Friday, November 10, 2017

Epic v Stories vs Bugs

We have stories, epic and bug while creating an issue in JIRA system.

Here is difference between Epic v Stories vs Bugs

Epic:
An Epic can be defined as a big chunk of work that has one common objective. It could be a feature, customer request or business requirement. In backlog, it is a placeholder for a required feature with few lines of description. It tells compactly about final output of user needs. In the beginning, it may not contain all the details that team needs to work on. These details are defined in User Stories. An epic usually takes more than one sprint to complete.

User Stories
Epics are large user stories, typically ones which are too big to implement in a single iteration and therefore they need to be disaggregated into smaller user stories at some point. A user story is a very high-level definition of a requirement, containing just enough information so that the developers can produce a reasonable estimate of the effort to implement it

Bugs:
A software bug is an error, flaw, failure or fault in a program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways based on the backlog or features in software cycle.
While communicating a bug, we need to make sure that a potential problem exists in the code that your team is developing. When you define a bug, you want to accurately report the problem in a way that helps the reader to understand the full impact of the problem. You should also describe the actions that you took to find the bug so that other members of the team can more easily reproduce the behavior. The test results should clearly show the problem. Clear, understandable descriptions affect the probability that the bug will be fixed.

Hope this helps!

Thanks

Friday, October 20, 2017

Different versions of Windows 10

There will be seven different versions, Microsoft says in a blog post .

Here they are:

  • Windows 10 Home, which is the most basic PC version.
  • Windows 10 Pro , which has touch features and is meant to work on two-in-one devices like laptop/tablet combinations, as well as some additional features to control how software updates get installed - important in the workplace.
  • Windows 10 Enterprise, which will have extra management features.
  • Windows 10 Mobile  for smartphones.
  • Windows 10 Mobile Enterprise , which is like the one above, but with more business management features.
  • Windows 10 Education, which is optimized for schools.
  • Windows 10 IoT Core, which is for robots, smart sensors, and - well, if you need it, you'll know it.

Thursday, October 05, 2017

javascript - .includes() not working in Internet Explorer

includes is not supported in Internet Explorer (or Opera)

Instead you can use indexOf. #indexOf returns the index of the first character of the substring if it is in the string, otherwise it returns –1

or you can use below function to in your javascript and you can still use include to work in IE10 / IE11

//IE 10/IE11 fix for includes function
String.prototype.includes = function () {
    'use strict';
    return String.prototype.indexOf.apply(this, arguments) !== -1;
};

Hope this helps!

Monday, September 11, 2017

Add or Remove a Column to a WebDataGrid

I have been using Infragistics for long, I have gone through this scenario many times. Hope this helps few people.  The following code shows you how to add bound data field and a template data field.


private void AddReferenceFieldColumnstoWebGrid()
        {
            DataTable dtConfigureReffields = crBl.GetConfigureReferenceFields(intCompanyId, intAccountId);

            // NS: Commenting
            // Adding colums dynamically.
            // if we matched these column kyes with grid result
            // binding will take care automatically
            string strReferenceFieldName;
            int intOffset = 11;  // position where to start after ref field. 
             //this is the place where we add these columns. for me i will get dynamic columns
             // from the datatable.
            for (int j = 0; j < dtConfigureReffields.Rows.Count; j++)
            {
                strReferenceFieldName = "";
                BoundDataField boundField1 = new BoundDataField(true);
                strReferenceFieldName = "reference" + (j + 2);
                boundField1.Key = strReferenceFieldName;
                boundField1.Header.Text = dtConfigureReffields.Rows[j]["name"].ToString();
                boundField1.DataFieldName = strReferenceFieldName;

                // ADD COLUMNS
                this.referenceFieldApprovalQueueUltraWebGrid.Columns.Insert(intOffset, boundField1);
                intOffset++;
            }
        } 
    

To remove column for the grid, add this below code after databind of webdatagrid.

// REMOVE COLUMNS
this.WebDataGrid1.Columns.Remove(this.WebDataGrid1.Columns["Ref1"]);   

Sunday, March 19, 2017

What is a Malware and its differences?

Cyber Security

Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

What is a Malware

Computer Security Risks is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

Malware is software written specifically to harm and infect the host system. Malware includes viruses along with other types of software such as trojan horses, worms, spyware, and adware. Advanced malware such as ransomware are used to commit financial fraud and extort money from computer users.

Common types of malware:

  • Virus: As discussed, Virus is a specific type of malware by itself. It is a contagious piece of code that infects the other software on the host system and spreads itself once it is run. It is mostly known to spread when software is shared between computers. This acts more like a parasite.
  • Adware: Adware is also known as advertising-supported software. It is software which renders advertisements for the purpose of generating revenue for its author. The advertisements are published on the screen presented to the user at the time of installation. Adware is programmed to examine which Internet sites, the user visits frequently and to present and feature related advertisements. Not all adware has malicious intent, but it becomes a problem anyway because it harms computer performance and can be annoying.
  • Spyware: This type of malicious software, spies on you, tracks your internet activities. It helps the hacker in gathering information about the victim’s system, without the consent of the victim. This spyware’s presence is typically hidden from the host and it is very difficult to detect.
  • Worms: This type of malware will replicate itself  and destroys information and files saved on the host PC. It works to eat up all the system operating files and data files on a drive.
  • Trojan: Trojans are a type of virus that are designed to make a user think they are a safe program and run them. They may be  programmed to steal personal and  financial information, and later take over the resources of the host computer’s system files.  In large systems it may attempt to make a host system or network resource unavailable to those attempting to reach it.
  • Ransomware: Ransomware is an advanced type of malware that restricts access to the computer system until the user pays a fee.  Your screen might show a pop up warning that your have been locked out of your computer and  that you can access only after paying the cyber criminal. The cyber criminal demands a ransom to be paid in order for the restriction to be removed. The infamous Cryptolocker is one type of ransomware.

It is very difficult to live without computers or mobile devices and we have come to depend on them for many activities – communication, online purchases and payments, etc.., In order to protect our devices and data against the different types of malware mentioned above, an effective anti-malware solution is required.

Though it is commonly believed that free antivirus products are not effective enough here a link which was suggested by #PCMag for top 10 Free anti virus in this year. These are as effective as paid software's