Skip to main content

Posts

PERT and CPM

PERT and CPM Introduction Network scheduling is a technique used for planning and scheduling large projects in the fields of construction,maintenance, fabrication,purchasing,computer system installation,research and development designs ,etc.The technique is a method of minimizing trouble spots,such as,production bottlenecks,delays and interruptions,by determining critical factors and coordinating various parts of overall job. There are two basic planning and control techniques that utilize a network to complete a pre-determined project or schedule.These are: Program Evaluation and Review Technique(PERT); and the Critical Path Method (CPM). Network: Basic components A network is a graphic representation of a project's operations and is composed of activities and events that must be completed to reach the end objective of a project.The basic components of a network are: Activity :  An activity is a task,or item of work to be done,that consumes time,effort, money ...

GOVERNMENT INITIATIVES IN E COMMERCE IN INDIA

Country Issues: Telecommunication Infrastructure Bandwidth PC penetration/Internet penetration Legal Framework   PKI(Public Key Infrastructure)   Delivery of public services by electronic means Payment gateways Education and awareness Human skills required for E Commerce: To develop Electronic Commerce solutions successfully across the Organization we have to build a reliable and scalable systems for- Security,   E-Commerce payments,    Supply-chain management, Sales force,warehousing and customer relations   Integrating all of this with existing back-end operations.   Internet-enabled Electronic Commerce requires-       Web Server technologies   Security  E xisting applications can be integrated  Web site development   Information Technology for Integrated Electronic Commerce needs- LAN/WAN infrastructure to implement Internet/Intranet Electronic Commerce soluti...

ENCRYPTION

SYMMETRIC ENCRYTION Symmetric encryption is the oldest and best technique that contains a secret key (a number, a word, or just a string)of random letters. This key is applied to the text of a message to change the content. Secret key is used to encrypt and decrypt the message by the sender and receiver. ·        Same digital key is used by sender and receiver to encrypt and decrypt message ·        Different set of keys are required for each transaction ·        Length of binary key is used to encrypt data ·        Advanced Encryption Standard (AES) – Most widely used symmetric key encryption. It uses 128,192, and 256-bit encryption keys ·        Other standards use keys with up to 2,048 bits ·        It provides confidentiality of the message . ·        Th...
  E-Commerce (Assignment) 1. What is the future of Indian E-commerce? 2. What are the key drivers for Indian e-commerce? 3. Case Studies Retail,Travel,Auctions. 4. Advantage and Disadvantages of E-commerce? 5. What are the enablers of Indian e-commerce?

Queuing Theory

Queuing Theory A flow of "customers" from infinite/finite population towards the service facility forms a queue or waiting line on account of lack of capability to serve them all at a time.These "customers" may be persons waiting at a railway booking office,these may be machines waiting to be repaired or letters arriving at a typist's desk. Queuing Theory is the mathematical study of waiting lines,or queues.It examines every component of waiting in line to be served, including the arrival process, service process, number of servers, number of system places and the number of customers. It is used to develop more efficient queuing systems that reduce customer wait times and increase the number of customers that can be served. Applications Queuing theory has its origins in research by Agner Krarup Erlang when he created models to describe the Copenhagen telephone exchange. The ideas have since seen applications including telecommunications, traffi...