JavaScript DOM: Must knowledge to understand Ajax #Root

  • Understanding Javascript DOM is the first step to understand Ajax.
  • DO M provides many methods to access and edit individual components of a web-page/document. The methods are called getters.
  •  < div id = 'test' > 
    Hello < /div >

    getElementById method can reference to this div element. var testDiv = document.getElementById(“test”); CSS #test{} refers to the same area of the document

  • getElementsByTagName: all the elements with the partcular tag name. Returns an array. var testTag = document.getElementsByTagName(“p”); just like p{} in CSS applies to all <p> tags.
  • testTag.length can be useful.
  • You can also cycle through the elements and take some actions
    for(var i = 0; i < testTag.length ; i++)
    {
             //do something
    }
    
  • Another example: document.getElementById(“test”).getElementsByTagName(“p”); [CSS #test p{} – will affect the same area in CSS]
  • DOM provides getAttribute () : can access the value of an attribute. < p id=’test’ title=’justEtc Computer’ > Hello <p> : var title= document.getElementById(“test”).getAttribute(“title”);
  • Web-page can be thought of a set of interconected nodes. getElementById, getElementsByTagName, getAttribute – all help in accessing the nodes.
  • Three basic types of nodes in web-pages: element, text, attribute. element – building block, text = attribute = content
  • Every node is contained under another node. So there will be parent and child relationships. parentNode, childNode – are corresponding methods for accessing parents and childs.
  • Example: var test = document.getElementById(“test”); var testParent= test.parentNode; var testChild = test.childNodes;
  • childNodes – returns an array
  • var allEle = document.getElementsByTagName(“*”); – a collection of all the elements of the web-page.
  • firstChild – first Child of an element, lastChild – lastChild of an element, previousSibling, nextSibling – having same parent of the current node (next element), nodeValue, nodeValue – content of a node,
  • DOM Setters
  • Using DOM, you can create elements dynamically and put it in the document. createElement() – method serves the purpose
  • var paragraph = document.createElement("p"); - 
    element created - element node - but not inserted in the document yet
    
    var textNode = document.createTextNode("A new text node from DOM!"); 
    - creates a text node
    
  • setAttribute() – method can be used to set the attributes of a node. example: paragraph.setAttribute(“title”, “introduction”);
  • appendChild() – append one node under another node;
  •     var pNode = document.createElement("p");
    
        var textNode = document.createTextElement("How is it going?");
    
         pNode.setAttribute("title","Test Title");
    
         pNode.appendChild(textNode);     
    
         var testDiv = document.getElementById("testDiv");
    
         testDiv.appendChild(pNode);
    
    
  • removeChild() – helps to remove a child node from a parent node

From: http://sitestree.com/?p=3463
Categories:Root
Tags:
Post Data:2016-07-09 08:41:20

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Overview on .Net Solution Architecture #Root

Overview on .Net Solution Architecture

Actually, I wrote this long back as you can see at:

http://salearningschool.com/displayArticle.phptable=Articles&articleID=793&title=Overview%20on%20.Net%20Solution%20Architecture

  • Microsoft Solution Framework is a combination/mix of both Waterfall model and Spiral model. It includes waterfall models milestone based planning and resulting predictability with the spiral model’s benefits of feedback and creativity
  • Roles in the MSF Team Model:
    • Product Management (Deals with customers, collects customer requirements, ensures requirements are met, plans project communications, and performs related duties)
    • Project Management: Develop processes and deliver solutions
    • Development: Develop the solution
    • Testing:
    • Release Management: Responsible for deployment
    • User Experience: Analyzes performance needs, supports issues of the users
    • Project Sponsor:
    • Customer
    • End user
    • Operations
  • Gathering Information: Information Categories: Business, Application, Operations, Technology
  • Information Gathering Techniques: Shadowing (Observe the operation, ask questions (how do interruptions affect users?) and collect information), Interviewing, Focus Groups, Surveys, User instruction, Prototyping
  • Sources of information:Artifacts (like documents), Systems (set of processes performing an action), People (responsible for different project related tasks)
  • Analyzing Information Step: Analyze collected information and create use cases and use case diagrams. Use cases and use scenarios will identify the total/complete system clearly, all processes involved in the system, identify gaps in the information collection, establish connections between business needs and user requirements. Collecting information and Analyzing can be iterative processes
  • A use case diagram will contain information like: Requirement ID, Requirement description, Priority, Data Source, current functionalities, questions from this item.
  • Several other documents may be created such as: Actors Catalog (For each responsibilities in the system list the actor’s/responsible employee’s name, and source of information), Business Rules Catalog (may include short title, description of the rule, source of the business rule, reference to the corresponding use case diagram, functionalities related to the business rule)
  • UML notations may be used to create the diagrams
  • Envisioning Phase: The team, the customer, and the sponsor define the high level business requirements and overall goals of a project. Identify what the project involves, what the customers want to achieve with the project, what is the business need, what must be developed to solve/address the business needs. Make all involved people aware of the project goals and requirements clearly. Form project team
  • Output from the Envisioning Phase: Vision/Scope document, Project structure document, Risk assessment document, list of testable features, preliminary requirements and architecture, a GUI storyboard.
  • Vision/Scope Document: Problem Statement, Vision Statement, User profiles, Scope of the project, Solution concept, Project Goals (both business and design), Critical success factors, Initial schedule
  • Project Structure Document: components of the project structure (team and structure, project estimates, project schedules)
  • Contents of the project structure document: Team and customer roles and responsibilities, communication decisions, Logistical decisions, Change management decisions, Progress assessment decisions
  • Next three steps: Conceptual Design->Logical Design->Physical Design
  • Conceptual Design: Define the problem from the perspective of the user and the business/usage scenarios
  • Logical Design: Define the problem from the perspective of the project team/cooperative services
  • Physical: Define the problem from the perspective of the developers
  • Goals of Conceptual Design: Understand the business problem to be solved, requirements of the business, and target future state of the business.
  • Steps in Conceptual Design: Research, Analysis, Optimization
  • Build Conceptual Design: analyze information, Restate requirements, categorize requirements, refine use case diagrams, select an application architecture (client/server, layered, Stateless, Cache, Layered-client-cache-stateless-cash-server),
  • Logical Design: List candidate tools and technologies, identify business objects and services, identify important attributes and key relationships, optimize logical design (refine, validate)
  • Outputs of Logical Design: logical object model, high level user interface design, logical data model
  • logical object model – identify all the relevant objects/entities [will be pretty similar to identifying entities to create data model and E-R Diagram]
  • In logical design, identifying services are also important
  • Physical Design: Defines the parts of the solution, how they will be developed, how the interaction will happen.
  • Physical Design: Components, User Interfaces, and Physical Database. Scope: Coding, deployment
  • At the end of logical design UML diagrams such as Class Diagram, Sequence Diagrams, Activity diagrams, Component diagrams are available. In physical design refinements of these diagrams occur.
  • Physical Design: Define programming model, Specify component interfaces and interactions, Design Physical UI Model, Design Physical Database model
  • Designing the Presentation Layer: Functions of the User Interface Components: Acquire data from users, capture events from the users, restrict the types of input a user can enter, perform data entry validation, perform simple mapping and transformation of the user provided information, perform formatting of values
  • Well designed interface: Intuitive design, Optimum screen space utilization, appearance, easy of navigation, controlled navigation, populating default value, input validation, menus, toolbars and help, efficient event handling
  • Designing the Presentation Layer: Create an initial user interface either by hand or using Visual Basic forms, provide user assistance, use tooltips if appropriate, display status, use wizards if appropriate, provide accessibility aids for disabled people
  • Types of user interfaces: Windows based, web-based, mobile device based, documentation based
  • Design Data Layer: Typically database objects are modeled in an entity-relationship diagram.
  • Data Model Types: Flat file, Hierarchical, Relational, Object oriented
  • Optimize data access: Minimize roundtrip requests, minimize returned resultset size, reduce concurrency, find the tradeoffs between managing data on the client or on the server
  • Optimize the database: Index data (clustered, non-clustered), Partition data (why and how vertical and horizontal partitioning), Normalize data
  • Sometimes Denormalization of database tables is also required for better performance.
  • Implement data validation: Check for Data Integrity (Domain, Entity, Referential), Validate Data (Range check, Data format, data type check)
  • Think about client side/server side data check. Many times both are required for optimum performance and integrity.
  • Design Security Specifications: Common Types of Security Vulnerabilities: Weak passwords, Misconfigured software, Social engineering, Internet connections (through unsecured ports, if firewalls are not configured appropriately), Unencrypted data transfer, Buffer overrun, SQL Injection, Secrets in code.
  • Principles for creating Security Strategies: Rely on tested and proven security systems than creating your own, use your own only after expert auditing and reviewed by security organizations, never trust external input, Assume that external systems are not secure, use principle of least privilege, reduce components and data availability, default to a secure mode, follow STRIDE (spoofing identity, tampering, repudiation, information disclosure, denial of service, and elevation of privilege) principles
  • How to create a security model: Arrange for a brainstorming meeting, list all possible threats, apply the STRIDE security categories, conduct research, rank the risk of each threat
  • Security mitigation techniques: Authentication and authorization, Secure communication, Quality of Service, Throttling, Auditing, filtering, least privilege
  • STRIDE mitigation techniques: Authentication, protect secrets, audit trails, do not store secrets, privacy protocols, authorization, hashes, digital signatures, time stamps, filtering, throttling, quality of service, run with least privilege
  • .Net security features: type safety verification, code signing (Ensure authenticity, ensure integrity) – digital certificates and signatures, code access security, role based security (make use of windows users and permissions) , saving data in isolated storage
  • ASP.net authentication: Forms authentication, Passport authentication, Windows authentication
  • Web-services security: transport level, application level, message level

From: http://sitestree.com/?p=3457
Categories:Root
Tags:
Post Data:2016-06-27 21:56:39

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Database Design Concepts Generalization, Aggregation, and Specialization #Root

[youtube https://www.youtube.com/watch?v=IzpsDSS1PpY&w=640&h=480] From: http://sitestree.com/?p=3426
Categories:Root
Tags:Database Design Concepts, Generalization, Aggregation, Specialization
Post Data:2016-05-23 11:39:13

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

If you are interested in Islamic Mortgage in Canada #Root

Good, Bad, Ugly – I do not know…

For Canada
An-Nur Coop – offers home purchase as well as commerical real estate.
http://nurcoop.com

Lariba Canada – provide its members with interest free finance, Islamic forms of Investments and extremely modest financial services which are free from any sort of usury.
http://www.lariba.ca

ISNA Housing
http://www.isnahousing.ca

Ansar Co-operative Housing Corporation LTD
http://www.ansarhousing.com

Salam Financial – based in Ottawa, Ontario.
http://www.salamfinancial.com From: http://sitestree.com/?p=3393
Categories:Root
Tags:
Post Data:2016-04-19 20:42:34

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Two Cents on Privacy and Security #Root

Folder Changes View:
You might want to use a tool like Folder Change View to monitor any changes to your files and folders. You will also be able to create a list of the files changed – this will happen automatically once you configure.

Folder Change View
http://www.nirsoft.net/utils/folder_changes_view.html

Keep the software running when you are away from the computer; however, for some reasons you need to keep the PC powered on.

Some other tools by NirSoft
ProcessActivityView – Shows the files accessed by the selected process. Will help in security
NK2Edit – Edit, merge and fix the AutoComplete files (.NK2) of Microsoft Outlook.

Windows event viewer can help to monitor the activities in your PC. In the application search, type ‘Event Viewer’, you will find the application.

Another Note:

You might want to keep your PC powered off when you are away from your PC. Also, why not disconnect from power source and/or remove the battery as well. From: http://sitestree.com/?p=3372
Categories:Root
Tags:
Post Data:2016-04-01 21:42:46

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Web-site Visit Log Application Comparisons (and saving disk space) #Root

In an attempt to save disk space on hosting, just found out Analog application was taking > 5 GB of space. I am not really using the stats applications or the stat data for any purpose (however, keeping them almost always is a good idea). Hence, keeping one of the most useful ones seems to be enough. Awstat is used more commonly than Analog or Webalizer. Anyway, tried to find out comparisons: Apparently, AWSTAT is more recommended by others. Hence, decision: deactivate Analog and save some space…

https://forums.cpanel.net/threads/analog-vs-awstats-vs-webalizer-if-i-had-to-choose-one.15893/

http://www.awstats.org/docs/awstats_compare.html From: http://sitestree.com/?p=3361
Categories:Root
Tags:
Post Data:2016-02-27 22:45:38

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

#laravel Fetching Data How to Write Custom Blade Directives Routing to Controllers API Rate Limiting Preparing the Flyer Page How to Manage Your CSS and JS API Rate Limiting Guards and Authorization

#laravel Authentication Goodbye Supervise This Efficient SQL Queries Package Dev Best Practices PSR-4 Autoloading Test DBs in Memory

*** . *** *** . *** . *** . ***

Courses: http://Training.SitesTree.com (Big Data, Cloud, Security, Machine Learning)
Blog
: http://Bangla.SaLearningSchool.com, http://SitesTree.com

8112223 Canada Inc./JustEtc: http://JustEtc.net

Shop Online: https://www.ShopForSoul.com/

#laravel From Closures to Controllers Master Pages Resourceful Routing Blade Basics Refactoring Models Crazy Simple Pagination Create/Edit Forms Leverage Events Hands-On: Payments The N+1 Problem

#laravel Setup The Stripe Dashboard Building the Form Gravatars and Eager Loading Validation Redux