Asana for Task Management

Have you tried Asana? We did and we liked it… When you are just starting a new project you may not always have all the tools at your disposal. Sometimes it takes time to acquire them tools. Tools like JIRA. Especially if you are working for a big IT company where things may go slow […]

What is a Java Bean? Is it Just Any Java Class?

What is a Java Bean? Is it just any java class? The answer is no! Many people think when they say “Java Bean” they are talking about just any java class, but this is not the case. A Bean is not just any java class. Java Beans are classes that need to abide by some […]

Difference Between URI, URL and URN

What is a URI? URI (Uniform Resource Identifier) is a series of characters to identify a resource. It has the following format: scheme:[//[user[:password]@]host[:port]][/path][?query][#fragment] Here the “scheme” is mistaken for protocols. Schemes are not protocols. Many schemes have been designed to work with protocols, yes, bu it is not true for all schemes. Scheme part tells […]

How Kerberos Works

Kerberos is a computer network authentication protocol that was developed by MIT. An open source, free implementation is available from MIT as well as commercial implementations from other vendors. Kerberos is the native authentication protocol in Active Directory. Here is how the protocol works: In Kerberos, there is no communication between the resource (server) and the […]

Difference between a Framework and a Library

Recently, I heard 2 of my friends talking about the difference between a framework and a library, and I thought some may need a clear explanation to see the difference. Check out the simple diagram below. Library A library is essentially a set of functions that you can call, these days usually organised into classes. Each […]

Authentication vs Authorisation

I see that many people are confused by the meaning of authentication and authorisation. People use the two interchangeably. They tend to use both authentication and authorisation for the same thing. But actually there is a difference between the two. Authentication can be thought of as the process of granting a user access into some […]

Requirements Management with iConcur Axiom

I am a software engineer and I frequently develop software individually (other than my regular job) in my spare times. Recently, I decided to develop a program with rather large scope compared to my previous freelance works. Until this time, when I was working on my own, I held all the necessary documentation that I need […]

What are Use Case Diagrams? Why Do We Draw Them?

This will be the last post of 2013. I wish you all a happy new year. I see that many people have trouble when it comes to use case diagrams. Many people think they know what a Use Case Diagram means or what kind of information it is meant to present, but actually half of […]

What is the Difference Between Functional and Non-Functional Requirements

I see that people can get confused easily when it comes to differentiate functional and non-functional  requirements. Let's quickly see the differences. Functional requirements concentrate on achieving a task without paying attention to the quality factors that users of a system might expect implicitly. On the other hand, non-functional requirements are about how well a […]