Archive for February, 2011

How to Get Certified!!!

Posted: February 7, 2011 in Entertainment/Humour

Here i present the basic algorithms/steps to get success in certification exams!!
And now if you are thinking that the following few points will help you in certification, you are looking at wrong source, that is what I can say here!!!
Enjoy and who knows you too may achieve something by following these kind of algorithms!!!

1. Sit in a straight, comfortable chair in a well lit place in front of your computer.

2. Log onto FACEBOOK and GOOGLE TALK(be sure to go on away!). Check your email as well.

3. Read over the Syllabus carefully, to make certain you understand it.

4. Walk down to the market and buy some cheese burger and chocolates to help you concentrate, cheese burger to feel good!!

5. Check your email as soon as you return back.

6. Call up a friend and ask if he/she wants to go to park to get some fresh air, Just to get settled down and ready to work.

7. When you get back to your room, sit in a straight, comfortable chair in a clean, well lit place.

8. Read over the Syllabus again to make absolutely certain you understand it.

9. Check your FACEBOOK account and other profiles you don’t miss.

10. You know, you haven’t written to that girl who told you to write some stuff to her.
11. Look at your teeth in the bathroom mirror.
12. Grab some juice from kitchen.

13. Check yourFacebook account again. ANY OF THIS SOUND FAMILIAR YET?!

14. Chat with one of your friends about the future ie how to make the girl who ditched our friend look cheap.

15. Check your Facebook account once again.

16. Listen to your new mp3 and download some more.

17. Phone your friend{Studious one} and ask if he’s started studying yet. Exchange derogatory remarks about your professor who could have handed out the ‘cheat sheets’, the
course, the college, the world at large.

18. Walk to the shop and buy some popcorn. You’ve probably run out of everything in kitchen.

19. While you’ve got them you may as well buy newspaper and read sports page straight away to get disappointed at yet another defeat{YOU KNOW WHICH TEAM I AM TALKING ABOUT}

20. Check your FACEBOOK account again, if nothing is happening, update a sad staus update to shake up the people who think about you..

21. Check the newspaper listings to make sure you aren’t missing something truly worthwhile on TV.

22. Play some solitare and chess against computer.

23. Check out facebook.com.

24. Wash your hands.

25. Call up a friend to see how much they have done, probably haven’t started either.

26. Sit down and do some serious thinking about your plans for the future.

28. Check to see if facebook.com has been updated yet.

29. Check your email in the sent items to see if that girl got the mail, read it aloud and feel good, listen to your new mp3z{they should have been downloaded by now}.

30. You should be rebooting by now, assuming that windows is crashing on schedule.

31. Read over the syllabus one more time, just for heck of it.

32. Scoot your chair across the room to the window and watch the sunrise.

33. Lie face down on the floor and moan.

34. Punch the wall and break something.

35. Check facebook.com.

36. Mumble obscenities.

37. 5am – start googling about the topics present in syllabus, go through the hand notes and ‘cheat sheets’, that you downloaded.

38. Complain to everyone that you didn’t get any sleep because you had to apper in a very important exam.
39. Go to class, solve every question, and leave right away so you can take a nap.

Things actually were very much same on the day we all got IBM certifications!! CHEERS TO LIFE

Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 1
The Code Warriors Work for workers : Services to the unorganized sector Software Requirements Specification Version 1.0 Team Guide: Mr. Jt Pal Members:
1. Amandeep Singh
2. Muzamil Tariq
3. Toyab Ahmed Shabir
4. Sushant Bhat
College Name: MODEL INSTITUTE OF ENGINEERING AND TECHNOLOGY (MIET) Department: Computer Science and Engineering State: Jammu and Kashmir
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 2
Revision History
Date
Version
Description
Author
<date>
1.0
Synopsis
The Code Warriors
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 3
Table of Contents
Description 1.0 Introduction 1.1 Purpose 1.2 Scope 1.3 Definition, Acronyms, and Abbreviations 1.4 References 1.5 Technologies to be used 1.6 Overview
Page No. 2.0 Overall Description 2.1 Product Perspective 2.2 Software Interface 2.3 Hardware Interface 2.4 Product Function 2.5 User Characteristics 2.6 Constraints 2.7 Architecture Design
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 4
2.8 Use Case Model Description 2.9 Class Diagram ………………………………………………………….. Sequence Diagrams……………………………………………………… 2.10 Database Design ………………………………………………………….. 2.11.1 ER Diagram ……………………………………………………… 2.11.2 Schema ……………………………………………………………. 2.12 Assumptions and Dependencies 3.0 Specific Requirements 3.1 Use Case Reports 3.2 Supplementary Requirements
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 5
Software Requirements Specification
1.0 Introduction:
This document contains specific requirements of our project Work to worker -services to the unorganized sector. Our project is a web based solution to solve the problem of the unorganized sector such as masons, carpenters, gardener etc. It is an approach to reduce unemployment and also make finding right people for the right job much more easier. Objective of this system is to provide work to the workers and solution is focused on the unorganized sector which. In this web based innovative solution, the worker registers himself for a particular skill that he is good at, the profile of the worker is visible to all the general public who look to avail services of some kind, so using this system general public or organized sector (includes contractors) can select the worker as per their need. At the time of the worker selection he can view the skill references given by those who have availed his services before. Now as the general public selects a particular worker for some work, our system sends SMS or email to the worker in concern about the work and the customer details like his address and name. The worker confirms either through the phone or an SMS about his availability for the job, if the worker is unavailable our system shows him the days on which the worker can be available and also presents him with other choice of the worker for the same job. The worker is rated in the fields of his dedication, behavior, habits etc ,through the system, to ensure better services every time. 1.1 Purpose: The purpose of this SRS is to define the overall functionality of our project . It specifies all the requirement parameters needed to implement our project. The basic purpose of our project is to help the unorganized sector in getting work. They register for a particular skill or skills and later receive SMS or emails from the site regarding available job. Further, this project also helps general public and organized sector (contractors) in getting various workers of unorganized sector at one place. It provides general public and organized sector (contractors) with choice of workers. This project also focuses on providing worker the necessary information regarding their rights, governmental scheme , health care ,etc.
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 6
1.2 Scope: Work to Worker is a Web-based solution through which worker (s) registered them selves for a specific skill. Using this system general public or organized sector user can select the worker(s) as per their need. This Online System that is to be developed provides the members(workers) with jobs information(work), online applying for jobs and many other facilities. The work for worker System is supposed to have the following features.
 Administration Panel:
 The job board is highly configurable and there are many possibilities for running the job board. The administration panel consists of a set of web pages where they can:
 Approve / Disapprove / Edit / Delete job(work) postings.
 Approve / Disapprove / Edit accounts with the click of a button.
 View / Edit / Delete resumes.
 View/Edit/Delete Emails.
Work for workers : Services to the unorganized sector
Version 1.0
Software Requirements Specification
15-12-2010
The Code Warriors
 View/Edit/Delete event notifications.
 Can take action according to the reports by registered members of the website.
 Live statistics.
 Advanced content management system.
 Job Seeker’s Area:
 Jobs seekers(workers) can sign-up and submit their resume
 They manage their Job Alerts.
 They can also manage their work calendars and service charges.
 Job seekers can manage other things associated with their accounts like uploading their profile photos and sharing their work experiences with other fellow members.
 Workers can further search for work from specific locality.
 Customer’s Area:
 Agencies can sign-up and browse job seeker’s (workers) resumes.
 Manage their advertisements (job postings).
 Additionally, job seekers can submit their profile and manage other things
 associated with their account.
 Provide feedback and rate workers for their skills.
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 7
1.3 Definitions, Acronyms, and Abbreviations: • HTML (Hyper Text Markup Language): It is used to create static web pages. • JSP (Java Server Pages): It is used to create dynamic web content. • J2EE (Java 2 Enterprise Edition): It is a programming platform, belonging to the Java platform, which is used for developing and running distributed java applications. • WASCE (WebSphere Application Server Community Edition): It is an application server that runs and supports the J2EE and the web service applications. • WSAD (WebSphere Studio Application Developer ): It is a designer toolkit which is designed to develop more complex projects by providing a complete dynamic web service. • DB2 (IBM Database 2): It is a database management system that provides a flexible and efficient database platform to raise a strong “on demand” business applications.
• HTTP (Hyper Text Transfer Protocol): It is a transaction oriented client/ server protocol between a web browser and a web server
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 8
• XML (Extensible Markup Language): It is a markup language that was designed to transport and store data. • Ajax (Asynchronous Java Script and XML): It is a technique used in java script to create dynamic web pages. • Web 2.0: It is commonly associated with web applications which facilitate interactive information sharing, interoperability, user-centered design and collaboration on the World Wide Web. 1.4 References: < Enter the reference taken for project development >
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 9
1.5 Technologies to be used:
• J2EE: (Servlet, JSP, JAXP, Java Beans) Application architecture. • JAVA: Application architecture. • WASCE: (WebSphere Application Server Community Edition) Web Server • DB2: IBM Database. • Ajax: Asynchronous Java Script and XML. • XML: Extension Markup Language. Web 2.0: RSS Feed 2.0. • RAD 7.0: Development tool.
• Localization: 3 Languages – Hindi, Kannada, and English
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 10
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 11
1.6 Overview: The SRS include two sections, namely: -I- Overall Description: This section will describe major components of the system, interconnections, and external interfaces. -I- Specific Requirements: This section will describe the functions of actors, their roles in the system and the constraints faced by the system. 2.0 Overall Description: 2.1 Product Perspective: The product is not a follow up to any other product and is a self contained innovation of IBM. It is built using all IBM technologies. A general view of the diagram showing how the main components of this software are related is shown as:- The main features of our product are:
1. Secure registration of users (workers) and customers (general public/ organized sector user) with SMS.
2. Workers are classified into various groups & categorized namely aware, skilled, semi skilled, etc.
3. State can be modified by feedback system & workers rating evaluation algorithms.
4. Profile management facilities for both laborers and customers.
5. Chat/mail/SMS services (in English and Hindi).
6. Customer can make community for reference purpose etc.
7. Customers can give their feedback for workers who worked for them.
8. Workers can view details of the project in particular location.
2.2 Software Interface:
 Front End Client:
HTML, DHTML, JavaScript, Servlets & JSP
 Web Server:
WASCE (WebSphere Application Server Community Edition) WebServer.
 Data Base Server:
IBM DB2
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 12
 Back End:
Web 2.0, RSS Feeds 2.0
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 13
2.3 Hardware Interface:
 Client Side:
 Desirable:
o 1GHz processor, 256MB RAM, any OS
 Standard:
o A web application can function across various platforms on minimum configurations required to run a web application which all contemporary workstation provide
 Server Side:
 Minimum requirements for installing IBM DB2:
o All Intel & AMD processors capable of running 32-bit or 64-bit OS
o 512 MB RAM and an additional ram per 5 client connections
o 3GB of Hard Disk space
 Minimum requirements for installing Web Sphere:
o All Intel & AMD processors capable of running 32-bit or 64-bit OS
o 375 MHz processor
o 2 GB RAM
o 6 GB of Hard Disk space
2.4 Product Functions:. Functional Requirements:
 Our website provides a platform for workers and costumers to interact on work basis It gives unorganized sector a organized feel and look.
 Workers are classified on the basis of their skills
 Multilingual chat and SMS service.
 All the users will be able to customize their profile as per their choice with the help of change account settings option.
 Worker can maintain the work calendar.
 Worker can view details information project (organized sector) in particular location.
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 14
 Worker is ranked by customer after every work .His ranking specifies his skill level, so a quality check.
 Awareness is provided to workers regarding their rights, governmental schemes ,health care(AIDS, STD, communicable diseases, etc) .
 Local language support is provided to workers / customers.
 Organized sector (contractors) can form /register his worker groups .
 The authentication process done by the admin is using valid documents .
 Administrator generates various reports graphs on strategic data.
Non-Functional Requirements:-
 Secure access of confidential data (user‟s details).
 24 X 7 availability
 Better component design to get better performance at peak time
 Flexible service based architecture for future extension
2.5 User Characteristics: Following are various users of our website:
 Administrator:- Administrator can perform any the task of the site .He can delete account on feedback basis ,generate reports ,organize events ,manage advertisements. In short all sort of updation , maintenance is done by the admin.
 Worker:- This user is center of attention of our site .He registers for a particular skill/skills and later get work information via SMS/email .His work calendar is maintained and he is rated after every job .He can also join a contractor‟s group .He is also helped by site by providing awareness regarding his rights, health, etc.
 General public:-They are job providers .They register and later search workers as per their job requirements .They are supposed to have small work needs. After the work is complete they provide feedback and rate the worker which helps in quality check of worker.
 Contractor:- He is supposed to be the bulk work provider. He can form/register his own worker group as per his needs. He also provides feedback and rating.
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 15
2.6 Constraints:
 The user login name should be unique and should contain more than 5 characters.
 Login name and password is used for the registered users .There is no facility for guest.
 Password should be a combination of letter, digits, symbols with at least 6 character having 1 symbol .
 Worker must have access to the internet and know the basics of internet, like registering for a portal.
 Worker has to constantly upgrade his work calendar through SMS or using website.
 Worker has to follow standard text format for reply via SMS.
 Workers wages are fixed according to his standards. No bargain.
2.7 Architecture Design:
Work for workers : Services to the unorganized sector
Version 1.0
Software Requirements Specification
15-12-2010
The Code Warriors
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 16
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 17
2.8 Use Case Diagram :
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 18
generates report(10)
orgainses events(6)
selects worker(9)
submits work detail(8)
gives feedback(7)
admin-1
contractor-4
general public-3
register(2)
user login(1)
manages profile(3)
chat/communication(4)
manages work calender(5)
worker-2
Multilevel use case diagram
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 19
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 20
selects worker(9)
submits work detail(8)
gives feedback(7)
contractor-4
general public-3
chat/communication(4)
Single level use case diagram
2.9 Class Diagram:
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 21
Package com.wtw.servlet
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 22
Package com.wtw.util
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 23
Work for workers : Services to the unorganized sector
Version 1.0
Software Requirements Specification
15-12-2010
The Code Warriors
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 24
Package com.wtw.bean
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 25
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 26
Package com.wtw.manager 2.10 Sequence Diagrams:
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 27
Sequence diagram1
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 28
Work for workers : Services to the unorganized sector
Version 1.0
Software Requirements Specification
15-12-2010
The Code Warriors
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 29
Sequence diagram2
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 30
Sequence diagram3 2.10.1 Database Design: 2.10.2 ER Diagram:
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 31
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 32
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 33
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 34
DATA DICTIONARY:- 1. USER TABLE
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 35
KEY
NAME
DATA TYPE
LENGTH
NULLABLE
PK
USER_ID
VARCHAR
10
NO
USER_NAME
VARCHAR
15
N0
PASSWORD
VARCHAR
15
NO
USER_TYPE
VARCHAR
15
NO
FIRST_NAME
VARCHAR
20
NO
MIDDLE_NAME
VARCHAR
20
NO
LAST_NAME
VARCHAR
20
NO
GENDER
VARCHAR
6
NO
D.O.B
DATE
NO
ABOUT_ME
BLOB
512KB
YES
CV
BLOB
512KB
YES
ADDRESS
VARCHAR
100
NO
CITY
VARCHAR
25
NO
STATE
VARCHAR
35
NO
EMAIL
VARCHAR
35
NO
PHONE NO.
INTEGER
NO
ID_PROOF_TYPE
VARCHAR
80
NO
ID_PROOF_PATH
VARCHAR
80
NO
LANGUAGES
XML
YES
ADV_STATUS
CHAR
1
NO
ONLINE_STATUS
CHAR
1
NO
HINT_QUEST
VARCHAR
80
NO
HINT_ANS
VARCHAR
80
NO
PIC_PATH
VARCHAR
200
YES
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 36
2. WORK
KEY
NAME
DATA TYPE
LENGTH
NULLABLE
PK
WORK_ID
VARCHAR
10
NO
FK
CUSTOMER_ID
VARCHAR
10
NO
FK
WORKER_ID
VARCHAR
10
NO
GROUP_ID
VARCHAR
10
NO
WORK_TYPE
VARCHAR
20
NO
WORK_LOC
VARCHAR
50
NO
WORK_LOC_CITY
VARCHAR
25
NO
WORK_LOC_STATE
VARCHAR
30
NO
WORK_DETAIL
BLOB
256KB
NO
WORK_STATUS
INTEGER
NO
COMMENTS
XML
NULLABLE
EST_TIME
INTEGER
NO
START_TIME
TIMESTAMP
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 37
FINISH_TIME
TIMESTAMP
3.WORKER
KEY
NAME
DATA TYPE
LENGTH
NULLABLE
FK
WORKER_ID
VARCHAR
10
NO
PREFFERD_LOC
XML
NULLABLE
QUALIFICATIONS
XML
NO
SKILLS
XML
NO
WORK_CAL
XML
NO
CHARGES_DAILY
DECIMAL
5,2
NO
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 38
CHARGES_HOURLY
DECIMAL
5,2
NO
GROUP_ID
VARCHAR
10
YES
R_SKILLS
INTEGER
NO
R_CHARGES
INTEGER
NO
R_TIME
INTEGER
NO
R_BEHAVIOUR
INTEGER
NO
4. CONTRACTOR TABLE
KEY
NAME
DATA TYPE
LENGTH
NULLABLE
FK
CONTRACTOR_ID
VARCHAR
10
NO
COMPANY_NAME
VARCHAR
50
NO
COMPANY_LOC
VARCHAR
50
NO
LICENSE
VARCHAR
50
NO
GROUP_ID
XML
NULLABLE
5. CHAT TABLE
KEY
NAME
DATA TYPE
LENGHTH
NULLABLE
PK
CHAT_ID
VARCHAR
10
NO
FK
SENDER_ID
VARCHAR
10
NO
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 39
FK
RECEIVER_ID
VARCHAR
10
NO
TIME
TIMESTAMP
NO
MSG
XML
NO
6. EVENTS TABLE
KEY
NAME
DATA TYPE
LENGTH
NULLABLE
PK
EVENT_ID
VARCHAR
10
NO
EVENT_ORG
VARCHAR
80
NO
DATE
DATE
NO
NAME
VARCHAR
40
NO
DETAILS
BLOB
512KB
NO
LOCATION
VARCHAR
40
NO
CITY
VARCHAR
40
NO
STATE
VARCHAR
40
NO
OTHERS
VARCHAR
500
NO
2.11 Assumptions and Dependencies:-
 We are assuming that the unorganized sector has access to web and know the basics of internet, like registering for a portal.
 Worker fills his work calendar properly.
 A user should have a valid identity proof .
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 40
3. Specific Requirements: 3.1 Use Case Reports: REGISTRATION will contain the attributes like (username, password, user ID, ID).ID choose by the visitor will describe the visitors profile. Visitors profile can be Admin, Contractor, General public, Worker from unorganized sector. On registration he will be directed to the profile info page where he will have to fill all the details.
 For every ID chosen, information to be filled has attributes (name, gender, age, address, e-mail, phone no, id-proof, user-id).
 If ID chosen represents WORKER then directed page will come with the information to be filled by worker correctly. Worker details will have attributes (worker id, education, Rating, comments, preferred work location, skills, experience, work calendar, charges).
 If ID chosen represents CONTRACTOR then directed page will come with the information to be filled by customer correctly. Contractor details will have attributes (Contractor id, Group id).this contractor id will be extended to the an extra profile info containing the information related to the GROUP with attributes (group id, worker id)
 If ID chosen represents GENERAL PUBLIC then directed page will come with the information to be filled by general public correctly. General Public details will have attributes (work id, work detail, work location, work time, work title, customer id, and confirmation).
Use Case narratives
Primary Actor
Use Cases
Worker
Login, Register, Manage profile, Chat/communication Maintain work calendar. logout
Administrator
Manages profiles, organizes events, generates reports Select worker
General public
Login, register, profile management, chat/communication, submit work detail, Feedback logout
Contractor
Login, register, manage profile, chat/communication, submit work detail, feedback
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 41
Use case reports:
1. Use case for ‘login’
Use Case ID:
1
Use Case Name:
login
Created By:
The code warriors
Last Updated By:
Date Created:
15-12-2010
Date Last Updated:
24-12-2010
Actors:
General public Worker contractor
Description:
As only registered users can use the system, every user has to provide his/her login information – login name and password – in order to use the system.
Trigger:
The user is prompted to enter his username and id for successful login.
Preconditions:
User requests to login to the system.
Postconditions:
The user is logged into the system and may use his type of functionality
Normal Flow:
1.The user is prompted to enter his password and username 2. after clicking submit, the user is logged in if the password and username ombination is correct.
Alternative Flows:
If the combination is not correct, the user is directed back to the same page, prompting him to enter the values correctly.
Exceptions:
No exceptions
Includes:
Priority:
High
Frequency of Use:
Used every time a user logs in. <infinite>
Business Rules:
Follows encryption at login level
Special Requirements:
No special requirements.
Assumptions:
User is assumed to login with valid username and password.
Notes and Issues:
Use case report for: register
Use Case ID:
2
Use Case Name:
Register
Created By:
Code warriors
Last Updated By:
Date Created:
15-12-2010
Date Last Updated:
24-12-2010
Actors:
Worker, general public, contractor
Description:
The user shall be able to create his profile. The user has to enter his personal information, login name, and password and all the information required for a valid profile..
Trigger:
The user is directed to the registration page as soon as he logs in successfully.
Preconditions:
The request is sent after completion of log in to create a profile.
Postconditions:
The user is directed to his profile page where he enters his required information.
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 42
Normal Flow:
The user enters the following information to his profile. The user enters his username and password. 1.User enters his personal details like his full name, address, e mail, date of birth. 2. The user uploads his profile picture. 3. The worker makes his work calendar. 4. The workers enroll themselves in the groups.
Alternative Flows:
1.If the user name already exists, the user is directed back to the page which prompts him to enter his username and password again. 2. The fields marked with „mandatory‟, if left unfilled directs the user back to the registration page.
Exceptions:
Registration is successful only if the user enters the information that is mandatory to be added in his profile.
Includes:
Login function.
Priority:
High
Frequency of Use:
Every time a user makes an account, this use case is used.
Business Rules:
Special Requirements:
Assumptions:
Notes and Issues:
Notes and Issues:
Use case report: manage profile
Use Case ID:
3
Use Case Name:
Manage profile
Created By:
Last Updated By:
Date Created:
15-12-2010
Date Last Updated:
24-12-2010
Actors:
General public Workers Contractor Administrator
Description:
Manage profile includes entering all the required information for making a profile. The description for various users is as: Workers
1. Workers enter their name, age, address, email address, phone number.
2. Worker maintains his work calendar.
3. Worker seeks work and confirms work requests.
4. Worker can communicate with other workers using the chat feature using his profile.
5. Worker uploads his photo and can share information using messages.
General public/contractor:
1. General public user enters his valid information like name, email, address, phone number.
2. Uploads profile photograph
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 43
3. Defines his work need and number of workers needed.
4. Provides valid feedback for the worker he availed.
Administrator
1. Administrator has the privilege to delete a profile thst is not valid or is in active.
2 Imports work calendar and decides which worker is free and accordingly assigns work.
2. Manages the feedback and ranking of the workers.
Trigger:
As soon as registration is complete the user is directed to his profile page where the information is added.
Preconditions:
All the fields required in registration must be complete.
Postconditions:
The services can be availed after completion of profile information.
Normal Flow:
All the fields marked with *mandatory should be filled. The user is directed to this profile page after successful completion of registration
Alternative Flows:
1.If all the fields are not submitted the user is directed back to profile page with a message that some fields are mandatory. 2. if al the data regarding the profile is added, the user is ready to avail the services
Exceptions:
No exceptions
Includes:
registration
Priority:
High
Frequency of Use:
Every time a user makes a profile, it is used. <<depends on number of users>>
Business Rules:
Special Requirements:
Assumptions:
Notes and Issues:
Notes and Issues:
Use case report: chat/ communication
Use Case ID:
4
Use Case Name:
Chat/communication
Created By:
“the code warriors”
Last Updated By:
Date Created:
15-12-2010
Date Last Updated:
24-12-2010
Actors:
Workers General public Contractor/builder
Description:
Chat/communication feature is used to make communication easy between worker, general public and contractor
Trigger:
Chat feature is enabled when user is online clicks on the availability option and makes it “available”
Preconditions:
The user must be logged in to use the feature of communication.
Postconditions:
As soon as user finishes his work and logs out of his profile, chat is disabled.
Normal Flow:
User logs in his profile and makes use of chat feature.
Alternative Flows:
If user is available he can chat and communicate with others.
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 44
Exceptions:
Some users may prefer to stay offline
Includes:
Profile
Priority:
Medium
Frequency of Use:
Depends on users
Business Rules:
Special Requirements:
Assumptions:
Notes and Issues:
Use case report: manage work calendar
Use Case ID:
5
Use Case Name:
Manage work calendar
Created By:
Last Updated By:
Date Created:
15-12-2010
Date Last Updated:
24-12-2010
Actors:
Workers Administrator
Description:
It includes managing the work calendar, ie the worker‟s availability on any given day. It includes all the working days and free days. Work calendar also includes the details of the work that worker did, like number of hours etc. Administrator: The admin selects the worker after inspecting his work schedule.
Trigger:
As soon as worker logs in his profile and gets a work request.
Preconditions:
The worker must be logged in. Worker should get a work request.
Postconditions:
Worker gets work on basis of his schedule.
Normal Flow:
Login>profile>work calendar
Exceptions:
No exceptions
Includes:
profile
Priority:
high
Frequency of Use:
Every time user logs in his profile for finding work<<<high>
Business Rules:
Special Requirements:
Assumptions:
Notes and Issues:
Notes and Issues:
Use case report: organize events
Use Case ID:
6
Use Case Name:
Organize events
Created By:
Last Updated By:
Date Created:
15-12-2010
Date Last Updated:
24-12-2010
Actors:
Administrator
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 45
Description:
The administrator organizes events such as training for the workers, etc.
Trigger:
Whenever an event is organized, this action is fired.
Preconditions:
There should be enough users for the system
Postconditions:
The event is stored on the home page
Normal Flow:
Administrator sends requests to the users for participation, the users acknowledge their willingness to participate using their profiles.
Alternative Flows:
If the event is cancelled, the users are directed back to their profiles and not the event page.
Exceptions:
Event may or may not occur
Includes:
Profiles
Priority:
Low
Frequency of Use:
Less frequent
Business Rules:
Special Requirements:
Assumptions:
Notes and Issues:
Use case report: feedback
Use Case ID:
7
Use Case Name:
Feedback
Created By:
Code warriors
Last Updated By:
Date Created:
15-12-2010
Date Last Updated:
24-12-2010
Actors:
General public Contractor/builder Administrator
Description:
General public The people who avail the services of the workers provide a valid feedback about the workers Contractor The contractors who avail the services of the workers will provide a feedback about them. Administrator Manages all the feedback from the general public and the contractor
Trigger:
General public and contractors provide feedback in their profiles After the completion of work.
Preconditions:
1.Work should have been completed and work Calander updatd by worker 2.users providing feedbacks should be loged in
Postconditions:
Feedback is generatred and users are directed back to their profile page
Normal Flow:
1.general public>profile>feedback 2.contractor>profile>feedback
Alternative Flows:
Exceptions:
Users may opt no to provide feedbacks
Includes:
profiles
Priority:
medium
Frequency of Use:
Frequent
Business Rules:
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 46
Special Requirements:
Assumptions:
Notes and Issues:
Use case reports: submit work details
Use Case ID:
8
Use Case Name:
Submit work details
Created By:
The Code warriors
Last Updated By:
Date Created:
15-12-2010
Date Last Updated:
24-12-2010
Actors:
1.General public 2.contractor/builder
Description:
Submits work detail of the work to be performed.details include 1.type of work 2.work location 3.no. of workers needed 4.time of work
Trigger:
When user logs in his profile and wants to avail services
Preconditions:
User must be logged in
Postconditions:
User gets confirmation message after availability of workers is confirmed by the system.
Normal Flow:
General public>login>profile>work specification>confirmation message contractor>login>profile>work specification>confirmation message
Alternative Flows:
Exceptions:
Includes:
Profiles
Priority:
<<high>>
Frequency of Use:
<<high>> every time user needs work, he uses this use case.
Business Rules:
Special Requirements:
Assumptions:
Notes and Issues:
Use case report: logout
Use Case ID:
9
Use Case Name:
logout
Created By:
Last Updated By:
Date Created:
15-12-2010
Date Last Updated:
24-12-2010
Actors:
Workers
Work For Workers: Services to unorganized sector Version 1.0
Work for workers : Services to the unorganized sector Version 1.0
Software Requirements Specification 15-12-2010
The Code Warriors
THE CODE WARRIORS Page 47
General public Contractor/builder
Description:
After the user ends working with the system, he logs out in order no one can use his profile.
Trigger:
As soon as user clicks on the logout button!!
Preconditions:
The user requests to log out from the system.
Postconditions:
The user is logged out from the system.
Normal Flow:
All settings are saved and user logs out.
Alternative Flows:
Exceptions:
Includes:
profiles
Priority:
<<high>>
Frequency of Use:
<<high>>
Business Rules:
Special Requirements:
Assumptions:
3.2 Supplementary Requirements: <Team Name>/ <College Name> Page 9

Types Of Bugs

Posted: February 1, 2011 in Technology/Programming

Jim gray in his popular presented some of the bugs which are named after some famous scientist names.

Bohrburgs :

Most of the bugs that we come across are reproducible, and are known as bohrbugs. They are named after niel bohr, who proposed a simple and easy to understand atomic model in 1913. In bohr’s modelthings like the path and the momentum of the electron in ana atom are predictable. Similarly bohrbugs are predictable-you can produce them if you run a software with similar conditions. For example when the program crashes with a null pointer access, it always crashes there for a given input; so ypou can easily reproduce it.

Heisenbugs:

All experienced programmers have faced situations where the bug that crashed the software just disappears when the software is restarted. No matter how much time and effort is spent trying to reproduce the problem, the bug eludes us. Such bugs were named as heisenbugs, after Werner Heisenberg, who is known for his ‘uncertainity principle’. According to his theory, it is not possible to accurately or certainly determine the position and velocity of an electron in an atom at a particular moment. When bugs change their behavior when you try to debug, probe or isolate, they are called as heisenbugs. It can happen for example, when you use uninitialized variables. When the program is run, it will access the variables that are uninitialized and hence result in a bug. However when you try to debug the program, the program must work just fine, because many de buggers initialize uninitialized variables to zero’s and so you might not hit the problem!!

Mandelbugs

When the cause of the bug is too complex to understand and the resulting bug appears too chaotic, it is called a mandelbug. These are named after benoit Mandelbrot, who is considered the father of fractal geometry(  fractals are complex, self similar structures). A bug in an operating system that depends on scheduling is an example of mandelbug.

Schrodenbug

Sometimes you look into the code, and find that it has a bug or a problem that should have never allowed it to work at the first place. When you try out the code, the bug promptly shows up, and the software fails!!!

Though it sounds very uncommon, such bugs do occur and are known as schrodinbugs. They are named after the scientist Erwin schrodinger, who proposed a theoretical ‘cat experiment’. In quantum physics,quantum particles like atoms could exist in two or more quantum states, but schrodinger suggested that in more classical objects like a cat which is made up of many atoms, existing in two states was impossible. He theorized about a scenario in which a cat a cat is kept in a sealed chamber, with a vial of poison ( attached to radioactive atom). If the atom decayed, the voil would be smashed and the poson would leak, killing the cat. But with chamber sealed there could be no way to know whether the cat is dead or alive. So till the chamber is opened, theoretically the cat would be in two states-dead or alive. In quantum physics this is called as superposition state, where the cat is both alive and dead.

Coming back to bugs, by merely observing the problem in the code, you change the outcome-either the software works or breaks. So these kind of bu

 

**Twisted twilight**

Posted: February 1, 2011 in Entertainment/Humour

Ah I just finished reading a rather funny book called as ‘Twilight’ , by Stephanie Meyer, thank GOD my laptop stopped working the day I got the DVD by the same name!! To be really honest, it was ‘suggested’ by someone I thought had good taste of books, I am tempted to think about your choices now honey!!!
After all that I suffered while reading thru the pages of the ‘twilight’ tale, I decided to relax for sometime, and I really need to thank a dear fren of mine for her ‘stress busting technique’, believe me writing this would not have been possible in that ‘state of mind’ without that!!
Now I am not going to trouble anyone by narrating the vampire story, I am going to make you people laugh on the ‘vampire story’.. believe me you will see ‘twilight saga’ in a whole different avatar here!!

To summarize the storyline, Edward is an Adonis-lookalike vampire who distanced himself from standard-issue vampires and went on one of those low-carb, non-human diets. He mingles with humans, pretending to be human, and attends high-school. In lunch and other recess times, he practices being awesome. Along comes the classic dumb heroine, Bella, who is beautiful but doesn’t know it, has everything but brains. To Edward she smells like irresistible food and makes his life miserable. So our 100-year-old vampire eventually falls in love with 17-year-old Bella. Talk about age gap. In case I haven’t mentioned it, the author reminds you every two pages that Edward is an awesome personification of awesomeness. I was\really awe stuck!! Rest of the story is the standard formula. Add forbidden love, a pinch of angst and a villain and shake it. Out pours a saccharine love story.
As you can see, the story is just laughable. I kept imagining somebody falling in love with their food. To give you a better picture, here is how the story will look like if told by Edward, a human being, who falls in love with his food.

I am Edward. I am a human being. I used to eat chicken for breakfast, lunch and dinner and when I got hungry in the middle of the night. But I became a vegetarian. I vowed not to eat chicken any more. In fact, I go to school with a flock of chicken and pretend to be a chicken myself.
One day, this extraordinary chicken waltzed into my class! It smelled just like Butter Chicken Masala . I was overcome with hunger. It started looking like a barbecued chicken, so enticing, so inviting. But at the same time, I was terribly attracted to it too! I had all these feelings I couldn’t understand. Let’s just say, chicken breast started meaning more than just a sandwich to me. I was confused. Testosterone and hunger fought for control over my body. I wanted to kiss its delicate wing, make sandwich out of it, cuddle it and whisper Chicken-65 recipe softly into its Ah I just finished reading a rather funny book called as ‘Twilight’ , by Stephanie Meyer, thank GOD my laptop stopped working the day I got the DVD by the same name!! To be really honest, it was ‘suggested’ by someone I thought had good taste of books, I am tempted to think about your choices now honey!!!
After all that I suffered while reading thru the pages of the ‘twilight’ tale, I decided to relax for sometime, and I really need to thank a dear fren of mine for her ‘stress busting technique’, believe me writing this would not have been possible in that ‘state of mind’ without that!!
Now I am not going to trouble anyone by narrating the vampire story, I am going to make you people laugh on the ‘vampire story’.. believe me you will see ‘twilight saga’ in a whole different avatar here!!

To summarize the storyline, Edward is an Adonis-lookalike vampire who distanced himself from standard-issue vampires and went on one of those low-carb, non-human diets. He mingles with humans, pretending to be human, and attends high-school. In lunch and other recess times, he practices being awesome. Along comes the classic dumb heroine, Bella, who is beautiful but doesn’t know it, has everything but brains. To Edward she smells like irresistible food and makes his life miserable. So our 100-year-old vampire eventually falls in love with 17-year-old Bella. Talk about age gap. In case I haven’t mentioned it, the author reminds you every two pages that Edward is an awesome personification of awesomeness. I was\really awe stuck!! Rest of the story is the standard formula. Add forbidden love, a pinch of angst and a villain and shake it. Out pours a saccharine love story.
As you can see, the story is just laughable. I kept imagining somebody falling in love with their food. To give you a better picture, here is how the story will look like if told by Edward, a human being, who falls in love with his food.

I am Edward. I am a human being. I used to eat chicken for breakfast, lunch and dinner and when I got hungry in the middle of the night. But I became a vegetarian. I vowed not to eat chicken any more. In fact, I go to school with a flock of chicken and pretend to be a chicken myself.
One day, this extraordinary chicken waltzed into my class! It smelled just like Butter Chicken Masala . I was overcome with hunger. It started looking like a barbecued chicken, so enticing, so inviting. But at the same time, I was terribly attracted to it too! I had all these feelings I couldn’t understand. Let’s just say, chicken breast started meaning more than just a sandwich to me. I was confused. Testosterone and hunger fought for control over my body. I wanted to kiss its delicate wing, make sandwich out of it, cuddle it and whisper Chicken-65 recipe softly into its ear.
The chicken had uncontrollable attraction for me too. What can I say, chicks dig me. I tried to persuade her to leave me. I confessed my hunger for her. I explained to her the various senses of the sentence, but She wouldn’t relent. She had dreams of marrying me.
When the love story between us was cooking, another human laid his eyes on my chicken. He wanted it for a dinner date, where the date becomes dinner. I protected my feathered friend and made it mine.
I implored it to leave town, find greener pastures; I didn’t want to clip its wings. But it decided to abandon all its family for a human it knew for about 2 months and stay with me. Now I know why they call it chicken brain. We were a happy couple. Rest of the story is for birds.

ear.
The chicken had uncontrollable attraction for me too. What can I say, chicks dig me. I tried to persuade her to leave me. I confessed my hunger for her. I explained to her the various senses of the sentence, but She wouldn’t relent. She had dreams of marrying me.
When the love story between us was cooking, another human laid his eyes on my chicken. He wanted it for a dinner date, where the date becomes dinner. I protected my feathered friend and made it mine.
I implored it to leave town, find greener pastures; I didn’t want to clip its wings. But it decided to abandon all its family for a human it knew for about 2 months and stay with me. Now I know why they call it chicken brain. We were a happy couple. Rest of the story is for birds.

Facebook Application fatigue

Posted: February 1, 2011 in Social networking

If you are one of those fellows who hates to see his facebook profile full of application requests, this is a good read for you: I have just over two hundred friends on ‘facebook’ and yet I still can’t see any point to it. off late I have been logging in just to clear the backlog of invitations to pointless applications that allow me to find out ‘who will try to murder me’ and ‘who will try to save me’ and the likes, like I am requested to open something called as ‘lifebox’, which pops out with ‘gift’ for the day. This is not just it, if you want me to mock some other applications with meagre code and functionality I am all ready for it, I don’t quite understand how people let ‘third party’ websites to access their information and too without their consent. Facebook is already trading off your information, isn’t that enough for you kiddo?? Or don’t you feel ‘noise’ on the otherwise social network or is it just me who am having this weird feeling? I don’t know how many of you consider ‘facebook’ a boring venture now, but I never did and my feelings changed like anything after two years of existence on the network. There is no extension to the network beyond the people who already know you somehow or there is some connectivity, I believe ‘facebook’ gives you no functionality to demonstrate your value to the broader network and this is very unlike of other social networks like ‘Digg’ and ‘StumbleUpon’ or twitter for that purpose where you follow people and get followed purely because of common interests, inspirations and purposes. ‘Facebook is effectively static’ as written by Robin Cannon, who blogs regularly on his site ‘fog of eternity’, and add to this static nature, the application part of the facebook. If I am not lying, my profile reads as 251 application requests and 233 game requests and a few cause requests as well, who is to blame for it all, not the sending parties, they obviously are caught in the viral trap of the applications that demand them to send requests to twenty or ten people before installation to their profile nor or the people who develop these applications for facebook, it is their business, they do it in fair or unfair way and it works for them! The site is popular with such people because it is effectively a provider of simple and time wasting entertainment, few of the applications provide any functionality and those applications are so easily lost in the morass that they can’t develop. There are evidences that facebook users are beginning to suffer from something called as ‘application fatigue’. And there is growing discontent on the amount of noise that ‘application platform’ has generated in the facebook ecosystem. The facebook platform allowed application developers to flood the site with the applications both useful and not<7 out of ten are useless> and because of the way it was set up, the platform encouraged the developers to trick the users into sending out mass invites, this increased the noise on the network to tenfold and decreased the enjoyment of social networking for some people. I am not the first one to show the discontent with all this, I am sure if you are reading this you too belong to same class, in just over a month 65thousand people have joined the group, ‘No I will NOT invite twenty friends just to add your application’, and more than42232 people have signed a petition calling on facebook to step in and stop developers from using this viral scheme of things for their own gains. Facebook currently has some 16thousand applications on board, how many of them are useful?? How many of them are just disguised advertisements and information sucking tools?? How many of them are facebook approved?? How many of them are you using?? Now a real bad part of the applications: Besides annoying users like me with spam and scam every day and not to mention of the notifications that I get when I automatically become someone’s best friend just because I happen to like his status update most times and get tagged in someone’s murderer application, ahh it annoys me like nothing else, I am ready to baby sit for a day but spare me of these application requests and trauma!! Now I happened to search for some good applications on facebook, spent some days in this venture, no doubt I found some of them, of course I needed a dummy profile to experiment with all that devil developers develop and protect people in my list from getting really annoyed on my research, I found something which is quite a thing to worry or panic, you can say so.. yeah most of the facebook applications do not have a published ‘privacy policy’, after all privacy policy is where the company spells out exactly what they can and will do with your personal user information. The top 25 facebook applications disappointed me a bit, 36% of them have no published privacy policy and just offer you a link after you authorize the application, it was hard to believe that 12 of these facebook applications are facebook verified which obviously means that they are trustworthy when it comes to sharing information, but where is your privacy policy boss?? How facebook defends itself. There is an anonymous blogger who is owner of the site referred to as ‘social hacking’, he writes in his blog that “facebook’s ‘Application Terms Of Service” warns you<shouts at you in UPPERCASE> that “ALL PLATFORM APPLICATIONS ARE PROVIDED AS IS” and AGREE THAT YOU DOWNLOAD, INSTALL AND/OR USE ANY PLATFORM APPLICATIONS AT YOUR OWN DISCRETION AND RISK” Within your privacy settings you’re also informed that: “When you authorize an application, it will be able to access any information associated with your account that it requires to work. The application can access information like your personal info and photos as well as your friend’s personal info, depending on their settings” But the question still remains, why doesn’t facebook make applications offer their own privacy policy?? Although it is not in the best interests of facebook to do so and not really feasible at this stage but there is something that it can do, there is already a link “report this application” provided at the bottom of the application pages. The link currently allows the users to report privacy violations, so why not let users report for the lack of privacy policy as well?? Although the majority of users would still probably never look at the privacy policy even if the changes were made, having them consistently and prominently displayed would at least put some pressure on developers about how they are going to use the information of the users.   Solution Most of the facebook applications are lame, if not they are stupid time wasters and spamming machines, however there are few applications that are good to use and you will feel good using them, here is the list I could gather from internet, I am not using any of these so it is entirely as per some prominent users and bloggers review!! Don’t forget to read “privacy policy”

  1. Evanescence song best describes you.
  2. imo.im messenger
  3. Call Me On Skype
  4. Carpool
  5. Yahoo! Music Videos
  6. My Restaurants
  7. Takes All Types.
  8. Find A Better Job.
  9. Top Groups.
  10. 10.  Jobster