Showing posts with label be seminar topics. Show all posts
Showing posts with label be seminar topics. Show all posts

Sunday, September 23, 2012

Seminar on Distributed Database Systems

A distributed database is a database in which storage devices are not all attached to a common processing unit such as the CPU. It may be stored in multiple computers located in the same physical location, or may be dispersed over a network of interconnected computers. Unlike parallel systems, in which the processors are tightly coupled and constitute a single database system, a distributed database system consists of loosely coupled sites that share no physical components.

Collections of data (e.g. in a database) can be distributed across multiple physical locations. A distributed database can reside on network servers on the Internet, on corporate intranets or extranets, or on other company networks. The replication and distribution of databases improves database performance at end-user worksites. 

To ensure that the distributive databases are up to date and current, there are two processes: replication and duplication. Replication involves using specialized software that looks for changes in the distributive database. Once the changes have been identified, the replication process makes all the databases look the same. The replication process can be very complex and time consuming depending on the size and number of the distributive databases. This process can also require a lot of time and computer resources. Duplication on the other hand is not as complicated. It basically identifies one database as a master and then duplicates that database. The duplication process is normally done at a set time after hours. This is to ensure that each distributed location has the same data. In the duplication process, changes to the master database only are allowed. This is to ensure that local data will not be overwritten. Both of the processes can keep the data current in all distributive locations.

Reference

Distributed Databases

Distributed Database System - DUET

Database Management Systems

Distributed Database Systems

Distributed Databases - Prentice Hall

Query evaluation techniques for large databases

Database management systems will continue to manage large data volumes. Thus, efficient algorithms for accessing and manipulating large sets and sequences will be required to provide acceptable performance. The advent of object-oriented and extensible database systems will not solve this problem. On the contrary, modern data models exacerbate it: In order to manipulate large sets of complex objects as efficiently as today’s database systems manipulate simple records, query processing algorithms and software will become more complex, and a solid understanding of algorithm and architectural issues is essential for the designer of database management software. This survey provides a foundation for the design and implementation of query execution facilities in new database management systems. It describes a wide array of practical query evaluation techniques for both relational and post-relational database systems, including iterative execution of complex query evaluation plans, the duality of sort- and hash-based set matching algorithms, types of parallel query execution and their implementation, and special operators for emerging database application domains.

Download

Project abstract- The Entity-Relationship Model

A data model, called the entity-relationship model, is proposed. This model incorporates some of the important semantic information about the real world. A special diagrammatic technique is introduced as a tool for database design. An example of database design and description using the model and the diagrammatic technique is given. Some implications for data integrity, infor-mation retrieval, and data manipulation are discussed. The entity-relationship model can be used as a basis for unification of different views of data: t,he network model, the relational model, and the entity set model. Semantic ambiguities in these models are analyzed. Possible ways to derive their views of data from the entity-relationship model are presented. Key Words and Phrases: database design, logical view of data, semantics of data, data models, entity-relationship model, relational model, Data Base Task Group, network model.

Download

Project – Student management System in java

A student information system (SIS) is a software application for education establishments to manage student data. Student information systems for entering student testa school, college or university. Also known as student information management system (SIMS), student records system (SRS), student management system (SMS), campus management system (CMS) or school management system (SMS).

These systems vary in size, scope and capability, from packages that are implemented in relatively small organizations to cover student records alone, to enterprise-wide solutions that aim to cover most aspects of running large multi-campus organizations with significant local responsibility. Many systems can be scaled to different levels of functionality by purchasing add-on "modules" and can typically be configured by their home institutions to meet local needs.

Reference

Source http://lernjava.blogspot.in/2010/04/student-management-system-project-in.html

Second Open source program for reference http://sourceforge.net/p/freesms/code/76/tree/

 

 

Saturday, September 22, 2012

Seminar - Microsoft Silverlight

Microsoft Silverlight is an application framework for writing and running rich Internet applications, with features and purposes similar to those of Adobe Flash. The run-time environment for Silverlight is available as a plug-in for web browsers running under Microsoft Windows and Mac OS X. While early versions of Silverlight focused on streaming media, current versions support multimedia, graphics and animation, and give developers support for CLI languages and development tools. Silverlight is also one of the two application development platforms for Windows Phone, but Silverlight enabled web pages cannot run on Internet Explorer for Windows Phone as there is no plugin.

                           

Over the course of about five years Microsoft has released five versions: The first version was released in 2007; the latest version was released on May 8, 2012. It is compatible with multiple web browsers used on Microsoft Windows and Mac OS X operating systems, and with mobile devices using the Windows Mobile and Symbian (Series 60) platforms. A free software implementation named Moonlight, developed by Novell in cooperation with Microsoft, is available to bring Silverlight versions 1 and 2 functionality to Linux, FreeBSD and other open source platforms, although some Linux distributions do not include it, citing redistribution and patent concerns. On May 2012, Moonlight was abandoned because of the lack of popularity of Silverlight

References

ArcGIS API for Microsoft Silverlight/WPF: Advanced Topics

Building Rich Web Applications with Microsoft SilverLight
Silverlight Webservices on Wall Street

Microsoft Silverlight

Microsoft Silverlight is a cross-browser, cross-platform

Monday, August 15, 2011

122 Seminar & projects

Here are 122 seminar topics related to computer science, electronics and  electrical field along with power point presentation.

    1. Project Abstract - E-Learning
    2. Seminar on SMTP
    3. Seminar on Software as a service
    4. Project - Time Attendance
    5. Tabu Search Algorithm For Cluster Building In Wire...
    6. Seminar on Online identity management
    7. Seminar on Website Marketing
    8. Seminar on Personality development
    9. How to make a Presentation
    10. Seminar on Project management
    11. Seminar on leadership qualities
    12. Seminar on Linux Virtual File System
    13. Internet Marketing Strategy
    14. Seminar on Internet Marketing
    15. Seminar on Affiliate marketing
    16. Seminar on Search Engine Marketing
    17. Seminar on Time management
    18. Seminar on Java Security
    19. Web Services in Java
    20. Seminar on SDLC
    21. Seminar on fingerprint recognition
    22. Project Abstract - Hospital Management System
    23. Seminar on Android
    24. Seminar on Organizational information systems
    25. Project - Digital library
    26. Seminar on E-Business
    27. Seminar on Iris Scanning
    28. Grid network
    29. Earth Simulator
    30. M-Commerce
    31. Socket Programming
    32. video door phone
    33. CCTV System
    34. WI-MAX
    35. WISENET
    36. Optical fiber communication
    37. Lightweight Directory Access Protocol
    38. Kerberos
    39. Organic light emitting diode (OLED)
    40. Augmented Reality
    41. The Bionic Eye
    42. Optical Communications in Space
    43. 4G Wireless Systems
    44. Bittorrent
    45. Wireless USB
    46. Tripwire
    47. Data mining
    48. Interactive Voice Response
    49. Nessus
    50. Mobile Computing
    51. Holographic Versatile Disc
    52. Satellite radio
    53. Silverlight
    54. Bluetooth
    55. Wearable computers
    56. Cluster computing
    57. Quantum computer
    58. HVAC
    59. Mobile IP
    60. FireWire
    61. Home Networking
    62. Plasma display
    63. PLAN 9 Operating system
    64. Global Positioning System
    65. Spyware and Trojan horses
    66. Voice over Internet Protocol
    67. SSL-TLS
    68. PolyBot - Modular, self-reconfigurable robots
    69. Facial recognition system
    70. Captchas
    71. Ext3 File System
    72. Embedded Linux
    73. Computer forensics
    74. Security Protocol For Sensor Network
    75. Signal processing
    76. Seminar on Smoke detector
    77. Seminar on Motion detector
    78. Seminar on Transformer
    79. Seminar Test automation framework
    80. Seminar on Digital and analog signals
    81. Seminar on Programmable logic controller
    82. Seminar on LED
    83. Seminar on power systems automations
    84. Seminar on Flight Simulator
    85. Application Server
    86. Inventory Control System
    87. Seminar - Online Gaming
    88. Project – Online Survey System
    89. Project Abstract - Traffic Management System
    90. Seminar on IPTV
    91. Seminar on Smartphone
    92. Seminar on Real-Time Operating Systems
    93. Seminar on Agile Methodology
    94. Project on GPS Integrity Monitoring
    95. Seminar on Listening Skills
    96. Seminar on Communication Skills
    97. Seminar on Mobile commerce
    98. Project - Payroll Management System
    99. Seminar on SAP CRM
    100. Seminar on Sales Tracking
    101. Seminar on Marketing
    102. Seminar on Sap R/3 Architecture
    103. Seminar on Software Project Management
    104. Seminar on Motivation
    105. Seminar on CRM
    106. Enterprise resource planning
    107. Seminar on Cloud computing
    108. Project - 2D Sonar
    109. Project - 3D Pong
    110. Project on Laser Pointer Mouse
    111. Project on Fingerprint Verification System
    112. Project - Wireless Surveillance System
    113. Project - Instant messaging
    114. Seminar on Laser Communications
    115. Project - Online Examination System
    116. Nanotechnology
    117. Project on Library Management System
    118. Seminar on web application security
    119. .Net Framework Security
    120. Seminar on .NET framework
    121. Seminar on Artificial intelligence
    122. Seminar on Unlicenced Mobile Access

Incase, you have any suggestion or wants me to add any topic. Kindly post in the comment section.

Thanks!

Saturday, August 13, 2011

Seminar on Smoke detector

A smoke detector is a device that detects smoke, typically as an indicator of fire. Commercial, industrial, and mass residential devices issue a signal to a fire alarm system, while household detectors, known as smoke alarms, generally issue a local audible and/or visual alarm from the detector itself.
Smoke detectors are typically housed in a disk-shaped plastic enclosure about 150 millimetres (6 in) in diameter and 25 millimetres (1 in) thick, but the shape can vary by manufacturer or product line. Most smoke detectors work either by optical detection (photoelectric) or by physical process (ionization), while others use both detection methods to increase sensitivity to smoke. Sensitive alarms can be used to detect, and thus deter, smoking in areas where it is banned such as toilets and schools. Smoke detectors in large commercial, industrial, and residential buildings are usually powered by a central fire alarm system, which is powered by the building power with a battery backup. However, in many single family detached and smaller multiple family housings, a smoke alarm is often powered only by a single disposable battery.

               

The first automatic electric fire alarm was invented in 1890 by Francis Robbins Upton (U.S. patent no. 436,961). Upton was an associate of Thomas Edison, but there is no evidence that Edison contributed to this project.
George Andrew Darby patents the first electrical Heat detector and Smoke detector in 1902 in Birmingham, England. [1]
In the late 1930s the Swiss physicist Walter Jaeger tried to invent a sensor for poison gas. He expected that gas entering the sensor would bind to ionized air molecules and thereby alter an electric current in a circuit in the instrument. His device failed: small concentrations of gas had no effect on the sensor's conductivity. Frustrated, Jaeger lit a cigarette—and was soon surprised to notice that a meter on the instrument had registered a drop in current. Smoke particles had apparently done what poison gas could not. Jaeger's experiment was one of the advances that paved the way for the modern smoke detector.

Presentation on smoke detector

Residential Smoke Alarm Installation
Smoke Detectors
How Does A Smoke Detector Work?
First Thought When Smoke Detector Went Off
Smoke Detector Installation.ppt
Wireless Smoke Detection
Carbon Monoxide Detectors & Fire Alarms

Seminar on Motion detector

An electronic motion detector contains a motion sensor that transforms the detection of motion into an electric signal. This can be achieved by measuring optical or acoustical changes in the field of view. Most motion detectors can detect up to 15–25 meters (50–80 feet).
A motion detector may be connected to a burglar alarm that is used to alert the home owner or security service after it detects motion. Such a detector may also trigger a red light camera or outdoor lighting.
An occupancy sensor is a motion detector that is integrated with a timing device. It senses when motion has stopped for a specified time period in order to trigger a light extinguishing signal. These devices prevent illumination of unoccupied spaces like public toilets. They are widely used for security purposes.a

                             

There are basically four types of sensors used in motion detectors spectrum:
Passive infrared sensors (Passive)
Looks for body heat. No energy is emitted from the sensor.
Ultrasonic (active)
Sends out pulses of ultrasonic waves and measures the reflection off a moving object.
Microwave (active)
Sensor sends out microwave pulses and measures the reflection off a moving object. Similar to a police radar gun.
Tomographic Detector (active)
Senses disturbances to radio waves as they travel through an area surrounded by mesh network nodes.

Presentation on Motion sensor

Motion Sensors
Motion detection with movement detectors
MRI Motion Detector Software Applicaiton
Motion Detector
Motion Detection in UAV videos
Using the motion detector

Seminar on Transformer

A transformer is a device that transfers electrical energy from one circuit to another through inductively coupled conductors—the transformer's coils. A varying current in the first or primary winding creates a varying magnetic flux in the transformer's core and thus a varying magnetic field through the secondary winding. This varying magnetic field induces a varying electromotive force (EMF), or "voltage", in the secondary winding. This effect is called mutual induction.
If a load is connected to the secondary, an electric current will flow in the secondary winding and electrical energy will be transferred from the primary circuit through the transformer to the load. In an ideal transformer, the induced voltage in the secondary winding (Vs) is in proportion to the primary voltage (Vp), and is given by the ratio of the number of turns in the secondary (Ns) to the number of turns in the primary (Np) as follows:

                 

By appropriate selection of the ratio of turns, a transformer thus allows an alternating current (AC) voltage to be "stepped up" by making Ns greater than Np, or "stepped down" by making Ns less than Np.
In the vast majority of transformers, the windings are coils wound around a ferromagnetic core, air-core transformers being a notable exception.
Transformers range in size from a thumbnail-sized coupling transformer hidden inside a stage microphone to huge units weighing hundreds of tons used to interconnect portions of power grids. All operate with the same basic principles, although the range of designs is wide. While new technologies have eliminated the need for transformers in some electronic circuits, transformers are still found in nearly all electronic devices designed for household ("mains") voltage. Transformers are essential for high-voltage electric power transmission, which makes long-distance transmission economically practical.

Presentation

100 MVA POWER TRANSFORMER

Transformer Design Differences
DRY CORE TRANSFORMERS (rated under 750 volts)
Ramifications of the New Transformer Efficiency Standards
Transformers
Transformer 2

Seminar on Flight Simulator

Flight simulation is an artificial re-creation of aircraft flight and various aspects of the flight environment. This includes the equations that govern how aircraft fly, how they react to applications of their controls and other aircraft systems, and how they react to the external environment such as air density, turbulence, cloud, precipitation, etc. Flight simulation is used for a variety of reasons, including flight training (mainly of pilots), for the design and development of the aircraft itself, and for research into aircraft characteristics, control handling qualities, and so forth.

        
Flight simulations have varying degrees of hardware, modelling detail and realism that depend on their purpose. They can range from PC laptop-based models of aircraft systems, to simple replica cockpits for familiarisation purposes, to more complex cockpit simulations with some working controls and systems, to highly detailed cockpit replications with all controls and aircraft systems and wide-field outside-world visual systems, all mounted on six degree-of-freedom (DOF) motion platforms which move in response to pilot control movements and external aerodynamic factors.

Presentation

Flight Simulator Game Engine Progress
Human Space Flight Training Survey – FAA
Computational Bat Flight Visualization

Sunday, August 7, 2011

Application Server

An application server is a software framework that provides an environment where applications can run, no matter what the applications are or what they do. It is dedicated to the efficient execution of procedures (programs, routines, scripts) for supporting the construction of applications.
The term was originally used when discussing early client–server systems to differentiate servers that run SQL services and middleware servers from file servers.


Later, the term took on the meaning of Web applications, but has since evolved further into more of a comprehensive service layer. An application server acts as a set of components accessible to the software developer through an API defined by the platform itself. For Web applications, these components are usually performed in the same machine where the Web server is running, and their main job is to support the construction of dynamic pages. However, present-day application servers target much more than just Web pages generation, they implement services like clustering, fail-over and load-balancing, so developers can be focused just on implementing the business logic.
Normally the term refers to Java application servers. When this is the case, the application server behaves like an extended virtual machine for the running applications, handling transparently connections to the database at one side, and connections to the Web client at the other.
Other uses of the term may refer to the services that a server makes available or the computer hardware on which the services run.

PowerPoint Presentation

Next Generation Web Application Server Platform
ApplicationServer.ppt
Application Servers
IBM WebSphere Application Server Fundamentals – Part 2
Application Server
J2EE Application Server

Inventory Control System

An inventory control system is a process for managing and locating objects or materials. In common usage, the term may also refer to just the software components.
Modern inventory control systems often rely upon barcodes and RFID tags to provide automatic identification of inventory objects. In an academic study performed at Wal-Mart, RFID reduced Out of Stocks by 30 percent for products selling between 0.1 and 15 units a day. Inventory objects could include any kind of physical asset: merchandise, consumables, fixed assets, circulating tools, library books, or capital equipment. To record an inventory transaction, the system uses a barcode scanner or RFID reader to automatically identify the inventory object, and then collects additional information from the operators via fixed terminals (workstations), or mobile computers.


An inventory control system may be used to automate a sales order fulfillment process. Such a system contains a list of order to be filled, and then prompts workers to pick the necessary items, and provides them with packaging and shipping information.
An inventory system also manages in and outwards material of hardware.
Real-time inventory control systems may use wireless, mobile terminals to record inventory transactions at the moment they occur. A wireless LAN transmits the transaction information to a central database.

PowerPoint Presentation on inventory control system

Inventory Management I
Inventory Management 2
Inventory Management 3
Inventory Systems for Independent Demand
DISTRIBUTION INVENTORY SYSTEMS
Inventory control model

Friday, August 5, 2011

Seminar on IPTV

Internet Protocol television (IPTV) is a system through which Internet television services are delivered using the architecture and networking methods of the Internet Protocol Suite over a packet-switched network infrastructure (such as the Internet or other access network), instead of being delivered through traditional radio frequency broadcast, satellite signal, and cable television (CATV) formats.
IPTV services may be classified into three main groups:
live television, with or without interactivity related to the current TV show;


time-shifted television: catch-up TV (replays a TV show that was broadcast hours or days ago), start-over TV (replays the current TV show from its beginning)
video on demand (VOD): browse a catalog of videos, not related to TV programming.
IPTV is distinguished from general Internet-based or web-based multimedia services by its on-going standardization process (e.g., European Telecommunications Standards Institute) and preferential deployment scenarios in subscriber-based telecommunications networks with high-speed access channels into end-user premises via set-top boxes or other customer-premises equipment.

Powerpoint presentation on IPTV

Iptv.Ppt
IPTV Industry Potential and Limitations - Gerson Lehrman Group
Presentation on IPTV and Mobile TV
Social IPTV Platform for Internal Collaboration

Tuesday, July 26, 2011

Seminar on Real-Time Operating Systems

A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time application requests.
A key characteristic of a RTOS is the level of its consistency concerning the amount of time it takes to accept and complete an application's task; the variability is jitter. A hard real-time operating system has less jitter than a soft real-time operating system. The chief design goal is not high throughput, but rather a guarantee of a soft or hard performance category. A RTOS that can usually or generally meet a deadline is a soft real-time OS, but if it can meet a deadline deterministically it is a hard real-time OS.
A real-time OS has an advanced algorithm for scheduling. Scheduler flexibility enables a wider, computer-system orchestration of process priorities, but a real-time OS is more frequently dedicated to a narrow set of applications. Key factors in a real-time OS are minimal interrupt latency and minimal thread switching latency, but a real-time OS is valued more for how quickly or how predictably it can respond than for the amount of work it can perform in a given period of time.

Power point presentation on real-time operating system

RTOS - Design and Implementation
6.0 INTRODUCTION TO REAL-TIME OPERATING SYSTEMS (RTOS)
Real Time Operating Systems
Real-Time Operating Sytems - Stanford
Basic Design using RTOS
Real Time Operating Systems (RTOS)

Seminar on Agile Methodology

Agile Software Development is a group of software development methodologies based on iterative and incremental development, where requirements and solutions evolve through collaboration between self-organizing, cross-functional teams. The Agile Manifesto introduced the term in 2001.

       

Incremental software development methods have been traced back to 1957. In 1974, a paper by E. A. Edmonds introduced an adaptive software development process.
So-called lightweight software development methods evolved in the mid-1990s as a reaction against heavyweight methods, which were characterized by their critics as a heavily regulated, regimented, micromanaged, waterfall model of development. Proponents of lightweight methods (and now agile methods) contend that they are a return to development practices from early in the history of software development.
Early implementations of lightweight methods include Scrum (1995), Crystal Clear, Extreme Programming (1996), Adaptive Software Development, Feature Driven Development, and Dynamic Systems Development Method (DSDM) (1995). These are now typically referred to as agile methodologies, after the Agile Manifesto published in 2001.

Power point presentation on Agile Software Development

SCRUM – an agile software development methodology
Agile Development Methodology
Agile Software Development
eXtreme Programming and Agile Concepts
Agile Software Engineering
Agile Methods A Practical Perspective

Sunday, July 24, 2011

Project on GPS Integrity Monitoring

Receiver Autonomous Integrity Monitoring (RAIM) is a technology developed to assess the integrity of Global Positioning System (GPS) signals in a GPS receiver system. It is of special importance in safety-critical GPS applications, such as in aviation or marine navigation.

RAIM detects faults with redundant GPS pseudorange measurements. That is, when more satellites are available than needed to produce a position fix, the extra pseudoranges should all be consistent with the computed position. A pseudorange that differs significantly from the expected value (i.e., an outlier) may indicate a fault of the associated satellite or another signal integrity problem (e.g., ionospheric dispersion). Traditional RAIM uses fault detection (FD) only, however newer GPS receivers incorporate Fault Detection and Exclusion (FDE) which enables them to continue to operate in the presence of a GPS failure.


The test statistic used is a function of the pseudorange measurement residual (the difference between the expected measurement and the observed measurement) and the amount of redundancy. The test statistic is compared with a threshold value, which is determined based on the requirements for the probability of false alarm (Pfa) and the probability of missed detection

Project abstract - PDF

Friday, July 22, 2011

Seminar on Marketing

Marketing is the process used to determine what products or services may be of interest to customers, and the strategy to use in sales, communications and business development.It generates the strategy that underlies sales techniques, business communication, and business developments. It is an integrated process through which companies build strong customer relationships and create value for their customers and for themselves.


Marketing is used to identify the customer, satisfy the customer, and keep the customer. With the customer as the focus of its activities, marketing management is one of the major components of business management. Marketing evolved to meet the stasis in developing new markets caused by mature markets and overcapacities in the last 2-3 centuries.[citation needed] The adoption of marketing strategies requires businesses to shift their focus from production to the perceived needs and wants of their customers as the means of staying profitable.
The term marketing concept holds that achieving organizational goals depends on knowing the needs and wants of target markets and delivering the desired satisfactions. It proposes that in order to satisfy its organizational objectives, an organization should anticipate the needs and wants of consumers and satisfy these more effectively than competitors.

Power point presentation on Marketing

Presentation Guidelines for Marketing Plans
Marketing
How to create a Successful Marketing Plan
Marketing Management
CRM in Marketing
MARKETING ENVIRONMENT

Wednesday, July 20, 2011

Seminar on Sap R/3 Architecture

SAP R/3 is the former name of the main enterprise resource planning software produced by SAP AG. It is an enterprise-wide information system designed to coordinate all the resources, information, and activities needed to complete business processes such as order fulfillment or billing.


The first version of SAP's flagship enterprise software was a financial Accounting system named R/1 called as YSR. This was replaced by R/2 at the end of the 1970s. SAP R/2 was in a mainframe based business application software suite that was very successful in the 1980s and early 1990s. It was particularly popular with large multinational European companies who required soft-real-time business applications, with multi-currency and multi-language capabilities built in. With the advent of distributed client–server computing SAP AG brought out a client–server version of the software called SAP R/3 (The "R" was for "Real-time data processing" and 3 was for 3-tier). This new architecture is compatible with multiple platforms and operating systems, such as Microsoft Windows or UNIX. This opened up SAP to a whole new customer base

SAP R/3 was officially launched on 6 July 1992. It was renamed SAP ERP and later again renamed ECC (ERP Central Component). SAP came to dominate the large business applications market over the next 10 years. SAP ECC 5.0 ERP is the successor of SAP R/3 4.70. The newest version of the suite is SAP ERP 6.0 – the path to SAP Business Suite 7.

Power point presentation on SAP

SAP R/3 Architecture
SAP R/3 Architecture 2
Study of SAP R/3 Architecture
SAP R/3 Overview & Basis Technology
SAP Business Warehouse (BW)
Architecture of the R/3 System

Seminar on Software Project Management

The history of software project management is closely related to the history of software. Software was developed for dedicated purposes for dedicated machines until the concept of object-oriented programming began to become popular in the 1960's, making repeatable solutions possible for the software industry. Dedicated systems could be adapted to other uses thanks to component-based software engineering. Companies quickly understood the relative ease of use that software programming had over hardware circuitry, and the software industry grew very quickly in the 1970's and 1980's. To manage new development efforts, companies applied proven project management methods, but project schedules slipped during test runs, especially when confusion occurred in the gray zone between the user specifications and the delivered software. To be able to avoid these problems, software project management methods focused on matching user requirements to delivered products, in a method known now as the waterfall model.

Power point presentation on software project management
Software Project Management
Software Project Management 2
Software Project Management 3

Project management - Center for Systems and Software Engineering

Project Management – Planning
Quantitative Methods in Project Management

Monday, July 18, 2011

Enterprise resource planning

Enterprise resource planning (ERP) integrates internal and external management information across an entire organization, embracing finance/accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this activity with an integrated software application. Its purpose is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders.
ERP systems can run on a variety of hardware and network configurations, typically employing a database as a repository for information.


ERP systems typically include the following characteristics:

  • An integrated system that operates in real time (or next to real time), without relying on periodic updates.
  • A common database, which supports all applications.
  • A consistent look and feel throughout each module.
  • Installation of the system without elaborate application/data integration by the Information Technology (IT) department
    Power point presentation on ERP
ERP PPT - Free ERP Software Implementation Guide

 ERP Implementation Fundamentals

 ERP Centric Data Mining and KD

 ERP

 ERP Modules

 ERP and CRM