Tuesday, December 21, 2010

DropDownList Filling

DropDownList Filling



< asp:DropDownList ID="EmployeeDropDownList" runat="server" Height="16px" Width="155px"

OnSelectedIndexChanged="EmployeeDropDownList_SelectedIndexChanged" AutoPostBack="true"
AppendDataBoundItems="true">

< asp : ListItem Value= " - 1 " > Please Select < / asp : ListItem >
< / asp : DropDownList>




protected void Page_Load(object sender, EventArgs e)
{
if (!IsPostBack)
{
BindCustomerInfo();
}
}

private void BindCustomerInfo()
{
sqlConnection = new SqlConnection(@"Data Source=DEV2\SQLEXPRESS;Integrated Security=True; Initial Catalog=Linq ");
sqlCommand.CommandText = "Select * from Employee";
sqlCommand.Connection = sqlConnection;

sqlConnection.Open();
EmployeeDropDownList.DataSource = sqlCommand.ExecuteReader();
EmployeeDropDownList.DataTextField = "CompanyName";
EmployeeDropDownList.DataValueField = "CustomerID";
EmployeeDropDownList.DataBind();
}

DropDownListANDListBoxFilling Using LINQandSQL

protected void Page_Load(object sender, EventArgs e)
{
if (!Page.IsPostBack)
{
ShowProduct();
}
}


private void ShowProduct()
{
DataClassesDataContext db = new DataClassesDataContext();
FillListBox(db);
}


private void FillListBox(DataClassesDataContext db)
{

var myBindData = from c in db.Linqs select new { CustomerId=c.CustomerID, Country=c.Country};

//Bind the ListBox
ListBox1.DataSource = myBindData;
ListBox1.DataTextField = "Country";
ListBox1.DataValueField = "CustomerID";
ListBox1.DataBind();

//Bind the DropDownList
DropDownList1.DataSource = myBindData;
DropDownList1.DataTextField = "Country";
DropDownList1.DataValueField = "CustomerID";
DropDownList1.DataBind();
}

Sunday, December 19, 2010

Drop Down List

The process of attaching the “dropdownlist” control to a source of data is nothing but “data binding.” This process of “binding” can occur in several ways including databases, arrays, and so on.




Binding to a Simple Array
Binding to an ArrayList
Binding to a hashtable
Binding to a data table
Binding to a data set
Binding to a data view
Binding to a set of objects
Binding manually

Saturday, December 18, 2010

postback

Definition of "postback?"  ?


Basically all the information of a webpage is sent back to the server for reprocessing.

Source(s):
http://en.wikipedia.org/wiki/Postback



When you buy a plane ticket on the internet, you fill in your name, credit card number, etc and choose a flight.

When you click 'Submit' button, the information you typed and choices you made are "posted back" to the mothership - i.e. the web server - so that they can reserve your seat and take your money - hence the term "postback".

How To Ask Questions The Smart Way

Use meaningful, specific subject headers

On mailing lists, newsgroups or Web forums, the subject header is your golden opportunity to attract qualified experts' attention in around 50 characters or fewer. Don't waste it on babble like “Please help me” (let alone “PLEASE HELP ME!!!!”; messages with subjects like that get discarded by reflex). Don't try to impress us with the depth of your anguish; use the space for a super-concise problem description instead.

One good convention for subject headers, used by many tech support organizations, is “object - deviation”. The “object” part specifies what thing or group of things is having a problem, and the “deviation” part describes the deviation from expected behavior.

Stupid:
HELP! Video doesn't work properly on my laptop!

Smart:
X.org 6.8.1 misshapen mouse cursor, Fooware MV1005 vid. chipset

Smarter:
X.org 6.8.1 mouse cursor on Fooware MV1005 vid. chipset - is misshapen

Write in clear, grammatical, correctly-spelled language
If you are writing in English but it is a second language for you, it is good form to alert potential respondants to potential language difficulties and options for getting around them. Examples:

English is not my native language; please excuse typing errors.

If you speak $LANGUAGE, please email/PM me; I may need assistance translating my question.

I am familiar with the technical terms, but some slang expressions and idioms are difficult for me.

I've posted my question in $LANGUAGE and English. I'll be glad to translate responses, if you only use one or the other.

Describe the goal, not the step

Stupid:
How do I get the color-picker on the FooDraw program to take a hexadecimal RGB value?

Smart: 
I'm trying to replace the color table on an image with values of my choosing. Right now the only way I can see to do this is by editing each table slot, but I can't get FooDraw's color picker to take a hexadecimal RGB value.

Questions Not To Ask

Q:
Where can I find program or resource X?

A:
The same place I'd find it, fool — at the other end of a web search. Ghod, doesn't everybody know how to use Google yet?

Q:
How can I use X to do Y?

A:
If what you want is to do Y, you should ask that question without pre-supposing the use of a method that may not be appropriate. Questions of this form often indicate a person who is not merely ignorant about X, but confused about what problem Y they are solving and too fixated on the details of their particular situation. It is generally best to ignore such people until they define their problem better.

Q:
How can I configure my shell prompt?

A:
If you're smart enough to ask this question, you're smart enough to RTFM and find out yourself.

Q:
Can I convert an AcmeCorp document into a TeX file using the Bass-o-matic file converter?

A:
Try it and see. If you did that, you'd (a) learn the answer, and (b) stop wasting my time.

Q:
My {program, configuration, SQL statement} doesn't work

A:
This is not a question, and I'm not interested in playing Twenty Questions to pry your actual question out of you — I have better things to do. On seeing something like this, my reaction is normally of one of the following:

do you have anything else to add to that?

oh, that's too bad, I hope you get it fixed.

and this has exactly what to do with me?

Q:
I'm having problems with my Windows machine. Can you help?

A:
Yes. Throw out that Microsoft trash and install an open-source operating system like Linux or BSD.

Note: you can ask questions related to Windows machines if they are about a program that does have an official Windows build, or interacts with Windows machines (i.e., Samba). Just don't be surprised by the reply that the problem is with Windows and not the program, because Windows is so broken in general that this is very often the case.

Q:
My program doesn't work. I think system facility X is broken.

A:
While it is possible that you are the first person to notice an obvious deficiency in system calls and libraries heavily used by hundreds or thousands of people, it is rather more likely that you are utterly clueless. Extraordinary claims require extraordinary evidence; when you make a claim like this one, you must back it up with clear and exhaustive documentation of the failure case.

Q:
I'm having problems installing Linux or X. Can you help?

A:
No. I'd need hands-on access to your machine to troubleshoot this. Go ask your local Linux user group for hands-on help. (You can find a list of user groups here.)

Note: questions about installing Linux may be appropriate if you're on a forum or mailing list about a particular distribution, and the problem is with that distro; or on local user groups forums. In this case, be sure to describe the exact details of the failure. But do careful searching first, with "linux" and all suspicious pieces of hardware.

Q:
How can I crack root/steal channel-ops privileges/read someone's e-mail?

A:
You're a lowlife for wanting to do such things and a moron for asking a hacker to help you.

Good and Bad Questions

Finally, I'm going to illustrate how to ask questions in a smart way by example; pairs of questions about the same problem, one asked in a stupid way and one in a smart way.
Stupid: Where can I find out stuff about the Foonly Flurbamatic?

This question just begs for "STFW" as a reply.
Smart: I used Google to try to find “Foonly Flurbamatic 2600” on the Web, but I got no useful hits. Can I get a pointer to programming information on this device?

This one has already STFWed, and sounds like he might have a real problem.
Stupid: I can't get the code from project foo to compile. Why is it broken?

The querent assumes that somebody else screwed up. Arrogant git...
Smart: The code from project foo doesn't compile under Nulix version 6.2. I've read the FAQ, but it doesn't have anything in it about Nulix-related problems. Here's a transcript of my compilation attempt; is it something I did?

The querent has specified the environment, read the FAQ, is showing the error, and is not assuming his problems are someone else's fault. This one might be worth some attention.
Stupid: I'm having problems with my motherboard. Can anybody help?

J. Random Hacker's response to this is likely to be “Right. Do you need burping and diapering, too?” followed by a punch of the delete key.
Smart: I tried X, Y, and Z on the S2464 motherboard. When that didn't work, I tried A, B, and C. Note the curious symptom when I tried C. Obviously the florbish is grommicking, but the results aren't what one might expect. What are the usual causes of grommicking on Athlon MP motherboards? Anybody got ideas for more tests I can run to pin down the problem?

This person, on the other hand, seems worthy of an answer. He/she has exhibited problem-solving intelligence rather than passively waiting for an answer to drop from on high.

In the last question, notice the subtle but important difference between demanding “Give me an answer” and “Please help me figure out what additional diagnostics I can run to achieve enlightenment.”

.NET Training library

.NET Training library Details

· .NET 3.5
· Agile Team Practices
· ASP.NET 3.5
· ASP.NET AJAX
· ASP.NET MVC
· BizTalk 2006
· BizTalk Server 2006 R2
· BizTalk Server 2009
· iPhone ASP.NET
· LINQ
· Managed Services Engine
· Silverlight 3
· SharePoint Services
· SQL Server 2008
· VSTS
· WCF
· Windows Server AppFabric, formerly "Dublin"
· Windows Workflow
· WPF

Wednesday, December 8, 2010

My Rifle






My Rifle 

Picture1



Picture




SouRov

poem 1

poem section 


1. shopno gulo sotti hoye jeno mone te uki dai...
shishir vega ai monta amer lukochuri khale ai nilimai....
vabe mon okaron sharakhon.........kobe tumi hobe je apon....
dui hate mukhti dhore amar........
bolbe ami je aj theke priya shudhui tomer....


Ajax Control Tool Kit

Ajax Control Tool Kit

Note:

Toolkit version 3.5.20229  is only for users who are building on top of .NET Framework 3.5 using Visual Studio 2008. 


If you are using .NET Framework 2.0 and Visual Studio 2005 then you should use Toolkit version 1.0.20229.

Monday, December 6, 2010

Command prompts for Windows

Control Panel


  • CONTROL: opens the control panel window
  • CONTROL ADMINTOOLS: opens the administrative tools
  • CONTROL KEYBOARD: opens keyboard properties
  • CONTROL COLOUR: opens display properties.Appearance tab
  • CONTROL FOLDERS: opens folder options
  • CONTROL FONTS: opens font policy management
  • CONTROL INTERNATIONAL or INTL.CPL: opens Regional and Language option
  • CONTROL MOUSE or MAIN.CPL: opens mouse properties
  • CONTROL USERPASSWORDS: opens User Accounts editor
  • CONTROL USERPASSWORDS2 or NETPLWIZ: User account access restrictions
  • CONTROL PRINTERS: opens faxes and printers available
  • APPWIZ.CPL: opens Add or Remove programs utility tool
  • OPTIONALFEATURES: opens Add or Remove Windows component utility
  • DESK.CPL: opens display properties. Themes tab
  • HDWWIZ.CPL: opens add hardware wizard
  • IRPROPS.CPL: infrared utility tool
  • JOY.CP: opens game controllers settings
  • MMSYS.CPL: opens Sound and Audio device Properties. Volume tab
  • SYSDM.CPL: opens System properties
  • TELEPHON.CPL: Opens phone and Modem options
  • TIMEDATE.CPL: Date and Time properties
  • WSCUI.CPL: opens Windows Security Center
  • ACCESS.CPL: opens Accessibility Options
  • WUAUCPL.CPL: opens Automatic Updates
  • POWERCFG.CPL: opens Power Options Properties
  • AZMAN.MSC: opens authorisation management utility tool
  • CERTMGR.MSC: opens certificate management tool
  • COMPMGMT.MSC: opens the Computer management tool
  • COMEXP.MSC or DCOMCNFG: opens the Computer Services management tool
  • DEVMGMT.MSC: opens Device Manager
  • EVENTVWR or EVENTVWR.MSC: opens Event Viewer
  • FSMGMT.MSC: opens Shared Folders
  • NAPCLCFG.MSC: NAP Client configuration utility tool
  • SERVICES.MSC: opens Service manager
  • TASKSCHD.MSC or CONTROL SCHEDTASKS: opens Schedule Tasks manager
  • GPEDIT.MSC: opens Group Policy utility tool
  • LUSRMGR.MSC: opens Local Users and Groups
  • SECPOL.MSC: opens local security settings
  • CIADV.MSC: opens indexing service
  • NTMSMGR.MSC: removable storage manager
  • NTMSOPRQ.MSC: removable storage operator requests
  • WMIMGMT.MSC: opens (WMI) Window Management Instrumentation
  • PERFMON or PERFMON.MSC: opens the Performance monitor
  • MMC: opens empty Console
  • MDSCHED: opens memory diagnostics tools
  • DXDIAG: opens DirectX diagnostics tools
  • ODBCAD32: opens ODBC Data source Administrator
  • REGEDIT or REGEDT32: opens Registry Editor
  • DRWTSN32: opens Dr. Watson
  • VERIFIER: opens Driver Verifier Manager
  • CLICONFG: opens SQL Server Client Network Utility
  • UTILMAN: opens Utility Manager
  • COLORCPL: opens color management
  • CREDWIZ: back up and recovery tool for user passwords
  • MOBSYNC: opens Synchronization center
  • MSCONFIG: opens System Configuration Utility
  • SYSEDIT: opens System Configuration Editor (careful while using this command)
  • SYSKEY: Windows Account Database Security management (careful while using this command)


Windows utility and applications


  • EPLORER: Opens windows Explorer
  • IEXPLORER: Opens Internet explorer
  • WAB: opens Contacts
  • CHARMAP: opens Character Map
  • WRITE: opens WordPad
  • NOTEPAD: opens Notepad
  • CALC: opens Calculator
  • CLIPBRD: opens Clipbook Viewer
  • WINCHAT: opens Microsoft Chat Interface
  • SOUNDRECORDER: opens sound recording tool
  • DVDPLAY: run CD or DVD
  • WMPLAYER: opens Windows Media Player
  • MOVIEMK: Opens untitled Windows Movie Maker
  • OSK: opens on-screen Keyboard
  • MAGNIFY: opens Magnifier
  • WINCAL: opens Calendar
  • DIALER: opens phone Dialer
  • EUDCEDIT: opens Private Character Editor
  • NDVOL: opens the mixer volume
  • RSTRUI : opens Tool System Restore (For Vista only)
  • %WINDIR%\SYSTEM32\RESTORE\rstrui.exe: opens Tool System Restore (for XP only).
  • MSINFO32: Opens the System Information
  • MRT : launches the utility removal of malware.
  • Taskmgr : Opens the Windows Task Manager
  • CMD: opens a command prompt
  • MIGWIZ: Opens the tool for transferring files and settings from Windows (Vista only)
  • Migwiz.exe: Opens the tool for transferring files and settings from Windows (for XP only)
  • SIDEBAR: Open the Windows (Vista only)
  • Sigverif : Opens the tool for verification of signatures of files
  • Winver : Opens the window for your Windows version
  • FSQUIRT: Bluetooth Transfer Wizard
  • IExpress opens the wizard for creating self-extracting archives. Tutorial HERE
  • MBLCTR: opens the mobility center (Windows Vista only)
  • MSRA : Opens the Windows Remote Assistance
  • Mstsc : opens the tool connection Remote Desktop
  • MSDT: opens the diagnostic tools and support Microsoft
  • WERCON: opens the reporting tool and solutions to problems (for Vista only)
  • WINDOWSANYTIMEUPGRADE: Enables the upgrade of Windows Vista
  • WINWORD : opens Word (if installed)
  • PRINTBRMUI : Opens migration wizard printer (Vista only)

Disk management


  • DISKMGMT.MSC: opens disk management utility
  • CLEANMGR: opens disk drive clean up utility
  • DFRG.MSC: opens disk defragmenter
  • CHKDSK: complete analysis of disk partition
  • DISKPART: disk partitioning tool


Connection management


  • IPCONFIG: list the configuration of IP addresses on your PC (for more information type IPCONFIG/? in the CMD menu)
  • INETCPL.CPL: opens internet properties
  • FIREWALL.CPL: opens windows firewall
  • NETSETUP.CPL: opens network setup wizard


Miscellaneous commands


  • JAVAWS: View the cover of JAVA software (if installed)
  • AC3FILTER.CPL: Opens the properties AC3 Filter (if installed)
  • FIREFOX: Mozilla launches Firefox (if installed)
  • NETPROJ: allow or not connecting to a network projector (For Vista only)
  • LOGOFF: closes the current session
  • SHUTDOWN: shut down Windows
  • SHUTDOWN-A: to interrupt Windows shutdown
  • %WINDIR% or %SYSTEMROOT%: opens the Windows installation
  • %PROGRAMFILES%: Opens the folder where you installed other programs (Program Files)
  • %USERPROFILE%: opens the profile of the user currently logged
  • %HOMEDRIVE%: opens the browser on the partition or the operating system is installed
  • %HOMEPATH%: opens the currently logged user C: \ Documents and Settings \ [username]
  • %TEMP%: opens the temporary folder
  • VSP1CLN: deletes the cache for installation of the service pack 1 for Vista
  • System File Checker (Requires Windows CD if the cache is not available):
    • SFC / scannow: immediately scans all system files and repairs damaged files
    • SFC / VERIFYONLY: scans only those files system
    • SFC / Scanfil = "name and file path": scans the specified file, and repaired if damaged
    • SFC / VERIFYFILE = "name and file path": Scans only the file specified
    • SFC / scanonce: scans the system files on the next restart
    • SFC / REVERT: return the initial configuration (For more information, type SFC /? In the command prompt CMD.

Wednesday, December 1, 2010

My Profile



Md. Siddiq Bin Nur

Telephone
Office : 01558 781068
Cell : 01727 250807
Cell : 01670 010515
Residence : 01713 143326


[E * m * a * i * l]
sbn.sourov [@] [g ] [.] [c o m]


Research Interest
Software Engineering, Computer Networks, Bioinformatics, Robotics, Data Mining, Cluster Computing, Wireless LAN

Academic Background
B.Sc in Computer Science & Engineering, Ahsanullah University Of Science & Technolog

Selected Publications
WiMAX, Other publicatons are Coming ...

http://siddiqbinnur.blogspot.com/2010/12/my-profile.html

Wednesday, November 24, 2010

LINQ to SQL : Inserting Data to Database using


<>

   Company ID < / td>

    < id = "  TextBoxID " runat = " s e r v e r ">

  < /tr>



protected void Button1_Click(object sender, EventArgs e)

{

   SaveCustomerInfo(); 

}




private void SaveCustomerInfo()

{

   using (NorthwindDataContext context = new NorthwindDataContext())

   {

    //Create a new instance of the Customer object

    Customer cust = new Customer();

    //Add new values to each fields

    cust.CustomerID = TextBoxID.Text;

    cust.CompanyName = TextBoxCompanyName.Text;

    cust.ContactName = TextBoxContactName.Text;

    cust.ContactTitle = TextBoxContactTitle.Text;

    cust.Address = TextBoxAddress.Text;

    cust.City = TextBoxCity.Text;

    cust.Region = TextBoxRegion.Text;

    cust.PostalCode = TextBoxPostalCode.Text;

    cust.Country = TextBoxCountry.Text;



    //Insert the new Customer object

    context.Customers.InsertOnSubmit(cust);

    //Sumbit changes to the database

    context.SubmitChanges();



    //Display Message for successful operation

    LiteralMessage.Text = "

Information Successfully saved!

";

    }


   }

Computer engineering

Computer System engineering, also called computer engineering, is a discipline that integrates several fields of electrical engineering and computer science required to develop computer systems. Computer System engineers usually have training in electronic engineering, software design and hardware-software integration instead of only software engineering or electronic engineering. Computer System engineers are involved in many hardware and software aspects of computing, from the design of individual microprocessors, personal computers, and supercomputers, to circuit design. This field of engineering not only focuses on how computer systems themselves work, but also how they integrate into the larger picture.


In many institutions, computer engineering students are allowed to choose areas of in-depth study in their junior and senior year, because the full breadth of knowledge used in the design and application of computers is beyond the scope of an undergraduate degree. The joint IEEE/ACM Curriculum Guidelines for Undergraduate Degree Programs in Computer Engineering defines the core knowledge areas of computer engineering as the following:



1. Digital and Logic Design (Using Verilog or VHDL)
2. Algorithms and Compiler Construction
3. Computer architecture and organization
4. Industrial Instrumentation
5. Industrial automation (Using PLCs,PLDs,and HMI)
6. Robotics
7. Artificial intelligence
8. Circuit analysis
9. Signal and systems
10. Database systems (Using MS Access, SQL and Oracle)
11. Digital (Computer) electronics
12. Digital signal processing (Using Matlab)
13. Electronics
14. Embedded systems (Using Microcontrollers,FPGA,PLDs and ARMs)
15. Human-computer interaction or Human Machine Interface(HMI)
16. Interactive Systems engineering
17. Operating systems (Using LINUX,SOLARIS,Mac OS and RTOs)
18. Programming fundamentals
19. Social and professional issues
20. Software engineering (Using UML)
21. Computer security
22. VLSI design and fabrication
23. Computer networking (Using Omnet,Opnet,RouterSim and Packet Tracer)
24. Wireless Communication (Using Zigbee,Bluetooth,WiFi and WiMAX)
25. Fault diagnostic and tolerant systems
26. Parallel and distributed computing
27. Control engineering (Digital and Analog)
28. Microprocessors interfacing and programming
29. Microwave Engineering
30. Electric and Electronic Machines
31. Power Electronics
32. Process Control and Instrumentation
33. Programming Languages (Using C)#,VB.NET,JAVA)
34. Computer Graphics (Using 3DS MAX,MAYA)
35. Data Acquisition Systems
36. Internet and Web Programming (Using XHTML,ASP.NET,JAVASCRIPT AND COLD

37. FUSION)

38. Hardware Engineering (PC Components Design LAN Card,Sound Card,VGA

39. Card,Motherboard,MODEM etc)
40. PC Interfacing and Process Control
41. Analog and Digital PCB Design (Using ORCAD,ARES,EAGLEVIEW)


The breadth of disciplines studied in computer engineering is not limited to the above subjects, but can include any subject found in engineering.

Monday, November 22, 2010

I Miss U

Wednesday, November 10, 2010

Image tag definitions

Image Tag Definitions



< href="http://www.s o u r o v. c o m/" target="_blank" title="Get your Google PageRank"> < src=" http://www.u r ltrends.com/pa gerankimg.php" border="0" height="25" width="100" alt="Get your Google PageRank">


Image tag definitions

The XHTML Basic Document Type

The XHTML Basic Document Type


Structure Module*
body, head, html, title


Text Module*
abbr, acronym, address, blockquote, br, cite, code, dfn, div, em, h1, h2, h3, h4, h5, h6, kbd, p, pre, q, samp, span, strong, var


Hypertext Module*
a

List Module*
dl, dt, dd, ol, ul, li

Forms Module
button, fieldset, form, input, label, legend, select, optgroup, option, textarea

Basic Tables Module
caption, table, td, th, tr

Image Module
img

Object Module
object, param

Presentation module
b, big, hr, i, small, sub, sup, tt

Metainformation Module
meta

Link Module
link

Base Module
base

Intrinsic Events module
Events attributes

Scripting module
script and noscript elements

Stylesheet module
style element

Style Attribute Module Deprecated
style attribute

Target Module
target attribute.


Note:
* The target attribute is designed to be a general hook for binding to an external environment (such as Frames, multiple windows, browser-tabbed windows); when there is no such external environment bound to the user agent, the user agent can ignore the target attribute. When there is an external environment bound, the conformance requirements for the target attribute are defined in each environment.

* The content author needs to be aware that the user agent behavior for the target attribute depends on multiple factors such as the existence of an environment binding, restrictions of available resources, existence of other applications and user preferences (such as pop-up blockers), and implemententation-dependent design decisions. When there is no external environmental conformance, it is recommended that authors do not depend on use of the target attribute.

* It should be noted that any implementation-dependent use of the target attribute might impede interoperability.



The XHTML Basic Document Type

Tuesday, November 9, 2010

BASIS

See the file 



Monday, November 8, 2010

Search engine optimization - SEO

Images:  Use the alt attribute to provide descriptive text. In addition, we recommend using a human-readable caption and descriptive text around the image.

Javascript: Place the same content from the Javascript in a no script tag. If you use this method, ensure the contents are exactly same as what is contained in the Javascript and that this content is shown to visitors who do not have Javascript enabled in their browser.

Videos: Include descriptive text about the video in HTML. You might also consider providing transcripts.


HTML Image Tags

<>  : Defines an image
<>    : Defines an image-map
<> : Defines a clickable area inside an image-map


In HTML the <> tag has no end tag. 
In XHTML the <> tag must be properly closed.


Not so good:
< src = "puppy.jpg" alt= "">

Better:
 <  img src="puppy.jpg" alt="puppy">

Best: 
< src="puppy.jpg" alt="Dalmatian puppy playing fetch">


Tip:

The alt attribute is meant to be used as an alternative text if the image is not available, not as a mouse-over text. To show a mouse-over text on images or image-maps, use the title attribute, like this:

<  img src="angry.gif" alt="Angry face" title="Angry face" />


To be avoided
< src="puppy.jpg" alt="puppy dog baby dog pup pups puppies doggies pups litter puppies dog retriever labrador wolfhound setter pointer puppy jack russell terrier puppies dog food cheap dogfood puppy food">


To compare and contrast, here are the file sizes of the above graphic in various formats:


JPG, 60 quality - 32K
PNG-8, 256 colors - 37K
GIF, 256 colors - 42K
PNG-24 - 146K

rose 2010 : 5

wish u rose






Holloman AFB

Holloman AFB is one of four bases the F-22s



poem

কি করছো এখন?

হয়তো ঝটিকা সফরে ঘুরতে বেড়িয়েছ পথে,

কিংবা Satellite এর সাথে বেঁধে রেখেছ চোখ!



কি করছো এখন?

হয়তো গৎবাঁধা গল্প জুড়িয়েছো ঘরে,

কিংবা মুঠোফোনেই শুরু করেছ দীর্ঘ আলাপন।



কি করছো এখন?

হয়তো এই মুহূর্তে Electricity নেই,

কিংবা মহল্লায় হল্লা তাই মেজাজটাও গরম!



কি করছো এখন?

হয়তো কিছুই করছো না,

কিংবা 'কি করবো' 'কি করবো' ভেবে অতঃপর কুল না পেয়ে অভিমানে Room-Alone!



কি করছো এখন?

হয়তো ঘুম থেকেই ওঠোনি এখনো কোনো তাড়া নেই বলে,

কিংবা উঠেছো ঠিকি কিন্তু অকারনেই আনমনা মন।



কি করছো এখন?

হয়তো বই এর পাতা উল্টাচ্ছো, খিলখিলিয়ে হাসছো,

কিংবা মিটমিটিয়ে জোনাকের মতো জ্বলছো আর নিভছো।



কি করছো এখন?

হয়তো চায়ের কাপ আর চিনি নিয়ে চলছে Research!

কিংবা Search করছো নতুন Recipe গভীর Google এ!



কি করছো এখন?

হয়তো ধেই ধেই করে নাচছো,

কিংবা চুপচাপ জানালায় দাঁড়িয়ে দেখছো শহর।



কি করছো এখন?

হয়তো হারিয়ে ফেলেছো কুড়িয়ে আনা ফুল,

কিংবা অন্য কিছু হারানোর শোকে অশ্রু সজল।






কি করছো এখন?

হয়তো এমন কিছু করছো যা লিখিনি কোথাও,

কিংবা এমন কিছু যা সবার সামনে বলতে বারন।



কি করছো এখন?

নাই বা বললে তুমি, আমি কি করছি শোনো-

তোমায় নিয়ে তখন থেকে লিখেই যাচ্ছি বোকার মতন!

MiNe

SouRov



[use bangla font or use avro to see the poem ]

Tuesday, October 26, 2010

rose 2010 : 4

wish u rose 



Monday, October 25, 2010

Software Engineering Skill

Software Engineering Skill on .NET


Thorough understanding of SDLC and software design principles

Very good understanding of UML, SOA and Object Oriented Design and Analysis

Must have clear understanding in OOP.

At least 1/2 years working experience with C#, ASP.Net, AJAX, SQL Server 2005 / 2008

MVC pattern, WCF, LinQ, WPF, J-query will be added advantage.

Must have capability of writing complex SQL Queries, Store Procedures, Functions and objects etc.

Mobile base Application Development Knowledge can be adding as additional quality

Development knowledge on MYSQL, Apache In linux can be adding as additional quality


Friday, October 22, 2010

Siddiq Bin Nur

Siddiq Bin Nur 


Hi! I am Siddiq Bin Nur , a graduate student in the Department of Computer Science at Ahsanullah University of Science & Technology

Wednesday, October 13, 2010

Notice

This is section for Notice



Notice 1 : I have blocked some of my existing friend to my facebook account ..... sorry for them .

Sunday, October 10, 2010

10/10/10

wish u all 

10/10/10

thanks 

101010...machine language is running from here.......

Sourov

 

Saturday, October 9, 2010

C# Programmer's Reference

The C# Programmer's Reference complements the C# Language Specification by providing tutorials, reference material, and topics on how to program in C#.



Learning the language   : C# Tutorials


Keywords                        : C# Keywords


Operators                        : C# Operators


Attributes                        : C# Attributes


Conditional compilation : C# Preprocessor Directives


Types                               : Types Reference Tables


Arrays, Main method, properties, indexers, passing parameters, and other language features : C# Language Feature

Documenting your code using XML :  XML Documentation

Thursday, October 7, 2010

The .NET Framework

Microsoft introduced the .NET Framework in 2000 as a new approach to software development. The .NET Framework borrowed ideas from the best practices in the software industry as well as brought new ideas to the table in an effort to meet developer needs and requests.

Virtually all programming languages manage data at some point. The primary reason that communication between applications created using C++, Visual Basic, Visual FoxPro, and other languages was difficult was because each language stored data being managed in a unique set of data types. For example, an integer in one language may not represent an integer in another language. Data needed to be converted to common data types to communicate between languages.

The .NET Framework introduced a common set of data types (the Common Type System) that is used by all .NET-compliant languages (C++, Visual Basic, C#, etc). Thus all languages can easily intercommunicate. Furthermore, all .NET-compliant languages render a common result when compiling code, Microsoft Intermediate Language (MSIL). (see footnote) MSIL can be deployed to any platform running the Common Language Runtime (CLR). Currently, the CLR is only available for Microsoft Windows although an open source version of the CLR was created for Linux (called the Mono Project). Code written by using the .NET Framework is compiled instead of interpreted resulting in much better performance than Java and competing technologies.

Microsoft took the Web development industry by storm with their .NET upgrade to ASP. ASP.NET put a new face on Web development through a compiled code architecture and improved state management and it provides access to the full functionality of the .NET Framework. ASP.NET is built around XML, supports the latest Web development standards, and allows for the creation of advanced Web Services.

The .NET Framework also provides improved data access and database integration through ADO.NET. For more information, see MSDN.

There are many more features and benefits of the .NET Framework than those mentioned here. The .NET Framework has become the leading software development environment available.

ASP.NET AJAX

ASP.NET AJAX was developed to improve performance in the browser by making post backs and calls between the browser and server asynchronously. ASP.NET AJAX uses new built-in types and controls and JavaScript.

Both ASP.NET and ASP.NET AJAX are heavily dependent upon the ASP.NET page event life cycle, are tightly coupled to the server, and have a tough time competing with advanced, media-rich plug-in solutions such as Adobe Flash. Additionally, it is difficult to create Web applications that offer a consistent experience across all supported browsers and platforms by using ASP.NET and AJAX. In 2006, Microsoft began developing a solution to extend into the browser and offer media experiences more robust than competing plug-in solutions.

In 2007, Microsoft introduced Silverlight. (see footnote) Silverlight is a free plug-in that encompasses a subset of functionality from the .NET Framework and WPF. In a manner similar to the JVM (see footnote), Silverlight runs in the browser as a "sandbox" - a secure zone installed into the browser that accommodates Silverlight functionality while completely protecting the host platform from any possibly adverse actions performed by Silverlight.

What's New in the .NET Framework

As of the writing of this course, version 3.5 of the .NET Framework has been released. Version 3.5 includes features that encompass all facets of Windows, Web, and network development:
Includes just under 10,000 classes, methods, and properties.
Complies with the latest Web development standards.
Introduces revolutionary technologies used in Windows Vista development, rich media and user experiences, workflow management, security and authorization, and complete distributed communication protocols.

The .NET Framework can also be fully extended by developers to create custom classes and types. The functionality of the .NET Framework spans the server, the workstation, and the Web. The four primary additions to the .NET Framework as of version 3.0 are:


Windows Presentation Foundation (WPF)
Windows Communication Foundation (WCF)
Windows Workflow Foundation (WF)
CardSpace


Windows Presentation Foundation (WPF)

WPF is used to develop elaborate user interfaces like those that adorn Windows Vista and managed advanced media streaming and integration. WPF is the a complete revamp of Windows Forms so that user interface, graphic, and media development is now designed around the .NET Framework.

Windows Communication Foundation (WCF)

WCF encompasses the ASP.NET Web Services and .NET remoting functionality that was contained in the .NET Framework 2.0 as well as new communication technologies.


Windows Workflow Foundation (WF)

WF is used to model complex workflow processes.

CardSpace

CardSpace is the embodiment of new security and user authorization functionality.


I Just Died In Your Arms Tonight

Oh I, I just died in your arms tonight
It must have been something you said
I just died in your arms tonight

I keep looking for something I can't get
Broken hearts lie all around me
And I don't see an easy way to get out of this
Her diary it sits on the bedside table
The curtains are closed, the cats in the cradle
Who would've thought that a boy like me could come to this

Oh I, I just died in your arms tonight
It must've been something you said
I just died in your arms tonight
Oh I, I just died in your arms tonight
It must've been some kind of kiss
I should've walked away, I should've walked away

Is there any just cause for feeling like this?
On the surface I'm a name on a list
I try to be discreet, but then blow it again
I've lost and found, it's my final mistake
She's loving by proxy, no give and all take
'cos I've been thrilled to fantasy one too many times

Oh I, I just died in your arms tonight
It must've been something you said
I just died in your arms tonight
Oh I, I just died in your arms tonight
It must've been some kind of kiss
I should've walked away, I should've walked away

It was a long hot night
And she made it easy, she made it feel right
But now it's over, the moment has gone
I followed my hands not my head, I know I was wrong

Oh I, I just died in your arms tonight,
It must've been something you said,
I just died in your arms tonight
I, I just died in your arms tonight,
It must've been some kind of kiss
I should've walked away, I should've walked away

It Don't Come Easy

(Richard Starkey)

It don't come easy,
You know it don't come easy.

It don't come easy,
You know it don't come easy.

Got to pay your dues if you wanna sing the blues,
And you know it don't come easy.
You don't have to shout or leap about,
You can even play them easy.

Forget about the past and all your sorrows,
The future won't last,
It will soon be over tomorrow.

I don't ask for much, i only want your trust,
And you know it don't come easy.
And this love of mine keeps growing all the time,
And you know it just ain't easy.

Open up your heart, let's come together,
Use a little love
And we will make it work out better.

(ah -)
(ah -)
(ooh-ooh)
(ah-ooh-ooh)

Got to pay your dues if you wanna sing the blues,
And you know it don't come easy.
You don't have to shout or leap about,
You can even play them easy.

Peace, remember peace is how we make it,
Here within your reach
If you're big enough to take it.

I don't ask for much, i only want your trust,
And you know it don't come easy.
And this love of mine keeps growing all the time,
And you know it don't come easy.

Wednesday, October 6, 2010

Unicode

Unicode provides a unique number for every character,

no matter what the platform,
no matter what the program,
no matter what the language.

Fundamentally, computers just deal with numbers. They store letters and other characters by assigning a number for each one. Before Unicode was invented, there were hundreds of different encoding systems for assigning these numbers. No single encoding could contain enough characters: for example, the European Union alone requires several different encodings to cover all its languages. Even for a single language like English no single encoding was adequate for all the letters, punctuation, and technical symbols in common use.

These encoding systems also conflict with one another. That is, two encodings can use the same number for two different characters, or use different numbers for the same character. Any given computer (especially servers) needs to support many different encodings; yet whenever data is passed between different encodings or platforms, that data always runs the risk of corruption.

Unicode is changing all that!

Unicode provides a unique number for every character, no matter what the platform, no matter what the program, no matter what the language. The Unicode Standard has been adopted by such industry leaders as Apple, HP, IBM, JustSystems, Microsoft, Oracle, SAP, Sun, Sybase, Unisys and many others. Unicode is required by modern standards such as XML, Java, ECMAScript (JavaScript), LDAP, CORBA 3.0, WML, etc., and is the official way to implement ISO/IEC 10646. It is supported in many operating systems, all modern browsers, and many other products. The emergence of the Unicode Standard, and the availability of tools supporting it, are among the most significant recent global software technology trends.

Incorporating Unicode into client-server or multi-tiered applications and websites offers significant cost savings over the use of legacy character sets. Unicode enables a single software product or a single website to be targeted across multiple platforms, languages and countries without re-engineering. It allows data to be transported through many different systems without corruption.

Monday, October 4, 2010

My Working Company Name

My Working Company Name :









Monday, September 27, 2010

Test Strategy 2

What is Test Strategy?

In simple words – Test strategy means “How you are going to test the application?” You need to mention the exact process/strategy that you are going to follow when you will get the application for testing.

I see many companies follow test strategy template very strictly. Even without any standard template you can keep this test strategy document simple but still effective.


Simple Tips to Write Test Strategy Document:

1) Include product background in test strategy document. In first paragraph of your test strategy document answer – Why stakeholders want to develop this project? This will help to understand and prioritize things quickly.


2) List all important features you are going to test. If you think some features are not part of this release then mention those features under “Features not to be tested” label.


3) Write down the test approach for your project. Clearly mention what types of testing you are going to conduct?
I.e. Functional testing, UI testing, Integration testing, Load/Stress testing, Security testing etc.


4) Answer questions like: How you are going to perform functional testing? Manual or automation testing? Are you going to execute all test cases from your test management tool?


5) Which bug tracking tool you are going to use? What will be the process when you will find a new bug?


6) What are your test entry and exit criteria?


7) How you will track your testing progress? What metrics are you going to use for tracking test completion?


8 ) Task distribution – Define roles and responsibilities of each team member.


9) What documents you will produce during and after testing phase?


10) What all risk you see in test completion?


Test Strategy 1

How do you create a test strategy?

The test strategy is a formal description of how a software product will be tested. A test strategy is developed for all levels of testing, as required. The test team analyzes the requirements, writes the test strategy and reviews the plan with the project team. The test plan may include test cases, conditions, the test environment, a list of related tasks, pass/fail criteria and risk assessment.


Inputs for this process:


- A description of the required hardware and software components, including test tools. This information comes from the test environment, including test tool data.


- A description of roles and responsibilities of the resources required for the test and schedule constraints. This information comes from man-hours and schedules.

- Testing methodology. This is based on known standards.

- Functional and technical requirements of the application. This information comes from requirements, change request, technical and functional design documents.

- Requirements that the system can not provide, e.g. system limitations.


Outputs for this process:

- An approved and signed off test strategy document, test plan, including test cases.

- Testing issues requiring resolution. Usually this requires additional negotiation at the project management level.


What Test plan and what it consists?

What Test plan and what it consists for Software Testing Projects ?


Test plan: It contains item to test & it is a statagic document. It consists of 
objectives ,scope ,approach and focus in software testing effort



Test Consist :
1)Revision history
2)Introduction
3)Objective
4)Process
5)Test Strategy
6)Entry/Exit Criteria
7)Schedule
8)Milestone
9)Deliverable
10)Commands


Types of Software Testing 2

The development process involves various types of testing. Each test type addresses a specific testing requirement. The most common types of testing involved in the development process are:

• Unit Test.
• System Test
• Integration Test
• Functional Test
• Performance Test
• Beta Test
• Acceptance Test.


Unit Test
The first test in the development process is the unit test. The source code is normally divided into modules, which in turn are divided into smaller units called units. These units have specific behavior. The test done on these units of code is called unit test. Unit test depends upon the language on which the project is developed. Unit tests ensure that each unique path of the project performs accurately to the documented specifications and contains clearly defined inputs and expected results.

System Test
Several modules constitute a project. If the project is long-term project, several developers write the modules. Once all the modules are integrated, several errors may arise. The testing done at this stage is called system test.


System testing ensures that the entire integrated software system meets requirements. It tests a configuration to ensure known and predictable results. System testing is based on process descriptions and flows, emphasizing pre-driven process links and integration points.


Testing a specific hardware/software installation. This is typically performed on a COTS (commercial off the shelf) system or any other system comprised of disparent parts where custom configurations and/or unique installations are the norm.

Functional Test
Functional test can be defined as testing two or more modules together with the intent of finding defects, demonstrating that defects are not present, verifying that the module performs its intended functions as stated in the specification and establishing confidence that a program does what it is supposed to do.

Acceptance Testing
Testing the system with the intent of confirming readiness of the product and customer acceptance.

Ad Hoc Testing
Testing without a formal test plan or outside of a test plan. With some projects this type of testing is carried out as an adjunct to formal testing. If carried out by a skilled tester, it can often find problems that are not caught in regular testing. Sometimes, if testing occurs very late in the development cycle, this will be the only kind of testing that can be performed. Sometimes ad hoc testing is referred to as exploratory testing.

Alpha Testing
Testing after code is mostly complete or contains most of the functionality and prior to users being involved. Sometimes a select group of users are involved. More often this testing will be performed in-house or by an outside testing firm in close cooperation with the software engineering department.

Automated Testing
Software testing that utilizes a variety of tools to automate the testing process and when the importance of having a person manually testing is diminished. Automated testing still requires a skilled quality assurance professional with knowledge of the automation tool and the software being tested to set up the tests.

Beta Testing
Testing after the product is code complete. Betas are often widely distributed or even distributed to the public at large in hopes that they will buy the final product when it is released.

Black Box Testing
Testing software without any knowledge of the inner workings, structure or language of the module being tested. Black box tests, as most other kinds of tests, must be written from a definitive source document, such as a specification or requirements document.

Compatibility Testing
Testing used to determine whether other system software components such as browsers, utilities, and competing software will conflict with the software being tested.


Configuration Testing
Testing to determine how well the product works with a broad range of hardware/peripheral equipment configurations as well as on different operating systems and software.

Independent Verification & Validation
The process of exercising software with the intent of ensuring that the software system meets its requirements and user expectations and doesn't fail in an unacceptable manner. The individual or group doing this work is not part of the group or organization that developed the software. A term often applied to government work or where the government regulates the products, as in medical devices.

Installation Testing
Testing with the intent of determining if the product will install on a variety of platforms and how easily it installs.

Integration Testing
Testing two or more modules or functions together with the intent of finding interface defects between the modules or functions. Testing completed at as a part of unit or functional testing, and sometimes, becomes its own standalone test phase. On a larger level, integration testing can involve a putting together of groups of modules and functions with the goal of completing and verifying that the system meets the system requirements. (see system testing)

Load Testing
Testing with the intent of determining how well the product handles competition for system resources. The competition may come in the form of network traffic, CPU utilization or memory allocation.

Performance Testing
Testing with the intent of determining how quickly a product handles a variety of events. Automated test tools geared specifically to test and fine-tune performance are used most often for this type of testing.

Pilot Testing
Testing that involves the users just before actual release to ensure that users become familiar with the release contents and ultimately accept it. Often is considered a Move-to-Production activity for ERP releases or a beta test for commercial products. Typically involves many users, is conducted over a short period of time and is tightly controlled. (see beta testing).


Regression Testing
Testing with the intent of determining if bug fixes have been successful and have not created any new problems. Also, this type of testing is done to ensure that no degradation of baseline functionality has occurred.


Security Testing
Testing of database and network software in order to keep company data and resources secure from mistaken/accidental users, hackers, and other malevolent attackers.

Software Testing
The process of exercising software with the intent of ensuring that the software system meets its requirements and user expectations and doesn't fail in an unacceptable manner. The organization and management of individuals or groups doing this work is not relevant. This term is often applied to commercial products such as internet applications. (contrast with independent verification and validation)

Stress Testing
Testing with the intent of determining how well a product performs when a load is placed on the system resources that nears and then exceeds capacity.

User Acceptance Testing
See Acceptance Testing.

White Box Testing
Testing in which the software tester has knowledge of the inner workings, structure and language of the software, or at least its purpose.


Types of software Testing 1

There are several Software Testing Types are  describe below:

Black box testing – Internal system design is not considered in this type of testing. Tests are based on requirements and functionality.


White box testing – This testing is based on knowledge of the internal logic of an application’s code. Also known as Glass box Testing. Internal software and code working should be known for this type of testing. Tests are based on coverage of code statements, branches, paths, conditions.


Unit testing – Testing of individual software components or modules. Typically done by the programmer and not by testers, as it requires detailed knowledge of the internal program design and code. may require developing test driver modules or test harnesses.

Incremental integration testing – Bottom up approach for testing i.e continuous testing of an application as new functionality is added; Application functionality and modules should be independent enough to test separately. done by programmers or by testers.

Integration testing – Testing of integrated modules to verify combined functionality after integration. Modules are typically code modules, individual applications, client and server applications on a network, etc. This type of testing is especially relevant to client/server and distributed systems.

Functional testing – This type of testing ignores the internal parts and focus on the output is as per requirement or not. Black-box type testing geared to functional requirements of an application.

System testing – Entire system is tested as per the requirements. Black-box type testing that is based on overall requirements specifications, covers all combined parts of a system.

End-to-end testing – Similar to system testing, involves testing of a complete application environment in a situation that mimics real-world use, such as interacting with a database, using network communications, or interacting with other hardware, applications, or systems if appropriate.

Sanity testing - Testing to determine if a new software version is performing well enough to accept it for a major testing effort. If application is crashing for initial use then system is not stable enough for further testing and build or application is assigned to fix.

Regression testing – Testing the application as a whole for the modification in any module or functionality. Difficult to cover all the system in regression testing so typically automation tools are used for these testing types.

Acceptance testing -Normally this type of testing is done to verify if system meets the customer specified requirements. User or customer do this testing to determine whether to accept application.

Load testing – Its a performance testing to check system behavior under load. Testing an application under heavy loads, such as testing of a web site under a range of loads to determine at what point the system’s response time degrades or fails.

Stress testing – System is stressed beyond its specifications to check how and when it fails. Performed under heavy load like putting large number beyond storage capacity, complex database queries, continuous input to system or database load.

Performance testing – Term often used interchangeably with ’stress’ and ‘load’ testing. To check whether system meets performance requirements. Used different performance and load tools to do this.

Usability testing – User-friendliness check. Application flow is tested, Can new user understand the application easily, Proper help documented whenever user stuck at any point. Basically system navigation is checked in this testing.

Install/uninstall testing - Tested for full, partial, or upgrade install/uninstall processes on different operating systems under different hardware, software environment.

Recovery testing – Testing how well a system recovers from crashes, hardware failures, or other catastrophic problems.

Security testing – Can system be penetrated by any hacking way. Testing how well the system protects against unauthorized internal or external access. Checked if system, database is safe from external attacks.

Compatibility testing – Testing how well software performs in a particular hardware/software/operating system/network environment and different combination s of above.

Comparison testing – Comparison of product strengths and weaknesses with previous versions or other similar products.

Alpha testing – In house virtual user environment can be created for this type of testing. Testing is done at the end of development. Still minor design changes may be made as a result of such testing.

Beta testing – Testing typically done by end-users or others. Final testing before releasing application for commercial purpose.

 @ Happy Testing @

SDLC and STLC

SDLC is software development life cycle which has the following stages.

1. Requirement or Information gathering
2. Analysis
3. Design
4. Coding/implementation
5. Testing
6. Installation
7. Release and maintenance

Whereas STLC is software testing life cycle which is a part of SDLC and has the following stages:


1. Requirement
2. Prepare test plan
3. Review
4. Prepare test cases
5. Execute the test
6. report analysis
7. Bug analysis(log the bugs)
8. Bug report
9. Close testing


System testing and Functional testing

Functional testing -> is the technique utilized in the system tesing.Its a black box testing type... Functional testing is noting but testing or check whether a sytem functions properly as per the req..  

System testing -> is the phase after integration testing phase.After all modules get integrated and tested for integration, the system is tested as a whole.

Saturday, September 25, 2010

3 Layer Architecture Model





Figure : 3 Layer Architecture Model

Why we are Useing Stored Procedures ?

There are several advantages of using stored procedures instead of standard SQL.

1. Stored procedures allow a lot more flexibility offering capabilities such as conditional logic.

2. Because stored procedures are stored within the DBMS, bandwidth and execution time are reduced. This is because a single stored procedure can execute a complex set of SQL statements.

3. SQL Server pre-compiles stored procedures such that they execute optimally.

4. Client developers are abstracted from complex designs. They would simply need to know the stored procedure's name and the type of data it returns.

Sunday, September 5, 2010

eid mubarak

wish u all HAPPY

Eid Mubarak 2010

thanks

rose 2010 : 3




gift




rose 2010 : 2




rose 2010 :1





poem


Sunday, August 29, 2010

Different phases of software development cycle

Following are the different phases of software development cycle:

  • System study
  • Feasibility study
  • System analysis
  • System design
  • Coding
  • Testing
  • Implementation
  • Maintenance


The different phases of software development life cycle is shown in Fig

Wednesday, August 25, 2010

The Top Three hottest new majors for a career in technology


Have you ever wondered what fields of study are hot right now in the world of technology? Or maybe you’re starting to think about declaring your major and you’re looking for some real world guidance?

It is worth thinking beyond a traditional Computer Science degree or even an Electrical Engineering & Computer Science (EECS) program. Microsoft is hiring people with unique backgrounds, some newer with the inception of the Cloud, web services and the amazing scale at which the industry is operating (Exabyte anyone?).

The following is my list of the Top Three hottest academic areas for a future career in tech:



Data Mining/Machine Learning/AI/Natural Language Processing

All of these fields help us sift through and organize huge amounts of information or data. When you apply your knowledge in these areas to a challenging problem in the online space, you know that you are working at a scale that is just immense. It’s much easier said than done. If you have a passion for this area and have a technical background there are a multitude of open positions that might hold a long-term career for you. With the move to the cloud and the sheer amount of information on the web, this area of expertise will continue to be in great demand. Microsoft has a great need for both people interested in the research space and the applied space which is very refreshing.

Business Intelligence/Competitive Intelligence
The ability to see trends, make sense of data to a business audience and help to understand your customers requires a special person. Someone with a mix of engineering, BI/CI experience and a business mindset can take this field to the next level. You will help increase any employer’s bottom line and be able to provide organized data that is extremely valuable to any business. You can help drive business decisions and help your internal audience understand what the data is telling or showing you.

Analytics/Statistics – specifically Web Analytics, A/B Testing and statistical analysis
All of these subjects are offshoots of traditional degrees in CS and mathematics. They all apply to the online world we live in and will also be in great demand as we continue to monetize the web. Retailers, web services, and advertisers will need people in these fields as they try to get the most for their advertising money. As we continue to see the dollar amounts spent for online advertising worldwide, these fields will be hot and we will see online advertising change over time as a result of these positions.

If these fields interest you and you want to find out what some of these jobs really entail, visit our website and search on the terms above to get a more detailed look at the positions. These fields are very HOT and looking long term, the demand will be just that much greater in these areas.

poem

Poem