Pages


I made this widget at MyFlashFetish.com.

Saturday, April 2, 2011

Rapid Application Development Process





  • FIRSTLY,


  • The rapid application development (RAD) component enables you to configure a server project so that you can repeatedly deploy a server configuration (containing your message flows and message sets) to the runtime with a single toolbar button click. The RAD component uses the broker archive generation component, which creates the compiled message flow (.cmf) and compiled message set (dictionary) files, and stores them in a broker archive (bar). It then publishes (deploys) these resources to the target execution groups. Unlike with normal deployment, the bar file created using RAD is not retained for future use.



  • The RAD component is a quick way for people who are developing message flow applications to repeatedly test their message flows, ESQL transformation programs, and mapping transformation programs, in a safe environment, before they are used on a production system.


  • The following figure shows how RAD relates to the normal deployment cycle:

  • There are two ways to run RAD:
    1. Run on Server
    2. Debug on Server
    • When you select Run on Server, a check is made to see if a default server is defined for the project. If it is, the project is published (deployed) to the default server. If not, the Server Selection wizard is opened before continuing and, when complete, a Publish action is performed for the server instance and its configuration.
    • Debug on Server is similar to Run on Server, except that, after the action successfully completes, the Flow Debug perspective is opened for you to begin debugging your flow.
    • SECONDLY,
    • RAD allows the technology team to define the scope of the project, identify the iterations and begin working immediately in lieu of the older methodologies where the entire systems is designed on paper and then developed. As each iteration is finalized, based on priority, the complete system begins to take shape.   Tasks that normally could not be completed until the end of the project can most likely be completed during any stage of the product.  
    • RAD begins with the End Goal in mind.  "Organize and perform activities according to their priority" (Stephen Covey). All iterations are working toward the same goal.  The graph below demonstrates a RAD cycle:
    • THIRD,  It is a methodology for compressing the feasibility analysis, planning, design, build, and test phases into a series of short, iterative development cycles. Refer to book by James Martin: Rapid Application Development, Macmillan for details.

    Rapid Application Development

    ADVANTAGES OF USING RAD

    • Conventional software development methods take, on an average almost 20% more time than the RAD procedure. Using RAD can enable quicker visualization of the end-design and hence allow rapid software testing and rectifying steps. The customer is able to have a faster look at the design to add valuable inputs, in order to make the design more user-friendly.
    • The current competitive scenario demands frequently upgraded softwares in order to effectively satisfy customers' requirements. RAD enables a faster and updated version to reach the end user, by systematically eliminating redundant steps or using the prototype methods.
    • Cost overruns and meeting the time constraints are another advantage, though not a big consideration in high-end uses.
    • RAD makes the development process to be a more credible one by facilitating a scope for the customer to actively provide inputs in the development process. This may also prove a feasible study from the point of view of a developer.
    • It protects the current project from the variations in the market.

    For the conclusion, Rapid Application Development is an efficient methodology which can assist faster software development, and at the same time ensure maximum quality of the project.








    Source Retrieved From,
    http://www.brinex.com/solutions-bas-process-rad.html

    http://www.buzzle.com/articles/advantages-of-rapid-application-development.html

    What is SQL?

    Hye!

    Have you ever heard about SQL? What is SQL?

    Structured Query Language (SQL) is the most widely used language for database interaction today. SQL is a specialized language for updating , deleting and requesting information from databases.

    • SQL is an ANSI and ISO standard and is the de facto standard database query language. A variety of established database product support SQL, including products from Oracle and Microsoft SQL Server. It is widely used in both industry and academia often for enormous, complex database.

    • SQL offers great flexibility to users by supporting distributed databases. i.e. databases that can be run on several computer networks at a time.

    • SQL lying in the basis of a variety of well established database applications on the Internet today.

    With the progress in database technology SQL-based applications have become increasingly affordable for the regular user. this is due to the introduction of various open-source SQL database solutions such as MySQL, PostgreSQL, SQLite, Firebird and many more.

    See You Next Time!


    References:
    Knowledge Database
    What is SQL? How does it Work and How is being used?

    Decision Support System In Police Department

    It is clear that the Police require software that assists them in:
    •  Targeting resources for prevention more efficiently,
    • Providing an empirical foundation for inter-agency burglary reduction initiatives,
    • Identifying important data to be collected at an event, leading to efficiency gains in personal time; and,
    • Providing information on designing systems which incorporate hard(forensic) and soft (crime scene information) data, and police intelligence information.
    Burglary Data "GIS" plot. Data has been selected and loaded. The map is of the complete The Operational Command Unit (OCU). The Plot and Filter form (docked) shows the main plotting functions and a rubber band. Area has been selected for investigation. The plotted squares either indicate single victimizations or repeat victimizations, as shown in the legend.





    • According to Figure 11, "Offender Features" have been already mentioned as they were involved in the other police crime experiments.They also included a kernel estimate, and were the most computationally intense feature to calculate.

    • "Property Crime History" was simply the number of previous crime suffered by this premises. "Significant Property Stolen at the First Time" (45 categories) had been explored by the Police before our analysis, using a frequency count with "AUDIO/ RADIO" and JEWELRY being demonstrated to be the most significant variables.
    • The results of the Bayesian network (for instance calibration) are not presented, indeed this approach has never been validated. This is because it contained many arbitrary and was intended as a prototype "proof of principle" demonstration.
    • Although consideration able thought was given to how this algorithm in incorporated into decision support software, for use by police officers.

    Shelby Police Department's GIS allows officers to analyze crime patterns, assess crimes, and predict future incidents. A geographic visualization of crimes committed provides decision support.

    • For the Shelby, North Carolina, Police Department, CompStat is not only accurately painting a picture of what is happening, it is also providing concrete information to act on and has helped reduce crime significantly. Map-based tools have helped the department see exactly where crimes have been reported and respond with effective deployment of staff. The result is a dramatic decrease in incidents reported.
    • As  Conclusion, "The key to success when you're using any type of crime trend analysis or crime data analysis is to get that information in real time to the front-line troops," explains Ledford. "That's how we're evolving our process now". 

    • Based on my understandings, the police  want to more efficiently get that front-line officer, who is getting ready to hit the street, real-time information. The police  looking to train field sergeants on using the software directly so they can go in and analyze a type of crime or series of crimes by day or week or month or whatever they want."



    Credit to;
    Giles Oatley
    Centre for Adaptive Systems, University of Sunderland
    Brian Ewart
    Psychology Division, University of Sunderland
    John Zeleznikow
    School of Information Systems, Victoria University
    Sources Retrieved From,