Who Invented Dell Computers?

The invention and the history of the Dell computer is quite interesting. First of all, it was in 1984 when Michael Dell, a student at the University of Texas at Austin, created the company PC's Limited. He only had a starting capital of $ 1,000. So what he did was started working out of his dorm room to build personal computers made from stock components. These computers were to be IBM compatible because that was the standard at that time. If a computer were to function with various pieces of hardware, it needed to be IMB compatible.

It is when Michael Dell figured that selling computers directly to customers to determine customer need that he dropped out of college. His family then extended him the $ 300,000 in expansion capital that he needed to make his business take off.

A success

It was in 1985 that the Turbo PC was developed and it sold for less than $ 800. It contained an Intel 8088 processor that ran at 8 MHz, which is significantly slower than the computers that we use today. Computers today are running in gigahertz, which are hundreds and even thousands of times faster than the 8 MHz processor that Michael Dell was installing in his computers at the time. But the truth is that this was the best that could be done in 1985. The technology was developing.

But there was an aspect of PC's Limited that was unique from the rest and continues to be this way today. It is the fact that customers could order their computers rather than buy a computer that was already assembled. This allowed individuals to receive computers at lower prices than what they could get with their competitors. This definitely worked because PC's Limited grossed $ 73 million in its first year of trading.

The beginning of Dell

It was in 1988 that PC's Limited became Dell. Prior to that, the company already had 11 international operations occurring, so the company was quite large. There were on site services set up to compensate for the lack of businesses acting as service centers for Dell computers. It was in 1990 that Dell attempted to sell through club houses, but had very little success with this. So it is then that Dell went right back to its direct to customer sales.

In 1996, Dell started selling computers on its website. An individual could go onto the website and custom design their computer so that it would be built to their specifications. From there, it would be shipped to the customer's home. Financing was made available so that individuals would be able to acquire their computers easily.

In 1999, Dell became the largest personal computer seller when they took over Compaq computers. Their revenue topped $ 25 billion in 2002. Also in 2002, Dell started selling televisions and other electronic items. They now have Dell brand printers, LCD TVs, and much more. Because of the expansion beyond computers, Dell was changed to Dell Inc. In 2003.

It is amazing that this billion dollar company started in a dorm room with $ 1000 in starting capital. And Michael Dell has always stood by the principles of letting individuals have the capability to design their own machine. Although there are Dell computers now sold in various retail outlets, a person can still go to the website and design the machine of their dreams. And Dell also offers a lot of assistance for individuals needing help with their computers. They offer on-site services and so much more for the computer user so that they can have the best experience possible.

Posted in general | Comments Off on Who Invented Dell Computers?

The Leading Gaming PC Cases Are Essential To Help Protect and Power Your Extreme Gaming Hardware

Gaming PC Cases come in a variety of shapes and sizes. From rack mount to ATX tower casing, you can find one that best suits your gaming needs. Many games are played by as many 15-24 users and such games require the power of hardware to control both the graphics and many millions of instructions to the CPU with great speed. Custom Gaming PCs are the current rave with game lovers who strive for a better playing experience, adding more hardware.

With a large variety of casing, it is confusing to choose the right one. A good PC Case for gaming is one that has ample space to add more fans and USB ports. Heating is the main problem that slows down the PC and in some instances can damage it. Looks also matter a lot, an attractive and next-gen look, makes for a better playing experience.

All gaming PC cases come with microphones and headphone sockets, while the more advanced ones have fan controllers. New game players can do with two fans while some want to get additional fans to keep the PC from heating up. More advanced users utilize much of CPU power, and need more cooling.

When you are ready to buy a case, first look at the price options, compare various makes and models and see where you can save money and get the same functionality. The most accommodating case is considered the best. It will allow for more fans, and offers ample space for advanced graphic cards. Check to see, if the case can allow more than 4 fans and has at least two USB ports.

Some cases come with 4 USB ports and have space for up to six fans. If you are an advanced level player, you may want to consider one that has a fan speed controller, so you can monitor the cooling easily. Further up the ladder, there are cases that come with space for as many as 12 hard drives. Such a case, can take any kind of mother board you want to use.

The ATX are more popular these days and are like the industry standard. ATX form-factor allows for better air passage so all components can stay cool. It uses less cable, generates less heat and is more affordable. The expansion slots are easily accessible making it easy for users to add more graphic cards.

Looks wise, a clear panel looks attractive and spices up the computer using LEDs. There are also cases with bright graphics, and a modish look to add to the adventure. It all depends on your game choice, if you like a good thrill considering Gaming PC Cases that will add excitement to game time.

Posted in general | Comments Off on The Leading Gaming PC Cases Are Essential To Help Protect and Power Your Extreme Gaming Hardware

Mortgage Loan Origination Software – 10 Functions of Mortgage Banking

Regardless of a mortgage lending organizations’ size, mortgage loan software, data security solutions and automation tools and services should be able to assist with mortgage loan automation requirements. In today’s chaotic mortgage lending environment origination and document security systems need to be easily configured to emphasize a company’s special needs and increase efficiencies across all aspects of the loan origination process, allowing lenders to increase quality and productivity.

Technology-driven automation is the key to succeeding in the increasingly complex, deeply scrutinized mortgage industry. Web-based (Software-as-a-Service), Enterprise mortgage software that supports the ten primary functions in mortgage banking will provide lenders with the necessary competitive advantages to succeed in today’s mortgage industry.

Ten Primary Functions in Mortgage Banking

  1. Mortgage Web site design, implementation, and hosting to provide product, service, loan status, and company information to mortgage customers and business partners
  2. Online loan applications for gathering information from borrowers and business partners that issue loan terms, disclosures, and underwriting conditions
  3. Loan origination software for managing loan data, borrower data, property data, general status reporting, and calculations
  4. Interface systems to send and receive data from real estate service providers, such as credit reports, flood determinations, automated underwriting, fraud detection, and closing documents
  5. Internal automated underwriting system that is simple enough for originators and sophisticated enough for underwriting portfolio loan products
  6. Document generation for applications, upfront disclosures, business processes, and closing documents
  7. Integrated imaging that is used from loan origination to investor delivery and for file archiving
  8. Interest rate and fee generation along with program qualification guidelines
  9. Secondary marketing data tools to track loan revenue and investor relationships, including warehouse line management and interim servicing to complete the back-office system
  10. Reporting such as loan delivery, year-end fee reporting, and HMDA reporting for loan application disposition

Web-Based, enterprise mortgage software that supports the ten primary functions of mortgage banking simplifies compliance, maximizes operational efficiencies, and increases profitability.

Posted in general | Comments Off on Mortgage Loan Origination Software – 10 Functions of Mortgage Banking

Choosing the Right SDLC For Your Project

Choosing the right SDLC (Software Development Lifecycle) methodology for your project is as important to the success of the project as the implementation of any project management best practices. Choose the wrong software methodology and you will add time to the development cycle. Adding extra time to the development cycle will increase your budget and very likely prevent you from delivering the project on time.

Choosing the wrong methodology can also hamper your effective management of the project and may also interfere with the delivery of some of the project’s goals and objectives. Software development methodologies are another tool in the development shop’s tool inventory, much like your project management best practices are tools in your project manager’s tool kit. You wouldn’t choose a chainsaw to finish the edges on your kitchen cabinet doors because you know you wouldn’t get the results you want. Choose your software methodology carefully to avoid spoiling your project results.

I realize that not every project manager can choose the software methodology they will use on every project. Your organization may have invested heavily in the software methodology and supporting tools used to develop their software. There’s not much you can do in this case. Your organization won’t look favorably on a request to cast aside a methodology and tools they’ve spent thousands of dollars on because you recommend a different methodology for your project. We’ll give you some tips on how to tailor some of the methodologies to better fit with your project requirements later in this article. In the meantime, before your organization invests in software development methodologies you, or your PMO, ought to be consulted so that at least a majority of projects are benefited from a good fit.

This article won’t cover every SDLC out there but we will attempt to cover the most popular ones.

Scrum

Scrum is a name rather than an acronym (which is why I haven’t capitalized the letters), although some users have created acronyms, and is commonly used together with agile software development. Scrum is typically chosen because of its iterative nature and its ability to deliver working software quickly. It is chosen to develop new products for those reasons. There is typically no role for a project manager in this methodology, the 3 key roles are: the scrum master (replacing the project manager), the product owner, and the team who design and build the system. There is only one role that you would be asked to play if your organization is committed to using this methodology, scrum master. If you should determine that this would actually be the best methodology for your project, you’ll have to re-examine your role as project manager. You can either identify a suitable scrum master and return to the bench, or fill the role of scrum master.

Scrum suits software development projects where its important for the project to deliver working software quickly. Scrum is an iterative methodology and uses cycles called sprints, to build a working system. Requirements are captured in a “backlog” and a set of requirements is chosen with the help of the product manager. Requirements are chosen based on 2 criteria: the requirement takes priority over others left in the backlog and the set of requirements chosen will build a functioning system.

During the sprint, which can last from 2 to 4 weeks maximum, no changes can be made to the requirements in the sprint. This is one of the reasons that a project manager isn’t necessary for this methodology. There is no need for requirements management because no changes are allowed to the requirements under development. All changes must occur in the requirements set in the backlog.

Scrum will be suitable for software development projects where the product is a new software product. By new I mean that it is new to the organization undertaking the project, not in general. The methodology was developed to address a need for a method to build software when its necessary to learn on the fly, not all requirements are known to the organization and the focus is on delivering a working prototype quickly to demonstrate capabilities. You need to be careful when choosing requirements to deliver in each sprint to ensure that the set developed builds a software system that is capable of demonstrating the feature set supporting the requirements included.

You also need to ensure that these requirements are well known and understood as no changes are allowed once the sprint starts. This means that any changes to the requirements must come through a new set of requirements in the backlog making changes to these requirements very expensive.

This methodology divides stakeholders into 2 groups: pigs and chickens. The inventors of this methodology chose this analogy based on the story of the pig and the chicken – it goes something like this. A pig and a chicken were walking down the road one morning and happened to notice some poor children who looked like they hadn’t eaten for days. The compassionate chicken said to the pig: “Why don’t we make those children a breakfast of ham and eggs?” The pig said: “I’m not happy with your suggestion. You’re just involved in making the breakfast, I’m totally committed!” The point to this is the product owner, scrum master, and team are all in the “pig” group. All others are in the “chicken” group. You will be in the “chicken” group if you choose the Scrum methodology as a project manager.

Waterfall

Waterfall methodology calls for each phase of the development cycle to be repeated once only. Requirements will be gathered and translated into functional specifications once, functional specifications will be translated to design once, designs will be built into software components once and the components will be tested once. The advantage of this methodology is its focus. You can concentrate the effort of all your analysts on producing functional specifications during one period rather than have the effort dispersed throughout the entire project. Focusing your resources in this way also reduces the window during which resources will be required. Programmers will not be engaged until all the functional specifications have been written and approved.

The disadvantage of this approach is its inability to teach the project team anything during the project. A key difference between the waterfall approach and an iterative methodology, such as Scrum or RUP, is the opportunity to learn lessons from the current iteration which will improve the team’s effectiveness with the next iteration. The waterfall methodology is an ideal methodology to use when the project team has built software systems very similar to the one your project is to deliver and has nothing to learn from development that would improve their performance. A good example of a project which would benefit from the waterfall methodology is a project to add functionality to a system the project team built in the not too distant past. Another example of an environment that is well suited to the waterfall methodology is a program to maintain a software system where a project is scheduled for specific periods to enhance the system. For example, an order and configuration software system which is enhanced every 4 months.

The waterfall methodology does not lend itself particularly well to projects where the requirements are not clearly understood at the outset. Iterative approaches allow the product owners or user community to examine the result of building a sub-set of requirements. Exercising the sub-set of requirements in the iteration’s build may cause the product owners or user community to re-examine those requirements or requirements to be built. You won’t have that opportunity with the waterfall method so you need to be certain of your requirements before you begin the build phase. Interpreting requirements into functionality is not the only aspect of development that can benefit from an iterative approach. Designing the system and building it can also benefit from doing these activities iteratively. You should use the waterfall method when your team is familiar with the system being developed and the tools used to develop it. You should avoid using it when developing a system for the first time or using a completely new set of tools to develop the system.

RUP

The Rational Unified Process, or RUP, combines an iterative approach with use cases to govern system development. RUP is a methodology supported by IBM and IBM provides tools (e.g. Rational Rose) that support the methodology. RUP divides the project into 4 phases:

1. Inception phase – produces requirements, business case, and high level use cases

2.Elaboration phase – produces refined use cases, architecture, a refined risk list, a refined business case, and a project plan

3. Construction phase – produces the system

4. Transition phase – transitions the system from development to production

RUP also defines 9 disciplines: 6 engineering disciplines, and 3 supporting disciplines: Configuration and Change Management, Project Management, and environment so is intended to work hand in hand with project management best practices.

Iteration is not limited to a specific project phase – it may even be used to govern the inception phase, but is most applicable to the construction phase. The project manager is responsible for an overall project plan which defines the deliverables for each phase, and a detailed iteration plan which manages the deliverables and tasks belonging to each phase. The purpose of the iterations is to better identify risks and mitigate them.

RUP is essentially a cross between Scrum and waterfall in that it only applies an iterative approach to project phases where the most benefit can be derived from it. RUP also emphasizes the architecture of the system being built. The strengths of RUP are its adaptability to different types of projects. You could simulate some of the aspects of a Scrum method by making all 4 phases iterative, or you could simulate the waterfall method by choosing to avoid iterations altogether. RUP will be especially useful to you when you have some familiarity with the technology but need the help of Use Cases to help clarify your requirements. Use Cases can be combined with storyboarding when you are developing a software system with a user interface to simulate the interaction between the user and the system. Avoid using RUP where your team is very familiar with the technology and the system being developed and your product owners and users don’t need use cases to help clarify their requirements.

RUP is one of those methodologies that your organization is very likely to have invested heavily in. If that’s your situation, you probably don’t have the authority to select another methodology but you can tailor RUP to suit your project. Use iterations to eliminate risks and unknowns that stem from your team’s unfamiliarity with the technology or the system, or eliminate iterations where you would otherwise use the waterfall method.

JAD

Joint Application Development, or JAD, is another methodology developed by IBM. It’s main focus is on the capture and interpretation of requirements but can be used to manage that phase in other methodologies such as waterfall. JAD gathers participants in a room to articulate and clarify requirements for the system. The project manager is required for the workshop to provide background information on the project’s goals, objectives, and system requirements. The workshop also requires a facilitator, a scribe to capture requirements, participants who contribute requirements, and members of the development team whose purpose is to observe.

JAD can be used to quickly clarify and refine requirements because all the players are gathered in one room. Your developers can avert misunderstandings or ambiguities in requirements by questioning the participants. This method can be used with just about any software methodology. Avoid using it where the organization’s needs are not clearly understood or on large, complex projects.

RAD

RAD is an acronym for Rapid Application Development uses an iterative approach and prototyping to speed application development. Prototyping begins by building the data models and business process models that will define the software application. The prototypes are used to verify and refine the business and data models in an iterative cycle until a data model and software design are refined enough to begin construction.

The purpose of RAD is to enable development teams to create and deploy software systems in a relatively short period of time. It does this in part by replacing the traditional methods of requirements gathering, analysis, and design with prototyping and modeling, the prototyping and modeling allow the team to prove the application components faster than traditional methods such as waterfall. The advantage of this method is it facilitates rapid development by eliminating design overhead. It’s disadvantage is that in eliminating design overhead it also eliminates much of the safety net which prevents requirements from being improperly interpreted or missed altogether.

RAD is suitable for projects where the requirements are fairly well known in advance and the data is either an industry or business standard, or already in existence in the organization. It is also suitable for a small development team, or a project where the system can be broken down into individual applications that require small teams. RAD is not suitable for large, complex projects or projects where the requirements are not well understood.

LSD

Lean Software Development, or LSD, applies the principles of waste reduction from the manufacturing world to the business of developing software. The goal of LSD is to produce software in 1/3 the time, on 1/3 the budget, and with 1/3 the defects of comparable methods. Lean does this by applying 7 principles to the endeavor of software development:

1. Eliminate waste

2. Amplify Learning (both technical and business)

3. Decide on requirements as late as possible

4. Deliver as fast as possible

5. Empower the team

6. Build integrity

7. See the whole

Although Lean Manufacturing has been around for some time, its application to the process of developing software is relatively new so I wouldn’t call it a mature process.

LSD would be a suitable method to use where you have a subject matter expert in the method who has some practical experience in applying lean methods to a software development project. “Amplified” learning implies that your development team has a depth of knowledge in the software tools provided, and also a breadth of knowledge that includes an understanding of the business needs of the client. LSD would be suitable for a project where the development team has these attributes.

LSD depends on a quick turnaround and the late finalization of requirements to eliminate the majority of change requests, so will not be suitable for a project where a delayed finalization of requirements will have a poor chance of eliminating change requests, or the size and complexity of the system being developed would prevent a quick turnaround.

Extreme Programming (XP)

Extreme programming places emphasis on an ability to accommodate changes to requirements throughout the development cycle and testing so that the code produced is of a high degree of quality and has a low failure rate in the field. XP requires the developers to write concise, clear, and simple code to solve problems. This code is then thoroughly tested by unit tests to ensure that the code works exactly as the programmer intends and acceptance tests to ensure that the code meets the customer’s needs. These tests are accumulated so that all new code passes through them and the chances for a failure in the field are reduced.

XP requires the development team to listen carefully to the needs and requirements of the customer. Ambiguities will be clarified by asking questions and providing feedback to the customer which clarifies the requirements. This ability implies a certain degree of familiarity with the customer’s business; the team will be less likely to understand the customer’s needs if they don’t understand their business.

The intent of XP is to enhance coding, testing, and listening to the point where there is less dependency on design. At some point it is expected that the system will become sufficiently complex so that it needs a design. The intent of the design is not to ensure that the coding will be tight, but that the various components will fit together and function smoothly.

XP would be a suitable software development method where the development team is knowledgeable about the customers business and have the tools to conduct the level of testing required for this method. Tools would include automated unit testing and reporting tools, issue capture and tracking tools, and multiple test platforms. Developers who are also business analysts and can translate a requirement directly to code are a necessity because design is more architectural than detail. This skill is also required as developers implement changes directly into the software.

XP won’t be suitable where the development team does not possess business analysis experience and where testing is done by a quality assurance team rather than by the development team. The method can work for large complex projects as well as simple smaller ones.

There is no law that states you must choose one or the other of these methodologies for your software project. The list I’ve given you here is not a totally comprehensive list and some methodologies don’t appear on it (e.g. Agile) so if you feel that there is some other methodology that will better suit your project, run with it. You should also look at combining some of the features of each of these methods to custom make a methodology for your project. For example, the desire to eliminate waste from the process of developing software is applicable to any method you choose and there is likely waste that could be eliminated in any development shop.

Be careful to choose a methodology that is a good fit for your team, stakeholders, and customer as well as your project. Bringing in a new development methodology that your team will struggle to learn at the same time they are trying to meet tight deadlines is not a good idea. On the other hand, if you have the latitude you may want to begin learning a new method with your project.

Posted in general | Comments Off on Choosing the Right SDLC For Your Project

Advantages and Disadvantages of Biometric Time and Attendance Software

First of all let me ask you what you understand by time and attendance software? Have you ever been asked to log in as soon as you enter office and the main gate of the office has a Biometric machine that takes in your finger prints and allows you to enter the office premise? Yes, these are the time and attendance software being installed in a company.

Biometrics consists of methods for uniquely identifying a person (human being) by his/her physical or behavioral traits. There are many biometric software available in market for such purpose and their use is widely known. One such use is Biometric time and attendance management software.

Those days are gone when we had to punch in cards or sign into a register to tell the other person that we are present. Just as paper checking has been changed from manual to computerized, identifying a person and letting him in your office has been changed from manual to biometrics.

There are many benefits of having such methodology in your office. Such as:

• Accurate timing: When a person looks at his watch and enters the time there is a slight chance that he may see the wrong timing and write. Whereas with biometric time and attendance software there is no possibility of such mistake. The user does not need to see or check the time, it automatically gets logged in.

• Less error: There is no scope of human error here.

• Profit to company: If it’s accurate and correct the company will definitely gain from it.

As everything has a good and bad side this too has its disadvantages, such as:

• Extra cost to company: Biometric software and machine cost a lot more, so installing such software need a good investment money wise.

• Extra management: Remember when every employee is logging his own timing when he comes or leaves; there is no extra management here. But, if you are putting a machine there has to be taken some care of it.

Biometrics time and management software is really helpful when creating payrolls for employees. Once a definite timing has been registered you don’t need to think twice before creating the employees pay.

Many homes are also using such kind of software to have a safe and secure home. Biometric software is really helpful when you need security in your home as well as in office. There are many companies all over the world providing such biometric time and attendance software. You just need to keep an eye on the technologies and websites that are providing you these.

Posted in general | Comments Off on Advantages and Disadvantages of Biometric Time and Attendance Software

How to Resolve “Memory Card Error” From Canon IXUS 130

Canon IXUS 130 is a sophisticated digital camera that has a resolution of 14.1 megapixels. The camera is inbuilt with almost all advanced features, including fully wide-angle 4x zoom lens and motion blur technology. The IXUS camera is compatible with SDHC (Secure Digital High Capacity) and SDXC (Secure Digital Extreme Capacity) cards, with storage capacity as high as 2TB.

Since the storage memory of the cards is huge, data loss from these cards is simultaneously huge. One of the main reasons for data loss from cards is corruption of these cards. In most cases, you receive an error message after your card gets corrupted. However, an updated backup allows you to overcome card corruption. It allows you to restore data. But in case of unavailability of backup, you can use recovery software to recover data from a corrupted card.

As a practical case, you view the below error message on Canon IXUS 130 while attempting to view some previously stored photos on your SDHC card:

“Memory Card Error”

Every single photo saved in the memory card becomes inaccessible after the above error message appears. In addition, no more photo can be saved on card. In short, the card can not be read or written upon.

Cause:

The above error message that makes all the photos inaccessible is primarily caused due to corruption of card. Few reasons that are accountable for the above error message are virus infection, interrupted read/write operation, and human errors.

Resolution:

The resolution for the above error message is formatting of memory card in the camera itself. The process deletes all the previously saved data and allows you to save new data. While formatting proves a good resolution for users who do not require the old data, it becomes fatal for users, like photographers, detective agents, etc, who save critical data in their memory card. However, recovering formatted data now-a-days is an easy process. To do so, you need to use an advanced third-party Photo Recovery Software. A Image Recovery tool is readily available on the Internet by just one single click.

Posted in general | Comments Off on How to Resolve “Memory Card Error” From Canon IXUS 130

Texas Two Step Strategy – Everything You Need to Know

The Texas Two Step lottery is a great example of a game that is both strategic and fun. The state lottery is an excellent arena for you to shell out your extra dollars while learning about alternative lotto mechanics. In the state of Texas, the Texas Two Step is considered to be the most popular form of lottery. The game beings when an individual is asked to pick four number from and in between 1 to 35. Like most lotto types, this also has a bonus ball number, which can increase your chances of winning. The grand price for this unique game does not go below two hundred thousand dollars so long as you make five matches. If you are also quite hesitant to pick your own number, the quick pick system also applies to the Texas Two Step lottery. A multi-draw feature also allows you to bet for ten advance drawings at once by simply making a distinguishable mark in the designated ticket boxes. Single plays cost only US$1 each and can reflect winnings up to a hundred thousand dollars.

Most lottery systems base on luck as foundation for winning. Unfortunately, even with the convenience of quick picks and other strategies, chances of winning are still small. One effective way to increase the chances of gaining back positive results from your chosen number is by adhering to the Wheeling Systems. Generally, wheeling systems do not guarantee an automatic win after placing your number picks in the Texas Two Step. However, the mechanism gives you more chances of bringing home multiple tier prizes as opposed to you simply randomly selecting the number, or relying on quick picks. The odds of winning the Texas Two Step prize are statistically ranging from 1 to 32. The overall ratio of victory can be quite unsatisfactory if played with mere dependence on luck. Although you can win $5 for simply matching the bonus ball number, naturally, anyone would still want to vie for the grand prize.

There are also a handful of lotto software that provide good combination numbers for players. Most people confirm the effectiveness of most online programs in tracking the best numeral combinations for lottery. You may program these to suit your needs and according to the type of lottery that you participate in. For Texas Two Step, it is much easier to use a software to calculate possible combinations as it has lesser selections or numbers compared to most lotto games.

For serious lotto players, individuals simply log onto the website and place their bets randomly. Sites also offer a few tips and strategies on how to best employ their gaming techniques. You may be able to view advices on when is the best time to place your bets and how to purchase your tickets quickly. Other websites also present lottery news, which is also an effective way to keep track of your bets. Bear in mind that in order for a player to achieve positive results while playing lotto, the correct strategy and technique must put in place so as to lead you to triumph and victory.

Posted in general | Comments Off on Texas Two Step Strategy – Everything You Need to Know

How to Change the MPI Node Address For a Siemens S7-300 PLC

I have seven Siemens S7-300 PLCs connected together using the MPI (Multi Point Interface) interface. The Siemens MPI protocol is used by Siemens PLCs to communicate with external devices. I want to rename each of the seven PLCs. Here are the steps to accomplish that task.

First, connect your MPI cable to the first PLC. I will be connecting my laptop to each PLC individually. Power up the PLC and open Simatic Manager. The "New Project" Wizard window will open. Just click Cancel to close the window. Now click the Accessible Nodes icon on the toolbar. A window will open showing the identification of the PLC you are connected to. My window is showing MPI = 2 (directly). Make a note of this address and close the window.

Next we need to download a hardware configuration to the PLC. This is where we will rename the PLC node address. There are probably a couple of different ways to do this – following is how I accomplish this. All seven of my PLCs are the same model; Therefore, I am using the same hardware configuration. For the obvious reasons, I want to give each a different MPI node address. I have a project file that contains all seven of my PLC programs and one hardware configuration file. I open the one hardware configuration file, and then double click Hardware in the right hand window. This will open the HW Configuration window. In this window you should see your PLC with its MPI address given.

Remember when we clicked the Accessible Nodes icon and saw MPI = 2 (directly)? My Hardware Configuration Window is showing a MPI address of 7. Place your mouse cursor on the 7 and double click. Your CPU Properties window will open. It should open to the General tab. Look down and you will see Interface Type MPI with an address of 7. Click Properties and the MPI interface Properties window will open. Using the pull down menu, choose your MPI node address and make sure the MPI (1) 187.5kbps is highlighted and click OK. You are now back on the CPU Properties window where you will see your address has changed. Click OK and you will go back to the Hard Ware window where you can verify your MPI node address has changed.

You will now click the Save and Compile icon and then click the download icon. The Select Target Module window will open. Click OK and the Select Node Address window will open. Here you will see the MPI node address you assigned earlier. You will need to click the View button right below this. You will see the current node address appear, this should be the same as what you saw earlier when you clicked the Accessible Nodes icon. Simply click on this number and you will see it appear in the MPI address slot under the Enter connection to target station. Click OK and the Download to Module window will open. Click OK and the Stop Target Modules window will open. Click OK and the "Do you want to start the module?" Window will open. Click Yes.

Now go back to the SIMATIC Manager window and click the accessible nodes icon. You will see your new MPI node address. You can see this same article with pictures at http://www.morerobototics.com .

Posted in general | Comments Off on How to Change the MPI Node Address For a Siemens S7-300 PLC

What is the Argus Safety Database?

The Argus safety database is a key part of the Argus Safety 3.0.1 pharmacovigilance software system. In a nutshell, pharmacovigilance is defined as the monitoring of any possible adverse effects of both herbal remedies and synthetic drugs as they are used.

The digital database is used to help companies ensure compliance with global regulations regarding pharmacovigilance and related activities. As a comprehensive pharmaceutical software system, it supports pharmacovigilance business processes that take place in both the pre- and post-marketing phases.

The Argus database is hosted in a data center that is ISO-9001-certified, and operates according to the security standards promulgated by FDA guidelines. By managing this data center, a pharmaceutical firm or laboratory may obtain maximum physical data security as well as access to effective data backup and recovery procedures whenever these services are needed.

ACCOVION, the full-service contract research organization that offers pharmacovigilance as a core service, has configured the Argus database with customized and validated rules to expedite safety reporting. This setup enables generated safety reports to be sent to regulatory investigators and central ethics committees.

The system covers a wide range of the most commonly used forms, including the American FDA MedWatch 3500A form for drugs, the VAERS form for vaccines, the CIOMS-I form, and many others utilized in European countries.

The standard setup in use by the Argus safety database system includes coding with current World Health Organization and MedDRA data dictionaries, as well as older versions of these dictionaries and many others to meet user requirements.

Posted in general | Comments Off on What is the Argus Safety Database?

The Advantages and Disadvantages to Bug Tracking Software

Bug tracking has been around as early as the 1940’s, just not in a software form. In these early days, simply using a pen and a paper created tracking systems. It evolved from then to using spreadsheets. Now there is bug tracking software like the defect tracking tool and even more specific programs like Mantis and Bugzilla, just to name a couple. As with anything that evolves however, there will always be those that are 100% for the programs and those that are against it. This article will cover all claims – both positive and negative – of bug tracking software like the defect tracking tool.

The Positive Claims

It certainly depends on the type of bug tracking software that is used, but it seems as if there are many more advantages to these tools than disadvantages. The most obvious advantage is that these types of tools allow companies to keep a record of the issues that are recorded, who fixed them, and even how long it took to fix the issue for some types of programs. Customers are encouraged to be as detailed as they can be when requesting that an issue be fixed so that companies can complete their requests as quickly as possible. The fact that the issues are recorded and saved is a huge benefit for the companies because sending the recorded bug list with the purchased software is a common practice. This is a benefit to customers because if it is a common error, they can simply look up this issue in the previously recorded bug list. However, if the list is incredibly long (a common disadvantage) it can become more of a hassle.

The Negative Claims

As with anything that has a list of positive aspects there is also a list of negative aspects, though there are few. One of the biggest complaints is not so much from the bug tracking software or defect tracking tool itself but more from the process of submitting issue requests. Customers need to be extremely detailed with their issue requests if they want a detailed response. Miscommunication isn’t a fault of the product, the customer, or the company – it’s simply something that happens. Customers and companies alike both need to remember to be patient with each other and to treat each other with a mutual respect. A second complaint that was previously mentioned is the length of issues in some of these software programs.

Some customers don’t have the patience to look through a long list of software issues that have been previously recorded and this causes frustration among the companies that took the time to purchase software that saves them. The length of issues that are submitted can also become a problem because if there are too many issues submitted and not enough engineers to address them, some can get overlooked. Nobody likes to be forgotten, but usually these types of bug tracking software include detailed instructions and are easy to use.

Usually when a company purchases a bug tracking software or defect tracking tool it already has an experienced IT department in place. Whatever the software is that is being used with these programs should have some sort of backup for when the work is completed so it does not get lost if the issues that occur are deadly.

Posted in general | Comments Off on The Advantages and Disadvantages to Bug Tracking Software