- Load Balancer
- Write Back Option
- Time Series Wizard in Siebel Analytics Converted as Time Series Functions in OBIEE.
Labels: technology 0 comments
First-Come-First-Served [FCFS] Scheduling:
First-Come-First-Served algorithm is the simplest scheduling algorithm is the simplest scheduling algorithm. Processes are dispatched according to their arrival time on the ready queue. Being a no preemptive discipline, once a process has a CPU, it runs to completion. The FCFS scheduling is fair in the formal sense or human sense of fairness but it is unfair in the sense that long jobs make short jobs wait and unimportant jobs make important jobs wait.
FCFS is more predictable than most of other schemes since it offers time. FCFS scheme is not useful in scheduling interactive users because it cannot guarantee good response time. The code for FCFS scheduling is simple to write and understand. One of the major draw back of this scheme is that the average time is often quite long.
The First-Come-First-Served algorithm is rarely used as a master scheme in modern operating systems but it is often embedded within other schemes.
Program to implement First-Come-First-Serve [FCFS] Scheduling:
#include<iostream.h>
#include<dos.h>
#include<conio.h>
void main()
{
clrscr();
char p_name[10]; //variable declaration
int a_time[10],e_time[10],n; //variable declaration
cout<<endl<<"Enter the number of processes:";
cin>>n;
cout<<endl<<"Enter the names of the processes:";
for(int i=0;i<n;i++) //This loop reads the process names
cin>>p_name[i];
cout<<endl<<"Enter the process execution times:";
for(i=0;i<n;i++) //This loop reads the execution times of the processes
cin>>e_time[i];
cout<<endl<<"The processes to be executed in this order in FCFS algorithm:";
for(i=0;i<n;i++) //This loop executes the process order
{
cout<<endl<<p_name[i];
sleep(e_time[i]);
cout<<"\nprocess"<<i+1<<"finished";
}
getch();
}
Output:
Labels: BCA III, open source 0 comments
Hai Technocrats,
We known that OBIEE is a Reporting Tool.
Today i will give the advantages/why OBIEE.
1> Scalability
2> Performance
3> Security
4> Parallel Processing
Scalability: We know that OBIEE is a reporting tool. For generating reports we need data in database. OBIEE support any kind of database
Performance: OBIEE generates fast reports. It has cache concept, it will increase performance
Security : Two types of securities are there
1.Authentication
Authentication is a process of obtaining identification credentials such as userid and password for user and validating those credentials against some authority.
For example, userid and password giving to the OS while we are login. Here OS is the third party. This is called third party authentication. The following are the some Authentication types
• Operating System
• Database System
• External Table
• LDAP (Light Weight Direct Access Protocol)
2.Authorization
Authorization is process of granting/revoking the privileges.
For example, grant and revoke in sql. The following are the two types of Authorization
• Object Level Security
• Data Level Security
Parallel Processing: If the number of request came to BI Server it respond to all request with out any problem. In BI Server Load Balancer is available. Load Balancer is an internal program it will take care of parallel processing.
The new things in the above are discussed further.
Labels: technology 0 comments
Hai Technocrats,
I want to introduce one thing that is Oracle Business Intelligence Enterprise Edition(OBIEE).
OBI is a reporting tool. The guys who know about this have more demand. Even salary also alot.
But one thing is companies asking experience people. May be in future they will go to freshers also.....
Okay leave all those things, first we have to learn new. What you say Technocrats?
Okay. OBI is a Reporting Tool.
The name itself saying it is Oracle product. Actually it is Siebel product.
But Oracle take over it.
OBI is reporting tool. Every body think why we need this, most people think i am good at programming i can generate report by program. Ya Me also thought like that. But in real time business data is not small its huge. Day by day business requirements is changing according to that reports will also change. Its not possible with programming language.
One more doubt you may have, that is why people giving that much importance to reporting.
Just assume yourself if we have customer table with 100 records for a lady face cream product. But it is bought by both male and female. Recently one product came into market for men separately. Business people maintain lady face cream data contains who is buying that. It contains male and female data, but that does not give the clear picture to the Business people,which gender will buy more products, but if we have a report like men bought details and female bought details, this show clear picture to Business people, then they may shift to new product like men face cream.
This is simple example for report importance.
All this type of reports we can do through this reporting tool(OBIEE)
Try to know about this.... Senior Technocrats will help you all updated information.
Life is full of Competition, compete for achieving your goal.
Labels: technology 0 comments
ROUND ROBIN SCHEDULING:
Round-robin (RR) is one of the simplest scheduling algorithms for processes in an operating system, which assigns time slices to each process in equal portions and in circular order, handling all processes without priority. Round-robin scheduling is both simple and easy to implement, and starvation-free. Round-robin scheduling can also be applied to other scheduling problems, such as data packet scheduling in computer networks.
PROCESS SCHEDULING:
Round-robin job scheduling may not be desirable if the sizes of the jobs or tasks are highly variable. A process that produces large jobs would be favoured over other processes. This problem may be solved by time-sharing, i.e. by giving each job a time slot or quantum (its allowance of CPU time), and interrupt the job if it is not completed by then. The job is resumed next time a time slot is assigned to that process.
A Simple CPP program to implement Round Robin Scheduling.
#include<iostream.h>
#include<conio.h>
#include<process.h>
void main()
{
clrscr();
int e_time[15],time,n,count=0; //variable declaration
char p_name[15]; //variable declaration
cout<<endl<<"Enter the number of processes:";
cin>>n;
cout<<endl<<"Enter the time slice:";
cin>>time;
cout<<endl<<"Enter the process names:";
for(int i=0;i<n;i++) //This loop reads the process names
cin>>p_name[i];
cout<<endl<<"Enter the process execution time:";
for(i=0;i<n;i++) //This loop reads the execution time of the process
cin>>e_time[i];
if(n<0)
cout<<endl<<"Invalid input";
for(i=0;i<n;i++) //This loop checks whether the given input is valid or not
{
if(e_time[i]<0)
{
cout<<endl<<"Invalid execution time";
getch();
exit(0);
}
}
count=e_time[0];
for(i=0;i<n;i++) //The count variable in this loop finds the largest execution time
{
if(count<e_time[i])
count=e_time[i];
}
for(i=0;i<count;i=i+time) //This loop executes the order of the process names
{
for(int j=0;j<n;j++)
{
if(i<=e_time[j])
{
if(e_time[j]!=0 && e_time[j]>0)
cout<<p_name[j];
}
else if(e_time[j]<=time && e_time[j]>0)
{
cout<<p_name[j];
}
else if(e_time[j]>time)
{
if(e_time[j]!=0 && e_time[j]>0)
cout<<p_name[j];
}
e_time[j]=e_time[j]-time;
}
}
getch();
}
Labels: BCA III, open source 0 comments
#include <stdio.h >
#define LAST 10
int main()
{
int i, sum = 0;
{
sum += i;
}
/*-for-*/
printf("sum = %d\n", sum);
return 0;
}
############ ######### ######### ######### ######### #########
And the developer fixes it this way
..
..
..
..
....
#include stdio.h;
#define LAST 10
int main()
{
int i, sum = 0;
/*
for ( i = 1; i < = LAST; i++ )
{
sum += i;
}
/*-for-*/
printf("sum = %d\n", sum);
return 0;
Labels: fun tricks 2 comments
Wish you All Happy Raksha Bandhan
Labels: wishes 0 comments
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer applications based upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from Read It Online.....
Labels: BCA III 0 comments
Labels: ebooks, seminar topics, technology 0 comments
A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. Networks may be classified according to a wide variety of characteristics. This article provides a general overview of types and categories and also presents the basic components of a network. Download Data communications & networking ppt
Labels: BCA III, seminars 0 comments