Yearly Archives: 2013


Copy Right Act
This article gives the information of “COPYRIGHT”. Copyright is a set of exclusive granted by law of a jurisdiction to the author or creator of an original work, including the right to copy, distributor and adapt the work. Exception and Limitation to this right strive to balance the public interest in the wide distribution of the material produced and to encourage creativity. Exception includes good dealing and good use, and […]

CopyRight


Hibernate
Introduction to Hibernate   Hibernate is a Mapping technique used in JAVA. There are several persistent frameworks such as Java Data Objects, TopLink, Entity Beans, Enterprise JavaBeans, Castor, Hibernate, etc. Hibernate is one of them. Hibernate is an Object-Relational Mapping (ORM). It is an ORM tool that automatically maps your domain object (java classes) to the relational databases.   What is ORM? •    ORM is a data mapping technique. The […]

Introduction to Hibernate



Sam Mankeshaw 1
फील्डमार्शल सॅम माणेकशा यांचा जन्म अमृतसरमध्ये स्थायिक झालेल्या एका सुखवस्तू पारशी कुटुंबात 3 एप्रिल 1914 रोजी झाला. चार मुले आणि दोन कन्या असलेल्या या कुटुंबात माणेकशा यांचा नंबर पाचवा. नैनितालच्या शेरवूड विद्यालयात त्यांचे प्राथमिक शिक्षण पार पडल्यानंतर वैद्यकीय शिक्षणासाठी ते खरेतर इंग्लंडला जाणार होते. परंतु वयाने सॅम खूपच लहान आहे असे लक्षात येताच वडिलांनी त्यांना अमृतसर कॉलेजला घातले. महाविद्यालयीन शिक्षण आटोपल्यानंतर त्यांना डेहरादूनच्या ‘इंडियन मिलिटरी अकॅडेमी’ मध्ये प्रवेश मिळाला व […]

यशोगाथा – ५


DOS attack
Denial of Service attack is a type of attack in which the network is flooded with useless traffic which ultimately leads to its failure. Here, Denial means refusal to satisfy a request. This attack may be caused by single or a group of people. When a single host attacks it is called Denial of Service (Dos) attack and when multiple host attacks it is called as Distributed Denial of Service […]

Denial of Service(DoS) Attack



Virtual Memory
This article gives broad information of “Virtual Memory” of operating system. The concept of  Virtual Memory is the separation of user logical memory from physical memory and  it is commonly implementation by demand paging. In this way a very large virtual memory can be provided for programmers on a smaller physical memory. Because of virtual memory the programming task becomes easy. The large amount physical memory gets available to the […]

Do You Know What is Virtual Memory?


100% quality tested
This article enlightens how a quality of software can be increased to an extent. The most expert and experience software developers say that high quality software is an important view. There are certain questions may come in your mind that how do we define quality? It is said that “Every program does what is expected as well as may be what is not expected by the user. There are many […]

Software Quality Assurance



Software Copyright
What is Software Piracy? This article gives the broad information of software piracy. Piracy of softwares involves the use reproduction or distributed without having received the expressed permission of the software author. Software piracy can be divided in four common types. The first one is end user piracy, it occurs when the users of software installs the software on more machines then they are entitled to under their license agreements. […]

Software Piracy