Today I got an idea to write down a article about water pump in sri lankan market.I had to buy a water pump ,because my home need one.Home had a water pump ,which is 20 years old.It’s a ANTON Brand.That water pump is good one,but now ANTON is not in the water pump market any more.So difficult to repair that old water pump.So I decide to buy new one. There fore first I have done a research on water pumps in sri lanka.
I have found out following brand of water pumps in sri lanka.
1.Jinesena
2.Solex
3.Arpitec
4.singer
5.Z-lon
Jinesena ,It’s the sri lankan most popular brand for the water pump since 1932 .It’s spare parts for available every way in sri lanka.This brand water pump are durable.Price wise it’s the no 1 water pump. 3/4 horse power brand new water pump will be nearly 16,000 – 18,000 sri lanka rupees. This brand product had ISO 9001 and ISO 9001/2000 certification. Jinesena water impeller is made from white steel .So it’s durable . They also produce Industrial Pumps and Agricultural Pumps. You can reach Jinesena product by dialing 011 2584919 or visit www.jinasena.com
Solex ,not famous than Jinesena.But It had potential market in sri lanka.Solex water pump spare parts wildly available throughout the sri lanka.It’s spare parts are more cheaper than compare to Jinesena.If you are buy a water pump for a home ,this is the right brand.This brand available in sri lanka since 1980.This brand had a ½ horse power water pump. you can buy ½ horse power brand new water pump nearly 8,000 -10,000 sri lanka rupees.3/4 horse power brand new water pump will be 12,000 -14,000.Solex water impeller is made from copper .So it’s durable .They issues you 5 years warranty. You can reach Solex product by dialing 11 2931730 or visit www.solexeng.com.
Arpitec,product of Arpico people. Arpico people came to water pump market very recently. So unlike Jinsena,Solex Arpitec do not have rich history in water pump market. Arpitec impeller is made from steel.So it might get damage.Price wise it’s cheaper than Jinesena and Solex both.you can buy ¾ horse power brand new water pump 10,000 SL rupees.1/2 horse power one 6,000 SL rupees.you can reach Arpico water pump by dialing 11 4310500 or visit www.arpico.com
Singer ,came to water pump market latter part of the 90.They are spare parts are widely available. They suction speed is less compare to Jinsena and solex.They had various selection,not like other brand.So you can buy a good suction speed water pump with ¾ horse power 14,000 SL rupees. you can reach Singer water pump by dialing 11 2316316 or visit www.singersl.com
Z-lon,came to water pump market very recently.They are the cheapest brand in sri lanka.You can buy ¾ horse power water pump 8,000 – 9,000 SL rupees.Spare parts are not widely available.spare parts are available in a limited area.i have no idea about it’s impeller. you can reach Z lon water pump by dialing 114760100.
All these information are base on my own personal experience.If you are hope to buy a new water pump better to visit all these brands .After that get some idea about each and every brand. Next decided what your requirement is. After that select the brand and capacity you need .They buy a water pump according to your requirement.In this article I point out nutshell of the water pump market in sri lanka .There can be other brand,But i found out only these brands in sri lanka.Any way good luck for your water pump hunting job.
Wednesday, December 22, 2010
Thursday, November 25, 2010
more information about PGP encryption
If you install PGP command line version and also if you had .pgp file and it's key in a .asc file.
then you can decrypt the file using the following command.
pgp --import key.asc
pgp --decrypt file.pgp
for the GPG command line it's in the following way.
gpg --import key.asc
gpg --decrypt file.pgp
How Confidentiality generate from PGP encryption
Here message or file is encrypted using a symmetric encryption algorithm, which requires a symmetric key. Each symmetric key is used only once and is also called a session key. The session key is protected by encrypting it with the receiver's public key thus ensuring that only the receiver can decrypt the session key. The encrypted message along with the encrypted session key is sent to the recipient.
then you can decrypt the file using the following command.
pgp --import key.asc
pgp --decrypt file.pgp
for the GPG command line it's in the following way.
gpg --import key.asc
gpg --decrypt file.pgp
How Confidentiality generate from PGP encryption
Here message or file is encrypted using a symmetric encryption algorithm, which requires a symmetric key. Each symmetric key is used only once and is also called a session key. The session key is protected by encrypting it with the receiver's public key thus ensuring that only the receiver can decrypt the session key. The encrypted message along with the encrypted session key is sent to the recipient.
Thursday, November 4, 2010
What is AS 400
AS 400 is a midrange server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks with Web applications. The AS/400 uses the PowerPC microprocessor with its reduced instruction set computer technology. Its operating system is called the OS/400. With multi-terabytes of disk storage and a Java virtual memory closely tied into the operating system, IBM hopes to make the AS/400 a kind of versatile all-purpose server that can replace PC servers and Web servers in the world's businesses, competing with both Wintel and Unix servers, while giving its present enormous customer base an immediate leap into the Internet.
Wednesday, November 3, 2010
Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication.It increase the security of e-mail communications.It was created by Philip Zimmermann in 1991.
PGP is based on the public-key method, which uses two keys -- one is a public key that you disseminate to anyone from whom you want to receive a message. The other is a private key that you use to decrypt messages that you receive.
Following step help to create public key and after export that key we can send it to other end.(communication other party)
Step 1: -
pgp –version
check the PGP version
Step 2:-
pgp –h
get the pgp help
Step 2:-
pgp --gen-key "Joe User" --key-type RSA --bits 2048 --passphrase "my passphrase"
create pgp public key
Here Joe User is the key word we are used.
Key-type -> RSA should be the correct one to select two way communication. The default is DH/DSS and should be fine for new users.
Bits ->
1024 or 2048 is fine. 2048 or greater will be much better to used.
Below 1024 is not good. Then crackers can easily guess the public key.
Passphrase -> This is one of the most important steps (next to backing
up your keyring). If someone were to get a hold of your secret key, and figure
out your passphrase then there is NOTHING that you can do to prevent that
person from opening your encrypted files or reading your mail.
The passphrase should be a good length, and include upper and lower case
characters, number and symbols. A good choice is to make a sentence and
add punctuation and numbers. Of course, you should not write it down
anywhere where others may find it. If your passphrase is weak, then it can be
hacked.
After execute the above command ,
PGP Command line will now generate your keypair. You should see your Key ID (i.e. 0X12345678), and a message that the key was successfully generated.
Step 3:-
pgp --list-keys
list the public keys in the PGP server
Step 4:-
pgp --export 0x12345678
Export The Public Key
Now Public key creation process is over.
After that you can send the export public key to customer
After sending the customer your public key , we have to collect customer’s public key
First we need to import that public key.
pgp --import "PGP Joe.asc"
PGP Joe.asc is the public key of the customer
For this way we can use PGP encryption process.
PGP is based on the public-key method, which uses two keys -- one is a public key that you disseminate to anyone from whom you want to receive a message. The other is a private key that you use to decrypt messages that you receive.
Following step help to create public key and after export that key we can send it to other end.(communication other party)
Step 1: -
pgp –version
check the PGP version
Step 2:-
pgp –h
get the pgp help
Step 2:-
pgp --gen-key "Joe User" --key-type RSA --bits 2048 --passphrase "my passphrase"
create pgp public key
Here Joe User is the key word we are used.
Key-type -> RSA should be the correct one to select two way communication. The default is DH/DSS and should be fine for new users.
Bits ->
1024 or 2048 is fine. 2048 or greater will be much better to used.
Below 1024 is not good. Then crackers can easily guess the public key.
Passphrase -> This is one of the most important steps (next to backing
up your keyring). If someone were to get a hold of your secret key, and figure
out your passphrase then there is NOTHING that you can do to prevent that
person from opening your encrypted files or reading your mail.
The passphrase should be a good length, and include upper and lower case
characters, number and symbols. A good choice is to make a sentence and
add punctuation and numbers. Of course, you should not write it down
anywhere where others may find it. If your passphrase is weak, then it can be
hacked.
After execute the above command ,
PGP Command line will now generate your keypair. You should see your Key ID (i.e. 0X12345678), and a message that the key was successfully generated.
Step 3:-
pgp --list-keys
list the public keys in the PGP server
Step 4:-
pgp --export 0x12345678
Export The Public Key
Now Public key creation process is over.
After that you can send the export public key to customer
After sending the customer your public key , we have to collect customer’s public key
First we need to import that public key.
pgp --import "PGP Joe.asc"
PGP Joe.asc is the public key of the customer
For this way we can use PGP encryption process.
Wednesday, October 13, 2010
Sri Lankan Milk production
Sri Lanka is an island.Plenty of greenery and sunshine are freely available.
In 2006 Sri Lanka produced 7000 Metric Tons of Powdered Milk.Main four sri lankan companies have help for these production.But the pathetic situation is sri lanka imports 68000 Metric Tons of Powdered Milk.That is too much.Why can not sri lanka made it's own requirement ? Do we need to import such massive qty from other countries ?
But this situation is much recovered in 2008 ,In 2008 Sri lanka produced 7500 Metric Tons of Powdered Milk.But Still Sri Lanka had to import 62000 Metric Tons from the other countries.
Major Powdered Milk production compaines are Nestle,Milco,Kothmale and Maliban.
But all these companies are famous for manufacturing following product(Milk food).
* UHT Tetra Milk
* Cheese
* Yoghurt
* Ice Cream
* Fresh Cream
* Ghee
* Curd
* Milk Powder
* Butter
* Sterilized Milk
Sri lanka is in front of Milk food production.In 2008 Sri lanka produced 2800 Metric Tons of Milk food.But still In 2008 Sri lanka had to import 50 Metric Tons from other countries.
Tuesday, September 14, 2010
Isurumuniya CD
Today i brought a old music cd,which contains old songs. But when i listen to that music ,i feel i was in more comfortable zone.It contains 20 songs.All those songs are song by Chitra somapala.I do not any thing about her except her voice.Her voice is close to me.At the present none of the media is doing promote on this music cd.But it really good.There fore i just feel to type some comment about this cd. This cd contains many famous songs."Isurumuniyehi","Kurulu Game","Dambulu Gale","Udarata Kandukara" and many more. I invited all the viewer, to go and listen to this cd.
Wednesday, August 25, 2010
SOA Architecture
Sunday, August 22, 2010
Session Bean Example ....
This is the session Bean example i have done.
public class BalanceInquiryBean extends AbstractCommonSMSBanking implements SessionBean,CommonSMSBanking{
public BalanceInquiryBean() {
super();
// TODO Auto-generated constructor stub
}
................
public void ejbCreate() throws CreateException {
// TODO Auto-generated method stub
}
public Object getAccountDetails(String PhoneNo,String PinNo,String SeqNo){
if(("D").equals(this.getDayNightMode()) ){
SMS002L2DAOImpl sms002L2 = new SMS002L2DAOImpl();
SMS002L2 sms002L2Obj = null;
..................
}
Home Interface
defines the methods that allow a client to create and find an entity bean.
Example:-
public interface BalanceInquiryHome extends EJBHome {
public Object getAccountDetails(String PhoneNo,String PinNo,String SeqNo) throws RemoteException, CreateException;
}
Remote Interface
The remote interface extends javax.ejb.EJBObject and defines the business methods that a remote client may invoke.
public interface BalanceInquiry extends EJBObject {
public Balance generateBalance() throws RemoteException, CreateException;
}
public class BalanceInquiryBean extends AbstractCommonSMSBanking implements SessionBean,CommonSMSBanking{
public BalanceInquiryBean() {
super();
// TODO Auto-generated constructor stub
}
................
public void ejbCreate() throws CreateException {
// TODO Auto-generated method stub
}
public Object getAccountDetails(String PhoneNo,String PinNo,String SeqNo){
if(("D").equals(this.getDayNightMode()) ){
SMS002L2DAOImpl sms002L2 = new SMS002L2DAOImpl();
SMS002L2 sms002L2Obj = null;
..................
}
Home Interface
defines the methods that allow a client to create and find an entity bean.
Example:-
public interface BalanceInquiryHome extends EJBHome {
public Object getAccountDetails(String PhoneNo,String PinNo,String SeqNo) throws RemoteException, CreateException;
}
Remote Interface
The remote interface extends javax.ejb.EJBObject and defines the business methods that a remote client may invoke.
public interface BalanceInquiry extends EJBObject {
public Balance generateBalance() throws RemoteException, CreateException;
}
Wednesday, July 14, 2010
Software reverse engineering
Software reverse engineering involves reversing a program's machine code (the string of 0s and 1s that are sent to the logic processor) back into the source code that it was written in, using program language statements.
Software reverse engineering is done to retrieve the source code of a program because the source code was lost, to study how the program performs certain operations, to improve the performance of a program, to fix a bug (correct an error in the program when the source code is not available), to identify malicious content in a program such as a virus or to adapt a program written for use with one microprocessor for use with another. Reverse engineering for the purpose of copying or duplicating programs may constitute a copyright violation. In some cases, the licensed use of software specifically prohibits reverse engineering.
Software reverse engineering is done to retrieve the source code of a program because the source code was lost, to study how the program performs certain operations, to improve the performance of a program, to fix a bug (correct an error in the program when the source code is not available), to identify malicious content in a program such as a virus or to adapt a program written for use with one microprocessor for use with another. Reverse engineering for the purpose of copying or duplicating programs may constitute a copyright violation. In some cases, the licensed use of software specifically prohibits reverse engineering.
Tuesday, July 13, 2010
Acessing Printer using jsp page
Those who like or need to access Printer from there jsp page.they have to setup Printer.Next from there jsp page they have to put the following code for the button implementation.
< input type="button" value="Print this page" onClick="window.print()" >
or else your have to use
java.awt.print Package.
< input type="button" value="Print this page" onClick="window.print()" >
or else your have to use
java.awt.print Package.
Sunday, July 4, 2010
Functional Programming Vs Procedural Programming
Functional Programming
Functional programming should not be confused with procedural programming. Neither is it like object oriented programming. It is something different. Not radically so, since the concepts that we will be exploring are familiar programming concepts, just expressed in a different way. The philosophy behind how these concepts are applied to solving problems is also a little different.
Functional programming is all about expressions. In fact another way to describe Functional Programming might be to term it expression oriented programming since in Functional Programming everything reduces to an expression. You should recall that an expression is a collection of operations and variables that results in a single value. Thus x == 8 is a Boolean expression. 3 + (9-Y) is an arithmetic expression. And "Hello".uppercase() is a string expression. The latter is also a function call (Or more strictly a method call) on the string object "Hello" and, as we shall see, functions are very important in Functional Programming.
Programming language :- Python
Procedural Programming
A list of instructions telling a computer, step-by-step, what to do, usually having a linear order of execution from the first statement to the second and so forth with occasional loops and branches.
A procedural program is composed of one or more units or modules--either user coded or provided in a code library; each module is composed of one or more procedures, also called a function, routine, subroutine, or method, depending on programming language.
Programming language :- C
Functional programming should not be confused with procedural programming. Neither is it like object oriented programming. It is something different. Not radically so, since the concepts that we will be exploring are familiar programming concepts, just expressed in a different way. The philosophy behind how these concepts are applied to solving problems is also a little different.
Functional programming is all about expressions. In fact another way to describe Functional Programming might be to term it expression oriented programming since in Functional Programming everything reduces to an expression. You should recall that an expression is a collection of operations and variables that results in a single value. Thus x == 8 is a Boolean expression. 3 + (9-Y) is an arithmetic expression. And "Hello".uppercase() is a string expression. The latter is also a function call (Or more strictly a method call) on the string object "Hello" and, as we shall see, functions are very important in Functional Programming.
Programming language :- Python
Procedural Programming
A list of instructions telling a computer, step-by-step, what to do, usually having a linear order of execution from the first statement to the second and so forth with occasional loops and branches.
A procedural program is composed of one or more units or modules--either user coded or provided in a code library; each module is composed of one or more procedures, also called a function, routine, subroutine, or method, depending on programming language.
Programming language :- C
Thursday, June 17, 2010
Monday, June 7, 2010
Lynx Web Browser
Today I have download the Lynx Web browser and use it.Here I have attached install Lynx browser.
Lynx browser is a text-only web browser will only show what’s in the HTML of a page. It won’t show JavaScript, Flash, images, or even CSS.
Believe it or not there are people out there who use text-only browsers to surf the internet.
Lynx was a product of the University of Kansas and was initially developed in 1992 by a team of students at the university of Kansas.
Sunday, June 6, 2010
resignation of my first job
2010 April 20 is my last day of my first job.After written my last exam paper of the my Bachelor degree,I was able to join my first job.
My first company is Sabre Technologies.It's under MAS Holdings Group.when selecting process I was fortunate to have my friend's recommendation.I take this opportunity to thank to that friend.
I started my job on the 15 of February 2006.Last four year i was work on the Tradecard project.It's supply chain management system.In my latter part of the job,Sabre came to and join venture with TradeCard Inc and formed a new organizaion called TradeCard Services Pvt Ltd.
There fore In 2008 Dec I have to resign Sabre and rejoin to TradeCard Services Pvt Ltd.
with my first job i have learn lot of things.With the j2EE technologies I have put my foundation.That is in 2007 May I have pass the Sun Certified Java Programmer Exam.during these period I have work with jsp,servlet,and hibrenate technologies.Also I was fortunate to work with MVC architecture.
My first company is Sabre Technologies.It's under MAS Holdings Group.when selecting process I was fortunate to have my friend's recommendation.I take this opportunity to thank to that friend.
I started my job on the 15 of February 2006.Last four year i was work on the Tradecard project.It's supply chain management system.In my latter part of the job,Sabre came to and join venture with TradeCard Inc and formed a new organizaion called TradeCard Services Pvt Ltd.
There fore In 2008 Dec I have to resign Sabre and rejoin to TradeCard Services Pvt Ltd.
with my first job i have learn lot of things.With the j2EE technologies I have put my foundation.That is in 2007 May I have pass the Sun Certified Java Programmer Exam.during these period I have work with jsp,servlet,and hibrenate technologies.Also I was fortunate to work with MVC architecture.
Tuesday, June 1, 2010
Flow Chart Diagram
A flow chart is a graphical or symbolic representation of a process. Each step in the process is represented by a different symbol and contains a short description of the process step. The flow chart symbols are linked together with arrows showing the process flow direction.
Your can refer the above table for the Flow chart Diagram's Symbol.
Thursday, May 13, 2010
Short Message peer to peer protocol (SMPP)
The Short Message Peer to Peer (SMPP) protocol is an open industry standard messaging protocol designed to simplify integration of data applications with wireless mobile networks such as GSM, TDMA, CDMA and PDC. The protocol is widely deployed in the mobile telecommunications industry. The SMPP protocol specification is freely available from the Documents section of this site. With SMPP you can as an application developer send data to mobile devices or to the other applications over SMSC (Short Messasge Service Centre).
The short message peer-to-peer protocol was initially designed and developed by an Irish company called Aldiscon and is now owned by LogicaCMG plc.
The short message peer-to-peer protocol is based on pairs of request/response packets or binary encoded packets PDUs (protocol data units) exchanged over OSI transport layer (TCP session) connections.
The short message peer-to-peer protocol was initially designed and developed by an Irish company called Aldiscon and is now owned by LogicaCMG plc.
The short message peer-to-peer protocol is based on pairs of request/response packets or binary encoded packets PDUs (protocol data units) exchanged over OSI transport layer (TCP session) connections.
Friday, May 7, 2010
GUI Interface using batch file
Simple Object Access Protocol (SOAP)
SOAP stands for Simple Object Access Protocol used to create a format for sending messages .It's platform and language independent
SOAP is based on XML
SOAP provides a way to communicate between applications running on different operating systems, with different technologies and programming languages.
Syntax Rules
Here are some important syntax rules which must contains in SOAP message:
A SOAP message Must be encoded using XML ,Must use the SOAP Envelope namespace ,must use the SOAP Encoding namespace ,must NOT contain a DTD reference,must NOT contain XML Processing Instructions
In the above diagram display the simple format of SOAP message.
Thursday, May 6, 2010
Web Services in Nutshell
Web services are services ,usually including some combination of programming and data, but possibly including human resources as well.
These services are made available from a business's Web server for Web users or other Web-connected programs.
Providers of Web services are generally known as application service providers.
Users can access some Web services through a peer-to-peer arrangement.
Some services can communicate with other services and this exchange of procedures and data is generally enabled by a class of software known as middleware.
The basic Web services platform is XML + HTTP.
XML provides a language which can be used between different platforms and programming languages and still express complex messages and functions.
The HTTP protocol is the most used Internet protocol.
Web services platform elements:
SOAP (Simple Object Access Protocol)
UDDI (Universal Description, Discovery and Integration)
WSDL (Web Services Description Language)
XML is used to tag the data,
SOAP is used to transfer the data,
WSDL is used for describing the services available
UDDI is used for listing what services are available.
Web services allow organizations to communicate data without intimate knowledge of each other's IT systems behind the firewall.
Unlike traditional client/server models, such as a Web server/Web page system, Web services do not provide the user with a GUI. Web services instead share business logic, data and processes through a programmatic interface across a network. The applications interface, not the users. Developers can then add the Web service to a GUI (such as a Web page or an executable program) to offer specific functionality to users.
Web services allow different applications from different sources to communicate with each other without time-consuming custom coding, and because all communication is in XML, Web services are not tied to any one operating system or programming language. For example, Java can talk with Perl, Windows applications can talk with UNIX applications.
These services are made available from a business's Web server for Web users or other Web-connected programs.
Providers of Web services are generally known as application service providers.
Users can access some Web services through a peer-to-peer arrangement.
Some services can communicate with other services and this exchange of procedures and data is generally enabled by a class of software known as middleware.
The basic Web services platform is XML + HTTP.
XML provides a language which can be used between different platforms and programming languages and still express complex messages and functions.
The HTTP protocol is the most used Internet protocol.
Web services platform elements:
SOAP (Simple Object Access Protocol)
UDDI (Universal Description, Discovery and Integration)
WSDL (Web Services Description Language)
XML is used to tag the data,
SOAP is used to transfer the data,
WSDL is used for describing the services available
UDDI is used for listing what services are available.
Web services allow organizations to communicate data without intimate knowledge of each other's IT systems behind the firewall.
Unlike traditional client/server models, such as a Web server/Web page system, Web services do not provide the user with a GUI. Web services instead share business logic, data and processes through a programmatic interface across a network. The applications interface, not the users. Developers can then add the Web service to a GUI (such as a Web page or an executable program) to offer specific functionality to users.
Web services allow different applications from different sources to communicate with each other without time-consuming custom coding, and because all communication is in XML, Web services are not tied to any one operating system or programming language. For example, Java can talk with Perl, Windows applications can talk with UNIX applications.
Tuesday, April 27, 2010
James Gosling leaves Oracle
James Gosling, the creator of the Java programming language, has resigned from Oracle,
when this news getting into my mind.I feel to write down in my blog.That why I write it down in my blog.James is close to me.Because I love and passion with J2EE technologies.
Gosling resigned on April 2 2010.
Gosling says "As to why I left, it's difficult to answer"
Gosling was the chief technology officer for Oracle's client software group and, before that, the chief technology officer of Sun's developer products group.
you can read nice article in the businessweek web site.I have add the url related to that article.
http://www.businessweek.com/idg/2010-04-10/java-founder-james-gosling-leaves-oracle.html
Good luck James Gosling ... !
Thursday, April 15, 2010
Ford Festiva Car
My first car is Ford Festiva.I bought my car in 2008 November.
In Sri Lanka there are lot of ford festiva cars available.David Persis is the Dealer in Sri Lanka.After taking the car i had put a inspection from there.Also I have done a service from there.They service is good.I used to buy spare parts from New Rainbow shop at Maradana.
before buy this car some people says ford is a not good item.If you really need vehicle buy a Toyota or Nissan one,but not Ford.In Sri Lanka famous brand for vehicle are Toyota and Nissan.
But during the past years usage i believe ford is good brand.Ford vehicle are durable ,not like Toyota or Nissan.
Also Ford festiva's fuel consumption is good.I can go 15 kms per liter outside the city limit.
I want pass the message that Ford Festiva is not a bad vehicle.It's really good.Buy one and see the different.Do not think Toyota or Nissan is the only option.
Friday, April 2, 2010
commit Vs Rollback
commit - In database Management commit refers to making a set temparer changes into permanent.
rollback - In database technologies, a rollback is an operation which returns the database to some previous state.
rollback - In database technologies, a rollback is an operation which returns the database to some previous state.
Wednesday, March 24, 2010
Before writing email to some one .................
1. To whom i am write
- need to identify what is his or her name and Designation
- what it is his gender
- whether she is Mrs or Miss
- correct spelling of his or her name
2. Subject
- what is the subject i am writing on
3. what are the points to be addresses
4. what is the plan
5. does it Descriptive one or not
6. Action or feedback getting on
7. What is the Sequence i am using to write
8. Do you need any support document
9. Is it one person or more person i am writing this email
Note:- check write down the possible answer i can get as a reply to this email.according to that answer organized the questions.
Also in the first two lines you should be able to tell the reader why should I am write this email.
- need to identify what is his or her name and Designation
- what it is his gender
- whether she is Mrs or Miss
- correct spelling of his or her name
2. Subject
- what is the subject i am writing on
3. what are the points to be addresses
4. what is the plan
5. does it Descriptive one or not
6. Action or feedback getting on
7. What is the Sequence i am using to write
8. Do you need any support document
9. Is it one person or more person i am writing this email
Note:- check write down the possible answer i can get as a reply to this email.according to that answer organized the questions.
Also in the first two lines you should be able to tell the reader why should I am write this email.
Monday, March 1, 2010
Asynchronous Vs Synchronous
synchronous :-
occurring or Start or existing at the same time
asynchronous :-
not synchronous; That means not occurring or existing at the same time.
occurring or Start or existing at the same time
asynchronous :-
not synchronous; That means not occurring or existing at the same time.
Wednesday, February 24, 2010
N-Tier Application Architecture
N-Tier Application Architecture provides a structure for the developers to create fixable and reusable web application. It helps to break the application into tiers. Here N-tier means any number of distinct tiers used in your architecture.
N-tiers
1. Client Tier – HTML , javascript,(Java Server Pages)JSP
2. Middle Tier – Servlet,
3. Data Access Tier - (Entity Java Bean)EJB,Database
N-tiers
1. Client Tier – HTML , javascript,(Java Server Pages)JSP
2. Middle Tier – Servlet,
3. Data Access Tier - (Entity Java Bean)EJB,Database
Application server
Application server is a server design to for running specific applications.These application can divided into three parts.
They are ,
1. web-based graphical interface
2. business logic application
3. database and transaction server
They are ,
1. web-based graphical interface
2. business logic application
3. database and transaction server
Tuesday, February 23, 2010
widget
Widgets is part of GUI Interface.Widgets display information and invite the user to act in a number of ways. Typical widgets contains buttons, dialog boxes, pop-up windows, pull-down menus,scroll bars, resizable window edges, icons,progress indicators, selection boxes, windows, tear-off menus, menu bars, toggle switches and forms.
Remote Procedure Call (RPC)
Remote Procedure Call is a protocol that one program can use to request a service from a program located in another computer in a network without having to understand network details.RPC uses the client/server model. The requesting program is a client and the service-providing program is the server.
Monday, February 22, 2010
J2EE Design Patterns - Transfer Object / Value Object
If the client needs to display set of attribute on the server. The client application calls the individual getter and setter methods that require single attribute values. This will cause a huge network traffic block.
People come across new design pattern to overcome this issue. That Pattern is called as Transfer Object/Value Object Design Pattern.
Here Transfer Object encapsulates the bulk business data. A single method call is used to send and retrieve the Transfer Object / Value Objects.
This Pattern has three main components
They are,
Client - client can be GUI interface
Business Object – can be Entity Bean, Session Bean or Data Access Object .Also responsible for creating Transaction object.
Transfer Object - an arbitrary serializable Java object. The members in the Transfer Object are defined as public; Transfer Object class may provide a constructor that accepts all the required attributes.
People come across new design pattern to overcome this issue. That Pattern is called as Transfer Object/Value Object Design Pattern.
Here Transfer Object encapsulates the bulk business data. A single method call is used to send and retrieve the Transfer Object / Value Objects.
This Pattern has three main components
They are,
Client - client can be GUI interface
Business Object – can be Entity Bean, Session Bean or Data Access Object .Also responsible for creating Transaction object.
Transfer Object - an arbitrary serializable Java object. The members in the Transfer Object are defined as public; Transfer Object class may provide a constructor that accepts all the required attributes.
Coupling Vs Cohesion
Coupling
coupling or dependency is the degree to which each program module relies on each one of the other modules.
Cohesion
Modules with high cohesion tend to be preferable because high cohesion is associated with several desirable traits of software including robustness, reliability, reusability, and understandability whereas low cohesion is associated with undesirable traits such as being difficult to maintain, difficult to test, difficult to reuse, and even difficult to understand.
coupling or dependency is the degree to which each program module relies on each one of the other modules.
Cohesion
Modules with high cohesion tend to be preferable because high cohesion is associated with several desirable traits of software including robustness, reliability, reusability, and understandability whereas low cohesion is associated with undesirable traits such as being difficult to maintain, difficult to test, difficult to reuse, and even difficult to understand.
Friday, February 19, 2010
MVC Architecture
MVC stands for “model, view, controller.”
Model
The model refers to the data of an application after it has been retrieved from a database. The model is typically made up of objects which reside in RAM memory.
View
The view refers to the presentation of the data on the screen.
Controller
The controller refers to the request and response handler for the application. The controller is usually created with servlets.
Model
The model refers to the data of an application after it has been retrieved from a database. The model is typically made up of objects which reside in RAM memory.
View
The view refers to the presentation of the data on the screen.
Controller
The controller refers to the request and response handler for the application. The controller is usually created with servlets.
How it all fits together
To fully understand how MVC architecture works, let’s think about what happens when an HTTP request is made with a web application. When someone clicks on a link to go to a new webpage, a request is made to the server. The controller then decides what page the user needs to go to, and what data needs to be sent. The application queries the appropriate databases, and puts the resulting data into the model.
At this point, the model can be easily manipulated, sorted, and filtered, and used to create the view that the user will see when the page first loads. The HTML content can be generated with a JSP (if the application uses the Java platform) and sent back to the client machine as a response.
Subscribe to:
Posts (Atom)