c c c c c c cc c
c c ccccc
c
c
c
c
c
cccc
Rajveer singhc c
c
c
c
c
c
cc c
c
c
c
c
!÷ Sc
Ratnesh Kumar Mishrac
%"%c##"c$c%% c%c&' c ( ) c *c+c###,c c c,c!" Sc
Y
~
! " #$ %
& '( ) *+ , - , #
. /#
0
1 *
2
&* *
~3
4
Feasibility study # # ! # ~~
5 # .
~
167
/5+8
&.9" $
) 9" $
~ pesting Process ~
*
c%cc eMusic Shop is basically the collection and distribution of "all" data to "all" areas of business. phe data can then help market the company, help up sell to existing customer, understand customers better so that customers can be given better service and allows them to interact with the company by whatever means they wish. phe
Yreate cost-savings and operational efficiencies
c
Yreate additional revenue
c
Reach more customers and markets
c
<mprove marketing and promotions
c
Meet the needs and expectations of customers and suppliers
c
Yoncentrate on the things that matter
c
Make it easier for people to do business with we
c
phe cost of not being there
c
Play on a level playing field
c
Æelp meet business goals.
c- ccc {eveloped a new business concept which will assist global and local Music and Media ventures. As the future unfolds, we envision this site becoming the market leader AN{ influencing decision tool AN{ resource for global Unsigned Artists, Producers, Music {istributors, Event Venues, Fairs, Yompetitions, Exhibitions and to all Music and Media
c ccc de gather and provide an all-encoming resource for our global and local target groups. de enable anyone who wants to pursue their career in the Music and Media
%#%'c eMusic Shop is a web-based application intended to provide automated solution and services to customer. Yonsider a Business organization which have all of its business through
SALE
SERV
eMusic Shopprovide sales and service to customer by interaction with customer. phe success of a company is mainly based on its satisfied customers, which in turn gives huge profits.
Retaining existing customers is also an important job of a company. eMusic Shopconcentrates on the retention of customers by collecting all data from every interaction, every customer makes with a company from 'all' access points whether they are phone, mail, web or field. phe company can them use this data for specific business purposes viz., marketing, service, or sales. "# c "c%% c%c YEO & M{
word processors and spreadsheets. phere are two main types of computers we can buy: 1.c a personal computer, often referred to as a PY 2.c a Macintosh computer, often called an Apple Macintosh. phese are the ÷ ÷÷ specifications we should strive for as of June 2003. c
c
: 2GB of Random Access Memory (RAM)
c
) : 250GB (gigabytes) hard drive, 1.44MB 3.5inch floppy disk drive, Y{ or {V{ reader & writer
c
: 512Kbps (kilobits per second)
c
) : Microsoft dindows XP
c
# c/( : Microsoft
Expect to pay between $750 - $1,500 for a Linux-based computer assembled and sold by a local computer store. Linux PYs sometimes cost less, as we do not need to pay a software licence fee to use Linux and related software. Apple computer phe following models, as of June 2003, would be adequate for
c/( c phe software for using email and the deb is free.
for the PY version or
for the Macintosh version (prices as d in September 2003 by national retailers).
packaged with a new computer, Microsoft Office XP Professional would cost much less.
or visit three computer stores and compare advice and prices
c
look in our local newspapers for computer ments
c
ask a colleague or friend who uses computers and the deb frequently
c
ask a friend who works in the computer industry for advice
c
ask our ant or business advisor for advice
c
visit computer manufacturers' websites
c
visit Yhoice Magazine's website and find articles on computers.
)c c - 0 where we connect by dialling up via a normal telephone line. Fastc0cbroadband or <S{N -c Broadband offers a number of options: 1.c {SL {igital Subscriber Line refers to a group of technologies, the most common being A{SL or Asymmetric {igital Subscriber Line. {SL uses our existing telephone line to deliver high-speed
a computer in our locality (called a server) to which we connect using a modem and through which we can access the deb
c
an email address for we - eg
[email protected]
c
a send-and-collect service for our email messages. )c c c c c c c c
An email address will allow we to communicate with our customers, clients, suppliers, bank and anyone else we do business with or who wants to do business with we.
1. Accept an address that piggy-backs off our
$"1# c 0Requirementsc Start-up Expenses Legal
$1,500
Other
$2000
potal Start-up Expenses
$3,500
Start-up Assets Needed Yash Balance
$50000
Other Yurrent Assets
$50,000
potal Yurrent Assets
$100000
Long-term Assets potal Assets
$0 $100000
potal Requirements$ 5000 $ )c # 2 c
$25,000
$15,000
potal
$40,000
Yurrent Liabilities s Payable
$1,000
Yurrent Borrowing
$0
Other Yurrent Liabilities
$0
Yurrent Liabilities
$o
Long-term Liabilities
$ 0000
potal Liabilities profit at Start-up potal Yapital potal Yapital and Liabilities$127,000 c
$ 0000 ($5,000) $37,000
""# cc )c ` SQL is a standard language for accessing and manipulating databases. Our SQL tutorial will teach we how to use SQL to access and manipulate data in: MySQL, SQL Server, Access, Oracle, Sybase, {B2, and other database systems. d d` a.c.Security Management: SQL Server provides a controlled access to data to s by providing a combination of privileges. b.Backup and Recovery: SQL Server provided sophisticated security backup and recovery routines. c.cOpen connectivity: SQL Server provides open connectivity to and from other vendor¶s software such as Microsoft. Also SQL Server database can be access by various front-end software¶s such as Microsoft Visual Basic ®, Power Builder etc. d.Space Management:
4.c deb-Farm Session Statec 5.c Enhanced Reliabilityc 6.c Easy {eploymentc 7.c {ynamic update of running applicationccc c "#'1# cc 1# # c&c3#c "'c!"#$#1c1#$c'% "% Scc phe Unified Modeling Language (UML) is a standard language for specifying, visualizing, constructing, and documenting the artifacts of software systems, as well as for business modeling and other non-software systems. phe UML represents a collection of best engineering practices that have proven successful in the modeling of large and complex systems. phe UML is a very important part of developing object oriented software and the software development process. phe UML uses mostly graphical notations to express the design of software projects. Using the UML helps project teams communicate, explore potential designs, and validate the architectural design of the software. phe primary goals in the design of the UML were: 1.c Provide s with a ready-to-use, expressive visual modeling language so they can develop and exchange meaningful models. 2.c Provide extensibility and specialization mechanisms to extend the core concepts. 3.c Be independent of particular programming languages and development processes. 4.c Provide a formal basis for understanding the modeling language. 5.c Encourage the growth of the OO tools market. 6.c higher-level development concepts such as collaborations, frameworks, patterns and components. 7.c
d As the strategic value of software increases for many companies, the industry looks for techniques to automate the production of software and to improve quality and reduce cost and time-to-market. phese techniques include component technology, visual programming, patterns and frameworks. Businesses also seek techniques to manage the complexity of systems as they increase in scope and scale.
An actor is represents a or another system that will interact with the system you are modeling. A use case is an external view of the system that represents some action the might perform in order to complete a task.
3#c $ c c c ~c c c c ÷ c c 7.c Page ©.c {efault page .c Product add page 10.roduct update page 11.cService Add page 12.cService Add Page 13.cReport Page 14.cSearch Page 15.cRegistration Page 16.cÆow to Buy
/ )
&- 4 / 5 4'/!
81 5*
c c c
1# c ÷ ÷ / : *
/ +
4 # +
4 / 4
5
1 +
4
-
1 4
c 1 4# ' 1
1 +
1
)#1
1 + 1 ,
c i
+ 1 + & ;
c c c
%# c% c 4c c) c de probably send more e-mail than we make phonecalls, write letters and have meetings with people combined.
Advice
for
independents
at
New
Music
Strategies:
http://newmusicstrategies.com dhatever email software or webmail platform we use, there¶ll be a way of putting together an email signature file that will be automatically attached to the bottom of every email we send. Keep it short and sweet, give them a reason to click it ² and get ourself in the desktop of everyone we ever write to. <MPORpANp: {on¶t spam. Sending unsolicited marketing emails is not only rude and offputting, it¶s also illegal. Put our links in the signature of legitimate emails that people will actually want or expect to receive. c )c
c Another way to get our identity out there is to leave comments in relevant blogs. Feel free to try it here. Most blog sites give we the opportunity to include our URL, and whatever we write in as our name will act as a link back to our website. Other people who read the blog, and then are interested in what we have to say in response to it will often click on the link to go back to our site and find out more about we. Again ² the spam rule applies. drite something appropriate, interesting and relevant. People won¶t click on the link of someone who just posts to get the link. Besides, most of us use comment spam filtering systems like Akismet. A related strategy is to link to other people¶s blogs on our own site. Most blogs publish µprackbacks¶ - which are snippet
quotes and links to other sites that have linked to their own. dith dordpress (the blogging software < use), it happens automatically.
' (
&# 1
8 7/
5* 4'/! 8 71#5*
857 " :/
$
8* 7 1
Úc c (* )c phis is where the idea of distributed online identity really comes into play. phere are so many web 2.0 sites online (some listed above), and many of them require that we construct and maintain an µidentity¶ or µprofile¶. de have a profile on MySpace already, no doubt, and it links back to our site. de can also have a profile on Mog, Last.FM, Flickr, {elicious, 43 phings, Facebook and more. phere¶s a list of social networking sites at dikipedia. Go and hand pick a few, set ourself up an and start using them. {o bear in mind that there¶s a time commitment associated with the success of each of these. de can¶t just open a MySpace page and expect people to read it any more than we can expect to launch a website and expect people to just find it. phey are social networking sites. Be sociable. Network.Each of these sites has its own rules, culture and expectations. Get to know them, and the people there. phen there¶ll be a reason to belong to those sites ² and the effort will have been worthwhile. Above all, that becoming an µidentity¶ in each of these arenas strengthens our overall online presence. 5c c c phis one¶s a bit of an µadvanced ¶ tip ² and it can have its problems ² but it¶s definitely worth mentioning. Æaving more than one related website can really help our cause. phis is particularly true of independent music companies that do more than one core activity. Let¶s say we¶re a promoter, a distributor, a record label, and we manage a handful of bands. Each of those should have its own website, and those are the sites that we should direct people towards in regard to those specific things.
pride in and recognition of the value of music. phis is critical for increasing sales, but is also central in attracting skilled and creative people to the music industry - people who might otherwise be lost to different industries or countries. phus strong promotion is a key part of attracting people to the music industry and ensuring that there are sufficient revenues to keep them there.
(!) "5'/,5,5/;$
4'/! 5*+-' ' 5 "+-( 5, #-' $
Social Media Optimization (SMO) deals with the online publicity of any specific business, products or person engaged in professional or social activities. phere are some well defined methods for Social Media Optimization. Basically social media tools (depube, Flicker, etc.), online communities and social networking websites are used for this purpose. Nowadays, some most popular mediums (or tools) being used in Social Media Optimization and Social Business Networking are Facebook, pwitter, MySpace, depube and dordPress (along with other popular blogging websites). Although it's related (and somewhat similar) to Search Engine Marketing but it differs from Search Engine Marketing in several aspects.
Both target on organic traffic diversion to a website and generating sales leads. Æowever, in Search Engine Marketing the stress is always in driving traffic from major search engine by attaining higher ranks for targeted keywords, whereas in Social Media Optimization traffic is diverted to the intended website from unconventional sources like Facebook, pwitter, depube and MySpace. po promote e-Business, SMO is essential. One cannot disagree with the importance of SMO and SBN in modern e-Yommerce. Nowadays, no online marketing or advertising campaigns are complete without using most popular SMO tools like Facebook and twitter. phe world has witnessed extensive use of these powerful mediums in recent US presidential elections. phe reason behind increasing use of SMO tools is the ever increasing base of
{ue to enormous popularity and effectiveness of these tools nowadays, every website gives dedicated place to their facebook, twitter and MySpace URL¶s on their website¶s home page.
/c/c c 0 2 cc 0cc
2 )c / - reduce staff time on the telephone with customers and suppliers by referring them to the website - also some telephone enquirers will be better informed as a result of referring to the site and therefore will take less time.
c
* )c c - data entered into an online form with appropriate links into the organisation's database ing system byes staff, freeing them to market and sell more tickets, hips etc.
c
)7 ) - reduce cost of outsourcing to printers and graphic designers for brochures, research, concert programmes.
c
) - reduce through-put and need for more and/or larger photocopiers.
c
$ 8 ) -reduce cost and time involved in re-keying data and reduce errors in interpretation of poor quality originals, eg handwritten forms and poor quality faxes. ) c c ) - reduce expense and time.
c
- reduce the overall paper consumption and therefore cost.
c
)c - streamline processing of forms, eg online hip applications
c
and orders. c
% c ) - an e-commerce solution reduces processing of s, reconciliation, banking and can improve cash-flow.
c
c c )c - using email groups can reduce phone calls, time consumed in arranging meetings, number of face-to-face meetings, cost of getting people to meetings
// cc) c phere are plenty of ways to enhance our online music store and make it more efficient and profitable. One of them is to make use of various e-commerce modules. phis proficient software will help to make our store up to date, always updated, more intelligent, etc. de can use this software depending on our shopping cart type osYommerce or whatever is relevant for we. Modules for e-commerce needs suggest wide range of opportunities to make our business more profitable. phese instruments make managing of our online store pretty uncomplicated, which saves our time and efforts. {ue to this software our store will always stand out against the alike ones, will always have updated information, attractive propositions for potential customers, have great SEO rank, etc. Yustomers are going to be more loyal to our store and ready to purchase more! Benefits of e-commerce modules are many. po point out a few: * Æigh Quality we get software developed by experts modules are perfectly developed and reliable. * Save pime ready-made modules give we extra free time, which we can spend working on other
features
of
our
online
business.
* Bring
tendencies
in
this
sphere.
* Modern {esign using these modules we add a unique touch to our site, make it unlike the other similar ones (pag Yloud Module, Event {esigner, XML Site map Modules, etc.) * <mproved Functionality and Automation - our online store performs smooth, without our frequent
concern.
* No Monthly Fees - we buy modules once and forever, paying for updates only if necessary.
) c c c c%%'#c System Analysis is a management technique, which helps in deg a new system or improving an existing system. System Analysis is the process of gathering and interpreting facts, diagnosing problems (if any), using information to recommend improvements to the system. phere are four basic elements of system analysis: - Output,
$%##'#c"1c Feasibility study is the process of determination of whether or not a project is worth doing. Feasibility studies are undertaken within tight time constraints and normally culminate in a written and oral feasibility report. < have taken two weeks in feasibility study with my codeveloper. phe contents and recommendations of this feasibility study helped us as a sound basis for deciding how to proceed the project.
pechnical Feasibility Economical Feasibility Operational Feasibility 1. c$
pechnical feasibility determines whether the work for the project can be done with the existing equipment, software technology and available personnel. pechnical feasibility is concerned with specifying equipment and software that will satisfy the requirement. phis project is feasible on technical remarks also, as the proposed system is more beneficiary in of having a sound proof system with new technical components installed on the system. phe proposed system can run on any machines ing dindows and
1.c Personal costs 2.c Yomputer usage 3.c Supply and equipments costs 4.c Yost of any new computer equipments and software.
' (
1 ,
/1 4'/! 1
1
4 / *
3. c$ Operational feasibility criteria measure the urgency of the problem (survey and study phases) or the acceptability of a solution (selection, acquisition and design phases). Æow do we measure operational feasibility? phere are two aspects of operational feasibility to be considered:
UML (UN
and other non-software systems. phe UML represents a collection of best engineering practices that have proven successful in the modeling of large and complex systems. phe UML is a very important part of developing object oriented software and the software development process. phe UML uses mostly graphical notations to express the design of software projects. Using the UML helps project teams communicate, explore potential designs, and validate the architectural design of the software. d As the strategic value of software increases for many companies, the industry looks for techniques to automate the production of software and to improve quality and reduce cost and time-to-market. phese techniques include component technology, visual programming, patterns and frameworks. Businesses also seek techniques to manage the complexity of systems as they increase in scope and scale.
pransaction Act (EpA). EpA enables contractual dealings, such as offers, acceptances and invitations, to be conducted electronically, and also allows people to use an electronic signature to satisfy any legal requirement. Moreover the bill is expected to boost electronic commerce as an effective tool for businesses to increase their efficiency. phis may reduce istrative duties, storage and operational costs for businesses 2 c%c dhile shopping on the
is affecting how e-commerce evolves.
² Record retention obligations. ² Original documentation, in of pAX and VAp requirements. ² <mport/export regulations. ² Exchange control regulation. ² Foreign data protection law. ' ) c1
Electronic transactions separate e-business from traditional types of businesses. dhen a transaction takes place, dho has jurisdiction? dho has the authority to apply law over the transaction? A little legislation can go a long way toward helping parties to establish better boundaries to work within. dhen a transaction that takes place between two different parties located in two different countries goes wrong then a number of complex questions arise. 0 c c' ) c# phe technological basis of e-commerce is basically deb client/server middleware, or what is called three-tier architectures. phe client tier is the deb browser involving some type of form processing. phe middle tier is the deb server, often with transaction processing. phe deb server in turn links to the third tier, a database processing the order information. Some of the issues are strictly
it displays the and condition/policies within its site. Security involving the privacy of a 's data is always one of the main concerns while doing business online. ) c ) c An
organization
common
or
systems
is
agreed
involved
concerns
,
consists
a
of
social
system
objectives
in
an
refers
to
that
(Barzilai
organization
organizational
``individual
processes
organization
of poor
performance
should
be
many
order
to
group
the
which
in
,
cutting
the
changes change
,
scenario
.
with
the
meet
its
and
a
kinds
of
different
Organizational
processes
theory
organizational
of in
an
disobedience
or
their
concern
2000
.
and
pherefore
as
desired the
is
to
studies
is
while
general
long
Poon
desiring
the
time
the the
views
suggest
,
the
,
,
in time
1
©
.
personnel
,
to
of
lower true
since
. implement
resistance rungs in
of
the
the
to the
given
organization
structure negatively
as
management
employees to
.
implement
attitude
in
viewed
as
and
same
reducing
especially
a
affected
remedy
the
its
often
their
by
organization
a
change
at
to
is
performance
common
is
phis
to
a
organization
or
as
stakeholders
(pjosvold
the
operations
consideration
in
expressing ,
its
organization
is
been
change
resistance
,
budget
an
.
unwillingness
such
example
that
face
has
in
the
challenging
changes to
changes
resources
the
2000
it
'
between
the
scarce
employees ,
because
see
shrinking
to
to
(Piderit
resistance
should
of
it
major
challenges
have
implemented dhile
gap
given
be
common
organization
a
the
costs
major
would
entertain
or
allocate
can of
,
productivity
of
to
a
better
way
One
as
organizations
ensuring One
wants
performance
actual
help
theory
,
individuals
study
phe
which
of
(Barzilai
an
result
.
,
processes dhen
consists
'
.
a ,
means
the
management
whole
organization
form
of
management of
showing
(Piderit must
,
learn
how
to
adapt
to
change
,
mainly
by
gathering
employee
to
organizational changes. c c
cc 1.c Blockbuster Entertainment Yorp.`s latest purchase of a London video chain, in partnership with Philips Electronics N.V., has video experts and stock market analysts wondering what the two {utchmen are up to in Europe. 2.c phe two {utchmen are Æ. dayne Æuizenga, chairman of Blockbuster, the world`s largest video chain, and Jan pimmer, chairman of Philips. Philips, one of the world`s largest electronics companies based in the Netherlands, invented the videocassette recorder and the audio cassette and compact disc. 3.c phe deal that has brought them together is Blockbuster`s $122 million purchase of London-based Yityvision PLY. Philips chipped in half of the price, or $66 million. 4.c Buying Yityvision gives Blockbuster a major foothold in Europe, but what is really interesting is that the buyers are competitors. 5.c Philips owns nearly 200 video stores in the United States, plus a 50-percent stake in the purtles and Record Bar chains. Philips also owns more than 400 video stores in Europe through its 51 percent stake in Super Ylub. phe European stores have been a drain for the company: Super Ylub in Europe lost $40© million last year. dhen the deal was announced, pimmer said Philips was ing with Blockbuster ``to benefit from Blockbuster`s wide expertise and skills`` in video rental.Some say Philips is sincere about turning around Super Ylub in Europe. 6.c Video <nsider, a trade magazine, has reported that the deal could lead to Blockbuster ``buying some, if not all`` of the Super Ylub stores. dhen the deal was announced, Æuizenga said he would be interested in looking at Super Ylub but had no definite plans.
7.c Steve Apple, executive editor of Video <nsider, compared the possible buwet of Super Ylub by Blockbuster to a well-fitted glove. ``phere certainly is a match there,`` Apple said. ©.c Stock market analyst Jerry Falkner, at Southeast Research Partners in Boca Raton, said the partnership could be long-term. .c Falkner also said the move fits with Blockbuster`s track record. ``phat`s been the history of Blockbuster, acquiring the competition.`` c
Many business people simply do not include
` and follow up the resources mentioned here setting up a security awareness program for all system s that includes things like briefings, training sessions, clauses in employee contracts and security awareness days.
c /c/ c harmful emails Email is one of the easiest and fastest means of communicating via the
Phishing µPhishing¶ is a technique used to gain personal information for the purpose of identity theft. µPhishing¶ emails give themselves away by telling you that there is a reason why you must provide personal details such as our
# c c c * c c )c( c c 2 c antivirus software appropriate firewalls spam-filtering software a disaster recovery plan in place strong s )c( c cc regularly install security updates for our anti-virus software and firewall applications use caution when introducing external software/hardware apply common sense when dealing with any emails see what services our
up-to-date and updated regularly change our regularly, at least every three months
)c( c c 2c opening any email attachments from unknown or questionable sources clicking on links in any email if the content of the email is suspicious or unfamiliar using s that can be easily cracked, guessed or associated with you storing back-up files at our premisesc c-%'"%#c # c i pesting against specification of system or component. Study it by examining its inputs and related outputs. Key is to devise inputs that have a higher likelihood of causing outputs that reveal the presence of defects. Use experience and knowledge of domain to identify such test cases. Failing this a systematic approach may be necessary. Equivalence partitioning is where the input to a program falls into a number of classes. E.g. positive numbers vs. negative numbers. Programs normally behave the same way for each member of a class. Partitions exist for both input and output. Partitions may be discrete or overlap.
d c
c
pesting based on knowledge of structure of component (e.g. by looking at source code). Advantage is that structure of code can be used to find out how many test case need to be performed. Knowledge of the algorithm (examination of the code) can be used to identify the equivalence partitions. Path testing is where the tester aims to exercise every independent execution path through the component. All conditional statements tested for both true and false cases.
1.c {ata complexity not taken into . 2.c {oes not test all paths in combination. 3.c Really only possible at unit and module testing stages because beyond that complexity is too high.
# / c )cc
Usually done at integration stage when modules or sub-systems are combined. Objective is to detect errors or invalid assumptions about interfaces between modules. Reason these are not shown up in unit testing is that test case may perpetuate same incorrect assumption made by module designer. Particularly important when OO development has been used. Four types of interface:
1. Parameter: data (or occasionally function references) ed from one unit to another.
2. Shared memory: block of memory shared between units (e.g. global variable) .One places data there and the other retrieves it.
3. Procedural: object-oriented or abstract data type form of interface, encapsulating several procedures.
4. Message ing: one sub-system requests a service by ing a message. Ylient-server interface also used by some OO architectures.
phree common kinds of interface error: 1.c
Yommon manifestations are when each unit assumes the other one is checking for invalid data (failure to check return status) and the consequences of when such a fault is propagated to other units.
# c cc
Best testing process is to test each subsystem separately, as we have done in my project. Best done during implementation. Best done after small sub-steps of the implementation rather than large chunks. Once each lowest level unit has been tested, units are combined with related units and retested in combination. phis proceeds hierarchically bottom-up until the entire system is tested as a whole. pypical levels of testing: 1.c Unit -procedure, function, method 2.c Module -package, abstract data type, class 3.c Sub-system - collection of related modules, cluster of classes, method-message paths 4.c Acceptance testing - whole system with real data (involve customer, , etc)
Alpha testing is acceptance testing with a single client (common for bespoke systems).
Beta testing involves distributing system to potential customers to use and provide .
$ c% c/c cc E MUS
E MUS
E MUS
E MUS
1.c phe eMusic Shop at present not provide service through telephony, but in eMusic Shop we can provide it in future.
2.c Automatic mail sending facility is provided to the customer ,that purchases the product 3.c Live help will be provided in the future 4.c debsites will be mounted using secure http connection. 5.c