What is the difference between a smartphone and a mobile phone?

difference between a smartphone and a mobile phone

Difference between a smartphone and a mobile phone Recently, people have stopped understanding how a smartphone differs from a regular cell phone. This is due to the fact that quite a long time ago smartphones have become the most popular commodity. They sell best now. And people began …

OTG on the smartphone: what is it?

When reading reviews or descriptions of smartphones, you may come across a mention of OTG support. What technology is it? The designation “OTG” is rarely found on a box with a tablet or smartphone. Don’t focus on this technology, electronic equipment manufacturers, and advertising your products. However, this …

Amazon’s Music HD Service Finally Revealed

Amazon finally launched a brand new music subscription service namely Amazon Music HD . According to a report, approx. 50 million + songs in the Amazon Music library will be available to hear as CD quality audio. The renowned Amazon Music has launched a new …

Cloud Computing

Cloud Computing

Cloud computing can be defined as a computing which is based on approach of sharing computing resources  instead of configuring local servers or devices to host applications. In terms of cloud computing, the word cloud (also phrased as “the cloud“) is used as a metaphor for “the Internet” …

What is Payment Switch and Payment Gateway? Advantages of Payments switch over Payments Engine

Payment Switch  Payment Switch is a payments infrastructure for interoperability. It connects the entire payments value chain through a single software platform, hence providing control over all payment operations.  Payment Switch works as an independent entity that facilitates communication between various providers. The payment gateway talks directly with …

What Are IOS Mobile Security Best Practices? Trenovision Definition

7 Best Security Practise for IOS

Mobile Security Best Practice 1. Data Storage   Apple’s iOS provides several mechanisms for protecting data. These built in protections are quite adequate for most consumer-grade information. For more stringent security requirements (e.g., financial data, personal information), additional protections beyond those provided by Apple can be built into …

What is Data Compression ? Issues With Data Compression

Data Compression Data Compression is a way to compress the data in a database so that we can reduce the amount of storage space required to host the data. There is a caveat with Data Compression, depending upon the amount of data stored within a …

What is Data Management? Benefits of Data Management

Data Management Data management is the development and execution of architectures, policies, practices and procedures in order to manage the information lifecycle needs of an enterprise in an effective manner. Data management experts stress that data life cycle management is not a product, but a …

Top-down and Bottom-up Approaches

Top-down and Bottom-up Approaches Top-down Start with a big picture From writing program’s perspective more suitable for procedural languages.  For example C where in ‘main’ function logic flow is defined and written. Then smaller functions are written to support ‘main’ function Generally suitable for smaller …

Object Oriented Concepts | OOPS Concepts

Object Oriented Concepts Object Oriented Concepts is a programming style which is associated with the concepts like class, object, Inheritance, Encapsulation, Abstraction, Polymorphism. Most popular programming languages like Java, C++, C#, Ruby, etc. follow an object-oriented programming paradigm. Inheritance A class that is derived from …

What is Xpediter ? Xpediter Operation Modes

What is XPEDITER ? XPEDITER/TSO is a debugging and testing tool that automates the tasks of identifying problems, applying solutions, analyzing the impacts of changes, and testing the fixes. Xpeditor is the powerful testing tool used both in Online and batch application debugging in Mainframe Environment. …

SAP Hana Administration Tutorial on Lunix/Linux

What is SAP HANA ? SAP HANA came to market in just few years back (might be around 2011). It’s still under testing in many companies. So it pretty new to the market. But the performance of the SAP HANA is comparatively 1000 times faster …

What is System Testing ? Concepts

System Testing System Testing is all about Test of overall interaction of components Find disparities between implementation and specification Usually where most resources go to Involves –load, performance, reliability and security testing Goal : to compare the system or program to its original objectives. Implications …

R Tutorial – R Basic Syntax ‎R Overview

R Tutorial – R Basic Syntax ‎R Overview R is a free software programming language and software environment for statistical computing and graphics. The R language is widely used among statisticians and data miners for developing statistical software and data analysis. What R can do …

What is Cluster Analysis ? Type of data in clustering analysis

Cluster Analysis : Finding groups of objects such that the objects in a group will be similar (or related) to one another and different from (or unrelated to) the objects in other groups. Examples of Clustering Applications Marketing: Help marketers discover distinct groups in their …

What Are Outliers/Anomalies ?

Outliers: A data object that deviates significantly from the normal objects as if it were generated by a different mechanism. Outliers are different from the noise data. Noise is random error or variance in a measured variable Noise should be removed before outlier detection   …

What is Text Mining ? Text Databases and Information retrieval

Text Mining In Simple word, Text Mining is refers to refine the informational data from the bunch of data or collection of data.It also know as Text data mining which means deriving the high quality information from the existing data.   Text Databases and IR …

What is Graph Mining ? Graph Mining Challenges

Graph Mining Graph Mining is a Methods for Mining Frequent Subgraphs Mining Variant and Constrained Substructure Patterns Applications of Graph Mining are : Graph Indexing Similarity Search Classification and Clustering Why Graph Mining ? Graphs are ubiquitous Chemical compounds (Cheminformatics). Protein structures, biological pathways/networks (Bioinformactics). …

What is Recommendation System ? Recommendation Approaches,System Types and Problems

Recommendation System According to some known author Recommendation System is a System that produces individualized recommendations as output or has the effect of guiding the user in a personalized way to interesting or useful objects in a large space of possible options Burke (2002)   A …

What is Fraud Detection ? Types of fraud models

Fraud Detection In Simple word, Fraud Detection is the technique used to detect frauds in any system or process. Fraud can be defined as a criminal activity, involving false representations to gain an unjust advantage (Concise Oxford Dictionary) The Association of Certified Fraud Examiners estimates …