We found 55 results that contain "tag"
Posted on: #iteachmsu
NLP tasks
Human language is filled with ambiguities that make it incredibly difficult to write software that accurately determines the intended meaning of text or voice data. Homonyms, homophones, sarcasm, idioms, metaphors, grammar and usage exceptions, variations in sentence structure—these just a few of the irregularities of human language that take humans years to learn, https://byjus.com/biology/flower/ but that programmers must teach natural language-driven applications to recognize and understand accurately from the start, if those applications are going to be useful.
https://byjus.com/biology/flower/ https://byjus.com/biology/flower/
Several NLP tasks break down human text and voice data in ways that help the computer make sense of what it's ingesting. Some of these tasks include the following:
Speech recognition, also called speech-to-text, is the task of reliably converting voice data into text data. Speech recognition is required for any application that follows voice commands or answers spoken questions. What makes speech recognition especially challenging is the way people talk—quickly, slurring words together, with varying emphasis and intonation, in different accents, and often using incorrect grammar.
Part of speech tagging, also called grammatical tagging, is the process of determining the part of speech of a particular word or piece of text based on its use and context. Part of speech identifies ‘make’ as a verb in ‘I can make a paper plane,’ and as a noun in ‘What make of car do you own?’
Word sense disambiguation is the selection of the meaning of a word with multiple meanings through a process of semantic analysis that determine the word that makes the most sense in the given context. For example, word sense disambiguation helps distinguish the meaning of the verb 'make' in ‘make the grade’ (achieve) vs. ‘make a bet’ (place).
Named entity recognition, or NEM, identifies words or phrases as useful entities. NEM identifies ‘Kentucky’ as a location or ‘Fred’ as a man's name.
Co-reference resolution is the task of identifying if and when two words refer to the same entity. The most common example is determining the person or object to which a certain pronoun refers (e.g., ‘she’ = ‘Mary’), but it can also involve identifying a metaphor or an idiom in the text (e.g., an instance in which 'bear' isn't an animal but a large hairy person).
Sentiment analysis attempts to extract subjective qualities—attitudes, emotions, sarcasm, confusion, suspicion—from text.
Natural language generation is sometimes described as the opposite of speech recognition or speech-to-text; it's the task of putting structured information into human language.
https://byjus.com/biology/flower/ https://byjus.com/biology/flower/
Several NLP tasks break down human text and voice data in ways that help the computer make sense of what it's ingesting. Some of these tasks include the following:
Speech recognition, also called speech-to-text, is the task of reliably converting voice data into text data. Speech recognition is required for any application that follows voice commands or answers spoken questions. What makes speech recognition especially challenging is the way people talk—quickly, slurring words together, with varying emphasis and intonation, in different accents, and often using incorrect grammar.
Part of speech tagging, also called grammatical tagging, is the process of determining the part of speech of a particular word or piece of text based on its use and context. Part of speech identifies ‘make’ as a verb in ‘I can make a paper plane,’ and as a noun in ‘What make of car do you own?’
Word sense disambiguation is the selection of the meaning of a word with multiple meanings through a process of semantic analysis that determine the word that makes the most sense in the given context. For example, word sense disambiguation helps distinguish the meaning of the verb 'make' in ‘make the grade’ (achieve) vs. ‘make a bet’ (place).
Named entity recognition, or NEM, identifies words or phrases as useful entities. NEM identifies ‘Kentucky’ as a location or ‘Fred’ as a man's name.
Co-reference resolution is the task of identifying if and when two words refer to the same entity. The most common example is determining the person or object to which a certain pronoun refers (e.g., ‘she’ = ‘Mary’), but it can also involve identifying a metaphor or an idiom in the text (e.g., an instance in which 'bear' isn't an animal but a large hairy person).
Sentiment analysis attempts to extract subjective qualities—attitudes, emotions, sarcasm, confusion, suspicion—from text.
Natural language generation is sometimes described as the opposite of speech recognition or speech-to-text; it's the task of putting structured information into human language.
NAVIGATING CONTEXT
Posted on: #iteachmsu

Playlist -- Management skills
WHAT IS MIS? | MANAGEMENT INFORMATION SYSTEMS
Management Information Systems (MIS) is the study of people, technology, organizations, and the relationships among them. MIS professionals help firms realize maximum benefit from investment in personnel, equipment, and business processes. MIS is a people-oriented field with an emphasis on service through technology. If you have an interest in technology and have the desire to use technology to improve people’s lives, a degree in MIS may be for you.
MIS PROFESSIONALS MAKE BUSINESS BETTER
Businesses use information systems at all levels of operation to collect, process, and store data. Management aggregates and disseminates this data in the form of information needed to carry out the daily operations of business. Everyone who works in business, from someone who pays the bills to the person who makes employment decisions, uses information systems. A car dealership could use a computer database to keep track of which products sell best. A retail store might use a computer-based information system to sell products over the Internet. In fact, many (if not most) businesses concentrate on the alignment of MIS with business goals to achieve competitive advantage over other businesses.
MIS professionals create information systems for data management (i.e., storing, searching, and analyzing data). In addition, they manage various information systems to meet the needs of managers, staff and customers. By working collaboratively with various members of their work group, as well as with their customers and clients, MIS professionals are able to play a key role in areas such as information security, integration, and exchange. As an MIS major, you will learn to design, implement, and use business information systems in innovative ways to increase the effectiveness and efficiency of your company.
MORE THAN CODING
A common misconception is that MIS only concerns coding (or writing computer code). While coding concepts represent some of the fundamental principles of information systems development, implementation, and use, many jobs in MIS do not utilize coding at all. A large portion of the MIS degree focuses on data analysis, teamwork, leadership, project management, customer service, and underlying business theories. These aspects of the degree are what set the MIS professional apart from a computer science specialist.
Do you enjoy working with people?
Would you enjoy the chance to work on global problems with people from all over the world?
Do you enjoy analyzing and solving problems?
Do you want to create innovative, cutting-edge technology solutions?
Do you want to learn how to make businesses more efficient, effective and competitive?
Then you should consider as your major the field that is experiencing a critical shortage of professionally trained individuals. A field where demand is skyrocketing with projected growth rates of 38 percent – the fastest of any business discipline (U.S. Bureau of Labor Statistics).
WHAT KINDS OF PEOPLE PURSUE MIS DEGREES?
The profiles of MIS professionals are varied, but in general, such individuals possess many of the following traits:
good problem solving skills
ability to effectively manage time and resources
a clear vision of “the big picture” as well as the “small details”
a desire to work closely with other people
excellent communication skills
ability to think strategically about technology
a desire to take responsibility for developing and implementing their own ideas
Management Information Systems (MIS) is the study of people, technology, organizations, and the relationships among them. MIS professionals help firms realize maximum benefit from investment in personnel, equipment, and business processes. MIS is a people-oriented field with an emphasis on service through technology. If you have an interest in technology and have the desire to use technology to improve people’s lives, a degree in MIS may be for you.
MIS PROFESSIONALS MAKE BUSINESS BETTER
Businesses use information systems at all levels of operation to collect, process, and store data. Management aggregates and disseminates this data in the form of information needed to carry out the daily operations of business. Everyone who works in business, from someone who pays the bills to the person who makes employment decisions, uses information systems. A car dealership could use a computer database to keep track of which products sell best. A retail store might use a computer-based information system to sell products over the Internet. In fact, many (if not most) businesses concentrate on the alignment of MIS with business goals to achieve competitive advantage over other businesses.
MIS professionals create information systems for data management (i.e., storing, searching, and analyzing data). In addition, they manage various information systems to meet the needs of managers, staff and customers. By working collaboratively with various members of their work group, as well as with their customers and clients, MIS professionals are able to play a key role in areas such as information security, integration, and exchange. As an MIS major, you will learn to design, implement, and use business information systems in innovative ways to increase the effectiveness and efficiency of your company.
MORE THAN CODING
A common misconception is that MIS only concerns coding (or writing computer code). While coding concepts represent some of the fundamental principles of information systems development, implementation, and use, many jobs in MIS do not utilize coding at all. A large portion of the MIS degree focuses on data analysis, teamwork, leadership, project management, customer service, and underlying business theories. These aspects of the degree are what set the MIS professional apart from a computer science specialist.
Do you enjoy working with people?
Would you enjoy the chance to work on global problems with people from all over the world?
Do you enjoy analyzing and solving problems?
Do you want to create innovative, cutting-edge technology solutions?
Do you want to learn how to make businesses more efficient, effective and competitive?
Then you should consider as your major the field that is experiencing a critical shortage of professionally trained individuals. A field where demand is skyrocketing with projected growth rates of 38 percent – the fastest of any business discipline (U.S. Bureau of Labor Statistics).
WHAT KINDS OF PEOPLE PURSUE MIS DEGREES?
The profiles of MIS professionals are varied, but in general, such individuals possess many of the following traits:
good problem solving skills
ability to effectively manage time and resources
a clear vision of “the big picture” as well as the “small details”
a desire to work closely with other people
excellent communication skills
ability to think strategically about technology
a desire to take responsibility for developing and implementing their own ideas
Posted on: #iteachmsu
Playlist-- What Is Agile Methodology in Project Management?
The Agile methodology is a way to manage a project by breaking it up into several phases. It involves constant collaboration with stakeholders and continuous improvement at every stage. Once the work begins, teams cycle through a process of planning, executing, and evaluating. Continuous collaboration is vital, both with team members and project stakeholders.
In this FAQ article, we share everything you need to know about Agile methodologies, Agile project management, and Agile methodology frameworks. We’ll also explain how you can use our Agile teamwork template to get started with Agile even faster.
In this FAQ article, we share everything you need to know about Agile methodologies, Agile project management, and Agile methodology frameworks. We’ll also explain how you can use our Agile teamwork template to get started with Agile even faster.
Posted on: #iteachmsu
There were special effects, fireworks, laser shows, sound effects, and more
joined the trend of the virtual events in Aug , Spet , giving attendees a never-before-seen musical experience. In addition to performances from artists like Katy Perry,
The festival featured artists performing on virtual stages in front of thousands of virtual fans on a virtual 3D island. There were special effects, fireworks, laser shows, sound effects, and more — just like an actual music festival.
The festival featured artists performing on virtual stages in front of thousands of virtual fans on a virtual 3D island. There were special effects, fireworks, laser shows, sound effects, and more — just like an actual music festival.
Posted on: #iteachmsu
Kicking Off Class with a Plan! An overview of teaching.tools
Kicking off Class with a Plan!
A lesson plan can serve as an educator's road map... including what students need to learn and how that learning will be facilitated within the time span of the experience. Lesson plans can help you feel more confident while maximizing positive student outcomes. Class prep doesn't have to be a chore this semester! In addition to providing an easy-to-use framework for lesson design, this interactive workshop will introduce participants to an online tool for planning effective, inclusive class sessions... PLUS the new Brainstorming Tool for the first time! This tool uses expertly-prompted AI to generate effective lecture plans, discussion questions, case studies, and more. This is the perfect way to get hands-on practice with Teaching Tools' entire suite of applications that will revolutionize your class prep workflow. Participants will have the chance to explore the tool, ask questions, and leave the session with a new tool in their educator toolbox.
Setting the Stage...
When class prep is difficult and time consuming it…
Doesn’t happen at all
Doesn’t happen very often
Isn’t very effective
This results in…
Winging it
10-year old lesson plan (often inaccessible)
Decreased motivation
Teaching Tools (according to the site)
"We build technologies that promote effective, inclusive college teaching. By translating evidence-informed pedagogical research into easy-to-use online tools, we make good teaching practices more accessible to college instructors of all disciplines and experience levels. Our tools are designed to complement the services offered by Centers for Teaching and Learning, Instructional Technology units, and your LMS. We add value by providing innovative solutions tailored to the higher ed teaching and learning context. Launched in February 2022, Teaching Tools is a registered limited liability company in Maryland."
Anyone can access the three tools at https://teaching.tools by signing up for free [even with a google account].
1. ACTIVE LEARNING LIBRARY – discover new learning activities that fit your teaching context
https://teaching.tools/activities
Main column displays series of learning activities – huge variety from “traditional” (lectures) to more engaging (case study)
Click each activity for more details” engagement level, formative feedback, time, modality
Best practices for facilitations
Filters on the left allow educators to filter by facilitation difficulty level, prep time required, class size, active learning, formative feedback level, bloom’s taxonomy, inclusive learning (UDL principles), whole-person learning, activity time, class modality
2. LESSON PLANNING TOOL – build a cohesive lesson plan for based on series of activities
Allows educators to build out timetable for learning experience
Saves in database and can be duplicated and edited over time.
3. BRAINSTOMING TOOL – generate new content ideas for lectures, discussions, cases, etc.
https://teaching.tools/brainstorm
A lesson plan can serve as an educator's road map... including what students need to learn and how that learning will be facilitated within the time span of the experience. Lesson plans can help you feel more confident while maximizing positive student outcomes. Class prep doesn't have to be a chore this semester! In addition to providing an easy-to-use framework for lesson design, this interactive workshop will introduce participants to an online tool for planning effective, inclusive class sessions... PLUS the new Brainstorming Tool for the first time! This tool uses expertly-prompted AI to generate effective lecture plans, discussion questions, case studies, and more. This is the perfect way to get hands-on practice with Teaching Tools' entire suite of applications that will revolutionize your class prep workflow. Participants will have the chance to explore the tool, ask questions, and leave the session with a new tool in their educator toolbox.
Setting the Stage...
When class prep is difficult and time consuming it…
Doesn’t happen at all
Doesn’t happen very often
Isn’t very effective
This results in…
Winging it
10-year old lesson plan (often inaccessible)
Decreased motivation
Teaching Tools (according to the site)
"We build technologies that promote effective, inclusive college teaching. By translating evidence-informed pedagogical research into easy-to-use online tools, we make good teaching practices more accessible to college instructors of all disciplines and experience levels. Our tools are designed to complement the services offered by Centers for Teaching and Learning, Instructional Technology units, and your LMS. We add value by providing innovative solutions tailored to the higher ed teaching and learning context. Launched in February 2022, Teaching Tools is a registered limited liability company in Maryland."
Anyone can access the three tools at https://teaching.tools by signing up for free [even with a google account].
1. ACTIVE LEARNING LIBRARY – discover new learning activities that fit your teaching context
https://teaching.tools/activities
Main column displays series of learning activities – huge variety from “traditional” (lectures) to more engaging (case study)
Click each activity for more details” engagement level, formative feedback, time, modality
Best practices for facilitations
Filters on the left allow educators to filter by facilitation difficulty level, prep time required, class size, active learning, formative feedback level, bloom’s taxonomy, inclusive learning (UDL principles), whole-person learning, activity time, class modality
2. LESSON PLANNING TOOL – build a cohesive lesson plan for based on series of activities
Allows educators to build out timetable for learning experience
Saves in database and can be duplicated and edited over time.
3. BRAINSTOMING TOOL – generate new content ideas for lectures, discussions, cases, etc.
https://teaching.tools/brainstorm
DISCIPLINARY CONTENT
Posted on: #iteachmsu

Transformative Collaboration
Key Method
The educator assists in establishing a plan of action with respect to the approach to learning and problem solving across a school campus.
Method Components
Problem solving is a critical skill required in order to work successfully with all stakeholders. While educators are not typically trained to problem solve explicitly, daily interactions with students, parents, and colleagues at all levels of the organization give them first-hand exposure to conditions where this key skill might be developed.
There are five universally agreed-upon stages of the problem solving process. When solving any problem, the problem needs to be defined, various solutions identified, the best solution chosen, the selected solution implemented, and the results analyzed.
The teacher will develop a protocol for communicating and problem solving with colleagues. Developing protocols is a structured process that promotes efficient communication, problem solving, and learning.
The educator assists in establishing a plan of action with respect to the approach to learning and problem solving across a school campus.
Method Components
Problem solving is a critical skill required in order to work successfully with all stakeholders. While educators are not typically trained to problem solve explicitly, daily interactions with students, parents, and colleagues at all levels of the organization give them first-hand exposure to conditions where this key skill might be developed.
There are five universally agreed-upon stages of the problem solving process. When solving any problem, the problem needs to be defined, various solutions identified, the best solution chosen, the selected solution implemented, and the results analyzed.
The teacher will develop a protocol for communicating and problem solving with colleagues. Developing protocols is a structured process that promotes efficient communication, problem solving, and learning.
PEDAGOGICAL DESIGN
Posted on: #iteachmsu

Web Content Accessibility Guidelines (WCAG) 2.2
Web Content Accessibility Guidelines (WCAG) 2.2 defines how to make Web content more accessible to people with disabilities. Accessibility involves a wide range of disabilities, including visual, auditory, physical, speech, cognitive, language, learning, and neurological disabilities. Although these guidelines cover a wide range of issues, they are not able to address the needs of people with all types, degrees, and combinations of disability. These guidelines also make Web content more usable by older individuals with changing abilities due to aging and often improve usability for users in general.
WCAG 2.2 is developed through the W3C process in cooperation with individuals and organizations around the world, with a goal of providing a shared standard for Web content accessibility that meets the needs of individuals, organizations, and governments internationally. WCAG 2.2 builds on WCAG 2.0 [WCAG20] and WCAG 2.1 [WCAG21], which in turn built on WCAG 1.0 [WAI-WEBCONTENT] and is designed to apply broadly to different Web technologies now and in the future, and to be testable with a combination of automated testing and human evaluation. For an introduction to WCAG, see the Web Content Accessibility Guidelines (WCAG) Overview.
Significant challenges were encountered in defining additional criteria to address cognitive, language, and learning disabilities, including a short timeline for development as well as challenges in reaching consensus on testability, implementability, and international considerations of proposals. Work will carry on in this area in future versions of WCAG. We encourage authors to refer to our supplemental guidance on improving inclusion for people with disabilities, including learning and cognitive disabilities, people with low-vision, and more.
Web accessibility depends not only on accessible content but also on accessible Web browsers and other user agents. Authoring tools also have an important role in Web accessibility. For an overview of how these components of Web development and interaction work together, see:
Essential Components of Web Accessibility
User Agent Accessibility Guidelines (UAAG) Overview
Authoring Tool Accessibility Guidelines (ATAG) Overview
Where this document refers to WCAG 2 it is intended to mean any and all versions of WCAG that start with 2.
WCAG 2.2 is developed through the W3C process in cooperation with individuals and organizations around the world, with a goal of providing a shared standard for Web content accessibility that meets the needs of individuals, organizations, and governments internationally. WCAG 2.2 builds on WCAG 2.0 [WCAG20] and WCAG 2.1 [WCAG21], which in turn built on WCAG 1.0 [WAI-WEBCONTENT] and is designed to apply broadly to different Web technologies now and in the future, and to be testable with a combination of automated testing and human evaluation. For an introduction to WCAG, see the Web Content Accessibility Guidelines (WCAG) Overview.
Significant challenges were encountered in defining additional criteria to address cognitive, language, and learning disabilities, including a short timeline for development as well as challenges in reaching consensus on testability, implementability, and international considerations of proposals. Work will carry on in this area in future versions of WCAG. We encourage authors to refer to our supplemental guidance on improving inclusion for people with disabilities, including learning and cognitive disabilities, people with low-vision, and more.
Web accessibility depends not only on accessible content but also on accessible Web browsers and other user agents. Authoring tools also have an important role in Web accessibility. For an overview of how these components of Web development and interaction work together, see:
Essential Components of Web Accessibility
User Agent Accessibility Guidelines (UAAG) Overview
Authoring Tool Accessibility Guidelines (ATAG) Overview
Where this document refers to WCAG 2 it is intended to mean any and all versions of WCAG that start with 2.
NAVIGATING CONTEXT
Posted on: Software testing
What Is Agile Methodology in Project Management?
The Agile methodology is a way to manage a project by breaking it up into several phases. It involves constant collaboration with stakeholders and continuous improvement at every stage. Once the work begins, teams cycle through a process of planning, executing, and evaluating. Continuous collaboration is vital, both with team members and project stakeholders.
Posted on: #iteachmsu

Article For Software development life cycle
What is SDLC?
SDLC is a process followed for a software project, within a software organization. It consists of a detailed plan describing how to develop, maintain, replace and alter or enhance specific software. The life cycle defines a methodology for improving the quality of software and the overall development process.
The following figure is a graphical representation of the various stages of a typical SDLC.
A typical Software Development Life Cycle consists of the following stages −
Stage 1: Planning and Requirement Analysis
Requirement analysis is the most important and fundamental stage in SDLC. It is performed by the senior members of the team with inputs from the customer, the sales department, market surveys and domain experts in the industry. This information is then used to plan the basic project approach and to conduct product feasibility study in the economical, operational and technical areas.
Planning for the quality assurance requirements and identification of the risks associated with the project is also done in the planning stage. The outcome of the technical feasibility study is to define the various technical approaches that can be followed to implement the project successfully with minimum risks.
Stage 2: Defining Requirements
Once the requirement analysis is done the next step is to clearly define and document the product requirements and get them approved from the customer or the market analysts. This is done through an SRS (Software Requirement Specification) document which consists of all the product requirements to be designed and developed during the project life cycle.
Stage 3: Designing the Product Architecture
SRS is the reference for product architects to come out with the best architecture for the product to be developed. Based on the requirements specified in SRS, usually more than one design approach for the product architecture is proposed and documented in a DDS - Design Document Specification.
This DDS is reviewed by all the important stakeholders and based on various parameters as risk assessment, product robustness, design modularity, budget and time constraints, the best design approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along with its communication and data flow representation with the external and third party modules (if any). The internal design of all the modules of the proposed architecture should be clearly defined with the minutest of the details in DDS.
Stage 4: Building or Developing the Product
In this stage of SDLC the actual development starts and the product is built. The programming code is generated as per DDS during this stage. If the design is performed in a detailed and organized manner, code generation can be accomplished without much hassle.
Developers must follow the coding guidelines defined by their organization and programming tools like compilers, interpreters, debuggers, etc. are used to generate the code. Different high level programming languages such as C, C++, Pascal, Java and PHP are used for coding. The programming language is chosen with respect to the type of software being developed.
Stage 5: Testing the Product
This stage is usually a subset of all the stages as in the modern SDLC models, the testing activities are mostly involved in all the stages of SDLC. However, this stage refers to the testing only stage of the product where product defects are reported, tracked, fixed and retested, until the product reaches the quality standards defined in the SRS.
Stage 6: Deployment in the Market and Maintenance
Once the product is tested and ready to be deployed it is released formally in the appropriate market. Sometimes product deployment happens in stages as per the business strategy of that organization. The product may first be released in a limited segment and tested in the real business environment (UAT- User acceptance testing).
Then based on the feedback, the product may be released as it is or with suggested enhancements in the targeting market segment. After the product is released in the market, its maintenance is done for the existing customer base.Video link:Embedded video link:Link: https://projects.invisionapp.com/d/main#/console/20294675/458743820/preview
SDLC is a process followed for a software project, within a software organization. It consists of a detailed plan describing how to develop, maintain, replace and alter or enhance specific software. The life cycle defines a methodology for improving the quality of software and the overall development process.
The following figure is a graphical representation of the various stages of a typical SDLC.
A typical Software Development Life Cycle consists of the following stages −
Stage 1: Planning and Requirement Analysis
Requirement analysis is the most important and fundamental stage in SDLC. It is performed by the senior members of the team with inputs from the customer, the sales department, market surveys and domain experts in the industry. This information is then used to plan the basic project approach and to conduct product feasibility study in the economical, operational and technical areas.
Planning for the quality assurance requirements and identification of the risks associated with the project is also done in the planning stage. The outcome of the technical feasibility study is to define the various technical approaches that can be followed to implement the project successfully with minimum risks.
Stage 2: Defining Requirements
Once the requirement analysis is done the next step is to clearly define and document the product requirements and get them approved from the customer or the market analysts. This is done through an SRS (Software Requirement Specification) document which consists of all the product requirements to be designed and developed during the project life cycle.
Stage 3: Designing the Product Architecture
SRS is the reference for product architects to come out with the best architecture for the product to be developed. Based on the requirements specified in SRS, usually more than one design approach for the product architecture is proposed and documented in a DDS - Design Document Specification.
This DDS is reviewed by all the important stakeholders and based on various parameters as risk assessment, product robustness, design modularity, budget and time constraints, the best design approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along with its communication and data flow representation with the external and third party modules (if any). The internal design of all the modules of the proposed architecture should be clearly defined with the minutest of the details in DDS.
Stage 4: Building or Developing the Product
In this stage of SDLC the actual development starts and the product is built. The programming code is generated as per DDS during this stage. If the design is performed in a detailed and organized manner, code generation can be accomplished without much hassle.
Developers must follow the coding guidelines defined by their organization and programming tools like compilers, interpreters, debuggers, etc. are used to generate the code. Different high level programming languages such as C, C++, Pascal, Java and PHP are used for coding. The programming language is chosen with respect to the type of software being developed.
Stage 5: Testing the Product
This stage is usually a subset of all the stages as in the modern SDLC models, the testing activities are mostly involved in all the stages of SDLC. However, this stage refers to the testing only stage of the product where product defects are reported, tracked, fixed and retested, until the product reaches the quality standards defined in the SRS.
Stage 6: Deployment in the Market and Maintenance
Once the product is tested and ready to be deployed it is released formally in the appropriate market. Sometimes product deployment happens in stages as per the business strategy of that organization. The product may first be released in a limited segment and tested in the real business environment (UAT- User acceptance testing).
Then based on the feedback, the product may be released as it is or with suggested enhancements in the targeting market segment. After the product is released in the market, its maintenance is done for the existing customer base.Video link:Embedded video link:Link: https://projects.invisionapp.com/d/main#/console/20294675/458743820/preview
Authored by: Vijayalaxmi vishvanath mali
Navigating Context
Posted on: What are the 12 Agi...
The Agile Alliance defines 12 lightness principles for those who need to attain agility: Our highes
Edited: The Agile Alliance defines 12 lightness principles for those who need to attain agility:
Our highest priority is to satisfy the client through early and continuous delivery of valuable computer software.
Welcome dynamic necessities, even late in development. Agile Processes harness modification for the customer’s competitive advantage.
Deliver operating computer software often, from a pair of weeks to a couple of months, with a preference to the shorter timescale.
Business individuals and developers should work along daily throughout the project.
The build comes around actuated people. offer them the setting and support they have, and trust them to urge the task done.
the foremost economical and effective methodology of conveyancing info to and among a development team is face-to-face speech.
Working with computer software is the primary life of progress.
Agile processes promote property development. The sponsors, developers, and users will be able to maintain a relentless pace indefinitely.
Continuous attention to technical excellence and smart style enhances nimbleness.
Simplicity—the art of maximizing the number of work not done—is essential.
the most effective architectures, necessities, and styles emerge from self–organizing groups.
At regular intervals, the team reflects on a way to become simpler, then tunes and adjusts its behavior consequently.
Our highest priority is to satisfy the client through early and continuous delivery of valuable computer software.
Welcome dynamic necessities, even late in development. Agile Processes harness modification for the customer’s competitive advantage.
Deliver operating computer software often, from a pair of weeks to a couple of months, with a preference to the shorter timescale.
Business individuals and developers should work along daily throughout the project.
The build comes around actuated people. offer them the setting and support they have, and trust them to urge the task done.
the foremost economical and effective methodology of conveyancing info to and among a development team is face-to-face speech.
Working with computer software is the primary life of progress.
Agile processes promote property development. The sponsors, developers, and users will be able to maintain a relentless pace indefinitely.
Continuous attention to technical excellence and smart style enhances nimbleness.
Simplicity—the art of maximizing the number of work not done—is essential.
the most effective architectures, necessities, and styles emerge from self–organizing groups.
At regular intervals, the team reflects on a way to become simpler, then tunes and adjusts its behavior consequently.
Posted by: Chathuri Super admin..
Disciplinary Content
Posted on: #iteachmsu

Beyond space missions, this approachable design allows Laika to integrate into domestic contexts.
In the intersection of space travel and robotics, Jihee Kim introduces Laika — a concept design for a life-like, AI robot pet that can interact with humans. Laika has been designed for upcoming space projects such as NASA’s Artemis and Moon to Mars missions set for 2025-2030, envisioned as the ultimate companion for space explorers as it caters to both their physical and emotional well-being while they are away from home. Unlike the aggressive robotic dogs currently available on the market, Jihee Kim has designed Laika with a friendly and organic finish that enables it to connect to its human counterpart on an emotional level when in use while monitoring their health conditions and assisting them in emergencies. Beyond space missions, this approachable design allows Laika to integrate into domestic contexts.
Image :
video link : Embedded URL test :
Table :
Sr NO
Assignee
Task
Cat 1
Rohit
Test 1
Cat 2
Shweta
Test 2
Numbering :
Number 1
Number 2
Bullets :
Bullets 1
Bullets 2
Bullets 3
URL : https://www.designboom.com/technology/life-like-ai-robot-dog-laika-space-travelers-jihee-kim-11-19-2023/
Image :
video link : Embedded URL test :
Table :
Sr NO
Assignee
Task
Cat 1
Rohit
Test 1
Cat 2
Shweta
Test 2
Numbering :
Number 1
Number 2
Bullets :
Bullets 1
Bullets 2
Bullets 3
URL : https://www.designboom.com/technology/life-like-ai-robot-dog-laika-space-travelers-jihee-kim-11-19-2023/
Authored by: vijayalaxmi vishwanath mali
Posted on: #iteachmsu

robot pet that can interact with humans.
In the intersection of space travel and robotics, Jihee Kim introduces Laika — a concept design for a life-like, AI robot pet that can interact with humans. Laika has been designed for upcoming space projects such as NASA’s Artemis and Moon to Mars missions set for 2025-2030, envisioned as the ultimate companion for space explorers as it caters to both their physical and emotional well-being while they are away from home. Unlike the aggressive robotic dogs currently available on the market, Jihee Kim has designed Laika with a friendly and organic finish that enables it to connect to its human counterpart on an emotional level when in use while monitoring their health conditions and assisting them in emergencies. Beyond space missions, this approachable design allows Laika to integrate into domestic contexts.
Image :
video link : Embedded URL test :
Table :
Sr NO
Assignee
Task
Cat 1
Rohit
Test 1
Cat 2
Shweta
Test 2
Numbering :
Number 1
Number 2
Bullets :
Bullets 1
Bullets 2
Bullets 3
URL : https://www.designboom.com/technology/life-like-ai-robot-dog-laika-space-travelers-jihee-kim-11-19-2023/
Image :
video link : Embedded URL test :
Table :
Sr NO
Assignee
Task
Cat 1
Rohit
Test 1
Cat 2
Shweta
Test 2
Numbering :
Number 1
Number 2
Bullets :
Bullets 1
Bullets 2
Bullets 3
URL : https://www.designboom.com/technology/life-like-ai-robot-dog-laika-space-travelers-jihee-kim-11-19-2023/
Authored by: Vijayalaxmi vishwanath mali
Posted on: #iteachmsu
About
Teaching Commons: “an emergent conceptual space for exchange and community among faculty, students, and all others committed to learning as an essential activity of life in contemporary democratic society” (Huber and Hutchings, 2005, p.1) What Is the #iteachmsu Commons? You teach MSU. We, the Academic Advancement Network, The Graduate School, and The Hub for Innovation in Learning and Technology, believe that a wide educator community (faculty, TAs, ULAs, instructional designers, academic advisors, et al.) makes learning happen across MSU. But, on such a large campus, it can be difficult to fully recognize and leverage this community’s teaching and learning innovations. To address this challenge, the #iteachmsu Commons provides an educator-driven space for sharing teaching resources, connecting across educator networks, and growing teaching practice. #iteachmsu Commons content may be discipline-specific or transdisciplinary, but will always be anchored in teaching competency areas. You will find blog posts, curated playlists, educator learning module pathways, and a campus-wide teaching and learning events calendar. We cultivate this commons across spaces. And through your engagement, we will continue to nurture a culture of teaching and learning across MSU and beyond. How Do I Contribute to the #iteachmsu Commons? Content is organized by posts, playlists and pathways.
Posts: Posts are shorter or longer-form blog postings about teaching practice(s), questions for the educator community, and/or upcoming teaching and learning events. With an MSU email address and free account signup, educators can immediately contribute blog posts and connected media (e.g. handouts, slide decks, class activity prompts, promotional materials). All educators at MSU are welcome to use and contribute to #iteachmsu. And there are no traditional editorial calendars. Suggested models of posts can be found here.
Playlists: Playlists are groupings of posts curated by individual educators and the #iteachmsu community. Playlists allow individual educators to tailor their development and community experiences based on teaching competency area, interest, and/or discipline.
Pathways: Pathways are groupings of educator learning modules curated by academic and support units for badges and other credentialing.
There are two ways to add your contribution to the space:
Contribute existing local resources for posts and pathways: Your unit, college, and/or department might already have educator development resources that could be of use to the wider MSU teaching and learning community. These could be existing blog posts on teaching practice, teaching webinars, and/or open educational resources (e.g classroom assessments, activities). This content will make up part of the posts, playlists, and pathways on this site. Educators can then curate these posts into playlists based on their individual interests. Please make sure to have permission to share this content on a central MSU web space.
Contribute new content for posts: A strength of the #iteachmsu Commons is that it immediately allows educators to share teaching resources, questions and events through posts to the entire community. Posts can take a variety of forms and are organized by teaching competency area categories, content tags, date, and popularity. Posts can be submitted by both individual educators and central units for immediate posting but must adhere to #iteachmsu Commons community guidelines. Posts could be:
About your teaching practice(s): You discuss and/or reflect on the practices you’re using in your teaching. In addition to talking about your ideas, successes, and challenges, we hope you also provide the teaching materials you used (sharing the assignment, slidedeck, rubric, etc.)
Responses to teaching ideas across the web or social media: You share your thoughts about teaching ideas they engage with from other media across the web (e.g. blog posts, social media posts, etc.).
Cross-posts from other teaching-related blogs that might be useful for the #iteachmsu community: You cross-post content from other teaching-related blogs they feel might be useful to the #iteachmsu community.
About teaching-related events: You share upcoming teaching related events as well as their thoughts about ideas they engage with events at MSU and beyond (e.g. workshops, conferences, etc.). If these events help you think in new ways about your practice, share them with the #iteachmsu community.
Questions for our community: You pose questions via posts to the larger community to get ideas for their practice and connect with others considering similar questions.
What Are the #iteachmsu Commons Policies?Part of the mission of the #iteachmsu Commons is to provide space for sharing, reflecting, and learning for all educators on our campus wherever they are in their teaching development. The commons is designed to encourage these types of interactions and reflect policies outlined by the MSU Faculty Senate. We maintain the right to remove any post that violates guidelines as outlined here and by MSU. To maintain a useful and safer commons, we ask that you:
Follow the MSU Guidelines for Social Media.
Engage across the #iteachmsu commons in a civil and respectful manner. Content may be moderated in accordance with the MSU Guidelines for Social Media.
Do not share private or confidential information via shared content on the #iteachmsu Commons.
Content posted on the #iteachmsu Commons is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license. Learn more about this licensing here. Posted comments, images, etc. on the #iteachmsu Commons do not necessarily represent the views of Michigan State University or the #iteachmsu Commons Team. Links to external, non-#iteachmsu Commons content do not constitute official endorsement by, or necessarily represent the views of, the #iteachmsu Commons or Michigan State University. What if I Have #iteachmsu Commons Questions and/or Feedback?If you have any concerns about #iteachmsu Commons content, please email us at iteach@msu.edu. We welcome all feedback and thank you for your help in promoting a safer, vibrant and respectful community.
Posts: Posts are shorter or longer-form blog postings about teaching practice(s), questions for the educator community, and/or upcoming teaching and learning events. With an MSU email address and free account signup, educators can immediately contribute blog posts and connected media (e.g. handouts, slide decks, class activity prompts, promotional materials). All educators at MSU are welcome to use and contribute to #iteachmsu. And there are no traditional editorial calendars. Suggested models of posts can be found here.
Playlists: Playlists are groupings of posts curated by individual educators and the #iteachmsu community. Playlists allow individual educators to tailor their development and community experiences based on teaching competency area, interest, and/or discipline.
Pathways: Pathways are groupings of educator learning modules curated by academic and support units for badges and other credentialing.
There are two ways to add your contribution to the space:
Contribute existing local resources for posts and pathways: Your unit, college, and/or department might already have educator development resources that could be of use to the wider MSU teaching and learning community. These could be existing blog posts on teaching practice, teaching webinars, and/or open educational resources (e.g classroom assessments, activities). This content will make up part of the posts, playlists, and pathways on this site. Educators can then curate these posts into playlists based on their individual interests. Please make sure to have permission to share this content on a central MSU web space.
Contribute new content for posts: A strength of the #iteachmsu Commons is that it immediately allows educators to share teaching resources, questions and events through posts to the entire community. Posts can take a variety of forms and are organized by teaching competency area categories, content tags, date, and popularity. Posts can be submitted by both individual educators and central units for immediate posting but must adhere to #iteachmsu Commons community guidelines. Posts could be:
About your teaching practice(s): You discuss and/or reflect on the practices you’re using in your teaching. In addition to talking about your ideas, successes, and challenges, we hope you also provide the teaching materials you used (sharing the assignment, slidedeck, rubric, etc.)
Responses to teaching ideas across the web or social media: You share your thoughts about teaching ideas they engage with from other media across the web (e.g. blog posts, social media posts, etc.).
Cross-posts from other teaching-related blogs that might be useful for the #iteachmsu community: You cross-post content from other teaching-related blogs they feel might be useful to the #iteachmsu community.
About teaching-related events: You share upcoming teaching related events as well as their thoughts about ideas they engage with events at MSU and beyond (e.g. workshops, conferences, etc.). If these events help you think in new ways about your practice, share them with the #iteachmsu community.
Questions for our community: You pose questions via posts to the larger community to get ideas for their practice and connect with others considering similar questions.
What Are the #iteachmsu Commons Policies?Part of the mission of the #iteachmsu Commons is to provide space for sharing, reflecting, and learning for all educators on our campus wherever they are in their teaching development. The commons is designed to encourage these types of interactions and reflect policies outlined by the MSU Faculty Senate. We maintain the right to remove any post that violates guidelines as outlined here and by MSU. To maintain a useful and safer commons, we ask that you:
Follow the MSU Guidelines for Social Media.
Engage across the #iteachmsu commons in a civil and respectful manner. Content may be moderated in accordance with the MSU Guidelines for Social Media.
Do not share private or confidential information via shared content on the #iteachmsu Commons.
Content posted on the #iteachmsu Commons is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license. Learn more about this licensing here. Posted comments, images, etc. on the #iteachmsu Commons do not necessarily represent the views of Michigan State University or the #iteachmsu Commons Team. Links to external, non-#iteachmsu Commons content do not constitute official endorsement by, or necessarily represent the views of, the #iteachmsu Commons or Michigan State University. What if I Have #iteachmsu Commons Questions and/or Feedback?If you have any concerns about #iteachmsu Commons content, please email us at iteach@msu.edu. We welcome all feedback and thank you for your help in promoting a safer, vibrant and respectful community.
Posted by: Chathuri Super admin..
Posted on: #iteachmsu
In our last post, We had a close look at Credentialing and what it entails. We also gained insight into how healthcare companies and providers manage this very important function in healthcare recruitment. Having understood why healthcare credential management is so crucial not only from a business perspective but also ensures there are no legal implications, the stage is just right to introduce another factor closely related to Credentialing, namely Compliance.
Join me in exploring why Compliance in Credentialing is so important and how this need not be such an onerous task with specialized apps, customized specifically for online healthcare recruitments. Credential compliance is achievable with minimal stress. Let us understand how, but first-a brief background.
What is Compliance in Credentialing, and Why does it matter?
I am using the the term ‘Compliance’ to mean meeting the requirements for Credentialing and participating in effective Compliance programs as set forth by the Office of Inspector General (OIG) and the National Committee for Quality Assurance(NCQA). This includes internal auditing, monitoring, credentialing education and training, developing plans of corrective action in responding to related problems as well as enforcing credentialing standards. Most Compliance programs, while generally operating as independent entities, report to their respective boards of directors or other committees providing assistance and oversight to the process.
So, what happens if a healthcare fails to verify accurately? Without careful oversight and auditing, it is all too possible for omissions or errors to occur before, during, or immediately following the process, which could lead to enrollment issues as well as open a pandora’s box to legal problems if the process is incomplete or the provider’s privacy is compromised. Furthermore, the 1960s case of Darling vs. Charleston Hospital established the responsibility of hospitals and other healthcare facilities in verifying the professional credentials of the physicians and other providers practicing under their roof.
REF : links :https://targetrecruit.com/the-importance-of-compliance-in-credentialing/
YouTube: https://youtu.be/C6YrPt1ygX8

THE IMPORTANCE OF COMPLIANCE IN CREDENTIALING
In our last post, We had a close look at Credentialing and what it entails. We also gained insight into how healthcare companies and providers manage this very important function in healthcare recruitment. Having understood why healthcare credential management is so crucial not only from a business perspective but also ensures there are no legal implications, the stage is just right to introduce another factor closely related to Credentialing, namely Compliance.
Join me in exploring why Compliance in Credentialing is so important and how this need not be such an onerous task with specialized apps, customized specifically for online healthcare recruitments. Credential compliance is achievable with minimal stress. Let us understand how, but first-a brief background.
What is Compliance in Credentialing, and Why does it matter?
I am using the the term ‘Compliance’ to mean meeting the requirements for Credentialing and participating in effective Compliance programs as set forth by the Office of Inspector General (OIG) and the National Committee for Quality Assurance(NCQA). This includes internal auditing, monitoring, credentialing education and training, developing plans of corrective action in responding to related problems as well as enforcing credentialing standards. Most Compliance programs, while generally operating as independent entities, report to their respective boards of directors or other committees providing assistance and oversight to the process.
So, what happens if a healthcare fails to verify accurately? Without careful oversight and auditing, it is all too possible for omissions or errors to occur before, during, or immediately following the process, which could lead to enrollment issues as well as open a pandora’s box to legal problems if the process is incomplete or the provider’s privacy is compromised. Furthermore, the 1960s case of Darling vs. Charleston Hospital established the responsibility of hospitals and other healthcare facilities in verifying the professional credentials of the physicians and other providers practicing under their roof.
REF : links :https://targetrecruit.com/the-importance-of-compliance-in-credentialing/
YouTube: https://youtu.be/C6YrPt1ygX8
Authored by: Greg
Disciplinary Content
Posted on: #iteachmsu

Greek Articles
Game gerdara
If you're trying to learn Greek Articles you will find some useful resources including a course about Definite and Indefinite Articles... to help you with your Greek grammar. Try to concentrate on the lesson and notice the pattern that occurs each time the word changes its place. Also don't forget to check the rest of our other lessons listed on Learn Greek. Enjoy the rest of the lesson!
If you're trying to learn Greek Articles you will find some useful resources including a course about Definite and Indefinite Articles... to help you with your Greek grammar. Try to concentrate on the lesson and notice the pattern that occurs each time the word changes its place. Also don't forget to check the rest of our other lessons listed on Learn Greek. Enjoy the rest of the lesson!
Authored by: Chathu
Disciplinary Content
Posted on: #iteachmsu

Greek Articles
Game gerdara
If you're trying to learn Greek Articles you will find some useful resources including a course about Definite and Indefinite Articles... to help you with your Greek grammar. Try to concentrate on the lesson and notice the pattern that occurs each time the word changes its place. Also don't forget to check the rest of our other lessons listed on Learn Greek. Enjoy the rest of the lesson!
If you're trying to learn Greek Articles you will find some useful resources including a course about Definite and Indefinite Articles... to help you with your Greek grammar. Try to concentrate on the lesson and notice the pattern that occurs each time the word changes its place. Also don't forget to check the rest of our other lessons listed on Learn Greek. Enjoy the rest of the lesson!
Authored by: Chathu
Disciplinary Content
Posted on: #iteachmsu
Stages of a typical SDLC.Stage 1: Planning and Requirement Analysis Requirement analysis is the most important and fundamental stage in SDLC. It is performed by the senior members of the team with inputs from the customer, the sales department, market surveys and domain experts in the industry. This information is then used to plan the basic project approach and to conduct product feasibility study in the economical, operational and technical areas. Stages of a typical SDLC.Stage 1: Planning and Requirement Analysis Requirement analysis is the most important and fundamental stage in SDLC. It is performed by the senior members of the team with inputs from the customer, the sales department, market surveys and domain experts in the industry. This information is then used to plan the basic project approach and to conduct product feasibility study in the economical, operational and technical areas.
Posted by: Super Admin
Disciplinary Content
Posted on: #iteachmsu

Stage 1: Planning and Requirement Analysis
Requirement analysis is the most important and fundamental stage in SDLC. It is performed by the senior members of the team with inputs from the customer, the sales department, market surveys and domain experts in the industry. This information is then used to plan the basic project approach and to conduct product feasibility study in the economical, operational and technical areas.
Planning for the quality assurance requirements and identification of the risks associated with the project is also done in the planning stage. The outcome of the technical feasibility study is to define the various technical approaches that can be followed to implement the project successfully with minimum risks.
Stage 2: Defining Requirements
Once the requirement analysis is done the next step is to clearly define and document the product requirements and get them approved from the customer or the market analysts. This is done through an SRS (Software Requirement Specification) document which consists of all the product requirements to be designed and developed during the project life cycle.
Stage 3: Designing the Product Architecture
SRS is the reference for product architects to come out with the best architecture for the product to be developed. Based on the requirements specified in SRS, usually more than one design approach for the product architecture is proposed and documented in a DDS - Design Document Specification.
This DDS is reviewed by all the important stakeholders and based on various parameters as risk assessment, product robustness, design modularity, budget and time constraints, the best design approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along with its communication and data flow representation with the external and third party modules (if any). The internal design of all the modules of the proposed architecture should be clearly defined with the minutest of the details in DDS.
Stage 4: Building or Developing the Product
In this stage of SDLC the actual development starts and the product is built. The programming code is generated as per DDS during this stage. If the design is performed in a detailed and organized manner, code generation can be accomplished without much hassle.
Developers must follow the coding guidelines defined by their organization and programming tools like compilers, interpreters, debuggers, etc. are used to generate the code. Different high level programming languages such as C, C++, Pascal, Java and PHP are used for coding. The programming language is chosen with respect to the type of software being developed.
Stage 5: Testing the Product
This stage is usually a subset of all the stages as in the modern SDLC models, the testing activities are mostly involved in all the stages of SDLC. However, this stage refers to the testing only stage of the product where product defects are reported, tracked, fixed and retested, until the product reaches the quality standards defined in the SRS.
Stage 6: Deployment in the Market and Maintenance
Once the product is tested and ready to be deployed it is released formally in the appropriate market. Sometimes product deployment happens in stages as per the business strategy of that organization. The product may first be released in a limited segment and tested in the real business environment (UAT- User acceptance testing).
Then based on the feedback, the product may be released as it is or with suggested enhancements in the targeting market segment. After the product is released in the market, its maintenance is done for the existing customer base.
Requirement analysis is the most important and fundamental stage in SDLC. It is performed by the senior members of the team with inputs from the customer, the sales department, market surveys and domain experts in the industry. This information is then used to plan the basic project approach and to conduct product feasibility study in the economical, operational and technical areas.
Planning for the quality assurance requirements and identification of the risks associated with the project is also done in the planning stage. The outcome of the technical feasibility study is to define the various technical approaches that can be followed to implement the project successfully with minimum risks.
Stage 2: Defining Requirements
Once the requirement analysis is done the next step is to clearly define and document the product requirements and get them approved from the customer or the market analysts. This is done through an SRS (Software Requirement Specification) document which consists of all the product requirements to be designed and developed during the project life cycle.
Stage 3: Designing the Product Architecture
SRS is the reference for product architects to come out with the best architecture for the product to be developed. Based on the requirements specified in SRS, usually more than one design approach for the product architecture is proposed and documented in a DDS - Design Document Specification.
This DDS is reviewed by all the important stakeholders and based on various parameters as risk assessment, product robustness, design modularity, budget and time constraints, the best design approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along with its communication and data flow representation with the external and third party modules (if any). The internal design of all the modules of the proposed architecture should be clearly defined with the minutest of the details in DDS.
Stage 4: Building or Developing the Product
In this stage of SDLC the actual development starts and the product is built. The programming code is generated as per DDS during this stage. If the design is performed in a detailed and organized manner, code generation can be accomplished without much hassle.
Developers must follow the coding guidelines defined by their organization and programming tools like compilers, interpreters, debuggers, etc. are used to generate the code. Different high level programming languages such as C, C++, Pascal, Java and PHP are used for coding. The programming language is chosen with respect to the type of software being developed.
Stage 5: Testing the Product
This stage is usually a subset of all the stages as in the modern SDLC models, the testing activities are mostly involved in all the stages of SDLC. However, this stage refers to the testing only stage of the product where product defects are reported, tracked, fixed and retested, until the product reaches the quality standards defined in the SRS.
Stage 6: Deployment in the Market and Maintenance
Once the product is tested and ready to be deployed it is released formally in the appropriate market. Sometimes product deployment happens in stages as per the business strategy of that organization. The product may first be released in a limited segment and tested in the real business environment (UAT- User acceptance testing).
Then based on the feedback, the product may be released as it is or with suggested enhancements in the targeting market segment. After the product is released in the market, its maintenance is done for the existing customer base.
Posted by: Super Admin
Disciplinary Content
Posted on: #iteachmsu
Stages of a typical SDLC.Stage 1: Planning and Requirement Analysis Requirement analysis is the most important and fundamental stage in SDLC. It is performed by the senior members of the team with inputs from the customer, the sales department, market surveys and domain experts in the industry. This information is then used to plan the basic project approach and to conduct product feasibility study in the economical, operational and technical areas. Stages of a typical SDLC.Stage 1: Planning and Requirement Analysis Requirement analysis is the most important and fundamental stage in SDLC. It is performed by the senior members of the team with inputs from the customer, the sales department, market surveys and domain experts in the industry. This information is then used to plan the basic project approach and to conduct product feasibility study in the economical, operational and technical areas.
Posted by: Super Admin
Disciplinary Content
Posted on: #iteachmsu
A World Heritage Site is a landmark or area which is chosen by the United Nations Educational, Scientific and Cultural Organisation (UNESCO) as having cultural, historical, scientific or other form of significance, and is legally protected by international treaties.
Posted by: Chathuri Hewapathirana
Assessing Learning
Posted on: #iteachmsu

Beef ban is illogical
India is a country of 80 per cent Hindus and for most of them, the killing and consuming of cows is a sin on religious and traditional grounds. We have to respect that. It has been a tradition that has been upheld for thousands of years and respected by even non-Hindu kings as diverse as Babar, Hyder Ali and Ranjit Singh.
You can’t fight your identity. While you may say all that is in the past, that is not actually so. Even in 2017 most Hindus still do not believe in eating beef and this majority sentiment has to be respected. When India goes out of its way to placate the minorities, what is the logic of antagonising the majority?]
India is a country of 80 per cent Hindus and for most of them, the killing and consuming of cows is a sin on religious and traditional grounds. We have to respect that. It has been a tradition that has been upheld for thousands of years and respected by even non-Hindu kings as diverse as Babar, Hyder Ali and Ranjit Singh.
You can’t fight your identity. While you may say all that is in the past, that is not actually so. Even in 2017 most Hindus still do not believe in eating beef and this majority sentiment has to be respected. When India goes out of its way to placate the minorities, what is the logic of antagonising the majority?
India is a country of 80 per cent Hindus and for most of them, the killing and consuming of cows is a sin on religious and traditional grounds. We have to respect that. It has been a tradition that has been upheld for thousands of years and respected by even non-Hindu kings as diverse as Babar, Hyder Ali and Ranjit Singh.
You can’t fight your identity. While you may say all that is in the past, that is not actually so. Even in 2017 most Hindus still do not believe in eating beef and this majority sentiment has to be respected. When India goes out of its way to placate the minorities, what is the logic of antagonizing the majority?
India is a country of 80 per cent Hindus and for most of them, the killing and consuming of cows is a sin on religious and traditional grounds. We have to respect that. It has been a tradition that has been upheld for thousands of years and respected by even non-Hindu kings as diverse as Babar, Hyder Ali and Ranjit Singh.
You can’t fight your identity. While you may say all that is in the past, that is not actually so. Even in 2017 most Hindus still do not believe in eating beef and this majority sentiment has to be respected. When India goes out of its way to placate the minorities, what is the logic of antagonising the majority?]
India is a country of 80 per cent Hindus and for most of them, the killing and consuming of cows is a sin on religious and traditional grounds. We have to respect that. It has been a tradition that has been upheld for thousands of years and respected by even non-Hindu kings as diverse as Babar, Hyder Ali and Ranjit Singh.
You can’t fight your identity. While you may say all that is in the past, that is not actually so. Even in 2017 most Hindus still do not believe in eating beef and this majority sentiment has to be respected. When India goes out of its way to placate the minorities, what is the logic of antagonising the majority?
India is a country of 80 per cent Hindus and for most of them, the killing and consuming of cows is a sin on religious and traditional grounds. We have to respect that. It has been a tradition that has been upheld for thousands of years and respected by even non-Hindu kings as diverse as Babar, Hyder Ali and Ranjit Singh.
You can’t fight your identity. While you may say all that is in the past, that is not actually so. Even in 2017 most Hindus still do not believe in eating beef and this majority sentiment has to be respected. When India goes out of its way to placate the minorities, what is the logic of antagonizing the majority?
Posted by: Chathuri Super admin..
Posted on: #iteachmsu
Caring for children with ADHD may be challenging, but it is important to remember that these children can learn successfully. It is critical that parents remember that some of their child's disruptive behavior is a manifestation of the disability and that the challenge is finding ways to help their child change the inappropriate behavior. Key to this is remembering to focus on the need for structure and routine for your child's daily schedule and thereby reinforcing the importance of learning self-control and self-regulation. The following are suggestions for parents:
Posted by: Chathuri Super admin..
Navigating Context
Host: MSU Libraries
Artist Workshop: Using 360 Cameras to Show Changes to Place
Join the DSL Graduate Arts Fellow, Hailey Becker (Art, Art History and Design and Forestry) in a workshop on using 360 cameras to capture changes to place. Participants will be guided through the basics of recording and editing 360 footage, ending with their footage being displayed in the Digital Scholarship Lab 360 Room. Using 360 footage can be a great way to archive an artistic practice or scientific research. No experience required, all levels welcome!
Navigating Context
EXPIRED