Introduction to Silk Test Architecture

Normal use of an application consists of a person manipulating a keyboard and mouse to initiate application operations. The person is said to be interacting with the GUI (Graphical User Interface). During Silk Test testing, Silk Test interacts with the GUI to submit operations to the application automatically.

Thus Silk Test can simulate the actions of a person who is exercising all the capabilities of an application and verifying the results of each operation. The simulated user (Silk test) is said to be driving the application. The application under test reacts to the simulated user exactly as it would react to a human rest. Silk Test consists of two distinct software components that execute in separate processes:

The Silk Test host software

The 4Test Agent software

Silk Test host software

The Silk Test host software is the program you use to develop, edit, compile, run and debug your 4Test scripts and test plans. This manual refers to the system that runs this program as the host machine or the Silk Test machine.

The Agent

The 4Test Agent is the software process that translates the commands in your 4Test scripts into GUI-specific commands. In order words, it is the Agent that actually drives and monitors the application you are testing. One Agent can run locally on the host machine. In a networked environment, any number of Agents can run on remote machines. This manual refers to the systems that run remote Agents as target machines. This manual refers to the systems that run remote Agents as target machines. In a client/server environment, Silk Test drives the client application by means of an Agent process running on each application’s machine. The application then drives the server just as it always does. Silk Test is also capable of driving the GUI belonging to a server or of directly driving a server database by running scripts that submit SQL statements to the database. These methods o directly manipulating the server application are intended to support testing in which the client application drives the server.

Posted in general | Comments Off on Introduction to Silk Test Architecture

Creative Marketing Ideas For Hardware Stores

With large nationwide chains that dominate the market, small hardware stores sometimes have a difficult time being competitive. The key is to find a unique selling proposition for your business and to capitalize on it so customers see the value in choosing you over one of the larger stores. Here are some great ways to make your business stand out.

  1. Giveaways -When your store first opens (or even if you're just looking for an extra push), offer small giveaways to your customers with their purchase. These will be tools or products they can use that are branded with your store's information-hammers, tape measures, levels, etc. When a customer is using this product and runs out of something or determinates the need to visit a hardware store, they'll see your information and immediately head your way!
  2. In-Store Classes -Hardware stores often form a bit of a culture and social atmosphere, so find ways to play this up. One great choice is to sponsor training classes and educational seminars in your store. Work with your vendors to provide information that your customers will find valuable. Even your employees can instruct these classes-anything from minor home renovation products to full-scale remodeling. List the classes you're offering that month above your cash registers with a large, visible vinyl banner which clearly-informs customers of their opportunities to expand their skills.
  3. Charity Donations -Offer your products to charity groups and organizations in-town which build or repair homes for the less-fortunate. This is great PR for your business, it makes you look more-reliable, and in return you're often able to advertise at the home-site using a banner or yard sign. When customers see that you're giving back to your community, they are more-inclined to shop with you.
  4. Ladies Night -Most hardware stores predominately-market toward men. While the majority of your customers are probably male, do not neglect the ladies. Host a "Ladies Night" at your store that offers your educational classes and even a special discount on purchases made by women. Use removable window clings to give your store a slight feminine touch. There's a huge potential market here that is somewhat-untapped, and with the right approach, female customers can dramatically affect your business.
  5. Personal Shoppers -Some customers complain that hardware or home improvement stores are overwhelming. Counter this objection by providing customers with a personal shopping service. Your employees already help customers find products daily anyway, but creating a formal program provides a revenue opportunity. Customers can have one of your employees guide them around the store and help them find exactly what they need for their project, or for even-more convenience, your employee can preselect the products they need so that when the customer arrives, all they have to Do is check out.
Posted in general | Comments Off on Creative Marketing Ideas For Hardware Stores

How To Spot a Fake Jimmy Choo Handbag

  • Label: The Jimmy Choo label is generally a lilac colored metal face fastened to a leather backing, and stitched to the interior of the handbag. Many fakes have the incorrect shade of lilac, either going to light or too dark in the purple spectrum. The label should read in either gold or silver. However, even if the colors are correct, the label may still not be in the clear. Because it often times the font details that are singular to authentic Jimmy Choo that many of fake handbags get wrong, and this is one of the best places to look when trying to identify a phony J. Choo.
  • Font: Always check out the "H" in Choo. On an authentic handbag, the horizontal cross-bar in the H should not be in the center of the letter, the way it is intended to be with regards to most standard fonts. Instead, the Jimmy Choo H should have the cross-bar closer to the top, about 75-80% of the way up the H, if measuring from the bottom of the letter. If the handbag has the correct H, move to the letters "O" in Choo. On an authentic handbag, the O will have a slightly bent look. This means that the "O" will appear as if someone snapped down on the top of the letter, giving the O an oval shape rather than a perfect circle. Spotting a fake Jimmy Choo handbag often times comes down to the subtleties in the font.
  • Hardware: Any screws located on handbag hardware will always be a flat head (-) screw. Jimmy Choo will never use any Philips head (+) screws in any of their handbags.
  • Dustbag: Fake Jimmy Choo handbags will often be accompanied by a dustbag that is an incorrect color or format. An authentic dustbag should have the logo: "JIMMY CHOO," with "LONDON" centered perfectly under the logo. The font should be an embossed gray, while the dustbag itself will be the famous lilac color. Many fakes will have incorrect font colors on the dustbag, as well as the incorrect dustbag color ie the wrong shades of purple etc. Good luck and safe shopping!
Posted in general | Comments Off on How To Spot a Fake Jimmy Choo Handbag

Why Architectural Drafting Is Common in Architectural Design

For architectural design projects, while there is the emphasis on using 3D models and architectural BIM modeling, the time-tested practice of using architectural drafting and 2D technical drawings is still commonplace in the AEC industry. Architectural drafting has evolved from the drawing board to computer-aided design and drafting (CAD) software programs. Drafting practices help to provide architectural construction drawings that include the technical details of architectural, structural and electrical elements required for the construction of a building. To understand the stage at which architectural drafting takes place, the workflow of a building design lifecycle must be considered.

The basic workflow of an architectural design project starts with the architect creating a conceptual plan which is usually modelled into architectural 3D models and rendered as photorealistic images for marketing and presentation to clients and customers.

Once the conceptual design is approved by the client, the design is then progressed into more detail and shared with other parties such as structural and MEP engineers. The way in which the design is progressed for the ‘design development’ phase by an architect lends itself to two options, either to develop a 3D model with more detail and then create subsequent sheets and details using a 3D tool such as Revit or AutoCAD, or as is still commonplace, to develop the concept design in 2D using more traditional methods. From the conceptual plans provided by architects and engineers, a drafter can convert these designs using CAD software programs to create technical drawings.

Architectural drafting is the process of creating technical drawings which include the floor plan, sections, elevations, detailed drawings and other documents in a construction drawing set (CD Set), which are typically required for the construction of a building.

The difference between Architectural Drafting and Modelling

Architectural drafting refers to creating 2D technical drawings and architectural construction drawings which are mainly used by contractors and consultants on site. Architectural 3D modelling refers to creating 3D models and renders of photorealistic images which are mainly used to present the architectural design for marketing purposes and then progressed from there to create the 2D technical drawings, in effect feeling like an extra stage (the 3D modelling element). The main software used for drafting, to create 2D technical drawings is AutoCAD while modellers use Revit and ArchiCAD to create 3D models and rendered images. Architectural draftsmen need to have basic 2D and 3D software knowledge such as AutoCAD and knowledge of technical codes and drafting guidelines specified by organisations such as American National Standards Institute (ANSI), American Society of Mechanical Engineers (ASME), American Design Drafting Association (ADDA), Public Works Government Services Canada (PWGSC), National Institute of Building Sciences (NIBS), BSI British Standards Institute and Standards Australia Code AS1100. Architectural modellers need to have a deeper understanding of architectural, building and construction concepts and experience with 3D software programs such as Revit and ArchiCAD.

Why Architectural Drafting is still Common in Architectural Design Practices

Architectural 3D models are preferred by architects and designers because they provide a 3D perspective of the conceptual plan of the building; it makes management of project data easier and allows for design changes on the go. However, construction companies that require technical specifications of the architectural project prefer 2D technical drawings and architectural construction drawings because they provide accurate details required for construction, most of the resources involved in construction understand 2D drawings, there are no issues with compatibility of software as compared to when using 3D models and it is a suitable solution to meet the budgetary requirements of a construction project. Some of the reasons why architectural drafting is preferable by several construction companies include:

• Suitable as per construction requirements – In some building projects, 2D technical drawings or architectural CAD drawings are sufficient to complete construction, where additional information that 3D models provide is not required. A construction drawing set (CD set) includes all the floor plans, elevations, sections and detailed drawings required for construction. Technical codes, symbols and other additional information such as the type of material are provided in technical drawings. Therefore, construction companies find 2D technical drawings sufficient to successfully complete construction.

• Availability of technical resources – Not all companies have technical resources to deliver 3D models. While drafting teams are qualified to work on AutoCAD to deliver 2D technical drawings, they may not be qualified to work on Revit to deliver 3D models. In the construction industry, the availability of drafting teams who can provide 2D technical drawings is ample compared to companies that provide 3D modelling services.

• Availability of software – The adoption of new software and practices is gradual and slow in the construction industry. The software used in building projects varies from country to country. Some countries use ArchiCAD and AutoCAD Architecture instead of Revit, therefore leading to the incompatibility of project data. 2D technical drawings in AutoCAD are widely used and compatible making it a preferred option to Revit 3D models.

• Suitable as per cost and budgetary requirements – In most cases, construction companies do not find the need to invest more in 3D models, when drafting solutions provide detailed technical drawings which are sufficient and relevant enough for construction. There is also the added investment in resources that are competent enough to understand and implement architectural 3d models on-site.

While architectural 3D modelling and BIM modelling provide design-related information typically required for architects and designers in the design stage of the building project lifecycle, architectural drafting provides technical drawings that are not just about aesthetics but about high-performance detailing of construction elements. Architectural CAD drawings specifically communicate the design intent and help in the construction of buildings which companies find relevantly sufficient over 3D models. Even as construction companies will need to eventually evolve to combining the use of 2D technical drawings and architectural 3D models until then, the time-tested practice of using architectural drafting and drawing solutions in construction is here to stay.

Posted in general | Comments Off on Why Architectural Drafting Is Common in Architectural Design

How to Retrieve Deleted Text Messages & Not Go Crazy in the Process

It’s happened to all of us. We’ve deleted a text message only to realize a short while later that we either deleted the wrong message, or we need to retrieve information off one of the deleted text messages. We then frantically search out ways online how to retrieve deleted text messages hoping to find an easy solution. We pour through websites pulling our hair out because we can’t find an easy solution.

Ultimately we walk away dismayed because either we were not able to find any solutions on how to retrieve deleted text messages, or the solutions we found seemed to require so much “detective” work, that the solution itself should be on a an episode of CSI.

Are there really any “easy” ways to retrieve deleted messages?

The good news is that YES, there are a couple options that do exist which enable anyone to easily recover deleted texts, and both are not only very affordable, but both work exactly as advertised.

Before we dig into the solutions, there is one solution that is often discussed, which does not work, although many people do still talk about it.

What does NOT work?

Going to your own phone carrier is not going to be a viable option. Yes, they are required by law to keep records of your communication (SMS, call, etc.), but they are not required to turn over their logs to you, unless requested by a court of law. You cannot call up AT&T, Verizon or Sprint and tell them you want to retrieve a deleted text message from last week because there is something really important within the contents of the message. It just wont work.

The only information AT&T, Verizon, Sprint, or any other cell phone carrier is going to provide you is the number, date, and time of a call or message. You can plead all you want, but they will not be able to do anything, so it’s not worth your time to attempt this approach.

What DOES work?

There are actually two options available for anyone who is looking for information on how to retrieve deleted text messages. These options rank from the “quick and easy” to the more difficult, but also the most effective.

1) Quick & easy method.

The ‘quick & easy method’ is to buy a SIM card reader, often referred to as a SIM card spy device. This device looks like a USB reader, and the way it works is you remove the SIM card out of your phone, and then place the SIM card into the SIM card reader, and then plug the reader into your computer. Using the included software (of the SIM card reader), you’ll be able to immediately retrieve and read deleted text messages. The time frame will vary, based on what new information is overwritten on the SIM card, but you’ll at least be able to retrieve and read the last 15-20 messages and scan through your call history and contacts, even if they were all deleted.

Positives of this approach?

  • Very easy.
  • Enables you to quickly recover deleted messages.
  • Does not require software to be installed prior to the message being deleted.

Negatives of this approach?

  • A bit costly.
  • Limited cell phone support.
  • Does not work on CDMA networks.

2) More difficult, but most effective method.

The more difficult, but most effective method’ is to purchase a cell phone monitoring app that is often used to spy on cheating spouses, monitor teen cell phone use, track cell phone location, and locate missing or stolen cell phones. These apps (often called spy apps or spy phone software) are often used by people who want an easy and convenient way to back up and store all their own personal cell phone data. The reason why this method is fast becoming a popular way to back up their own personal cell phone data is because everything happens automatically. There is no “syncing” required, or any buttons or settings to worry about. Your cell phone data (text messages, call history, etc.) are automatically backed up every single day. This means if you ever delete a text message, and then need to quickly recover it, all you have to do is log onto your account and then in just a few clicks, you’ll have full contents of every message that was either sent or received from your phone. In addition, you’ll get access to all your call logs and contacts.

The reason why this is a more difficult method, is because it requires that you download the software from your cell phone’s web browser and install the application on your phone. Not everyone is comfortable downloading cell phone apps from the internet using their phone’s web browser. However, once you do complete the download, the actual installation is similar to installing an app on your computer. If you are willing to roll the dice and go with this method, you’ll be very happy with the results. It’s essentially a real time person back up solution that requires absolutely ZERO work on your part. Everything is done for you. The only drawback with this approach is that it does require you to install the software BEFORE you delete the text message that you want to retrieve. This means you need to be proactive and install the software ahead of time.

Positives of this approach?

  • Extremely effective.
  • Affordable.
  • Full contents of text messages are retrieved.
  • Large amount of cell phones are supported, including the popular models such as Android, BlackBerry, iPhone, Nokia, and more.

Negatives of this approach?

  • Can be difficult if not familiar with installing cell phone apps.
  • Software must be installed prior to message being deleted.
  • Requires a data connection such as 3G or Edge
  • May increase data fees if a large amount of text messages are sent on a daily basis.

There you go. Now you know how to retrieve deleted text messages using a couple different approaches. The next time someone asks you how to retrieve deleted text messages, you’ll know what options exist, and which one is the best for that particular situation.

Good luck!

Posted in general | Comments Off on How to Retrieve Deleted Text Messages & Not Go Crazy in the Process

Strengths and Weaknesses of Waterfall Approach for Software Development

One of the most famous and widely used approaches for software development is the waterfall model. Waterfall approach is an old technique that has been in use for quite some time, but in modern times agile approach is gaining prominence.

Waterfall approach, as is evident from the name, refers to a systematic approach where one step comes after the other. It cannot go the other way round. The process works like the waterfall effect that flows in one direction, which is from up to down.

In this process the life cycle of the development process is predetermined. All the steps are defined before the start of the project. The approach is predictive, where the team is well aware of the order of each step and therefore works accordingly. It starts from the requirement analysis, the design phase and then proceeds on to the implementation, testing and the maintenance phases.

The waterfall approach can be quite beneficial for those who are quite clear on their requirements. A planned approach works for them because they want fixed processes and budget. Where fixed processes are beneficial, at the same time they can be inconvenient at times. In cases where the client is not clear on the requirements and finds in the middle of the project that he/she wants to change course, this approach can prove to be quite problematic.

Another point of the waterfall approach is that the requirement analysis and design of architectural structure can consume a lot of time. Extensive research is done initially as the next phases depend completely on the planning strategy. However, the good thing is that everything is thoroughly worked out and each aspect is studied beforehand. The developers in such cases know what is expected of them.

A waterfall approach works in a systematic order, with one step following the other and the testing phase comes in the end. If there are any big problems encountered in the testing phase, it means a long process to make the amends. The process can consume extra time and money.

We cannot conclude that one approach is better than the other, as every method would have its own strengths and weaknesses. The determination of success for each method depends on how it is being used and whether the approach suits the scope of work being undertaken. While one approach may be suitable for a particular project, it might become totally useless under different circumstances. For example, some believe that agile methods are not well suited for offshore development, as they require a closer contact and communication that is not possible in an offshore project.

Posted in general | Comments Off on Strengths and Weaknesses of Waterfall Approach for Software Development

What is the Argus Safety Database?

The Argus safety database is a key part of the Argus Safety 3.0.1 pharmacovigilance software system. In a nutshell, pharmacovigilance is defined as the monitoring of any possible adverse effects of both herbal remedies and synthetic drugs as they are used.

The digital database is used to help companies ensure compliance with global regulations regarding pharmacovigilance and related activities. As a comprehensive pharmaceutical software system, it supports pharmacovigilance business processes that take place in both the pre- and post-marketing phases.

The Argus database is hosted in a data center that is ISO-9001-certified, and operates according to the security standards promulgated by FDA guidelines. By managing this data center, a pharmaceutical firm or laboratory may obtain maximum physical data security as well as access to effective data backup and recovery procedures whenever these services are needed.

ACCOVION, the full-service contract research organization that offers pharmacovigilance as a core service, has configured the Argus database with customized and validated rules to expedite safety reporting. This setup enables generated safety reports to be sent to regulatory investigators and central ethics committees.

The system covers a wide range of the most commonly used forms, including the American FDA MedWatch 3500A form for drugs, the VAERS form for vaccines, the CIOMS-I form, and many others utilized in European countries.

The standard setup in use by the Argus safety database system includes coding with current World Health Organization and MedDRA data dictionaries, as well as older versions of these dictionaries and many others to meet user requirements.

Posted in general | Comments Off on What is the Argus Safety Database?

Mortgage Loan Origination Software – 10 Functions of Mortgage Banking

Regardless of a mortgage lending organizations’ size, mortgage loan software, data security solutions and automation tools and services should be able to assist with mortgage loan automation requirements. In today’s chaotic mortgage lending environment origination and document security systems need to be easily configured to emphasize a company’s special needs and increase efficiencies across all aspects of the loan origination process, allowing lenders to increase quality and productivity.

Technology-driven automation is the key to succeeding in the increasingly complex, deeply scrutinized mortgage industry. Web-based (Software-as-a-Service), Enterprise mortgage software that supports the ten primary functions in mortgage banking will provide lenders with the necessary competitive advantages to succeed in today’s mortgage industry.

Ten Primary Functions in Mortgage Banking

  1. Mortgage Web site design, implementation, and hosting to provide product, service, loan status, and company information to mortgage customers and business partners
  2. Online loan applications for gathering information from borrowers and business partners that issue loan terms, disclosures, and underwriting conditions
  3. Loan origination software for managing loan data, borrower data, property data, general status reporting, and calculations
  4. Interface systems to send and receive data from real estate service providers, such as credit reports, flood determinations, automated underwriting, fraud detection, and closing documents
  5. Internal automated underwriting system that is simple enough for originators and sophisticated enough for underwriting portfolio loan products
  6. Document generation for applications, upfront disclosures, business processes, and closing documents
  7. Integrated imaging that is used from loan origination to investor delivery and for file archiving
  8. Interest rate and fee generation along with program qualification guidelines
  9. Secondary marketing data tools to track loan revenue and investor relationships, including warehouse line management and interim servicing to complete the back-office system
  10. Reporting such as loan delivery, year-end fee reporting, and HMDA reporting for loan application disposition

Web-Based, enterprise mortgage software that supports the ten primary functions of mortgage banking simplifies compliance, maximizes operational efficiencies, and increases profitability.

Posted in general | Comments Off on Mortgage Loan Origination Software – 10 Functions of Mortgage Banking

The Advantages and Disadvantages to Bug Tracking Software

Bug tracking has been around as early as the 1940’s, just not in a software form. In these early days, simply using a pen and a paper created tracking systems. It evolved from then to using spreadsheets. Now there is bug tracking software like the defect tracking tool and even more specific programs like Mantis and Bugzilla, just to name a couple. As with anything that evolves however, there will always be those that are 100% for the programs and those that are against it. This article will cover all claims – both positive and negative – of bug tracking software like the defect tracking tool.

The Positive Claims

It certainly depends on the type of bug tracking software that is used, but it seems as if there are many more advantages to these tools than disadvantages. The most obvious advantage is that these types of tools allow companies to keep a record of the issues that are recorded, who fixed them, and even how long it took to fix the issue for some types of programs. Customers are encouraged to be as detailed as they can be when requesting that an issue be fixed so that companies can complete their requests as quickly as possible. The fact that the issues are recorded and saved is a huge benefit for the companies because sending the recorded bug list with the purchased software is a common practice. This is a benefit to customers because if it is a common error, they can simply look up this issue in the previously recorded bug list. However, if the list is incredibly long (a common disadvantage) it can become more of a hassle.

The Negative Claims

As with anything that has a list of positive aspects there is also a list of negative aspects, though there are few. One of the biggest complaints is not so much from the bug tracking software or defect tracking tool itself but more from the process of submitting issue requests. Customers need to be extremely detailed with their issue requests if they want a detailed response. Miscommunication isn’t a fault of the product, the customer, or the company – it’s simply something that happens. Customers and companies alike both need to remember to be patient with each other and to treat each other with a mutual respect. A second complaint that was previously mentioned is the length of issues in some of these software programs.

Some customers don’t have the patience to look through a long list of software issues that have been previously recorded and this causes frustration among the companies that took the time to purchase software that saves them. The length of issues that are submitted can also become a problem because if there are too many issues submitted and not enough engineers to address them, some can get overlooked. Nobody likes to be forgotten, but usually these types of bug tracking software include detailed instructions and are easy to use.

Usually when a company purchases a bug tracking software or defect tracking tool it already has an experienced IT department in place. Whatever the software is that is being used with these programs should have some sort of backup for when the work is completed so it does not get lost if the issues that occur are deadly.

Posted in general | Comments Off on The Advantages and Disadvantages to Bug Tracking Software

Define Computer Hardware

It is quite well known that the working of the computer is dropped by hardware and software. One can define computer hardware as the electronic, magnetic, and electric devices that carry out the computing functions. Hardware is the physical components of the computer like microprocessor, hard disks, RAM, and motherboard. The peripheral devices such as monitor, mouse, keyboard, printer, and speakers can also be included in the list of hardware parts. The programs that run on the computers like Windows, C ++, and Photoshop are the software parts of the computer. A good example for an easy understanding of hardware-software definition is music CDs. The actual compact disk is the hardware, while the songs and music in the CD are the software parts.

There is another way to define computer hardware. Hardware devices are the executors of the commands provided by software applications. For example, let us see what happens when you click the print button of the web browsing software. The software application provides a command to the processor, which is the central part of all computer hardware. Processor in turn checks for an attached printer. If the printer is ready, the software will get a positive response from the processor. Then the software application provides instruction to the printer via the processor to print the web page. In that sense, hardware parts are the foot soldiers and software applications are the commanders in the digital operation that takes place within a computer.

The main player of computer hardware is unduly the microprocessor. It is the sun in the solar system of computer hardware devices. It is the central component and all other components work around it. It is an integrated chip on which a number of functions are incorporated. Two specifications determine its efficiency. One is its processing speed, which is measured in gigahertz. The other is its bit rate. Commonly available processors are 32 bit and 64 bit. The bit rate is a measure of the efficiency of a processor to carry out multiple operations at the same time.

One can not define computer hardware without mentioning the two types of memory used in computers. One is permanent memory. It refers to the magnetic storage capacity of hard disk. It is measured in gigabytes. The second is RAM or random access memory. This memory is able to store data only when the computer is switched on. The memory will lose all the data when the computer is switched off.

Another important product that one should mention when one defines computer hardware is motherboard. It is the electric and electronic circuit board on which all the other components are inserted. There are several other kinds of products such as sound card, video card, network card, and modem that complete the hardware spectrum.

Posted in general | Comments Off on Define Computer Hardware