SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Agile Approach is a software development methodology, where the development teams work
collaboratively and iteratively to develop software solutions on an incremental basis. Agile is generally
an alternative to traditional methodologies like the sequential approach and waterfall models. It is
generally used in situations where the requirements are changing on a more or less continuous basis
and there is more unpredictability.
Scrum is one of the popular agile approaches, which is used effectively by companies for software
delivery.
Instead of developing software using a sequential and rigidly defined approach, agile was developed
where software could be developed in a more collaborative and flexible manner, with the help of cross
functional teams. It is not always easy to get all requirements of the software while working using the
waterfall approach, since software is a field that s dynamic and ever changing.
Agile is characterised by the following:
- Customer collaboration
- Changing requirements
- Cross functional teams for development
- Simplicity
- Rapid response to change
- Continuous attention to great design and technicality
- Face to face conversation
Example:
For a database driven web product, duration of four weeks was set up, where there were teams
performing functions across (cross functional). Since all requirements were not known from the
beginning, this approach was preferred, because new methodologies and better design could be
created during development.
/////////////////////////////////
An Agile Organization is one that is quick in responding to changes in the marketplace or environment.
The ‘agile organization’ is also known as ‘the entrepreneurial organization’ and ‘the resilient
organization’ and this kind of organization focuses on the customer which calls for customized rather
than standardised offerings. A highly agile organization reacts successfully to the emergence of new
competitors, rapid advancements in technology and sudden shifts in overall market conditions. Agile
enterprises thrive in non-hierarchical organizations without a single point of control.
Characteristics of Agile Organizations:
 They are made up of self-aware individuals whose actions affect the organization as a whole
 They adapt a catalyst style of leadership by inspiring others without losing the cohesion within the entire
system
 Their organization is based on continuous learning from experiments
 They foster an open communication style facilitating collaboration and sharing
 Their governance is based upon long-term business value and adaptation
 Their members seek mastery in their respective skills
Dell is an agile software development corporation that embraces the concept of customized agile
response. The production line adapts according to the customer’s needs.
///////////////////////////////////////////
Ajax stands for Asynchronous JavaScript & XML. It is based on a group of web technologies like
HTML, CSS, XML, DOM and Java Script which updates the elements on a web page without requiring
to re-load the entire web page.
The technology works this way. When a user attempts to update a certain part of a web page (like
clicking a button or a link), the JavaScript connects with the server and requests for the data. The
server then processes the data requested for and sends back the response in XML format typically.
The JavaScript then receives an ‘asynchronous’ notification which is then processed and displayed
accordingly.
Among the technologies that are used in this regard, CSS (Cascading Style Sheets) is used for
presentation, XHTML (Extensible Hyper Text Markup Language) is used for content and DOM
(Document Object Model) is used to dynamic data display.
The advantage of using an Ajax application is that the communication with the server and
dataprocessing happens in the background because of which the entire web page is not re-
reloaded. This enables the user to work on other parts in the web page.
Since the time Ajax has come into use, a lot of developments have taken place like the data from the
server is not required to be in an XML format.
///////////////////////////////////////////////////
Application Programming interface (API) is a source code which acts as an interface between different
software to communicate with each other. It gives the protocol on any kind of communication that
happens from and to software from any other software, web or computer software. It is a library of
specifications regarding data structures, object classes and variables. Hence it can be compiled when
an application is built, unlike application binary interface.
It should not be confused with user interface, which is how a user interacts with the software. API
runs behind the user’s visual interface and has the sole function of acting as software-to-software
interface. For example, while paying phone bill through online portal, the user enters his phone
number and credit card details. The API of the telecommunication company sends the details entered
by the user to the credit card bank. There the details are verified and the response is sent back to the
telecommunication website, again through its API.
An API has resemblance with SaaS (Software as A Service), since a software can use API to link to
some second software to access facilities provided by that second software. This makes the first
software to avoid codes for the service provided by the second software. This is why a software
company makes its API public, so that other software developers could make their software
compatible.
////////////////////////////////////
Application tracking system is a software application designed to manage the recruitment within a
company. ATS is primarily used to provide a one point solution as well as central repository of
recruitment related data for a company.Some of the functions of ATS are posting job openings on the
company’s website, acquiring and managing data from the resumes, screening resume based on job-
person fit, sending interview emails to the shortlisted candidates, etc. This application saves a lot of
time of the individuals in managing the huge database, entering the data into the database, sorting,
matching profiles, etc further reducing the time required for hiring an individual by the company.
Reduction in time leads to reduction hiring costs. Other benefits include streamlining the entire hiring
process, paperless process, automating the entire process, creating a database for future recruitment
needs. These days a lot of small and medium size companies are using this ATS software. They are
also known as Talent Management System.
Eg – Zoho Recruit is an example of ATS software used by companies like Suite-Apps, Workforce
Manpower, etc
//////////////////////
Audit Trail is a record of the operations performed by a user on a system for the purpose of detecting
security violations, performance problems and flaws in applications. It is a documented log of
computer events, about an operating system, an application, or user activities. There can be several
audit trails each for a particular activity. Auditing is a process of reviewing and analyzing operational
and technical controls. These trails are used to support regular system operations so that
administrators can ensure that the security of the system is not harmed. They help accomplish several
security-related objectives including individual accountability, intrusion detection and problem
analysis.
Example: Audit Trails can be used to record the ‘before’ and ‘after’ versions of the records so that
actual changes by a user can be compared with the expected changes and the user can be made
accountable of his actions in case of any discrepancies.
A practical use can be in accounting, where the documentation of the detailed transactions can be
corresponding to ledger entries. This will ensure proper error-free accounting.
Such trails are highly permission intensive and strictly controlled by the administrators and cannot be
accessed by other users.
/////////////////
Authentication normally refers to the act of confirming the veracity of an attribute, data or identity.
In systems, authentication normally means verifying the identity of a person through his username
and password. Although sometimes used synonymously, authentication & authorization are different.
Authorization is the process of granting access to system objects to individuals based on their identity
& hence must follow authentication.
Authentication is simply to verify that the person is the one that he or she claims to be. It does not
say anything about the access rights & privileges that the person enjoys. Normally, authentication
precedes authorization although they seem to be combined sometimes. The process of authentication
makes use of digital signature involving primary and secondary keys. There are basically three
different techniques for authentication. The first type accepts proof of identity from a credible person
who has the evidence of the proof. The second type of authentication compares the attributes of the
object with the known attributes of objects of similar origin. The third type of authentication accepts
documentation or other known external affirmations.
Authentication can also be a two-factor authentication when elements with two factors are required for
authentication. For example, an authentication may need a user pin and password. Authentication
may also happen of a product using a secure key storage device. Authentication of information
content can also happen in terms of factual verification and video authentication.
/////////////////////////////////
Brute Force is a problem solving mechanism that takes into account all the possible solutions to the
existing problem and then finalizing the most efficient problem.
It does not take into account any special algorithm which can eliminate a few options tactfully. No
shortcuts are taken to reach to the optimal solution.
Example:
In case of travelling sales man problem, the brute force programming will find the distance travelled
through all the possible paths.
After doing so it will then display the one with least distance. It will not use additional programs to cut
short a few paths which do not come into the shortest paths.
//////////////////////////////
BULLETIN BOARD SYSTEM
The BBS is a communication tool primarily used in corporate world and is similar to intranet which
facilitates the messing, mail and a platform for online discussion forum as an individual and also a
group function. It is computer system running software through which a user can log in and access the
main system through terminal software and can also use it for uploading or downloading files/software
apart from networking functions. BBS is generally an email and conferencing based system and is
open to all community legal centres (CLCs) and its employees and is provided by National Association
of Community Legal Centres (NACLC).
Example:
NACLC provides each of the employees with a free BBS account in order to access individual folder or
conference, mailbox and serves a forum to post important discussions and notices to a large group of
people. It is usually monitored by a BBS administrator and has variety of enhanced features like group
calendar etc.
/////////////////////
BUSINESS PROCESS MANAGEMENT
Business was previously considered as constituted of distinct elements of Process Modelling, Workflow,
Simulation, EAI and finally business integration. However BPM is a holistic process of management of
all these distinct units in a systematic manner through constant closed looping of all the feedbacks
generated in order to deliver the desired value to the customer.
Business Process Management is the systematic approach to continuously improve the company’s
business processes increase business effectiveness and efficiency while striving for innovation,
flexibility and integration by alignment with strategic goals, operations and end-to-end processes that
companies perform to create value for customers. BPM should not be confused with Business Process
Reengineering which requires a complete redevelopment of processes in a company whereas BPM
develops on existing processes and through constant feedback and refining results in better processes.
While practicing BPM, Business Process Initiative (BPI) methods can be employed for specific
improvement. Hence, just the use of BPI methodologies does not mean that the organization is
practicing BPM. The main steps followed in a BPM are illustrated in the following diagram:
After the Business Processes and strategy is laid out, the analysis yields various improvements in the
existing processes and design of new process for betterment of the organization.
For example: BPM helps Customer Relationship Management personals to solve problems more
efficiently as they are provided with most up to date information. The BPM solution integrates
marketing, sales and support systems of the company and organizes and automates activities like new
customer acquisition, service call management, complaint resolution, fraud assessment , credit
approvals etc.

Weitere ähnliche Inhalte

Was ist angesagt?

ColbyBackesPortfolio_HighRes
ColbyBackesPortfolio_HighResColbyBackesPortfolio_HighRes
ColbyBackesPortfolio_HighResColby Backes
 
M.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsM.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsVijay Karan
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
IRJET - Application Development Approach to Transform Traditional Web Applica...
IRJET - Application Development Approach to Transform Traditional Web Applica...IRJET - Application Development Approach to Transform Traditional Web Applica...
IRJET - Application Development Approach to Transform Traditional Web Applica...IRJET Journal
 
SIF IDM Profile Introduction
SIF IDM Profile IntroductionSIF IDM Profile Introduction
SIF IDM Profile IntroductionRichard Tong
 
V labs-assignment-1-sepm
V labs-assignment-1-sepmV labs-assignment-1-sepm
V labs-assignment-1-sepmSayanChaudhuri5
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst WaltherCardinaleWay Mazda
 
Attribute based access control
Attribute based access controlAttribute based access control
Attribute based access controlElimity
 
Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0John Bernhard
 
Role-Based Access Control
Role-Based Access ControlRole-Based Access Control
Role-Based Access ControlEmpowerID
 
Manjunatha Resume 7+ years Experience
Manjunatha Resume 7+ years ExperienceManjunatha Resume 7+ years Experience
Manjunatha Resume 7+ years Experiencemanjunathasb
 
Unit 3-SOA Technologies
Unit 3-SOA TechnologiesUnit 3-SOA Technologies
Unit 3-SOA Technologiesssuser3a47cb
 
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceSIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceRichard Tong
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
Identity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionIdentity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionAidy Tificate
 
Unit 4-SOA governance
Unit 4-SOA governanceUnit 4-SOA governance
Unit 4-SOA governancessuser3a47cb
 

Was ist angesagt? (20)

ColbyBackesPortfolio_HighRes
ColbyBackesPortfolio_HighResColbyBackesPortfolio_HighRes
ColbyBackesPortfolio_HighRes
 
M.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsM.E Computer Science Server Computing Projects
M.E Computer Science Server Computing Projects
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
IRJET - Application Development Approach to Transform Traditional Web Applica...
IRJET - Application Development Approach to Transform Traditional Web Applica...IRJET - Application Development Approach to Transform Traditional Web Applica...
IRJET - Application Development Approach to Transform Traditional Web Applica...
 
IDM Introduction
IDM IntroductionIDM Introduction
IDM Introduction
 
Surya_CV
Surya_CVSurya_CV
Surya_CV
 
SIF IDM Profile Introduction
SIF IDM Profile IntroductionSIF IDM Profile Introduction
SIF IDM Profile Introduction
 
V labs-assignment-1-sepm
V labs-assignment-1-sepmV labs-assignment-1-sepm
V labs-assignment-1-sepm
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther
 
Attribute based access control
Attribute based access controlAttribute based access control
Attribute based access control
 
Abac and the evolution of access control
Abac and the evolution of access controlAbac and the evolution of access control
Abac and the evolution of access control
 
Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0
 
Role-Based Access Control
Role-Based Access ControlRole-Based Access Control
Role-Based Access Control
 
Manjunatha Resume 7+ years Experience
Manjunatha Resume 7+ years ExperienceManjunatha Resume 7+ years Experience
Manjunatha Resume 7+ years Experience
 
Venkataraman Raghunathan
Venkataraman RaghunathanVenkataraman Raghunathan
Venkataraman Raghunathan
 
Unit 3-SOA Technologies
Unit 3-SOA TechnologiesUnit 3-SOA Technologies
Unit 3-SOA Technologies
 
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceSIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
Identity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionIdentity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introduction
 
Unit 4-SOA governance
Unit 4-SOA governanceUnit 4-SOA governance
Unit 4-SOA governance
 

Andere mochten auch

UVL ценовое предложение
UVL ценовое предложениеUVL ценовое предложение
UVL ценовое предложениеst_andrew
 
Mastering the Dark Art of Fluid Layout
Mastering the Dark Art of Fluid LayoutMastering the Dark Art of Fluid Layout
Mastering the Dark Art of Fluid Layoutartequalswork
 
Jasig rubyon rails
Jasig rubyon railsJasig rubyon rails
Jasig rubyon rails_zaMmer_
 
Time management training
Time management trainingTime management training
Time management trainingRGYouth
 
G+£+çl+£ work safety summer launch 12
G+£+çl+£ work safety summer launch 12G+£+çl+£ work safety summer launch 12
G+£+çl+£ work safety summer launch 12onurpra417
 
Jasig rubyon rails
Jasig rubyon railsJasig rubyon rails
Jasig rubyon rails_zaMmer_
 
Teaching seminar on pornography - RCCG Royal Generation Parish , Lekki, Lagos...
Teaching seminar on pornography - RCCG Royal Generation Parish , Lekki, Lagos...Teaching seminar on pornography - RCCG Royal Generation Parish , Lekki, Lagos...
Teaching seminar on pornography - RCCG Royal Generation Parish , Lekki, Lagos...RGYouth
 
Managing behavioural conflict workers training
Managing behavioural conflict workers trainingManaging behavioural conflict workers training
Managing behavioural conflict workers trainingRGYouth
 

Andere mochten auch (11)

Survey 1
Survey 1Survey 1
Survey 1
 
UVL ценовое предложение
UVL ценовое предложениеUVL ценовое предложение
UVL ценовое предложение
 
Mastering the Dark Art of Fluid Layout
Mastering the Dark Art of Fluid LayoutMastering the Dark Art of Fluid Layout
Mastering the Dark Art of Fluid Layout
 
Jasig rubyon rails
Jasig rubyon railsJasig rubyon rails
Jasig rubyon rails
 
Time management training
Time management trainingTime management training
Time management training
 
G+£+çl+£ work safety summer launch 12
G+£+çl+£ work safety summer launch 12G+£+çl+£ work safety summer launch 12
G+£+çl+£ work safety summer launch 12
 
Jasig rubyon rails
Jasig rubyon railsJasig rubyon rails
Jasig rubyon rails
 
Leyes gestalt
Leyes gestaltLeyes gestalt
Leyes gestalt
 
Manipulating files with the file system task using SSIS
Manipulating files with the file system task using SSISManipulating files with the file system task using SSIS
Manipulating files with the file system task using SSIS
 
Teaching seminar on pornography - RCCG Royal Generation Parish , Lekki, Lagos...
Teaching seminar on pornography - RCCG Royal Generation Parish , Lekki, Lagos...Teaching seminar on pornography - RCCG Royal Generation Parish , Lekki, Lagos...
Teaching seminar on pornography - RCCG Royal Generation Parish , Lekki, Lagos...
 
Managing behavioural conflict workers training
Managing behavioural conflict workers trainingManaging behavioural conflict workers training
Managing behavioural conflict workers training
 

Ähnlich wie project on Agile approach

ISTQB Agile Tester - Agile Test Tools
ISTQB Agile Tester - Agile Test ToolsISTQB Agile Tester - Agile Test Tools
ISTQB Agile Tester - Agile Test ToolsMoataz Nabil
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringConvetit
 
term paper for cbd models
term paper for cbd modelsterm paper for cbd models
term paper for cbd modelsSukhdeep Singh
 
Test automation: Are Enterprises ready to bite the bullet?
Test automation: Are Enterprises ready to bite the bullet?Test automation: Are Enterprises ready to bite the bullet?
Test automation: Are Enterprises ready to bite the bullet?Aspire Systems
 
3 Approaches for Integrated ALM - A Case for ALM Platform - Whitepaper
3 Approaches for Integrated ALM - A Case for ALM Platform - Whitepaper3 Approaches for Integrated ALM - A Case for ALM Platform - Whitepaper
3 Approaches for Integrated ALM - A Case for ALM Platform - WhitepaperKovair
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideHCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerHCLSoftware
 
The Significant role of event driven apps in software development
The Significant role of event driven apps in software development					The Significant role of event driven apps in software development
The Significant role of event driven apps in software development Shelly Megan
 
3 Approaches to Integrated ALM, A case for ALM Platform
3 Approaches to Integrated ALM, A case for ALM Platform3 Approaches to Integrated ALM, A case for ALM Platform
3 Approaches to Integrated ALM, A case for ALM PlatformKovair
 
Best Practices for Full-Stack Development: A Comprehensive Guide
Best Practices for Full-Stack Development: A Comprehensive GuideBest Practices for Full-Stack Development: A Comprehensive Guide
Best Practices for Full-Stack Development: A Comprehensive Guidepriyanka rajput
 
Best Practices for Full-Stack Development_ A Comprehensive Guide.pdf
Best Practices for Full-Stack Development_ A Comprehensive Guide.pdfBest Practices for Full-Stack Development_ A Comprehensive Guide.pdf
Best Practices for Full-Stack Development_ A Comprehensive Guide.pdfUncodemy
 
Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxwhitneyleman54422
 

Ähnlich wie project on Agile approach (20)

ISTQB Agile Tester - Agile Test Tools
ISTQB Agile Tester - Agile Test ToolsISTQB Agile Tester - Agile Test Tools
ISTQB Agile Tester - Agile Test Tools
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Middleware – Its Types, Architecture, and Benefits.docx
Middleware – Its Types, Architecture, and Benefits.docxMiddleware – Its Types, Architecture, and Benefits.docx
Middleware – Its Types, Architecture, and Benefits.docx
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
 
term paper for cbd models
term paper for cbd modelsterm paper for cbd models
term paper for cbd models
 
Test automation: Are Enterprises ready to bite the bullet?
Test automation: Are Enterprises ready to bite the bullet?Test automation: Are Enterprises ready to bite the bullet?
Test automation: Are Enterprises ready to bite the bullet?
 
Sdpl1
Sdpl1Sdpl1
Sdpl1
 
3 Approaches for Integrated ALM - A Case for ALM Platform - Whitepaper
3 Approaches for Integrated ALM - A Case for ALM Platform - Whitepaper3 Approaches for Integrated ALM - A Case for ALM Platform - Whitepaper
3 Approaches for Integrated ALM - A Case for ALM Platform - Whitepaper
 
Session3
Session3Session3
Session3
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
BA Resume
BA  ResumeBA  Resume
BA Resume
 
Fareeha Resume
Fareeha ResumeFareeha Resume
Fareeha Resume
 
The Significant role of event driven apps in software development
The Significant role of event driven apps in software development					The Significant role of event driven apps in software development
The Significant role of event driven apps in software development
 
3 Approaches to Integrated ALM, A case for ALM Platform
3 Approaches to Integrated ALM, A case for ALM Platform3 Approaches to Integrated ALM, A case for ALM Platform
3 Approaches to Integrated ALM, A case for ALM Platform
 
Best Practices for Full-Stack Development: A Comprehensive Guide
Best Practices for Full-Stack Development: A Comprehensive GuideBest Practices for Full-Stack Development: A Comprehensive Guide
Best Practices for Full-Stack Development: A Comprehensive Guide
 
Best Practices for Full-Stack Development_ A Comprehensive Guide.pdf
Best Practices for Full-Stack Development_ A Comprehensive Guide.pdfBest Practices for Full-Stack Development_ A Comprehensive Guide.pdf
Best Practices for Full-Stack Development_ A Comprehensive Guide.pdf
 
Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docx
 

Kürzlich hochgeladen

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Kürzlich hochgeladen (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

project on Agile approach

  • 1. Agile Approach is a software development methodology, where the development teams work collaboratively and iteratively to develop software solutions on an incremental basis. Agile is generally an alternative to traditional methodologies like the sequential approach and waterfall models. It is generally used in situations where the requirements are changing on a more or less continuous basis and there is more unpredictability. Scrum is one of the popular agile approaches, which is used effectively by companies for software delivery. Instead of developing software using a sequential and rigidly defined approach, agile was developed where software could be developed in a more collaborative and flexible manner, with the help of cross functional teams. It is not always easy to get all requirements of the software while working using the waterfall approach, since software is a field that s dynamic and ever changing. Agile is characterised by the following: - Customer collaboration - Changing requirements - Cross functional teams for development - Simplicity - Rapid response to change - Continuous attention to great design and technicality - Face to face conversation Example: For a database driven web product, duration of four weeks was set up, where there were teams performing functions across (cross functional). Since all requirements were not known from the beginning, this approach was preferred, because new methodologies and better design could be created during development. ///////////////////////////////// An Agile Organization is one that is quick in responding to changes in the marketplace or environment. The ‘agile organization’ is also known as ‘the entrepreneurial organization’ and ‘the resilient organization’ and this kind of organization focuses on the customer which calls for customized rather than standardised offerings. A highly agile organization reacts successfully to the emergence of new competitors, rapid advancements in technology and sudden shifts in overall market conditions. Agile enterprises thrive in non-hierarchical organizations without a single point of control. Characteristics of Agile Organizations:
  • 2.  They are made up of self-aware individuals whose actions affect the organization as a whole  They adapt a catalyst style of leadership by inspiring others without losing the cohesion within the entire system  Their organization is based on continuous learning from experiments  They foster an open communication style facilitating collaboration and sharing  Their governance is based upon long-term business value and adaptation  Their members seek mastery in their respective skills Dell is an agile software development corporation that embraces the concept of customized agile response. The production line adapts according to the customer’s needs. /////////////////////////////////////////// Ajax stands for Asynchronous JavaScript & XML. It is based on a group of web technologies like HTML, CSS, XML, DOM and Java Script which updates the elements on a web page without requiring to re-load the entire web page. The technology works this way. When a user attempts to update a certain part of a web page (like clicking a button or a link), the JavaScript connects with the server and requests for the data. The server then processes the data requested for and sends back the response in XML format typically. The JavaScript then receives an ‘asynchronous’ notification which is then processed and displayed accordingly. Among the technologies that are used in this regard, CSS (Cascading Style Sheets) is used for presentation, XHTML (Extensible Hyper Text Markup Language) is used for content and DOM (Document Object Model) is used to dynamic data display. The advantage of using an Ajax application is that the communication with the server and dataprocessing happens in the background because of which the entire web page is not re- reloaded. This enables the user to work on other parts in the web page. Since the time Ajax has come into use, a lot of developments have taken place like the data from the server is not required to be in an XML format. /////////////////////////////////////////////////// Application Programming interface (API) is a source code which acts as an interface between different software to communicate with each other. It gives the protocol on any kind of communication that happens from and to software from any other software, web or computer software. It is a library of
  • 3. specifications regarding data structures, object classes and variables. Hence it can be compiled when an application is built, unlike application binary interface. It should not be confused with user interface, which is how a user interacts with the software. API runs behind the user’s visual interface and has the sole function of acting as software-to-software interface. For example, while paying phone bill through online portal, the user enters his phone number and credit card details. The API of the telecommunication company sends the details entered by the user to the credit card bank. There the details are verified and the response is sent back to the telecommunication website, again through its API. An API has resemblance with SaaS (Software as A Service), since a software can use API to link to some second software to access facilities provided by that second software. This makes the first software to avoid codes for the service provided by the second software. This is why a software company makes its API public, so that other software developers could make their software compatible. //////////////////////////////////// Application tracking system is a software application designed to manage the recruitment within a company. ATS is primarily used to provide a one point solution as well as central repository of recruitment related data for a company.Some of the functions of ATS are posting job openings on the company’s website, acquiring and managing data from the resumes, screening resume based on job- person fit, sending interview emails to the shortlisted candidates, etc. This application saves a lot of time of the individuals in managing the huge database, entering the data into the database, sorting, matching profiles, etc further reducing the time required for hiring an individual by the company. Reduction in time leads to reduction hiring costs. Other benefits include streamlining the entire hiring process, paperless process, automating the entire process, creating a database for future recruitment needs. These days a lot of small and medium size companies are using this ATS software. They are also known as Talent Management System. Eg – Zoho Recruit is an example of ATS software used by companies like Suite-Apps, Workforce Manpower, etc ////////////////////// Audit Trail is a record of the operations performed by a user on a system for the purpose of detecting security violations, performance problems and flaws in applications. It is a documented log of computer events, about an operating system, an application, or user activities. There can be several audit trails each for a particular activity. Auditing is a process of reviewing and analyzing operational and technical controls. These trails are used to support regular system operations so that administrators can ensure that the security of the system is not harmed. They help accomplish several security-related objectives including individual accountability, intrusion detection and problem analysis.
  • 4. Example: Audit Trails can be used to record the ‘before’ and ‘after’ versions of the records so that actual changes by a user can be compared with the expected changes and the user can be made accountable of his actions in case of any discrepancies. A practical use can be in accounting, where the documentation of the detailed transactions can be corresponding to ledger entries. This will ensure proper error-free accounting. Such trails are highly permission intensive and strictly controlled by the administrators and cannot be accessed by other users. ///////////////// Authentication normally refers to the act of confirming the veracity of an attribute, data or identity. In systems, authentication normally means verifying the identity of a person through his username and password. Although sometimes used synonymously, authentication & authorization are different. Authorization is the process of granting access to system objects to individuals based on their identity & hence must follow authentication. Authentication is simply to verify that the person is the one that he or she claims to be. It does not say anything about the access rights & privileges that the person enjoys. Normally, authentication precedes authorization although they seem to be combined sometimes. The process of authentication makes use of digital signature involving primary and secondary keys. There are basically three different techniques for authentication. The first type accepts proof of identity from a credible person who has the evidence of the proof. The second type of authentication compares the attributes of the object with the known attributes of objects of similar origin. The third type of authentication accepts documentation or other known external affirmations. Authentication can also be a two-factor authentication when elements with two factors are required for authentication. For example, an authentication may need a user pin and password. Authentication may also happen of a product using a secure key storage device. Authentication of information content can also happen in terms of factual verification and video authentication. ///////////////////////////////// Brute Force is a problem solving mechanism that takes into account all the possible solutions to the existing problem and then finalizing the most efficient problem. It does not take into account any special algorithm which can eliminate a few options tactfully. No shortcuts are taken to reach to the optimal solution. Example: In case of travelling sales man problem, the brute force programming will find the distance travelled through all the possible paths.
  • 5. After doing so it will then display the one with least distance. It will not use additional programs to cut short a few paths which do not come into the shortest paths. ////////////////////////////// BULLETIN BOARD SYSTEM The BBS is a communication tool primarily used in corporate world and is similar to intranet which facilitates the messing, mail and a platform for online discussion forum as an individual and also a group function. It is computer system running software through which a user can log in and access the main system through terminal software and can also use it for uploading or downloading files/software apart from networking functions. BBS is generally an email and conferencing based system and is open to all community legal centres (CLCs) and its employees and is provided by National Association of Community Legal Centres (NACLC). Example: NACLC provides each of the employees with a free BBS account in order to access individual folder or conference, mailbox and serves a forum to post important discussions and notices to a large group of people. It is usually monitored by a BBS administrator and has variety of enhanced features like group calendar etc. ///////////////////// BUSINESS PROCESS MANAGEMENT Business was previously considered as constituted of distinct elements of Process Modelling, Workflow, Simulation, EAI and finally business integration. However BPM is a holistic process of management of all these distinct units in a systematic manner through constant closed looping of all the feedbacks generated in order to deliver the desired value to the customer. Business Process Management is the systematic approach to continuously improve the company’s business processes increase business effectiveness and efficiency while striving for innovation, flexibility and integration by alignment with strategic goals, operations and end-to-end processes that companies perform to create value for customers. BPM should not be confused with Business Process Reengineering which requires a complete redevelopment of processes in a company whereas BPM develops on existing processes and through constant feedback and refining results in better processes. While practicing BPM, Business Process Initiative (BPI) methods can be employed for specific improvement. Hence, just the use of BPI methodologies does not mean that the organization is practicing BPM. The main steps followed in a BPM are illustrated in the following diagram:
  • 6. After the Business Processes and strategy is laid out, the analysis yields various improvements in the existing processes and design of new process for betterment of the organization. For example: BPM helps Customer Relationship Management personals to solve problems more efficiently as they are provided with most up to date information. The BPM solution integrates marketing, sales and support systems of the company and organizes and automates activities like new customer acquisition, service call management, complaint resolution, fraud assessment , credit approvals etc.