Top Application Development Terms Fifteen essential definitions you need to know

Size: px
Start display at page:

Download "Top Application Development Terms Fifteen essential definitions you need to know"

Transcription

1 Top Fifteen essential definitions you need to know

2 Fifteen Essential We know it s not always easy to keep up-to-date with the latest application development terms. That s why we have put together the top fifteen terms and definitions that you and your peers need to know. What is (Program Evaluation Review Technique)? A is a project management tool used to schedule, organize, and coordinate tasks within a project. PERT stands for Program Evaluation Review Technique, a methodology developed by the U.S. Navy in the 1950s to manage the Polaris submarine missile program. A similar methodology, the Critical Path Method (CPM) was developed for project management in the private sector at about the same time. Page 1 of 16

3 Fifteen Essential A presents a graphic illustration of a project as a network diagram consisting of numbered nodes (either circles or rectangles) representing events, or milestones in the project linked by labeled vectors (directional lines) representing tasks in the project. The direction of the arrows on the lines indicates the sequence of tasks. In the diagram, for example, the tasks between nodes 1, 2, 4, 8, and 10 must be completed in sequence. These are called dependent or serial tasks. The tasks between nodes 1 and 2, and nodes 1 and 3 are not dependent on the completion of one to start the other and can be undertaken simultaneously. These tasks are called parallel or concurrent tasks. Tasks that must be completed in sequence but that don't require resources or completion time are considered to have event dependency. These are represented by dotted lines with arrows and are called dummy activities. For example, the dashed arrow linking nodes 6 and 9 indicates that the system files must be converted before the user test can take place, but that the resources and time required to prepare for the user test (writing the user manual and user training) are on another path. Numbers on the opposite sides of the vectors indicate the time allotted for the task. The is sometimes preferred over the Gantt chart, another popular project management charting method, because it clearly illustrates task dependencies. On the other hand, the can be much more difficult to interpret, especially on complex projects. Frequently, project managers use both techniques. What is systems development? The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application. Various SDLC methodologies have been developed to guide the processes involved, including the waterfall model (which was the original SDLC method); rapid application development (RAD); joint application development Page 2 of 16

4 Fifteen Essential (JAD); the fountain model; the spiral model; build and fix; and synchronizeand-stabilize. Frequently, several models are combined into some sort of hybrid methodology. Documentation is crucial regardless of the type of model chosen or devised for any application, and is usually done in parallel with the development process. Some methods work better for specific types of projects, but in the final analysis, the most important factor for the success of a project may be how closely the particular plan was followed. In general, an SDLC methodology follows the following steps: 1. The existing system is evaluated. Deficiencies are identified. This can be done by interviewing users of the system and consulting with support personnel. 2. The new system requirements are defined. In particular, the deficiencies in the existing system must be addressed with specific proposals for improvement. 3. The proposed system is designed. Plans are laid out concerning the physical construction, hardware, operating systems, programming, communications, and security issues. 4. The new system is developed. The new components and programs must be obtained and installed. Users of the system must be trained in its use, and all aspects of performance must be tested. If necessary, adjustments must be made at this stage. 5. The system is put into use. This can be done in various ways. The new system can phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more cost-effective to shut down the old system and implement the new system all at once. 6. Once the new system is up and running for a while, it should be exhaustively evaluated. Maintenance must be kept up rigorously at all times. Users of the system should be kept up-to-date concerning the latest modifications and procedures. Page 3 of 16

5 Fifteen Essential What is quality as? In developing products and services, quality assurance is any systematic process of checking to see whether a product or service being developed is meeting specified requirements. Many companies have a separate department devoted to quality assurance. A quality assurance system is said to increase customer confidence and a company's credibility, to improve work processes and efficiency, and to enable a company to better compete with others. Quality assurance was initially introduced in World War II when munitions were inspected and tested for defects after they were made. Today's quality assurance systems emphasize catching defects before they get into the final product. ISO 9000 is an international standard that many companies use to ensure that their quality assurance system is in place and effective. Conformance to ISO 9000 is said to guarantee that a company delivers quality products and services. To follow ISO 9000, a company's management team decides quality assurance policies and objectives. Next, the company or an external consultant formally writes down the company's policies and requirements and how the staff can implement the quality assurance system. Once this guideline is in place and the quality assurance procedures are implemented, an outside assessor examines the company's quality assurance system to make sure it complies with ISO A detailed report describes the parts of the standard the company missed, and the company agrees to correct any problems within a specific time. Once the problems are corrected, the company is certified as in conformance with the standard. What is use case? A use case is a methodology used in system analysis to identify, clarify, and organize system requirements. The use case is made up of a set of possible sequences of interactions between systems and users in a particular environment and related to a particular goal. It consists of a group of Page 4 of 16

6 Fifteen Essential elements (for example, classes and interfaces) that can be used together in a way that will have an effect larger than the sum of the separate elements combined. The use case should contain all system activities that have significance to the users. A use case can be thought of as a collection of possible scenarios related to a particular goal, indeed, the use case and goal are sometimes considered to be synonymous. A use case (or set of use cases) has these characteristics: Organizes functional requirements Models the goals of system/actor (user) interactions Records paths (called scenarios) from trigger events to goals Describes one main flow of events (also called a basic course of action), and possibly other ones, called exceptional flows of events (also called alternate courses of action) Is multi-level, so that one use case can use the functionality of another one. s can be employed during several stages of software development, such as planning system requirements, validating design, testing software, and creating an outline for online help and user manuals. What is breakdown? A work breakdown is a chart in which the critical work elements, called tasks, of a project are illustrated to portray their relationships to each other and to the project as a whole. The graphical nature of the WBS can help a project manager predict outcomes based on various scenarios, which can ensure that optimum decisions are made about whether or not to adopt suggested procedures or changes. When creating a WBS, the project manager defines the key objectives first and then identifies the tasks required to reach those goals. A WBS takes the form of a tree diagram with the "trunk" at the top and the "branches" below. Page 5 of 16

7 Fifteen Essential The primary requirement or objective is shown at the top, with increasingly specific details shown as the observer reads down. When completed, a well-structured WBS resembles a flowchart in which all elements are logically connected, redundancy is avoided and no critical elements are left out. Elements can be rendered as plain text or as text within boxes. The elements at the bottom of the diagram represent tasks small enough to be easily understood and carried out. Interactions are shown as lines connecting the elements. A change in one of the critical elements may affect one or more of the others. If necessary, these lines can include arrowheads to indicate time progression or cause-and-effect. A well-organized, detailed WBS can assist key personnel in the effective allocation of resources, project budgeting, procurement management, scheduling, quality assurance, quality control, risk management, product delivery and service oriented management. What is regression testing? is the process of testing changes to computer programs to make sure that the older programming still works with the new changes. is a normal part of the program development process and, in larger companies, is done by code testing specialists. Test department coders develop code test scenarios and exercises that will test new units of code after they have been written. These test cases form what becomes the test bucket. Before a new version of a software product is released, the old test cases are run against the new version to make sure that all the old capabilities still work. The reason they might not work is because changing or adding new code to a program can easily introduce errors into code that is not intended to be changed. Page 6 of 16

8 Fifteen Essential What is sprint (software? In product development, a sprint is a set period of time during which specific work has to be completed and made ready for review. Each sprint begins with a planning meeting. During the meeting, the product owner (the person requesting the work) and the development team agree upon exactly what work will be accomplished during the sprint. The development team has the final say when it comes to determining how much work can realistically be accomplished during the sprint, and the product owner has the final say on what criteria needs to be met for the work to be approved and accepted. The duration of a sprint is determined by the scrum master, the team's facilitator. Once the team reaches a consensus for how many days a sprint should last, all future sprints should be the same. Traditionally, a sprint lasts 30 days. After a sprint begins, the product owner must step back and let the team do their work. During the sprint, the team holds daily stand up meeting to discuss progress and brainstorm solutions to challenges. The project owner may attend these meetings as an observer but is not allowed to participate unless it is to answer questions. (See pigs and chickens). The project owner may not make requests for changes during a sprint and only the scrum master or project manager has the power to interrupt or stop the sprint. At the end of the sprint, the team presents its completed work to the project owner and the project owner uses the criteria established at the sprint planning meeting to either accept or reject the work. What is reverse engineering? is taking apart an object to see how it works in order to duplicate or enhance the object. The practice, taken from older industries, is now frequently used on computer hardware and software. Software reverse engineering involves reversing a program's machine code (the string of 0s Page 7 of 16

9 Fifteen Essential and 1s that are sent to the logic processor) back into the source code that it was written in, using program language statements. Software reverse engineering is done to retrieve the source code of a program because the source code was lost, to study how the program performs certain operations, to improve the performance of a program, to fix a bug (correct an error in the program when the source code is not available), to identify malicious content in a program such as a virus or to adapt a program written for use with one microprocessor for use with another. for the purpose of copying or duplicating programs may constitute a copyright violation. In some cases, the licensed use of software specifically prohibits reverse engineering. Someone doing reverse engineering on software may use several tools to disassemble a program. One tool is a hexadecimal dumper, which prints or displays the binary numbers of a program in hexadecimal format (which is easier to read than a binary format). By knowing the bit patterns that represent the processor instructions as well as the instruction lengths, the reverse engineer can identify certain portions of a program to see how they work. Another common tool is the disassembler. The disassembler reads the binary code and then displays each executable instruction in text form. A disassembler cannot tell the difference between an executable instruction and the data used by the program so a debugger is used, which allows the disassembler to avoid disassembling the data portions of a program. These tools might be used by a cracker to modify code and gain entry to a computer system or cause other harm. Page 8 of 16

10 Fifteen Essential What is Gantt chart? A Gantt chart is a horizontal bar chart developed as a production control tool in 1917 by Henry L. Gantt, an American engineer and social scientist. Frequently used in project management, a Gantt chart provides a graphical illustration of a schedule that helps to plan, coordinate, and track specific tasks in a project. Gantt charts may be simple versions created on graph paper or more complex automated versions created using project management applications such as Microsoft Project or Excel. A Gantt chart is constructed with a horizontal axis representing the total time span of the project, broken down into increments (for example, days, weeks, or months) and a vertical axis representing the tasks that make up the project (for example, if the project is outfitting your computer with new software, the Page 9 of 16

11 Fifteen Essential major tasks involved might be: conduct research, choose software, install software). Horizontal bars of varying lengths represent the sequences, timing, and time span for each task. Using the same example, you would put "conduct research" at the top of the verticle axis and draw a bar on the graph that represents the amount of time you expect to spend on the research, and then enter the other tasks below the first one and representative bars at the points in time when you expect to undertake them. The bar spans may overlap, as, for example, you may conduct research and choose software during the same time span. As the project progresses, secondary bars, arrowheads, or darkened bars may be added to indicate completed tasks, or the portions of tasks that have been completed. A vertical line is used to represent the report date. Gantt charts give a clear illustration of project status, but one problem with them is that they don't indicate task dependencies - you cannot tell how one task falling behind schedule affects other tasks. The, another popular project management charting method, is designed to do this. Automated Gantt charts store more information about tasks, such as the individuals assigned to specific tasks, and notes about the procedures. They also offer the benefit of being easy to change, which is helpful. Charts may be adjusted frequently to reflect the actual status of project tasks as, almost inevitably, they diverge from the original plan. What is debugging? In computers, debugging is the process of locating and fixing or bypassing bugs (errors) in computer program code or the engineering of a hardware device. To debug a program or hardware device is to start with a problem, isolate the source of the problem, and then fix it. A user of a program that does not know how to fix the problem may learn enough about the problem to be able to avoid it until it is permanently fixed. When someone says they've debugged a program or "worked the bugs out" of a program, they imply that they fixed it so that the bugs no longer exist. Page 10 of 16

12 Fifteen Essential is a necessary process in almost any new software or hardware development process, whether a commercial product or an enterprise or personal application program. For complex products, debugging is done as the result of the unit test for the smallest unit of a system, again at component test when parts are brought together, again at system test when the product is used with other existing products, and again during customer beta test, when users try the product out in a real world situation. Because most computer programs and many programmed hardware devices contain thousands of lines of code, almost any new product is likely to contain a few bugs. Invariably, the bugs in the functions that get most use are found and fixed first. An early version of a program that has lots of bugs is referred to as "buggy." tools (called debuggers) help identify coding errors at various development stages. Some programming language packages include a facility for checking the code for errors as it is being written. What is software requirements? A software requirements is a comprehensive description of the intended purpose and environment for software under development. The SRS fully describes what the software will do and how it will be expected to perform. An SRS minimizes the time and effort required by developers to achieve desired goals and also minimizes the development cost. A good SRS defines how an application will interact with system hardware, other programs and human users in a wide variety of real-world situations. Parameters such as operating speed, response time, availability, portability, maintainability, footprint, security and speed of recovery from adverse events are evaluated. Methods of defining an SRS are described by the IEEE (Institute of Electrical and Electronics Engineers) specification Page 11 of 16

13 Fifteen Essential What is requirements analysis (requirements engineering)?, also called requirements engineering, is the process of determining user expectations for a new or modified product. These features, called requirements, must be quantifiable, relevant and detailed. In software engineering, such requirements are often called functional specifications. is an important aspect of project management. involves frequent communication with system users to determine specific feature expectations, resolution of conflict or ambiguity in requirements as demanded by the various users or groups of users, avoidance of feature creep and documentation of all aspects of the project development process from start to finish. Energy should be directed towards ensuring that the final system or product conforms to client needs rather than attempting to mold user expectations to fit the requirements. is a team effort that demands a combination of hardware, software and human factors engineering expertise as well as skills in dealing with people. What is? A is an application program that is organized into three major parts, each of which is distributed to a different place or places in a network. The three parts are: The workstation or presentation interface The business logic The database and programming related to managing it In a typical, the application user's workstation contains the programming that provides the graphical user interface (GUI) and application-specific entry forms or interactive windows. (Some data that is local or unique for the workstation user is also kept on the local hard disk.) Page 12 of 16

14 Fifteen Essential Business logic is located on a local area network (LAN) server or other shared computer. The business logic acts as the server for client requests from workstations. In turn, it determines what data is needed (and where it is located) and acts as a client in relation to a third tier of programming that might be located on a mainframe computer. The third tier includes the database and a program to manage read and write access to it. While the organization of an application can be more complicated than this, the 3-tier view is a convenient way to think about the parts in a large-scale program. What is unit testing? is a software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinized for proper operation. is often automated but it can also be done manually. This testing mode is a component of Extreme Programming (XP), a pragmatic method of software development that takes a meticulous approach to building a product by means of continual testing and revision. involves only those characteristics that are vital to the performance of the unit under test. This encourages developers to modify the source code without immediate concerns about how such changes might affect the functioning of other units or the program as a whole. Once all of the units in a program have been found to be working in the most efficient and error-free manner possible, larger components of the program can be evaluated by means of integration testing. can be time-consuming and tedious. It demands patience and thoroughness on the part of the development team. Rigorous documentation must be maintained. must be done with an awareness that it may not be possible to test a unit for every input scenario that will occur when the program is run in a real-world environment. Page 13 of 16

15 Fifteen Essential What is collaboration diagram? A collaboration diagram, also called a communication diagram or interaction diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML). The concept is more than a decade old although it has been refined as modeling paradigms have evolved. A collaboration diagram resembles a flowchart that portrays the roles, functionality and behavior of individual objects as well as the overall operation of the system in real time. Objects are shown as rectangles with naming labels inside. These labels are preceded by colons and may be underlined. The relationships between the objects are shown as lines connecting the rectangles. The messages between objects are shown as arrows connecting the relevant rectangles along with labels that define the message sequencing. s are best suited to the portrayal of simple interactions among relatively small numbers of objects. As the number of objects and messages grows, a collaboration diagram can become difficult to read. Several vendors offer software for creating and editing collaboration diagrams. Want more? View our : Page 14 of 16

16 Fifteen Essential Free resources for technology professionals TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. What makes TechTarget unique? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. Related TechTarget Websites Page 15 of 16

E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE

E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE T he VMware software-defined data center turns virtualization into Infrastructure as a Service with automation and self-service.

More information

Basic Concepts. Project Scheduling and Tracking. Why are Projects Late? Relationship between People and Effort

Basic Concepts. Project Scheduling and Tracking. Why are Projects Late? Relationship between People and Effort Basic s Project Scheduling and Tracking The process of building a schedule for any case study helps really understand how it s done. The basic idea is to get across to break the software project into well-defined

More information

Advanced analytics key component for decision management systems

Advanced analytics key component for decision management systems decision management In the last 20 to 30 years, companies have faced significant changes in how they perform their day-to-day operations, and so have the analytics used to make decisions. In this Q&A Tip

More information

Hybrid cloud computing explained

Hybrid cloud computing explained computing explained A few years ago, the IT industry was focused on public cloud computing. Then after facing public cloud security issues, the focus shifted to private clouds. And now the focus has shifted

More information

Software Project Planning. CITS1220 Software Engineering

Software Project Planning. CITS1220 Software Engineering Software Project Planning CITS1220 Software Engineering Lecture Overview Problems for SW Project Planning Planning Terms Work Breakdown Dependencies Schedule Tracking 2 Planning SW Projects Your boss:

More information

Managing Virtual Desktop Environments

Managing Virtual Desktop Environments Managing Virtual Desktop Environments Desktop virtualization can be extremely beneficial to a company's operating system environment. Yet while working through the virtualization planning process, IT professionals

More information

Project Planning. Lecture Objectives. Basic Reasons for Planning. Planning. Project Planning and Control System. Planning Steps

Project Planning. Lecture Objectives. Basic Reasons for Planning. Planning. Project Planning and Control System. Planning Steps Project Planning What are you going to do in the project? Lecture Objectives To discuss the tasks in planning a project To describe the tools that can be used for developing a project plan To illustrate

More information

Benefits of virtualizing your network

Benefits of virtualizing your network While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.

More information

Charting Your Course: Charts and Graphs for IT Projects

Charting Your Course: Charts and Graphs for IT Projects Charting Your Course: Charts and Graphs for IT Projects Dawn Li, Ph.D. and Gary McQuown Data and Analytic Solutions, Inc. Fairfax, VA ABSTRACT This paper describes the most common types of charts and graphs

More information

6 Point SIEM Solution Evaluation Checklist

6 Point SIEM Solution Evaluation Checklist With the evolution of security information and event management (SIEM) tools, it is important to recognize the benefits of SIEM technology. Analysis of automation and intelligence are major advantages

More information

A-1. Chapter 1. Project planning. Chapter 1. Festo Didactic Mechatronics

A-1. Chapter 1. Project planning. Chapter 1. Festo Didactic Mechatronics A-1 Project planning A-2 Mechatronics specialists are responsible for the complete service life of an industrial machine, from the initial planning phase through to its disassembly and disposal. This cycle

More information

Graphical Project Planning Techniques: An Overview of Gantt, PERT, and CPM Charts Prepared for groups in ECE480 1/6/02, D. Grover

Graphical Project Planning Techniques: An Overview of Gantt, PERT, and CPM Charts Prepared for groups in ECE480 1/6/02, D. Grover Introduction/Purpose Graphical Project Planning Techniques: An Overview of Gantt, PERT, and CPM Charts Prepared for groups in ECE480 1/6/02, D. Grover The purpose of this brief tutorial is to present an

More information

Project Planning and Scheduling

Project Planning and Scheduling Project Planning and Scheduling MFS606 Project Planning Preliminary Coordination Detailed Task Description Objectives Budgeting Scheduling Project Status Monitoring When, What, Who Project Termination

More information

Project planning and scheduling

Project planning and scheduling Project planning and scheduling Project Planning Mel Rosso-Llopart (rosso@cs.cmu.edu) Version 1.1 Carnegie Mellon, 2005 1 Objectives 1. Introduce project planning 2. Examine the stages of project planning:

More information

Securing the SIEM system: Control access, prioritize availability

Securing the SIEM system: Control access, prioritize availability The prospect of a SIEM system crash or compromise should scare any enterprise given the role it plays in an organization s security infrastructure. This expert E-Guide discusses the implications of a compromised

More information

Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED

Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED T here s two ways you can build your mobile applications: native applications, or mobile cloud applications. Which option is

More information

Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment

Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment Creating new virtual data center design options Top four for deployment New features of Hyper-V provide IT pros with new options for designing virtual data centers. Inside this e-guide, our experts take

More information

Systems Analysis and Design

Systems Analysis and Design Systems Analysis and Design Slides adapted from Jeffrey A. Hoffer, University of Dayton Joey F. George, Florida State University Joseph S. Valacich, Washington State University Modern Systems Analysis

More information

(Refer Slide Time: 01:52)

(Refer Slide Time: 01:52) Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

More information

E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES

E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES M id-sized companies plan to use more managed services and many see it as improving security. Read on to find

More information

E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED

E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED M obility spurs video conferencing software need; users want software-and cloud-based offerings to interoperate with their legacy

More information

Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends

Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends A Podcast Briefing produced by Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends Sponsored By: Key Trends in the Identity and Access Management Market

More information

E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT

E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT F or many reasons, has become a critical issue for many IT organizations and enterprise s alike. With many licensing options, hurdles and

More information

Information Systems Development Process (Software Development Life Cycle)

Information Systems Development Process (Software Development Life Cycle) Information Systems Development Process (Software Development Life Cycle) Phase 1 Feasibility Study Concerned with analyzing the benefits and solutions for the identified problem area Includes development

More information

Project Plan Version 0.0

Project Plan Version 0.0 Software Development Templates Project Plan Version 0.0 DOCUMENT NO: VERSION: CONTACT: EMAIL: Authors Name xxx.xxx@xxx.xxx DATE: 15/07/2003 Unlimited distribution subject to the copyright. Project Plan

More information

5 free Exchange add-ons you should consider Eliminating administration pain points on a budget

5 free Exchange add-ons you should consider Eliminating administration pain points on a budget 5 free Exchange add-ons you should Eliminating administration pain points on a budget There are countless cost-free ways to supplement the basic features that come with Exchange and that help to streamline

More information

E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS

E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS B lock-based SANs and file-based networkattached storage are traditional technologies, and new trends and innovations continue to emerge with these age

More information

Key best practices for cloud testing

Key best practices for cloud testing Key best s for testing Key best s for testing and your testing Doing software testing in environments offers economies and scalability possibilities that are intriguing to software development companies

More information

Basic Testing Concepts and Terminology

Basic Testing Concepts and Terminology T-76.5613 Software Testing and Quality Assurance Lecture 2, 13.9.2006 Basic Testing Concepts and Terminology Juha Itkonen SoberIT Contents Realities and principles of Testing terminology and basic concepts

More information

Exchange Server 2010 backup and recovery tips and tricks

Exchange Server 2010 backup and recovery tips and tricks Exchange Server backup and recovery tips and tricks Exchange Server backup and recovery Exchange Server A big part of your job as an Exchange Server administrator involves preparing for and recovering

More information

Expert guide to achieving data center efficiency How to build an optimal data center cooling system

Expert guide to achieving data center efficiency How to build an optimal data center cooling system achieving data center How to build an optimal data center cooling system Businesses can slash data center energy consumption and significantly reduce costs by utilizing a combination of updated technologies

More information

HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT

HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT E-Guide HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT SearchSolidState Storage P erformance is the driving factor for the vast majority of companies considering a solid-state storage

More information

Aligning Public Cloud Strategies to Improve Server Efficiency

Aligning Public Cloud Strategies to Improve Server Efficiency How to Successfully Implement Cloud Strategies Aligning Rather than simply being swept up in the cloud computing trend, IT admins must be careful to implement cloud strategies that match their organization's

More information

Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration

Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration Eight essential tips for a successful How a The move to the cloud is happening and it s happening now. But before you jump start your cloud migration project, be sure you understand how to adequately prepare

More information

Chapter 3 Managing the Information Systems (IS) Project

Chapter 3 Managing the Information Systems (IS) Project Content Chapter 3 Managing the Information Systems (IS) Project Process of managing IS projects Skills required to be an effective project manager Skills and activities of a project manager during project

More information

CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY?

CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY? E-Guide CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY? SearchCloud Security M ore and more certifications are being created around cloud security. An expert looks at some of the more prominent

More information

11.1 What is Project Management? Object-Oriented Software Engineering Practical Software Development using UML and Java. What is Project Management?

11.1 What is Project Management? Object-Oriented Software Engineering Practical Software Development using UML and Java. What is Project Management? 11.1 What is Project Management? Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 11: Managing the Software Process Project management encompasses all the

More information

How to Develop Cloud Applications Based on Web App Security Lessons

How to Develop Cloud Applications Based on Web App Security Lessons Applications Based on Before moving applications to the public cloud, it is important to implement security practices and techniques. This expert E-Guide provides guidance on how to develop secure applications

More information

Is Your Data Safe in the Cloud?

Is Your Data Safe in the Cloud? Is Your Data Safe in the? Is Your Data Safe in the? : Tactics and Any organization likely to be using public cloud computing are also likely to be storing data in the cloud. Yet storing data in the cloud

More information

Scope management can be defined as controlling what is and what is not a part of the project.

Scope management can be defined as controlling what is and what is not a part of the project. Scope Management Scope management can be defined as controlling what is and what is not a part of the project. According to the 2004 PMBOK scope management: Includes the processes required to ensure that

More information

pm4dev, 2015 management for development series Project Schedule Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS

pm4dev, 2015 management for development series Project Schedule Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS pm4dev, 2015 management for development series Project Schedule Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS A methodology to manage development

More information

Critical Path Analysis

Critical Path Analysis Chapter 13 Critical Path Analysis Basic Concepts Activity An activity is any portion of a project which consumes time or resources and has a definable beginning and ending. For example, laying of pipe

More information

The work breakdown structure can be illustrated in a block diagram:

The work breakdown structure can be illustrated in a block diagram: 1 Project Management Tools for Project Management Work Breakdown Structure A complex project is made manageable by first breaking it down into individual components in a hierarchical structure, known as

More information

Desktop virtualization: Best practices for a seamless deployment

Desktop virtualization: Best practices for a seamless deployment Desktop virtualization: Best practices for a For years, virtualization efforts have centered on servers and storage, as opposed to desktops and rightfully so. The technology has evolved faster with fewer

More information

A GUIDE TO THE PROJECT MANAGEMENT BODY OF KNOWLEDGE

A GUIDE TO THE PROJECT MANAGEMENT BODY OF KNOWLEDGE A GUIDE TO THE PROJECT MANAGEMENT BODY OF KNOWLEDGE PMI Standards Committee William R. Duncan, Director of Standards Project Management Institute 130 South State Road Upper Darby, PA 19082 USA Library

More information

E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE

E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE W orking with individual in hybrid cloud can be complex, but Quality of Experience can be

More information

E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY

E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY and mean for F or IT managers, has always been high priority, however the new IT landscape and increased deployment of cloud has complicated the

More information

Chapter 2: Project Time Management

Chapter 2: Project Time Management Chapter 2: Project Time Management Learning Objectives o o o o Understand the importance of project schedules and good project time management. Define activities as the basis for developing project schedules.

More information

Answers to Review Questions

Answers to Review Questions Tutorial 2 The Database Design Life Cycle Reference: MONASH UNIVERSITY AUSTRALIA Faculty of Information Technology FIT1004 Database Rob, P. & Coronel, C. Database Systems: Design, Implementation & Management,

More information

5 ways to leverage the free VMware hypervisor Key tips for working around the VMware cost barrier

5 ways to leverage the free VMware hypervisor Key tips for working around the VMware cost barrier 5 ways to leverage the free VMware Key tips for working around the VMware cost barrier While a free VMware virtualization setup only provides a limited list of features and functionalities, the shortcomings

More information

E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE

E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE W hy the need for a baseline? A baseline is a set of metrics used in network performance monitoring to define the normal

More information

THE BCS PROFESSIONAL EXAMINATIONS Certificate in IT. October 2006. Examiners Report. Information Systems

THE BCS PROFESSIONAL EXAMINATIONS Certificate in IT. October 2006. Examiners Report. Information Systems THE BCS PROFESSIONAL EXAMINATIONS Certificate in IT October 2006 Examiners Report Information Systems General Comments The pass rate for Section A was disappointing, being lower than previously. One reason

More information

Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY

Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY C ontinuous delivery offers a number of opportunities and for organizations. By automating the software buildtest-deployment

More information

Systems Investigation and Analysis. Systems Development. What is it? Why Plan?

Systems Investigation and Analysis. Systems Development. What is it? Why Plan? C H A P T E R 12 Systems Investigation and Analysis Systems Development What is it? If you can t do it better, why do it? -Herbert H. Dow, Founder, Dow Chemical Company Why Plan? Why do we need a process?

More information

Module 11. Software Project Planning. Version 2 CSE IIT, Kharagpur

Module 11. Software Project Planning. Version 2 CSE IIT, Kharagpur Module 11 Software Project Planning Lesson 29 Staffing Level Estimation and Scheduling Specific Instructional Objectives At the end of this lesson the student would be able to: Identify why careful planning

More information

Scheduling Resources and Costs

Scheduling Resources and Costs Student Version CHAPTER EIGHT Scheduling Resources and Costs McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Gannt Chart Developed by Henry Gannt in 1916 is used

More information

Introduction to IT Project Management

Introduction to IT Project Management Adapted from Managing Information Technology Projects, Chapter 1, Schwalbe Introduction to IT Project Management Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep 17th, 2015 Outline

More information

ONLINE SUPPLEMENTAL BAPPENDIX PROJECT SCHEDULES WITH PERT/CPM CHARTS

ONLINE SUPPLEMENTAL BAPPENDIX PROJECT SCHEDULES WITH PERT/CPM CHARTS ONLINE SUPPLEMENTAL BAPPENDIX PROJECT SCHEDULES WITH PERT/CPM CHARTS Chapter 3 of Systems Analysis and Design in a Changing World explains the techniques and steps required to build a project schedule

More information

Table of Contents Author s Preface... 3 Table of Contents... 5 Introduction... 6 Step 1: Define Activities... 7 Identify deliverables and decompose

Table of Contents Author s Preface... 3 Table of Contents... 5 Introduction... 6 Step 1: Define Activities... 7 Identify deliverables and decompose 1 2 Author s Preface The Medialogist s Guide to Project Time Management is developed in compliance with the 9 th semester Medialogy report The Medialogist s Guide to Project Time Management Introducing

More information

2013 Cloud Storage Expectations

2013 Cloud Storage Expectations 2013 Cloud Storage Expectations cloud A recent TechTarget Survey suggests that while many IT budgets are decreasing or remaining flat, cloud projects are still on the rise and will continue to be throughout

More information

Lecture 26 CPM / PERT Network Diagram

Lecture 26 CPM / PERT Network Diagram Lecture 26 CPM / PERT Network Diagram 26.1 Introduction to CPM / PERT Techniques CPM (Critical Path Method) was developed by Walker to solve project scheduling problems. PERT (Project Evaluation and Review

More information

Data warehouse software bundles: tips and tricks

Data warehouse software bundles: tips and tricks Data software bundles: tips and tricks Data software bundles: Data The emergence of data appliances has broadened the potential uses of business intelligence (BI) and analytics within many organizations

More information

SOFTWARE PROJECT MANAGEMENT

SOFTWARE PROJECT MANAGEMENT SOFTWARE PROJECT MANAGEMENT http://www.tutorialspoint.com/software_engineering/software_project_management.htm Copyright tutorialspoint.com The job pattern of an IT company engaged in software development

More information

Time Management II. http://lbgeeks.com/gitc/pmtime.php. June 5, 2008. Copyright 2008, Jason Paul Kazarian. All rights reserved.

Time Management II. http://lbgeeks.com/gitc/pmtime.php. June 5, 2008. Copyright 2008, Jason Paul Kazarian. All rights reserved. Time Management II http://lbgeeks.com/gitc/pmtime.php June 5, 2008 Copyright 2008, Jason Paul Kazarian. All rights reserved. Page 1 Outline Scheduling Methods Finding the Critical Path Scheduling Documentation

More information

Foundations for Systems Development

Foundations for Systems Development Foundations for Systems Development ASSIGNMENT 1 Read this assignment introduction. Then, read Chapter 1, The Systems Development Environment, on pages 2 25 in your textbook. What Is Systems Analysis and

More information

Baseline Code Analysis Using McCabe IQ

Baseline Code Analysis Using McCabe IQ White Paper Table of Contents What is Baseline Code Analysis?.....2 Importance of Baseline Code Analysis...2 The Objectives of Baseline Code Analysis...4 Best Practices for Baseline Code Analysis...4 Challenges

More information

The management of the projects with MS Project

The management of the projects with MS Project The management of the projects with MS Project Author: AgimDerguti 1 What is Microsoft Project? Microsoft Project is a project management software program developed and sold by Microsoft Designed to assist

More information

Project Time Management

Project Time Management Project Time Management Study Notes PMI, PMP, CAPM, PMBOK, PM Network and the PMI Registered Education Provider logo are registered marks of the Project Management Institute, Inc. Points to Note Please

More information

Introduction to Systems Analysis and Design

Introduction to Systems Analysis and Design Introduction to Systems Analysis and Design What is a System? A system is a set of interrelated components that function together to achieve a common goal. The components of a system are called subsystems.

More information

Managing Successful Software Development Projects Mike Thibado 12/28/05

Managing Successful Software Development Projects Mike Thibado 12/28/05 Managing Successful Software Development Projects Mike Thibado 12/28/05 Copyright 2006, Ambient Consulting Table of Contents EXECUTIVE OVERVIEW...3 STATEMENT OF WORK DOCUMENT...4 REQUIREMENTS CHANGE PROCEDURE...5

More information

Importance of Project Schedules. matter what happens on a project. projects, especially during the second half of projects

Importance of Project Schedules. matter what happens on a project. projects, especially during the second half of projects Project Time Management Chapter 6 Importance of Project Schedules Managers often cite delivering projects on time as one of their biggest challenges Time has the least amount of flexibility; it passes

More information

PMP Exam Preparation Answer Key

PMP Exam Preparation Answer Key Chapter 2 Answers 1) d) They are all of equal importance unless otherwise stated The Triple Constraint of Project Management is that Scope, Time, and Cost are all equal unless otherwise defined as such.

More information

Operational Research. Project Menagement Method by CPM/ PERT

Operational Research. Project Menagement Method by CPM/ PERT Operational Research Project Menagement Method by CPM/ PERT Project definition A project is a series of activities directed to accomplishment of a desired objective. Plan your work first..then work your

More information

CISC 322 Software Architecture. Project Scheduling (PERT/CPM) Ahmed E. Hassan

CISC 322 Software Architecture. Project Scheduling (PERT/CPM) Ahmed E. Hassan CISC 322 Software Architecture Project Scheduling (PERT/CPM) Ahmed E. Hassan Project A project is a temporary endeavour undertaken to create a "unique" product or service A project is composed of a number

More information

E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD

E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD T o d ay, n e a r ly e v e r y IT function is available as a cloud-based service: email, payroll, HR, analytics, and on and on. While higher-level

More information

3 common cloud challenges eradicated with hybrid cloud

3 common cloud challenges eradicated with hybrid cloud 3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,

More information

Microsoft Project and the Project Management Domain

Microsoft Project and the Project Management Domain CHAPTER Microsoft Project and the Project Management Domain In this chapter History of Project Management 70 Exploring Project Management Industry Standards 71 WBS, Phases and Control Points, Methodologies,

More information

3. SCHEDULING THE MOST IMPORTANT PHASE PLANNING ACTIVITY. 3.1 Project Management Software Does it Really Do That?

3. SCHEDULING THE MOST IMPORTANT PHASE PLANNING ACTIVITY. 3.1 Project Management Software Does it Really Do That? 3. SCHEDULING THE MOST IMPORTANT PHASE PLANNING ACTIVITY 3.1 Project Management Software Does it Really Do That? Not really it doesn t do any management that takes a talented human like you! A betternamed

More information

Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates

Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates As cloud technology and deployment models become increasingly sophisticated, once-wary storage professionals are plunging

More information

E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS

E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS T his e-guide teaches you the importance of collaboration on a micro level for defending against cyber threats. Learn how to embed security practices

More information

E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING

E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING E mployees are circumventing IT protocols and turning to unsanctioned tools such as file-sharing, messaging, collaboration and social media

More information

Software Development Life Cycle (SDLC)

Software Development Life Cycle (SDLC) Software Development Life Cycle (SDLC) Supriyo Bhattacharjee MOF Capability Maturity Model (CMM) A bench-mark for measuring the maturity of an organization s software process CMM defines 5 levels of process

More information

ME 407 Mechanical Engineering Design Spring 2016

ME 407 Mechanical Engineering Design Spring 2016 ME 407 Mechanical Engineering Design Spring 2016 Project Planning & Management Asst. Prof. Dr. Ulaş Yaman Acknowledgements to Dieter, Engineering Design, 4 th edition Ullman, The Mechanical Design Process,

More information

Object Oriented Programming. Risk Management

Object Oriented Programming. Risk Management Section V: Object Oriented Programming Risk Management In theory, there is no difference between theory and practice. But, in practice, there is. - Jan van de Snepscheut 427 Chapter 21: Unified Modeling

More information

SOFTWARE ENGINEERING INTERVIEW QUESTIONS

SOFTWARE ENGINEERING INTERVIEW QUESTIONS SOFTWARE ENGINEERING INTERVIEW QUESTIONS http://www.tutorialspoint.com/software_engineering/software_engineering_interview_questions.htm Copyright tutorialspoint.com Dear readers, these Software Engineering

More information

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals Virtualization is a well-established in today s IT environments, but it still remains a top priority among

More information

Goals of the Unit. spm - 2014 adolfo villafiorita - introduction to software project management

Goals of the Unit. spm - 2014 adolfo villafiorita - introduction to software project management Project Scheduling Goals of the Unit Making the WBS into a schedule Understanding dependencies between activities Learning the Critical Path technique Learning how to level resources!2 Initiate Plan Execute

More information

CLOUD APPLICATION INTEGRATION AND DEPLOYMENT MADE SIMPLE

CLOUD APPLICATION INTEGRATION AND DEPLOYMENT MADE SIMPLE E-Guide CLOUD APPLICATION INTEGRATION AND DEPLOYMENT MADE SIMPLE SearchCloud Applications C loud application integration and continue to be some of the top for software developers. In this e-guide, learn

More information

Scheduling Glossary Activity. A component of work performed during the course of a project.

Scheduling Glossary Activity. A component of work performed during the course of a project. Scheduling Glossary Activity. A component of work performed during the course of a project. Activity Attributes. Multiple attributes associated with each schedule activity that can be included within the

More information

BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS

BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS E-Guide BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS SearchSolidState Storage A ll-flash storage arrays are becoming Tier-1 storage for mission-critical data. This e-guide showcases the progression

More information

Software Application: Information System Elements. Project Management in Information Technology (IT) Projects. Project Scheduling basics

Software Application: Information System Elements. Project Management in Information Technology (IT) Projects. Project Scheduling basics Software Application: Information System Elements Project Scheduling Basics Working With Resources Fine Tuning the Project Managing the Project Project Presentations Project Management in Information Technology

More information

Introduction to Software Engineering: Project Management ( Highlights )

Introduction to Software Engineering: Project Management ( Highlights ) Introduction to Software Engineering: Project Management ( Highlights ) John T. Bell Department of Computer Science University of Illinois, Chicago Based on materials from chapters 14, 15, and 16 of Object

More information

How project management software can smooth the way

How project management software can smooth the way How project management software can smooth the way By Michael V. Brown New Standard Institute The most demanding call on maintenance resources comes when a plant or facility is shut down for an extended

More information

MITRE Baseline Configuration System Implementation Plan

MITRE Baseline Configuration System Implementation Plan MITRE Baseline Configuration System Implementation Plan FINAL REVISION, October 8, 2008 Purdue University, CS 307, Fall 2008 Team MITRE: Catherine Brown Michael Dunn Mark Nowicki David Tittle TABLE OF

More information

BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS

BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS E-Guide BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS SearchHealthIT W ith a focus on, the next wave of EHRs will incorporate powers of big data, speech recognition and new database models. This eguide

More information

Use project management tools

Use project management tools Use project management tools Overview Using project management tools play a large role in all phases of a project - in planning, implementation, and evaluation. This resource will give you a basic understanding

More information

Streamlining the move to the cloud. Key tips for selecting the right cloud tools and preparing your infrastructure for migration

Streamlining the move to the cloud. Key tips for selecting the right cloud tools and preparing your infrastructure for migration Streamlining the move to the cloud Key tips for selecting the right cloud tools and preparing your infrastructure for migration When planning for a, you must (1) carefully evaluate various cloud tools

More information

The Plan s Journey From Scope to WBS to Schedule

The Plan s Journey From Scope to WBS to Schedule The Plan s Journey From Scope to WBS to Schedule Presented by: Rick Clare, CBAP, PMP, OCP, CSM PM Centers USA, LLC. 2013 Company Background Consulting and Training (Virtual, Public and Private Training)

More information

MOBILE APP DEVELOPMENT LEAPS FORWARD

MOBILE APP DEVELOPMENT LEAPS FORWARD E-Guide MOBILE APP DEVELOPMENT LEAPS FORWARD SearchSOA B ackend as a Service (BaaS) is making waves in the mobile application development space. In this e-guide, learn how you can implement BaaS and how

More information

(Refer Slide Time: 3:21)

(Refer Slide Time: 3:21) Software Engineering Prof. Shashi Kelkar Department of Computer Science and Engineering Indian Institute of Technology, Bombay Lecture - 31 Project Time Management Today we are going to talk about project

More information