Framework of Organizational Process Asset Library   In the theories of the CMMI and in the process improvement of the high maturity level OPAL has five sections: OPAL = {SPL,LML,TGL,RDL,MR} (1) SPL stands for standard process library of the organization. Read more…


Difference between STT MRAM and SRAM   Spin-transfer torque magnetic RAM is called STT MRAM and it is type of RAM which is used in scaled technologies and it realizes high density and low power embedded memory. It is used Read more…


Different MMU Cache Arrangements Five different MMU cache arrangements are briefly discussed in this article. Unified page table cache In this cache page table cache is high speed and single and are tagged by the physical address in memory and Read more…


Software Process Improvement   Software Process Improvement; Initiating phase of the model   Suppose there is a software development organization ABC Pvt. Ltd., currently at CMMI level 1. There are a number of projects available in the market which will Read more…


  Comparison of Android and Windows Mobile Operating System from developer perspective     From the developers point of view the most important thing is to see which platform is easy to start developing. Mostly for developing app for windows Read more…


How to Use hosted network   By doing the following steps you can use hasted network from your laptop or PC: 1- First of all open the command prompt and Run it as administrator 2-Now type the following command “netsh Read more…


Secondary Design Topics Security Reliability Maintainability Performance Human factors Hardware dependencies Software dependencies Packaging Secondary Design Topics:   Security   Security in the software design is very important as there are many malicious activities are performed by the hackers to Read more…


Software Defined Network Security Threats As the software defined network developed security issues are also increased. Software defined networks become more open due to which attackers can get the information about networks and policies. DoS an attack also becomes higher Read more…


Design and Implementation Issues in Pervasive Computing   There are lots of design and implementation issues which are needed to overcome. Some of them are list down: Understanding user intent High-level energy management Privacy and trust Cyber foraging Context awareness Read more…


What are Criterion for evaluating agile-driven software development projects   In my point of view agile driven software development projects can evaluated on different criterion. It depends on the requirements and nature of the organization. This can be evaluated on Read more…

Categories

Calendar

June 2021
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
282930