This white paper from John Wiley & Sons explains Lmbench, which is a powerful and extensible suite of micro-benchmarks that measure a variety of important aspects of system performance. It has a powerful timing harness that manages most of the ""Housekeeping"" chores associated with benchmarking, making it easy to create new benchmarks that analyze systems or components of specific interest to the user.
This paper presents experience with connecting it to Java in several ways. The first is by providing a common XML-based class for the development of programmer controlled GUIs, second provides evidence that C# can be linked to Java at the source code level, albeit through C++ wrappers and third is a means for retaining the useful applet feature of Java in a server-side architecture of .NET?s web services. This paper concludes that there are many common shared technologies that bring Java and C#
In response to a lack of existing approaches specifically designed for testing database applications, this paper proposes a framework, design of a tool set and implementation to partially automate the process. The focus is on several aspects: populating a database with meaningful data that satisfy constraints, incorporating boundary values extracted from semantic constraints in the database application and database schema, checking the state after an operation has occurred, and checking output.
iMobile acts as a message gateway that allows mobile devices to relay messages to each other through various protocols on different access networks. It allows mobile devices to access internet services, corporate databases and to control various network devices. An info-let provides abstract view of information space. An app-let implements service or application logic by processing information from various info-lets. A dev-let receives and sends messages through any particular protocols for
Organizations with a sound antivirus infrastructure can take some consolation in the fact that their antivirus software will strip the malicious code from most inbound spam messages. Mail servers that are configured to strip executable attachments from incoming e-mail messages are contributing to the defense. Worse yet, antivirus programs have been ""Looking the other way"" when it comes to spyware. Spyware isnt stopped by most firewalls, mail servers, or antivirus programs, and often the
For various reasons, many institutions of higher education have lost touch with the research and best practices associated with recruiting and retention that are widely reported in HR journals as well as IT trade magazines and business publications. Although some recruiting and retention tactics such as stock options may be unique to private enterprise, the strategies and principles explored in this chapter are equally effective in an institution of higher education.
Managing a project to create a new piece of software that can make or break entire organization is a tough decision for some project managers. The key to successful software project management is preparation. After one do the prep work for the project, one must execute their plan, take control of their project, and ultimately bring it to its successful conclusion. Software project management is a type of project management that focuses specifically on creating or updating software. Project
All other conditions being equal, the end-to-end throughput of a TCP connection depends on the packet loss rate at the IP level. This is an issue when IP runs on a wireless link, where the bit error rate is variable and typically much higher than it is on fixed links. Especially on physical links where the bandwidth delay product is high, TCP performance is significantly impaired by apparently low values of the bit error rate. Generally speaking, on a wireless link bandwidth can be traded for