Monday, 27 February 2017

CSS3 Flexbox


New layout concept in CSS3 that is Flexible boxes, or flexbox.
Use of flexbox for elements behave as our requirement when the page layout must integrate with different display devices and different screen sizes.
The flexible box model gives an best options over the block model and in that flexbox it does not use floats css property, or do not container's margins of its contents for many applications.

CSS3 Flexbox Concepts
Flexbox contains flex containers and flex items.
Flex container is define by setting the display property of an element to flex or inline-flex (display as inline).
Inside the flex container there is one or more flex items.
Everything inside a flex-item and outside a flex-container is display as usual. it defines how flex-items are shows inside a flex-container.
Inside flex-container, flex-items are positioned along with a flex line. By default in flex-container there is only one flex-line.
We can also possible change the  direction of the flex-line.
If we have to set the text direction property to right-to-left, then it drawn text right to left, and with that flex-line change the direction, so with that change the page layout also.

Flex Direction
Flex-direction property set the direction of the flex-items inside the flex-container. And the default value of flex-direction property is left-to-right and in small device top-to-bottom.
The flex-direction property values:
Row-reverse      :- The flex-items was displayed right to left, then our writing direction is left to right.
Column               :- The flex-items was displayed vertically on page, then our writing system is horizontal.
Column-reverse :- The flex-items was displayed horizontal on page, then our writing system is vertically.

Whenever the items don’t use all space on flex-items, then Justify-content property horizontally aligns the items.
The Justify-content values :
flex-start           :- it’s a default value. flex-items are placed at beginning of the container.
Flex-end           :- flex-items are placed at end of the container.
center               :- flex-items are placed at center of the container.
space-between :- flex-items are placed with space between the lines.
space-around   :- flex-items are placed with space between, before, and after the lines.

Align-items property vertically aligns the flex-items when the items do not use all available space on the cross-axis.
The align-items values:
stretch     :- this is the Default value. flex-items are stretched to fit in flex-container.
flex-start :- flex-items are placed at the top of flex-container.
flex-end   :- flex-items are placed at the bottom of flex-container.
center      :- flex-items are placed at the center of flex-container.
baseline   :- flex-items are placed at the baseline of flex-container.

Wednesday, 22 February 2017

Customer Relationship Management(CRM)


Customer Relationship Management (CRM) is vast concept which refers to practices, strategies and technologies that companies follow to manage and analyze customer interactions and data throughout the product lifecycle, with the single aim of improving business relationships with customers, assisting in customer retention and sustainable growth in sales.
Through the CRM approach and the systems used to facilitate CRM, businesses learn more about their target audiences and meeting their needs according to the current trends in the market. Adopting and following the CRM approach may also occasionally lead to favoritism within an audience of consumers, resulting in dissatisfaction among customers and conquering the purpose of CRM.
CRM isthat a company has with its customers, whether it is sales or service-related.

Important aspects to maintain Customer Relationship
1. Maintain your brand :
How would you feel if a good friend suddenly changed their behavior drastically? People find this annoying and separating whether they are interacting with a human relationship or a business one. Once you have a solid and consistent brand and logo design, let it infuse every aspect of your company. Let them get to know you by creating reliable experience that is coordinated to be consistent over a wide range variety of interactions and leads to complete brand integration and helps to build brand loyalty.

2. Make all interactions as nice, as cool as possible :
Few people can maintain a healthy, ongoing and long lasting relationship with a person who is difficult to deal with and business relationships operate in a very similar manner. From the way you and your company answer the telephone to the way you handle returns, all customer interactions should be streamlined and managed in such a way that the customer feels like a winner. As with human relationships, business relationships are developed over time through positive communication and healthy interactions.

3. Create an appealing environment :
 Studies have shown over and over that the public prefers attractive people and surrounding for both personal and business relationships. While aesthetics aren’t everything, they are a huge part of the overall picture. This means that creating clean and an attractive space, both in physical locations and websites, is key of nurturing the customer relationship.

4.Focus on meeting Customer’s Requirements :
Instead of telling customers how great your business and its products are, tell them how you are going to meet their requirements. What are the solutions you are proposing to solve their problems? If you can make someone’s life easier or more pleasant, it will be easy to be viewed as a friend, an entity that the customer has an ongoing relationship with.

5. Put yourself out there :
You would never make friends and build relationships in your day-to-day life if you stayed in your bedroom all day. You need to be in the public in a variety of ways, offering brand-consistent updated information that creates curiosity and encourages your target customer base to develop a relationship with you. Invite the customer to do business with you through marketing, including traditional advertising as well as innovative methods such as social networking and community involvement.

Tuesday, 21 February 2017

Email Spoofing


What Is an 'Email SPOOF'? Is It a Type of Phishing Attack?Email caricaturing, similar to telephone satirizing, is extortion and duplicity. Caricaturing is the most widely recognized type of the cutting edge con diversion called 'phishing'.

Email s SPOOFing may happen in various structures, yet all have a comparable outcome: a client gets email that seems to have begun from one source when it really was sent from another source. Email satirizing is regularly an endeavor to trap the client into putting forth a harming expression or discharging delicate data, (for example, passwords).

"SPOOF" signifies "falsified".Spoofed email is the point at which the sender intentionally modifies parts of the email to take on the appearance of however it was created by another person. Usually, the sender's name/address and body of the message are arranged to show up from a true blue source, as if the email originated from a bank or daily paper or honest to goodness organization on the Web. Some of the time, spoofer will make the email seem to originate from a private native some place.

By and large, parodied email is a piece of phishing (extortionist) assault. In different cases, a parodied email is utilized to untrustworthily advertise an online administration.

On the off chance that you give email administrations to your client group, your clients are helpless against ridiculed or fashioned email. It is anything but difficult to farce email since Simple Mail Transfer Protocol needs verification. On the off chance that site has arranged the mail server to permit associations with the Simple Mail Transfer Protocol port, anybody can interface with the Simple Mail Transfer Protocol port of site and issue summons that will send email that has all the earmarks of being from the address of the individual's decision; this can be a legitimate email address or imaginary address that is accurately designed. Notwithstanding associating with the Simple Mail Transfer Protocol port of a site,user can send parodied email through different conventions for example, by adjusting their web program interface

Why Would Someone Fraudulently "Parody" an Email?
1: the email spoofer is attempting to "phish" your passwords and login names.Phishing is the place the deceptive sender plans to draw you into putting stock in the email. A false site will hold up off to side, shrewdly camouflaged to seem like a true blue online bank site. Very frequently, casualties will unwittingly trust the ridiculed email and snap to the false site. Believing the ridiculed site, the casualty will enter his secret word and login character, just to get a false blunder message that "site is inaccessible".
The deceptive spoofer will catch the casualty's classified data, and continue to pull back the casualty's assets or perform exploitative exchanges for money related pick up.

2: the email spoofer is a spammer attempting to conceal his actual character, while as yet filling your letter box with promoting. Utilizing mass-mailing programming called "ratware", spammers will adjust the source email deliver to show up as a pure national, or as a real organization or government element.
The reason, such as phishing, is to motivate individuals to believe the email enough with the goal that they will open it and read the spam promoting inside.

How is Email Spoofed?
Unscrupulous clients will modify distinctive segments of an email in order to camouflage the sender as being another person. Cases of properties that are satirize:

FROM name/address

Answer TO name/address


SOURCE IP address or "X-ORIGIN" address

These initial three properties can be effectively modified by utilizing settings in your Microsoft Outlook, Gmail, Hotmail, or other email programming. The fourth property above, IP address, can likewise be modified, however generally requires more refined client information to make a false IP address persuading.

Is Email Spoofed Manually by Dishonest People?
While some farce adjusted messages are in fact distorted by hand, the immense lion's share of parodied messages are made by exceptional programming. The utilization of mass-mailing "ratware" projects is across the board among spammers. Ratware projects will here and there run gigantic implicit wordlists to make a great many target email addresses, parody a source email, and afterward impact the farce email to those objectives. Different circumstances, ratware projects will take unlawfully obtained arrangements of email locations, and after that send their spam in like manner. Past ratware programs, mass-mailing worms additionally flourish. Worms are self-duplicating programs that go about as a kind of infection. Once on your PC, a mass-mailing worm will read your email address book. At that point the mass-mailing worm will misrepresent an outbound message to seem sent from a name in your address book, and continue to send that message to your whole rundown of companions. This annoys the many beneficiaries, as well as stains the notoriety of a pure companion of yours. Some surely understand mass-mailing worms include: Sober, Klez, and ILOVEYOU.

How Do I Recognize and Defend Against Spoof Emails?
Like with any con amusement in life, your best safeguard is incredulity. On the off chance that you don't trust that the email is honest, or that the sender is honest to goodness, then essentially don't tap on the connection and sort your email address. On the off chance that there is a record connection, just don't open it, keeping in mind that it contain an infection payload. On the off chance that the email appears to be unrealistic, then it likely is, and your doubt will spare you from revealing your keeping money data.

Monday, 13 February 2017

Zend: PHP framework

Zend framework is based on MVC architechture. It requires a PHP 5 interpreter with a web server configured to handle PHP scripts correctly. Zend Framework has an extensive collection of unit tests, which you can run using PHPUnit 3.3.0 or later.
Zend recommends the most current release of PHP and currently supports PHP 5.2.4 or later, for critical security and performance enhancements.

PHP Extensions
Many applications will not require every extension,you should verify that the extensions on which Zend Framework components you'll be using in your application. Soft  type of dependency indicates that the component may use the extension if it is available but will function properly if it is not or and Dependency of type hard indicates that the components or classes cannot function properly if the respective extension is not available. You will get PHP extensions which are used in Zend Framework easily. So we have not mentio1ned here.

• It is based on fully object-oriented PHP 5 and are E STRICT compliant
• Use-at-will architecture with loosely coupled components with minimal interdependencies
• Extensible MVC implementation supporting layouts and PHP-based templates with ease.
• Flexible Table Gateway implementation for getting  the data from a relational database in an object oriented programming concept.
• It Support for multiple database systems and vendors, which includes  MySQL, Oracle, IBM DB2, Microsoft SQL Server, PostgreSQL, SQLite, and Informix Dynamic Server
• Authentication and ACL-based authorization using a large amount of backend systems
• Good facility for Data filtering and validation for enhanced application security
• Improved Session management
• Configuration component to stable configuration management throughout the Zend Framework and ZF applications
• Good functionality of Email composition and delivery, retrieval via mbox, Maildir, POP3 and IMAP4
• Well defined Indexing and search that supports the Lucene index file format
• Improved Internationalization and localization
• Facility for Creation of forms using PHP, configuration files, or XML
• Supports Multiple formats for web services, including XML-RPC, REST, and Google GData.
• Simple structured logging component inspired by log4j
• Native-PHP component for reading, updating, and creating PDF documents
• Serialization of PHP data structures to and from JSON to facilitate AJAX development

Organisations which use Zend Framework:
• Berlin Museums
• Digital Sublimity
• Eurotransplant
• GNU/Linux Matters for Poliglota
• Marseille City School System
• Nokia
• Right Media
• Magento
• Shoppingads
• Australia Week

Thursday, 9 February 2017

Six important Business Development objectives of Information Technology.


Companies rely on IT for fast communications, data processing and market intelligence. IT plays an integral role in every industry, helping companies improve business processes, achieve cost efficiencies, drive revenue growth and maintain a competitive advantage in the marketplace. 

Product Development
Information technology can speed up the time taken for launching the product in the market. Companies can write product requirement documents by market research, from proprietary databases, target customers and sales representatives. Computer-based design and development software speed up decision making, while collaborative technologies gives  global sources to work on different aspects  of a product simultaneously. From innovations in microprocessors to efficient drug delivery systems, information technology helps businesses respond quickly to changing customer requirements.

Stakeholder Integration
Stakeholder integration is another important objective of information technology. Using global 24/7 interconnectivity, a customer service call originating in Des Moines, Iowa, ends up in a call center in Manila, Philippines, where a service agent could look up the relevant information on severs based in corporate headquarters in Dallas, Texas, or in Frankfurt, Germany. Public companies use their investor relations websites to communicate with shareholders, research analysts and other market participants.

Process Improvement
Process improvement is another key IT business objective. Enterprise resource planning (ERP) systems allow managers to review sales, costs and other operating metrics on one integrated software platform, usually in real time. An ERP system may replace dozens of legacy systems for finance, human resources and other functional areas, thus making internal processes more efficient and cost-effective.

Cost Efficiencies
Although the initial IT implementation costs can be substantial, the resulting long-term cost savings are usually worth the investment. IT allows companies to reduce transaction and implementation costs. For example, the cost of a desktop computer today is a fraction of what it was in the early 1980s, and yet the computers are considerably more powerful. IT-based productivity solutions, from word processing to email, have allowed companies to save on the costs of duplication and postage, while maintaining and improving product quality and customer service.

Competitive Advantage
Cost savings, rapid product development and process improvements help companies gain and maintain a competitive advantage in the marketplace. If a smartphone competitor announces a new device with innovative touch-screen features, the competitors must quickly follow suit with similar products or risk losing market share. Companies can use rapid prototyping, software simulations and other IT-based systems to bring a product to market cost effectively and quickly.

Companies that survive in a competitive environment usually have the operational and financial flexibility to grow locally and then internationally. IT is at the core of operating models essential for globalization, such as telecommuting and outsourcing. A company can outsource most of its noncore functions, such as human resources and finances, to offshore companies and use network technologies to stay in contact with its overseas employees, customers and suppliers.