Rss Feeder Document

download Rss Feeder Document

of 40

Transcript of Rss Feeder Document

  • 7/27/2019 Rss Feeder Document

    1/40

    RSS FEEDER

    ABSTRACT

    RSS (Really Simple Syndication) is a format used to deliver information from

    websites and pages that get updated regularly. An RSS document (which is called feed)

    contains either a summary or the full content from a website.

    The main benefit of RSS is that it enables people to stay connected with their

    favorite websites without having to visit them. Once you subscribe to a particular RSS

    feed, you will automatically receive updates from the website that publishes the feed,

    whenever they release new content. In this project RSS reader configure to outlook

    express to get the updates from website. Pick a feed by scrolling down and browsing the

    links on this page and the next, or choose one of the links at the top of this page to narrow

    down options. When the user become an offline the outlook express maintains the feeds

    as it is in online.

  • 7/27/2019 Rss Feeder Document

    2/40

    INTRODUCTION

    RSS Feeder.NET is a free open source desktop RSS feed aggregator which

    downloads feeds from web sources and stores them locally for offline viewing, searching

    and processing. It is also a rich blogging tool which you can use to blog a variety of blog

    engines including WordPress, B2Evolution, .Text, Community Server etc. You can be

    fully MS Outlook dependent or can run fully standalone. You can also use both at the

    same time whichever you find comfortable to work with. It does not increase the Outlook

    load time, nor does it make the Outlook slow or prevent it from closing properly. It is a

    Smart Client that makes best use of both Local Resource and Distributed Web

    Information sources.

    OVERVIEW OF THE PROJECT

    RSS is an acronym for Really Simple Syndication and Rich Site Summary.

    RSS is an XML-based format for content distribution. Webmasters create an RSS file

    containing headlines and descriptions of specific information. While the majority of RSS

    feeds currently contain news headlines or breaking information the long term uses of RSS

    are broad.

    RSS is a defined standard based on XML with the specific purpose of delivering

    updates to web-based content. Using this standard, webmasters provide headlines and

    fresh content in a succinct manner. Meanwhile, consumers use RSS readers and news

    aggregators to collect and monitor their favorite feeds in one centralized program or

    location. Content viewed in the RSS reader or news aggregator is place known as an RSS

    feed.

    RSS is becoming increasing popular. The reason is fairly simple. RSS is a free

    and easy way to promote a site and its content without the need to advertise or create

    complicated content sharing partnerships.

  • 7/27/2019 Rss Feeder Document

    3/40

    ABOUT THE PROJECT

    RSS is a text-based format, a type of XML. RSS files are often labeled as

    XML.RSS version 1.0 is also RDF (Resource Discovery Framework), which is important

    only because an RSS file may be labeled as RDF.By using XSLT (Extensible Stylesheet

    Language), these XML files can be converted to a much more friendly view.

    Atom is a format quite similar to RSS. It was created by people who felt that RSS

    could be improved upon. The basic difference is that while Atom is somewhat more

    complex (for producers of Atom feeds), it is also able to carry more complex

    information, and it is consistent across the syndication, storage, and editing of

    information. Almost everything regarding RSS applies equally well to Atom.

    RSS parts

    Feeds These are the actual content items that are produced by web authors.

    These could be taken from blogs, journals, news sites, etc.

    Aggregators An aggregator is a program or site that collects the feeds for

    reading. Aggregators can be installed as stand-alone programs, or they can be web-based.

    Web based aggregators

    Bloglines Currently the most popular in this category.

    Newsgator Allows for delivery of content to Outlook.

    Litefeeds good for PDAs & Mobile Phones

    Google Reader

    Netvibes

    Personalized Google Page

    My Yahoo! Page

  • 7/27/2019 Rss Feeder Document

    4/40

    Features

    Newspaper mode. It can read feeds in a more readable newspaper mode called

    Blogpaper.

    Auto Discovery. Drag any hyper link and find out whether there is any RSS Feed

    in that page.

    Outlook integration. Used to store feeds in Outlook folders.

    Blogging. It provides Outlook 2003 style convenient workspace to manage blog

    accounts and write rich posts.

    Blog from Outlook. Used to specify an Outlook folder for a weblog account. All

    the posts from that folder is automatically posted to the weblog during

    synchronization and can write posts as HTML using Word editor. Post content

    (HTML markup) is cleaned rigorously before posting to the weblog.

    Outlook View. It uses a customized view to present a more readable list of feeds

    in Outlook Folders. The standard Post view is not easy to browse through quickly.

    The view puts the subject first in bold and an excerpt of the post under the

    subject.

    Optimized Startup. It safely put RSS Feeder at startup and it wont make

    Windows start slower. A clever lazy loading process puts no effort on

    Windows during startup instead starts the app when Windows has finally

    regained its strength after the long boot up struggle.

    Newsgator Import. Newsgator users can use RSS Feeder to import all the

    subscriptions and seamlessly replace Newsgator without modifying the Outlook

    folder locations.

  • 7/27/2019 Rss Feeder Document

    5/40

    COST ESTIMATION SYSTEM

    Cost estimation models are mathematical algorithms or parametric equations used

    to estimate the costs of a product or project. The results of the models are typicallynecessary to obtain approval to proceed, and are factored into business plans, budgets,

    and other financial planning and tracking mechanisms.

    These algorithms were originally performed manually but now are almost

    universally computerized. They may be standardized (available in published texts or

    purchased commercially) or proprietary, depending on the type of business, product, or

    project in question. Simple models may use standard spreadsheet products.

    Models typically function through the input of parameters that describe the

    attributes of the product or project in question, and possibly physical resource

    requirements. The model then provides as output various resources requirements in cost

    and time. Cost modeling practitioners often have the titles of cost estimators, cost

    engineers, or parametric analysts.

  • 7/27/2019 Rss Feeder Document

    6/40

    2. SYSTEM CONFIGURATION

    2.1HARDWARE CONFIGURATION

    Processor PENTIUM IV (1.8GHZ)

    Memory 256 MB RAM

    Hard disk 20 GB

    Floppy Drive 1.44MB

    Mouse Optical Mouse

    Key board 108 Windows keyboard

    Monitor 15 CRT

    2.2SOFTWARE CONFIGURATION

    Operating System WINDOWS XP

    Front end C#.Net 2005

    Back end MICROSOFT ACCESS 2000

  • 7/27/2019 Rss Feeder Document

    7/40

    3. SYSTEM ANALYSIS AND ANALYSIS

    The system analysis is conducted with the following objectives in mind. They are

    to satisfy the customers according to their needs, to evaluate the system concept for

    feasibility, to allocate functions to hardware, software, people, database and other system

    elements to create a system definition that forms the foundation for all subsequent

    engineering works.

    3.1FACT FINDING

    Fact finding is the stage in which data about the system are collected in terms of

    technical and functional requirements. In this project the data collection is completed

    using the data carriers which are existing in the tables.

    3.2 FEASIBILITY STUDY

    When developing a system, it is necessary to evaluate the feasibility of project at

    the earliest possible time. Unexpected technical problems and timing problems can occur

    when poor problem definition is obtained. It is advisable to conduct discussions regarding

    the analysis and design of the project before starting it.

    Economic Feasibility

    The proposed system developed includes the following related issues.

    Cost of resources needed for development.

    Cost benefit analysis.

    Potential market growth.

    While concerning the cost of resources for the server side, amount is invested for

    the high capacity of storage media, high speed processor and large amount of memory

    needed for the system. While concerning the client side a minimal amount of cost is

    needed. Overall the cost of setting up the server and configuring it will be costly at the

  • 7/27/2019 Rss Feeder Document

    8/40

    time of installation. While considering the cost benefit analysis, huge amount will be

    invested only at the time of first installation.

    Technical Feasibility

    The technical feasibility involves the analysis of all possible condition for

    obtaining the system. It actually involves a study of function Performance and

    constraints that may affect the ability to achieve an acceptable system, the considerations

    that are normally associated with the technical feasibility include the following:

    Development risk

    Resource availability

    Technology

    The development risk concerns the probability the function of all elements and its

    performance should be same in all platforms and in the system that is being developed.

    This system is developed according to the web standards and the development software

    tools are selected in such a way to avoid the problems sited above.

    The resource availability states whether skilled staffs are available to develop the

    system elements and the availability of hardware and software. The hardware is provided

    by the organization satisfying all the requirements.

    Operational feasibility

    The purpose of the study is to determine whether the new system would be used if

    it is developed and implemented. The assessment of operational feasibility will be done

    along side by side with technical feasibility. The needs of various people affected by

    proposed system must be taken into account. The various social costs must be evaluated;

    these will include the costs of education and training, communication, salary changes and

    hidden costs like those caused by hostility, ignorance and fear.

  • 7/27/2019 Rss Feeder Document

    9/40

    3.3 EXISTING SYSTEM

    The existing system of RSS reader is to read the feeds from web. There is no

    modification option. Without a third party tool will not configure the outlook express.

    Drawbacks of the Existing System

    No proper communication

    Lot of Spams

    Pop up Blocks

    Cannot view multiple website in one location..

    3.4 PROPOSED SYSTEM

    The proposed system of RSS Aggregator is not just an RSS reader; it can also edit

    existing feed or create a new one, or even form a totally new feed from several existing

    one and then publish it to the web site. Through outlook express will make modifications

    without third party costly tools.

    Benefits

    By using an aggregator, you can read feeds from multiple websites in one

    location.

    No spam

    No popups

    Most blogs now have feeds, and more journals and news sites are adding them.

  • 7/27/2019 Rss Feeder Document

    10/40

    Advantages

    RSS streamlines communication between publishers and readers. Since RSS has

    had a popularity surge, webmasters have been experimenting and using RSS feeds to

    deliver content in new and innovative ways. RSS feeds contain news headlines and

    content summaries. The content summaries contain just enough information without

    overwhelming the reader with superfluous details. If the reader is interested and wants

    additional information they can click on the item in the feed, accessing the website which

    contains additional details. RSS readers aggregate multiple feeds, making it easy for

    individuals to quickly scan information contained within each feed. Feeds are generally

    themed, allowing users to opt-in to feeds that are of interest.

    The big benefit to RSS is that individuals opt-in to content of interest, totally

    controlling the flow of information that they receive. If the quality of the content in the

    feed declines, users simply remove the feed from their RSS reader and they will not

    receive any additional updates from that source. The RSS reader acts as an aggregator,

    allowing users to view and scan multiple content streams in a timely fashion.

  • 7/27/2019 Rss Feeder Document

    11/40

    4. SYSTEM DESIGN

    4.1 INPUT DESIGN

    Inaccurate input data is the most common source of errors in data processing.

    Errors entered by data entry operators can be collected by input design. Input design is

    the process of converting user-originated inputs to a computer-based format. Input design

    is a part of overall system design. The objective of input design for Online Tender

    Management is,

    1. To produce a cost-effective method of input.

    2. To achieve a high level of accuracy.

    3. To ensure that the input is acceptable and understood by the user staff.

    ACTIVITIES OF INPUT SYSTEM

    1. Data recording

    2. Data transaction

    3. Data conversion

    4. Data verification

    5. Data control

    6. Data transmission

    7. Data validation

    8. Data correction

    4.2 OUTPUT DESIGN

    Computer output is the most important and direct source of information to the

    user. Proficient, intelligible output design should improve the systems relationship with

    the user and help in decision making. A major form of output is a hard copy from a

    printer. Printouts should be designed around the output requirement of the user. This also

    provides to make a permanent copy of results for later consultation.

  • 7/27/2019 Rss Feeder Document

    12/40

    Outputs from computer system are required primarily to communicate the results

    of processing to users in a form in which they can understand and which meets their

    requirements.

    The output media is chosen by considering the following factors:

    1. The suitability of the device to the particular application.

    2. The need for hard copy and number of copies required.

    3. The response time required.

    4. The location of the users.

    5. The software and hardware required.

    6. The cost involved.

    4.3 DATABASE DESIGN

    A database is a collection of interrelated data stored with minimum redundancy to

    server many users quickly and efficiently. The general objective is to make information

    access easy and flexible for the user. Database design is focused on several objectives

    such as controlled redundancy, ease of learning and use, data independence, more

    information at low cost, accuracy and integrity, recovery from failure, privacy, securityand enhanced performance. The database design is an integrated collection of data. The

    objectives of the database are:

    1. Data integration

    2. Data integrity

    3. Data independence

    Integration means the collecting of data, which are scattered on different devices.

    Data integrity means that the logical information is inconsistent owing to

    differences in duplicated physical data. Data independence is the insulation of application

    programs from the changing aspect of physical data organization.

    Data design is the first and most important design activities that are conducted

    during software engineering. The data design transforms the information domain created

  • 7/27/2019 Rss Feeder Document

    13/40

  • 7/27/2019 Rss Feeder Document

    14/40

    list of names and addresses, assuming a situation where multiple people can have the

    same address, but one person cannot have more than one address, the name is dependent

    upon the address, because if the address is different, then the associated name is different

    too. However, the other way around is different. One attribute can change and not

    another.

    6.3 LOGICAL DESIGN

    Once the relationships and dependencies amongst the various pieces of

    information have been determined, it is possible to arrange the data into a logical

    structure which can then be mapped into the storage objects supported by the database

    management system. In the case of relational databases the storage objects are tables

    which store data in rows and columns.

    Each table may represent an implementation of either a logical object or a

    relationship joining one or more instances of one or more logical objects. Relationships

    between tables may then be stored as links connecting child tables with parents. Since

    complex logical relationships are themselves tables they will probably have links to more

    than one parent.

    In an Object database the storage objects correspond directly to the objects used

    by the Object-oriented programming language used to write the applications that will

    manage and access the data. The relationships may be defined as attributes of the object

    classes involved or as methods that operate on the object classes.

    6.4 PHYSICAL DESIGN

    The physical design of the database specifies the physical configuration of the

    database on the storage media. This includes detailed specification of data elements, data

    types, indexing options and other parameters residing in the DBMS data dictionary. It is

    the detailed design of a system that includes modules & the database's hardware &

    software specifications of the system.

  • 7/27/2019 Rss Feeder Document

    15/40

    5. SYSTEM DEVELOPMENT

    ASP.NET is Microsoft's latest technology for building web-based applications

    and services, a successor to Active Server Pages (ASP) that draws on the power of the

    .NET Framework development platform and the Visual Studio .NET developer toolset.

    To better understand ASP.NET, it is important to understand some key concepts of the

    .NET development platform. It is also helpful to grasp object-oriented development

    (OOD), which is at the very heart of the .NET Framework that provides the foundation

    for ASP.NET development.

    Use of ASP.NET

    We may use ASP.NET for any new projects we are about to start for the following

    reasons:

    Reduced development time

    Increased performance

    Increased application stability

    Increased scalability

    New ASP.NET features (see the discussion later in this chapter)

    In addition to these factors, ASP.NET, like ASP, is available for free. The only

    costs associated with ASP.NET development are the costs of the operating system on

    which we wish to run the application (Windows 2000, Windows XP, or Windows Server

    2003) and the cost of the development environment we choose to use. Of course, as with

    classic ASP, we can use free or inexpensive text editors to create your applications.

    Given that the .NET Framework is a free add-on to Windows (and is integrated with the

    Windows Server 2003 line), it is possible to create ASP.NET applications without

    spending a penny beyond the cost of the operating system and hardware on which it will

    run. Integrated development environments, such as Microsoft Visual Studio .NET 2003,

    are also available at an additional cost and greatly simplify ASP .NET development.

  • 7/27/2019 Rss Feeder Document

    16/40

  • 7/27/2019 Rss Feeder Document

    17/40

    Improved security

    ASP.NET offers tighter integration with Windows-based authentication, as well

    as two new authentication modes: forms-based authentication (which allows users to

    enter authentication credentials in a standard HTML form, with the credentials validated

    against your choice of backend credential store) and Passport authentication (which

    makes use of Microsoft's Passport authentication service).

    Request Validation

    Request Validation, when enabled (the default), checks all forms of posted input

    (form fields, querystring, etc.) and raises an exception if any HTML or script code is

    found. This can help prevent cross-site scripting attacks in your applications.

    Side by side execution

    Starting with ASP.NET 1.1, you can choose which version of the .NET

    Framework your application will run against. Assuming you have both Version 1.0 and

    Version 1.1 installed, you can configure individual applications to run against either

    version

    Built-in mobile control support

    In Version 1.0, support for targeting mobile devices such as cell phones and

    PDAs was provided via a set of controls available as a separate download. In Version 1.1,

    these controls have been fully integrated into the .NET Framework, and a new

    application type has been added to Visual Studio .NET 2003 to support development of

    ASP.NET applications for mobile devices.

    ADO.NET enhancements

    In Version 1.0, developers wishing to access data from Oracle and/or ODBC

    data sources had to download and install a separate data provider for these data sources.

    In Version 1.1, the ODBC and Oracle data providers have been integrated into the .NET

    Framework.

  • 7/27/2019 Rss Feeder Document

    18/40

    Application Types

    In classic ASP, there was really only one type of applicationone in which a

    client accessed a page with the .asp extension and in which that page, either through

    embedded VBScript or JScript or through script in combination with components built on

    Microsoft's COM standard, returned HTML to the browser to form the user interface with

    which the client would interact. Clients typically interacted with the application only

    through this user interface and did not have the option of creating their own alternative

    interface to the functionality exposed by the application.

    ASP.NET provides an enhanced version of this type of application. ASP.NET

    also introduces a new type of application, called a web service, which provides clients the

    ability to use functionality exposed by an application without being tied into that

    application's user interface implementation.

    ASP.NET Web Applications

    The ASP.NET Web Application is the type of application most developers will

    work with on a regular basis. The terminology comes from the description used in the

    Visual Studio .NET environment to describe the project type used to create this type of

    application. You may also hear this type of application described as an ASP.NET Web

    Forms Application.

    An ASP.NET Web Application, in its simplest form, consists of a directory

    made available via HTTP using the IIS administration tool or through the Web Sharing

    tab of a folder's Properties dialog (or by creating a web application project in Visual

    Studio .NET) and at least one ASP.NET page, designated by the .aspx file extension.

    This file (or files), typically contains a mix of HTML and server-side code. This HTML

    and server-side code combine to create the final output of the page, typically consistingof HTML markup that is sent to the client browser.

  • 7/27/2019 Rss Feeder Document

    19/40

    Web Forms and Web Controls

    Web Form is a term used to describe an .aspx file that makes use of Web

    Controls. The key to understanding how ASP.NET Web Applications work is

    understanding that the code in a block (or a render block)

    is executed on the serverafter the client requests the page, but before the output of the

    page request is sent to the client browser. This allows developers to decide, based on the

    code they write and the input received from the user, just what output actually is sent to

    the browser, either directly (such as by calling the Write method of the Response object)

    or by manipulating controls. It also allows additional functionality, such as server-side

    state management, to be provided to these applications.

    Besides the containing directory and ASP.NET file(s), an ASP.NET Web

    Application may also contain configuration files (web.config), User Control files (.ascx),

    and an application settings file (Global.asax), as well as code-behind, assembly, and class

    files that provide additional functionality to the application.

    ASP.NET Mobile Web Applications

    The ASP.NET Mobile Web Application is a subtype of Web Application specific

    to developing for mobile devices such as cell phones and PDAs. The primary thing that

    distinguishes a mobile web application from a standard web application in ASP.NET is

    the use of the ASP.NET mobile controls, which are built into the .NET Framework as of

    Version 1.1. These include the mobile Form control and standard controls such as labels,

    textboxes, and panels, as well as mobile-specific controls such as the TextView,

    PhoneCall, and SelectionList controls.

  • 7/27/2019 Rss Feeder Document

    20/40

    MS-ACCESS

    MS-Access is a powerful multi-user RDBMS developed by Microsoft

    Corporation. It store and manipulate large amounts of information and automatic

    repetitive tasks such as manipulating an inventory and generation invokes. Using access

    easy to use data input forms can be developed. Data can process and meaningful reports

    can be generated.

    MS-Access provides most of the features available in the high end RDBMS

    products like oracle. Sybase and ingress etc. Visual Basic keeps Access as its native

    database always called joint engine technologys which means structured query language

    is widely used here for retrieving data from one or more tables other than the wizard

    available in ACCESS.

    Data in ACCESS is organized in the form of tables. Within tables, records are

    arranged according to a common reference value known as primary key or the key field.

    The value in the key field is different for every record and thus helps in uniquely

    identifying records. A combination of two or more fields can also be used as the primary

    key.

    Since the value in one table can be replicated across other tables. There should be

    a way to maintain a relation between the two tables. This relation is implemented through

    the concept of foreign key. The foreign key in staple is a field, which links that table to

    another table.

    FEATURES OF MS-ACCESS

    Windows-Based application

    Large data management capacity

    Importing, exporting and linking external files

    Wizards and builders

    Built-in functions, Macros

  • 7/27/2019 Rss Feeder Document

    21/40

    Context-sensitive and the answer wizard

    6. TESTING AND DEVELOPEMENT

    The testing phase involves the testing of the developed system using various kinds

    of data. An elaborated testing of data is prepared and a system is tested using the test

    data. While testing, errors are noted and corrections remade, the corrections are also

    noted for future use.

    SYSTEM TESTING

    System testing is a critical aspect of Software Quality Assurance and represents

    the ultimate review of specification, design and coding. Testing is a process of executing

    a program with the intent of finding an error. A good test is one that has a high

  • 7/27/2019 Rss Feeder Document

    22/40

    probability of finding an undiscovered error. The purpose of testing is to identify and

    correct bugs in the developed system. Nothing is complete without testing. Testing is the

    vital role to the success of the system.

    It is the most vital activity that has to be enforced in any system development

    cycle. This could be done as parallel activity along with the system development or

    during the implementation. The feedback received during this testing is carefully

    examined for further enhancement to be made in the system.

    System testing is designed to recover weaknesses that were not found in earlier

    tools. In testing, engineers create a series of test cases that are intended to demolish the

    software that has been built. Considering all these in mind, the software have been tested

    successfully, implemented and it serves the need of the end-users.

    UNIT TESTING

    A Unit may be defined as a piece of code with a single intended purpose. A

    Unit Test is defined as a piece of code which exists to codify the intended behavior of a

    unit and to compare its intended behavior against its actual behavior. After source-level

    code has been developed, reviewed and verified for correct syntax, unit test case design

    begins.

    Unit testing focuses verification effort on the smallest unit of software design- the

    module. This enables to detect errors in the coding and logic that are contained within the

    module alone. This type of testing can be conducted in parallel for multiple modules.

    INTEGRATION TESTING

    Integration testing is a systematic technique for constructing the software

    architecture while at the same time conducting tests to uncover errors associated with

    interfacing. The objective is to take unit tested components and build a program structure

    that has been dictated by design. The results of integration testing should be formally

    documented.

    The following are the types of integration testing:

  • 7/27/2019 Rss Feeder Document

    23/40

    TOP DOWN INTEGRATION

    This method is an incremental approach to the construction of program structure.

    Modules are integrated by moving downward through the control hierarchy, beginning

    with the main program module. The module subordinates to the main program module

    are incorporated into the structure in either a depth first or breadth first manner.

    2. BOTTOM UP INTEGRATION

    This method begins the construction and testing with the modules at the lowest

    level in the program structure. Since the modules are integrated from bottom up,

    processing required for modules subordinate to a given level is always available and the

    need for stubs is eliminated.

    The bottom-up integration strategy may be implemented with the following steps:

    1. The low-level modules are combined into clusters that perform a specific

    software sub-function.

    2. A driver (i.e.) the control program for testing is written to co-ordinate test case

    input and output.

    3. The cluster is tested.

    4. Drivers are removed and clusters are combined moving upward in the

    program structure.

    USER ACCEPTANCE TESTING

    User acceptance of a system is the key factor for the success of any system. The

    system under consideration is tested for user acceptance by constantly in touch with the

    prospective system users at the time of developing and making changes wherever

    required.

    VALIDATION TESTING

    It begins after the integration testing is successfully assembled. Validation

    succeeds when the software functions in a manner that can be reasonably accepted by the

  • 7/27/2019 Rss Feeder Document

    24/40

    client. In this the majority of the validation is done during the data entry operation where

    there is a maximum possibility of entering wrong data. Other validation will be

    performed in all process where correct details and data should be entered to get the

    required results.

    SYSTEM TESTING

    System testing is actually a series of different tests whose primary purpose is to

    fully exercise the computer-based system. Although each test has a different purpose, all

    work to verify that system elements have been properly integrated and perform allocated

    functions. The following are the four types of system testing.

    1. RECOVERY TESTING

    Recovery testing is a system test that forces the software to fail in a variety of

    ways and verifies that recovery is properly performed. If recovery is automatic

    (performed by the system itself), re-initialization, check-pointing mechanisms, data

    recovery, and restart are evaluated for correctness.

    2. SECURITY TESTING

    Security testing attempts to verify that protection mechanism built into system

    will in fact protect it from improper penetration. The tester may attempt to acquire

    password through external clerical means, may attack the system with custom software

    design to break down any defenses to others, and may purposely cause errors.

    3. STRESS TESTING

    Stress testing executes a system in a manner that demands resources in abnormal

    quantity, frequency, or volume. A variation of stress testing is a technique called

    sensitivity testing. Sensitivity testing attempts to uncover data combinations within valid

    input classes that may cause instability or improper testing.

    4. PERFORMANCE TESTING

  • 7/27/2019 Rss Feeder Document

    25/40

    Performance testing is used to test runtime performance of software within the

    context of an integrated system. Performance test are often coupled with stress testing

    and require both software instrumentation.

    5. Output Testing

    After performing the validation testing, the next step is output testing of the

    proposed system, since no system could be useful if it does not produce the required

    output in the specified format. The outputs generated or displayed by the system under

    consideration are tested by asking the users about the format required by them. Hence

    the output format is considered in 2 ways one is on screen and another in printed

    format.

  • 7/27/2019 Rss Feeder Document

    26/40

    IMPLEMENTATION

    System implementation is the final phase i.e. putting the utility into action.

    Implementation is the state of the project where theoretical design turned into working

    system. In this stage the installation of the package in the real environment, to the

    satisfaction of the intended user and the operation of the system. If the implementation is

    not carefully planned and controlled, it can cause chaos and confusion.

    Implementation includes all those activities that take place to convert from the old

    system to the new one. The new system may be totally new, replacing an external system

    manual or automated system or it may be a modification to an external system. The

    process of putting the developed system in actual use is called implementation. This

    includes all those activities that take place to convert from old system to new one.

    The most crucial stage is achieving a new successful system and giving

    confidence in new system that it will work efficiently and effectively. The system is

    implemented only after thorough checking is done and if it is found working according to

    the specifications.

    It involves careful planning, investigation of the current system, constraints on

    implementation and design of methods to achieve. Two checking is done and if it isfound working according to the specification, major task of preparing the implementation

    are educating and training the users. The more complex the system being implemented,

    the more involved will be the system analysis and the design effort required just for

    implementation. The method of implementation and the time scale adopted are found out

    initially. Next the system is tested properly and the same time user are trained in the new

    product.

  • 7/27/2019 Rss Feeder Document

    27/40

    Implementation simply means converting a new system design into operation.

    Conversion is one aspect of implementation. Implementation can be:

    1. Implementation of a computer system to replace a manual system.

    2. Implementation of a new computer system to replace an already

    existing one.

    3. Implementation of a modified application to replace an existing one

    using the same computer.

    During the final testing, user acceptance is tested, followed by user training.

    Depending on the nature of the system, extensive user training may be required.

    Conversion usually takes place at about the same time the user is being trained or later.

    EDUCATION AND TRAINING

    The user of the system should be properly educated and trained, so that they can

    make the system efficient and achieve the objectives. The user should be confident in his

    role in the new system. If the user is not aware of the programming language, he should

    be taught about the subject how it differs from others, its limitations and other advantages

    over other front end tools etc. Next he should be given a brief introduction to the back

    end, its advantages and other important concepts should be given. Then the user should

    be introduced to the system, its working, the output generated etc.

    Training of the users is one of the most important subtasks of the developer. Even

    well designed and technically elegant systems can succeed or fail, because of the way

    they are operated and used. For this purpose, user manuals are prepared and handled over

    to the user to operate the developed system. Thus the users are trained to operate the

    developed system. Both the hardware and software securities are made to run the

    developed systems successfully in the future.

  • 7/27/2019 Rss Feeder Document

    28/40

    In order to put new application system into use, the following activities were taken care

    of:

    1. Preparation of user and system documentation.

    2. Conducting user training with demo and hands on.

    3. Test run for some period to ensure smooth switching over the system.

    The users are trained to use the newly developed functions. User manuals

    describing the procedures for using the functions listed on menu and circulated to all the

    users. It is confirmed that the system is implemented up to users need and expectations.

    After educating the user, he has to be trained to use the system. By means of the

    user manual provided with the system, the training can be made easy. Training is

    complimentary to education.

    EQUIPMENT INSTALLATION

    Equipment vendors can provide the specifications for equipment installation.

    They usually work with the projects equipment installation team in planning for

    adequate space, power, light and a suitable environment. After a suitable site has been

    completed, the computer equipment can be installed. Although equipment normally is

    installed by the manufacturer, the implementation team should advice and assist.

    Participation enables the team to aid in the installation and more importantly to become

    familiar with the equipment.

    CHANGE OVER

    Since the new system has to handle a large amount of data at a time, it is sage to

    have a change over. The result of the new system must be compared with that of the

    manual system. If the results are similar, we can replace the existing system with the new

    one.

  • 7/27/2019 Rss Feeder Document

    29/40

    MAINTENANCE

    After the installation phase is completed and the user staff is adjusted to the

    changes created by the candidate system, evaluation and maintenance begin. The

    maintenance phase of the software cycle is the time in which a software product performs

    the useful work. Like any system there is an ageing process that requires periodic

    maintenance of hardware and software. If the new information is inconsistence with the

    design specification, then changes have to be made. The importance of maintenance is to

    continue to bring the new system to standards.

    The system should be maintained and upgraded according to the technological

    advancements. It ensures the data integrity, data control and security. The system must be

    protected from fire and other natural calamities. The backup copies of data must be

    maintained daily so that we can prevent the loss of data due to various reasons.

    Maintenance can be classified into

    1. Corrective maintenance.

    2. Adaptive maintenance.

    3. Perfective maintenance.

    4. Preventive maintenance.

    Corrective maintenance removes software faults. Corrective maintenance means

    repairing, processing or performance failures or making changes because of previously

    uncorrected problems or false assumptions.

    Adaptive maintenance means changing the program function. Adaptive

    maintenance modifies the software to keep it up to date with its operative environment. It

    may be needed because of changes in the user requirements, changes in target platform or

    changes in external interfaces. Minor adaptive changes should be handled by normal

    maintenance process. Major adaptive changes should be carried out as a separate

    development project.

  • 7/27/2019 Rss Feeder Document

    30/40

    Perfective maintenance improves the system without changing its functionality.

    The objective of perfective maintenance should be to prevent failures and optimize the

    software.

    The fourth maintenance activity occurs when software is changed to improve

    future maintainability or reliability or to provide a better basis for future enhancements.

    Often called preventive maintenance, this activity is characterized by reverse engineering

    and re-engineering techniques.

    Maintenance covers a wide range of activities including correcting coding and

    design errors and updating users support. Maintenance is actually enhancements.

    Maintenance means restoring something to its original condition. Although software does

    not wear out like a piece of hardware, it ages and eventually fails to perform because of

    cumulative maintenance. Over time, the integrity of the program, test data and

    documentation degenerates as a result of modification. Eventually, it takes more effort to

    maintain the application than to rewrite it.

    A major problem with software maintenance is its labor-intensive nature.

    Consider a change in the code, altering the code, no matter how light must be manually

    introduced into each program because there is no easy way of making sure that the

    changes will interface with all the programs.

    SOFTWARE

    Maintenance is the engine of the system development. Analysts and programmers

    spent far more time in maintenance than they do writing program. Maintenance is not as

    rewarding and exciting as developing a system. It is perceived in requiring neither skill

    nor experience. Software maintenance is the process of modifying a software or

    component after its delivery in order to correct faults, improve the performance and otherattributes or to adapt to the changed element.

  • 7/27/2019 Rss Feeder Document

    31/40

    7. CONCLUSION

    I have tried to make RSS Feeder an ideal Smart Client application by

    implementing all the best practices that I have been able to collect from the web. This

    application is a good example of the use of Enterprise Library in a real application. It also

    uses the Application Updater Block 2.0 which was a real pain to implement. Hope you

    will find this article a good source of essentials of desktop application development.

    Although its been only a month since this app was developed and released, I hope its

    pretty much stable and feature-rich to be a part of your daily life. I will look forward to

    get feedback from you which will guide me to improve this in future and make it the best

    tool for feed aggregation and blogging.

  • 7/27/2019 Rss Feeder Document

    32/40

    8. SCOPE FOR THE FURTHER ENHANCEMENT

    In spite of the various advantages that the new system brings in, there are a

    few limitations in the system which is worth considering for the future

    developments. After the present has been completed the further needs of the user

    are identified. In future there is also the potential of the RSS improving as an

    online marketing tool. With its flexibility as a communication medium and the

    enclosure tags showcasing capabilities for expansion, the RSS is set to become

    one of the futures great online marketing tools. Besides that, there is also the

    aspect of the growing popularity of RSS. In light of its massive popularityamongst the general population now, you can bet that the public is expecting

    nothing short of massive from RSS. Which is why as an investment, RSS is at a

    stage whereby the potential is invaluable.

  • 7/27/2019 Rss Feeder Document

    33/40

    9. BIBLIOGRAPHY

    BOOKS:

    1. Ellias M Award, System Analysis And Design, Galgothia Publications Ltd,

    1996.

    2. Bill Evjen, Jason Beres, Visual Basic.Net Programming Bible.

    3. Roger S Pressman, Software Engineering a Practitioner Approach.

    4. Digital Image Processing by Gonzalez

    5. Digital Image Processing Using MATLAB(R) by Rafael C

    WEB SITES:

    1.www.a1vbcode.com

    2. http://en.wikipedia.org/wiki/Image_processing

    3. www.mathworks.com/products/image

    4. www.qi.tnw.tudelft.nl/Courses/FIP/noframes/fip-Contents.html

    5. www.cs.dartmouth.edu

  • 7/27/2019 Rss Feeder Document

    34/40

    9. APPENDIX

    A. DATAFLOW DIGRAM

    Start Connection to

    Internet

    Get the Update

    Information from

    Each Blog papers,

    RSS Feeder, etc.Store the Updated

    Information in the

    Local System

    View the

    Informations from

    the Desired Blog

    Papers

    If Edit

    Inform

    ation

    Modify the

    information

    Using the RSS

    ToolUpload the

    Modified

    Information to

    the Web

    Navigate to

    next Page

    End the

    Applicatio

    n

    A

    A

    A

  • 7/27/2019 Rss Feeder Document

    35/40

    B. SCREENSHOTS:

  • 7/27/2019 Rss Feeder Document

    36/40

  • 7/27/2019 Rss Feeder Document

    37/40

  • 7/27/2019 Rss Feeder Document

    38/40

  • 7/27/2019 Rss Feeder Document

    39/40

  • 7/27/2019 Rss Feeder Document

    40/40