Download Complete Material - https://www.instamojo.com/prashanth_ns/
Course Outline...
• Identify the need for XML as a standard data interchange format
• Identify the structure of XML documents
• Create an XML schema
• Declare attributes in an XML schema
• Identify the need for XML namespaces
• Reuse XML schema components
• Create groups of elements and attributes in an XML schema
• Transform an XML document through a Cascading Style Sheet
• Transform an XML document through Extensible Style Sheet Language
• Perform conditional formatting
• Use XPath pattern
• Present data in different formats
• Identify the XML Document Object Model
• Validate an XML document against an XML schema using the Document Object Model
• Apply a Style Sheet to an XML document
Download Complete Material - https://www.instamojo.com/prashanth_ns/
Course Outline...
• Identify the distributed application architecture
• Identify COM+
• Create COM+ serviced components
• Explore COM+ applications
• Identify .NET Remoting
• Communicate messages through remote objects
• Identify Web services
• Create and consume a Web service
• Identify WCF
• Explore the programming model of WCF
• Host a WCF service
• Consume a WCF service
• Identify exception handling
• Implement exception handling
• Implement tracing
• Log messages
• Monitor a WCF Service
• Implement serialization and encoding
• Identify transactions
• Implement transactions in WCF
• Define reliable messaging
• Implement reliable messaging
• Work with peer-to-peer applications
• Define security and Implement security
• Identify the extensibility features in WCF
• Extend the service model layer
• Extend the messaging layer
• Identify RESTful services and Work with RESTful services
discussions about different types of architectures used in web applications, pros and cons of each architecture. MVC design patters and comparison with 3-tier.
Evolution of UI Technologies, The User and Developer Expectations, What is different with Flex? , Where does it stand against other UI technologies?
Flex Concepts , Drawbacks of flex, Cairngorm Architectural Overview, Custom Framework Architectural Overview
http://in.linkedin.com/in/darshanvartak/
Download Complete Material - https://www.instamojo.com/prashanth_ns/
Course Outline...
• Identify the distributed application architecture
• Identify COM+
• Create COM+ serviced components
• Explore COM+ applications
• Identify .NET Remoting
• Communicate messages through remote objects
• Identify Web services
• Create and consume a Web service
• Identify WCF
• Explore the programming model of WCF
• Host a WCF service
• Consume a WCF service
• Identify exception handling
• Implement exception handling
• Implement tracing
• Log messages
• Monitor a WCF Service
• Implement serialization and encoding
• Identify transactions
• Implement transactions in WCF
• Define reliable messaging
• Implement reliable messaging
• Work with peer-to-peer applications
• Define security and Implement security
• Identify the extensibility features in WCF
• Extend the service model layer
• Extend the messaging layer
• Identify RESTful services and Work with RESTful services
discussions about different types of architectures used in web applications, pros and cons of each architecture. MVC design patters and comparison with 3-tier.
Evolution of UI Technologies, The User and Developer Expectations, What is different with Flex? , Where does it stand against other UI technologies?
Flex Concepts , Drawbacks of flex, Cairngorm Architectural Overview, Custom Framework Architectural Overview
http://in.linkedin.com/in/darshanvartak/
1. Introduction to Web Services
2. Web Service Architecture
3. What are Web Services?
4. Why are Web Services?
5. The base of WS
6. What is SOAP?
7. What is WSDL?
8. How to test a web service?
9. Examples
Towards Requirements Management Issues in ExcelEccam
This presentation goes through main issues of managing requirements in Excel and explains how to solve these issues with ReqView - Simple Yet Powerful Requirements Management Tool.
Serious Sencha - Using Sencha ExtJS/Touch for Enterprise ApplicationsKlaus Hofeditz
A summary of the decision process at ]project-open[ for choosing Sencha ExtJS/Touch as the base for the mobile strategy. "Serious Sencha" summarizes enterprise requirements for mobile/desktop apps, and how they are different from usual requirements.
1. Introduction to Web Services
2. Web Service Architecture
3. What are Web Services?
4. Why are Web Services?
5. The base of WS
6. What is SOAP?
7. What is WSDL?
8. How to test a web service?
9. Examples
Towards Requirements Management Issues in ExcelEccam
This presentation goes through main issues of managing requirements in Excel and explains how to solve these issues with ReqView - Simple Yet Powerful Requirements Management Tool.
Serious Sencha - Using Sencha ExtJS/Touch for Enterprise ApplicationsKlaus Hofeditz
A summary of the decision process at ]project-open[ for choosing Sencha ExtJS/Touch as the base for the mobile strategy. "Serious Sencha" summarizes enterprise requirements for mobile/desktop apps, and how they are different from usual requirements.
This presentation is about the Basic Concepts of XML EXtensible Markup Language. The importance of these concepts is explained in this presentation. XML is one of the popular Markup Languages today.
Web based application of Live Scoreboard using XML.Uttam Kumar
The method of using XML documents for current storing and displaying and then updating later in the database can be used in web pages where frequently changing data has to be displayed like live score card, stock exchange report, weather details as wind direction, wind speed, temperature etc. and many more areas. In our project, we are making a web based application that will display the live scores of any live cricket game.
Parsing of xml file to make secure transaction in mobile commerceijcsa
Mobile commerce M-Commerce is transaction using mobile devices. Now a day’s users are dependable on mobile phone because of its anytime, anywhere features. User purchase and pay more with their mobile device than desktop. Therefore, the security of M-commerce transaction should be strong enough to enhance its performance. Mobile phones use WAP, i-mode and J2ME technologies for programming for making transaction. The data during transaction is sent as XML file. The XML processor takes more time to encrypt which leads to breakdown the security during transaction. This paper has defined the code to parse XML file which reduces it size so that data during transaction would be sent with ease and fast. The code is written in XML and J2ME as these technologies can easily run on multiple platform.
HTML and XML are markup languages that have their own unique features. Both these programming languages are machine- and user-friendly. They have a set of standard words based on syntactical rules of the language.
Catalog-based Conversion from Relational Database into XML Schema (XSD)CSCJournals
Where we are in the age of information revolution, exchange information, and transport data effectively among various sectors of government, commercial, service and industrial, etc., the uses of a new databases model to support this trend has become very important because inability of traditional databases models to support it. eXtensible Markup Language (XML) considers a new standard model for data interchange through internet and mobiles devices networks, it has become a common language to exchange and share the data of traditional models in easy and inexpensive ways. In this research, we propose a new technique to convert the relational database contents and schema into XML schema (XSD- XML Schema Definition), the main idea of the technique is extracting relational database catalog using Structured Query Language (SQL). We follow three steps to complete the conversion process. First, extracting relation instance (actual content) and schema catalog using SQL query language, which consider the required information to implement XML document and its schema. Second, transform the actual content into XML document tree. The idea of this step is converting table columns of the relations (tables) into the elements of XML document. Third, transform schema catalog into XML schema for describing the structure of the XML document. To do so, we transform datatype of the elements and the variant data constrains such as data length, not null, check and default, moreover define primary foreign keys and the referential integrity between the tables. Overall results of the technique are very promise while the technique is very clear and does not require complex procedures that could adversely effect on the results accuracy. We performed many experiments and report their elapsed CPU times.
Download Complete Material - https://www.instamojo.com/prashanth_ns/
Course Outline...
• Overview of WPF
• Creating a Simple WPF Application
• Handling Events and Commands
• Navigating Between Pages
• Defining Page Layout
• Building User Interfaces by Using Content Controls
• Building User Interfaces by Using Items Controls
• Hosting Windows Forms Controls
• Sharing Logical Resources in an Application
• Creating Consistent User Interfaces by Using Styles
• Changing the Appearance of Controls by Using Control Templates
• Enhancing User Interfaces by Using Triggers and Animations
• Overview of Data Binding and Creating a Data Binding
• Implementing Property Change Notification
• Converting Data and Validating Data
• Binding to Collections of Objects
• Presenting Data by Using Collection Views
• Presenting Data by Using Data Templates
• Overview of Control Authoring
• Creating Controls
• Creating and Viewing Flow Documents
• Creating and Viewing Fixed Documents
• Packaging Documents
• Printing Documents
• Creating 2-D Graphics
• Displaying Images
• Creating 3-D Graphics
• Manipulating the 3-D Environment
• Adding Multimedia
• Deployment Options
• Deploying a Stand-Alone WPF Application
• Deploying an XBAP Application
• Configuring Manifest Settings
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This VB.Net 4.0 with ADO.NET Programming contains 15 Units and each unit contains 40 to 60 slides in it.
Contents…
• Appreciate the Graphical User Interface (GUI)
• Identify the controls of GUI
• Identify the features of .NET Framework
• Use Windows project by using Visual Studio .NET integrated development environment
• Work with Windows Forms and Controls
• Perform drag-and-drop operations using clipboard
• Validate user input using controls and events
• Work with the CommonDialog class
• Create a custom dialog box
• Work with menus and MDI applications
• Work with ToolStrip control
• Identify the functionality of print components
• Identify the functionality of Crystal Reports
• Implement accessibility features in a .NET application
• Identify features of international applications
• Implement globalization and localization in a .NET application
• Create a help system using HTML Workshop
• Implement help system in .NET applications
• Work with built-in components in the .NET applications
• Work with user-defined components in the .NET applications
• Implement asynchronous programming
• Use the BackgroundWorker component
• Implement assemblies
• Implement various deployment strategies
• Use various editors in a deployment project
• Implement ClickOnce
• Configure and Secure a Windows application
ADO.NET 4.0 Architecture
• Work with XML
• Work with SQL queries
• Implement data binding to display values on the controls of a Windows form
• Filter the data to display the selected records
• Identify the connected and disconnected environment in ADO.NET
• Working in a connected environment
• Working in a disconnected environment
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This UML (Unified Markup Language) contains 6 Units and each Unit contains 35 slides in it.
Contents…
• Object-oriented modeling
• Origin and evolution of UML
• Architecture of UML
• User View
o Actor
o Use Cases
• Identify the behavior of a class
• Identify the attributes of a class
• Create a Class diagram
• Create an Object diagram
• Identify the dynamic and static aspects of a system
• Draw collaboration diagrams
• Draw sequence diagrams
• Draw statechart diagrams
• Understand activity diagrams
• Identify software components of a system
• Draw component diagrams
• Identify nodes in a system
• Draw deployment diagrams
Web Component Development with Servlet and JSP Technologies Unit 01Prashanth Shivakumar
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This Web Component Development with Servlet and JSP Technologies contains 16 Units and each unit contains 60 slides in it.
Contents…
• Introduction to Web Application Technologies
• Developing a View Component
• Developing a Controller Component
• Developing Dynamic Forms
• Sharing Application Resources Using the Servlet Context
• Designing the Business Tier
• Developing Web Applications Using Struts
• Developing Web Applications Using Session Management
• Using Filters in Web Applications
• Integrating Web Applications With Databases
• Developing JSP™ Pages
• Developing JSP Pages Using Custom Tags
• Developing Web Applications Using Struts Action Forms
• Building Reusable Web Presentation Components
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This RDBMS (Relational Database Management System) contains 9 Units and each unit contains 40 to 50 slides in it.
Contents…
• Define a Database Management System
• Describe the types of data models
• Create an entity-relationship model
• List the types of relationships between entities
• Define a Relational Database Management System
• Describe the operators that work on relations
• Identify tips of logical database design
• Map an ER diagram to a table
• Describe data redundancy
• Describe the first, second, and third normal forms
• Describe the Boyce-Codd Normal Form
• Appreciate the need for denormalization.
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This Java Mobile Application Development Using J2ME (Java 2 Micro Edition) contains 12 Units and each unit contains 50 to 60 slides in it.
Contents…
• Identify the types of wireless technologies
• Identify the need for J2ME
• Identify the goals and characteristics of JTWI specification
• Identify the MIDlet development lifecycle
• Execute a MIDlet by using NetBeans
• Explain the profiles and configurations in J2ME technology
• Manage MIDlet suite and its packaging
• Develop, package, and run MIDlet suites by using NetBeans
• Describe MIDP User Interface components and their hierarchy
• Work with Screen and its elements
• Create UI using high-level UI APIs
• Create a mail application UI that implements high-level APIs
• Create User Interfaces (UIs) using low-level UI APIs
• Manage a wallpaper from a mobile device
• Implement persistent storage in MIDlets
• Develop a personal expense manager application
• Establish network connection by using the GCF
• Implement classes and interfaces in javax.microedition.io package
• Develop a new application that displayed on the mobile device as a ticker
• Implement MIDlet security
• Develop a banking application
• Identify MMAPI packages and its components
• Play sounds and videos by using the MMAPI package
• Develop a jukebox application
• Identify the basics of WMA
• Create, send, and receive SMS messages by using WMA
• Demonstrate the use of SMS in NetBeans
• Analyze and implement classes in the MIDP Game API
• Develop a Tic Tac Toe game by using the Game API
• Deploy MIDlets through the local machine and Web server
• Explore the push registry
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This Data Structures and Algorithms contain 15 Units and each Unit contains 60 to 80 slides in it.
Contents…
• Introduction
• Algorithm Analysis
• Asymptotic Notation
• Foundational Data Structures
• Data Types and Abstraction
• Stacks, Queues and Deques
• Ordered Lists and Sorted Lists
• Hashing, Hash Tables and Scatter Tables
• Trees and Search Trees
• Heaps and Priority Queues
• Sets, Multi-sets and Partitions
• Dynamic Storage Allocation: The Other Kind of Heap
• Algorithmic Patterns and Problem Solvers
• Sorting Algorithms and Sorters
• Graphs and Graph Algorithms
• Class Hierarchy Diagrams
• Character Codes
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This Programming Using C++ contain 22 Units and each Unit contains 60 to 80 slides in it.
Course Outline...
• Introduction to Oops
• Structure of a program
• Iteration structures (loops)
• Scope of variables
• Write and execute C++ programs
• Use arrays and structures
• Pointers
• Arguments passed by value and by reference.
• Overloaded functions
• Inline functions
• Data Structures
• Unions
• Implement encapsulation and abstraction
• Use operators and decision-making constructs
• Work with arrays
• Implement polymorphism and inheritance
• Use exception handling and templates
• Implement linked lists
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This Advanced Excel - Office 2010 contains 12 Units and each unit contains 40 to 60 slides in it.
Contents…
• Manage cell and range names
• Calculate data across worksheets
• Use specialized functions
• Analyze data with logical and lookup functions
• Create and modify tables and Format tables
• Sort or filter worksheet or table data
• Calculate data in a table or worksheet
• Create, Modify and Format chart
• Create a PivotTable report
• Analyze data using PivotCharts
• Insert and modify pictures and ClipArt
• Draw and modify shapes
• Illustrate workflow using SmartArt graphics
• Layer and group graphic objects
• Customize the Excel environment
• Customize workbooks
• Manage themes and Create and use templates
• Apply conditional formatting
• Add data validation criteria
• Update a workbook’s properties
• Modify Excel’s default settings
• Share a workbook
• Set revision tracking and Review tracked revisions
• Merge workbooks
• Administer digital signatures
• Restrict document access
• Trace precedents and dependents of a cell
• Troubleshoot errors in formulas and invalid data and formulas
• Watch and evaluate formulas
• Create a data list outline, a trend line and scenarios
• Perform what-if analysis and statistical analysis
• Create a workspace and Consolidate data
• Link cells in different workbooks
• Edit links and Export Excel data
• Import a delimited text file
• Publish a worksheet to the web
• Import data from the web
• Create a web query
• Develop XML maps and Import and export XML data
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
XML Unit 01
1. Data interchange is essential to carry out business
transactions. However, organizations store data in disparate
formats, which makes the process of data interchange
complex and time-consuming.
Extensible Markup Language (XML) is a standard, simple
way of storing the data in a format that can be exchanged
across multiple systems across an enterprise. Providing an
insight into XML will benefit students as it is a standard
technology to describe and define documents.
The course is applicable to students who want to create
well-formed XML documents. This course introduces
students to the fundamentals of XML and enable them to
effectively use XML as a markup language to develop Web
applications.
Rationale
2. In this session, you will learn to:
Identify the need for XML as a standard data interchange
format
Identify the structure of XML documents
Objectives
3. Traditionally, preprinted formats were used to exchange
information between businesses.
Need for a more effective way of communicating and
processing business data led to the emergence of
Electronic Data Interchange (EDI).
EDI refers to the process of exchanging documents in a
standard format between two computer systems.
EDI has the following limitations:
Rigid transaction set
Fixed business rules
High costs
Slow pace of standards evolution
Getting Started with XML
4. XML is a text-based markup language that enables storage
of data in a structured format.
XML is a cross-platform, hardware and software
independent markup language that enables structured data
transfer between heterogeneous systems.
XML is used as a common data interchange format in a
number of applications.
Let us understand the usage of XML with the help of the
diagram.
Introducing XML
5. Introducing XML (Contd.)
Web Application
Web Services
.
XML
Windows Application
Mobile Application
SQL Server
DB2 Oracle
Access
Data Sources
6. Web Architecture Using XML
In a traditional Web architecture, a client sends a request to the
server in a pre-defined format and receives the response
accordingly.
The advantage of using XML in the Web architecture is that the
structure of the request can be obtained from the server at run
time.
XML can encode non-relational data as well as relational data
structure.
Introducing XML (Contd.)
7. Web Architecture Using XML (Contd.)
The following figure depicts the XML Web architecture.
Introducing XML (Contd.)
8. Difference Between SGML, HTML, and XML
Standard Generalized Markup Language (SGML) allows
documents to describe their grammar by specifying the tag set
used in the document and the structural relationship that these
tags represent.
Hypertext Markup Language (HTML) is used for data
presentation.
XML is used for data description and definition.
Introducing XML (Contd.)
9. Difference Between SGML, HTML, and XML (Contd.)
Introducing XML (Contd.)
SGML HTML XML
Extensibility
Structure
Validation
Browser
Dependency
Cost/Benefit
Low High Low
Poor Good Medium
Yes Yes Yes
Yes No Yes
Yes No Yes
10. Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
11. Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
In HTML, only the predefined tags can
be used.
In XML, you can create new tags based
on the requirements of the application.
Various languages such as MathML and
WML have been derived from XML.
12. Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
XML produces files that are
unambiguous, easy to generate,
and easy to read.
XML provides a structure to
store data in textual format,
which can then be used as a
standard format or protocol for
data interchange.
13. Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
The flexibility to create user-defined
tags in XML enables creation of
smart search engines.
You can differentiate whether you
want do to search based on a text
or on a tag, which enables the
browser to perform a focused
search and return precise
information that matches the search
query.
14. Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
Document updates in HTML
are slow as the entire
document needs to be
refreshed from the server.
Document updates in XML are
faster as only the changed
content needs to be
downloaded.
15. Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
In HTML, you need to create
separate HTML pages to
display the same information
in different formats while XML
concentrates on data and not
on its presentation.
HTML does not allow
conditional formatting of a
document while in XML
conditional formatting is
possible.
16. Advantages of XML
Some of the advantages of XML are:
Domain-specific vocabulary
Data interchange
Smart searches
Granular updates
User-selected view of data
Message transformation
Introducing XML (Contd.)
In XML, a message can be stored in
the form of a document, object data,
or data from a database.
XML design provides flexibility while
storing data as it does not impose
any restriction on the field size and
the order in which the data is stored.
17. Future of XML
The future uses of XML can be summarized as:
XML will be widely used in e-commerce.
XML will have a huge core market in the form of Business to
Business (B2B).
XML will be used for mobile devices due to its ability to easily
convert into the appropriate format for any device.
XML will be used to solve communication problems in EDI and
Enterprise Application Integration (EAI) as it provides
interoperability between disparate applications.
Introducing XML (Contd.)
18. W3C is responsible for the development of Web
specifications that describe communication protocols and
technologies for the Web.
Due to the flexibility for customization in XML, W3C has laid
down these rules that need to be followed by all XML
vendors:
XML must be directly usable over the Internet.
XML must support a wide variety of applications.
XML must be compatible with SGML.
XML should have absolute minimum number of optional
features, ideally zero.
XML documents must be human legible and clear.
XML design must be formal and concise.
XML documents must adhere to a set of constraints called full
normalization.
Introducing W3C
19. An XML application is considered well designed if it is robust
and scalable.
To design a robust and scalable XML application, the
following steps need to be performed:
1. Create an information model.
2. Identify the required components of the XML document.
3. Create the XML document.
Identifying the Structure of XML Documents
20. An information model is a description of the information
used in an organization.
Information modeling helps identify:
Objects involved in an application
Properties of the objects
Relationships among objects
XML provides the following additional capabilities to
information modeling:
Heterogeneity
Extensibility
Flexibility
Information Modeling
Each record can contain different data
fields.
New data types can be added
whenever required.Data fields can vary in size and
configuration between instances.
21. Types of information models that can be created for an XML
application are:
Static model: Helps define all the objects in an application and
the relationships among them.
Dynamic model: Helps to determine the information flow of an
application in the form of messages.
Information Modeling (Contd.)
22. The various components of an XML document used for
representing data in a hierarchical order are:
Processing Instruction (PI)
Tags
Elements
Content
Attributes
Entities
Comments
Components of an XML Document
23. <?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is < 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Processing Instruction (PI)
Provides information on how
the XML file should be
processed.
24. <?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is < 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Tags
Is a means of identifying
data. Tags consist of start
tag and end tag.
25. <?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is < 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Root Element
Contains all other elements
in the document.
26. <?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is < 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Comments
Are statements used to
explain the XML code.
27. <?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is < 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Child Elements
Are the basic units used to
identify and describe data in
XML.
28. <?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is < 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Attributes
Provide additional
information about the
elements for which they are
declared.
29. <?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is < 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Content
Refers to the information
represented by the elements
of an XML document. An
element can contain:
• Character or data content
• Element content
• Combination or mixed
content
30. <?xml version=“1.0” encoding=“UTF-8”?>
<STOREDATA>
<!--STOREDATA is the root element-->
<STORE STOREID=“S101”>
<PRODUCTNAME>Toys</PRODUCTNAME>
<QUANTITY>100</QUANTITY>
<DISPLAY>The price of this toy
is < 200 </DISPLAY>
</STORE>
</STOREDATA>
Components of an XML Document (Contd.)
Entities
Is a set of information that
can be used by specifying a
single name.
31. The rules that govern the creation of a well-formed XML
document:
Every start tag must have an end tag.
Empty tags must be closed using a forward slash (/).
All attribute values must be given in double quotation marks.
Tags must have proper nesting.
XML tags are case sensitive.
Identifying the Rules for Creating XML Documents
32. Problem Statement:
CyberShoppe, Inc. sells toys and books in the United States. It
has three branches in different parts of the country. Currently,
the three branches maintain data on their local computer
systems. The IT manager at CyberShoppe has identified that a
centralized data repository on the products sold through its
e-commerce site is required. The data from all branches must
be collated and housed in a centralized location. This data
must be made available to the Accounts and Sales sections at
the individual branches, regardless of the hardware and
software platforms being used at the branches.
In addition, the sales personnel require access to the data
using palmtops and cellular phones. The product details of
CyberShoppe consist of the product name, a brief description,
the price, and the available quantity on hand. A product ID
uniquely identifies each product.
Demo: Creating an XML Document
33. Consider the following statement:
<?xml version="1.0" encoding= "UTF-8"?>
Which component of an XML document does the preceding
statement represent?
a. Element
b. Content
c. Entity
d. Processing Instruction
Answer:
d. Processing Instruction
Practice Questions
34. Bob is the EDP head of an organization that manufactures
and sells hardware parts. The organization has presence in
all the major cities of the United States. At present, all
branch offices maintain their data locally. Bob wants to
centralize the repository of data in his organization. Data
from all the branch offices needs to be collated and stored
in a centralized location. Data pertaining to a branch should
be available only to that branch office. However, the head
office should be able to access all the data.
Practice Questions
35. In addition, Bob also wants that the sales personnel should
be able to access sales data from mobile devices, such as
palmtops and mobile phones. This sales information should
have a brief description of the product, the price, and the
available inventory. Using which of the following markup
languages can Bob achieve the preceding goals?
a. HTML
b. XML
c. SGML
d. EDI
Answer:
b. XML
Practice Questions (Contd.)
36. Which of the following statement is NOT true about
information modeling?
a. Information Modeling is used to understand the structure and
meaning of information that will be stored in XML documents.
b. Information Modeling helps you identify the objects involved in
an application, the properties of the objects, and the
relationships among them.
c. In an Information Model, each record can contain different data
fields.
d. An information model imposes restrictions on data.
Answer:
d. An information model imposes restrictions on data.
Practice Questions
37. Which one of the following statements is true about XML?
a. XML is a text-based markup language that provides predefined
tags to store data.
b. XML is a platform-neutral data interchange format.
c. XML requires VAN for data interchange.
d. XML allows you to specify data formatting instructions.
Answer:
b. XML is a platform-neutral data interchange format.
Practice Questions
38. Which one of the following is a disadvantage of traditional
EDI?
a. It provides fixed transaction sets.
b. It increases the communication lag time between an agency
and a customer.
c. It increases data entry errors.
d. It increases the time taken to process orders.
Answer:
a. It provides fixed transaction sets.
Practice Questions
39. In this session, you learned that:
EDI refers to the process of exchanging documents in a
standard format between two computer systems.
XML is a text-based markup language that enables you to store
data in a structured format by using meaningful tags.
Using XML in Web architecture enables loose coupling
between the server application and the client application.
XML has the following advantages:
Domain specific vocabulary‑
Data interchange
Smart searches
Granular updates
User selected view of data‑
Message transformation
Summary
40. In future, XML will be widely used in:
E-commerce
B2B services
Mobile services
EDI and EAI
XML was defined by W3C to ensure that structured data is
uniform and independent of vendors and applications.
In XML, an information model is used to understand the
structure and meaning of information that will be stored in XML
documents.
You can create static, dynamic, or a combination of both these
information models for an XML application.
A static information model helps you define all the objects in an
application and the relationships among them.
Summary (Contd.)
41. In a dynamic model, data flow diagrams and process diagrams
are used to determine the flow of information.
An XML document consists of:
Processing Instruction (PI)
Tags
Elements
Content
Attributes
Entities
Comments
Summary (Contd.)
Editor's Notes
Students have learnt the structure of different types of dimensions and the importance of surrogate keys in Module I. In this session, students will learn to load the data into the dimension tables after the data has been transformed in the transformation phase. In addition, students will also learn to update data into these dimension tables.
Students already know about different types of dimension tables. Therefore, you can start the session by recapitulating the concepts. Initiate the class by asking the following questions:
1. What are the different types of dimensions?
2. Define flat dimension.
3. What are conformed dimension?
4. Define large dimension.
5. Define small dimension.
6. What is the importance of surrogate key in a dimension table?
Students will learn the loading and update strategies theoretically in this session. The demonstration to load and update the data in the dimension table will be covered in next session.
Introduce the students to the course by asking them what they know about forensics. Next, ask the students what they know about system forensics and why is it required in organizations dependent on IT. This could be a brief discussion of about 5 minutes.
Lead the discussion to the objectives of this chapter.
Introduce the students to the different types of threats that systems face by:
Asking the students to give examples of what they think are environmental and human threats.
Asking the students to give instances of what they think are malicious and non-malicious threats.
Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
Hold a two- three minute discussion on the different types of system-related crimes that the students have experienced or heard.
At the end of the discussion, give additional examples of system-related crimes.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
While explaining the definition of system forensics, ask the students to note the following key words in the definition:
Identify
Extract
Process
Analyze
Digital and hardware evidence
Tell the students that these form an integral aspect of system forensics and would be discussed in detail.
Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on:
The role that system forensics plays in organizations having an IT set up.
This discussion will serve as a precursor to the next slide.
Elaborate on the role that system forensics plays in an organization, based on the discussion in the previous slide and the information given on this slide.
Explain to the students that a system can be secured by sealing the system(s) that have been a part of the crime. This involves:
Immediately sealing the system by removing the hard disk and other components of the system.
Ensuring that no other routine activity is conducted, using any component of the system.
Taking snapshots and back ups of all digital evidences such as documents, system files, and e-mails.
Tell the students that the ‘chain of evidence’ is most critical to a system forensic investigation.
It helps in reconstructing a crime occurred from the beginning to the end.
Connect the information given on this slide to the initial discussion held on the different types of system-related crimes.
Connect the information given on this slide to the initial discussion held on the different types of system-related crimes.
Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
Tell the students that the key words that they were told to note while discussing the definition of system forensics, will be elaborated as part of the system forensics process.
Reiterate the concepts taught earlier by asking the given question.
Reiterate the concepts taught earlier by asking the given question.
Reiterate the concepts taught earlier by asking the given question.
Reiterate the concepts taught earlier by asking the given question.
Reiterate the concepts taught earlier by asking the given question.
Reiterate the concepts taught earlier by asking the given question.