Skip to main content

Posts

NoSQL Databases

Recent posts

What Is BIG DATA? Why?

The Simple Meaning of BIG DATA is, large amount/volume of structured and unstructured data, data which are unable to kept/stored on one machine. In 2012 Gartner (an american research and advisory firm ) introduced 3Vs which describes Big Data. Volume - The amount of generated stored data.  Velocity - This term explains the speed at which the data is generated and processed.(the speed which Big data should be analysed). Variety - Data will have different kind of types; structured, unstructured. Also by adding two more characteristics this can be called as 5Vs       4. Variability - Inconsistency of the data       5. Veracity - Uncertainty of the data   _________________________________________________________ WHY?   For a moment think that you have a cloth shop. If you can track all your previous data of your business, customers, trends and then apply analytics to that and get som...

SSD_OAuth 2.0

This blog post will give a brief description about OAuth 2.0 What is OAuth 2.0?    OAuth 2.0 is a (Open Authorization) is a framework that give users the ability to grant access to their information stored in one place, from another place. To understand what is OAuth first we need to understand the main roles, grant types and the types of tokens. Roles    Roles are used to define and separate entities which are involved in a request. Mainly there are four roles. The Client - The client is the third party application which tries t access the user account. This can be either a website or a application. The Resource Server - Resource server is the place which stores the user's information The Authorization Server - This is the server which approves or denies the request. The authorization server produces the access token to the client. The Resource Owner - Resource owner grants access to the requested data. Grant Types     Grant...

SSD

Cross Site Request Forgery             Cross-Site Request Forgery (CSRF) is an assault that powers an end client to execute undesirable activities on a web application in which they're at present verified. CSRF assaults particularly target state-evolving demands, not robbery of information, since the assailant has no real way to see the reaction to the produced demand. With a little help of social designing, (for example, sending a connection through email or talk), an attacker may trap the clients of a web application into executing activities of the assailant's picking. On the off chance that the injured individual is a typical client, a fruitful CSRF assault can compel the client to perform state changing solicitations like exchanging reserves, changing their email address, ect. On the off chance that the unfortunate casualty is a managerial record,CSRF can compromise the entire web application. What is CSRF and how it works ?     A...

EclEmma for code coverage

What is code coverage?                  Code coverage analysis is a structural testing technique (AKA glass box testing and white box testing). Structural testing is also called path testing since you choose test cases that cause paths to be taken through the structure of the program.  Code coverage is a measure used to describe the degree to which the source code  of a program  is executed when a particular test suits  runs. A program with high code coverage, measured as a percentage, has had more of its source code executed during testing which suggests it has a lower chance of containing undetected software bugs  compared to a program with low code coverage. What is EclEmma? This is a plugin for Eclipse which will shows you the coverage of a specific test set. You can run these on you Junit tests to check which statements are executed and which are not. there will be three main colors after you run this...

Online Bug Tracking System

TRELLO While I was doing my SLIIT SA Assignment I found a cool online application for Bug Tracking. This keeps track of the Bugs which were identified, you can assign the task to a developer, whether it was solved, by whom etc. It even enables you to attach documents, labels, comment and these things are getting updated instantly. Its a User Friendly application which is totally free. The link is - https://trello.com/ Also if you want a guide please check the below link - https://www.youtube.com/watch?v=xky48zyL9iA  

Overview of the Second Year ITP project

While I was doing this project I learnt a lot which are related to the coding and also how to work as a team. I was the team leader and I had to communicate / guide seven members while I was working. From the initial  report until the final report I had to draft them. I had to draw the ER diagram, Class Diagram, Use Case Diagrams,  Use Case Scenarios, State Chart Diagrams, Class Diagrams. Actually even finishing this project was a real stress at the end we were manged to finish it with a good output with the help of some team members.