You are on page 1of 8

COMPANY PROFILE

COMPANY PROFILE

(THE COMPANIES ACT, 1956)


(COMPANY LIMITED BY SHARES)
M E M O R A N D U M OF A S S O C I A T I O N
OF
SWARNIM INFOSOFT PRIVATE LIMITED

The Name of the Company is SWARNIM INFOSOFT PRIVATE LIMITED

The Registered Office of the Company will be situated in C-41,Sector 2, Noida, Gautam
Budh Nagar, Uttar Pradesh 201301.

The objects for which the Company is established are:-

THE MAIN OBJECTS TO BE PURSUED BY THE COMPANY ON ITS INCORPORATION ARE: -

1.
To carry on the business of providing, designing & engineering services to domestic
& international market such as software design, product design, architectural design,
security system design, acoustic system design, CAD design, 2D/3D rendering, media
designs, off-shore engineering & design services, import & export of all types of software
and hardware.
2.
To develop, produce, alter, acquire, buy, sell, import, export, lease, licence or
otherwise deal in computer software, hardware and programs of all kind and nature and
for all use including but not limited to computer aided engineering, software for micro
processor based systems, manufacturing computer aided graphics, operation maintenance
and service of all plants and equipments and software for banks and/or for special
application and for any other purpose.
3.
To provide consultancy, technical manpower services, educational services, high
end training in software, hardware, networking, ERP, electronics, VLSI, Embedded Systems,
Internet Technologies etc, establishing training institutes, educational marketing,
appointing franchise of all kinds of software & computer related activities in India and
abroad. To carry on the business of formulating, developing, improving, designing,
marketing, selling, franchise, exporting and licensing software and products of any
description. To carry on the business of consultants, system integrators, network
integrators, system developers, software developers, research on management, manpower
exports in the field of hardware and software skills and other allied activities, Management
and business solution consulting for other companies in the areas of defining strategy,
vision, business restructuring, Management systems planning and implementation,
Business process Modeling and mapping, analysis and solutions, Research and
development for new products and technologies in the various areas of Information
Technology, Internet and communication.
4.
To provide internet or channel services such as web hosting, web designing,
internet training and internet based solutions. To provide training and internet based
solutions and to initiate, undertake, carry on, engage in, promote, assist, encourage, and
conduct research, development, experiments, studies, project analysis, onshore & offshore

projects, back office operations, examinations, surveys and tests of all kinds related to
computers, electronic data processing equipments, electronic data processing equipments,
software and hardware programs solution of all kinds, marketing of other software
products and technologies licensed to the company by others.
5.
To carry on assembling, marketing, operating, altering, converting, processing
importing, designing, buying, selling, exporting, installing, servicing, exchanging, or
otherwise dealing in all types of computer software, hardware, data processing machines,
peripherals,
word-processing
machines,
calculators,
computerized
systems,
telecommunication, network systems, transmission systems covering all media such as
wireless, satellite and other computer based systems and instruments and their
compounds, devices and spare parts. To carry on the business of maintenance, repair and
reconditions of all types of software and hardware, computers, networks equipments.
6.
To carry on the business of processing of jobs for markets and management
consultancy in the field of computer software, Hardware, Networking, Data Processing,
back office operations, micro processor and VLSI design, micro processor based intelligent
systems and in any other field.
1.1 OUR VISION
We shall define ourselves in the cutting edge technology in the coming era. We shall
create honest working environment with see-through-glass planning.
1.2 OUR MISSION
To create opportunity for growth & self actualization to trainees and provide an
environment of highly conducive works culture.
WORK RELATED AREAS:
1. Web Page designing and hosting
2. Internet and Intranet Solutions
3. Web based applications development
4. Client / Server Applications Development
5. Re-engineering
6. Research & Development in WAP and Web related conversing technologies
7. Corporate training
8. High-end User Training (Vocational)

CHAPTER - 2

Analysis of Proposed System


And
System requirements

2.1-System Analysis:
PROBLEMS IN EXITING SYSTEM

In the current system the main problem of resolving the queries of trainees is taking
time delay due to classes running in weekends or week days. If trainees have any problem

regarding their classes, have to wait for resolving their problem in the next classes. This problem
breaks the flow of study. Another problem is trainees only can communicate if they are at classes
so its create communication gap between trainees.
PROPOSED SYSTEM
We have analysis on the problems in exiting and designed a much simpler system to resolve the
problem.
In this system trainee can submit their question online and can get the solution easily at any time.
Trainees can create Group, join and communicate each other by sending message and resolve
their problem online. Moderator can upload article and Trainees can download article.
To achieve these objectives, Tech Mentro has planned to develop a web application named
etutes.in. etutes.in shall have following functionality:
Students can use etutes for training, submitting their questions, reading answers of posted
queries, search topic and enhancing their skills.
Online courses of various technologies shall be introduced by Tech Mentro using etutes.
Online upload and download of article.
Analysis is a detailed study of the various operations performed by a system and their relation
within and outside the system. A key question is what must be done to solve the problem.
One aspect of the analysis defining the boundaries of the system and determining whether or not
a candidate system should consider other related system. During analysis data are collected on
the available files decision points and transaction handled by the parent system. Some logical
system models and tools are used in the analysis. Data flow diagrams, interviews, onsite
observation and questionnaires are examples, the interviews commonly used in analysis. It
requires special skill and sensitivity to the subject being interview bias in data collection and
interpretation can be problem.

System Planning and the Initial Investigation:


The most critical phase of managing system projects is planning to launch a system
investigation, we need plan detailing the steps to be taken, the people to be questioned and they
outcome expected. The initial investigation has the objective of determining whether the users
request has potential merit. The major steps are defining user requirements. When the initial

investigations completed. The user receives a proposal summarizing the finding the
recommendation of the analyst.
Information Gathering:
A key part of feasibility analysis is gathering information about the present system. The analyst
knows what information to gather, where to find it, how to collect it and what to make of it. The
proper use of tools for gathering information is the key to successful analysis.
The tools are the traditional interview, questionnaire, and on-site observation. We need to know,
for example how to structure an interview, what makes up a questionnaire, and what to look for
on-site observations. These tools when learned help analysis assess the effectiveness of the
present system and provide the ground work for recommending a candidate system.

H/W & S/W REQUIREMENT (RECOMMENDED)


HARDWARE REQUIREMENT
RAM

1GB

PROCESSOR

PENTIUM IV AND ABOVE

HARD DISK

20GB

KEYBOARD

NORMAL(102/103 keys)

MOUSE

NORMAL

SOFTWARE REQUIREMENT
OPERATING SYSTEM

WIINDOWS XP SP2

WEB SERVER & IDE

APACHE-TOMCAT 6.0,MYECLIPSE 8.0

FRONT-END

JAVA & JSP

BACK-END

ORACLE10G

ADDITIONAL API

APACHE-LUCENE

PLATEFORM (Technology/Tool Selection)


FRONT-END
Introduction to Java
Java is a high-level, third-generation programming language like C, FORTRAN, Perl and many
others. It is a platform for distributed computing a development and run-time environment that contains
built-in support for the World Wide Web.

History of Java
Java development began at Sun Microsystems in 1991, the same year the World Wide Web was
conceived. Javas creator, James Gosling did not design java for the Internet. His Objective was to create
a common development environment for consumer electronic devices which was easily portable from one
device to another. This effort evolved into a language, code named Oak and later renamed Java that
retains much of the syntax and power of c++, but is simpler and more platform-independent.

Java Features

Some of the important features of Java are as follows:


Simplicity
Orientation
Platform Independence
Security
High Performance
Multi Threading
Dynamic linking.
Garbage Collection.

One of the most important features of Java is platform independence, which makes it famous and
suitable language for World Wide Web.

Why Java is Platform Independent?


Java is Platform Independent because of Java Virtual Machine (JVM).

Java Virtual Machine (JVM)


The client application or operating system must have a java byte-code interpreter to execute bytecode instructions. The interpreter is a part of a larger program called the JVM. The JVM interprets the
byte code into native code and is available on platforms that support Java.
When the user runs a Java program, it is up to the JVM to load, possibly verify, and then execute it. The
JVM can perform this function from within a browser or any other container program or directly on top of
the operating system.

When a browser invokes the JVM to run a Java program, the JVM does a number of things:
It validates the requested byte-code, verifying that they pass various formatting and security
checks.
It allocates memory for the incoming java class files and guarantees that the security of JVM
is not violated. This is known as the class loader module.
It interprets the byte code instructions found in the class files to execute the program.
Interaction of JSP Page with JDBC

Application Server Machine


Client Machine
Browser
with
HTML

Web server

JSP Engine

JDBC Driver

DB Server Machine

RDBMS
Server

Here the browser using the web application is not required to support java at all. The JSP has full
control over how many JDBC connections are made to the server. The client never makes direct JDBC
connection to the server. This solution can work readily through a firewall, only standard HTTP is used
between the web server and the client.
As a bonus this solution sends itself to easily secured information simply by adding secured
socket layer support to the web server. Because of this separation of the presentation from the business
logic, which is separated from the database logic, this sort of system is often called three tiers of the
system. Although the application server and database server can also running on the same server machine.
There is still one minor problem with this scenario. Project personal accessing the JSP page
containing the embedded JDBC code can easily and inadvertently modify the database access code and
this may result in an erroneous application or even corrupted database. There are solution for this: