Text
CORS in .NET
Setting up CORS in .NET
1. Install the necessary package
because we are displaying the raw identifiers to the user, especially sequential ones.
dotnet add package Microsoft.AspNetCore.Cors
2. Configure Services in Program.cs
Add CORS services to the DI container and set up a CORS policy.
builder.Services.AddCors(opt => { opt.AddPolicy("CorsPolicy", policy => { policy.AllowAnyMethod() .AllowAnyHeader() .WithOrigins("https://localhost:7235"); } });
3. Apply the CORS policy in the middleware pipeline:
Add CORS services to the DI container and set up a CORS policy.
app.UseCors("CorsPolicy");
Adjusting the CORS Policy
The policy we created is rather strict. You can adjust it as per your requirements. Some of the things you can configure are:
• Allowing multiple specific origins:
policy.WithOrigins("https://myapp.com", "https://anotherapp.com");
• Allowing all origins:
policy.AllowAnyOrigin();
• Allowing specific headers:
policy.WithHeaders("header1", "header2");
• Allowing specific HTTP methods:
policy.WithMethods("GET", "POST");
Note: Be cautious with allowing all origins (AllowAnyOrigin) as it can expose your API to potential security threats from malicious websites. Always ensure that you understand the security implications of the CORS settings you choose.
2 notes
·
View notes
Text
How to Install Amd Graphics driver in Ubuntu 12.04 or 13.10
First you need to download AMD driver.Download your desired drive from below link:
http://support.amd.com/en-us/download
After selecting everything download the first one. Do not download beta version.
Now you need to unzip the file. Unzip the file and copy it to your home folder. Rename the file.
Example: amdcc.run
Right click on the file. Now go to permission tab and below tick the box. [Run as an application]
Now open your terminal and type -
sudo sh amdcc.run [amdcc.run is your application name]
Then just simply setup it. After installing it, do not restart.
Now write in the terminal-
amdconfig --initial -f
sudo amdconfig --initial -f
now reboot.
sudo reboot
To check whether your graphics card installed properly, type-
fglrxinfo
in the terminal. There you can see your graphics model which you just installed.
Enjoy. :)
1 note
·
View note
Text
Online Club Management System
ACKNOWLEDGEMENT:
We are extremely grateful and remain indebted to our guide Dr. Sazzad Hossain for being a source of inspiration and for his constant support in the Design, Implementation and Evaluation of the project. We are thankful to him for his constant constructive criticism and invaluable suggestions, which benefited us a lot while developing the project on “ONLINE CLUB MANAGEMENT SYSTEM”. He has been a constant source of inspiration and motivation for hard work. He has been very co-operative throughout this project work. Through this column, it would be our utmost pleasure to express our warm thanks to him for their encouragement, co-operation and consent without which we mightn’t be able to accomplish this project.
This project of “ONLINE CLUB MANAGEMENT SYSTEM” of gives us the complete information about the CLUB (UCPC). We can enter the record of new members and retrieve the details of members available in the website. From the website we can see what the members are doing, which competition they are attending. What is there position in programming?
Throughout the project the focus has been on presenting information and comments in an easy and intelligible manner. The project is very useful for those who want to know about Club Management System. This project is also very important for those who are interest to open a company in future.
In the last, we gratefully acknowledge and express our gratitude to all members UCPC and friends who supported us in preparing this project.
TABLE OF CONTENTS
1. Introduction
2. Information about Club Management
3. Club Management System
4. Table Design
5. PROJECT DETAILS
6. CONCLUSION
7. BIBLIOGRAPHY
ro:Introduction:
In our racing world everyone needs to have the quality to manage a company, work in a company. Now a day’s every company want those persons who have the quality to manage the company work beside his/her main profession. Recent times our universities give the opportunity to manage a club. Our university ULAB has several clubs. We are going to talk about a very important club named ULAB Computer Programming Club shortly known as UCPC.
As we all know everything is getting digitalized now days. UCPC, from the name we can understand it is club based on CSE department. The bad news is this club is not digitalized. We took the step to digitalize the club. Give the club a digitalize form.
Information about Club Management:
There is a general board for the Club management. Our club UCPC also has board. The board is divided into below section:
· President
· Vice-President
Secretaries:
· Organizational secretary
· Publication secretary
· Financial Secretary
· Communication Secretary
Coordinator:
· Gaming coordinator
· Mathematics coordinator
· InfoTech coordinator
General Duties of Board Members:
At the very least the Board should aim for the following:
· Meet regularly- (monthly) to discuss the events within the club. It is the responsibility of each Board member to be present at each meeting. Meetings require a quorum to be present if motions are to be passed.
· Ensure that the club is operating harmoniously and that there are no disgruntled members.
· Be aware of any changes to the game or within the league.
· Seek majority approval of the club membership before making any major commitments or changes to the club.
· Be alert to the possibilities of a new project or a new service that may be offered.
· Encourage members to attend at least one Board meeting.
· Submit a written report to the President prior to the next meeting for circulation to the board.
The President, along with the Secretary and Treasurer has the responsibility of ensuring that the club operates in a productive and efficient manner. It is fundamental for the club’s sustainability that each Board member has the appropriate skills to fulfill their position, to guide professionals and volunteers and to serve on the Board with the club’s best interests in mind.
Club Management System:
Existing System:
In UCPC the system is based on paper documentation. Everything starting with keeping records, member’s payment history etc everything is paper based. To know more about the existing system in other club of other universities, we did a survey. We went to United International University, Independent University, and Dhaka University to see what kind of system they use in their club. Each and every clubs of those universities club management system is based on paper documentation. Let’s talk about the disadvantages of this system.
Disadvantages of Existing System:
· Papers can be easily lost. If the papers are gone information’s will be gone.
· Communication with the members is not easy. Each and every time we need to inform them by calling. It is costly.
· If someone misses any workshop or program, there is no way he can retrieve it.
Our Proposed Online based System:
UCPC arrange some important workshops, organize big event like gaming, inter-university programming contest, Math Olympiad. UCPC not only arrange program but also send their best teams to the big competitions like ICPC, WCG etc. In programming expert’s opinion, help, their earlier contest experience is badly needed for the new students.
Our online based system which is a website will provide these facilities. We have made our website like that way so that any new student can easily get the most precise information’s that they need. We have tried to implement HCI in our website.
Advantages of our system:
· The information’s of the club will be safe.
With the help of the database we will be able to keep the database safe forever. Like if some -one want to know about the past of the club he/she can easily know it.
· Information’s are well organized for the new users.
· Communication will be very easy with the help of the website.
In a club communication is much needed. Contest news, workshop news, board members communication with the club members all are will eased with the help of the website.
· The rank list of the programmers will be a great help for the new users. They will be able to know what have they done and what Is their position.
· Everyone will be able to connect with each other easily.
· UCPC arrange workshop. The lectures of the workshop will be uploaded on the website. If someone misses the lecture he/she can easily download the lecture.
Table Design:
Registration Table -
S.No.
Field Name
Data Type
1
student_id
Text
2
first_name
Number
3
last_name
Text
4
e_mail
Number
5
password
Text
6
department
Text
7
phone_number
Number
8
uva_ position
Text
Advisor Table -
S.No.
Field Name
Data Type
1
advisor_id
Text
2
name
Number
3
depertment
Number
4
validity
Text
5
contact no
Number
Event Test Table -
S.No.
Field Name
Data Type
1
event_id
Text
2
event_name
Text
3
location
Number
4
date
Text
Event Participants Table -
S.No.
Field Name
Data Type
1
event_particepent_id
Number
2
student_id
Number
3
event_id
Number
PROJECT DETAILS:
We are going to describe the website that we made.
First comes the login page for the UCPC members. If he/she is not a registered member, then he/she will need to register. In the login page user need to provide two things:
1. ULAB ID
2. Password

If someone is not registered then he/she will click to signup button and that will take him/her to Registration form. In the registration form the user need to fill some information’s like-
1. Name
2. ULAB ID
3. Password
4. E-mail
5. Phone number
6. Uva Rank

By submitting the information’s the user will go to the home page where the user will find the information’s about UCPC. The user will be able to recent news, advisors information, upcoming contest information, achievements etc.

In the menu there is programming list for the UCPC members. We raked this list based on UVA rank position.

In the Programmers rank list the user will find more options navigation menu.
They are-
· Beginners Problems
· Intermediate Problems
· Advance Problems

CONCLUSION
After we have completed the project we are sure the problems in the existing system would overcome. The “ONLINE CLUB MANAGEMENT SYSTEM” process made computerized to reduce human errors and to increase the efficiency. The main focus of this project is to lessen human efforts. The maintenance of the records is made efficient, as all the records are stored in the ACCESS database, through which data can be retrieved easily. The navigation control is provided in all the forms to navigate through the large amount of records. The user has to just visit the website and there he will be able to get the all information’s related with UCPC.
The problems, which existed in the earlier system, have been removed to a large extent. And it is expected that this project will go a long way in satisfying user’s requirements. The online system of Club Management will not only improves the efficiency but will also reduce human stress thereby indirectly improving human recourses.
BIBLIOGRAPHY
.Mastering in Html
.Mastering Database System
.Mastering in PHP
0 notes
Video
A group Presentation on Online Club Management System.
1 note
·
View note
Video
Presentation on Android Operating System
1 note
·
View note
Text
Interruption Handle
Interruption Handle
Interrupt is a breakthrough in a work. In computer a program is running and suddenly it stops or minimizes. It is called interruption. In our computer there are lots of interruptions we face. Our operating system sometimes automatically handles some interruption. The files that handles those interruption is called interruption handler. There are three types of interrupts:
1. Synchronous/Asynchronous
2. Internal/External
3. Software/Hardware
Example of Interruption: (YouTube Buffering Handling)
Many countries have very slow internet connection. In those countries who ever want to watch videos in online they face regular interruption. The video paused and starts to buffer and then again it plays again it paused and buffers. It goes on and on. It’s very frustrating. We can handle this interruption.
We can make a browser that will be able to handle the interruption very easily. How can it will handle it let’s talk about it.
In the browser whenever a person start to watch a video first it will show loading sign in the player. Then a screen will come in front, there the user will be able to see the current news of the world. The browser will automatically collect the news whenever the pc is connected with the internet. Meanwhile the video will buffer. After completing the buffer it will show a massage to the user that the video is ready to play.
We can also implement some algorithm into the browser. We can calculate the time of the buffering of the video. We can give a massage to the user that it will need that much time to complete its buffering. In this time the user can read the news’s.
0 notes
Text
Single-Instance Resource Deadlock Detection
Single-Instance Resource Deadlock Detection
The deadlock detection algorithm for systems with a single instance of each resource type, and tasks making resource requests following the single resource request model, is based on the graph theory. It is basically based on DFS (Depth First Search). The idea is to find cycles in the resource allocation graph, which represents the circular-wait condition, indicating the existence of deadlocks. DFS makes it easy to find the circular-wait condition and breaks it.
The deadlock detection algorithm can be stated in these seven steps:
· Make a list of all the nodes, N, from the graph.
· Pick a node from N. Create another list, L, initially empty, which is used for the graph traversal.
· Insert the node into L and check if this node already exists in L. If so, a cycle exists; therefore, a deadlock is detected, and the algorithm terminates. Otherwise, remove the node from N.
· Check whether any un-traversed outgoing arcs from this node exist. If all of the arcs are traversed, go to step 6.
· Choose an un-traversed outgoing arc originating from the node and mark the arc as traversed. Follow the chosen arc to the new node and return to step 3.
· At this stage, a path in the graph terminates, and no deadlocks exist. If more than one entry is in L, remove the last entry from L. If more than one entry remains in L, make the last entry of L the current node and go to step 4.
· If the list N is not empty, go to step 2. Otherwise, the algorithm terminates, and no deadlocks exist in the system.
The Banker’s Algorithm for a Single Resource
For the Banker's algorithm to work, it needs to know three things:
· How much of each resource each process could possibly request
· How much of each resource each process is currently holding
· How much of each resource the system currently has available
Now in the example we can see that A, B, C, D need 5, 4, 2, 3 resources to complete their process. But only two resources are available. As we can see C needs 2 resources. If we give it, then it can complete his resource and will be returning the resources. After C finishing his process we will have 4 resources left. There we can see B needs 4 and D needs 3 resources. We can give the resources either of them to complete of his process. Suppose we give it to D. D completes his process and returns the resources. Then we will have 8 resources remaining. Now A needs 5 and B needs 4. We can first give the resources to B for finishing his process and then giving it to A. So, this way can use the safe states. As it is in a safe state it will be accepted.

Now, in the 2nd example we can see that A, B, C, D needs 5, 3, 2, 3 resources to complete their process. But there is only one resource is available. So they are in an unsafe state. So as a result no process can be terminated. As they are in an unsafe state, it will deny the request.
0 notes
Link
Shared with Dropbox
watch the video presentation on xbox360.
Thank You
0 notes
Video
It was a fun of a video. The video was on To ERR is Human. Well, i hope all of you will see it and give me feedback.
2 notes
·
View notes
Text
The Design of Everyday Things- "TO ERR IS HUMAN"
TO ERR IS HUMAN
I am going to start with an example from “The design of everyday things” book by Don Norman, "LONDON—an inexperienced computer-operator pressed the wrong key on a terminal in early December, causing chaos at the London Stock Exchange. The error at stockbrokers Greenwell Montagu led to systems staff working through the night in an attempt to cure the problem.”
Every day we make errors frequently. We do errors in subconscious and conscious mind. Some errors only hurt us, some hurts us all, and some errors we can’t even recognize. We have some mechanisms that correct our small errors automatically and if someone points to that error we get surprised. It only happens to humans. If you press any wrong button in a device, it might cause a disaster or chaos.


There are several types of error. We categorized them into two portions.
Slips
Mistakes
Slips: The errors happen in subconscious mind are called slips. It’s like we want to do a job, we end up doing another job. Every day of our life we do a lot of slips. Sometimes we don’t even know the work just we did was a slip. Slips results from our automatic behavior. The errors we found in our everyday life are slips. When we are expert in a work, at that time slip error occurs.
Every day we go out and come in our home. We switch on the lights, fan etc. so, I know which key is for fan and which one is for fan. Now I am going to office in hurry. Before getting out I wanted to turn off the fan. Intend of turning of the fan, I turned the fan off and left the home. There I made a slip error. I was subconscious about that work. That’s why I was ended up with the wrong work. Slips result from lack of attention. People can consciously do a primary work at a time. But we often do couple of things at a time. Like we talk while we walking. We talk in phone while we driving the car. When someone plays a piano, he reads and plays and also he listens what he is playing. We can do more than one thing at a time only if most of the actions are done automatically, subconsciously, with little or no need for conscious attention.

Types of Slips: There are six types of slips.
Capture error
Description Error
Data-Driven Error
Associative Activation Error
Loss-Of-Activation Error
Mode Error
1. Counting Error: Consider the common slip called the capture error, in which a frequently done activity suddenly takes charge instead of the one intended. The capture error appears whenever two different action sequences have their initial stages in common, with one sequence being unfamiliar and the other being well practiced. Seldom, if ever, does the unfamiliar sequence capture the familiar one.

One of my favorite examples from Norman’s “The design of everyday things” is, "I was using a copying machine, and I was counting the pages. I found myself counting '1, 2, 3, 4, 5, 6, 7, 8, 9, and 10, Jack, Queen, and King.' I have been playing cards recently.
2. Description Error: One day at night I went to kitchen to make a coffee for me. I put coffee and sugar into my coffee mug and then pour hot water into it. When I just took a sip of the coffee, I found my coffee salty. I was stunned and went in the kitchen; there I saw instead of sugar I used salt in my coffee. The error occurred due to their similarity.
This type of error is known as Description error. The intended action has much in common with others that are possible. As a result, unless the action sequence is completely and precisely specified, the
Intended action might fit several possibilities. Description errors occur most frequently when the wrong and right objects are physically near each other like what happened to my coffee.
3. Data Driven Error: Much human behavior is automatic, for example sometimes insects sit on our hand and we just brush it away. Automatic actions are data driven—triggered by the arrival of the sensory data. But sometimes data-driven activities can intrude into an ongoing action sequence, causing behavior that was not intended.
The example, I’m going to share with you, it happened a lot of times with me. I’m working or reading, I pick up my phone to call a friend of mine. Instead of calling that particular friend I end up calling some other one.
4. Associative Activation Error: Associative activation errors are the slips studied by Freud; you think something that ought not to be said and then, to your embarrassment, you say it.
One day I was talking with one of my friends in a tea stall. Suddenly my phone rang. I picked up the phone and said”you can’t do it”. Actually I received the phone but at that time I was saying those words to my friend whom I was talking.
5. Loss-Of-Activation Error: It is one of the most common errors. We all have the habit of forgetting things. Without any reason we just forget what we want to do. More interesting is forgetting part of the act, remembering the rest, as in the story above where the goal was forgotten, but the rest of the action continued unimpaired.

I can assure that I happened with all of you. Similar kind of thing happened with me. I went to my university to talk with one of my teachers. I got up in the lift and went to the faculty floor. When I reached there, I forgot that what I am going to discuss with my teacher. I prepared my topic from home but I just forgot in there. And to remember it I simply came out from the faculty.
6. Mode Error: An example from Norman’s “The design of everyday things” is “I had just completed a long run from my university to my home in what I was convinced would be record time. It was dark when I got home, so I could not read the time on my stopwatch. As I walked up and down the street in front of my home, cooling off, I got more and more anxious to see how fast I had run. I then remembered that my watch had a built-in light, operated by the upper right-hand button. Elated, I depressed the button to illuminate the reading, only to read a time of zero seconds. I had forgotten that in stopwatch mode, the same button [that in the normal, time-reading mode would have turned on a light] cleared the time and reset the stopwatch."
Mode errors occur when devices have different modes of operation, and the action appropriate for one mode has different meanings in other modes. Mode errors are common with digital watches and computer systems especially text editors. Several accidents in commercial aviation can be attributed to mode errors, especially in the use of the automatic pilots which have a large number of complex modes.
Detecting Slip errors: Slips are easy to detect because there is clear discrepancy between goal and result. If there is feedback only then detection can be detected. Sometimes the result of the action may not be visual. So how can a misaction be detected? Even when a mismatch is noted, the person may not believe that the error occurred. Even when an error has been detected, it may not be clear what the error was.
"Alice" was driving a van and noticed that the rearview mirror on the passenger side was not adjusted properly. Alice meant to say to the passenger on the right, "Please adjust the mirror," but instead said "Please adjust the window." The passenger, "Sally," was confused and asked, "What should I do? What do you want?" Alice repeated the request: "Adjust the window for me." The situation continued through several frustrating cycles of conversation and attempts by the passenger to understand just what adjustments should be made to the window. The error-correction mechanism adopted by the driver was to repeat the erroneous sentence more and more loudly.
In this example, it was easy to detect that something was wrong but hard to discover what. Alice relieved the problem was that she couldn't be understood or heard. She was monitoring the wrong part of the action sequence—she had a problem of level.
Design lessons from the study of slips: There are two different kinds of design lessons; one for preventing slips before they occur and one for detecting and correcting them when they do occur. In general, the solutions follow directly from the preceding analyses. For example, mode errors are minimized by minimizing modes, or at least by making modes visible.
A good example can be the dresses of our country police, army. If they don’t have any dress to separate from us then everybody will react as a police or army person. And if that happen, we all know a chaos will occur. Their dress makes them different from us, So that they can protect us from evils.
In computer systems, it is common to prevent errors by requiring confirmation before a command will be executed, especially when the action will destroy a file. But the request is ill timed; it comes just after the person has initiated the action and is still fully content with the choice. The standard interaction goes something like this:
USER: Remove file "map-file"
COMPUTER: Are you certain you wish to remove the file "map-file"?
USER: Yes.
COMPUTER: Are you certain?
USER: Yes, of course.
COMPUTER: The file "map-file" has been removed.
USER: Oops, damn.
The user has requested deletion of the wrong file but the computer's request for confirmation is unlikely to catch the error; the user is confirming the action, not the file name. Thus asking for confirmation cannot catch all slips. It would be more appropriate to eliminate irreversible actions: in this example, the request to remove a file would be handled by the computer's moving the file to some temporary holding place. Then the user would have time for reconsideration and recovery.
Mistakes: Mistakes comes from our conscious deliberations. The same processes that make us creative and insightful by allowing us to see relationships between apparently unrelated things, that let us leap to correct conclusions on the basis of partial or even faulty evidence, also lead to error.

The Structure of Tasks: Everyday activities are conceptually simple. We should be able to do most things without having to think about what we're doing. The simplicity lies in the nature of the structure of the tasks.
Wide and Deep Structure: When we are playing a tricky game like chase or tic-tac-toe it needs a wide and deep thinking. Consider the game of chess, an activity that is neither everyday nor simple, at least, not for most of us. When it is my turn to play, I have a number of possible moves. For each of my moves, my opponent has
a number of possible responses. And for each of my opponent's responses, I have a number of possible counter responses. The sequences can be represented on a decision tree, a diagram that in this case takes the current board position as a starting point and shows each of my possible moves, each of the
Possible counter moves, each possible counter-counter move, each possible counter-counter-counter move, and so on, as deep as time and energy permit. In tic-tac-toe game three results is possible. Either I win or lose or the match end up in tie.

Shallow and Narrow structure: Shallow structure is like choosing only one thing from a list of options. Well, whenever I went to an ice-cream show I face this problem. In there, there is lot of flavors of ice-cream. But I only can choose one. In shallow width is only acceptable.
A narrow structure arises when there are only a small number of alternatives, perhaps one or two. In narrow depth is acceptable. A good example for narrow structure is a cook book recipe. In the recipe there is little decision with lot of steps.
Explaining Away Error: Explaining away errors is a common problem in commercial accidents. Most major accidents follow a series of breakdowns and errors, problem after problem, each making the next more likely. Seldom does a major accident occur without numerous failures: equipment malfunctions, unusual events, a series of apparently unrelated breakdowns and errors that culminate in major disaster; yet no single step has appeared to be serious. In many of these cases, the people involved noted the problem but explained it away, finding a logical explanation for the otherwise deviant observation.
SOCIAL PRESSURE AND MISTAKES: In our everyday life there are many mistakes that occur due to social pressure. But the main error remains in the design. Either way or that way the accident occurs due to the design.
May, 2013 in Bangladesh there was deadly accident took place. A nine floor building collapsed. Due to the collapse 1200+ people died. The day before of accident, there was damage in one of the pillar of that building. People did not want to come to the work due to the damage. But they were forced to come at work. As a result many innocent people died.
With the example we can say that there was error in the design that’s why there was damage in the pillar. There was also social pressure.
Turn a nuclear power plant off by mistake and you cost the company hundreds of thousands of dollars; you'll probably lose your job. Fail to turn it off when there is a real incident, and you might lose your life. If you refuse to fly a crowded airliner because the weather looks bad, the company loses lots of money and the passengers get very angry. Take off under those situations and most of the time it works out fine, which encourages risk taking. But every so often, there is a disaster.
Designing for Error: Error is often thought of as something to be avoided or something done by unskilled or unmotivated people. But everyone makes errors. Designers make the mistake of not taking error into account. It should not be possible for one person, with one simple error, to cause such widespread damage. Here is what designers should do:
Understand the causes of error and design to minimize those causes.
Make it possible to reverse actions—to "undo" them—or make it harder to do what cannot be reversed.
Make it easier to discover the errors that do occur, and make them easier to correct.
4. Change the attitude toward errors. Think of an object's user as attempting to do a task, getting there by imperfect approximations. Don't think of the user as making errors; think of the actions as
Approximations of what is desired.
HOW TO DEAL WITH ERROR—AND HOW NOT TO: Consider the error of locking your keys into your car. Some cars have made this error much less likely. You simply can't lock the doors except by using the key. So you're pretty much forced to have the keys with you. I call this kind of design a forcing function. (In the United States, cars are required to be designed so that if the door is opened while the keys are in the ignition, a warning sound comes on. In theory, if you walk away from your car, leaving the keys in the ignition, the buzzer will call you back. Yet the signal must be ignored as often as it must be attended to. It must be ignored when you open the door of your car while the engine is running so you can hand someone something. On these occasions it is annoying; you know the door is open. And sometimes you want to or need to leave the keys in the car. There goes the buzzer—it can't distinguish deliberate actions from erroneous ones.
FORCING FUNCTIONS: We can use forcing function to prevent incident to occur. Like, we can force a person not to take the step. So that he can avoid any kind of danger.
The history of seatbelts in vehicles provides a good example. Despite all the evidence that seatbelts are an effective means of saving lives, some people dislike them enough that they refuse to wear them, probably because the perceived risk is so much less than the actual, statistical risk. For a short period, the United States tried a forcing function on seatbelts: a special interlock was installed on each new car. If the driver's and passengers' belts were not fastened, the car would not start. This forcing function was so disliked that most drivers had their mechanics disconnect it. The law was quickly changed.
There are several examples to force person to do the thing. Sometimes it works, sometimes it does not. But scientist are still trying to keep people save from these kind of mistakes.
User-Centered Design
In Norman’s “The design of everyday things” he discussed much about the design that is very useful and friendly to the user. Well, I am just going to summarized what he wanted to tell us about user-centered design.
User centered design is a type of user interface design that things should be designed with the need and interests of the user in mind, making products that are easy to use and understand. In one word, to make product user friendly to user. For doing so it needs a lot of testing. After going through a long process a product may get known as a user friendly product.

To create a design, it should follow some guidelines:
The design must be easy to determine what actions are possible at any moment.
It must be visual, including the conceptual model of the system, the alternative actions and the results of the actions.
Make it easy to evaluate.
It must need to follow the natural mappings between intentions and required actions; between actions and the resulting effect.
First of all we should be able to figure out what to do and what is going on.
There are seven principles for transforming difficult tasks into simple ones:
Use both knowledge in the world and knowledge in the head.
Simplify the structure of tasks.
Make things visible: bridge the gulfs of Execution and Evaluation.
Get the mappings right.
Exploit the power of constraints, both natural and artificial.
Design for error.
When all else fails, standardize.
In a model there are three mental models which are design model, user’s model and the image of the system. These three model along together can make model very strong.
Well, while creating model we must keep one thing in our mind and that is to simplify the structure of the model. While structuring a model, we must keep the most important part not to take the control away from the user. We can simplify the structure by doing below steps:
Keep the tasks much the same, but provide mental aids.
Technology should be used to make visible. It will improve feedback and the ability to keep control.
It should be automated but need to keep the task much the same.
Change the nature of the tasks.
There are some advantages and disadvantages. The advantages are:
Products are efficient, effective and safe
Users develop a sense of ownership for the product
Products require less redesign and integrate into the environment more quickly.
Disadvantages:
It is more costly and takes more time.
May be difficult to translate some type of data into design.
The product may be too specific for more general use, thus not rapidly transferable to other clients.
At the end we should remember that tools not only control what we do, but how we do it and the way we view ourselves, society and the world. Our design can change a task, a society and the world.
The world of future can be looked forward to with pleasure, contemplation and dread. We must fight for and reward good design and do the opposite for bad design.
2 notes
·
View notes
Text
Creative Thinking- Why it is necessary
Why we need to use Creative Thinking
Before talking about why we need to use creative thinking, let’s get known with the word CREATIVITY.
Creativity: Creativity is a word which refers to something new is created which has some kind of subjective value. It is generally perceived to be associated with intelligence and cognition. Creativity involves couple of things like psychology, cognitive science, education, philosophy, technology etc.
Theories of creativity have focused on a variety of aspects. It is based on four Ps factors. They are:
Process
Product
Person
Place
A phrase of Michael Mumford about creativity is “Over the decade, however, we seem to have reached a general agreement that creativity involves the production of novel, useful products.”
Well, now let’s talk about why we need to use creative thinking.
Creativity is a hard thing to found. Everyone has his creativity. We live in a world with lots of creations. It is created by us. So, these things have come from our creative thinking. Plane wouldn’t have invented if someone have not thought about it.
Creative thinking is to make the product friendly to us. I’m giving some point points why we need to use creative thinking:
User friendly
Safer
Low cost
Unique
Time saving
User Friendly: If a product is not friendly to user, he/she wouldn’t use it. Here comes the creativity. Creativity can make a product user friendly. Like the mouse of computer. Creators thought and thought how to make the mouse user friendly. Finally they came with suitable design. In the 2nd world war many pilots died because the fire jets were not user friendly to the pilots. Below there are two pictures of white board. In one picture the white board is placed in ground. To write in it I have to bend long down to write. In the other picture the white board is hanging in the wall. It is easier for me to write in it.


Safer: We the people always want to use the product which is most safe. To make a product much safer we need to put our creativity in the product. When a plane was build, it needed a lot of thinking to make it safer for journey.
Low cost: Price has big part in a product sell. Many people will not be able to buy the product due to its cost although he needed the product most. So, if we think little creatively then may be the cost of the product become less.
Unique: Creative thinking can make a product unique. We always like the unique product. Below it’s a design for Book Self. The design is like the word “BOOK”.

Time Saving: Time is a big part in our life. We always want to save our time. If we compare the computers of first generation and recent generation we can see how recent computer is saving our time. It is because of our creative thinking.
Creative thinking is necessary to create anything. But every thinking might not be perfect or for use. To get assurance of that thinking we can use the six thinking hats method.
Six Thinking Method:
Early in the 1980s Dr. de Bono invented the Six Thinking Hats method. The method is a framework for thinking and can incorporate lateral thinking. Organizations such as Prudential Insurance, IBM, Federal Express, British Airways, Polaroid, PepsiCo, DuPont, and Nippon Telephone and Telegraph, possibly the world's largest company, use Six Thinking Hats.
The six hats represent six modes of thinking and are directions to think rather than labels for thinking. That is, the hats are used proactively rather than reactively.
Six colors of hats for six types of thinking. Each hat identifies a type of thinking. Hats are directions of thinking. Hats help a group use parallel thinking. You can “put on” and “take off” a hat.
Why we use six hats?
Problem solving
Strategic planning
Running meetings and
Much more
Now let’s talk about the colors. White means neutral, objective. Red means emotional, angry. Black means serious, somber. Yellow means sunny, positive. Green means growth, fertility and Blue means cool, sky above.
Six hats:
White: Objective facts & figures
Red: Emotions & feeling
Black: Cautious & careful
Yellow: Hope, positive and speculative
Green: Creativity and ideas
Blue: Control and organization of thinking.
Benefits of six thinking hats:
Provides a common language
Experience & intelligence of each person
Use more of our brains
Save time
Focus on one thing at a time
Create, evaluate and implement action plans.
1 note
·
View note
Text
History of Operating Systems
History of Operating Systems
Operating Systems: Operating systems are a collection of layers of software’s. Operating system sits in the middle of hardware and higher functions like applications. They help the applications to be able to use for the hardware. Many modern operating systems are package of some higher level functions such as shells also known as graphical user interfaces (GUI), storage compression, firewalls, internet access, web browsers etc.
The first computer did not have any operating system. Operating system makes applications directly connected with hardware. Recently computers are more advanced. Computer manufactures sought to make them much more relevant and easier to program. They came with some simple support code elements called runtime libraries which were used to link a users program to the machine and assist with operations like input and output.
History of Operating Systems: Operating systems has huge history. History of operating systems starts from the moment when the first computer was invented.
First Generation of Operating Systems: There were no operating systems, no programming languages or compilers, no windows, no mouse for electronic digital computers. In 1940’s machines of that time were so primitive that programs were often entered one bit at time on rows of mechanical switches. Assembly language was unknown. The name of Operating Systems was unheard.
Second Generation Operating Systems: From the 1950’s second generation of operating systems era begun. There was some improvement of using the computer easily. Punch card was introduced. The General Motors Research Laboratories implemented the first operating systems in early 1950’s for their IBM 701. The system can only run one program at a time. It was called single-stream batch processing systems. The reason it was called single-stream batch because programs and data were submitted in groups or batches. Results were shown on magnetic strips.

Third Generation Operating Systems: In third generation of Operating systems, main concentration points were in multiprogramming, spooling and time sharing. From the early generation the systems of 1960’s were also batch processing systems. But they were able to take better advantage of the computer’s resources by running several jobs at once. That’s why operating systems designers developed the concept of multiprogramming. The jobs were kept in main memory. The processor switched jobs to jobs and finished them.
Another key development was the concept of time sharing. The idea of sharing the resources of expensive computers amongst multiple computer users interacting in real time with the system. Time sharing allowed all of the users to have the illusion of having exclusive access to the machine. The Multics time sharing system was the most famous of a number of new operating systems developed to take the advantage of the concept.
Another major concept was the technique called spooling. Spooling means simultaneous peripheral operations on line. In spooling, a high-speed device like a disk interposed between a running program and a low-speed device involved with the program in input/output. Programs were completing faster and others programs can be initiated sooner when the printer becomes available. Spooling technique is much like thread being spun to a spool so that it may be later be unwound as needed.
UNIX was the great invention of Third generation. UNIX made the things easier. It was lately more developed in fourth generation. UNIX has three sources. Open source, mixed source and Closed source. In open source Operating Systems it contained versions of Linux, Minix etc. BSD was one of the mixed source operating systems. And in closed source operating systems there were operating systems like MAC OS X, AIX etc.
Fourth Generation of Operating Systems: In fourth generation starting from 1980’s still ongoing based on below concepts:
· Microprocessor
· PCs spread
· User Friendly software
· Microsoft DOS Vs UNIX
· Windows 95 (the first independent windows version)
· Network Operating Systems
· Shared Systems
Introduction of the LSI circuits, ships operating systems entered in the system in the personal computer. The technology named microprocessor evolved to the point that it became possible to build desktop computers as powerful as mainframes of 1970’s. At that time two operating systems dominated the personal computer. MS-DOS created by Microsoft for the IBM PC and its successors and UNIX, which is dominant on the large personal computers using the Motorola 6899 CPU family.
1 note
·
View note
Photo

Mind Map on History of Operating Systems
2 notes
·
View notes
Text
Game Of Life Xbox 360- References
http://ezinearticles.com/?History-of-the-Xbox-360&id=4169217
https://en.wikipedia.org/wiki/Xbox_360
http://www.xbox.com/en-US/kinect
http://en.wikipedia.org/wiki/Xbox_360_Controller
http://www.gamestop.com/xbox-360/consoles/xbox-360-system-with-wired-controller-gamestop-refurbished/43323
http://xathrya.web.id/blog/2013/02/11/architecture-of-xbox-360/
http://www.consoledatabase.com/consoleinfo/microsoftxbox360/#.UWSyB3xwLts
http://www.cdrinfo.com/sections/news/Details.aspx?NewsId=14842
http://xathrya.web.id/blog/2013/02/11/architecture-of-xbox-360/
http://support.xbox.com/en-US/xbox-360/accessories/universal-media-remote
http://en.wikipedia.org/wiki/Xbox_360_Wireless_Racing_Wheel
http://www.destructoid.com/xbox-360-wireless-speed-wheel-213215.phtml
http://www.engadget.com/2010/11/04/kinect-for-xbox-360-review/
http://en.wikipedia.org/wiki/Game_controller
http://en.wikipedia.org/wiki/Xbox_360_HD_DVD_Player
http://en.wikipedia.org/wiki/Xbox_360_Wireless_Headset
http://searchhealthit.techtarget.com/definition/Kinect
http://www.nbcnews.com/id/37692289/ns/technology_and_science-games/t/microsoft-unveils-redesigned-xbox/
http://venturebeat.com/2013/04/08/comparing-the-xbox-360-and-playstation-3s-tech-support-services/
http://www.techquark.com/2011/12/xbox-360-features-review-more.html
www.cis.upenn.edu/~milom/cis501-Fall08/papers/xbox-system.pdf
home.deib.polimi.it/silvano/.../XBOX%20360%20Architecture.pdf
1 note
·
View note
Text
Game Of Life Xbox 360- Future Of Xbox 360:
6. Future Of Xbox 360:
The new Microsoft’s Xbox console is Xbox 720. Gossips are surrounding this gaming machine has been churning around inside the rumor mill for a good few years now. The Xbox 720 may be launched in Christmas 2013. If Xbox 720 wants to last long as Xbox 360 did, it’s going to need some reliable and powerful components. However, there are strong rumors that Xbox 720 will come with reduced Graphics potency. The Xbox 720’s CPU will be an AMD Jaguar-based CPU clocked at 1.6 GHz possibly very similar to that of the PS4.
It is thought that Xbox 720 will have just 12 processing Clusters which could well mean that Microsoft is using a version of the AMD Radeon 7790 Chip. That means Xbox 720 will use less power, cheaper bits basically.
We may see the second version of Kinect. It will sit at the heart of the Xbox 720 experience and reckon it’s a no brainer. Well, you can be sure that the trusty control pad will remain a core component for hardcore gaming.
There is lot of questions and rumors going around. Microsoft yet to say anything about their next Xbox. We all are hoping that it might be released at the end of 2013.

0 notes
Text
Game Of Life Xbox 360- Popularity Of Xbox 360:
6. Popularity Of Xbox 360:
I am giving you a list of popular games played last year in Xbox 360.
List:
1. Call of Duty: Black Ops 2. Call of Duty: Modern Warfare 3 3. Call of Duty: Modern Warfare 2 4. Halo: Reach 5. Battlefield 3 6. The Elder Scrolls V: Skyrim 7. Gears of War 3 8. FIFA 12 9. FIFA Soccer 11 10. Madden NFL 12 11. GTA IV 12. NBA 2K11 13. Battlefield: Bad Company 2 14. Call of Duty 4: Modern Warfare 15. Battlefield 3 Beta 16. Halo 3 17. Gears of War 2 18. Forza Motorsport 4 19. Red Dead Redemption 20. Call of Duty: World at War
Call of Duty: Black Ops is the most popular game in last year. This year there has been a slight change in the rank list. FIFA 13 is the most popular and most selling game in 2013. Grand Theft Auto 4 and Call of Duty: World at War came out in 2008. But they are still popular in recent times. Halo 3 is still popular after its 4 year.



0 notes
Text
Game Of Life Xbox 360- 6. Xbox 360 Features and Reviews:
6. Xbox 360 Features and Reviews:
· Introduction of Kinect and Xbox Live Microsoft’s online service which is very superior to PSN Home.
· Microsoft added new Metro style Dashboard to Xbox. It will change your TV viewing experience.
· Xbox 360 has a great DVD player which can be easily hooked up with your Home Theater System.
· Xbox 360 is very slim and in uses 135 W powers.
· Introduction of Xbox live.
· With the Xbox live, you can play Kinect and control games with friends whenever they are online.
· The Xbox 360 has great online features. It has the ability for the game publisher to provide more content like additional game level, equipments etc.
· You can compare yourself with your friends with the help of public scoreboard on both your console and web.
· You can easily download games, trailers, pictures from the online Xbox 360 market place.
· You can also update your console by plugging into the internet.
· In Kinect you can socialize using your virtual substitutes named avatars.
· The avatar will follow your gestures, eye movements etc.
Comparison between Xbox 360 and Play station 3:
· PS3 has got the Blu-ray support which Xbox 360 doesn’t have.
· PS3 takes approximately 100w where Xbox 360 takes 135W.
· PS3 got a very high video quality with 1080p video. Xbox 360 has no match with this.
· PS3 has no support for Wi-Fi. But Xbox 360 has a built in Wi-Fi system.


· PSN play station home network is not very impressive. In the other hand Xbox Live gives much better experience especially the avatar Kinect is excellent.
· PS3 is equipped with much better graphics capability. Xbox 360 also has a better graphics but not equal to PS3.
· For motion controller PS3 has to move. But in Xbox 360 it has Kinect which is much better technology.
Well, from the above comparison we cannot clearly say which is much better. But if we look at the technology Xbox 360 will be ahead. With their latest technologies coming to the market it gets a upper hand. For the home sick gamers Xbox 360 is awesome. They get the support of online gaming which is indeed a need for the gamers.
0 notes