<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>ITC594 - E-systems Infrastructure Development</title><description></description><managingEditor>noreply@blogger.com (Kunal)</managingEditor><pubDate>Fri, 1 Nov 2024 03:35:10 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">26</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://itc594-kunal.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Exercise_PHP MySQL Connection</title><link>http://itc594-kunal.blogspot.com/2010/05/exercisephp-mysql-connect-to-database.html</link><category>Exercise_PHP MySQL Connection</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sat, 29 May 2010 11:05:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-6139534347953330633</guid><description>&lt;div style="text-align: center;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-weight: bold;"&gt;PHP MySQL Connect to a Database&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;            &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;  &lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Before we can access da&lt;/span&gt;&lt;span style="font-family:Arial;"&gt;ta in a databas&lt;/span&gt;&lt;span style="font-family:Arial;"&gt;e, we need to create a connection to the database.&lt;br /&gt;In PHP, this is done with the mysql_connect() function.&lt;br /&gt;Syntax&lt;br /&gt;mysql_connect(servername,username,password);&lt;br /&gt;Example:&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:Arial;"&gt;In the following example we store the connection in a variable ($con) for later use in the script. The "die" part will be executed if the connection fails:&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBcPOeymL1BvHXgLR01hSxRE38AX_VhPdOxE4Bas8WQz9l_yFwpE-JZzLep8lT3Vo5Axv7za7fVy27aMj-4B03m9MATXtz0P63IxPxF0uKvLKWVVDcZMDNEnZ5cXroPLf7yxbshRoaXVs/s1600/php1.bmp"&gt;&lt;img style="cursor: pointer; width: 320px; height: 128px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBcPOeymL1BvHXgLR01hSxRE38AX_VhPdOxE4Bas8WQz9l_yFwpE-JZzLep8lT3Vo5Axv7za7fVy27aMj-4B03m9MATXtz0P63IxPxF0uKvLKWVVDcZMDNEnZ5cXroPLf7yxbshRoaXVs/s320/php1.bmp" alt="" id="BLOGGER_PHOTO_ID_5476686435702724674" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;      &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style=";font-family:Arial;font-size:100%;"  &gt;Closing a Connection&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;span style=";font-family:Arial;font-size:100%;"  &gt;The connection will be closed automatically when the script ends. To close the connection before, use the mysql_close() function:&lt;/span&gt;&lt;span style="font-size:100%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiex0l20Ij5SrCdQiC38MAJ7k2i-PzuEGVgIIRAX3O2QOxjniyOZRjr4oKg9LwTH5G9uKsHKkzgsSnplpPEnNsNCUX_NQYHgL98OEDXFzc8AKuvHkqhLnAszVU-Ekt9U1skIaooR6RLZmM/s1600/php2.bmp"&gt;&lt;img style="cursor: pointer; width: 320px; height: 147px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiex0l20Ij5SrCdQiC38MAJ7k2i-PzuEGVgIIRAX3O2QOxjniyOZRjr4oKg9LwTH5G9uKsHKkzgsSnplpPEnNsNCUX_NQYHgL98OEDXFzc8AKuvHkqhLnAszVU-Ekt9U1skIaooR6RLZmM/s320/php2.bmp" alt="" id="BLOGGER_PHOTO_ID_5476687356563642562" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style=";font-family:Arial;font-size:12;"  &gt; &lt;/span&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBcPOeymL1BvHXgLR01hSxRE38AX_VhPdOxE4Bas8WQz9l_yFwpE-JZzLep8lT3Vo5Axv7za7fVy27aMj-4B03m9MATXtz0P63IxPxF0uKvLKWVVDcZMDNEnZ5cXroPLf7yxbshRoaXVs/s72-c/php1.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Exercise_Week 10_b</title><link>http://itc594-kunal.blogspot.com/2010/05/exerciseweek-102.html</link><category>Exercise_Week 10_b</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sat, 29 May 2010 09:02:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-6710666644754284018</guid><description>&lt;div style="text-align: center;"&gt;&lt;b style="font-weight: bold;"&gt;&lt;span style="font-family:Arial;"&gt;COM and &lt;/span&gt;&lt;/b&gt;&lt;span style="font-weight: bold;font-family:Arial;" &gt;Distributed &lt;/span&gt;&lt;b style="font-weight: bold;"&gt;&lt;span style="font-family:Arial;"&gt;COM&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Component Object Model (COM):&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family:Arial;"&gt; The Component Object Model (COM) is a software architecture that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. OLE services span various aspects of commonly needed system functionality, including compound documents, custom controls, inter application scripting, data transfer, and other software interactions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Distributed COM (DCOM):&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family:Arial;"&gt; Microsoft® Distributed COM (DCOM) extends the Component Object Model (COM) to support communication among objects on different computers—on a LAN, a WAN, or even the Internet. With DCOM, an application can be distributed at locations that make the most sense to customer and to the application.&lt;br /&gt;Because DCOM is a seamless evolution of COM, the world's leading component technology, an organization can take advantage of existing investment in COM-based applications, components, tools, and knowledge to move into the world of standards-based distributed computing. As organization do so, DCOM handles low-level details of network protocols so organization can focus on real business: providing great solutions to customers.&lt;b style=""&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Reference:&lt;/span&gt;&lt;/p&gt;  &lt;ul&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Kindel, C. The Rules of the Component Object Model, Microsoft Development Network Library&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;ul&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Microsoft and Digital Equipment Corporation (1996b), Distributed Component Object Model Specification (Draft Version 0.9) Microsoft and Digital Equipment Corporation.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Exercise_Week 10_a</title><link>http://itc594-kunal.blogspot.com/2010/05/exerciseweek-10_21.html</link><category>Exercise_Week 10_a</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sat, 29 May 2010 08:28:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-3192082832027363644</guid><description>&lt;p class="MsoNormal" style="text-align: center; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Parallel Processing, Semaphore, Microsoft .Net Framework, Microsoft .Net, E-commerce and Mobile Commerce&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Parallel Processing: &lt;/span&gt;&lt;/b&gt;&lt;span style="font-family:Arial;"&gt;Parallel Processing is simultaneous use of more than one computer or processor to solve a problem. The processors may communicate in order to be able to cooperate in solving a problem or they may run completely independently, possibly under the control of another processor which distributes work to the others and collects results from them.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Semaphore: &lt;/span&gt;&lt;/b&gt;&lt;span style="font-family:Arial;"&gt;A semaphore is an integer counter associated with a thread wait queue. Two atomic operations are available on semaphores: P (or pass) and V (or free). The P operation decrements the counter, and blocks the thread if the counter has reached a negative value. The V operation increments the counter and wakes up a thread, if any, in the semaphore wait queue.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Microsoft .Net Framework: &lt;/span&gt;&lt;/b&gt;&lt;span style="font-family:Arial;"&gt;The Microsoft .NET Framework is a software component which can be added to the Microsoft Windows operating system. It provides a large body of pre-coded solutions to common program requirements, and manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering, and is intended to be used by most new applications created for the Windows platform.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Microsoft .Net: &lt;/span&gt;&lt;/b&gt;&lt;span style="font-family:Arial;"&gt;Microsoft .Net is an umbrella term that applies to a collection of products and technologies from Microsoft. All have in common a dependence on the Microsoft .NET Framework, a component of the Windows operating system.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;E-commerce: &lt;/span&gt;&lt;/b&gt;&lt;span style="font-family:Arial;"&gt;E-commerce (electronic-commerce) refers to business over the Internet. Web sites such as Amazon.com, Buy.com, and eBay are all e-commerce sites. The two major forms of e-commerce are Business-to-Consumer (B2C) and Business-to-Business (B2B). While companies like Amazon.com cater mostly to consumers, other companies provide goods and services exclusively to other businesses. The terms "e-business" and "e-tailing" are often used synonymously with e-commerce.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Mobile Commerce: &lt;/span&gt;&lt;/b&gt;&lt;st1:place st="on"&gt;&lt;span style="font-family:Arial;"&gt;Mobile&lt;/span&gt;&lt;/st1:place&gt;&lt;span style="font-family:Arial;"&gt; Commerce describes business processes which are integrated in a mobile device. Mobile commerce is exactly the same as e-commerce except that the access mechanism is via a wireless phone or terminal rather than the fixed telephone network. The security aspect of transactions is addressed by the encryption inherent in the GSM specification. Internet access is being addressed by initiatives such as the Wireless Application Protocol (WAP) which provides an easy-to-use system for Internet access from mobile terminals.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Reference:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;ul&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Klenke, R.H.; Williams, R.D.; Aylor, J.H., “Parallel-processing techniques for automatic test pattern generation”, IEEE Computer, Volume 25, Issue 1, Jan. 1992 Page(s):71 – 84&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;ul&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Rosen, Anita. 2000. The E-commerce Question and Answer Book: A Survival Guide for Business Managers. American Management Association&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;ul&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Lamont, Douglas. 2001. Conquering the Wireless World: The Age of m-Commerce. &lt;st1:country-region st="on"&gt;&lt;st1:place st="on"&gt;United   Kingdom&lt;/st1:place&gt;&lt;/st1:country-region&gt;: Capstone Publishing Inc.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;ul&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Young Patrick, Thomas Theys 1999. Capital Market Revolution: The Future of Markets in an Online World. &lt;st1:country-region st="on"&gt;&lt;st1:place st="on"&gt;Great Britain&lt;/st1:place&gt;&lt;/st1:country-region&gt;: Pearson Education Limited.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Exercise_Week 9</title><link>http://itc594-kunal.blogspot.com/2010/05/exerciseweek-10.html</link><category>Exercise_Week 9</category><author>noreply@blogger.com (Kunal)</author><pubDate>Fri, 28 May 2010 08:18:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-4636855614375259455</guid><description>&lt;p class="MsoNormal" style="text-align: center; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-weight: bold;"&gt;Designing distributed systems&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;                                    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;A distributed system is a collection of independent computers that appear to its users as a single coherent system.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Characteristics of distributed system&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Multiple, independent processing units&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Processors communicate via a hardware interconnect&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Processing unit failures are independent&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Manage resource sharing&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;State is shared among processors&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;            &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;A distributed system is a collection of independent computers that are used jointly to perform a single task or to provide a single service.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Examples of distributed systems&lt;/span&gt;&lt;br /&gt;Probably the simplest and most well known example of a distributed system is the collection of Web servers—or more precisely, servers implementing the HTTP protocol—that jointly provide the distributed database of hypertext and multimedia documents that we know as the World-Wide Web. Other examples include the computers of a local network that provide a uniform view of a distributed file system and the collection of computers on the Internet that implement the Domain Name Service (DNS).&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Why do we use distributed systems?&lt;/span&gt;&lt;br /&gt;The alternative to using a distributed system is to have a huge centralized system, such as a mainframe. For many applications there are a number of economic and technical reasons that make distributed systems much more attractive than their centralized counterparts.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Cost:&lt;/span&gt; Better price/performance as long as commodity hardware is used for the component computers.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Performance:&lt;/span&gt; By using the combined processing and storage capacity of many nodes, performance levels can be reached that are beyond the range of centralized machines.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Scalability:&lt;/span&gt; Resources such as processing and storage capacity can be increased incrementally.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Reliability:&lt;/span&gt; By having redundant components the impact of hardware and software faults on users can be reduced.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Inherent distribution:&lt;/span&gt; Some applications, such as email and the Web (where users are spread out over the whole world), are naturally distributed. This includes cases where users are geographically dispersed as well as when single resources (e.g., printers, data) need to be shared.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span  lang="NL" style="font-family:Arial;"&gt;Reference:&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;  &lt;/p&gt;&lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;B. Clifford Neuman.      Scale in distributed systems. In T. Casavant and M. Singhal, &lt;st1:city st="on"&gt;Readings&lt;/st1:city&gt; in Distributed Computing Systems, pages      463–489, IEEE Computer Society Press, &lt;st1:place st="on"&gt;&lt;st1:city st="on"&gt;Los Alamitos&lt;/st1:city&gt;, &lt;st1:state st="on"&gt;CA&lt;/st1:state&gt;, &lt;st1:country-region st="on"&gt;USA&lt;/st1:country-region&gt;&lt;/st1:place&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;ul&gt;&lt;li&gt;&lt;span style=";font-family:Arial;font-size:12;"  lang="NL" &gt;Andrew S. Tanenbaum and Maarten van Steen. &lt;/span&gt;&lt;span style=";font-family:Arial;font-size:12;"  &gt;Distributed Systems: Principles and Paradigms, Prentice Hall, 2&lt;sup&gt;nd&lt;/sup&gt; edition, 2007&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Exercise_Week 8</title><link>http://itc594-kunal.blogspot.com/2010/05/exerciseweek-8.html</link><category>Exercise_Week 8</category><author>noreply@blogger.com (Kunal)</author><pubDate>Thu, 27 May 2010 08:15:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-8900078513054469230</guid><description>&lt;p class="MsoNormal" style="LINE-HEIGHT: 150%; TEXT-ALIGN: center"&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="FONT-WEIGHT: bold"&gt;Concurrency and transactions&lt;/span&gt;&lt;?xml:namespace prefix = o /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style="font-family:Arial;"&gt;Transaction is an action or series of actions, carried out by user or application, which accesses or changes contents of database.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt; &lt;p class="MsoNormal" style="LINE-HEIGHT: 150%; TEXT-ALIGN: justify"&gt;&lt;span style="font-family:Arial;"&gt;Concurrent execution of user programs is essential for good database management system (DBMS) performance.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="LINE-HEIGHT: 150%; TEXT-ALIGN: justify"&gt;&lt;span style="font-family:Arial;"&gt;Because disk accesses are frequent, and relatively slow, it is important to keep the CPU humming by working on several user programs concurrently.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="LINE-HEIGHT: 150%; TEXT-ALIGN: justify"&gt;&lt;span style="font-family:Arial;"&gt;A user’s program may carry out many operations on the data retrieved from the database, but the DBMS is only concerned about what data is read/write from/to the database.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="LINE-HEIGHT: 150%; TEXT-ALIGN: justify"&gt;&lt;span style="font-family:Arial;"&gt;A transaction is the DBMS abstract view of a user program:&lt;span style="font-size:0;"&gt; &lt;/span&gt;a sequence of reads and writes.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="LINE-HEIGHT: 150%; TEXT-ALIGN: justify"&gt;&lt;span style="font-family:Arial;"&gt;When multiple users access a database simultaneously, their data operations have to be coordinated in order to prevent incorrect results and to preserve the consistency of the shared data. This activity is called concurrency control and should provide each concurrent user with the illusion that he is referencing a dedicated database. The classical transaction concept defines a transaction as the unit of concurrency control, that is, the DBMS has to guarantee isolated execution for an entire transaction. This implies that its results as derived in a multi-programming environment should be the same as if obtained in a serial execution schedule. Other important transaction properties are atomicity, consistency, and durability. In a DBMS, the component responsible for achieving these properties is transaction management which includes concurrency control as a major function.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="LINE-HEIGHT: 150%; TEXT-ALIGN: justify"&gt;&lt;span style="font-family:Arial;"&gt;Concurrency control and recovery are among the most important functions provided by a DBMS.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="LINE-HEIGHT: 150%; TEXT-ALIGN: justify"&gt;&lt;span style="font-family:Arial;"&gt;Users do not need to worry about concurrency.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="LINE-HEIGHT: 150%; TEXT-ALIGN: justify"&gt;&lt;span style="font-family:Arial;"&gt;System automatically inserts lock/unlock requests and schedules actions of different Xacts in such a way as to ensure that the resulting execution is equivalent to executing the Xacts one after the other in an order.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="LINE-HEIGHT: 150%; TEXT-ALIGN: justify"&gt;&lt;span style="font-family:Arial;"&gt;Reference:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Beeri, C., Bernstein, E.A., and Goodman, N., A model for concurrency in nested transaction systems, Journal oftheACM, 36(1):230-269.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Bernstein, P.A. and Goodman, N. Concurrency control in distributed database systems. ACM Computing Surveys, 13(2):185-221.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class="MsoNormal" style="LINE-HEIGHT: 150%; TEXT-ALIGN: justify"&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;Bernstein, E.A., Hadzilacos, N., and Goodman, N. Concurrency Control and Recovery in Database Systems, Addison-Wesley: &lt;?xml:namespace prefix = st1 /&gt;&lt;st1:place st="on"&gt;&lt;st1:city st="on"&gt;Reading&lt;/st1:city&gt;, &lt;st1:state st="on"&gt;Pennsylvania&lt;/st1:state&gt;&lt;/st1:place&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Exercise_Week 7</title><link>http://itc594-kunal.blogspot.com/2010/05/exerciseweek-7.html</link><category>Exercise_Week 7</category><author>noreply@blogger.com (Kunal)</author><pubDate>Wed, 26 May 2010 08:16:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-8783799797290463913</guid><description>&lt;p class="MsoNormal" style="text-align: center; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-weight: bold;"&gt;Internet Security&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Security has become one of the primary concerns when an organization connects its private network to the Internet. Regar&lt;/span&gt;&lt;span style="font-family:Arial;"&gt;dless of the business, an increasing number of users on private networks are demanding access to Internet services such as the World Wide Web (WWW), Internet mail, Telnet, and File Transfer Protocol (FTP). In addition, corporations want to offer WWW home pages and FTP servers for public access on the Internet. Network administrators have increasing concerns about the security of their networks when they expose their organization’s private d&lt;/span&gt;&lt;span style="font-family:Arial;"&gt;ata and networking infrastructure to Internet crackers. To provide the required level of protection, an organization needs a security policy to prevent unauthorized users from accessing resources on the private network and to protect against the unauthorized export of private information. Even if an organization is not connected to the Internet, it may still want to establish an internal security policy to manage user access to portions of the network and protect sensitive or secret information.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-weight: bold;"&gt;Internet Firewalls&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;An Internet firewall is a system or group of systems that enforces a security policy between an organization’s network and the Internet. The firewall determines which inside services may be accessed from the outside, which outsiders are permitted access to the permitted inside services, and which outside services may be accessed by insiders. For a firewall to be effective all traffic to and from the Internet must pass through the firewall, where it can be inspected. The firewall must permit only authorized traffic to pass, and the firewall itself must be immune to penetration. Unfortunately, a firewall system cannot offer any protection once an attacker has gotten through or around the firewall. It is important to note that an Internet firewall is not just a router, a bastion host, or a combination of devices that provides security for a network. The firewall is part of an overall security policy that creates a perimeter defense designed to protect the information resources of the organization. This security policy must include published security guidelines to inform users of their responsibilities; corporate policies defining network access, service access, local and remote user authentication, dial-in and dial-out, disk and data encryption, and virus protection measures; and employee training. All potential points of network attack must be protected with the same level of network security. Setting up an Internet firewall without a comprehensive security policy is like placing a steel door on a tent. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-weight: bold;"&gt;Benefits of an Internet Firewall&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Internet firewalls manage access between the Internet and an organization’s private network&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Without a firewall, each host system on the private network is exposed to attacks from other hosts on the Internet.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Internet firewalls allow the network administrator to define a centralized “choke point” that keeps unauthorized users such as hackers, crackers, vandals, and spies out of the protected network; prohibits potentially vulnerable services from entering or leaving the protected network; and provides protection from various types of routing attacks. An Internet firewall simplifies security management, since network security is consolidated on the firewall systems rather than being distributed to every host in the entire private network.&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;  &lt;/p&gt;&lt;p class="MsoNormal" style="line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Reference:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;ul&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-style: italic;"&gt;Building Internet Firewalls&lt;/span&gt; D. Brent Chapman and Elizabeth Zwicky. O’Reilly &amp;amp; Associates&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;  &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-style: italic;"&gt;Firewalls and Internet Security: Repelling the Wily Hacker&lt;/span&gt; Bill Cheswick and Steve Bellovin. Addison-Wesley&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;br /&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Exercise_Week 6</title><link>http://itc594-kunal.blogspot.com/2010/04/exerciseweek-6.html</link><category>Exercise_Week 6</category><author>noreply@blogger.com (Kunal)</author><pubDate>Tue, 25 May 2010 08:02:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-2172681241068466676</guid><description>&lt;p class="MsoNormal" style="text-align: center; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-weight: bold;"&gt;Distributed Objects and CORBA&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The term distributed objects, describes objects which reside in separate address spaces and methods of which can be subject of remote method calls (a remote call is issued in an address space separate to the address space where the target object resides). By convention, the code issuing the call is referred to as the client; the target object is referred to as the server object (or simply remote object); the set of methods which implements one of the server object’s interfaces is sometimes designated as a service that this object provides. Similarly, the process in which the server object is located is referred to as a server. (Orfali, Harkey and Edwards, Wiley Computer Publishing Group)&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;CORBA&lt;/span&gt;&lt;br /&gt;CORBA stands for Common Object Request Broker Architecture, is the result of the work done by major actors of the hardware and software industry to set up a communication framework. The goal is to facilitate the development of distributed applications over a heterogeneous network. In a distributed environment, clients are talking to objects. The services that can be delivered to a client by an object are described in an interface. The means of communication are handled by an Object Request Broker (ORB). The idea behind CORBA is to provide an intermediary layer that handles access requests on data. It frees the developer from most of the portability issues. It enables the development of distributed objects. (Jon Siegel, Wiley Computer Publishing Group)&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Distributed objects in CORBA&lt;/span&gt;&lt;br /&gt;Basic principles&lt;br /&gt;1. Request &amp;amp; response&lt;br /&gt;In CORBA, a client issues a request to execute a method of an object implementation. There is no constraint imposed on the location of the client and the requested object implementation (remote object); they can share an address space, can be located in separate address spaces on the same node, or can be located on separate nodes. A server (process) can contain implementation of several objects or a single object, or even provide an implementation of one particular method only. However, typically, a multithreaded server encapsulates implementations of multiple objects.&lt;br /&gt;2. Remote reference&lt;br /&gt;Remote references are called Object References and the target of an Object Reference must be an object that supports the CORBA::Object IDL interface (such objects are called CORBA objects).&lt;br /&gt;3. IDL Interface&lt;br /&gt;CORBA specifies the CORBA IDL Language and its mapping to several programming languages (e.g., C++, Java, and Smalltalk). The IDL language provides means for interface definitions; there are no constructs related to object implementation (object state definitions have been proposed recently by OMG).&lt;br /&gt;4. Proxy: local representative&lt;br /&gt;Using the Broker Pattern terminology, the client-side proxy code is called IDL stub; the server-side proxy code is referred to as IDL skeleton. However, in CORBA, the concept "proxy" is used to denote an object created on the client side which contains the IDL stub plus provides some other functionality, e.g. support for dynamic invocation. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Reference:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Robert Orfali, Dan      Harkey, and Jery Edwards. The Essential Distributed Objects Survival      Guide. Wiley Computer Publishing Group&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Stal, M. Worldwide      CORBA: Distributed Objects and the Net, Object magazine&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Szyperski,C.:      Component Software, Beyond Object-Oriented Programming. Addison Wesley&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Jon Siegel. CORBA,      Fundamentals and Programming. Wiley Computer Publishing Group.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Workshop 10</title><link>http://itc594-kunal.blogspot.com/2010/05/workshop-10.html</link><category>Workshop 10</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sun, 23 May 2010 08:42:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-2619881479178289001</guid><description>&lt;div style="text-align: center;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-weight: bold;"&gt;Server Side Form Validation&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;     &lt;br /&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;An important aspect of creating Web Forms pages for user input is to be able to check that the information users enter is valid.&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5DY7vcEMKpRK6ZZdC1GDIXX48RGj5ZPJ_vdEZn3F9G-iZDz4j9oqqHutK2jkJTXgIOCIUUGkKoJaYx4fdLFhrPt9JXvRNbeYM4hO-QTNTxLcIUIVyhCQysXI7eqtqLwiKH8D2aNFhktc/s1600/w10.bmp"&gt;&lt;img style="cursor: pointer; width: 320px; height: 116px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5DY7vcEMKpRK6ZZdC1GDIXX48RGj5ZPJ_vdEZn3F9G-iZDz4j9oqqHutK2jkJTXgIOCIUUGkKoJaYx4fdLFhrPt9JXvRNbeYM4hO-QTNTxLcIUIVyhCQysXI7eqtqLwiKH8D2aNFhktc/s320/w10.bmp" alt="" id="BLOGGER_PHOTO_ID_5477018116533246514" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-weight: bold;"&gt;Functionality:&lt;/span&gt; Workshop 10 is CSU Registration Form - PHP program that grants an easy-to-use but powerful way to check for errors and, if necessary, display messages to the user.&lt;br /&gt;When the user submits a form to the server, PHP code is invoked to review the user's input.&lt;br /&gt;If an error has occurred in any of the input controls, the page itself is set to an invalid state (validation failed) and user is redirected back to the form page with displayed error messages.&lt;br /&gt;If validation passed, user’s registration details specified on form processing page are invoked. Thus, this program doesn't change HTML forms behavior except it always redirects user to the form page until user enters fully valid data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;a href="http://kunal-lamba.net/assignment2_workshop/workshop10.php"&gt;&lt;span style="font-weight: bold;font-family:Arial;font-size:100%;"  &gt;Test Code&lt;/span&gt;&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5DY7vcEMKpRK6ZZdC1GDIXX48RGj5ZPJ_vdEZn3F9G-iZDz4j9oqqHutK2jkJTXgIOCIUUGkKoJaYx4fdLFhrPt9JXvRNbeYM4hO-QTNTxLcIUIVyhCQysXI7eqtqLwiKH8D2aNFhktc/s72-c/w10.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Workshop 9</title><link>http://itc594-kunal.blogspot.com/2010/05/workshop-9.html</link><category>Workshop 9</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sat, 22 May 2010 08:18:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-750079975830292770</guid><description>&lt;div style="text-align: center;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Decimal to Binary and Binary to Decimal Conversion&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;                    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;This program converts decimal value to binary value, and vice-versa.&lt;/span&gt;&lt;br /&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Functionality:&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family:Arial;"&gt; This program asks user to enter valid value in binary or decimal input box.&lt;br /&gt;The validations are as follows:&lt;br /&gt;Binary Input Box:&lt;/span&gt;&lt;br /&gt;*&lt;span style="font-family:Arial;"&gt; The binary input box should not be left blank for the purpose of decimal conversion.&lt;/span&gt;&lt;br /&gt;*&lt;span style="font-family:Arial;"&gt; User can not enter decimal value or any character value in binary input box. User need to enter only binary number that is made of 0s and 1s.&lt;br /&gt;Decimal Input Box:&lt;/span&gt;&lt;br /&gt;*&lt;span style="font-family:Arial;"&gt; The decimal input box should not be left blank for the purpose of binary conversion.&lt;/span&gt;&lt;br /&gt;*&lt;span style="font-family:Arial;"&gt; User can not enter any character value in decimal input box.&lt;br /&gt;This program validates submitted value at Server Side. If user submits invalid value then the program will display error message in Red color. This is possible because of Server Side validation script.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;a href="http://kunal-lamba.net/assignment2_workshop/workshop9.php"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Test Code&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="line-height: 150%;"&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Workshop 8</title><link>http://itc594-kunal.blogspot.com/2010/05/workshop-8.html</link><category>Workshop 8</category><author>noreply@blogger.com (Kunal)</author><pubDate>Fri, 21 May 2010 08:20:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-4444764032708395770</guid><description>&lt;div style="text-align: center;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;PHP If...Else Statements&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;            &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Conditional statements are used to perform different actions based on different conditions.&lt;br /&gt;The if statement is used to execute some code only if a specified condition is true.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Syntax:&lt;/span&gt;&lt;br /&gt;if (condition) code to be executed if condition is true;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Functionality:&lt;/span&gt; This program asks user to input temperature. This program converts temperature from Celsius to Fahrenheit and vice-versa.&lt;br /&gt;Two radio buttons have been provided for selection. They are 1. Convert temperature from Celsius to Fahrenheit and 2. Convert temperature from Fahrenheit to Celsius.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;a href="http://kunal-lamba.net/assignment2_workshop/workshop8.php"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Test Code&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Workshop 7</title><link>http://itc594-kunal.blogspot.com/2010/05/workshop-7.html</link><category>Workshop 7</category><author>noreply@blogger.com (Kunal)</author><pubDate>Thu, 20 May 2010 08:11:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-9142923571513769947</guid><description>&lt;div style="text-align: center;"&gt;&lt;span style="font-size:100%;"&gt;&lt;st1:city style="font-weight: bold;" st="on"&gt;&lt;st1:place st="on"&gt;&lt;span style="font-family:Arial;"&gt;AJAX&lt;/span&gt;&lt;/st1:place&gt;&lt;/st1:city&gt;&lt;span style="font-weight: bold;"&gt; &lt;span style="font-family:arial;"&gt;Tool Tip and PHP Form Reading&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;                              &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;This workshop demonstrates how to use PHP forms. Forms are a special component which allows site visitors to supply information on another web page or server.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;AJAX:&lt;/span&gt; Asynchronous JavaScript and XML (AJAX) have been used to display tool tip for text box. Whenever user places a cursor in any of the three text boxes, program will display a corresponding tool tip message. Web server might be some where in &lt;st1:country-region st="on"&gt;United States&lt;/st1:country-region&gt;, however using &lt;st1:city st="on"&gt;&lt;st1:place st="on"&gt;AJAX&lt;/st1:place&gt;&lt;/st1:city&gt; this program is able to retrieve data from the server asynchronously in the background without refreshing the web page. Data is retrieved using the XMLHttpRequest object. This object has been used to send HTTP or HTTPS requests directly to a web server and load the server response data directly back into the script.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Functionality:&lt;/span&gt; This program asks user to input his name, birth year and favorite color. JavaScript validation has been used to validate the input values. Finally, this program calculates user's age and display the text - name and age in user's favorite color.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;a href="http://kunal-lamba.net/assignment2_workshop/workshop7.php"&gt;&lt;span style="font-weight: bold;"&gt;Test Code&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Workshop 6</title><link>http://itc594-kunal.blogspot.com/2010/05/workshop-6.html</link><category>Workshop 6</category><author>noreply@blogger.com (Kunal)</author><pubDate>Wed, 19 May 2010 08:10:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-8204255599423740380</guid><description>&lt;div style="text-align: center;"&gt;&lt;i style="font-weight: bold;"&gt;&lt;span style="font-family:Arial;"&gt;while&lt;/span&gt;&lt;/i&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-weight: bold;"&gt; &lt;/span&gt;&lt;st1:place style="font-weight: bold;" st="on"&gt;Loop&lt;/st1:place&gt;&lt;span style="font-weight: bold;"&gt; in PHP&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The meaning of a while statement is simple. It tells PHP to execute the nested statement(s) repeatedly, as long as the while expression evaluates to TRUE. The value of the expression is checked each time at the beginning of the loop, so even if this value changes during the execution of the nested statement(s), execution will not stop until th&lt;/span&gt;&lt;span style="font-family:Arial;"&gt;e end of the iteration (each time PHP runs the statements in the loop is one iteration). Sometimes, if the while expression evaluates to FALSE&lt;/span&gt;&lt;span style="font-family:Arial;"&gt; from th&lt;/span&gt;&lt;span style="font-family:Arial;"&gt;e very beginning, the nested statement(s) won't even be run once. We can group multiple statements within the same while loop by surrounding a group of statements with curly braces. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;                    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Syntax:&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizwkoksYdg7TjphvfHejXMn4b1hLt4zreFed4DbyXJQKA0PRLTQDOEZJBagLJNdD1VMq2zlLOb48SEre89_e9CMS0WwrDOYnzftwR5ddno7KftFGOB5KCYlfKmm2cyV61aICfQ0pByY-c/s1600/while.bmp"&gt;&lt;img style="cursor: pointer; width: 145px; height: 165px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizwkoksYdg7TjphvfHejXMn4b1hLt4zreFed4DbyXJQKA0PRLTQDOEZJBagLJNdD1VMq2zlLOb48SEre89_e9CMS0WwrDOYnzftwR5ddno7KftFGOB5KCYlfKmm2cyV61aICfQ0pByY-c/s320/while.bmp" alt="" id="BLOGGER_PHOTO_ID_5476929057265743378" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-weight: bold;"&gt;Functionality:&lt;/span&gt; Workshop 6 program asks user to input a number. &lt;/span&gt;&lt;span style="font-family:Arial;"&gt; A JavaScript validation has been used to validate the numerical value. &lt;/span&gt;&lt;span style="font-family:Arial;"&gt;Then program prints Table using PHP&lt;i style=""&gt;&lt;span style="font-style: italic;"&gt; &lt;/span&gt;while&lt;/i&gt; loop.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%; font-weight: bold;"&gt;&lt;a href="http://kunal-lamba.net/assignment2_workshop/workshop6.php"&gt;&lt;span style=";font-family:Arial;font-size:100%;"  &gt;Test Code&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizwkoksYdg7TjphvfHejXMn4b1hLt4zreFed4DbyXJQKA0PRLTQDOEZJBagLJNdD1VMq2zlLOb48SEre89_e9CMS0WwrDOYnzftwR5ddno7KftFGOB5KCYlfKmm2cyV61aICfQ0pByY-c/s72-c/while.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Elevator Pitch 2</title><link>http://itc594-kunal.blogspot.com/2010/05/elevator-pitch-2.html</link><category>Elevator Pitch 2</category><author>noreply@blogger.com (Kunal)</author><pubDate>Tue, 18 May 2010 09:00:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-1961776313816421777</guid><description>&lt;p class="MsoNormal" style="text-align: center; line-height: 150%; font-weight: bold;"&gt;&lt;span style="font-family:Arial;"&gt;Elevator Pitch&lt;/span&gt;&lt;/p&gt;            &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;  &lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Here is Elevator Pitch for Assignment 2.&lt;br /&gt;CORBA stands for Common Object Request Broker Architecture. CORBA is an industry standard developed by The Object Management Group to support distributed objects programming. CORBA is just a specification for creating and using distributed objects; CORBA is not a programming language.&lt;br /&gt;The CORBA architecture is based on the object model. This model is derived from the abstract core object model defined by the OMG in the Object Management Architecture Guide&lt;br /&gt;The model is abstract in the sense that it is not directly realized by any particular technology; this allows applications to be built in a standard manner using basic building blocks such as objects. Therefore, a CORBA-based system is a collection of objects that isolates the clients from the servers by a well-defined encapsulating interface. It is important to note that CORBA objects differ from typical programming objects in three ways:&lt;br /&gt;• CORBA objects can run on any platform.&lt;br /&gt;• CORBA objects can be located anywhere on the network.&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:Arial;"&gt;• CORBA objects can be written in any language that has IDL mapping.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style=";font-family:Arial;font-size:12;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Web 2.0</title><link>http://itc594-kunal.blogspot.com/2010/04/web-20_19.html</link><category>Web 2.0</category><author>noreply@blogger.com (Kunal)</author><pubDate>Wed, 14 Apr 2010 11:24:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-5006149700534373534</guid><description>&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;The term "Web 2.0" is commonly associated with web applications that facilitate interactive information sharing, interoperability, user-centered design, and collaboration on the World Wide Web. Examples of Web 2.0 include web-based communities, hosted services, web applications, social-networking sites, video-sharing sites, wikis, blogs, mashups, and folksonomies. A Web 2.0 site allows its users to interact with other users or to change website content, in contrast to non-interactive websites where users are limited to the passive viewing of information that is provided to them. (Crook pp. 831 – 836)&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;font-family:arial;" &gt;Characteristics of Web 2.0&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Participation: Every aspect of Web 2.0 is driven by participation. The transition to Web 2.0 was enabled by the emergence of platforms such as blogging, social networks, and free image and video uploading, that collectively allowed extremely easy content creation and sharing by anyone.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Standards: Standards provide an essential platform for Web 2.0. Common interfaces for accessing content and applications are the glue that allows integration across the many elements of the emergent web. &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Decentralization: Web 2.0 is decentralized in its architecture, participation, and usage. Power and flexibility emerges from distributing applications and content over many computers and systems, rather than maintaining them on centralized systems.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Openness: The world of Web 2.0 has only become possible through a spirit of openness whereby developers and companies provide open, transparent access to their applications and content.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Modularity: Web 2.0 is the antithesis of the monolithic. It emerges from many, many components or modules that are designed to link and integrate with others, together building a whole that is greater than the sum of its parts.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;User Control: A primary direction of Web 2.0 is for users to control the content they create, the data captured about their web activities, and their identity. This powerful trend is driven by the clear desires of participants.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Identity: Identity is a critical element of both Web 2.0 and the future direction of the internet. We can increasingly choose to represent our identities however we please, across interactions, virtual worlds, and social networks. We can also own and verify our real identities in transactions if we choose.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-weight: bold;font-family:arial;" &gt;Domains&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Open web: The entire space of the World Wide Web opens to anyone to access and participate. This has been the initial domain in which Web 2.0 technologies, applications, and attitudes have developed.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Enterprise: The power of Web 2.0 technologies, originally developed on the open web, is now being applied within enterprises to enhance performance and achieve business outcomes. This domain is sometimes termed Enterprise 2.0.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-weight: bold;font-family:arial;" &gt;Technologies&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:arial;"&gt;Web2.0 technologies are as follows&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Aggregation: Aggregation brings multiple content sources together into one interface or application.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;AJAX: (Asynchronous JavaScript and XML) AJAX is combination of technologies that enables highly interactive web applications.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;API: (Application Programming Interface) API is defined interface to a computer application or database that allows access by other applications.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Embedding: Embedding supports integration content or an application into a web page, while the original format is maintained.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;RSS: RSS stands for Really Simple Syndication. RSS is group of formats to publish (syndicate) content on the internet so that users or applications automatically receive any updates.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Ruby on Rails: Ruby on Rails is an open source web application framework. It is frequently used in Web 2.0 website development.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Tagging: Tagging means attaching descriptions to information or content.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Virtual architecture: Virtual architecture is creation of avatars (alternative representations of people), buildings, objects, and other artifact inside virtual spaces.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Widget: Widget is small, portable web application that can be embedded into any web page.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;XML: (Extensible Markup Language) XML is an open standard for describing data, which enables easy exchange of information between applications and organizations.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Reference: Crook E., "Web archiving in a Web 2.0 world", The Electronic Library, Vol. 27, no. 5, pp. 831 - 836&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Elevator Pitch 1</title><link>http://itc594-kunal.blogspot.com/2010/04/elevator-pitch-1.html</link><category>Elevator Pitch 1</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sun, 11 Apr 2010 15:55:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-3766581479207707327</guid><description>&lt;div  style="text-align: center;font-family:arial;"&gt;&lt;span style="font-weight: bold;"&gt;Elevator Pitch&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:arial;"&gt;Here is my Elevator Pitch for Assignment 1.&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:arial;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Electronic commerce, commonly known as e-commerce , consists of the buying and selling of products or services over electronic systems such as Internet and other computer networks. The amount of trade conducted electronically has grown rapidly since the spread of Internet. A wide variety of commerce is conducted in this way, encouraging and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.&lt;br /&gt;PHP is a server-side HTML integrated scripting language, which is used for designing dynamic web pages. PHP is mainly used in world-class operating system, such as, UNIX, LINUX and also in Windows. In the true sense, PHP is the perfect combination of practical programming rules and object oriented programming (OOPs). Since PHP uses desktop applications and command line interface, it is considered to be the best traditional server side scripting language.&lt;br /&gt;Most of the well-known database connections, such as, Oracle, My SQL, ODBC and SQL get support from PHP programming. So, it is indeed a good choice for the freelance programmers to use PHP development for creating their dynamic e-commerce websites.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Workshop 5</title><link>http://itc594-kunal.blogspot.com/2010/04/workshop-5.html</link><category>Workshop 5</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sun, 11 Apr 2010 15:30:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-8594314193960119115</guid><description>&lt;div style="text-align: center;"&gt;&lt;span style="font-weight: normal;font-family:Arial;font-size:100%;"  &gt;&lt;span style="font-weight: bold;"&gt;Prede&lt;/span&gt;&lt;/span&gt;&lt;span style="font-weight: normal;font-family:Arial;font-size:100%;"  &gt;&lt;span style="font-weight: bold;"&gt;fined Variables&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="font-weight: normal;font-family:Arial;font-size:100%;"  &gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;  &lt;span style=";font-family:Arial;font-size:100%;"  &gt;Additionally, PHP scripts have access to information ab&lt;/span&gt;&lt;span style=";font-family:Arial;font-size:100%;"  &gt;out your environment. These variables are stored in special hashes called &lt;code&gt;$_ENV and $_SERVER&lt;/code&gt;. Most scripts, w&lt;/span&gt;&lt;span style=";font-family:Arial;font-size:100%;"  &gt;hich use these variables, only use one or two at a time. The following script accesses 2 different&lt;/span&gt;&lt;span style=";font-family:Arial;font-size:100%;"  &gt; &lt;em&gt;_SERVER&lt;/em&gt; variables.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" style="font-weight: bold;" href="http://kunal-lamba.net/assignment1_workshop/workshop5.php"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 102px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDhHao4peV4GCDbmIQ_eJyWk8Xxoo6G0W6jA0wPuU3zq8FnMQqU4RB3ds19fJWdFj3zBGodHlCWZp1FiRkcATb09a8ezhmcYVppSnw39weCPhIhAmPTtGvgmyuXAfEyK6DMPSdQkSArdk/s320/w5.bmp" alt="" id="BLOGGER_PHOTO_ID_5458764097127825442" border="0" /&gt;&lt;/a&gt;&lt;a style="font-weight: bold;" href="http://kunal-lamba.net/assignment1_workshop/workshop5.php"&gt;&lt;span style="font-family:arial;"&gt;Test Code&lt;/span&gt;&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDhHao4peV4GCDbmIQ_eJyWk8Xxoo6G0W6jA0wPuU3zq8FnMQqU4RB3ds19fJWdFj3zBGodHlCWZp1FiRkcATb09a8ezhmcYVppSnw39weCPhIhAmPTtGvgmyuXAfEyK6DMPSdQkSArdk/s72-c/w5.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Workshop 4</title><link>http://itc594-kunal.blogspot.com/2010/04/workshop-4.html</link><category>Workshop 4</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sun, 11 Apr 2010 14:50:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-8530197057247964562</guid><description>&lt;div style="text-align: center;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;span style="font-weight: bold;"&gt;Arrays&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;  &lt;p style="text-align: justify;"&gt;&lt;span style="font-family:Arial;"&gt;Arrays can also be created using a key/value pair combination. These are often referred to as associative arrays or hashes. In a hash each value is associated with a unique key. Unlike list arrays that use a number as an index value, associative arrays use any value. The easiest way to comprehend how a hash works is to think of it as a table. In the following table the state name serves to&lt;/span&gt;&lt;span style="font-family:Arial;"&gt; role &lt;/span&gt;&lt;span style="font-family:Arial;"&gt;as k&lt;/span&gt;&lt;span style="font-family:Arial;"&gt;ey and the city is the value.&lt;/span&gt;&lt;/p&gt;  &lt;table class="MsoNormalTable" style="width: 219pt;" border="1" cellpadding="0" width="292"&gt;  &lt;tbody&gt;&lt;tr style=""&gt;   &lt;td style="padding: 0.75pt; width: 109.5pt;" width="146"&gt;   &lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-family:Arial;"&gt;State (key) &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;   &lt;/td&gt;   &lt;td style="padding: 0.75pt; width: 97.5pt;" width="130"&gt;   &lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-family:Arial;"&gt;City (value) &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;   &lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=""&gt;   &lt;td style="padding: 0.75pt;"&gt;   &lt;p class="MsoNormal"&gt;&lt;st1:state st="on"&gt;&lt;st1:place st="on"&gt;&lt;span style="font-family:Arial;"&gt;Victoria&lt;/span&gt;&lt;/st1:place&gt;&lt;/st1:state&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;/td&gt;   &lt;td style="padding: 0.75pt;"&gt;   &lt;p class="MsoNormal"&gt;&lt;st1:city st="on"&gt;&lt;st1:place st="on"&gt;&lt;span style="font-family:Arial;"&gt;Melbourne&lt;/span&gt;&lt;/st1:place&gt;&lt;/st1:city&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=""&gt;   &lt;td style="padding: 0.75pt;"&gt;   &lt;p class="MsoNormal"&gt;&lt;span style="font-family:Arial;"&gt;NSW&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;/td&gt;   &lt;td style="padding: 0.75pt;"&gt;   &lt;p class="MsoNormal"&gt;&lt;st1:city st="on"&gt;&lt;st1:place st="on"&gt;&lt;span style="font-family:Arial;"&gt;Sydney&lt;/span&gt;&lt;/st1:place&gt;&lt;/st1:city&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=""&gt;   &lt;td style="padding: 0.75pt;"&gt;   &lt;p class="MsoNormal"&gt;&lt;st1:state st="on"&gt;&lt;st1:place st="on"&gt;&lt;span style="font-family:Arial;"&gt;South Australia&lt;/span&gt;&lt;/st1:place&gt;&lt;/st1:state&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;/td&gt;   &lt;td style="padding: 0.75pt;"&gt;   &lt;p class="MsoNormal"&gt;&lt;st1:city st="on"&gt;&lt;st1:place st="on"&gt;&lt;span style="font-family:Arial;"&gt;Adelaide&lt;/span&gt;&lt;/st1:place&gt;&lt;/st1:city&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=""&gt;   &lt;td style="padding: 0.75pt;"&gt;   &lt;p class="MsoNormal"&gt;&lt;st1:state st="on"&gt;&lt;st1:place st="on"&gt;&lt;span style="font-family:Arial;"&gt;Queensland&lt;/span&gt;&lt;/st1:place&gt;&lt;/st1:state&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;/td&gt;   &lt;td style="padding: 0.75pt;"&gt;   &lt;p class="MsoNormal"&gt;&lt;st1:city st="on"&gt;&lt;st1:place st="on"&gt;&lt;span style="font-family:Arial;"&gt;Brisbane&lt;/span&gt;&lt;/st1:place&gt;&lt;/st1:city&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;/td&gt;  &lt;/tr&gt;  &lt;tr style=""&gt;   &lt;td style="padding: 0.75pt;"&gt;   &lt;p class="MsoNormal"&gt;&lt;st1:state st="on"&gt;&lt;st1:place st="on"&gt;&lt;span style="font-family:Arial;"&gt;Tasmania&lt;/span&gt;&lt;/st1:place&gt;&lt;/st1:state&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;/td&gt;   &lt;td style="padding: 0.75pt;"&gt;   &lt;p class="MsoNormal"&gt;&lt;st1:city st="on"&gt;&lt;st1:place st="on"&gt;&lt;span style="font-family:Arial;"&gt;Hobart&lt;/span&gt;&lt;/st1:place&gt;&lt;/st1:city&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;   &lt;/td&gt;  &lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt;  &lt;p&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLsuxWjlYInKLuh9MOchfI94mgfic9iVDzmlJrctVozCQFSqGe9SEvR3Ft_MbVBWxSwsNyV6tKkJC3zFhMH6oV69nql8UHDapq3LUSl6hVGU4_BJNIbRAM3xlom2IwDwfH7lI6z58Z0hw/s1600/w4.bmp"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 110px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLsuxWjlYInKLuh9MOchfI94mgfic9iVDzmlJrctVozCQFSqGe9SEvR3Ft_MbVBWxSwsNyV6tKkJC3zFhMH6oV69nql8UHDapq3LUSl6hVGU4_BJNIbRAM3xlom2IwDwfH7lI6z58Z0hw/s320/w4.bmp" alt="" id="BLOGGER_PHOTO_ID_5458763008410073714" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;a&gt;&lt;span style="font-weight: bold;"&gt;  &lt;/span&gt;&lt;/a&gt;&lt;a style="font-weight: bold;" href="http://kunal-lamba.net/assignment1_workshop/workshop4.php"&gt;&lt;span style="font-family:Arial;"&gt; Test Code&lt;/span&gt;&lt;/a&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLsuxWjlYInKLuh9MOchfI94mgfic9iVDzmlJrctVozCQFSqGe9SEvR3Ft_MbVBWxSwsNyV6tKkJC3zFhMH6oV69nql8UHDapq3LUSl6hVGU4_BJNIbRAM3xlom2IwDwfH7lI6z58Z0hw/s72-c/w4.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Workshop 3</title><link>http://itc594-kunal.blogspot.com/2010/04/workshop-3.html</link><category>Workshop 3</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sun, 11 Apr 2010 14:20:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-2400324791255832467</guid><description>&lt;div  style="text-align: center;font-family:arial;"&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-weight: bold;"&gt;Arrays&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;p  style="text-align: justify; line-height: 150%;font-family:arial;"&gt;&lt;span style="font-size:100%;"&gt;An array is an ordered collection of values. Each value can be referenced individually using its position in the array. The first element of an array is in position &lt;/span&gt;&lt;span style="font-size:100%;"&gt;0 and the second element is in position 1. Creating a&lt;/span&gt;&lt;span style="font-size:100%;"&gt;rrays in PHP can be done in multiple ways, though the following example is one of the simplest.&lt;br /&gt;$cities = array('Beijing', 'Oaxaca', 'Habana', 'Jakarta');&lt;br /&gt;For example, to access the third element of the $cities array u&lt;/span&gt;&lt;span style="font-size:100%;"&gt;se $cities[2].&lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify; line-height: 150%; font-family: arial;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBdaw9zZTIncSlSOhmfLHndxyQw9NByLgPkf3C9mQUo_rUYsGimu5aTdoMReDKPbQuFYh6jMD3f6YfLLFYl4EiOq9PXaRfDDog2V0ZA4YWrAn9VOYogfs9J6gYJF1Ckews2rLzsgWdZFE/s1600/w3.bmp"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 118px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBdaw9zZTIncSlSOhmfLHndxyQw9NByLgPkf3C9mQUo_rUYsGimu5aTdoMReDKPbQuFYh6jMD3f6YfLLFYl4EiOq9PXaRfDDog2V0ZA4YWrAn9VOYogfs9J6gYJF1Ckews2rLzsgWdZFE/s320/w3.bmp" alt="" id="BLOGGER_PHOTO_ID_5458758123297600498" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style="text-align: justify; line-height: 150%; font-family: arial;"&gt;&lt;a style="font-weight: bold;" href="http://kunal-lamba.net/assignment1_workshop/workshop3.php"&gt;Test Code&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBdaw9zZTIncSlSOhmfLHndxyQw9NByLgPkf3C9mQUo_rUYsGimu5aTdoMReDKPbQuFYh6jMD3f6YfLLFYl4EiOq9PXaRfDDog2V0ZA4YWrAn9VOYogfs9J6gYJF1Ckews2rLzsgWdZFE/s72-c/w3.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Workshop 2</title><link>http://itc594-kunal.blogspot.com/2010/04/workshop-2.html</link><category>Workshop 2</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sun, 11 Apr 2010 13:53:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-6234468118919918743</guid><description>&lt;div style="text-align: center;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Variables&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;  &lt;p style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The Workshop 2 introduces some variables to our PHP script. Variables in PHP begin with the $ symbol. PHP uses arrays and variables to store different values. Variables begin with a $ followed by characters, digits, and underscores. Variable names are case sensitive and are assigned with the '=' operator. Variables are incredibly useful. For example, you may need to keep trac&lt;/span&gt;&lt;span style="font-family:Arial;"&gt;k of information submitted via a web form or perform calculations on data and store the results. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Here's a simple example:&lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify; line-height: 150%;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpUjkg_-jiwwJfaJXmghTFGULkzmn0-gmdeiK0-0zIZPCU_WV64VKm7JKkeJVWhHgG2QtCeg4uRN5nk6wlsDXlDbORvf21fK45w7LPkuGSoIJ9apAcfK5DDPPIaL-uGF1Dilvlo8gJmBU/s1600/w2.bmp"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 182px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpUjkg_-jiwwJfaJXmghTFGULkzmn0-gmdeiK0-0zIZPCU_WV64VKm7JKkeJVWhHgG2QtCeg4uRN5nk6wlsDXlDbORvf21fK45w7LPkuGSoIJ9apAcfK5DDPPIaL-uGF1Dilvlo8gJmBU/s320/w2.bmp" alt="" id="BLOGGER_PHOTO_ID_5458751468134054722" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style="text-align: justify; line-height: 150%; font-weight: bold;"&gt;&lt;a href="http://kunal-lamba.net/assignment1_workshop/workshop2.php"&gt;&lt;span style="font-family:Arial;"&gt;Test Code&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpUjkg_-jiwwJfaJXmghTFGULkzmn0-gmdeiK0-0zIZPCU_WV64VKm7JKkeJVWhHgG2QtCeg4uRN5nk6wlsDXlDbORvf21fK45w7LPkuGSoIJ9apAcfK5DDPPIaL-uGF1Dilvlo8gJmBU/s72-c/w2.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Workshop 1</title><link>http://itc594-kunal.blogspot.com/2010/04/workshop-1.html</link><category>Workshop 1</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sun, 11 Apr 2010 13:35:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-4754097444843233849</guid><description>&lt;div style="text-align: center;"&gt;&lt;span style="font-weight: bold;font-family:Arial;" &gt;Workshop 1 - Hello World in PHP&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;    &lt;/div&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The&lt;/span&gt;&lt;span style="font-family:Arial;"&gt; first PHP example will print "Hello World" in the browser &lt;/span&gt;&lt;span style="font-family:Arial;"&gt;window.&lt;/span&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4uZSNR4IQ0GWC7pa3yPazAb8DuuRLI_lRpE6VzdhtMQ1rJljJPmvt0tshPU51TfnTwY65XipL3-3w5eJ0ommwoZBCKN69LrUGwIb3yQx_WkGIwPf31Zo4hWjiowqXC5VFcOoVDjrO82g/s1600/w1.bmp"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 143px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4uZSNR4IQ0GWC7pa3yPazAb8DuuRLI_lRpE6VzdhtMQ1rJljJPmvt0tshPU51TfnTwY65XipL3-3w5eJ0ommwoZBCKN69LrUGwIb3yQx_WkGIwPf31Zo4hWjiowqXC5VFcOoVDjrO82g/s320/w1.bmp" alt="" id="BLOGGER_PHOTO_ID_5458733025987654290" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;      &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The PHP statement:&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;print("Hello World");&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;  &lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;displays the message "Hello World" in the browser window. Here PHP statement is embedded into HTML documents and PHP statement appears between symbols.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The PHP print function displays the value or string within parentheses in the browser window.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Several important things to note about PHP scripts:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;PHP is case      sensitive, print is different from PRINT&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;PHP statements appear      between &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;PHP statements end      with a semi-colon&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;You can include      comments in your PHP code by beginning the line or lines with //      characters&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Your PHP files should have a .php extension rather than a .html extension. If scripts have a .html extension the server will not know that they are PHP files and will not parse and execute the PHP commands.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;p class="MsoNormal" style="margin-left: 0.25in; text-align: justify; line-height: 150%;"&gt;&lt;a style="font-weight: bold;" href="http://kunal-lamba.net/assignment1_workshop/workshop1.php"&gt;&lt;span style="font-family:Arial;"&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:Arial;"&gt;&lt;a style="font-weight: bold;" href="http://kunal-lamba.net/assignment1_workshop/workshop1.php"&gt;Test Code&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4uZSNR4IQ0GWC7pa3yPazAb8DuuRLI_lRpE6VzdhtMQ1rJljJPmvt0tshPU51TfnTwY65XipL3-3w5eJ0ommwoZBCKN69LrUGwIb3yQx_WkGIwPf31Zo4hWjiowqXC5VFcOoVDjrO82g/s72-c/w1.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Exercise_Week 5</title><link>http://itc594-kunal.blogspot.com/2010/04/week-5.html</link><category>Exercise_Week 5</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sun, 11 Apr 2010 13:18:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-8326197848681602085</guid><description>&lt;p class="MsoNormal" style="text-align: center; line-height: 150%;" align="center"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;XML: eXtensible Markup Language&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;What is XML?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;XML is not a markup      language like HTML, it is a language used to describe a markup language.      The technical term for such a language is meta language &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Using XML a developer      can define markup languages which describe electronic circuitry,      information for electronic data interchange, the files produced by Web      servers, mechanical parts of aircraft and so on. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;A developer define a      particular language using XML and a tool or utility then takes XML      documents which contain text expressed in the language and carries out      some process such as converting it to an MS Word document or into some      other form.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;XML as Internet standard&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The major goals of the language are as follows.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;That it should be      easy to use in the Internet. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Capable of supporting      a large number of applications eg browsers, search engines. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;That it should be      compatible with SGML, the text processing language which was the      inspiration for HTML. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;That it should not be      a complicated process to develop processors for documents written in      languages defined in XML.&lt;span style=""&gt;  &lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Easy to write a      program to check that a source text reflects its definition.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;That the number of      optional facilities of the language should be very low.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;That XML documents      should be easy to read and understand. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;That document written      using a language defined by XML should be easy. to develop using simple      editors. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;XML at work&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;For structuring data      on the Web&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Hierarchical model &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Define your own tags&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Tags are like field      names in a database&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Tags define elements&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Elements may have      attributes&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Tags are case      sensitive&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Building block of XML&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Elements &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Tags &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Attributes &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Entities &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;PCDATA &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;CDATA &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Elements and tags&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Elements&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;ul style="margin-top: 0in;" type="circle"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The main building       block&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;May hold data,       other elements, or be empty.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Tags&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;ul style="margin-top: 0in;" type="circle"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;“Markup” (delimit)       elements&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Attributes&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Provide extra      information about elements&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Placed inside the      starting tag of an element&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Always come in      name/value pairs&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;PCDATA&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Parsed character data&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Text between the      start tag and the end tag of an XML element&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Will be parsed by a      parser&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;ul style="margin-top: 0in;" type="circle"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Tags inside the       text will be treated as markup&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Entities will be       expanded &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;CDATA&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Character data&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Will be ignored      parsed by a parser&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;ul style="margin-top: 0in;" type="circle"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Tags NOT treated as       markup&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Entities NOT       expanded&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;What is XSLT?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;A language for transforming      between XML vocabularies&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Standardized by the      World Wide Web Consortium&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Integrated with .NET,      Apache, IE, Java, Oracle, …&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;XSLT is a slightly      new twist:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;ul style="margin-top: 0in;" type="circle"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Not a scripting       language&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Not,       strictly-speaking, “open source”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;But not radically      different:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;ul style="margin-top: 0in;" type="circle"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Typically       interpreted&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Open source       implementations&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Not vendor       dominated&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;XSLT as a programming language&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;XSLT has&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;ul style="margin-top: 0in;" type="circle"&gt;&lt;ul style="margin-top: 0in;" type="circle"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;looping constructs&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;function calling&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;variables&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;parameters&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;math functions&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;module combination&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;XSLT summary&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;XSLT can be used to      compute anything that can be computed&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;It is “Turing      complete”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;But….&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;ul style="margin-top: 0in;" type="circle"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Certain coding       paradigms are VERY awkward&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Non-textual       Input/Output is typically not possible&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Scripting languages      are designed to be general purpose&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;“Modern” scripting      languages go well beyond “scripting”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;They are general      purpose multi-paradigm languages&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;ul style="margin-top: 0in;" type="circle"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;But XSLT wins for       specificity&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;XSLT has deep native      support for XML&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;“Built-in”, highly      consistent parser&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;“XPath” XML      navigation (“query”) language&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Special syntax for      working with elements&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;XSLT makes      input-based recursion easy:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;ul style="margin-top: 0in;" type="circle"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Sections within       sections within …&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Part descriptions       within part descriptions …&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;XSLT automatically      selects the right rule to go with the right element in the input document&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;XSLT keeps track of      context: namespaces, current node, current node list etc.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Relevant contexts are      in both the stylesheet and the document.&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%; font-family: arial;"&gt;In most traditional programming languages, the programmer would have to be explicit&lt;/li&gt;&lt;/ul&gt;Reference: Eustace, K. (2004). Lecture 5: XML: eXtensible Markup Language [PowerPoint slides]. Retrieved from Charles Sturt University, Melbourne Study Centre</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Exercise_Week 4</title><link>http://itc594-kunal.blogspot.com/2010/04/week-4.html</link><category>Exercise_Week 4</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sun, 11 Apr 2010 11:10:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-7114104750951876439</guid><description>&lt;div style="text-align: center;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Programming Web servers: Languages for the Web&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Hypertext Markup Language&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;HTML was developed by      Tim Berners-Lee while at CERN, and popularized by the Mosaic browser      developed at NCSA. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;HTML is a markup      language used to create platform-independent hypertext documents on the      World Wide Web&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;During the 1990s it      blossomed with the growth of the Web.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;HTML has been      extended in a number of ways. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Most hypertext      documents on the web are written in HTML. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The current      recommendation is XHTML 1.0, which is a reformulation of HTML 4.01 as an      XML 1.0 application.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Common Gateway Interface CGI&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;CGI is a standard for      the construction of dynamic HTML documents, by use of an external script      (small program) installed on the same machine as the Web server.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Common CGI scripts      require a local interpreter or compiler. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;PERL and Python are      popularly used to process HTML forms and can verify user inputs, as well      as control the return of messages and performing further processing of the      forms data. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;On a secure Web site,      CGI can still be used for some e-commerce transactions, such as ordering      some perfume for your mother’s birthday.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;CGI alternatives&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;JavaScript, PHP,      Active Server Pages (ASP), Java Server Pages (JSP)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;A variety of other      proprietary sources such as Cold Fusion products, all provide an      alternative to CGI interactivity and security. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;JavaScript popularity&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;JavaScript has been popular for including &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;event-driven, user      interface features (display a pull-down menu); &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;interactive      multimedia (display a message or image when a mouse arrow passes over a      screen area);&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;To validate data and      user types into a form.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Java Virtual Machine&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The Java language is much      secured and platform independent when compared to alternative languages. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Java's secret is the      tightly integrated language model. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The steps on the next      slide show how the Java Virtual Machine implements a Java Program…&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Java Virtual Machine at work&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Coding -      Human-readable Java code is produced&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Building - A Java      Development Tool "build’s the Java program into bytecode, which is      saved as a ".class" file. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Loading - Via the web      or command line, the class file is sent to the Java Virtual Machine (VM)      with an attached digital signature. The Java VM is simply an interpreter. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Bytecode Verification      - The Java VM verifies the digital signature. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Isolation - When      downloaded remotely, the Java VM isolates the Java program in a restricted      part of memory. The Java program is not allowed to access local hard drives      and System resources. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Internal Integrity -      Verification checks are made to insure that the loaded Java program is      well formed. Data types are verified along with other syntax structure.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Execution - Program      execution begins.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;The rise of the application servers &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;high-speed caching, &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;rapid application      development, &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;secure enterprise      portals,&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;identity and content      management, &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;business      intelligence, &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;application and      business integration, &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Wireless      capabilities.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Microsoft .NET&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;.NET is Microsoft’s      software development architecture and strategy for developing large      distributed software systems.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;.NET is not meant as      a replacement for Java but as an alternative.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;.NET is component      based meaning that as a function is developed, it gets plugged into the      framework. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Advantages of Microsoft .NET&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;ul style="margin-top: 0in;" type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Before .NET it was      difficult for different languages to provide a solution to every problem      every time and the language libraries and runtime were not able to be shared.&lt;span style=""&gt;  &lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;But now, looking at      the next slide it can be seen that .NET enables any language to provide a      solution because the libraries can be shared.&lt;span style=""&gt;  &lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;You can share a C#      library with C++ or Visual Basic.&lt;span style=""&gt;   &lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;If you need a web      site it can be developed in any language using any of the available      language library… even Object COBOL&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;.NET uses XML, has an      “n” tier architecture &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;.NET is an easier way      to build Windows applications.&lt;span style=""&gt;  &lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Documentation was      excellent and an increasing amount of textbooks are available.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;Reference: Eustace, K. and Bytheway, A. (2004). Lecture 4: Programming Web servers: Languages for the Web [PowerPoint slides]. Retrieved from Charles Sturt University, Melbourne Study Centre</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Exercise_Week 3</title><link>http://itc594-kunal.blogspot.com/2010/04/week-3.html</link><category>Exercise_Week 3</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sat, 10 Apr 2010 11:52:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-6013082535351801372</guid><description>&lt;div style="text-align: center;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Database Servers&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family:Arial;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;  &lt;p class="MsoNormal" style="line-height: 150%; text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:Arial;"&gt;A database server is a computer program that provides database services to other computer programs or computers, as defined by the client-server model. The term may also refer to a computer dedicated to running such a program. Database management systems frequently provide database server functionality, and some DBMSs (e.g., MySQL) rely exclusively on the client-server model for database access.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p class="MsoNormal" style="line-height: 150%; text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:Arial;"&gt;Such a server is accessed either through a "front end" running on the user’s computer which displays requested data or the back end which runs on the server and handles tasks such as data analysis and storage.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p class="MsoNormal" style="line-height: 150%; text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:Arial;"&gt;In a master-slave model, database master servers are central and primary locations of data while database slave servers are synchronized backups of the master acting as proxies.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="line-height: 150%; text-align: justify;"&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="font-family:Arial;"&gt;Some examples of Database servers are Oracle, DB2, Informix, Ingres, SQL Server. Every server uses its own query logic and structure. The SQL query language is more or less same in all the database servers.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="line-height: 150%; text-align: justify;"&gt;Reference: Eustace, K. (2004). Lecture 3: Database Servers [PowerPoint slides]. Retrieved from Charles Sturt University, Melbourne Study Centre&lt;br /&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Exercise_Week 2</title><link>http://itc594-kunal.blogspot.com/2010/04/week-2.html</link><category>Exercise_Week 2</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sat, 10 Apr 2010 11:39:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-2847954575647397485</guid><description>&lt;p class="MsoNormal" style="text-align: center; line-height: 150%;" align="center"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Client Server Architecture&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The client-server characteristic describes the relationship of cooperating progr&lt;/span&gt;&lt;span style="font-family:Arial;"&gt;ams in an application. The server component provides a function or service to one or many clients, which initiate requests for such services.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Functions such as email exchange, web access and database access, are built on the client-server model. For example, a web browser is a client program running on a user's computer that may access information stored on a web server on the Internet. Users accessing banking services from their computer use a web browser client to send a request to a web server at a bank. That &lt;/span&gt;&lt;span style="font-family:Arial;"&gt;program may in turn forward the request to its own database client program that sends a request to a database server at another bank computer to retrieve the account information. The balance is returned to the bank database client, which in turn serves it back to the web browser client displaying the results to the user.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbjEhZwmxNX4sjsShJag9tJEp-v_N1qEXS4AOj2pOgj4lxfOzdKj8mGWu_6BzbEZHo9orYi4EcvRJfQ6EBcjFAgthAGfq_2V7yXeHQokrZsfE4q3FsDYNwttaWDlF0TZYvxARnpSsHSwc/s1600/c_s.gif"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 187px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbjEhZwmxNX4sjsShJag9tJEp-v_N1qEXS4AOj2pOgj4lxfOzdKj8mGWu_6BzbEZHo9orYi4EcvRJfQ6EBcjFAgthAGfq_2V7yXeHQokrZsfE4q3FsDYNwttaWDlF0TZYvxARnpSsHSwc/s320/c_s.gif" alt="" id="BLOGGER_PHOTO_ID_5458503537621528738" border="0" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: center; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Client Server Diagram&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The client-server model has become one of the central ideas of network computing. Many business applications being written today use the client-server model. So do the Internet's main application protocols, such as HTTP, SMTP, Telnet, and DNS. In marketing, the term has been used to distinguish distributed computing by smaller dispersed computers from the "monolithic" centralized computing of mainframe computers. But this distinction has largely disappeared as mainframes and their applications have also turned to the client-server model and become part of network computing.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Each instance of the client software can send data requests to one or more connected servers. In turn, the servers can accept these requests, process them, and return the requested information to the client. Although this concept can be applied for a variety of reasons to many different kinds of applications, the architecture remains fundamentally the same.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The most basic type of client-server architecture employs only two types of hosts: clients and servers. This type of architecture is sometimes referred to as two-tier. It allows devices to share files and resources. The two tier architecture means that the client acts as one tier and application in combination with server acts as another tier.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The interaction between client and server is often described using sequence diagrams. Sequence diagrams are standardized in the Unified Modeling Language.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Specific types of clients include web browsers, email clients, and online chat clients.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Specific types of servers include web servers, ftp servers, application servers, database servers, name servers, mail servers, file servers, print servers, and terminal servers. Most web services are also types of servers.&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Reference: Eustace, K. (2005). Lecture 2: Clients, servers and distributed paradigms [PowerPoint slides]. Retrieved from Charles Sturt University, Melbourne Study Centre&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbjEhZwmxNX4sjsShJag9tJEp-v_N1qEXS4AOj2pOgj4lxfOzdKj8mGWu_6BzbEZHo9orYi4EcvRJfQ6EBcjFAgthAGfq_2V7yXeHQokrZsfE4q3FsDYNwttaWDlF0TZYvxARnpSsHSwc/s72-c/c_s.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Exercise_Week 1</title><link>http://itc594-kunal.blogspot.com/2010/04/e-commerce-distributed-applications-and.html</link><category>Exercise_Week 1</category><author>noreply@blogger.com (Kunal)</author><pubDate>Sat, 10 Apr 2010 11:25:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6206824775968095268.post-1890253543360481592</guid><description>&lt;p class="MsoNormal" style="text-align: center; line-height: 150%;" align="center"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;E-commerce, distributed applications and the Internet&lt;br /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Introduction&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;In the first week we examine the type of system which is described by the umbrella term ‘e-commerce’. A number of typical application areas are examined including retailing using the internet, supply chain management and online auctions. We look at some of the underlying technologies used to implement e-commerce applications, for example web technology. We also look at some of the problems which are encountered when developing distributed e-commerce systems, for example problems in ensuring that a system is kept secure from criminal activity. It concludes with an examination of a typical retailing system, how some of the technologies fit together and business models used in the internet.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;Distributed Systems&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;There is no doubt that there is great demand for large-scale distributed applications. Indeed, tremendously expensive special-purpose distributed systems have been deployed and today are used extensively in the banking, airline, and telecommunication industries. The major barrier to supporting these, and even richer, applications on the Internet is the difficulty of designing, building, testing, and maintaining distributed applications using the tools that comprise the state-of-the-art today.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The guiding principles of distributed multi-tiered architectures like J2EE and .net / Windows DNA are Web computing; faster time to market; true interoperability; Scalability, reduced complexity; language, tool, and hardware independence; and lower cost of ownership.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;The life cycle of a distributed application can typically be viewed as having four phases:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;ul type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Design phase&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Implementation and testing      phase&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Deployment and utilization      phase&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Maintenance and evolution phase&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;p style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;It is a collection of experiences and best practices that have been taken from real-world development engagements, providing development teams with access to shared experiences and a proven, repeatable process. The Distributed Application Development Process encompasses modern design principles and proven practices to facilitate the development task and provide developers with a blueprint for building robust and correct distributed applications.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p class="paradefault" style="text-align: justify; line-height: 150%;"&gt;&lt;b style=""&gt;&lt;span style="font-family:Arial;"&gt;E-Commerce and Internet&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p class="paradefault" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;There are a number of ways in which companies can make money from the internet. Probably the best known way of making money is by selling some commodity; this could be a non-IT commodity such as a CD or item of clothing or it could be some piece of application software, a font, a browser plug-in or an operating system. Other forms of revenue rising are:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;ul type="disc"&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;i&gt;&lt;span style="font-family:Arial;"&gt;Auction sites&lt;/span&gt;&lt;/i&gt;&lt;span style="font-family:Arial;"&gt; which auction items on the internet and make      profits by taking some commission from the sales. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;i&gt;&lt;span style="font-family:Arial;"&gt;Shopping malls&lt;/span&gt;&lt;/i&gt;&lt;span style="font-family:Arial;"&gt; where a number of e-commerce sellers congregate      together on the same website; often these sellers will be related to each      other, for example they may all sell luxury goods. The mall owner takes a      percentage of their profit. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;i&gt;&lt;span style="font-family:Arial;"&gt;Portals&lt;/span&gt;&lt;/i&gt;&lt;span style="font-family:Arial;"&gt; which contain massive amounts of material on a      particular topic, for example a portal devoted to fishing. Such sites will      contain thousands of resource links, tutorials and indexes. They will also      contain links to merchants who sell goods associated with the portal      topic. There may be a number of ways that the portal owner would make      money, for example they could be paid by a merchant for each visit from      the portal or the merchant may pay a flat fee for being included in the      portal. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;i&gt;&lt;span style="font-family:Arial;"&gt;Digital publishing sites&lt;/span&gt;&lt;/i&gt;&lt;span style="font-family:Arial;"&gt; which are effectively magazines on the web.      They make profits in a number of ways including advertising and charging      vendors for references to their website. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;i&gt;&lt;span style="font-family:Arial;"&gt;Licensing sites&lt;/span&gt;&lt;/i&gt;&lt;span style="font-family:Arial;"&gt; which make some software available to other      sites, for example search engines which allow a visitor to the site to      search for material more easily. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;i&gt;&lt;span style="font-family:Arial;"&gt;Community sites&lt;/span&gt;&lt;/i&gt;&lt;span style="font-family:Arial;"&gt;. These are like portals but involve the      visitors more, for example a community site devoted to nurses might      include a number of chat rooms which allow nurses to talk together in real      time and swap advice. Money is made from such sites in the same way as      with portals. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;    &lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;&lt;span style="font-family:Arial;"&gt;Such applications have changed the face of retailing, for example the fast communication of the internet has made bulk buying sites feasible and popular and has given rise to a number of novel commercial models.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify; line-height: 150%;"&gt;Reference: Eustace, K. (2004). Lecture 1: E-Commerce, distributed applications and the internet [PowerPoint slides]. Retrieved from Charles Sturt University, Melbourne Study Centre&lt;br /&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item></channel></rss>