BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
project on Agile approach
1. Agile Approach is a software development methodology, where the development teams work
collaboratively and iteratively to develop software solutions on an incremental basis. Agile is generally
an alternative to traditional methodologies like the sequential approach and waterfall models. It is
generally used in situations where the requirements are changing on a more or less continuous basis
and there is more unpredictability.
Scrum is one of the popular agile approaches, which is used effectively by companies for software
delivery.
Instead of developing software using a sequential and rigidly defined approach, agile was developed
where software could be developed in a more collaborative and flexible manner, with the help of cross
functional teams. It is not always easy to get all requirements of the software while working using the
waterfall approach, since software is a field that s dynamic and ever changing.
Agile is characterised by the following:
- Customer collaboration
- Changing requirements
- Cross functional teams for development
- Simplicity
- Rapid response to change
- Continuous attention to great design and technicality
- Face to face conversation
Example:
For a database driven web product, duration of four weeks was set up, where there were teams
performing functions across (cross functional). Since all requirements were not known from the
beginning, this approach was preferred, because new methodologies and better design could be
created during development.
/////////////////////////////////
An Agile Organization is one that is quick in responding to changes in the marketplace or environment.
The ‘agile organization’ is also known as ‘the entrepreneurial organization’ and ‘the resilient
organization’ and this kind of organization focuses on the customer which calls for customized rather
than standardised offerings. A highly agile organization reacts successfully to the emergence of new
competitors, rapid advancements in technology and sudden shifts in overall market conditions. Agile
enterprises thrive in non-hierarchical organizations without a single point of control.
Characteristics of Agile Organizations:
2. They are made up of self-aware individuals whose actions affect the organization as a whole
They adapt a catalyst style of leadership by inspiring others without losing the cohesion within the entire
system
Their organization is based on continuous learning from experiments
They foster an open communication style facilitating collaboration and sharing
Their governance is based upon long-term business value and adaptation
Their members seek mastery in their respective skills
Dell is an agile software development corporation that embraces the concept of customized agile
response. The production line adapts according to the customer’s needs.
///////////////////////////////////////////
Ajax stands for Asynchronous JavaScript & XML. It is based on a group of web technologies like
HTML, CSS, XML, DOM and Java Script which updates the elements on a web page without requiring
to re-load the entire web page.
The technology works this way. When a user attempts to update a certain part of a web page (like
clicking a button or a link), the JavaScript connects with the server and requests for the data. The
server then processes the data requested for and sends back the response in XML format typically.
The JavaScript then receives an ‘asynchronous’ notification which is then processed and displayed
accordingly.
Among the technologies that are used in this regard, CSS (Cascading Style Sheets) is used for
presentation, XHTML (Extensible Hyper Text Markup Language) is used for content and DOM
(Document Object Model) is used to dynamic data display.
The advantage of using an Ajax application is that the communication with the server and
dataprocessing happens in the background because of which the entire web page is not re-
reloaded. This enables the user to work on other parts in the web page.
Since the time Ajax has come into use, a lot of developments have taken place like the data from the
server is not required to be in an XML format.
///////////////////////////////////////////////////
Application Programming interface (API) is a source code which acts as an interface between different
software to communicate with each other. It gives the protocol on any kind of communication that
happens from and to software from any other software, web or computer software. It is a library of
3. specifications regarding data structures, object classes and variables. Hence it can be compiled when
an application is built, unlike application binary interface.
It should not be confused with user interface, which is how a user interacts with the software. API
runs behind the user’s visual interface and has the sole function of acting as software-to-software
interface. For example, while paying phone bill through online portal, the user enters his phone
number and credit card details. The API of the telecommunication company sends the details entered
by the user to the credit card bank. There the details are verified and the response is sent back to the
telecommunication website, again through its API.
An API has resemblance with SaaS (Software as A Service), since a software can use API to link to
some second software to access facilities provided by that second software. This makes the first
software to avoid codes for the service provided by the second software. This is why a software
company makes its API public, so that other software developers could make their software
compatible.
////////////////////////////////////
Application tracking system is a software application designed to manage the recruitment within a
company. ATS is primarily used to provide a one point solution as well as central repository of
recruitment related data for a company.Some of the functions of ATS are posting job openings on the
company’s website, acquiring and managing data from the resumes, screening resume based on job-
person fit, sending interview emails to the shortlisted candidates, etc. This application saves a lot of
time of the individuals in managing the huge database, entering the data into the database, sorting,
matching profiles, etc further reducing the time required for hiring an individual by the company.
Reduction in time leads to reduction hiring costs. Other benefits include streamlining the entire hiring
process, paperless process, automating the entire process, creating a database for future recruitment
needs. These days a lot of small and medium size companies are using this ATS software. They are
also known as Talent Management System.
Eg – Zoho Recruit is an example of ATS software used by companies like Suite-Apps, Workforce
Manpower, etc
//////////////////////
Audit Trail is a record of the operations performed by a user on a system for the purpose of detecting
security violations, performance problems and flaws in applications. It is a documented log of
computer events, about an operating system, an application, or user activities. There can be several
audit trails each for a particular activity. Auditing is a process of reviewing and analyzing operational
and technical controls. These trails are used to support regular system operations so that
administrators can ensure that the security of the system is not harmed. They help accomplish several
security-related objectives including individual accountability, intrusion detection and problem
analysis.
4. Example: Audit Trails can be used to record the ‘before’ and ‘after’ versions of the records so that
actual changes by a user can be compared with the expected changes and the user can be made
accountable of his actions in case of any discrepancies.
A practical use can be in accounting, where the documentation of the detailed transactions can be
corresponding to ledger entries. This will ensure proper error-free accounting.
Such trails are highly permission intensive and strictly controlled by the administrators and cannot be
accessed by other users.
/////////////////
Authentication normally refers to the act of confirming the veracity of an attribute, data or identity.
In systems, authentication normally means verifying the identity of a person through his username
and password. Although sometimes used synonymously, authentication & authorization are different.
Authorization is the process of granting access to system objects to individuals based on their identity
& hence must follow authentication.
Authentication is simply to verify that the person is the one that he or she claims to be. It does not
say anything about the access rights & privileges that the person enjoys. Normally, authentication
precedes authorization although they seem to be combined sometimes. The process of authentication
makes use of digital signature involving primary and secondary keys. There are basically three
different techniques for authentication. The first type accepts proof of identity from a credible person
who has the evidence of the proof. The second type of authentication compares the attributes of the
object with the known attributes of objects of similar origin. The third type of authentication accepts
documentation or other known external affirmations.
Authentication can also be a two-factor authentication when elements with two factors are required for
authentication. For example, an authentication may need a user pin and password. Authentication
may also happen of a product using a secure key storage device. Authentication of information
content can also happen in terms of factual verification and video authentication.
/////////////////////////////////
Brute Force is a problem solving mechanism that takes into account all the possible solutions to the
existing problem and then finalizing the most efficient problem.
It does not take into account any special algorithm which can eliminate a few options tactfully. No
shortcuts are taken to reach to the optimal solution.
Example:
In case of travelling sales man problem, the brute force programming will find the distance travelled
through all the possible paths.
5. After doing so it will then display the one with least distance. It will not use additional programs to cut
short a few paths which do not come into the shortest paths.
//////////////////////////////
BULLETIN BOARD SYSTEM
The BBS is a communication tool primarily used in corporate world and is similar to intranet which
facilitates the messing, mail and a platform for online discussion forum as an individual and also a
group function. It is computer system running software through which a user can log in and access the
main system through terminal software and can also use it for uploading or downloading files/software
apart from networking functions. BBS is generally an email and conferencing based system and is
open to all community legal centres (CLCs) and its employees and is provided by National Association
of Community Legal Centres (NACLC).
Example:
NACLC provides each of the employees with a free BBS account in order to access individual folder or
conference, mailbox and serves a forum to post important discussions and notices to a large group of
people. It is usually monitored by a BBS administrator and has variety of enhanced features like group
calendar etc.
/////////////////////
BUSINESS PROCESS MANAGEMENT
Business was previously considered as constituted of distinct elements of Process Modelling, Workflow,
Simulation, EAI and finally business integration. However BPM is a holistic process of management of
all these distinct units in a systematic manner through constant closed looping of all the feedbacks
generated in order to deliver the desired value to the customer.
Business Process Management is the systematic approach to continuously improve the company’s
business processes increase business effectiveness and efficiency while striving for innovation,
flexibility and integration by alignment with strategic goals, operations and end-to-end processes that
companies perform to create value for customers. BPM should not be confused with Business Process
Reengineering which requires a complete redevelopment of processes in a company whereas BPM
develops on existing processes and through constant feedback and refining results in better processes.
While practicing BPM, Business Process Initiative (BPI) methods can be employed for specific
improvement. Hence, just the use of BPI methodologies does not mean that the organization is
practicing BPM. The main steps followed in a BPM are illustrated in the following diagram:
6. After the Business Processes and strategy is laid out, the analysis yields various improvements in the
existing processes and design of new process for betterment of the organization.
For example: BPM helps Customer Relationship Management personals to solve problems more
efficiently as they are provided with most up to date information. The BPM solution integrates
marketing, sales and support systems of the company and organizes and automates activities like new
customer acquisition, service call management, complaint resolution, fraud assessment , credit
approvals etc.