achieve quality results in a short time.\r\nBusiness training helps to study:\r\n<ul><li>effective business negotiation methods;</li><li>organization of cohesive and highly effective teamwork; increase sales;</li><li>create the most optimal strategy for the organization and development of the company;</li><li>find your effective way to work in the company;</li><li>properly allocate your work resources and so on.</li></ul>\r\nBusiness training is divided into four main categories:\r\nTraining for people who want to start their own business. They help a person to set goals for their business correctly and identify the best ways to achieve them. It should be noted that such training will not tell where to get a million the next day. Organizational issues help everyone with this training. In all other respects, you will need to rely only on your own mind, perseverance and desire to make money.\r\nEffective management training is designed for work team leaders. They help the manager to solve the tasks facing him, to increase the motivation of the company's employees, effective personnel management, the use of effective models of leadership, etc.\r\nTraining is aimed at a flexible response in a specific situation. This is, in fact, crisis management. At such business training, managers help find flexible and innovative ways to solve specific problems.\r\nTraining aimed at developing certain business skills of an employee of the company. The themes of such business training can be completely different: effective sales, presentations, an organization of finances, etc.\r\nAlso, all business training is also divided into open and corporate. In open classes, general issues of effective work are addressed. Corporate training provides for the consideration of topics related exclusively to the specifics of a particular company.\r\nBusiness training is an opportunity in the shortest possible time to acquire the skills necessary for running a business. It can also give a significant impetus to the achievement of new life goals.","materialsDescription":" Here are five reasons why investing in employee training programs is good for your business.\r\n<span style=\"font-weight: bold;\">1. It helps attract and retain great talent.</span>\r\nBy training your staff through employee development programs, you might overcome major hurdles in the hiring process and employee retention that many organizations experience. For one, employees regard training initiatives as one way of improving their craft based on the premise that such programs are educational in nature.\r\nBy sponsoring sales training programs, for instance, your salespeople can gain new or additional insights to improve their selling skills as well as develop their self-confidence and positive attitude at work. Needless to say, your reputation as a good employer that cares about your employees' professional development will also be enhanced. As you help your employees further their skills and achieve personal growth, you create a goldmine of talent, which can give your business a market edge over competitors.\r\n<span style=\"font-weight: bold;\">2. It identifies which employees are worthy of promotion.</span>\r\nTrained employees can form your pool of candidates for possible future promotion as they have developed certain levels of competence over time. With this pool, you need not look further for qualified candidates for managerial or executive posts in your organization, which, incidentally, are best given to someone promoted from within the organization.\r\nAs these employees are highly familiar with the business operations and organizational structure, you can be certain that they understand and are capable of complementing the goals of the company.\r\n<span style=\"font-weight: bold;\">3. It increases employees' level of engagement.</span>\r\nTraining your employees is a great way to take their mind off of their usual work for a short period of time. Employees who are not given opportunities to participate in other productive activities, such as those offered in training courses, are prone to become less motivated and happy at work.\r\nYour employees are also likely to be more loyal to your company, seeing that you are willing to expend resources for their attendance at conferences or enrollment in specialized courses. The bottom line is that your willingness to invest in your employees' training and development will likewise inspire them to invest as much hard work as they can into your business.\r\n<span style=\"font-weight: bold;\">4. It translates into savings for the company.</span>\r\nEmployees who receive good quality training emerge highly skilled, creative, and confident, thereby increasing their efficiency and usability at work. To put things in perspective, the most effective training programs are those that empower employees to become multiskilled – extending their skill set across various areas.\r\nIt then becomes easier for companies to tap employees with diversified skills in performing a variety of functions or in transitioning them to other related roles within the organization. In return, employees feel empowered having expanded roles and responsibilities in your organization.\r\n<span style=\"font-weight: bold;\">5. It helps shape the future of your organization.</span>\r\nAs you make employee training and development programs part of your organization, you will find the need to update your offerings continuously. You have to think ahead about how you should be designing or refining your training methods over the long term to make them more responsive to employees' needs, interests and goals.\r\nYou'll also need to make sure that your organization is abreast with the current trends in the industry and make an assessment whether they warrant a change in your business culture or brand of customer service, in which case, a new training framework should also be put in place.\r\nEmployee training and development should be a shared responsibility among employees, managers and the organization. When planned and implemented correctly and consistently, the benefits gained can spur considerable growth at both individual and organizational levels.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Business_Training.png","alias":"business-training"},"731":{"id":731,"title":"IT Project Management","description":" IT project management is the process of planning, organizing and delineating responsibility for the completion of an organizations' specific information technology (IT) goals.\r\nIT project management includes overseeing projects for software development, hardware installations, network upgrades, cloud computing and virtualization rollouts, business analytics and data management projects and implementing IT services.\r\nIn addition to the normal problems that can cause a project to fail, factors that can negatively affect the success of an IT project include advances in technology during the project's execution, infrastructure changes that impact security and data management and unknown dependent relationships among hardware, software, network infrastructure and data. IT projects may also succumb to the first-time, first-use penalty which represents the total risk an organization assumes when implementing new technology for the first time. Because the technology hasn’t been implemented or used before in the organization, there are likely to be complications that will affect the project’s likelihood of success.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Project?</span>\r\nA Project is an initiative launched to create a unique product or service. A Project has a defined start date and a defined end date. The start date represents when the project will be launched. The end date specifies when the project will be completed.\r\nA Project is not a reoccurring activity; but rather is a single effort to produce something new.\r\n<span style=\"font-weight: bold;\">What is Project Management?</span>\r\nProject Management is the collection and application of skills, knowledge, processes, and activities to meet a specific objective that may take the form of a product or service. Project Management is an integrated process of applying 5 major processes and their related activities throughout a project lifecycle: initiating, planning, executing, monitoring and Controlling, Closeout.\r\n<span style=\"font-weight: bold;\">What is a Project Management Methodology?</span>\r\nA Project Management Methodology is the overall approach (system) that will be followed to meet the project objectives.\r\n<span style=\"font-weight: bold;\">What are the characteristics of a project?</span>\r\nA Project has three characteristics:\r\n<ul><li>Temporal nature (Is not ongoing and has a definite start and end date.)</li><li>Unique Deliverable (Produces a new unique product or service that does not exist.)</li><li>Progressive (Actions follow a sequence or pattern and progress over time.)</li></ul>\r\n<span style=\"font-weight: bold;\">Who is responsible for the project?</span>\r\nThe Project Manager is directly responsible for the results of the project. He/She should use the necessary skills, knowledge, and tools to meet the project objectives. During the early phases of the project, the Project Manager, working with the project team, should be able to:\r\n<ul><li>Determine project goals and objectives</li><li>Determine assumptions and constraints</li><li>Define and validate product description</li><li>Determine project requirements</li><li>Define Project deliverables</li><li>Estimate and monitor project resource allocation</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IT_Project_Management.png","alias":"it-project-management"},"733":{"id":733,"title":"Technical Support","description":" Technical support (often shortened to tech support) refers to services that entities provide to users of technology products or services. In general, technical support provide help regarding specific problems with a product or service, rather than providing training, provision or customization of product, or other support services. Most companies offer technical support for the services or products they sell, either included in the cost or for an additional fee. Technical support may be delivered over by phone, e-mail, live support software on a website, or other tool where users can log an incident. Larger organizations frequently have internal technical support available to their staff for computer-related problems. The Internet can also be a good source for freely available tech support, where experienced users help users find solutions to their problems. In addition, some fee-based service companies charge for premium technical support services.\r\nTechnical support may be delivered by different technologies depending on the situation. For example, direct questions can be addressed using telephone calls, SMS, Online chat, Support Forums, E-mail or Fax; basic software problems can be addressed over the telephone or, increasingly, by using remote access repair services; while more complicated problems with hardware may need to be dealt with in person.\r\nTechnical support is a range of services providing assistance with technology such as televisions, computers, and software, typically aiming to help the user with a specific problem.","materialsDescription":"<span style=\"font-weight: bold; \">What are the categories of technical support?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Call in</span></span>\r\nThis type of technical support has been very common in the services industry.[citation needed] It is also known as "Time and Materials" (T&M) IT support.[citation needed] The customer pays for the materials (hard drive, memory, computer, digital devices, etc.) and also pays the technician based on the pre-negotiated rate when a problem occurs.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Block hours</span></span>\r\nBlock hours allow the client to purchase a number of hours upfront at an agreed price. While it is commonly used to offer a reduced hourly rate, it can also simply be a standard non-reduced rate, or represent a minimum fee charged to a client before providing service. The premise behind this type of support is that the customer has purchased a fixed number of hours to use either per month or year. This allows them the flexibility to use the hours as they please without doing the paperwork and the hassle of paying multiple bills.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Managed services</span></span>\r\nManaged services means a company will receive a list of well-defined services on an ongoing basis, with well-defined "response and resolution times" for a fixed rate or a flat fee. This can include things like 24/7 monitoring of servers, 24/7 help desk support for daily computer issues, and on-site visits by a technician when issues cannot be resolved remotely.[citation needed] Some companies also offer additional services like project management, backup and disaster recovery, and vendor management in the monthly price. The companies that offer this type of tech support are known as managed services providers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Crowdsourced technical support</span></span>\r\nMany companies and organizations provide discussion boards for users of their products to interact; such forums allow companies to reduce their support costs without losing the benefit of customer feedback.\r\n<span style=\"font-weight: bold;\">What is outsourcing technical support?</span>\r\nWith the increasing use of technology in modern times, there is a growing requirement to provide technical support. Many organizations locate their technical support departments or call centers in countries or regions with lower costs. Dell was amongst the first companies to outsource their technical support and customer service departments to India in 2001. There has also been a growth in companies specializing in providing technical support to other organizations. These are often referred to as MSPs (Managed Service Providers).\r\nFor businesses needing to provide technical support, outsourcing allows them to maintain a high availability of service. Such need may result from peaks in call volumes during the day, periods of high activity due to introduction of new products or maintenance service packs, or the requirement to provide customers with a high level of service at a low cost to the business. For businesses needing technical support assets, outsourcing enables their core employees to focus more on their work in order to maintain productivity. It also enables them to utilize specialized personnel whose technical knowledge base and experience may exceed the scope of the business, thus providing a higher level of technical support to their employees.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Technical_Support.png","alias":"technical-support"},"735":{"id":735,"title":"Installation and configuration","description":" Installation or setup is the act of making the system or program ready for execution. Because the process varies for each program and each computer, programs (including operating systems) often come with an installer, a specialized program responsible for doing whatever is needed for their installation. The configuration is an arrangement of functional units according to their nature, number, and chief characteristics. Often, configuration pertains to the choice of hardware, software, firmware, settings, and documentation. The configuration affects system function and performance.\r\nSome computer programs can be executed by simply copying them into a folder stored on a computer and executing them. Other programs are supplied in a form unsuitable for immediate execution and therefore need an installation procedure. Once installed, the program can be executed again and again, without the need to reinstall before each execution.\r\nCommon operations performed during software installations include:\r\n<ul><li>Making sure that necessary system requirements are met</li><li>Checking for existing versions of the software</li><li>Creating or updating program files and folders</li><li>Adding configuration data such as configuration files, Windows registry entries or environment variables</li><li>Making the software accessible to the user, for instance by creating links, shortcuts or bookmarks</li><li>Configuring components that run automatically, such as daemons or Windows services</li><li>Performing product activation</li><li>Updating the software versions</li></ul>\r\nThese operations may require some charges or be free of charge. In case of payment, installation costs means the costs connected and relevant to or incurred as a result of installing the drivers or the equipment in the customers' premises. ","materialsDescription":"<span style=\"font-weight: bold;\">What does "Installation" mean?</span>\r\nInstallation is the process of making hardware and/or software ready for use. Obviously, different systems require different types of installations. While certain installations are simple and straightforward and can be performed by non-professionals, others are more complex and time-consuming and may require the involvement of specialists.\r\n<span style=\"font-weight: bold; \">What does the "Configuration" mean?</span>\r\nThe way a system is set up, or the assortment of components that make up the system. Configuration can refer to either hardware or software, or the combination of both. For instance, a typical configuration for a PC consists of 32MB (megabytes) main memory, a floppy drive, a hard disk, a modem, a CD-ROM drive, a VGA monitor, and the Windows operating system.\r\nMany software products require that the computer have a certain minimum configuration. For example, the software might require a graphics display monitor and a video adapter, a particular microprocessor, and a minimum amount of main memory.\r\nWhen you install a new device or program, you sometimes need to configure it, which means to set various switches and jumpers (for hardware) and to define values of parameters (for software). For example, the device or program may need to know what type of video adapter you have and what type of printer is connected to the computer. Thanks to new technologies, such as plug-and-play, much of this configuration is performed automatically.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Installation_and_configuration.png","alias":"installation-and-configuration"},"737":{"id":737,"title":"IT System Testing","description":" System testing is testing conducted on a complete integrated system to evaluate the system's compliance with its specified requirements.\r\nSystem testing takes, as its input, all of the integrated components that have passed integration testing. The purpose of integration testing is to detect any inconsistencies between the units that are integrated together (called assemblages). System testing seeks to detect defects both within the "inter-assemblages" and also within the system as a whole. The actual result is the behavior produced or observed when a component or system is tested.\r\nSystem testing is performed on the entire system in the context of either functional requirement specifications (FRS) or system requirement specification (SRS), or both. System testing tests not only the design but also the behavior and even the believed expectations of the customer. It is also intended to test up to and beyond the bounds defined in the software or hardware requirements specification(s).\r\nSoftware testing is an investigation conducted to provide stakeholders with information about the quality of the software product or service under test. Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation. Software testing involves the execution of a software component or system component to evaluate one or more properties of interest. In general, these properties indicate the extent to which the component or system under test meets the requirements that guided its design and development, responds correctly to all kinds of inputs, performs its functions within an acceptable time, is sufficiently usable, can be installed and run in its intended environments, and achieves the general result its stakeholders desire. As the number of possible tests for even simple software components is practically infinite, all software testing uses some strategy to select tests that are feasible for the available time and resources.\r\nMobile-device testing assures the quality of mobile devices, like mobile phones, PDAs, etc. The testing will be conducted on both hardware and software. And from the view of different procedures, the testing comprises R&D testing, factory testing and certification testing. Mobile-device testing involves a set of activities from monitoring and troubleshooting mobile applications, content and services on real handsets. Testing includes verification and validation of hardware devices and software applications.","materialsDescription":" <span style=\"font-weight: bold;\">What is System Testing?</span>\r\nSystem Testing is the testing of a complete and fully integrated software product. Usually, the software is only one element of a larger computer-based system. Ultimately, the software is interfaced with other software/hardware systems. System Testing is actually a series of different tests whose sole purpose is to exercise the full computer-based system.\r\nTwo Category of Software Testing:\r\n<ul><li>Black Box Testing;</li><li>White Box Testing.</li></ul>\r\nSystem test falls under the black box testing category of software testing.\r\nWhite box testing is the testing of the internal workings or code of a software application. In contrast, black box or System Testing is the opposite. The system test involves the external workings of the software from the user's perspective.\r\n<span style=\"font-weight: bold;\">What do you verify in System Testing?</span>\r\nSystem Testing involves testing the software code for following:\r\n<ul><li>Testing the fully integrated applications including external peripherals in order to check how components interact with one another and with the system as a whole. This is also called End to End testing scenario.</li><li>Verify thorough testing of every input in the application to check for desired outputs.</li><li>Testing of the user's experience with the application.</li></ul>\r\nThat is a very basic description of what is involved in system testing. You need to build detailed test cases and test suites that test each aspect of the application as seen from the outside without looking at the actual source code.\r\n<span style=\"font-weight: bold;\">What Types of System Testing Should Testers Use?</span>\r\nThere are over 50 different types of system testing. The specific types used by a tester depend on several variables. Those variables include:\r\n<ul><li><span style=\"font-weight: bold;\">Who the tester works for</span> - This is a major factor in determining the types of system testing a tester will use. Methods used by large companies are different than those used by medium and small companies.</li><li><span style=\"font-weight: bold;\">Time available for testing</span> - Ultimately, all 50 testing types could be used. Time is often what limits us to using only the types that are most relevant for the software project.</li><li><span style=\"font-weight: bold;\">Resources available to the tester</span> - Of course some testers will not have the necessary resources to conduct a testing type. For example, if you are a tester working for a large software development firm, you are likely to have expensive automated testing software not available to others.</li><li><span style=\"font-weight: bold;\">Software Tester's Education</span> - There is a certain learning curve for each type of software testing available. To use some of the software involved, a tester has to learn how to use it.</li><li><span style=\"font-weight: bold;\">Testing Budget</span> - Money becomes a factor not just for smaller companies and individual software developers but large companies as well.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IT_System_testing.png","alias":"it-system-testing"},"739":{"id":739,"title":"Deployment and Integration Services","description":" The number of various solutions implemented by customers today is quite large. Often, the subsystems of the seemingly unified IT landscape are either weakly connected with each other, or the interaction between them is established in the mode of transferring files and data by mail or “from hand to hand”.\r\nWestern IT vendors, following a certain trend, offer the customer complete and unified solutions. Such blocks of subsystems solve a specific task and form separate IT centers, which also require the mutual integration of infrastructures. This, oddly enough, is even more difficult, as a complete solution does not allow to penetrate deeply and get access to the required information or control subsystems.\r\nNevertheless, the integration and interconnection of information flows can significantly simplify business processes and lead to an increase in the efficiency of interaction both inside and outside the company (with customers and partners).\r\nThe integration task itself is important for business, as it provides a qualitatively new level of services. This is especially important for companies where IT is the immediate tool for achieving business goals. But it is equally important to make integration optimal in the light of minimizing not only the cost of purchasing equipment and software but also preserving previous IT investments.","materialsDescription":" <span style=\"font-weight: bold; \">The main types of implementation and integration services offered by companies:</span>\r\n<ul><li>Designing IT architecture for integration solutions in the field of analytics, automation and monitoring of business processes;</li><li>Development and integration of network infrastructure subsystems, including scalable telecommunications equipment, server equipment and workstations;</li><li>Defining a single platform and developing a solution for integrating enterprise applications, data and business processes;</li><li>Implementation and maintenance of integrated integration solutions in the field of enterprise management (ERP-systems);</li><li>Implementation and maintenance of integration solutions in the field of accounting and analysis of sales and customer relations (CRM-system);</li><li>Implementation and maintenance of integration solutions in the field of accounting and financial analysis;</li><li>Impairment, testing and development of solutions for ensuring information security of a business.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Deployment_and_Integration_Services.png","alias":"deployment-and-integration-services"},"741":{"id":741,"title":"Proof of Concept","description":"Proof of concept (PoC) is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has practical potential. A proof of concept is usually small and may or may not be complete.\r\nProof of concept (POC) is used to test the idea of a certain technical feature or the general design of a product and prove that it is possible to apply those ideas.\r\nIt could be used to test something on just one part of the product before it is tried in practice with making a prototype.\r\nYou can think of this as a pre-prototype version of the product, but it is not even that since POC shouldn’t have all the features as the final product, not even as the prototype.\r\nThe main goal of POC is to prove that it is actually possible to develop that idea and include it as part of the final product.","materialsDescription":" <span style=\"font-weight: bold;\">What is a proof of concept?</span>\r\nProof of concept is the testing of the finished product based on the idea. Thus, this stage is the first phase in the design of the application. It explains how the project should work on the basis of a detailed description of requirements and specifications. The proof is the complete satisfaction of those functions that need to be realized. This approach makes it easier to hire developers for a startup in the future.\r\nIn order to confirm the concept in software development, it is necessary to determine the main tasks and perform the following steps:\r\n<ol><li>Identify project goals and methods for their implementation.</li><li>Receive feedback from users and customers.</li><li>Correct the idea and start implementing it.</li></ol>\r\n<span style=\"font-weight: bold;\">Project goals and methods of implementation</span>\r\nBefore you start, you need to understand what goal will perform a project. A web project can be a large marketplace or social network with unique features and a convenient solution. Also, it may be a CRM system and help the business to increase sales or improve the accounting of business resources. One way or another, each platform has a specific purpose.\r\nThe next step is to build methods of achieving the goal. At this stage, it is important not to delve into the details, but to evaluate common elements. How the project will work, what functions will be implemented, how the web application will interact with users, etc. It is very important to consider each item and write it down in the report. In fact, this is a small brainstorm. Typically, it takes from a few days to a couple of weeks. When the implementation plan is completed, you can begin to collect feedback from future users.\r\n<span style=\"font-weight: bold;\">Feedback from users and customers</span>\r\nWhen you have a ready document with a description of the project and the functions, then you need to get feedback from users or customers. Offer them your solution to a particular problem. Familiarize them with the implementation methods. You will receive many suggestions for improvement. At this point, some of your guesswork will be broken. It is important to listen and collect feedback. There is no need to hurry and change the concept or implement everything that future users are asking for. They don't have an expert evaluation and this is only their proposal.\r\n<span style=\"font-weight: bold;\">Idea correction and implementation</span>\r\nIt is at this stage that the final proof of the concept takes place. Having received feedback, you can clearly understand how users will interact with your project. What emotions it will cause. It is necessary to understand that this is a preliminary evaluation of the concept. Some recommendations may not have value, as others can significantly affect the further development. Thus, based on the information received, it is necessary to consider what can be changed to make the project more convenient. If you received a lot of negative feedback, it makes sense to stop the development process. Or at least think about a new improved version. So, if you really decided to start the development, we recommend starting the design with MVP. The minimal version will allow us to develop the project in the shortest possible time and check the idea on real users.\r\nProof of the concept is one of the important stages in the development of complex and expensive projects. It allows with high probability to determine the value of the project even before the begins development. Typically, the process takes from a few days to a couple of weeks. It gives a clear idea of how the project will work and what functions it will perform. If you approach the feedback analysis process with a clean head, this step in the future can save you money and time.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Proof_of_Concept.png","alias":"proof-of-concept"},"743":{"id":743,"title":"IT System documentation writing","description":" Without the development of technical documentation, it is impossible to create any complex technical solution. High-quality documentation, that is, informative, complete and understandable, is the key to the success of products at all stages of its life cycle. Properly written documentation is the basis of the functionality and effectiveness of information systems. It is with its use that the processes of creating databases, developing software, selecting and configuring network and server software are carried out.\r\nMany organizations at the initial stages of creating and implementing technical solutions do not pay enough attention to this factor, which often prevents the entry of a new product to the market.\r\nWriting documentation requires the contractor to have specific knowledge and skills, certain experience and considerable labor costs.\r\nThe main task of the working documentation is to give a complete picture of how the system is structured, what it consists of and how it functions.\r\nThere is no single standard for the development of this type of documentation. In most cases, its structure is selected for a specific situation. But you can take any algorithm that has already proven its effectiveness as the basis.","materialsDescription":"<span style=\"font-weight: bold; \">What is software documentation?</span>\r\nSoftware documentation - printed user manuals, online (online) documentation and help text describing how to use the software product.\r\n<span style=\"font-weight: bold; \">What is process documentation?</span>\r\nA process document outlines the steps necessary to complete a task or process. It is internal, ongoing documentation of the process while it is occurring—documentation cares more about the “how” of implementation than the “what” of process impact.\r\n<span style=\"font-weight: bold;\">What should be in the working documentation?</span>\r\nFirst of all, technical descriptions of implemented solutions. These are IT infrastructure diagrams, configuration descriptions, etc.\r\n<span style=\"font-weight: bold;\">What does well-written working documentation give?</span>\r\n<ul><li>systematizes data on IT infrastructure;</li><li>helps to understand the system architecture and functioning of connected services;</li><li>facilitates management decisions (for example, shows which service can be removed or replaced and how it will be displayed on the whole system);</li><li>makes it possible to comprehensively evaluate the selected IT structure and, also, timely notice the mistakes made or holes in the architecture.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the key benefits of writing technical documentation?</span>\r\nThe development of documentation will allow you to:\r\n<ul><li>increase user satisfaction</li><li>reduce the load on the system administrator;</li><li>reduce system support costs.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IT_System_documentation_writing.png","alias":"it-system-documentation-writing"},"842":{"id":842,"title":"Chatbot Development","description":"A chatbot is a piece of software that conducts a conversation via auditory or textual methods. Such programs are often designed to convincingly simulate how a human would behave as a conversational partner, although as of 2019, they are far short of being able to pass the Turing test. Chatbots are typically used in dialog systems for various practical purposes including customer service or information acquisition. Some chatbots use sophisticated natural language processing systems, but many simpler ones scan for keywords within the input, then pull a reply with the most matching keywords, or the most similar wording pattern, from a database.\r\nThe term "ChatterBot" was originally coined by Michael Mauldin (creator of the first Verbot, Julia) in 1994 to describe these conversational programs. Today, most chatbots are accessed via virtual assistants such as Google Assistant and Amazon Alexa, via messaging apps such as Facebook Messenger or WeChat, or via individual organizations' apps and websites. Chatbots can be classified into usage categories such as conversational commerce (e-commerce via chat), analytics, communication, customer support, design, developer tools, education, entertainment, finance, food, games, health, HR, marketing, news, personal, productivity, shopping, social, sports, travel and utilities.\r\nBeyond chatbots, Conversational AI refers to the use of messaging apps, speech-based assistants and chatbots to automate communication and create personalized customer experiences at scale.\r\nThe process of building, testing and deploying chatbots can be done on cloud-based chatbot development platforms offered by cloud Platform as a Service (PaaS) providers such as Oracle Cloud Platform SnatchBot and IBM Watson. These cloud platforms provide Natural Language Processing, Artificial Intelligence and Mobile Backend as a Service for chatbot development.\r\nSome Companies like Microsoft Azure and AARC are currently providing their Bot Engines through which chatbot Platforms or Software can be developed.","materialsDescription":"New tools designed to simplify the interaction between humans and computers have hit the market: Chatbots or Virtual Assistants. In banking, chatbots and virtual assistants are some of the industry’s newest tools designed to simplify the interaction between humans and computers.\r\n<span style=\"font-weight: bold;\">What is a chatbot?</span>\r\nA chatbot is artificial intelligence (AI) software that can simulate a conversation (or a chat) with a user in natural language through messaging applications, websites, mobile apps or through the telephone.\r\n<span style=\"font-weight: bold;\">Why are chatbots important?</span>\r\nA chatbot is often described as one of the most advanced and promising expressions of interaction between humans and machines. However, from a technological point of view, a chatbot only represents the natural evolution of a Question-Answering system leveraging Natural Language Processing (NLP). Formulating responses to questions in natural language is one of the most typical examples of Natural Language Processing applied in various enterprises’ end-use applications.\r\n<span style=\"font-weight: bold;\">How does a chatbot work?</span>\r\nThere are two different tasks at the core of a chatbot:\r\n<ol><li>user request analysis</li><li>returning the response</li></ol>\r\nUser request analysis: this is the first task that a chatbot performs. It analyzes the user’s request to identify the user intent and to extract relevant entities.\r\nThe ability to identify the user’s intent and extract data and relevant entities contained in the user’s request is the first condition and the most relevant step at the core of a chatbot: If you are not able to correctly understand the user’s request, you won’t be able to provide the correct answer.\r\nReturning the response: once the user’s intent has been identified, the chatbot must provide the most appropriate response for the user’s request. The answer may be:\r\n<ul><li>a generic and predefined text;</li><li>a text retrieved from a knowledge base that contains different answers;</li><li>a contextualized piece of information based on data the user has provided;</li><li>data stored in enterprise systems;</li><li>the result of an action that the chatbot performed by interacting with one or more backend application;</li><li>a disambiguating question that helps the chatbot to correctly understand the user’s request.</li></ul>\r\n<span style=\"font-weight: bold;\">In what is the benefit of chatbots?</span>\r\nChatbot applications streamline interactions between people and services, enhancing the customer experience. At the same time, they offer companies new opportunities to improve the customer's engagement process and operational efficiency by reducing the typical cost of customer service.\r\nTo be successful, a chatbot solution should be able to effectively perform both of these tasks. Human support plays a key role here: Regardless of the kind of approach and the platform, human intervention is crucial in configuring, training and optimizing the chatbot system.\r\n<span style=\"font-weight: bold;\">Which chatbot application is right for you?</span>\r\nThere are different approaches and tools that you can use to develop a chatbot. Depending on the use case you want to address, some chatbot technologies are more appropriate than others. In order to achieve the desired results, the combination of different AI forms such as natural language processing, machine learning, and semantic understanding may be the best option.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Chatbot_Development.png","alias":"chatbot-development"}},"companyUrl":"https://sx-space.com/","countryCodes":["DEU","UKR"],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":true,"presenterCodeLng":"","seo":{"title":"soft Xpansion","keywords":"","description":"<p><span data-contrast=\"auto\"><strong>soft Xpansion</strong> – международная компания с более чем 20-летним опытом разработки и внедрения программного обеспечения, систем электронного документооборота, электронных архивов, автоматизации бизнес-процессов,","og:title":"soft Xpansion","og:description":"<p><span data-contrast=\"auto\"><strong>soft Xpansion</strong> – международная компания с более чем 20-летним опытом разработки и внедрения программного обеспечения, систем электронного документооборота, электронных архивов, автоматизации бизнес-процессов,","og:image":"https://old.roi4cio.com/uploads/roi/company/Group_73_1.png"},"eventUrl":"","vendorPartners":[{"vendor":"Microsoft","partnershipLevel":"Partner","countries":"","partnersType":""},{"vendor":"Alfresco","partnershipLevel":"","countries":"","partnersType":""}],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[{"id":3593,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png","logo":true,"scheme":false,"title":"Microsoft Defender Advanced Threat Protection (ATP)","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-defender-advanced-threat-protection-atp","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<span style=\"font-weight: bold; \">Microsoft Defender Advanced Threat Protection (ATP)</span> is a complete security solution.\r\n<span style=\"font-weight: bold; \">Agentless, cloud-powered</span>\r\nNo additional deployment or infrastructure. No delays or update compatibility issues. Always up to date.\r\n<span style=\"font-weight: bold; \">Unparalleled optics</span>\r\nBuilt into Windows 10 for deeper insights. Exchanges signals with the Microsoft Intelligent Security Graph.\r\n<span style=\"font-weight: bold; \">Automated security</span>\r\nTake your security to a new level, by going from alert to remediation in minutes – at scale.\r\n<span style=\"font-weight: bold; \">Synchronized defense</span>\r\nMicrosoft 365 shares detection and exploration – across devices, identities and information – to speed up response and recovery.\r\n\r\n<span style=\"font-weight: bold; \">Announcing Threat & Vulnerability Management</span>\r\nThreat and Vulnerability Management is a new capability within Microsoft Defender ATP designed to empower security teams to discover, prioritize and remediate vulnerabilities, and misconfigurations.<br /><span style=\"font-weight: bold; \">Microsoft Threat Experts</span>\r\nMicrosoft Threat Experts further empowers your Security Operations Centers by providing them with deep knowledge, expert level threat monitoring, analysis, and support to identify critical threats in your unique environment.\r\n<span style=\"font-weight: bold; \">Automation: From alert to remediation in minutes - at scale</span>\r\nAutomatically investigate alerts and remediate complex threats in minutes. Applies industry best practices and intelligent decision-making algorithms to determine whether a threat - file or fileless - is active and what action to take.\r\n<span style=\"font-weight: bold; \">Protect your business from advanced threats</span>\r\nThrough the power of the cloud, machine learning and behavior analytics, Microsoft Defender ATP provides connected pre-breach protection.\r\n<span style=\"font-weight: bold;\">Innovative Endpoint Detection and Response (EDR)</span>\r\nCyber attacks remain a serious threat. Microsoft Defender ATP detects network attacks and data breaches, and gives you the insights and tools to close incidents quickly.","shortDescription":"Microsoft Defender Advanced Threat Protection (ATP) is a unified platform for preventative protection, post-breach detection, automated investigation, and response.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Defender Advanced Threat Protection (ATP)","keywords":"","description":"<span style=\"font-weight: bold; \">Microsoft Defender Advanced Threat Protection (ATP)</span> is a complete security solution.\r\n<span style=\"font-weight: bold; \">Agentless, cloud-powered</span>\r\nNo additional deployment or infrastructure. No delays or update co","og:title":"Microsoft Defender Advanced Threat Protection (ATP)","og:description":"<span style=\"font-weight: bold; \">Microsoft Defender Advanced Threat Protection (ATP)</span> is a complete security solution.\r\n<span style=\"font-weight: bold; \">Agentless, cloud-powered</span>\r\nNo additional deployment or infrastructure. No delays or update co","og:image":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png"},"eventUrl":"","translationId":3594,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":838,"title":"Endpoint Detection and Response","alias":"endpoint-detection-and-response","description":"Endpoint Detection and Response (EDR) is a cybersecurity technology that addresses the need for continuous monitoring and response to advanced threats. It is a subset of endpoint security technology and a critical piece of an optimal security posture. EDR differs from other endpoint protection platforms (EPP) such as antivirus (AV) and anti-malware in that its primary focus isn't to automatically stop threats in the pre-execution phase on an endpoint. Rather, EDR is focused on providing the right endpoint visibility with the right insights to help security analysts discover, investigate and respond to very advanced threats and broader attack campaigns stretching across multiple endpoints. Many EDR tools, however, combine EDR and EPP.\r\nWhile small and mid-market organizations are increasingly turning to EDR technology for more advanced endpoint protection, many lack the resources to maximize the benefits of the technology. Utilizing advanced EDR features such as forensic analysis, behavioral monitoring and artificial intelligence (AI) is labor and resource intensive, requiring the attention of dedicated security professionals.\r\nA managed endpoint security service combines the latest technology, an around-the-clock team of certified CSOC experts and up-to-the-minute industry intelligence for a cost-effective monthly subscription. Managed services can help reduce the day-to-day burden of monitoring and responding to alerts, enhance security orchestration and automation (SOAR) and improve threat hunting and incident response.","materialsDescription":"<span style=\"font-weight: bold; \">What is Endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response is an emerging technology that addresses the need for continuous monitoring and response to advanced threats. One could even make the argument that endpoint detection and response is a form of advanced threat protection.\r\n<span style=\"font-weight: bold;\">What are the Key Aspects of EDR Security?</span>\r\nAccording to Gartner, effective EDR must include the following capabilities:\r\n<ul><li>Incident data search and investigation</li><li>Alert triage or suspicious activity validation</li><li>Suspicious activity detection</li><li>Threat hunting or data exploration</li><li>Stopping malicious activity</li></ul>\r\n<span style=\"font-weight: bold;\">What to look for in an EDR Solution?</span>\r\nUnderstanding the key aspects of EDR and why they are important will help you better discern what to look for in a solution. It’s important to find EDR software that can provide the highest level of protection while requiring the least amount of effort and investment — adding value to your security team without draining resources. Here are the six key aspects of EDR you should look for:\r\n<span style=\"font-weight: bold;\">1. Visibility:</span> Real-time visibility across all your endpoints allows you to view adversary activities, even as they attempt to breach your environment and stop them immediately.\r\n<span style=\"font-weight: bold;\">2. Threat Database:</span> Effective EDR requires massive amounts of telemetry collected from endpoints and enriched with context so it can be mined for signs of attack with a variety of analytic techniques.\r\n<span style=\"font-weight: bold;\">3. Behavioral Protection:</span> Relying solely on signature-based methods or indicators of compromise (IOCs) lead to the “silent failure” that allows data breaches to occur. Effective endpoint detection and response requires behavioral approaches that search for indicators of attack (IOAs), so you are alerted of suspicious activities before a compromise can occur.\r\n<span style=\"font-weight: bold;\">4. Insight and Intelligence:</span> An endpoint detection and response solution that integrates threat intelligence can provide context, including details on the attributed adversary that is attacking you or other information about the attack.\r\n<span style=\"font-weight: bold;\">5. Fast Response:</span> EDR that enables a fast and accurate response to incidents can stop an attack before it becomes a breach and allow your organization to get back to business quickly.\r\n<span style=\"font-weight: bold;\">6. Cloud-based Solution:</span> Having a cloud-based endpoint detection and response solution is the only way to ensure zero impact on endpoints while making sure capabilities such as search, analysis and investigation can be done accurately and in real time.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/hgghghg.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5175,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/activiti_logo.png","logo":true,"scheme":false,"title":"Alfresco Activiti","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"alfresco-activiti","companyTitle":"Alfresco","companyTypes":["vendor"],"companyId":2802,"companyAlias":"alfresco","description":"Activiti is a light-weight workflow and Business Process Management (BPM) Platform targeted at business people, developers, and system admins. Its core is a super-fast and rock-solid BPMN 2 process engine for Java. It's open-source and distributed under the Apache license. Activiti runs in any Java application, on a server, on a cluster or in the cloud. It integrates perfectly with Spring, it is extremely lightweight and based on simple concepts.","shortDescription":"Activiti is a light-weight workflow and Business Process Management (BPM) Platform targeted at business people, developers, and system admins.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Alfresco Activiti","keywords":"","description":"Activiti is a light-weight workflow and Business Process Management (BPM) Platform targeted at business people, developers, and system admins. Its core is a super-fast and rock-solid BPMN 2 process engine for Java. It's open-source and distributed under the Ap","og:title":"Alfresco Activiti","og:description":"Activiti is a light-weight workflow and Business Process Management (BPM) Platform targeted at business people, developers, and system admins. Its core is a super-fast and rock-solid BPMN 2 process engine for Java. It's open-source and distributed under the Ap","og:image":"https://old.roi4cio.com/fileadmin/user_upload/activiti_logo.png"},"eventUrl":"","translationId":5175,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":385,"title":"Model-Driven Application Platforms","alias":"model-driven-application-platforms","description":"A model-driven application is a software application that the functions or behaviors are based on, or in control of, some evolutionary applied models of the target things to the application. The applied models are served as a part of the application system in which it can be changed at runtime. The target things are what the application deals with, such as the objects and affairs in business for a business application. Follows the definition of application in TOGAF, a model-driven business application could be described as an IT system that supports business functions and services running on the models of the (things in) business.\r\nThe ideal of the architecture for a model-driven application was first put forward by Tong-Ying Yu on the Enterprise Engineering Forum in 1999, which have been studied and spread through some internet media for a long time. It had influence on the field of enterprise application development in China; there were successful cases of commercial development of enterprise/business applications in the architectural style of a model-driven application. Gartner Group carried out some studies into the subject in 2008; they defined the model-driven packaged applications as "enterprise applications that have explicit metadata-driven models of the supported processes, data and relationships, and that generate runtime components through metadata models, either dynamically interpreted or compiled, rather than hardcoded." The model-driven application architecture is one of few technology trends to driven the next generation of application modernization, that claimed by some industrial researchers in 2012.","materialsDescription":" <span style=\"font-weight: bold; \">What is Model-driven development?</span>\r\nModel-driven development (MDD) is a format to write and implement software quickly, effectively and at minimum cost. The methodology is also known as model-driven software development (MDSD), model-driven engineering (MDE) and model-driven architecture (MDA).\r\nThe MDD approach focuses on the construction of a software model. The model is a diagram that specifies how the software system should work before the code is generated. Once the software is created, it can be tested using model-based testing (MBT) and then deployed.\r\n<span style=\"font-weight: bold; \">What are the benefits of model-driven development?</span>\r\nThe MDD approach provides advantages in productivity over other development methods because the model simplifies the engineering process. It represents the intended behaviors or actions of a software product before coding begins.\r\nThe individuals and teams that work on the software construct models collaboratively. Communication between developers and a product manager, for example, provides clear definitions of what the software is and how it works. Tests, rebuilds and redeployments can be faster when developing multiple applications with MDD than with traditional development.\r\n<span style=\"font-weight: bold; \">What are the core concepts of model-driven development?</span>\r\nModel-driven development is more in-depth than just having a model of the software in development, which makes it different from model-based development. Abstraction and automation are key concepts of MDD. Abstraction means to organize complex software systems. In MDD, complex software gets abstracted, which then extracts the easy-to-define code.\r\nOnce developers transform the abstraction, a working version of the software model gets automated. This automation stage uses a domain-specific language (DSL), such as HTML, and scripting languages, like ColdFusion, which can integrate other programming languages and services -- .NET, C++, FTP and more -- for use in websites. DSL is a language specialized to an application domain. A model is written in a DSL language and is utilized for transformation in coding language from the model to working software.\r\nAgile software development methods are often paired with MDD. The Agile development approach enables short sprints where the project scope can change. Agile model-driven development (AMDD) establishes short development iterations, while changes can be redesigned and shown on the model. In AMDD, design efforts are split between modeling in both sprints and coding.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Model_Driven_Application_Platforms.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4796,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/microsoft_scsm.png","logo":true,"scheme":false,"title":"Microsoft System Center Service Manager (SCSM)","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-system-center-service-manager-scsm","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"Microsoft System Center 2012 Service Manager (SCSM 2012) is a management product in the System Center 2012 suite that can help an enterprise automate and adapt its IT service management. SCSM includes built-in processes that address situations enterprises will come across, such as changing control, managing assets' lifecycles and resolving problems and incidents as they occur. The SCSM 2012 application consists of three tiers: a console, a data access module and a database.<br />Enterprises must take two important factors into consideration before deploying SCSM 2012. First, they must create and identify a domain account to use when setting up Service Manager. Second, they must create a user group in Active Directory Domain Services.<br />There a number of ways to deploy SCSM 2012, but there are three deployment options that receive the most attention: one virtual computer and one physical computer; two computers to host the management server and database; and four computers to host the management server and database.<br /><br />","shortDescription":"Microsoft System Center Service Manager is designed to improve and simplify IT support operations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft System Center Service Manager (SCSM)","keywords":"","description":"Microsoft System Center 2012 Service Manager (SCSM 2012) is a management product in the System Center 2012 suite that can help an enterprise automate and adapt its IT service management. SCSM includes built-in processes that address situations enterprises will","og:title":"Microsoft System Center Service Manager (SCSM)","og:description":"Microsoft System Center 2012 Service Manager (SCSM 2012) is a management product in the System Center 2012 suite that can help an enterprise automate and adapt its IT service management. SCSM includes built-in processes that address situations enterprises will","og:image":"https://old.roi4cio.com/fileadmin/user_upload/microsoft_scsm.png"},"eventUrl":"","translationId":4797,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"<span style=\"font-weight: bold; \">IT service management (ITSM)</span> is the process of designing, delivering, managing, and improving the IT services an organization provides to its end users. ITSM is focused on aligning IT processes and services with business objectives to help an organization grow.\r\nITSM positions IT services as the key means of delivering and obtaining value, where an internal or external IT service provider works with business customers, at the same time taking responsibility for the associated costs and risks. ITSM works across the whole lifecycle of a service, from the original strategy, through design, transition and into live operation.\r\nTo ensure sustainable quality of IT services, ITSM establishes a set of practices, or processes, constituting a service management system. There are industrial, national and international standards for IT service management solutions, setting up requirements and good practices for the management system. \r\nITSM system is based on a set of principles, such as focusing on value and continual improvement. It is not just a set of processes – it is a cultural mindset to ensure that the desired outcome for the business is achieved. \r\n<span style=\"font-weight: bold; \">ITIL (IT Infrastructure Library)</span> is a framework of best practices and recommendations for managing an organization's IT operations and services. IT service management processes, when built based on the ITIL framework, pave the way for better IT service operations management and improved business. To summarize, ITIL is a set of guidelines for effective IT service management best practices. ITIL has evolved beyond the delivery of services to providing end-to-end value delivery. The focus is now on the co-creation of value through service relationships. \r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">ITSM processes typically include five stages, all based on the ITIL framework:</span></p>\r\n<span style=\"font-weight: bold; \">ITSM strategy.</span> This stage forms the foundation or the framework of an organization's ITSM process building. It involves defining the services that the organization will offer, strategically planning processes, and recognizing and developing the required assets to keep processes moving. \r\n<span style=\"font-weight: bold; \">Service design.</span> This stage's main aim is planning and designing the IT services the organization offers to meet business demands. It involves creating and designing new services as well as assessing current services and making relevant improvements.\r\n<span style=\"font-weight: bold; \">Service transition.</span> Once the designs for IT services and their processes have been finalized, it's important to build them and test them out to ensure that processes flow. IT teams need to ensure that the designs don't disrupt services in any way, especially when existing IT service processes are upgraded or redesigned. This calls for change management, evaluation, and risk management. \r\n<span style=\"font-weight: bold; \">Service operation. </span>This phase involves implementing the tried and tested new or modified designs in a live environment. While in this stage, the processes have already been tested and the issues fixed, but new processes are bound to have hiccups—especially when customers start using the services. \r\n<span style=\"font-weight: bold;\">Continual service improvement (CSI).</span> Implementing IT processes successfully shouldn't be the final stage in any organization. There's always room for improvement and new development based on issues that pop up, customer needs and demands, and user feedback.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Benefits of efficient ITSM processes</h1>\r\nIrrespective of the size of business, every organization is involved in IT service management in some way. ITSM ensures that incidents, service requests, problems, changes, and IT assets—in addition to other aspects of IT services—are managed in a streamlined way.\r\nIT teams in your organization can employ various workflows and best practices in ITSM, as outlined in ITIL. Effective IT service management can have positive effects on an IT organization's overall function.\r\nHere are the 10 key benefits of ITSM:\r\n<ul><li> Lower costs for IT operations</li><li> Higher returns on IT investments</li><li> Minimal service outages</li><li> Ability to establish well-defined, repeatable, and manageable IT processes</li><li> Efficient analysis of IT problems to reduce repeat incidents</li><li> Improved efficiency of IT help desk teams</li><li> Well-defined roles and responsibilities</li><li> Clear expectations on service levels and service availability</li><li> Risk-free implementation of IT changes</li><li> Better transparency into IT processes and services</li></ul>\r\n<h1 class=\"align-center\">How to choose an ITSM tool?</h1>\r\nWith a competent IT service management goal in mind, it's important to invest in a service desk solution that caters to your business needs. It goes without saying, with more than 150 service desk tools to choose from, selecting the right one is easier said than done. Here are a few things to keep in mind when choosing an ITSM products:\r\n<span style=\"font-weight: bold; \">Identify key processes and their dependencies. </span>Based on business goals, decide which key ITSM processes need to be implemented and chart out the integrations that need to be established to achieve those goals. \r\n<span style=\"font-weight: bold; \">Consult with ITSM experts.</span> Participate in business expos, webinars, demos, etc., and educate yourself about the various options that are available in the market. Reports from expert analysts such as Gartner and Forrester are particularly useful as they include reviews of almost every solution, ranked based on multiple criteria.\r\n<span style=\"font-weight: bold; \">Choose a deployment option.</span> Every business has a different IT infrastructure model. Selecting an on-premises or software as a service (SaaS IT service management) tool depends on whether your business prefers to host its applications and data on its own servers or use a public or private cloud.\r\n<span style=\"font-weight: bold; \">Plan ahead for the future.</span> Although it's important to consider the "needs" primarily, you shouldn't rule out the secondary or luxury capabilities. If the ITSM tool doesn't have the potential to adapt to your needs as your organization grows, it can pull you back from progressing. Draw a clear picture of where your business is headed and choose an service ITSM that is flexible and technology-driven.\r\n<span style=\"font-weight: bold;\">Don't stop with the capabilities of the ITSM tool.</span> It might be tempting to assess an ITSM tool based on its capabilities and features but it's important to evaluate the vendor of the tool. A good IT support team, and a vendor that is endorsed for their customer-vendor relationship can take your IT services far. Check Gartner's magic quadrant and other analyst reports, along with product and support reviews to ensure that the said tool provides good customer support.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_ITSM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4842,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/orchestrator_20121.jpg","logo":true,"scheme":false,"title":"Microsoft System Center Orchestrator","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-system-center-orchestrator","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"Microsoft System Center Orchestrator is a workflow automation software product that allows administrators to automate the monitoring and deployment of data center resources.<br /><br />Microsoft System Center Orchestrator was introduced as part of the Microsoft System Center 2012 suite as a rebranding of Microsoft’s previous workflow automation software, Opalis vNext. Orchestrator uses a drag and drop graphical interface to allow admins to define run books. Orchestrator translates these visual representations into .NET scripts, PowerShell or SSH commands to automate workflows. It is capable of managing multiple operating systems and can also handle VMware- and Citrix-based workflows.<br /><br />Microsoft offers add-ons for System Center Orchestrator that extend its functionality, including the Microsoft System Center 2012 Orchestrator Integration Toolkit and the Microsoft System Center 2012 Orchestrator Integration Pack.","shortDescription":"Microsoft System Center Orchestrator is a workflow automation software product that allows administrators to automate the monitoring and deployment of data center resources.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft System Center Orchestrator","keywords":"","description":"Microsoft System Center Orchestrator is a workflow automation software product that allows administrators to automate the monitoring and deployment of data center resources.<br /><br />Microsoft System Center Orchestrator was introduced as part of the Microsof","og:title":"Microsoft System Center Orchestrator","og:description":"Microsoft System Center Orchestrator is a workflow automation software product that allows administrators to automate the monitoring and deployment of data center resources.<br /><br />Microsoft System Center Orchestrator was introduced as part of the Microsof","og:image":"https://old.roi4cio.com/fileadmin/user_upload/orchestrator_20121.jpg"},"eventUrl":"","translationId":4843,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"<span style=\"font-weight: bold; \">IT service management (ITSM)</span> is the process of designing, delivering, managing, and improving the IT services an organization provides to its end users. ITSM is focused on aligning IT processes and services with business objectives to help an organization grow.\r\nITSM positions IT services as the key means of delivering and obtaining value, where an internal or external IT service provider works with business customers, at the same time taking responsibility for the associated costs and risks. ITSM works across the whole lifecycle of a service, from the original strategy, through design, transition and into live operation.\r\nTo ensure sustainable quality of IT services, ITSM establishes a set of practices, or processes, constituting a service management system. There are industrial, national and international standards for IT service management solutions, setting up requirements and good practices for the management system. \r\nITSM system is based on a set of principles, such as focusing on value and continual improvement. It is not just a set of processes – it is a cultural mindset to ensure that the desired outcome for the business is achieved. \r\n<span style=\"font-weight: bold; \">ITIL (IT Infrastructure Library)</span> is a framework of best practices and recommendations for managing an organization's IT operations and services. IT service management processes, when built based on the ITIL framework, pave the way for better IT service operations management and improved business. To summarize, ITIL is a set of guidelines for effective IT service management best practices. ITIL has evolved beyond the delivery of services to providing end-to-end value delivery. The focus is now on the co-creation of value through service relationships. \r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">ITSM processes typically include five stages, all based on the ITIL framework:</span></p>\r\n<span style=\"font-weight: bold; \">ITSM strategy.</span> This stage forms the foundation or the framework of an organization's ITSM process building. It involves defining the services that the organization will offer, strategically planning processes, and recognizing and developing the required assets to keep processes moving. \r\n<span style=\"font-weight: bold; \">Service design.</span> This stage's main aim is planning and designing the IT services the organization offers to meet business demands. It involves creating and designing new services as well as assessing current services and making relevant improvements.\r\n<span style=\"font-weight: bold; \">Service transition.</span> Once the designs for IT services and their processes have been finalized, it's important to build them and test them out to ensure that processes flow. IT teams need to ensure that the designs don't disrupt services in any way, especially when existing IT service processes are upgraded or redesigned. This calls for change management, evaluation, and risk management. \r\n<span style=\"font-weight: bold; \">Service operation. </span>This phase involves implementing the tried and tested new or modified designs in a live environment. While in this stage, the processes have already been tested and the issues fixed, but new processes are bound to have hiccups—especially when customers start using the services. \r\n<span style=\"font-weight: bold;\">Continual service improvement (CSI).</span> Implementing IT processes successfully shouldn't be the final stage in any organization. There's always room for improvement and new development based on issues that pop up, customer needs and demands, and user feedback.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Benefits of efficient ITSM processes</h1>\r\nIrrespective of the size of business, every organization is involved in IT service management in some way. ITSM ensures that incidents, service requests, problems, changes, and IT assets—in addition to other aspects of IT services—are managed in a streamlined way.\r\nIT teams in your organization can employ various workflows and best practices in ITSM, as outlined in ITIL. Effective IT service management can have positive effects on an IT organization's overall function.\r\nHere are the 10 key benefits of ITSM:\r\n<ul><li> Lower costs for IT operations</li><li> Higher returns on IT investments</li><li> Minimal service outages</li><li> Ability to establish well-defined, repeatable, and manageable IT processes</li><li> Efficient analysis of IT problems to reduce repeat incidents</li><li> Improved efficiency of IT help desk teams</li><li> Well-defined roles and responsibilities</li><li> Clear expectations on service levels and service availability</li><li> Risk-free implementation of IT changes</li><li> Better transparency into IT processes and services</li></ul>\r\n<h1 class=\"align-center\">How to choose an ITSM tool?</h1>\r\nWith a competent IT service management goal in mind, it's important to invest in a service desk solution that caters to your business needs. It goes without saying, with more than 150 service desk tools to choose from, selecting the right one is easier said than done. Here are a few things to keep in mind when choosing an ITSM products:\r\n<span style=\"font-weight: bold; \">Identify key processes and their dependencies. </span>Based on business goals, decide which key ITSM processes need to be implemented and chart out the integrations that need to be established to achieve those goals. \r\n<span style=\"font-weight: bold; \">Consult with ITSM experts.</span> Participate in business expos, webinars, demos, etc., and educate yourself about the various options that are available in the market. Reports from expert analysts such as Gartner and Forrester are particularly useful as they include reviews of almost every solution, ranked based on multiple criteria.\r\n<span style=\"font-weight: bold; \">Choose a deployment option.</span> Every business has a different IT infrastructure model. Selecting an on-premises or software as a service (SaaS IT service management) tool depends on whether your business prefers to host its applications and data on its own servers or use a public or private cloud.\r\n<span style=\"font-weight: bold; \">Plan ahead for the future.</span> Although it's important to consider the "needs" primarily, you shouldn't rule out the secondary or luxury capabilities. If the ITSM tool doesn't have the potential to adapt to your needs as your organization grows, it can pull you back from progressing. Draw a clear picture of where your business is headed and choose an service ITSM that is flexible and technology-driven.\r\n<span style=\"font-weight: bold;\">Don't stop with the capabilities of the ITSM tool.</span> It might be tempting to assess an ITSM tool based on its capabilities and features but it's important to evaluate the vendor of the tool. A good IT support team, and a vendor that is endorsed for their customer-vendor relationship can take your IT services far. Check Gartner's magic quadrant and other analyst reports, along with product and support reviews to ensure that the said tool provides good customer support.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_ITSM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":286,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Alfresco_Enterprise.jpg","logo":true,"scheme":false,"title":"Alfresco Enterprise","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"alfresco-enterprise","companyTitle":"Alfresco","companyTypes":["vendor"],"companyId":2802,"companyAlias":"alfresco","description":"Alfresco is an open source Enterprise Content Management (ECM) system that manages all the content within an enterprise and provides the services and controls that manage this content. At the core of the Alfresco system is a repository supported by a server that persists content, metadata, associations, and full text indexes. Programming interfaces support multiple languages and protocols upon which developers can create custom applications and solutions. Out-of-the-box applications provide standard solutions such as document management, records management and web content management.\r\n\r\nAs an entirely Java application, the Alfresco system runs on virtually any system that can run Java Enterprise Edition. At the core is the Spring platform, providing the ability to modularize functionality, such as versioning, security, and rules. Alfresco uses scripting to simplify adding new functionality and developing new programming interfaces. This portion of the architecture is known as web scripts and can be used for both data and presentation services. The lightweight architecture is easy to download, install, and deploy.","shortDescription":"Alfresco is an open source Enterprise Content Management (ECM) system that manages all the content within an enterprise and provides the services and controls that manage this content.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Alfresco Enterprise","keywords":"Alfresco, system, that, content, Enterprise, management, core, solutions","description":"Alfresco is an open source Enterprise Content Management (ECM) system that manages all the content within an enterprise and provides the services and controls that manage this content. At the core of the Alfresco system is a repository supported by a server th","og:title":"Alfresco Enterprise","og:description":"Alfresco is an open source Enterprise Content Management (ECM) system that manages all the content within an enterprise and provides the services and controls that manage this content. At the core of the Alfresco system is a repository supported by a server th","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Alfresco_Enterprise.jpg"},"eventUrl":"","translationId":286,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":146,"title":"ECM - Enterprise Content Management","alias":"ecm-enterprise-content-management","description":"<span style=\"font-weight: bold; \">Enterprise content management (ECM)</span> extends the concept of content management by adding a time line for each content item and possibly enforcing processes for the creation, approval and distribution of them. Systems that implement ECM generally provide a secure repository for managed items, be they analog or digital, that indexes them. They also include one or more methods for importing content to bring new items under management and several presentation methods to make items available for use. The key feature of ECM that distinguishes it from "simple" content management is that an ECM is at least cognizant of the processes and procedures of the enterprise it is created for, and as such is particular to it. \r\nECM as an umbrella term covers enterprise document management system, Web content management, search, collaboration, records management, digital asset management (DAM), workflow management, capture and scanning. ECM is primarily aimed at managing the life-cycle of information from initial publication or creation all the way through archival and eventual disposal. ECM enterprise content management software is delivered in four ways:\r\n- on-premises software (installed on an organization's own network)\r\n- software as a service (SaaS) (Web access to information that is stored on a software manufacturer's system)\r\n- a hybrid composed of both on-premises and SaaS components\r\n- Infrastructure as a Service (IaaS) (which refers to online services that abstract the user from the details of infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc.)\r\n<span style=\"font-weight: bold;\">ECM provides</span> a centralized platform where content can be held and disseminated in a manner that meets regulatory compliance requirements and risk management guidelines. An ECM achieves the latter two benefits by eliminating ad hoc processes that can expose an enterprise to regulatory compliance risks and other potential problems. Full-function enterprise content management solutions include features such as content taxonomies, auditing capabilities, check-in/check-out and other workflow controls and security mechanisms.\r\nAn <span style=\"font-weight: bold;\">effective ECM </span>can streamline access and business processes, eliminate bottlenecks by reducing storage, as well as paper and mailing needs, optimize security, maintain integrity and minimize overhead. All of these can lead to increased productivity. The first step is to document all the types of content that the organization deals with, the business processes its part of and who handles the content. \r\nECM software can be used to identify duplicate and near-duplicate content, allowing the organization to keep a few copies of a particular piece of content instead of hundreds. The best ECM software extends the reach of traditional ECM capabilities into previously isolated applications and information silos, such as ERP, CRM, SCM and HCM, to take the shape of a content services platform. Information can now flow across the enterprise to the people and processes—when, where and in whatever context it is needed.\r\nTo understand more specific ways it could help your company, consider these <span style=\"font-weight: bold; \">three types of ECM</span> software solutions.\r\n<span style=\"font-weight: bold; \">Web Content Management.</span> WCM puts control over the look and feel of a website in the hands of specific, key people. It’s used by organizations with relatively complex websites and strict brand guidelines, giving those key personnel the means to easily update, modify and publish content for the sites while adhering to the guidelines.\r\n<span style=\"font-weight: bold; \">Collaborative Content Management.</span> CCM enables multiple people to access and modify a single document, such as a legal document. It’s ideal for organizations that must manage projects involving multiple stakeholders. CCM makes it easy to work together while keeping track of, and updating, the most-current version of the document.\r\n<span style=\"font-weight: bold; \">Transactional Content Management.</span> This type of ECM document management is designed for organizations that repeatedly use varied types of content, including records, paper documents, and digital files. TCM solutions capture content from various channels, classify it, store it, create an automated workflow to ensure the right user receives the content at the right time, and even deletes documents when they’re no longer needed, all while working seamlessly with other apps and databases, ensuring all of that content is available throughout the company.<br /><br /><br />\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: bold; \">What is Enterprise Content Management (ECM)?</span></h1>\r\nEnterprise Content Management is the organization of structured and unstructured documents using technology and software that allows your organization to “work smarter, not harder.” As technology advanced and everything became digital, organizations needed a new way to store and access files, leading to the creation of ECM. \r\nECM document management system consists of four main points:\r\n<ul><li><span style=\"font-weight: bold; \">Capture:</span> Capturing information from hardcopy documents or online forms and transferring it into the system</li><li><span style=\"font-weight: bold; \">Manage:</span> Managing the captured data in a structured format that allows quick and easy retrieval</li><li><span style=\"font-weight: bold; \">Storing:</span> Securely storing files in a central repository that can be accessed from multiple locations</li><li><span style=\"font-weight: bold; \">Delivery:</span> Implementation of business process workflows to automatically move documents from one step to the next</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Five ways ECM software can benefit your organization</span></h1>\r\n<span style=\"font-weight: bold; \">Basic file sharing and library services.</span> At its core, enterprise document management software begins with basic file sharing and library services managed within a networked repository. Individuals and groups with predefined access rights and permissions can access the repository and then create, read, update and delete files stored within it.\r\nMany ECM applications support Content Management Interoperability Services, an industry standard that allows different vendors' products to interoperate; this is an essential capability within large enterprises that maintain content management tools from multiple vendors.\r\n<span style=\"font-weight: bold; \">Content governance, compliance and records management.</span> For many organizations, managing business documents or other content types is a critical use case for ECM. Companies subject to compliance or other industry regulations need document content management system software to capture, manage, archive and ultimately dispose of files after a predefined period.\r\nECM can ensure that only individuals with predefined permissions - determined by access controls - can update or view documents stored within a repository. An organization can thus manage document modification.\r\nIn addition, enterprise content management tools can log all actions, providing an organization with the capabilities to maintain an auditable record of all the changes to documents within the repository.\r\n<span style=\"font-weight: bold; \">Business process management.</span> Companies also use ECM to establish workflows that span departments and geographies to support extended enterprise and inter-enterprise business processes.\r\nMost ECM software provides tools to help both technical and non-technical business users define business processes. Most applications provide audit controls to track each step of the process and analytic capabilities to help identify inefficiencies and streamline business procedures.\r\n<span style=\"font-weight: bold; \">Content repositories linked to other enterprise applications.</span> Some companies use electronic content management software as a repository for documents created by other enterprise applications, including CRM, ERP, HR and financial systems. These enterprise systems can seamlessly access, view or modify content managed by the ECM.\r\n<span style=\"font-weight: bold; \">Enabling mobile and remote workforces.</span> Content management tools often include functionality to allow remote workers to access content from mobile devices. This is an increasingly important feature for many companies.\r\nMobile capabilities also enable new kinds of data capture and presentation functionalities. By combining content management capabilities with other data, for example, a political canvasser can use a tablet to enter new information about a political donor without having to start from scratch, as some of that information is already stored in a content management system. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/ECM_-_Enterprise_Content_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4097,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png","logo":true,"scheme":false,"title":"Microsoft Bot Framework","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-bot-framework","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"Azure Bot Service enables you to build intelligent, enterprise-grade bots with ownership and control of your data. Begin with a simple Q&A bot or build a sophisticated virtual assistant.\r\nUse comprehensive open-source SDK and tools to easily connect your bot to popular channels and devices. Give your bot the ability to speak, listen, and understand your users with native integration to Azure Cognitive Services.\r\n<span style=\"font-weight: bold;\">AI and natural language</span>\r\nCreate a bot with the ability to speak, listen, understand, and learn from your users with Azure Cognitive Services.\r\n<span style=\"font-weight: bold;\">Open & Extensible</span>\r\nBenefit from open-source SDK and tools to build, test, and connect bots that interact naturally with users, wherever they are.\r\n<span style=\"font-weight: bold;\">Enterprise-grade solutions</span>\r\nBuild secure, global, scalable solutions that integrate with your existing IT ecosystem.\r\n<span style=\"font-weight: bold;\">Ownership and control</span>\r\nCreate an AI experience that can extend your brand and keep you in control of your own data.","shortDescription":"Microsoft Bot Framework is a comprehensive framework for building enterprise-grade conversational AI experiences.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Bot Framework","keywords":"","description":"Azure Bot Service enables you to build intelligent, enterprise-grade bots with ownership and control of your data. Begin with a simple Q&A bot or build a sophisticated virtual assistant.\r\nUse comprehensive open-source SDK and tools to easily connect your b","og:title":"Microsoft Bot Framework","og:description":"Azure Bot Service enables you to build intelligent, enterprise-grade bots with ownership and control of your data. Begin with a simple Q&A bot or build a sophisticated virtual assistant.\r\nUse comprehensive open-source SDK and tools to easily connect your b","og:image":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png"},"eventUrl":"","translationId":4098,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":103,"title":"Chatbot Development"}],"testingArea":"","categories":[{"id":842,"title":"Chatbot Development","alias":"chatbot-development","description":"A chatbot is a piece of software that conducts a conversation via auditory or textual methods. Such programs are often designed to convincingly simulate how a human would behave as a conversational partner, although as of 2019, they are far short of being able to pass the Turing test. Chatbots are typically used in dialog systems for various practical purposes including customer service or information acquisition. Some chatbots use sophisticated natural language processing systems, but many simpler ones scan for keywords within the input, then pull a reply with the most matching keywords, or the most similar wording pattern, from a database.\r\nThe term "ChatterBot" was originally coined by Michael Mauldin (creator of the first Verbot, Julia) in 1994 to describe these conversational programs. Today, most chatbots are accessed via virtual assistants such as Google Assistant and Amazon Alexa, via messaging apps such as Facebook Messenger or WeChat, or via individual organizations' apps and websites. Chatbots can be classified into usage categories such as conversational commerce (e-commerce via chat), analytics, communication, customer support, design, developer tools, education, entertainment, finance, food, games, health, HR, marketing, news, personal, productivity, shopping, social, sports, travel and utilities.\r\nBeyond chatbots, Conversational AI refers to the use of messaging apps, speech-based assistants and chatbots to automate communication and create personalized customer experiences at scale.\r\nThe process of building, testing and deploying chatbots can be done on cloud-based chatbot development platforms offered by cloud Platform as a Service (PaaS) providers such as Oracle Cloud Platform SnatchBot and IBM Watson. These cloud platforms provide Natural Language Processing, Artificial Intelligence and Mobile Backend as a Service for chatbot development.\r\nSome Companies like Microsoft Azure and AARC are currently providing their Bot Engines through which chatbot Platforms or Software can be developed.","materialsDescription":"New tools designed to simplify the interaction between humans and computers have hit the market: Chatbots or Virtual Assistants. In banking, chatbots and virtual assistants are some of the industry’s newest tools designed to simplify the interaction between humans and computers.\r\n<span style=\"font-weight: bold;\">What is a chatbot?</span>\r\nA chatbot is artificial intelligence (AI) software that can simulate a conversation (or a chat) with a user in natural language through messaging applications, websites, mobile apps or through the telephone.\r\n<span style=\"font-weight: bold;\">Why are chatbots important?</span>\r\nA chatbot is often described as one of the most advanced and promising expressions of interaction between humans and machines. However, from a technological point of view, a chatbot only represents the natural evolution of a Question-Answering system leveraging Natural Language Processing (NLP). Formulating responses to questions in natural language is one of the most typical examples of Natural Language Processing applied in various enterprises’ end-use applications.\r\n<span style=\"font-weight: bold;\">How does a chatbot work?</span>\r\nThere are two different tasks at the core of a chatbot:\r\n<ol><li>user request analysis</li><li>returning the response</li></ol>\r\nUser request analysis: this is the first task that a chatbot performs. It analyzes the user’s request to identify the user intent and to extract relevant entities.\r\nThe ability to identify the user’s intent and extract data and relevant entities contained in the user’s request is the first condition and the most relevant step at the core of a chatbot: If you are not able to correctly understand the user’s request, you won’t be able to provide the correct answer.\r\nReturning the response: once the user’s intent has been identified, the chatbot must provide the most appropriate response for the user’s request. The answer may be:\r\n<ul><li>a generic and predefined text;</li><li>a text retrieved from a knowledge base that contains different answers;</li><li>a contextualized piece of information based on data the user has provided;</li><li>data stored in enterprise systems;</li><li>the result of an action that the chatbot performed by interacting with one or more backend application;</li><li>a disambiguating question that helps the chatbot to correctly understand the user’s request.</li></ul>\r\n<span style=\"font-weight: bold;\">In what is the benefit of chatbots?</span>\r\nChatbot applications streamline interactions between people and services, enhancing the customer experience. At the same time, they offer companies new opportunities to improve the customer's engagement process and operational efficiency by reducing the typical cost of customer service.\r\nTo be successful, a chatbot solution should be able to effectively perform both of these tasks. Human support plays a key role here: Regardless of the kind of approach and the platform, human intervention is crucial in configuring, training and optimizing the chatbot system.\r\n<span style=\"font-weight: bold;\">Which chatbot application is right for you?</span>\r\nThere are different approaches and tools that you can use to develop a chatbot. Depending on the use case you want to address, some chatbot technologies are more appropriate than others. In order to achieve the desired results, the combination of different AI forms such as natural language processing, machine learning, and semantic understanding may be the best option.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Chatbot_Development.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4105,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png","logo":true,"scheme":false,"title":"Luis.ai","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"luisai","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Language Understanding (LUIS) is a machine learning-based service to build natural language into apps, bots, and IoT devices. Quickly create enterprise-ready, custom models that continuously improve.</p>\r\n<p><span style=\"text-decoration: underline;\"><span style=\"font-weight: bold;\">Benefits:</span></span></p>\r\n<p><span style=\"font-weight: bold;\">Add natural language to your apps</span></p>\r\n<p>Designed to identify valuable information in conversations, LUIS interprets user goals (intents) and distills valuable information from sentences (entities), for a high quality, nuanced language model. LUIS integrates seamlessly with the Azure Bot Service, making it easy to create a sophisticated bot.</p>\r\n<p><span style=\"font-weight: bold;\">Quickly build a custom language solution</span></p>\r\n<p>Powerful developer tools are combined with customizable pre-built apps and entity dictionaries, such as Calendar, Music, and Devices, so you can build and deploy a solution more quickly. Dictionaries are mined from the collective knowledge of the web and supply billions of entries, helping your model to correctly identify valuable information from user conversations.</p>\r\n<p><span style=\"font-weight: bold;\">Always learning and improving</span></p>\r\n<p>Active learning is used to continuously improve the quality of natural language models. Once the model starts processing input, LUIS begins active learning, allowing you to constantly update and improve the model.</p>\r\n<p><span style=\"font-weight: bold;\">Enterprise-ready, available worldwide</span></p>\r\n<p>The service is ready to be deployed in commercial applications and can scale with enterprise quality and performance. The service meets international compliance standards, supports 13 languages and available worldwide, making it highly accessible around the world.</p>","shortDescription":"A machine learning-based service to build natural language into apps, bots, and IoT devices. Quickly create enterprise-ready, custom models that continuously improve.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Luis.ai","keywords":"","description":"<p>Language Understanding (LUIS) is a machine learning-based service to build natural language into apps, bots, and IoT devices. Quickly create enterprise-ready, custom models that continuously improve.</p>\r\n<p><span style=\"text-decoration: underline;\"><span s","og:title":"Luis.ai","og:description":"<p>Language Understanding (LUIS) is a machine learning-based service to build natural language into apps, bots, and IoT devices. Quickly create enterprise-ready, custom models that continuously improve.</p>\r\n<p><span style=\"text-decoration: underline;\"><span s","og:image":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png"},"eventUrl":"","translationId":4106,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":103,"title":"Chatbot Development"}],"testingArea":"","categories":[{"id":842,"title":"Chatbot Development","alias":"chatbot-development","description":"A chatbot is a piece of software that conducts a conversation via auditory or textual methods. Such programs are often designed to convincingly simulate how a human would behave as a conversational partner, although as of 2019, they are far short of being able to pass the Turing test. Chatbots are typically used in dialog systems for various practical purposes including customer service or information acquisition. Some chatbots use sophisticated natural language processing systems, but many simpler ones scan for keywords within the input, then pull a reply with the most matching keywords, or the most similar wording pattern, from a database.\r\nThe term "ChatterBot" was originally coined by Michael Mauldin (creator of the first Verbot, Julia) in 1994 to describe these conversational programs. Today, most chatbots are accessed via virtual assistants such as Google Assistant and Amazon Alexa, via messaging apps such as Facebook Messenger or WeChat, or via individual organizations' apps and websites. Chatbots can be classified into usage categories such as conversational commerce (e-commerce via chat), analytics, communication, customer support, design, developer tools, education, entertainment, finance, food, games, health, HR, marketing, news, personal, productivity, shopping, social, sports, travel and utilities.\r\nBeyond chatbots, Conversational AI refers to the use of messaging apps, speech-based assistants and chatbots to automate communication and create personalized customer experiences at scale.\r\nThe process of building, testing and deploying chatbots can be done on cloud-based chatbot development platforms offered by cloud Platform as a Service (PaaS) providers such as Oracle Cloud Platform SnatchBot and IBM Watson. These cloud platforms provide Natural Language Processing, Artificial Intelligence and Mobile Backend as a Service for chatbot development.\r\nSome Companies like Microsoft Azure and AARC are currently providing their Bot Engines through which chatbot Platforms or Software can be developed.","materialsDescription":"New tools designed to simplify the interaction between humans and computers have hit the market: Chatbots or Virtual Assistants. In banking, chatbots and virtual assistants are some of the industry’s newest tools designed to simplify the interaction between humans and computers.\r\n<span style=\"font-weight: bold;\">What is a chatbot?</span>\r\nA chatbot is artificial intelligence (AI) software that can simulate a conversation (or a chat) with a user in natural language through messaging applications, websites, mobile apps or through the telephone.\r\n<span style=\"font-weight: bold;\">Why are chatbots important?</span>\r\nA chatbot is often described as one of the most advanced and promising expressions of interaction between humans and machines. However, from a technological point of view, a chatbot only represents the natural evolution of a Question-Answering system leveraging Natural Language Processing (NLP). Formulating responses to questions in natural language is one of the most typical examples of Natural Language Processing applied in various enterprises’ end-use applications.\r\n<span style=\"font-weight: bold;\">How does a chatbot work?</span>\r\nThere are two different tasks at the core of a chatbot:\r\n<ol><li>user request analysis</li><li>returning the response</li></ol>\r\nUser request analysis: this is the first task that a chatbot performs. It analyzes the user’s request to identify the user intent and to extract relevant entities.\r\nThe ability to identify the user’s intent and extract data and relevant entities contained in the user’s request is the first condition and the most relevant step at the core of a chatbot: If you are not able to correctly understand the user’s request, you won’t be able to provide the correct answer.\r\nReturning the response: once the user’s intent has been identified, the chatbot must provide the most appropriate response for the user’s request. The answer may be:\r\n<ul><li>a generic and predefined text;</li><li>a text retrieved from a knowledge base that contains different answers;</li><li>a contextualized piece of information based on data the user has provided;</li><li>data stored in enterprise systems;</li><li>the result of an action that the chatbot performed by interacting with one or more backend application;</li><li>a disambiguating question that helps the chatbot to correctly understand the user’s request.</li></ul>\r\n<span style=\"font-weight: bold;\">In what is the benefit of chatbots?</span>\r\nChatbot applications streamline interactions between people and services, enhancing the customer experience. At the same time, they offer companies new opportunities to improve the customer's engagement process and operational efficiency by reducing the typical cost of customer service.\r\nTo be successful, a chatbot solution should be able to effectively perform both of these tasks. Human support plays a key role here: Regardless of the kind of approach and the platform, human intervention is crucial in configuring, training and optimizing the chatbot system.\r\n<span style=\"font-weight: bold;\">Which chatbot application is right for you?</span>\r\nThere are different approaches and tools that you can use to develop a chatbot. Depending on the use case you want to address, some chatbot technologies are more appropriate than others. In order to achieve the desired results, the combination of different AI forms such as natural language processing, machine learning, and semantic understanding may be the best option.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Chatbot_Development.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":778,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Surface_Laptop.jpg","logo":true,"scheme":false,"title":"Microsoft Surface Laptop","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-surface-laptop","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"Surface Laptop provides the perfect blend of texture, subtle details, and clean, elegant lines — plus the luxurious touch of our Signature Alcantara® material-covered keyboard.\r\nThe perfect balance of portability and performance.\r\nYou don’t have to choose between power and traveling light. At just 2.76 pounds, Surface Laptop gives you an ideal balance of both, plus all-day battery life.\r\nA stunning screen that responds to your touch.\r\nExperience faster, more natural navigation on the vibrant 13.5” PixelSense™ Display with immersive touchscreen. Enjoy more space for your ideas with an edge-to-edge display and ultra-thin bezel.\r\n\r\n","shortDescription":"Microsoft Surface Laptop is designed for Windows 10 S — streamlined for security and superior performance.2 Applications are delivered via the Windows Store, ensuring that they’re Microsoft verified.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Surface Laptop","keywords":"Laptop, Surface, touch, your, plus, perfect, balance, with","description":"Surface Laptop provides the perfect blend of texture, subtle details, and clean, elegant lines — plus the luxurious touch of our Signature Alcantara® material-covered keyboard.\r\nThe perfect balance of portability and performance.\r\nYou don’t have to choose betw","og:title":"Microsoft Surface Laptop","og:description":"Surface Laptop provides the perfect blend of texture, subtle details, and clean, elegant lines — plus the luxurious touch of our Signature Alcantara® material-covered keyboard.\r\nThe perfect balance of portability and performance.\r\nYou don’t have to choose betw","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Surface_Laptop.jpg"},"eventUrl":"","translationId":779,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1034,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Coco_Framework.png","logo":true,"scheme":false,"title":"Microsoft Coco Framework","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-coco-framework","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these requirements, Coco presents an alternative approach to ledger construction, giving enterprises the scalability, distributed governance and enhanced confidentiality they need without sacrificing the inherent security and immutability they expect.\r\nLeveraging the power of existing blockchain protocols, trusted execution environments (TEEs) such as Intel SGX and Windows Virtual Secure Mode (VSM), distributed systems and cryptography, Coco enables enterprise-ready blockchain networks that deliver:\r\n\r\n<ul><li>Throughput and latency approaching database speeds.</li><li>Richer, more flexible, business-specific confidentiality models.</li><li>Network policy management through distributed governance.</li><li>Support for non-deterministic transactions.</li></ul>\r\nBy providing these capabilities, Coco offers a trusted foundation with which existing blockchain protocols can be integrated to deliver complete, enterprise-ready ledger solutions, opening up broad, high scale scenarios across industries, and furthering blockchain's ability to digital transform business.\r\nWe have already begun exploring Coco’s potential across a variety of industries, including retail, supply chain and financial services.\r\nWhether a customer is designing an end-to-end trade finance solution, using blockchain to ensure security at the edge or leveraging Enterprise Smart Contracts to drive back office efficiencies, Coco enables them to meet their enterprise requirements. Microsoft is the only cloud provider that delivers consistency across on-premises and the public cloud at hyperscale while providing access to the rich Azure ecosystem for the wide range of applications that will be built on top of blockchain as a shared data layer.\r\nAn open approach\r\nBy design, Coco is open and compatible with any blockchain protocol. Microsoft has already begun integrating Ethereum into Coco and we’re thrilled to announce that J.P. Morgan Chase, Intel and R3 have committed to integrating enterprise ledgers, Quorum, Hyperledger Sawtooth and Corda, respectively. This is just the beginning, and we look forward to exploring integration opportunities with other ledgers in the near future.\r\n","shortDescription":"Microsoft Coco Framework is an open-source system that enables high-scale, confidential blockchain networks that meet all key enterprise requirements—providing a means to accelerate production enterprise adoption of blockchain technology.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Coco Framework","keywords":"Coco, blockchain, that, with, distributed, Microsoft, across, existing","description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these requirements, Coco presents an alternative approach to ledger construction, giving enterprises the scalabil","og:title":"Microsoft Coco Framework","og:description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these requirements, Coco presents an alternative approach to ledger construction, giving enterprises the scalabil","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Coco_Framework.png"},"eventUrl":"","translationId":1035,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":5,"title":"Security Software","alias":"security-software","description":" Computer security software or cybersecurity software is any computer program designed to enhance information security. Security software is a broad term that encompasses a suite of different types of software that deliver data and computer and network security in various forms. \r\nSecurity software can protect a computer from viruses, malware, unauthorized users and other security exploits originating from the Internet. Different types of security software include anti-virus software, firewall software, network security software, Internet security software, malware/spamware removal and protection software, cryptographic software, and more.\r\nIn end-user computing environments, anti-spam and anti-virus security software is the most common type of software used, whereas enterprise users add a firewall and intrusion detection system on top of it. \r\nSecurity soft may be focused on preventing attacks from reaching their target, on limiting the damage attacks can cause if they reach their target and on tracking the damage that has been caused so that it can be repaired. As the nature of malicious code evolves, security software also evolves.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Firewall. </span>Firewall security software prevents unauthorized users from accessing a computer or network without restricting those who are authorized. Firewalls can be implemented with hardware or software. Some computer operating systems include software firewalls in the operating system itself. For example, Microsoft Windows has a built-in firewall. Routers and servers can include firewalls. There are also dedicated hardware firewalls that have no other function other than protecting a network from unauthorized access.\r\n<span style=\"font-weight: bold; \">Antivirus.</span> Antivirus solutions work to prevent malicious code from attacking a computer by recognizing the attack before it begins. But it is also designed to stop an attack in progress that could not be prevented, and to repair damage done by the attack once the attack abates. Antivirus software is useful because it addresses security issues in cases where attacks have made it past a firewall. New computer viruses appear daily, so antivirus and security software must be continuously updated to remain effective.\r\n<span style=\"font-weight: bold; \">Antispyware.</span> While antivirus software is designed to prevent malicious software from attacking, the goal of antispyware software is to prevent unauthorized software from stealing information that is on a computer or being processed through the computer. Since spyware does not need to attempt to damage data files or the operating system, it does not trigger antivirus software into action. However, antispyware software can recognize the particular actions spyware is taking by monitoring the communications between a computer and external message recipients. When communications occur that the user has not authorized, antispyware can notify the user and block further communications.\r\n<span style=\"font-weight: bold; \">Home Computers.</span> Home computers and some small businesses usually implement security software at the desktop level - meaning on the PC itself. This category of computer security and protection, sometimes referred to as end-point security, remains resident, or continuously operating, on the desktop. Because the software is running, it uses system resources, and can slow the computer's performance. However, because it operates in real time, it can react rapidly to attacks and seek to shut them down when they occur.\r\n<span style=\"font-weight: bold; \">Network Security.</span> When several computers are all on the same network, it's more cost-effective to implement security at the network level. Antivirus software can be installed on a server and then loaded automatically to each desktop. However firewalls are usually installed on a server or purchased as an independent device that is inserted into the network where the Internet connection comes in. All of the computers inside the network communicate unimpeded, but any data going in or out of the network over the Internet is filtered trough the firewall.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is IT security software?</span></h1>\r\nIT security software provides protection to businesses’ computer or network. It serves as a defense against unauthorized access and intrusion in such a system. It comes in various types, with many businesses and individuals already using some of them in one form or another.\r\nWith the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations. Since more and more businesses are now relying their crucial operations on software products, the importance of security system software assurance must be taken seriously – now more than ever. Having reliable protection such as a security software programs is crucial to safeguard your computing environments and data. \r\n<p class=\"align-left\">It is not just the government or big corporations that become victims of cyber threats. In fact, small and medium-sized businesses have increasingly become targets of cybercrime over the past years. </p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">What are the features of IT security software?</span></h1>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Automatic updates. </span>This ensures you don’t miss any update and your system is the most up-to-date version to respond to the constantly emerging new cyber threats.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Real-time scanning.</span> Dynamic scanning features make it easier to detect and infiltrate malicious entities promptly. Without this feature, you’ll risk not being able to prevent damage to your system before it happens.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Auto-clean.</span> A feature that rids itself of viruses even without the user manually removing it from its quarantine zone upon detection. Unless you want the option to review the malware, there is no reason to keep the malicious software on your computer which makes this feature essential.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Multiple app protection.</span> This feature ensures all your apps and services are protected, whether they’re in email, instant messenger, and internet browsers, among others.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application level security.</span> This enables you to control access to the application on a per-user role or per-user basis to guarantee only the right individuals can enter the appropriate applications.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Role-based menu.</span> This displays menu options showing different users according to their roles for easier assigning of access and control.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Row-level (multi-tenant) security.</span> This gives you control over data access at a row-level for a single application. This means you can allow multiple users to access the same application but you can control the data they are authorized to view.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Single sign-on.</span> A session or user authentication process that allows users to access multiple related applications as long as they are authorized in a single session by only logging in their name and password in a single place.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">User privilege parameters.</span> These are customizable features and security as per individual user or role that can be accessed in their profile throughout every application.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application activity auditing.</span> Vital for IT departments to quickly view when a user logged in and off and which application they accessed. Developers can log end-user activity using their sign-on/signoff activities.</li></ul>\r\n<p class=\"align-left\"><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Security_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1546,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/data-warehouse.jpg","logo":true,"scheme":false,"title":"Azure Data Warehouse","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"azure-data-warehouse","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions of business analytics, reports, the expanded analytics and analytics in real time. To easily get started, take advantage of the performance, flexibility, and security of Azure's fully managed services, such as SQL Azure and Azure Databricks.</p>\r\n<h2>Get rid of worries</h2>\r\n<h2><br /><span style=\"font-weight: normal;\">Built-in advanced security features include transparent data encryption, auditing, threat detection, integration with Azure Active Directory and virtual network endpoints. Azure services correspond to more than 50 industry and geographic certifications and are available worldwide in 42 regions to store your data wherever your users are located. Finally, Microsoft offers financially secured service level agreements to spare you any hassle.</span></h2>","shortDescription":"Azure Data Warehouse - is a modern data storage from Microsoft","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Azure Data Warehouse","keywords":"","description":"<p>Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions of business analytics, reports, the expanded analytics and analytics in real time. To easily ","og:title":"Azure Data Warehouse","og:description":"<p>Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions of business analytics, reports, the expanded analytics and analytics in real time. To easily ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/data-warehouse.jpg"},"eventUrl":"","translationId":1549,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":24,"title":"IaaS - storage"}],"testingArea":"","categories":[{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1550,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Azure-Virtual-machines.png","logo":true,"scheme":false,"title":"Azure Virtual Machines","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"azure-virtual-machines","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide range of computing solutions. All current-generation virtual machines include load balancing and autoscaling. <span style=\"color: #505050; font-family: 'Segoe UI', SegoeUI, 'Segoe WP', Tahoma, Arial, sans-serif; font-size: 15px; background-color: #ffffff;\"><br /></span>Azure Virtual Machines - is a proposal that includes various solutions, from an inexpensive B series to virtual machines with the latest GPU optimized for machine learning. It is designed to perform any workloads within any budget.</p>","shortDescription":"Azure Virtual Machines - is a computing service from Microsoft","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Azure Virtual Machines","keywords":"","description":"<p>Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide range of computing solutions. All current-generation virtual machines include load balancing","og:title":"Azure Virtual Machines","og:description":"<p>Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide range of computing solutions. All current-generation virtual machines include load balancing","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Azure-Virtual-machines.png"},"eventUrl":"","translationId":1551,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":26,"title":"IaaS - computing"}],"testingArea":"","categories":[{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3344,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Cloud_App_Security.jpg","logo":true,"scheme":false,"title":"Microsoft Cloud App Security","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-cloud-app-security","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"Microsoft Cloud App Security is a multimode Cloud Access Security Broker (CASB). It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services.\r\nMicrosoft Cloud App Security natively integrates with leading Microsoft solutions. It is designed with security professionals in mind—providing simple deployment, centralized management, and innovative automation capabilities.\r\n<span style=\"font-weight: bold;\">FEATURES:</span>\r\n<span style=\"font-weight: bold;\">Discover and control the use of Shadow IT</span>\r\nIdentify cloud apps and services used by your organization. Assess their risk levels and business readiness of >16,000 apps against >70 risk and start managing them to ensure security and compliance.\r\n<span style=\"font-weight: bold;\">Protect your sensitive information anywhere in the cloud</span>\r\nUnderstand, classify and protect the exposure of sensitive information at rest, or leverage out-of-the box policies and automated processes to apply controls in real-time - across all your cloud apps.\r\n<span style=\"font-weight: bold;\">Protect against cyberthreats and anomalies</span>\r\nDetect unusual behavior across cloud apps to identify ransomware, compromised users or rogue applications, analyze high-risk usage and remediate automatically to limit the risk to your organization.\r\n<span style=\"font-weight: bold;\">Assess the compliance of your cloud apps</span>\r\nAssess if your cloud apps meet relevant compliance requirements including regulatory compliance and industry standards. Prevent data leaks to non-compliant apps, and limit access to regulated data.","shortDescription":"Microsoft Cloud App Security provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Cloud App Security","keywords":"","description":"Microsoft Cloud App Security is a multimode Cloud Access Security Broker (CASB). It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services.\r\nMicrosoft Cloud App Securit","og:title":"Microsoft Cloud App Security","og:description":"Microsoft Cloud App Security is a multimode Cloud Access Security Broker (CASB). It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services.\r\nMicrosoft Cloud App Securit","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Cloud_App_Security.jpg"},"eventUrl":"","translationId":3345,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":95,"title":"Cloud Access Security Broker (CASB)"}],"testingArea":"","categories":[{"id":832,"title":"CASB - Cloud Access Security Broker","alias":"casb-cloud-access-security-broker","description":"A cloud access security broker (CASB) (sometimes pronounced cas-bee) is on-premises or cloud-based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies. A CASB can offer a variety of services, including but not limited to monitoring user activity, warning administrators about potentially hazardous actions, enforcing security policy compliance, and automatically preventing malware.\r\nA CASB may deliver security, the management or both. Broadly speaking, "security" is the prevention of high-risk events, whilst "management" is the monitoring and mitigation of high-risk events.\r\nCASBs that deliver security must be in the path of data access, between the user and the cloud. Architecturally, this might be achieved with proxy agents on each end-point device, or in agentless fashion without requiring any configuration on each device. Agentless CASB allows for rapid deployment and delivers security on all devices, company-managed or unmanaged BYOD. Agentless CASB also respects user privacy, inspecting only corporate data. Agent-based CASB is difficult to deploy and effective only on devices that are managed by the corporation. Agent-based CASB typically inspects both corporate and personal data.\r\nCASBs that deliver management may use APIs to inspect data and activity in the cloud to alert of risky events after the fact. Another management capability of a CASB is to inspect firewall or proxy logs for the usage of cloud applications.","materialsDescription":"<span style=\"font-weight: bold;\">What is CASB?</span> A Cloud Access Security Broker (CASB) is a policy enforcement point that secures data & apps in the cloud and on any device, anywhere.\r\n<span style=\"font-weight: bold;\">What is the difference between security and management?</span> Security is preventing risky events from happening, management is cleaning up after high-risk events.\r\n<span style=\"font-weight: bold;\">What is Shadow IT?</span> Cloud applications used by business users without IT oversight, also known as unmanaged apps.\r\n<span style=\"font-weight: bold;\">What are managed apps?</span> Cloud Applications that are managed by IT, e.g.Office 365.\r\n<span style=\"font-weight: bold;\">What are the types of CASB?</span> Three types of Cloud Access Security Broker\r\n<ul><li>a) API-only CASB offer basic management</li><li>b) multi-mode first-gen CASB offer management & security</li><li>c) Next-Gen CASB deliver management, security & Zero-Day protection.</li></ul>\r\n<span style=\"font-weight: bold;\">What is a forward proxy?</span> A proxy where traffic must be forwarded by the end-point Such proxies requires agents and configuration on client devices.\r\n<span style=\"font-weight: bold;\">What is a reverse proxy?</span> A proxy where traffic is automatically routed, requiring no agent or configuration on the end-point.\r\n<span style=\"font-weight: bold;\">What is AJAX-VM?</span> Acronym for "Adaptive Javascript and XML- Virtual Machine." AJAX-VM virtualizes cloud apps on the fly so they can be proxied without agents. Reverse-proxy CASB are brittle without AJAX-VM and break frequently with app changes.\r\n<span style=\"font-weight: bold;\">What are the types of CASB architecture?</span> There are three types of CASB architecture: API-only, forward proxy, and reverse proxy. Some CASB are API-only, others API and forward proxy. Next-Gen CASBs offer all three with AJAX-VM.\r\n<span style=\"font-weight: bold;\">What is CASB encryption?</span> Encryption/decryption of data prior to upload/download to a cloud application.\r\n <span style=\"font-weight: bold;\">What is searchable encryption?</span> An encryption system that combines full encryption with a clear-text index to enable search and sort without compromising encryption strength.\r\n<span style=\"font-weight: bold;\">What is tokenization?</span> Obfuscation by encoding each input string as a unique output string.\r\n<span style=\"font-weight: bold;\">What is agentless MDM?</span> Mobile security for BYOD that does not require agents. Easy to deploy and has no access to personal data or apps, thereby preserving user privacy.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CASB.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3090,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Project.jpg","logo":true,"scheme":false,"title":"Microsoft Project","vendorVerified":0,"rating":"2.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-project","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Microsoft Project is a project management system and a way to optimize portfolio management, which allows you to plan and control project activities of organizations.</p>\r\n<p>Compared with other similar programs, the MS Project is considered the most common and “easy” to refer to the initial level of project management software with a classic standard office interface. In the single-user and small solutions market, the software product takes about 80% (about 20 million people use it).</p>\r\n<p>It is believed that as an integrated set of methods, processes and tools for planning and monitoring projects, MS Project is more often used in the implementation of relatively small project ideas. However, the existence of several paid options - basic, professional and advanced - when choosing the most complete functionality allows you to significantly expand the capabilities of the program compared to the basic version.</p>\r\n<p>Another focus of the \"detuning\" is the specialization of the product. Among such software, Primavera is popular, which is widespread in the field of engineering and construction projects as a means of calendar-network planning, which allows to take into account financial, material and labor resources in medium and large projects. Basecamp software cloud tool is considered the main competitor in the segment of ultra-light management decisions. At the same time, Microsoft has also been offering a cloud version of its product since 2013.</p>\r\n<p>In addition to the cloud application, several products are available under the Project brand:</p>\r\n<ol>\r\n<li>Project Standard allows for individual planning for small projects.</li>\r\n<li>Corporate management is carried out with the help of a special platform, including:</li>\r\n</ol>\r\n<ul>\r\n<li>Project Server,</li>\r\n<li>the corporate version of Project Professional, where collaborative tools (Project Server and SharePoint Foundation / Server) are added to the capabilities of the Standard version,</li>\r\n<li>the technology of the web interface of the reporting of executives on the progress of tasks, for viewing project portfolios and other collaboration (Project Web Access).</li>\r\n</ul>\r\n<p>Source: <a href=\"https://finswin.com/projects/instrumenty/microsoft-project.html\" target=\"_blank\" rel=\"noopener\">finswin.com/projects/instrumenty/microsoft-project.html</a></p>","shortDescription":"Microsoft Project is a project management system and a way to optimize portfolio management, which allows you to plan and control project activities of organizations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Project","keywords":"","description":"<p>Microsoft Project is a project management system and a way to optimize portfolio management, which allows you to plan and control project activities of organizations.</p>\r\n<p>Compared with other similar programs, the MS Project is considered the most common","og:title":"Microsoft Project","og:description":"<p>Microsoft Project is a project management system and a way to optimize portfolio management, which allows you to plan and control project activities of organizations.</p>\r\n<p>Compared with other similar programs, the MS Project is considered the most common","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Project.jpg"},"eventUrl":"","translationId":3091,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":81,"title":"Project and Portfolio Management"}],"testingArea":"","categories":[{"id":363,"title":"Project and Portfolio Management","alias":"project-and-portfolio-management","description":"<span style=\"font-weight: bold;\">Project Portfolio Management (PPM)</span> is the centralized management of the processes, methods, and technologies used by project managers and project management offices (PMOs) to analyze and collectively manage current or proposed projects based on numerous key characteristics. The objectives of PPM are to determine the optimal resource mix for delivery and to schedule activities to best achieve an organization’s operational and financial goals, while honouring constraints imposed by customers, strategic objectives, or external real-world factors. The International standard defines the framework of the Project Portfolio Management.\r\nPPM provides program and project managers in large, program/project-driven organizations with the capabilities needed to manage the time, resources, skills, and budgets necessary to accomplish all interrelated tasks. It provides a framework for issue resolution and risk mitigation, as well as the centralized visibility to help planning and scheduling teams to identify the fastest, cheapest, or most suitable approach to deliver projects and programs. Portfolio Managers define Key Performance Indicators and the strategy for their portfolio.\r\n<span style=\"font-style: italic;\">Pipeline Management.</span> Pipeline management involves steps to ensure that an adequate number of project proposals are not generated and not evaluated to determine whether (and how) a set of projects in the portfolio can be executed with finite development resources in a specified time. There are three major sub-components to pipeline management: ideation, work intake processes, and Phase-Gate reviews. Fundamental to pipeline management is the ability to align the decision-making process for estimating and selecting new capital investment projects with the strategic plan.\r\n<span style=\"font-style: italic;\">Resource Manager.</span> The focus on the efficient and effective deployment of an organization’s resources where and when they are needed. These can include financial resources, inventory, human resources, technical skills, production, and design. In addition to project-level resource allocation, users can also model ‘what-if’ resource scenarios, and extend this view across the portfolio.\r\n<span style=\"font-style: italic;\">Change Control.</span> The capture and prioritization of change requests that can include new requirements, features, functions, operational constraints, regulatory demands, and technical enhancements. PPM provides a central repository for these change requests and the ability to match available resources to evolving demand within the financial and operational constraints of individual projects.\r\n<span style=\"font-style: italic;\">Financial Management.</span> With PPM, the Office of Finance can improve their accuracy for estimating and managing the financial resources of a project or group of projects. In addition, the value of projects can be demonstrated in relation to the strategic objectives and priorities of the organization through financial controls and to assess progress through earned value and other project financial techniques.\r\n<span style=\"font-style: italic;\">Risk Management.</span> An analysis of the risk sensitivities residing within each project, as the basis for determining confidence levels across the portfolio. The integration of cost and schedule risk management with techniques for determining contingency and risk response plans, enable organizations to gain an objective view of project uncertainties.","materialsDescription":" <span style=\"font-weight: bold;\">What’s the difference between Project Management and Project Portfolio Management?</span>\r\nProject management is focused on an individual project, making sure it achieves its objectives and adheres to cost schedule baselines and performance standards. Project portfolio management, on the other hand, takes into consideration all the projects within a portfolio. The primary objective here is to select and maintain the appropriate mix of projects and to assess the costs, risks, and returns of running these projects in relation to how they match with organizational goals. Simply put, project management is about doing the project right, project portfolio management is about doing the right projects.\r\n<span style=\"font-weight: bold;\">What Problems Can Project Portfolio Management Address?</span>\r\nProject Portfolio Management helps companies avoid project overload and work on projects that are not aligned with the ultimate vision. In other words, project portfolio management helps companies to work towards their goals without getting sidetracked by too many shiny pennies (ie. projects that appear to be enticing but actually drain their resources for little return).\r\n<span style=\"font-weight: bold;\">How does Project Portfolio Management help with new product development?</span>\r\nProject Portfolio Management supports companies in assessing, evaluating and ranking new product ideas before they become projects, so that time, money and human resources can be spent working on projects that support strategic objectives. This becomes increasingly important and relevant for companies that receive dozens if not hundreds of project proposals.\r\n<span style=\"font-weight: bold;\">What are the key elements of successful portfolio management?</span>\r\nGoals, objectives, governance, approval processes and monitoring portfolio performance.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Project_and_Portfolio_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1044,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png","logo":true,"scheme":false,"title":"Microsoft System Center Virtual Machine Manager Analytics solution","vendorVerified":0,"rating":"2.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-system-center-virtual-machine-manager-analytics-solution","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"The Virtual Machine Manager Analytics solution comes with some built-in reports with preconfigured data visualizations so you can easily get started with frequently used queries, such as:\r\n\r\n<ul><li>Distribution of failed jobs across VMM instances to easily scope down the broken instances.</li><li>Distribution of failures over time to find sudden spikes, and to help with correlating the cause and failures.</li><li>Distribution of failed jobs and errors to help with identifying the most error-prone jobs and the cause.</li><li>Distribution of the job runtime across different runs to identify the sluggish and error-prone jobs.</li></ul>\r\nThese are just a few examples of the possibilities with Virtual Machine Manager Analytics. Because the solution is open-source, we are looking forward to contributions from the community for other data visualizations.\r\nFurther, the data from System Center Virtual Machine Manager can be combined with several features in OMS for compelling use cases, including:\r\n<ul><li>Bring together the jobs data from multiple VMM instances to a single OMS workspace. With a view, now you can keep an eye on job details for all your VMM instances together.</li><li>Configure your OMS alerts with VMM jobs information to raise notifications for completion or failure of VMM jobs, and inform the appropriate teams.</li><li>Correlate VMM job data with other events in OMS log analytics for faster troubleshooting of failures. You can easily identify the possible causes of sudden failures on a VMM machine by correlating the VMM job logs with information from solutions like Change Tracking and Hyper-V management solutions.</li><li>Use Azure Automation runbooks with VMM job data to help enable automatic remediation for known or frequent issues.</li></ul>","shortDescription":"Virtual Machine Manager Analytics is an open-source solution that can be included in your OMS workspace. This solution brings in the job data of your on-premises VMM instances to the log analytics in OMS. VMM admins can then use this versatile platform to construct queries for searching the relevant data and creating data visualizations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft System Center Virtual Machine Manager Analytics solution","keywords":"with, jobs, data, failures, Distribution, instances, Manager, from","description":"The Virtual Machine Manager Analytics solution comes with some built-in reports with preconfigured data visualizations so you can easily get started with frequently used queries, such as:\r\n\r\n<ul><li>Distribution of failed jobs across VMM instances to easily sc","og:title":"Microsoft System Center Virtual Machine Manager Analytics solution","og:description":"The Virtual Machine Manager Analytics solution comes with some built-in reports with preconfigured data visualizations so you can easily get started with frequently used queries, such as:\r\n\r\n<ul><li>Distribution of failed jobs across VMM instances to easily sc","og:image":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png"},"eventUrl":"","translationId":1045,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1575,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Dynamics_365.png","logo":true,"scheme":false,"title":"Microsoft Dynamics 365","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-dynamics-365","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Sales</span></p>\r\n<p>Empower sellers with insights to personalize relationships, predict customer needs, and increase sales.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Retail</span></p>\r\n<p>Create personalized shopping experiences that unify digital, in-store, and back office operations.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Customer Service</span></p>\r\n<p>Exceed customer expectations across self and assisted support with empowered agents that deliver personalized experiences.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Field Service</span></p>\r\n<p>Serve customers better through proactive maintenance, predictive scheduling, and first-time fix.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Project Service Automation</span></p>\r\n<p>Deliver customer projects on-time, within budget, and become a trusted advisor.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Finance and Operations</span></p>\r\n<p>Modernize your business operations across finance, manufacturing, and supply chain to drive new growth.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Talent</span></p>\r\n<p>Attract the right people and seamlessly onboard, engage, and grow your talent.</p>\r\n<p><span style=\"font-weight: bold;\">Adobe Marketing Cloud</span></p>\r\n<p>Deliver personalized experiences throughout your marketing and sales engagements at scale with Dynamics 365 and Adobe.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Marketing</span></p>\r\n<p>Increase demand by automating tasks from multi-channel campaigns to events with an application built on the same platform as Dynamics 365 for Sales.</p>\r\n","shortDescription":"Microsoft Dynamics 365 is unified CRM and ERP capabilities — modern, intelligent cloud applications that help move your business forward.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Dynamics 365","keywords":"","description":"\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Sales</span></p>\r\n<p>Empower sellers with insights to personalize relationships, predict customer needs, and increase sales.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Retail</span></p>\r\n<p>","og:title":"Microsoft Dynamics 365","og:description":"\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Sales</span></p>\r\n<p>Empower sellers with insights to personalize relationships, predict customer needs, and increase sales.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Retail</span></p>\r\n<p>","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Dynamics_365.png"},"eventUrl":"","translationId":1576,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":3,"title":"CRM"}],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"<span style=\"font-weight: bold;\">Customer service</span> is the provision of service to customers before, during and after a purchase. The perception of success of such interactions is dependent on employees "who can adjust themselves to the personality of the guest". Customer service concerns the priority an organization assigns to customer service relative to components such as product innovation and pricing. In this sense, an organization that values good customer service may spend more money in training employees than the average organization or may proactively interview customers for feedback.\r\nA <span style=\"font-weight: bold;\">customer support</span> is a range of customer services to assist customers in making cost effective and correct use of a product. It includes assistance in planning, installation, training, trouble shooting, maintenance, upgrading, and disposal of a product. These services even may be done at customer's side where he/she uses the product or service. In this case it is called "at home customer services" or "at home customer support."\r\nRegarding technology, products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods, it is termed technical support. \r\nCustomer service may be provided by a person (e.g., sales and service representative), or by automated means, such as kiosks, Internet sites, and apps.\r\n<span style=\"font-weight: bold;\">CRM </span>(Customer Relationship Management) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.\r\nOne important aspect of the CRM approach is the systems of CRM that compile data from a range of different communication channels, including a company's website, telephone, email, live chat, marketing materials and more recently, social media. Through the CRM approach and the systems used to facilitate it, businesses learn more about their target audiences and how to best cater to their needs.\r\nCRM helps users focus on their organization’s relationships with individual people including customers, service users, colleagues, or suppliers.\r\nWhen people talk about customer relationship management system, they might mean any of three things: \r\n<ul><li><span style=\"font-weight: bold;\">CRM as Technology</span>: This is a technology product, often in the cloud, that teams use to record, report and analyse interactions between the company and users. This is also called a CRM system or solution.</li><li><span style=\"font-weight: bold;\">CRM as a Strategy</span>: This is a business’ philosophy about how relationships with customers and potential customers should be managed. </li><li><span style=\"font-weight: bold;\">CRM as a Process</span>: Think of this as a system a business adopts to nurture and manage those relationships.</li></ul>\r\n<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why is CRM important?</span></h1>\r\nCRM management system enables a business to deepen its relationships with customers, service users, colleagues, partners and suppliers.\r\nForging good relationships and keeping track of prospects and customers is crucial for customer acquisition and retention, which is at the heart of a CRM’s function. You can see everything in one place — a simple, customizable dashboard that can tell you a customer’s previous history with you, the status of their orders, any outstanding customer service issues, and more.\r\nGartner predicts that by 2021, CRM technology will be the single largest revenue area of spending in enterprise software. If your business is going to last, you know that you need a strategy for the future. For forward-thinking businesses, CRM is the framework for that strategy.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the benefits of CRM?</span></h1>\r\nBy collecting and organising data about customer interactions, making it accessible and actionable for all, and facilitating analysis of that data, CRM offers many benefits and advantages.<br />The benefits and advantages of CRM include:\r\n<ul><li>Enhanced contact management</li><li>Cross-team collaboration</li><li>Heightened productivity</li><li>Empowered sales management</li><li>Accurate sales forecasting</li><li>Reliable reporting</li><li>Improved sales metrics</li><li>Increased customer satisfaction and retention</li><li>Boosted marketing ROI</li><li>Enriched products and services</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the key features of most popular CRM software programs?</span></h1>\r\nWhile many CRM solutions differ in their specific value propositions — depending on your business size, priority function, or industry type — they usually share some core features. These, in fact, are the foundation of any top CRM software, without which you might end up using an inferior app or an over-rated address book. So, let’s discuss the key features you need to look for when figuring out the best CRM software for your business.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Contact management</span>. The best CRM solutions aren’t just an address book that only organizes contact details. It manages customer data in a centralized place and gives you a 360-degree view of your customers. You should be able to organize customers’ personal information, demographics, interactions, and transactions in ways that are meaningful to your goals or processes. Moreover, a good contact management feature lets you personalize your outreach campaign. By collecting personal, social, and purchase data, it will help you to segment target audience groups in different ways.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reporting and dashboards</span>. These features of customer relationship management allow you to use analytics to interpret customer data. Reporting is very useful if you want to consolidate disparate data and churn out insights in different visualizations. This lets you make better decisions or proactively deal with market trends and customer behavioral patterns. The more visual widgets a CRM software has, the better you can present reports. Furthermore, a best customer relationship management software will generate real-time data, making reporting more accurate and timely. Reporting also keeps you tab on sales opportunities like upsell, resell, and cross-sell, especially when integrated with e-commerce platforms.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Lead management</span>. These features let you manage leads all the way to win-loss stage. They pave a clear path to conversion, so you can quickly assess how the business is performing. One of the main three legs that comprises the best client relationship management software (the other two being contact management and reporting), lead management unburdens the sales team from follow-ups, tracking, and repetitive tasks.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Deals and tasks</span>. Deals and tasks are closely associated with leads. Deals are leads at the negotiation stage, so it’s critical to keep a close eye on their associated tasks for a higher chance of conversion.<br />CRM software tools should also let you track both deals and tasks in their respective windows or across the sales stages. Whether you’re viewing a contact or analyzing the sales pipeline, you should be able to immediately check the deal’s tasks and details. Deals and tasks should also have user permissions to protect leaks of sensitive data. Similarly, alerts are critical to tasks so deadlines are met. Notifications are usually sent via email or prominently displayed on the user’s dashboard.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Campaign management</span>. Solid CRM software will integrate this feature to enable marketing processes from outreach concept to A/B testing to deployment and to post analysis. This will allow you to sort campaigns to target segments in your contacts and define deployment strategies. You will also be able to define metrics for various channels, then plow back the insights generated by post-campaign analytics into planning more campaigns.<br />Recurring outreach efforts can also be automated. For instance, you can set to instantly appropriate content to contacts based on their interest or send tiered autoresponders based on campaign feedback.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Email management</span>. By integrating with popular email clients like Gmail and Outlook, CRM solutions can capture email messages and sort important details that can be saved in contacts or synced with leads. They can also track activities like opened emails, forwarded emails, clicked links, and downloaded files. Emails can also be qualified for prospecting.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Social media management. </span>Popular CRM systems feature an integrated social media management where you can view different social media pages from the CRM’s interface. This is a convenient way to post, reply on, and manage all your pages. Likewise, this feature gives you a better perspective on how customers are interacting with your brand. A glean of their likes and dislikes, interests, shares, and public conversations helps you to assess customer biases and preferences. Customers are also increasingly using social media to contact companies; hence, a good CRM should alert you for brand mentions.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Mobile access</span>. With more users accessing apps via mobile devices, many vendors have been prioritizing mobile-first platforms. Emergence Capital Partners study found over 300 mobile-first apps so far and CRM is definitely one their targets. Many CRM solutions have both Android and iOS apps. Mobile access works in two ways to be highly appreciated: accessing data and inputting data while on location. Field sales with the latest sales information on hand may be able to interest prospects better. Conversely, sales reps can quickly update deals across the pipeline even as they come off a client meeting.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CRM_-_Customer_Relationship_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":826,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Skype_novoe_pokolenie.png","logo":true,"scheme":false,"title":"The next generation of Skype","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":272,"alias":"the-next-generation-of-skype","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"The next generation of Skype will be available on devices with Android and iOS in June 2017. Versions for Windows and Mac will be released by the end of 2017.\r\nNew Skype made a group of chat more personalized with color settings, add-ons and bots. With the \"Search\" panel in the spotlight. New Skype feature: Highlights. The main features allow you to create a highlight of your day with photos and videos so you can share everyday moments. ","shortDescription":"Skype is software for making individual and group voice and free video calls, sending messages and files to other Skype users.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"The next generation of Skype","keywords":"Skype, with, 2017, generation, next, will, features, allow","description":"The next generation of Skype will be available on devices with Android and iOS in June 2017. Versions for Windows and Mac will be released by the end of 2017.\r\nNew Skype made a group of chat more personalized with color settings, add-ons and bots. With the \"Se","og:title":"The next generation of Skype","og:description":"The next generation of Skype will be available on devices with Android and iOS in June 2017. Versions for Windows and Mac will be released by the end of 2017.\r\nNew Skype made a group of chat more personalized with color settings, add-ons and bots. With the \"Se","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Skype_novoe_pokolenie.png"},"eventUrl":"","translationId":827,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":56,"title":"Web Conferencing Applications"}],"testingArea":"","categories":[{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5957,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Remote_Desktop.png","logo":true,"scheme":false,"title":"Microsoft Remote Desktop","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-remote-desktop","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p><span style=\"font-weight: bold;\">Remote Desktop Protocol (RDP)</span> is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software.</p>\r\n<p><span style=\"font-weight: bold;\">Features:</span></p>\r\n<ul>\r\n<li>Access remote PCs running Windows Professional or Enterprise and Windows Server</li>\r\n<li>Access remote resources published by your IT admin</li>\r\n<li>Connect remotely through a Remote Desktop Gateway</li>\r\n<li>Rich multi-touch experience supporting Windows gestures</li>\r\n<li>Secure connection to your data and applications</li>\r\n<li>Simple management of your connections from the connection centre</li>\r\n<li>High-quality video and audio streaming</li>\r\n<li>Connect from your phone or use Continuum for Phone</li>\r\n</ul>","shortDescription":"Use the Microsoft Remote Desktop app to connect to a remote PC or virtual apps and desktops made available by your admin. The app helps you be productive no matter where you are.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Remote Desktop","keywords":"","description":"<p><span style=\"font-weight: bold;\">Remote Desktop Protocol (RDP)</span> is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client sof","og:title":"Microsoft Remote Desktop","og:description":"<p><span style=\"font-weight: bold;\">Remote Desktop Protocol (RDP)</span> is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client sof","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Remote_Desktop.png"},"eventUrl":"","translationId":5958,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":136,"title":"Remote Desktop Software"}],"testingArea":"","categories":[{"id":878,"title":"Remote Desktop Software","alias":"remote-desktop-software","description":"The term remote desktop refers to a software or operating system feature that allows a personal computer's desktop environment to be run remotely on one system (usually a PC, but the concept applies equally to a server), while being displayed on a separate client device. Remote desktop applications have varying features. Some allow attaching to an existing user's session (i.e., a running desktop) and "remote controlling", either displaying the remote control session or blanking the screen. Taking over a desktop remotely is a form of remote administration.\r\nRemote access can also be explained as remote control of a computer by using another device connected via the Internet or another network. This is widely used by many computer manufacturers and large businesses' help desks for technical troubleshooting of their customers' problems.\r\nRemote desktop software captures the mouse and keyboard inputs from the local computer (client) and sends them to the remote computer (server). The remote computer in turn sends the display commands to the local computer. When applications with many graphics including video or 3D models need to be controlled remotely, a remote workstation software that sends the pixels rather than the display commands must be used to provide a smooth, like-local experience. HP Remote Graphics Software is one such remote workstation solution.\r\nRemote desktop sharing is accomplished through a common client/server model. The client, or VNC viewer, is installed on a local computer and then connects via a network to a server component, which is installed on the remote computer. In a typical VNC session, all keystrokes and mouse clicks are registered as if the client were actually performing tasks on the end-user machine.\r\nThe target computer in a remote desktop scenario is still able to access all of its core functions. Many of these core functions, including the main clipboard, can be shared between the target computer and remote desktop client.\r\nA main use of remote desktop software is remote administration and remote implementation. This need arises when software buyers are far away from their software vendor. Most remote access software can be used for "headless computers": instead of each computer having its own monitor, keyboard and mouse or using a KVM switch, one computer can have a monitor, keyboard, mouse, and remote control software, and control many headless computers. The duplicate desktop mode is useful for user support and education. Remote control software combined with telephone communication can be nearly as helpful for novice computer-users as if the support staff were actually there.\r\nSince the advent of cloud computing, remote desktop software can be housed on USB hardware devices, allowing users to connect the device to any PC connected to their network or the Internet and recreate their desktop via a connection to the cloud. This model avoids one problem with remote desktop software, which requires the local computer to be switched on at the time when the user wishes to access it remotely. (It is possible with a router with C2S VPN support, and Wake on LAN equipment, to establish a virtual private network (VPN) connection with the router over the Internet, if not connected to the LAN, switch on a computer connected to the router, then connect to it.)\r\nRemote desktop products are available in three models: hosted service, software, and appliance.","materialsDescription":"<span style=\"font-weight: bold;\">What is Remote Desktop Software?</span>\r\nRemote Desktop Software is a tool that uses Virtual Network Computing (VNC) to allow one computer to remotely access and control another computer over an internet/network connection.\r\n<span style=\"font-weight: bold;\">How does Remote Desktop Software Work?</span>\r\nRemote Desktop Software uses a client-server model to connect to and control a computer remotely:\r\n<ul><li><span style=\"font-weight: bold;\">Server:</span> The server is a remote device that is being controlled.</li><li><span style=\"font-weight: bold;\">Client:</span> The client is the local device used to control the server.</li></ul>\r\nThe server's UI is displayed on the client monitor which enables the client to control the server via keyboard and mouse inputs. These inputs are executed in the server's environment, and the UI is updated in the client's display accordingly.\r\n<span style=\"font-weight: bold;\">Why is Remote Desktop Software used?</span>\r\nRemote desktop software is a tool that allows you to use the remote desktop feature seamlessly. It is used mainly for the following purposes:\r\n<ul><li><span style=\"font-weight: bold;\">Troubleshooting:</span> IT Admins are on call 24/7 and a remote access tool helps them save time and effort by allowing them to fix issues remotely within a few minutes.</li><li><span style=\"font-weight: bold;\">Help Desk:</span> Help Desk technicians' primary responsibility is to resolve any issues that customers might face while using their product, and this more often than not involves taking remote control of their customers' devices. Work from home: People that work from home often need to remotely connect to and use their corporate devices for various purposes.</li><li><span style=\"font-weight: bold;\">Personal use:</span> You can remotely access a computer at your home when you're on the move, to access files or personal documents you may require urgently.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/remote.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2144,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Advanced_Threat_Analytics.png","logo":true,"scheme":false,"title":"Microsoft Advanced Threat Analytics","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-advanced-threat-analytics","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Advanced Threat Analytics (ATA) is an on-premises platform that helps protect your enterprise from multiple types of advanced targeted cyber attacks and insider threats by using information from multiple data-sources in your network to learn the behavior of users and other entities in the organization and build a behavioral profile about them and by leveraging ATA's proprietary network parsing engine to capture and parse network traffic of multiple protocols.</p>\r\n<p><span style=\"font-weight: bold;\">Get peace of mind all day with advanced threat protection</span></p>\r\n<p><span style=\"font-weight: bold;\">Detect threats fast with behavioral analytics</span></p>\r\n<p>No need to create rules, fine-tune, or monitor a flood of security reports with self-learning and advanced, ready-to-analyze intelligence.</p>\r\n<p><span style=\"font-weight: bold;\">Adapt as fast as your attackers</span></p>\r\n<p>Rely on continually updated learning that adapts to the changing nature of your users and business.</p>\r\n<p><span style=\"font-weight: bold;\">Focus on only important events</span></p>\r\n<p>Review the attack timeline for a clear and convenient view of suspicious activity or persistent threats.</p>\r\n<p><span style=\"font-weight: bold;\">Reduce false positive fatigue</span></p>\r\n<p>Receive alerts only after suspicious activities are contextually aggregated and verified.</p>\r\n<p><span style=\"font-weight: bold;\">Prioritize and plan for next steps</span></p>\r\n<p>Get recommendations for investigation and remediation of each suspicious activity.</p>","shortDescription":"ATA is an on-premises platform to help you protect your enterprise from advanced targeted attacks by automatically\r\nanalyzing, learning, and identifying normal and abnormal entity behavior.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Advanced Threat Analytics","keywords":"","description":"<p>Advanced Threat Analytics (ATA) is an on-premises platform that helps protect your enterprise from multiple types of advanced targeted cyber attacks and insider threats by using information from multiple data-sources in your network to learn the behavior of","og:title":"Microsoft Advanced Threat Analytics","og:description":"<p>Advanced Threat Analytics (ATA) is an on-premises platform that helps protect your enterprise from multiple types of advanced targeted cyber attacks and insider threats by using information from multiple data-sources in your network to learn the behavior of","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Advanced_Threat_Analytics.png"},"eventUrl":"","translationId":2145,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":30,"title":"UEBA - User and Entity Behavior Analytics"}],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"Developments in UBA technology led Gartner to evolve the category to user and entity behavior analytics (UEBA). In September 2015, Gartner published the Market Guide for User and Entity Analytics by Vice President and Distinguished Analyst, Avivah Litan, that provided a thorough definition and explanation. UEBA was referred to in earlier Gartner reports but not in much depth. Expanding the definition from UBA includes devices, applications, servers, data, or anything with an IP address. It moves beyond the fraud-oriented UBA focus to a broader one encompassing "malicious and abusive behavior that otherwise went unnoticed by existing security monitoring systems, such as SIEM and DLP." The addition of "entity" reflects that devices may play a role in a network attack and may also be valuable in uncovering attack activity. "When end users have been compromised, malware can lay dormant and go undetected for months. Rather than trying to find where the outsider entered, UEBAs allow for quicker detection by using algorithms to detect insider threats."\r\nParticularly in the computer security market, there are many vendors for UEBA applications. They can be "differentiated by whether they are designed to monitor on-premises or cloud-based software as a service (SaaS) applications; the methods in which they obtain the source data; the type of analytics they use (i.e., packaged analytics, user-driven or vendor-written), and the service delivery method (i.e., on-premises or a cloud-based)." According to the 2015 market guide released by Gartner, "the UEBA market grew substantially in 2015; UEBA vendors grew their customer base, market consolidation began, and Gartner client interest in UEBA and security analytics increased." The report further projected, "Over the next three years, leading UEBA platforms will become preferred systems for security operations and investigations at some of the organizations they serve. It will be—and in some cases already is—much easier to discover some security events and analyze individual offenders in UEBA than it is in many legacy security monitoring systems."","materialsDescription":"<span style=\"font-weight: bold;\">What is UEBA?</span>\r\nHackers can break into firewalls, send you e-mails with malicious and infected attachments, or even bribe an employee to gain access into your firewalls. Old tools and systems are quickly becoming obsolete, and there are several ways to get past them.\r\nUser and entity behavior analytics (UEBA) give you more comprehensive way of making sure that your organization has top-notch IT security, while also helping you detect users and entities that might compromise your entire system.\r\nUEBA is a type of cybersecurity process that takes note of the normal conduct of users. In turn, they detect any anomalous behavior or instances when there are deviations from these “normal” patterns. For example, if a particular user regularly downloads 10 MB of files every day but suddenly downloads gigabytes of files, the system would be able to detect this anomaly and alert them immediately.\r\nUEBA uses machine learning, algorithms, and statistical analyses to know when there is a deviation from established patterns, showing which of these anomalies could result in, potentially, a real threat. UEBA can also aggregate the data you have in your reports and logs, as well as analyze the file, flow, and packet information.\r\nIn UEBA, you do not track security events or monitor devices; instead, you track all the users and entities in your system. As such, UEBA focuses on insider threats, such as employees who have gone rogue, employees who have already been compromised, and people who already have access to your system and then carry out targeted attacks and fraud attempts, as well as servers, applications, and devices that are working within your system.\r\n<span style=\"font-weight: bold;\">What are the benefits of UEBA?</span>\r\nIt is the unfortunate truth that today's cybersecurity tools are fast becoming obsolete, and more skilled hackers and cyber attackers are now able to bypass the perimeter defenses that are used by most companies. In the old days, you were secure if you had web gateways, firewalls, and intrusion prevention tools in place. This is no longer the case in today’s complex threat landscape, and it’s especially true for bigger corporations that are proven to have very porous IT perimeters that are also very difficult to manage and oversee.\r\nThe bottom line? Preventive measures are no longer enough. Your firewalls are not going to be 100% foolproof, and hackers and attackers will get into your system at one point or another. This is why detection is equally important: when hackers do successfully get into your system, you should be able to detect their presence quickly in order to minimize the damage.\r\n<span style=\"font-weight: bold;\">How Does UEBA Work?</span>\r\nThe premise of UEBA is actually very simple. You can easily steal an employee’s user name and password, but it is much harder to mimic the person’s normal behavior once inside the network.\r\nFor example, let’s say you steal Jane Doe’s password and user name. You would still not be able to act precisely like Jane Doe once in the system unless given extensive research and preparation. Therefore, when Jane Doe’s user name is logged in to the system, and her behavior is different than that of typical Jane Doe, that is when UEBA alerts start to sound.\r\nAnother relatable analogy would be if your credit card was stolen. A thief can pickpocket your wallet and go to a high-end shop and start spending thousands of dollars using your credit card. If your spending pattern on that card is different from the thief’s, the company’s fraud detection department will often recognize the abnormal spending and block suspicious purchases, issuing an alert to you or asking you to verify the authenticity of a transaction.\r\nAs such, UEBA is a very important component of IT security, allowing you to:\r\n1. Detect insider threats. It is not too far-fetched to imagine that an employee, or perhaps a group of employees, could go rogue, stealing data and information by using their own access. UEBA can help you detect data breaches, sabotage, privilege abuse and policy violations made by your own staff.\r\n2. Detect compromised accounts. Sometimes, user accounts are compromised. It could be that the user unwittingly installed malware on his or her machine, or sometimes a legitimate account is spoofed. UEBA can help you weed out spoofed and compromised users before they can do real harm.\r\n3. Detect brute-force attacks. Hackers sometimes target your cloud-based entities as well as third-party authentication systems. With UEBA, you are able to detect brute-force attempts, allowing you to block access to these entities.\r\n4. Detect changes in permissions and the creation of super users. Some attacks involve the use of super users. UEBA allows you to detect when super users are created, or if there are accounts that were granted unnecessary permissions.\r\n5. Detect breach of protected data. If you have protected data, it is not enough to just keep it secure. You should know when a user accesses this data when he or she does not have any legitimate business reason to access it.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_User_and_Entity_Behavior_Analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5746,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png","logo":true,"scheme":false,"title":"Microsoft Teams","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-teams","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"Invite everyone you work with to chat, meet, call, and collaborate all in one place, no matter where you are.\r\n<span style=\"font-weight: bold;\">Chat from anywhere</span>\r\nShare your opinion, and your personality. Send gifs, stickers, and emojis in a group chat or in one-to-one messages.\r\n<span style=\"font-weight: bold;\">Meet from anywhere</span>\r\nInstantly go from group chat to video conference with the touch of a button. Teams of 10 or 10,000 can meet in one place, no matter how many places they’re in.\r\n<span style=\"font-weight: bold;\">Call from anywhere</span>\r\nNever yell “who just joined?!” ever again. Use Teams calling, Phone System, Calling Plan, or Direct Routing to take the stress out of conference calls.\r\n<span style=\"font-weight: bold;\">Collaborate from anywhere</span>\r\nNever do that frantic, searching-for-files thing ever again. In Teams you can access, share, and edit Word docs, PowerPoint, and Excel files in real time.\r\n\r\n<span style=\"text-decoration: underline;\"><span style=\"font-weight: bold;\">Features:</span></span>\r\n<span style=\"font-weight: bold;\">Meetings.</span> Meet with teams of 10 or 10,000. Host audio, video, and web conferences with anyone inside or outside your organization or go big with live events.\r\n<span style=\"font-weight: bold;\">Calling.</span> Make clear and reliable calls. Combine Teams with Phone System, Calling Plan, and Direct Routing for business calling on a global scale.\r\n<span style=\"font-weight: bold;\">Devices.</span> Be seen and heard wherever work takes you. Use Teams devices for more intelligent meeting and calling experiences.\r\n<span style=\"font-weight: bold;\">Apps and workflows.</span> Make Teams work for you. Add your favorite Microsoft and third-party services or build custom apps for your unique business needs.\r\n<span style=\"font-weight: bold;\">Firstline Workers.</span> Maximize the impact of your Firstline Workforce. Empower all workers with new scheduling and shift management features.\r\n<span style=\"font-weight: bold;\">Healthcare.</span> Provide the best care possible with help from Microsoft Teams. Collaborate and coordinate in a simple, secure way with chat, video, voice, and healthcare tools all in one hub.\r\n<span style=\"font-weight: bold;\">Security and compliance.</span> Microsoft Teams is designed with IT in mind, providing management capabilities for collaboration, meetings, callings, and apps in one place with simple administration.","shortDescription":"Microsoft Teams! Work remotely without feeling remote.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Teams","keywords":"","description":"Invite everyone you work with to chat, meet, call, and collaborate all in one place, no matter where you are.\r\n<span style=\"font-weight: bold;\">Chat from anywhere</span>\r\nShare your opinion, and your personality. Send gifs, stickers, and emojis in a group chat","og:title":"Microsoft Teams","og:description":"Invite everyone you work with to chat, meet, call, and collaborate all in one place, no matter where you are.\r\n<span style=\"font-weight: bold;\">Chat from anywhere</span>\r\nShare your opinion, and your personality. Send gifs, stickers, and emojis in a group chat","og:image":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png"},"eventUrl":"","translationId":5747,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":109,"title":"Instant messaging"}],"testingArea":"","categories":[{"id":495,"title":"Instant Communications Applications","alias":"instant-communications-applications","description":" Instant messaging (IM) technology is a type of online chat that offers real-time text transmission over the Internet. A LAN messenger operates in a similar way over a local area network. Short messages are typically transmitted between two parties, when each user chooses to complete a thought and select "send". Some IM applications can use push technology to provide real-time text, which transmits messages character by character, as they are composed. More advanced instant messaging can add file transfer, clickable hyperlinks, Voice over IP, or video chat.\r\nNon-IM types of chat include multicast transmission, usually referred to as "chat rooms", where participants might be anonymous or might be previously known to each other (for example collaborators on a project that is using chat to facilitate communication). Instant messaging systems tend to facilitate connections between specified known users (often using a contact list also known as a "buddy list" or "friend list"). Depending on the IM protocol, the technical architecture can be peer-to-peer (direct point-to-point transmission) or client-server (an Instant message service center retransmits messages from the sender to the communication device).\r\nBy 2010, instant messaging over the Web was already in sharp decline, in favor of messaging features on social networks. The most popular IM platforms, such as AIM, closed in 2017, and Windows Live Messenger was merged into Skype. Today, most instant messaging takes place on messaging apps which by 2014 had more users than social networks.\r\nInstant messaging is a set of communication technologies used for text-based communication between two or more participants over the Internet or other types of networks. IM–chat happens in real-time. Of importance is that online chat and instant messaging differ from other technologies such as email due to the perceived quasi-synchrony of the communications by the users. Some systems permit messages to be sent to users not then 'logged on' (offline messages), thus removing some differences between IM and email (often done by sending the message to the associated email account).\r\nIM allows effective and efficient communication, allowing immediate receipt of acknowledgment or reply. However IM is basically not necessarily supported by transaction control. In many cases, instant messaging includes added features which can make it even more popular. For example, users may see each other via webcams, or talk directly for free over the Internet using a microphone and headphones or loudspeakers. Many applications allow file transfers, although they are usually limited in the permissible file-size.\r\nIt is usually possible to save a text conversation for later reference. Instant messages are often logged in a local message history, making it similar to the persistent nature of emails. ","materialsDescription":" <span style=\"font-weight: bold;\">What is instant messaging used for?</span>\r\nInstant messaging (IM) technology is a type of online chat that offers real-time text transmission over the Internet. A LAN messenger operates in a similar way over a local area network. Short messages are typically transmitted between two parties when each user chooses to complete a thought and select "send".\r\n<span style=\"font-weight: bold;\">What kind of protocols are used in instant messaging applications?</span>\r\nTwo of the main protocols used for instant messaging in the market today are WebSocket and XMPP.\r\n<span style=\"font-weight: bold;\">What is the difference between texting and instant messaging?</span>\r\nText messaging, or simply "texting," is a cellular phone service typically limited to 160 characters, whereas instant messaging is usually a computer session with longer message size. Both text messaging and instant messaging are often called just plain "messaging."\r\n<span style=\"font-weight: bold;\">What are the key features of instant messaging?</span>\r\nThe exchange of text has long been the chief function of instant messaging, but it is now one feature of many. The ability to insert images and emojis into messages is now standard in many clients, as are file transfers. Facebook Messenger even enables users to send money via IM.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Instant_Communications_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":634,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_SQL_Server.png","logo":true,"scheme":false,"title":"Microsoft SQL Server","vendorVerified":0,"rating":"2.00","implementationsCount":4,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-sql-server","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications—which may run either on the same computer or on another computer across a network (including the Internet).\r\nMicrosoft markets at least a dozen different editions of Microsoft SQL Server, aimed at different audiences and for workloads ranging from small single-machine applications to large Internet-facing applications with many concurrent users.","shortDescription":"Microsoft SQL Server is a relational database management system developed by Microsoft.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft SQL Server","keywords":"Microsoft, computer, applications, different, with, Server, software, editions","description":"As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications—which may run either on the same computer or on another computer across a network (including the Internet).\r\nMic","og:title":"Microsoft SQL Server","og:description":"As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications—which may run either on the same computer or on another computer across a network (including the Internet).\r\nMic","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_SQL_Server.png"},"eventUrl":"","translationId":635,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":239,"title":"Relational Database Management Systems","alias":"relational-database-management-systems","description":" Relational Database Management System (RDBMS) is a DBMS designed specifically for relational databases. Therefore, RDBMSes are a subset of DBMSes.\r\nA relational database refers to a database that stores data in a structured format, using rows and columns. This makes it easy to locate and access specific values within the database. It is "relational" because the values within each table are related to each other. Tables may also be related to other tables. The relational structure makes it possible to run queries across multiple tables at once.\r\nWhile a relational database describes the type of database an RDMBS manages, the RDBMS refers to the database program itself. It is the software that executes queries on the data, including adding, updating, and searching for values.\r\nAn RDBMS may also provide a visual representation of the data. For example, it may display data in a tables like a spreadsheet, allowing you to view and even edit individual values in the table. Some relational database softwareallow you to create forms that can streamline entering, editing, and deleting data.\r\nMost well known DBMS applications fall into the RDBMS category. Examples include Oracle Database, MySQL, Microsoft SQL Server, and IBM DB2. Some of these programs support non-relational databases, but they are primarily used for relational database management.\r\nExamples of non-relational databases include Apache HBase, IBM Domino, and Oracle NoSQL Database. These type of databases are managed by other DMBS programs that support NoSQL, which do not fall into the RDBMS category.\r\nElements of the relational DBMS that overarch the basic relational database are so intrinsic to operations that it is hard to dissociate the two in practice.\r\nThe most basic features of RDBMS are related to create, read, update and delete operations, collectively known as CRUD. They form the foundation of a well-organized system that promotes consistent treatment of data.\r\nThe RDBMS typically provides data dictionaries and metadata collections useful in data handling. These programmatically support well-defined data structures and relationships. Data storage management is a common capability of the RDBMS, and this has come to be defined by data objects that range from binary large object (blob) strings to stored procedures. Data objects like this extend the scope of basic relational database operations and can be handled in a variety of ways in different RDBMSes.\r\nThe most common means of data access for the RDBMS is via SQL. Its main language components comprise data manipulation language (DML) and data definition language (DDL) statements. Extensions are available for development efforts that pair SQL use with common programming languages, such as COBOL (Common Business-Oriented Language), Java and .NET.\r\nRDBMSes use complex algorithms that support multiple concurrent user access to the database, while maintaining data integrity. Security management, which enforces policy-based access, is yet another overlay service that the RDBMS provides for the basic database as it is used in enterprise settings.\r\nRDBMSes support the work of database administrators (DBAs) who must manage and monitor database activity. Utilities help automate data loading and database backup. RDBMS systems manage log files that track system performance based on selected operational parameters. This enables measurement of database usage, capacity and performance, particularly query performance. RDBMSes provide graphical interfaces that help DBAs visualize database activity.\r\nRelational database management systems are central to key applications, such as banking ledgers, travel reservation systems and online retailing. As RDBMSes have matured, they have achieved increasingly higher levels of query optimization, and they have become key parts of reporting, analytics and data warehousing applications for businesses as well. \r\nRDBMSes are intrinsic to operations of a variety of enterprise applications and are at the center of most master data management (MDM) systems.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What are the advantages of a Relational Database Management System?</span></h1>\r\nA Relational Database Management System (RDBMS) is a software system that provides access to a relational database. The software system is a collection of software applications that can be used to create, maintain, manage and use the database. A "relational database" is a database structured on the "relational" model. Data are stored and presented in a tabular format, organized in rows and columns with one record per row.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Data Structure.</span> The table format is simple and easy for database users to understand and use. Relational database management software provide data access using a natural structure and organization of the data. Database queries can search any column for matching entries.</li></ul>\r\n<dl></dl>\r\n<ul><li><span style=\"font-weight: bold;\">Multi-User Access.</span> RDBMS database program allow multiple database users to access a database simultaneously. Built-in locking and transactions management functionality allow users to access data as it is being changed, prevents collisions between two users updating the data, and keeps users from accessing partially updated records.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Privileges. </span>Authorization and privilege control features in an RDBMS allow the database administrator to restrict access to authorized users, and grant privileges to individual users based on the types of database tasks they need to perform. Authorization can be defined based on the remote client IP address in combination with user authorization, restricting access to specific external computer systems.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Network Access.</span> RDBMSs provide access to the database through a server daemon, a specialized software program that listens for requests on a network, and allows database clients to connect to and use the database. Users do not need to be able to log in to the physical computer system to use the database, providing convenience for the users and a layer of security for the database. Network access allows developers to build desktop tools and Web applications to interact with databases.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Speed.</span> The relational database model is not the fastest data structure. RDBMS software advantages, such as simplicity, make the slower speed a fair trade-off. Optimizations built into an RDBMS, and the design of the databases, enhance performance, allowing RDBMSs to perform more than fast enough for most applications and data sets. Improvements in technology, increasing processor speeds and decreasing memory and storage costs allow systems administrators to build incredibly fast systems that can overcome any database performance shortcomings.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Maintenance. </span>RDBMSs feature maintenance utilities that provide database administrators with tools to easily maintain, test, repair and back up the databases housed in the system. Many of the functions can be automated using built-in automation in the RDBMS, or automation tools available on the operating system.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Language.</span> RDBMSs support a generic language called "Structured Query Language" (SQL). The SQL syntax is simple, and the language uses standard English language keywords and phrasing, making it fairly intuitive and easy to learn. Many RDBMSs add non-SQL, database-specific keywords, functions and features to the SQL language.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Relational_Database_Management_Systems.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}