image_pdfimage_print

RAD Model

RAD model is Rapid Application Development model. It is a type of incremental model. In RAD model the components or functions are developed in parallel as if they were mini projects. The developments are time... Read more

SAMPL and OAuth2 Authentication

1)SAML (Security Assertion Markup Language) is an open standard for exchanging authentication information between a service provider and an identity provider (IdP). A third-party IdP is used to authenticate users and to pass identity information... Read more

Kerberos Notes

Kerberos is an authentication protocol and a software suite implementing this protocol. Kerberos uses symmetric cryptography to authenticate clients to services and vice versa. For example, Windows servers use Kerberos as the primary authentication mechanism,... Read more

CISC, RISC and Register

1)CISC(Complex Instruction Set Computer) : 1. Uses instruction of variable size 2. Instruction have different fetching time 3. Instruction set is large and simple 4. Compiler addressing modes as most operation are memory based 5.... Read more

Entity Relationship Model Part-1

Database Model: Logical structure of a database and fundamental determines in which manner data can be stored, organized and manipulated. 1)Hierarchical Model: Data is organized in tree like structure, implying a single parent for each... Read more

Oracle Notes Part-2

Redo:In the Oracle RDBMS environment, redo logs comprise files in a proprietary format which log a history of all changes made to the database. Each redo log file consists of redo records. A redo record, also called a redo entry, holds... Read more