Soft Systems Methodology
Soft systems methodology The development of soft systems methodology was the brainchild of Peter Checkland and was developed in the 1960's at Lancaster. Ever since then the technique has grown…
Read more >Security Policy ATM
The purpose of this document is to define a security policy for Bank H. This policy covers. This comprehensive policy is intended to cover all aspects of information security relating…
Read more >StarTeam System Development
 StarTeam is a life cycle management tool that allows program managers and system developers the ability to collaborate on projects and track change management. This system was developed by…
Read more >Soft Skills are Smart Skills: Necessity of Soft Skills for LIS Professionals in this Twenty First Century
Soft Skills are Smart Skills: Necessity of Soft Skills for LIS Professionals in this Twenty First Century Abstract Changing the users' awareness and the technology developed in this Twenty First…
Read more >Structured systems analysis and design
Structured Systems Analysis and Design (SSAD) With this particular methodology, a software development venture is divided into stages, steps, tasks and modules/ components. Objectives of SSAD:Â ITC Infotech India Ltd.…
Read more >Software Evolution Process
In this paper, I have explained about the software evolution process. In this paper, I have explained about the importance of software in present scenario, as software has become universal…
Read more >Social networking sites in the work place
Benefits and problems of social networking sites in the work place “In the early 1990s, websites were used to share information with other people, though many people felt that this…
Read more >Systems Development Life Cycle
Keywords: SDLC, project management, information systems Introduction SDLC, The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information…
Read more >Software as a service
Executive Summary Rapidly changing customer requirements and accelerating technological advancements are fueling the growth of new generations of on-demand software as a service (SaaS) solutions. Faced with intensifying competition and…
Read more >Security and Vulnerabilities of Browser Applications
Hi friends, I would like to discuss the system vulnerabilities, relevant CVE identifiers, cyber security solution and some of common findings I encountered while using browser applications. System vulnerabilities are…
Read more >