Skip to main content

Posts

Showing posts from August, 2016

Database Replication

Database Replication enables data from one data server (master) to be copied to one or more database (slave) servers. Depending upon the configuration asynchronous or synchronous replication is possible. You can replicate all databases or single database or single table.           There are two types of replication Statement Based                    Every query excluding Select Query is executed on Master Server First then logged  binary file and then executed on  Slave Server. So Logged file is small. Row Based.Every change in Master Server row is logged and only that is effect executed on Slave. So Logged file is big.
Advantages of Database Replication Scale-Out Solutions                          All the data writes and update of Master Server and Read can be distributed on slaves. So load can be distributed among the Servers. Data Security                          Data is replicated to Slave Servers. Slave can stop replication. Run backup services  without corrupting Master Server Databa…

Sugar Factory IT Progress

Nine days Decade Ninety            In the decade of 1990, computerization of sugar factories started in Maharashtra and other states of India. Offline data entry was possible for many factories. IT department was controlling the working, software maintenance, networking and hardware. Everybody used to come and work there. Computerization was limited to cane billing, H&T and time office. GIST was used for Regional Fonts. Operating system was mainly DOS and database was Foxpro.

21st Century started with the fear of Y2K In the decade of 2000, computerization changed the working pattern. Now people realized for the expansion of scope of IT work. Now Online working started at Weighbridge. Use of Electronics weigh bridge were installed. 24 X 7 IT workload in crushing season. Right now, some of the modules got the attention.On Premises software ERP started the implementations on the Platform of Windows. Database switched to Oracle/SQL Server. ISM is used for the Regional Fonts.


Towards th…

One Time Password (OTP)

One Time Password (OTP) is used for Web Application login to validate user. OTP's are of two types 1.Email 2.Mobile. Mobile SMS is used when there are plenty of users. Email is used when there are business users. For business users when he/she enters userid and password email is generated from the same email server. So no chance of mail delivery delay. OTP is valid for specific time period, it invalidates either upon use or period expiry. So security is maintained.

SSL (Secure Socket Layer)

In 1994, Netscape Communications invented SSL. SSL (Secure Socket Layer) protocol is used for secure communication between browser and server. For E-mail server privacy is maintained with the help of secured protocol. SSL certificate is issued by SSL CA (Certifying Authority). HTTPS protocol is used for the SSL website and on left side of the address some indicator is always there after verification.
           TLS (Transport Layer Security) is the successor of the SSL.TLS 1.0 was defined in RFC 2246 in 1999.

Financial Accounting Software Application

Financial Accounting software is responsible for day to day accounting transactions of the organization. Every transaction should reflect effects upto the final output. Such transactions which are considered very important should be treated uniquely.Every organization may have multiple entities.Though every entity is treated alone, we should follow the uniform grouping.By following uniform grouping, entities cane be grouped together to get combined final outputs. Grouping is considered as the crucial things. By the consultations with Chartered Accountant, it should be finalized.
 Speaks the language of the land
Whenever it comes to applicability of the software, the language always has the advantage. So if is possible all the outputs should be bilingual.i.e. should be available in both Regional Language and English. For this Unicode is considered as the only best option we can choose. When it comes to output, PDF output has all features which one can expect.

Cloud ERP

Cloud is not in the sky but in the reach of everybodyCloud ERP (Enterprise Resources Planning) for Sugar and Allied Industries. Cloud computing (“the cloud”) is one of the leading technology topics in the world. Cloud computing, sometimes called on-demand computing, uses the Internet to provide shared computing resources and storage of records or documents. The Cloud is particularly valuable to small and medium-size businesses (SMB’s) because it provides access to full function applications at a reasonable price, without substantial operating expenditure for hardware and software. Company can rapidly scale as their business grows or a new company is added. Cloud ERP enables a company’s accounting, operations management and reporting to run in the cloud. Hosting of an application and utilizing the internet to provide connectivity.
Cloud ERP changing the scenario Cloud ERP has been proven to reduce costs in many ways because it Avoids upfront costs for all computing infrast…

Saas - Software As A Service

SaaS is the concept of the Global VillageSaaS is any software application that you run that is not located on your premises. It is a full-blown application, not a component part of something else. It is not a way to build applications. It is not a plug-in to other applications. It is never something that sits on your machines. Instead of having the application running on servers and data storage in your data center, it is running in the vendor's data center.
Software is not the program but the serviceThe way SaaS applications are licensed is different from on-premise applications. Instead of buying the license to use the application, and then paying for software maintenance to support it and keep it current, you "rent" the software over a period of time - usually monthly or yearly. Instead of buying and installing infrastructure and then paying ongoing operating and maintenance costs, the vendor runs the application on their infrastructure. 
 Cost is not the ma…

Use of Unicode in Application

Unicode is getting more acceptanceUnicode (Universal Coded Character Set) is widely used on all the platforms. Unicode data is stored in multibyte pattern. Though all the operating systems supports UTF-8, some operating system supports UTF-16 and UTF-32 along with. UTF stands for Unicode Transformation Format. The number after UTF denote the bits block (Byte) to represent a character. One to four Bytes are used. For Devanagari script, code point U+0900 to U+097F are used. Indian languages are coming on the common platformFor Devanagari character Om code point is U+0950. How it is stored in UTF-8 is interesting one.
First Step – Convert it into simple binary number
0       9       5       0
0000 1001 0101 0000
Second Step – Make the group of Six from right
0000 1001 0101 0000
0000 100101 010000
Third Step – if the group is of six then concat 10 to left and for group of four concat 1110
11100000 10100101 10010000
1110 0000 1010 0101 1001 0000
Fourth Step – convert it to hex
E0 A5 90
Binary …

Use of Professional Business E-mail for official communication

Use of Professional Business E-mail for official communication E-Mail everybody’s cup of teaCommunication between the organizations is very much different in many sense. Organization conveys official issues related to important matters. It is difficult for somebody to authenticate the E-Mail addresses. As personal e-mail addresses are maintained by their respective sites, it is difficult to control its use. Many of times when somebody joins the organization or leaves from the organization, it becomes uneasy to communicate.
Business E-Mail makes the senseDomain based e-mail services are used by many organizations for office communication.e.g. if some organization has domainwww.swapp.co.in  then email address would be admin@swapp.co.in, purchase@swapp.co.in, services@swapp.co.in, sandeep.nigade@swapp.co.in,etc. Storage size can be increased accordingly and user management is controlled by IT Dept. Mails are in encrypted format, so no need of worry. So only organizations ca…