Yearly Archives: 2013


Data Mining
This article gives the information of data mining. The analysis becomes more meaningful using Data Mining, as it enables managers to establish relationship between business elements and find out aspects and facts about their business that may not be evident otherwise. Data mining, thus, a is an information analysis tool that involves the automated discovery of patterns and relationship in a data ware house. Data Mining is a new but […]

Data Mining


Copy Right Act
This article gives the information of “COPYRIGHT”. Copyright is a set of exclusive granted by law of a jurisdiction to the author or creator of an original work, including the right to copy, distributor and adapt the work. Exception and Limitation to this right strive to balance the public interest in the wide distribution of the material produced and to encourage creativity. Exception includes good dealing and good use, and […]

CopyRight



Hibernate
Introduction to Hibernate   Hibernate is a Mapping technique used in JAVA. There are several persistent frameworks such as Java Data Objects, TopLink, Entity Beans, Enterprise JavaBeans, Castor, Hibernate, etc. Hibernate is one of them. Hibernate is an Object-Relational Mapping (ORM). It is an ORM tool that automatically maps your domain object (java classes) to the relational databases.   What is ORM? •    ORM is a data mapping technique. The […]

Introduction to Hibernate


Sam Mankeshaw 1
फील्डमार्शल सॅम माणेकशा यांचा जन्म अमृतसरमध्ये स्थायिक झालेल्या एका सुखवस्तू पारशी कुटुंबात 3 एप्रिल 1914 रोजी झाला. चार मुले आणि दोन कन्या असलेल्या या कुटुंबात माणेकशा यांचा नंबर पाचवा. नैनितालच्या शेरवूड विद्यालयात त्यांचे प्राथमिक शिक्षण पार पडल्यानंतर वैद्यकीय शिक्षणासाठी ते खरेतर इंग्लंडला जाणार होते. परंतु वयाने सॅम खूपच लहान आहे असे लक्षात येताच वडिलांनी त्यांना अमृतसर कॉलेजला घातले. महाविद्यालयीन शिक्षण आटोपल्यानंतर त्यांना डेहरादूनच्या ‘इंडियन मिलिटरी अकॅडेमी’ मध्ये प्रवेश मिळाला व […]

यशोगाथा – ५



DOS attack
Denial of Service attack is a type of attack in which the network is flooded with useless traffic which ultimately leads to its failure. Here, Denial means refusal to satisfy a request. This attack may be caused by single or a group of people. When a single host attacks it is called Denial of Service (Dos) attack and when multiple host attacks it is called as Distributed Denial of Service […]

Denial of Service(DoS) Attack


Virtual Memory
This article gives broad information of “Virtual Memory” of operating system. The concept of  Virtual Memory is the separation of user logical memory from physical memory and  it is commonly implementation by demand paging. In this way a very large virtual memory can be provided for programmers on a smaller physical memory. Because of virtual memory the programming task becomes easy. The large amount physical memory gets available to the […]

Do You Know What is Virtual Memory?



100% quality tested
This article enlightens how a quality of software can be increased to an extent. The most expert and experience software developers say that high quality software is an important view. There are certain questions may come in your mind that how do we define quality? It is said that “Every program does what is expected as well as may be what is not expected by the user. There are many […]

Software Quality Assurance