What Is The Meaning of Database Management? Why Is Required in Business System?
What Is The Meaning of Database Management? Why Is Required in Business System?
What Is The Meaning of Database Management? Why Is Required in Business System?
1) Conversion of singular to pleural or pleural to singular,... any one or both can be asked.
2) In case of fill in the blanks, etre or avoir would not be written below the blank.
example : I ____ a pen. In such cases mam would not write below the blank whether to
use etre or avoir....we have to find it out ourselves.
Guys, if you need any help regarding slides or French ...fell free to call me...bye
Management of resource
To reduce the time
Human resource (internal entity)
computers, with RAID disk arrays used for stable storage. Connected to one or more
servers via a high-speed channel, hardware database accelerators are also used in large
volume transaction processing environments. DBMSs are found at the heart of most
database applications. Sometimes DBMSs are built around a private multitasking kernel
with built-in networking support although nowadays these functions are left to the
operating system.
DBMS includes of four main parts: Modeling language, data structure, database query
language, and transaction mechanism:
each computer application implement these from scratch, they can rely on the
DBMS to supply such calculations.
Change and access logging
Often one wants to know who accessed what attributes, what was changed, and
when it was changed. Logging services allow this by keeping a record of access
occurrences and changes.
Automated optimization
If there are frequently occurring usage patterns or requests, some DBMS can
adjust themselves to improve the speed of those interactions. In some cases the
DBMS will merely provide tools to monitor performance, allowing a human
expert to make the necessary adjustments after reviewing the statistics collected.
Alpha Five
DataEase
Brilliant Database
Oracle database
IBM DB2
Adaptive Server Enterprise
FileMaker
Firebird
Ingres
Informix
Microsoft Access
Daffodil DB
Q. 3) what is computer?
Ans : computer system can be compared with Human resources like brain the computer is
having a C.P.U.
Ex.
Human brain controls each & every part likewise C.P.U. also control every part of
the computer.
The Brain is divided into two parts right brain and left brain whose main function
to control left part and right part of the body respectively. Similarly, C.P.U. is
having A.L.U. (arithmetic logical unit) which handles the components of the
computer and is helped by the system BUS. For eg. If there is a problem with
keyboard the system BUS tells us about the problem.
The information from different parts of the body is send to brain through central
nervous system. In the similar passion Operating System helps to communicate
with system BUS and other function of operating system is to identify the
configuration of computer. It identifies the all input and output devices which are
Keyboard, mouse, monitor, Hard Disk drive, printer, scanner, CD/DVD RW,
Floppy disk drive, pen drive, web cam, speaker and microphone.
undertaken to create a unique product or service, which brings about beneficial change or
added value. This property of being a temporary and one-time undertaking contrasts with
processes, or operations, which are permanent or semi-permanent ongoing functional
work to create the same product or service over and over again. The management of these
two systems is often very different and requires varying technical skills and philosophy,
hence requiring the development of project management.
The first challenge of project management is to make sure that a project is delivered
within defined constraints. The second, more ambitious challenge is the optimized
allocation and integration of inputs needed to meet pre-defined objectives. A project is a
carefully defined set of activities that use resources (money, people, materials, energy,
space, provisions, communication, etc.) to meet the pre-defined objectives.
The purpose of Project Planning is to identify the scope of the project, estimate the work
involved, and create a project schedule. Project planning begins with requirements that
define the software to be developed. The project plan is then developed to describe the
tasks that will lead to completion.
Why there is requirement of software management?
Requirements analysis is a term used to describe all the tasks that go into the instigation,
scoping and definition of a new or altered computer system. Requirements analysis is an
important part of the software engineering process; whereby business analysts or
software developer identify the needs or requirements of a client; having identified these
requirements they are then in a position to design a solution.
QUALITY ASSURANCE:Quality assurance covers all activities from design, development, production, installation,
servicing and documentation. This introduced the rules: "fit for purpose" and "do it right
the first time". It includes the regulation of the quality of raw materials, assemblies,
products and components; services related to production; and management, production,
and inspection processes. Quality assurance (QA) is the activity of providing evidence
needed to establish confidence among all concerned, that quality-related activities are
being performed effectively. All those planned or systematic actions necessary to provide
adequate confidence that a product or service will satisfy given requirements for quality.
QUALITY CONTROL
Quality control is involved in developing systems to ensure products or services are
designed and produced to meet or exceed customer requirements. These systems are often
developed in conjunction with other business and engineering disciplines using a crossfunctional approach.
QUALITY CONTROL(QC)
1.)
recovery of processes and return to normal operations, solely covering interim business
continuity requirements. A disaster recovery plan, business resumption plan, and
occupant emergency plan may be appended to the BCP. Responsibilities and priorities
set in the BCP should be coordinated with those in Continuity of Operations to eliminate
possible conflicts.
Control Activities. Control activities are the policies and procedures that help ensure
management directives are carried out. They help ensure that necessary actions are taken
to address risks to achievement of the entity's objectives. Control activities occur
throughout the organization, at all levels and in all functions. They include a range of
activities as diverse as approvals, authorizations, verifications, reconciliations, reviews of
operating performance, security of assets and segregation of duties. In an IT environment,
control activities typically include IT general controls -- such as controls over program
changes, access to programs, computer operations -- and application controls.
Monitoring. Auditing processes and schedules should be developed to address the highrisk areas within the IT organization. IT personnel should perform frequent internal
audits. In addition, personnel from outside the IT organization should perform audits on a
schedule that is appropriate to the level of risk. Management should clearly understand
and be held responsible for the outcome of these audits.
Information and Communication. Without timely, accurate information, it will be
difficult for IT management to proactively identify and address areas of risk. They will be
unable to react to issues as they occur. IT management must demonstrate to company
management an understanding of what needs to be done to comply with Sarbanes-Oxley
and how to get there.
DISASTER RECOVERY PLAN (DRP)
Disaster recovery is the process of regaining access to the data, hardware and software
necessary to resume critical business operations after a natural or human-induced disaster.
A disaster recovery plan (DRP) should also include plans for coping with the unexpected
or sudden loss of key personnel, although this is not covered in this article, the focus of
which is data protection. Disaster recovery planning involves an analysis of business
processes and continuity needs; it may also include a significant focus on disaster
prevention. It is required because the primary objective of a business resumption plan is
to enable an organization to survive a disaster and to re-establish normal business
operations. In order to survive, an organization must ensure that critical operations can
resume within a reasonable time frame. Therefore, the goals of a business resumption
plan should be to identify weaknesses and implement a disaster prevention programmed,
minimize the duration of a serious disruption to business operations, facilitate effective
co-ordination of recovery tasks, and most importantly reduce complexity of the recovery
effort.
HOW TO IMPLEMENT DRP?
There are following steps for the implementation of DRP:
1.) Understand where gap may exist
2.) Identify weak links in your Disaster recovery plan
3.) Optimize Disaster recovery in your existing environments
4.) Minimize configuration changes
5.) Reduce hardware costs for your replica environments.
ADVANTAGES OF DRP.
A.)To come down to a simple risk assessment.
for that application. For example, when Apache HTTP Server (software) is a
company's web server, the computer running it is also called the web server.
Server applications can be divided among server computers over an extreme
range, depending upon the workload. Under light loading, every server
application can run concurrently on a single computer. Under heavy loading,
multiple server computers may be required for each application. Under
medium loading, it is common to use one server computer per server
application, in order to limit the amount of damage caused by failure of any
single server computer or security breach of any single server application.
Any server computer can also be used as a workstation, but it is avoided in
practice, again to contain risk.
Server or server computer is also a designation for computer models
intended for use running server applications, often under heavy workloads,
unattended, for extended time. While any "workstation" computer can run
server operating systems and server applications, a server computer usually
has special features intended to make it more suitable. Distinctions often
include faster processor and memory, more RAM, larger hard drives, higher
reliability, redundant power supplies, redundant hard drives (RAID),
compact size and shape, modular design (e.g., blade servers often used in
server farms), rack or cabinet mountability, serial console redirection, etc.
The name server or server appliance also applies to network-connected
computer appliances or "appliance hardware" that provides specific services
onto the network. Though the appliance is a server computer, loaded with a
server operating system and a server application, the user need not configure
any of it. It is a black box that does a specific job. The simplest servers are
most often sold as appliances, for example switches, routers, gateways, print
servers, net modems.
A server is defined as a multi-user computer that provides a service (e.g.
database access, file transfer, remote access) or resources (e.g. file space)
over a network connection.
o
o
o
o
o
o
o
o
o
o
o
These days, clients are most often web browsers, although that has not
always been the case. Servers typically include web servers, database servers
and mail servers. Online gaming is usually client-server too. In the specific
case of MMORPG, the servers are typically operated by the company selling
the game; for other games one of the players will act as the host by setting
his game in server mode.
The interaction between client and server is often described using sequence
diagrams. Sequence diagrams are standardized in the Unified Modeling
Language.
Characteristics
Characteristics of a client
Initiates requests
Waits for and receives replies
Usually connects to a small number of servers at one time
Typically interacts directly with end-users using a graphical user
interface
Characteristics of a server
Passive (slave)
Waits for requests from clients
Upon receipt of requests, processes them and then serves replies
Usually accepts connections from a large number of clients
Typically does not interact directly with end-users
A data warehouse provides a common data model for all data of interest
regardless of the data's source. This makes it easier to report and analyze
information than it would be if multiple data models were used to retrieve
information such as sales invoices, order receipts, general ledger charges, etc.
Prior to loading data into the data warehouse, inconsistencies are identified and
resolved. This greatly simplifies reporting and analysis.
Information in the data warehouse is under the control of data warehouse users so
that, even if the source system data is purged over time, the information in the
warehouse can be stored safely for extended periods of time.
Because they are separate from operational systems, data warehouses provide
retrieval of data without slowing down operational systems.
Data warehouses can work in conjunction with and, hence, enhance the value of
operational business applications, notably customer relationship management
(CRM) systems.
Data warehouses facilitate decision support system applications such as trend
reports (e.g., the items with the most sales in a particular area within the last two
years), exception reports, and reports that show actual performance versus goals.
Over their life, data warehouses can have high costs. The data warehouse is
usually not static. Maintenance costs are high.
Data warehouses can get outdated relatively quickly. There is a cost of delivering
suboptimal information to the organization.
There is often a fine line between data warehouses and operational systems.
Duplicate, expensive functionality may be developed. Or, functionality may be
developed in the data warehouse that, in retrospect, should have been developed
in the operational systems and vice versa..
BI systems provide historical, current, and predictive views of business operations, most
often using data that has been gathered into a data warehouse or a data mart and
occasionally working from operational data. Software elements support the use of this
information by assisting in the extraction, analysis, and reporting of information.
Applications tackle sales, production, financial, and many other sources of business data
for purposes that include, notably, business performance management. Information may
be gathered on comparable companies to produce benchmarks.
Electronic commerce
Electronic commerce, commonly known as e-commerce or eCommerce, consists of the
buying and selling of products or services over electronic systems such as the Internet
and other computer networks. The amount of trade conducted electronically has grown
extraordinarily since the spread of the Internet. A wide variety of commerce is conducted
in this way, spurring and drawing on innovations in electronic funds transfer, supply
chain management, Internet marketing, online transaction processing, electronic data
interchange (EDI), inventory management systems, and automated data collection
systems. Modern electronic commerce typically uses the World Wide Web at least at
some point in the transaction's lifecycle, although it can encompass a wider range of
technologies such as e-mail as well.
A large percentage of electronic commerce is conducted entirely electronically for virtual
items such as access to premium content on a website, but most electronic commerce
involves the transportation of physical items in some way. Online retailers are sometimes
known as e-tailers and online retail is sometimes known as e-tail. Almost all big retailers
have electronic commerce presence on the World Wide Web.
Electronic commerce that is conducted between businesses is referred to as business-tobusiness or B2B. B2B can be open to all interested parties (e.g. commodity exchange) or
limited to specific, pre-qualified participants (private electronic market). Electronic
commerce that is conducted between businesses and consumers, on the other hand, is
referred to as business-to-consumer or B2C. This is the type of electronic commerce
conducted by companies such as Amazon.com.
Business applications
Some common applications related to electronic commerce are the following:
ERP II means open ERP architecture of components. The older, monolithic ERP systems
became component oriented.[citation needed]
EAS Enterprise Application Suite is a new name for formerly developed ERP systems
which include (almost) all segments of business, using ordinary Internet browsers as thin
clients.[citation needed]
Supply chain management (SCM) is the management of a network of interconnected
businesses involved in the ultimate provision of product and service packages required by
end customers (Harland, 1996). Supply Chain Management spans all movement and
storage of raw materials, work-in-process inventory, and finished goods from point-oforigin to point-of-consumption (supply chain).
Supply chain execution is managing and coordinating the movement of materials,
information and funds across the supply chain. The flow is bi-directional.
[edit] Activities/functions
Supply chain management is a cross-functional approach to manage the movement of raw
materials into an organization, certain aspects of the internal processing of materials into
finished goods, and then the movement of finished goods out of the organization toward
the end-consumer. As organizations strive to focus on core competencies and becoming
more flexible, they have reduced their ownership of raw materials sources and
distribution channels. These functions are increasingly being outsourced to other entities
that can perform the activities better or more cost effectively. The effect is to increase the
number of organizations involved in satisfying customer demand, while reducing
management control of daily logistics operations. Less control and more supply chain
partners led to the creation of supply chain management concepts. The purpose of supply
chain management is to improve trust and collaboration among supply chain partners,
thus improving inventory visibility and improving inventory velocity.
Several models have been proposed for understanding the activities required to manage
material movements across organizational and functional boundaries. SCOR is a supply
chain management model promoted by the Supply Chain Management Council. Another
model is the SCM Model proposed by the Global Supply Chain Forum (GSCF). Supply
chain activities can be grouped into strategic, tactical, and operational levels of activities.
2. Integration Era
3. Globalization Era.
4. Specialization Era -- Phase One -- Outsourced Manufacturing and Distribution
5. Specialization Era -- Phase Two -- Supply Chain Management as a Service
6. Supply Chain Management 2.0 (SCM 2.0)
One could suggest other key critical supply business processes combining these processes
stated by Lambert such as:
a.
b.
c.
d.
e.
f.
g.
b) Procurement process
Strategic plans are developed with suppliers to support the manufacturing flow
management process and development of new products. In firms where operations extend
globally, sourcing should be managed on a global basis. The desired outcome is a winwin relationship, where both parties benefit, and reduction times in the design cycle and
product development are achieved. Also, the purchasing function develops rapid
communication systems, such as electronic data interchange (EDI) and Internet linkages
to transfer possible requirements more rapidly. Activities related to obtaining products
and materials from outside suppliers requires performing resource planning, supply
sourcing, negotiation, order placement, inbound transportation, storage, handling and
quality assurance, many of which include the responsibility to coordinate with suppliers
in scheduling, supply continuity, hedging, and research into new sources or programmes.
c) Product development and commercialization
Here, customers and suppliers must be united into the product development process, thus
to reduce time to market. As product life cycles shorten, the appropriate products must be
developed and successfully launched in ever shorter time-schedules to remain
competitive. According to Lambert and Cooper (2000), managers of the product
development and commercialization process must:
1. coordinate with customer relationship management to identify customerarticulated needs;
2. select materials and suppliers in conjunction with procurement, and
3. develop production technology in manufacturing flow to manufacture and
integrate into the best supply chain flow for the product/market combination.
d) Manufacturing flow management process
The manufacturing process is produced and supplies products to the distribution channels
based on past forecasts. Manufacturing processes must be flexible to respond to market
changes, and must accommodate mass customization. Orders are processes operating on
a just-in-time (JIT) basis in minimum lot sizes. Also, changes in the manufacturing flow
process lead to shorter cycle times, meaning improved responsiveness and efficiency of
demand to customers. Activities related to planning, scheduling and supporting
Cost
Customer Service
Productivity measures
Asset measurement, and
Quality.
on.
Customer relationship management (CRM) is a term applied to processes
implemented by a company to handle its contact with its customers. CRM software is
used to support these processes, storing information on current and prospective
customers. Information in the system can be accessed and entered by employees in
different departments, such as sales, marketing, customer service, training, professional
development, performance management, human resource development, and
compensation. Details on any customer contacts can also be stored in the system. The
rationale behind this approach is to improve services provided directly to customers and
to use the information in the system for targeted marketing
While the term is generally used to refer to a software-based approach to handling
customer relationships, most CRM software vendors stress that a successful CRM
strategy requires a holistic approach. CRM initiatives often fail because implementation
was limited to software installation without providing the appropriate motivations for
employees to learn, provide input, and take full advantage of the information systems. [1]
A blog (a contraction of the term "Web log") is a Web site, usually maintained by an
individual with regular entries of commentary, descriptions of events, or other material
such as graphics or video. Entries are commonly displayed in reverse-chronological
order. "Blog" as a can also be used verb, meaning to maintain or add content to a blog.
Many blogs provide commentary or news on a particular subject; others function as more
personal online diaries. A typical blog combines text, images, and links to other blogs,
Web pages, and other media related to its topic. The ability for readers to leave comments
in an interactive format is an important part of many blogs. Most blogs are primarily
textual, although some focus on art (artlog), photographs (photoblog), sketches
(sketchblog), videos (vlog), music (MP3 blog), audio (podcasting), which are part of a
wider network of social media. Micro-blogging is another type of blogging, one which
consists of blogs with very short posts. As of December 2007, blog search engine
Technorati was tracking more than 112 million blogs.[1] With the advent of video
blogging, the word blog has taken on an even looser meaning that of any bit of media
wherein the subject expresses his opinion or simply talks about something
Types
There are many different types of blogs, differing not only in the type of content, but also
in the way that content is delivered or written.
Personal Blogs
The personal blog, an ongoing diary or commentary by an individual, is the
traditional, most common blog. Personal bloggers usually take pride in their blog
posts, even if their blog is never read by anyone but them. Blogs often become
more than a way to just communicate; they become a way to reflect on life or
works of art. Blogging can have a sentimental quality. Few personal blogs rise to
fame and the mainstream, but some personal blogs quickly garner an extensive
following. A type of personal blog is referred to as "microblogging," which is
extremely detailed blogging as it seeks to capture a moment in time. Sites, such as
Twitter, allow bloggers to share thoughts and feelings instantaneously with
friends and family and is much faster than e-mailing or writing. This form of
social media lends to an online generation already too busy to keep in touch.[2]
Corporate Blogs
A blog can be private, as in most cases, or it can be for business purposes. Blogs,
either used internally to enhance the communication and culture in a corporation
or externally for marketing, branding or public relations purposes are called
corporate blogs.
Question Blogging
is a type of blog that answers questions. Questions can be submitted in the form
of a submittal form, or through email or other means such as telephone or VOIP.
Qlogs can be used to display shownotes from podcasts[3] or the means of
conveying information through the internet. Many question logs use syndication
such as RSS as a means of conveying answers to questions.
By Media Type
A blog comprising videos is called a vlog, one comprising links is called a
linklog, a site containing a portfolio of sketches is called a sketchblog or one
comprising photos is called a photoblog.[4] Blogs with shorter posts and mixed
media types are called tumblelogs.
A rare type of blog hosted on the Gopher Protocol is known as a Phlog.[citation needed]
By Device
Blogs can also be defined by which type of device is used to compose it. A blog
written by a mobile device like a mobile phone or PDA could be called a moblog.
[5]
One early blog was Wearable Wireless Webcam, an online shared diary of a
person's personal life combining text, video, and pictures transmitted live from a
wearable computer and EyeTap device to a web site. This practice of semiautomated blogging with live video together with text was referred to as
sousveillance. Such journals have been used as evidence in legal matters.[citation
needed]
By Genre
Some blogs focus on a particular subject, such as political blogs, travel blogs,
house blogs,[6] [7] fashion blogs, project blogs, education blogs, niche blogs,
classical music blogs, quizzing blogs and legal blogs (often referred to as a
blawgs) or dreamlogs. While not a legitimate type of blog, one used for the sole
purpose of spamming is known as a Splog.
The Blogosphere
The collective community of all blogs is known as the blogosphere. Since all
blogs are on the internet by definition, they may be seen as interconnected and
socially networked. Discussions "in the blogosphere" have been used by the
media as a gauge of public opinion on various issues. A collection of local blogs is
sometimes referred to as a bloghood.[8]
Blog Search Engines
Several blog search engines are used to search blog contents, such as Bloglines,
BlogScope, and Technorati. Technorati, which is among the most popular blog
search engines, provides current information on both popular searches and tags
used to categorize blog postings [9]. Research community is working on going
beyond simple keyword search, by inventing new ways to navigate through huge
amounts of information present in the blogosphere, as demonstrated by projects
like BlogScope.[citation needed]
Blogging Communities and Directories
Several online communities exist that connect people to blogs and bloggers to
other bloggers, including BlogCatalog and MyBlogLog. [10]
Blogging and Advertising
It is common for blogs to feature advertisements either to financially benefit the
blogger or to promote the blogger's favorite causes. The popularity of blogs has
also given rise to "fake blogs" in which a company will create a fictional blog as a
marketing tool to promote a product. [11]
Popularity
Researchers have analyzed the dynamics of how blogs become popular. There are
essentially two measures of this: popularity through citations, as well as popularity
through affiliation (i.e. blogroll). The basic conclusion from studies of the structure of
blogs is that while it takes time for a blog to become popular through blogrolls,
permalinks can boost popularity more quickly, and are perhaps more indicative of
popularity and authority than blogrolls, since they denote that people are actually reading
the blog's content and deem it valuable or noteworthy in specific cases.[12]
The blogdex project was launched by researchers in the MIT Media Lab to crawl the Web
and gather data from thousands of blogs in order to investigate their social properties. It
gathered this information for over 4 years, and autonomously tracked the most contagious
information spreading in the blog community, ranking it by recency and popularity. It can
therefore be considered the first instantiation of a memetracker. The project is no longer
active, but a similar function is now served by tailrank.com.
Blogs are given rankings by Technorati based on the number of incoming links and Alexa
Internet based on the Web hits of Alexa Toolbar users. In August 2006, Technorati found
that the most linked-to blog on the internet was that of Chinese actress Xu Jinglei.[13]
Chinese media Xinhua reported that this blog received more than 50 million page views,
claiming it to be the most popular blog in the world.[14] Technorati rated Boing Boing to
be the most-read group-written blog.[13]
Gartner forecasts that blogging will peak in 2007, leveling off when the number of
writers who maintain a personal Web site reaches 100 million. Gartner analysts expect
that the novelty value of the medium will wear off as most people who are interested in
the phenomenon have checked it out, and new bloggers will offset the number of writers
who abandon their creation out of boredom. The firm estimates that there are more than
200 million former bloggers who have ceased posting to their online diaries, creating an
exponential rise in the amount of "dotsam" and "netsam" that is to say, unwanted
objects on the Web (analogous to flotsam and jetsam).
Political Dangers
Blogging can sometimes have unforeseen consequences in politically sensitive areas.
Blogs are much harder to control than broadcast or even print media. As a result,
totalitarian and authoritarian regimes often seek to suppress blogs and/or to punish those
who maintain them.
In Singapore, two ethnic Chinese were imprisoned under the countrys anti-sedition law
for posting anti-Muslim remarks in their blogs.[43]
Egyptian blogger Kareem Amer was charged with insulting the Egyptian president Hosni
Mubarak and an Islamic institution through his online blog. It is the first time in the
history of Egypt that a blogger was prosecuted. After a brief trial session that took place
in Alexandria, the blogger was found guilty and sentenced to prison terms of three years
for insulting Islam and inciting sedition, and one year for insulting Mubarak.[44]
Egyptian blogger Abdel Monem Mahmoud was arrested in April 2007 for antigovernment writings in his blog. Monem is a member of the banned Muslim
Brotherhood.
After expressing opinions in his personal blog about the state of the Sudanese armed
forces, Jan Pronk, United Nations Special Representative for the Sudan, was given three
days notice to leave Sudan. The Sudanese army had demanded his deportation.[45][46][47]
Personal Safety
One consequence of blogging is the possibility of attacks or threats against the blogger,
sometimes without apparent reason. Kathy Sierra, author of the innocuous blog Creating
Passionate Users, was the target of such vicious threats and misogynistic insults that she
canceled her keynote speech at a technology conference in San Diego, fearing for her
safety.[48] While a blogger's anonymity is often tenuous, Internet trolls who would attack a
blogger with threats or insults can be emboldened by anonymity. Sierra and supporters
initiated an online discussion aimed at countering abusive online behavior[49] and
developed a blogger's code of conduct.
Therapeutic Benefits
Scientists have long known the therapeutic benefits of writing about personal
experiences. Blogs provide another convenient avenue for writing about personal
experiences. Research shows that it improves memory and sleep, boosts immune cell
activity and reduces viral load in AIDS patients and even speeds healing after surgery.[50]
[dubious discuss]
Early blogs were simply manually updated components of common Web sites. However,
the evolution of tools to facilitate the production and maintenance of Web articles posted
in reverse chronological order made the publishing process feasible to a much larger, less
technical, population. Ultimately, this resulted in the distinct class of online publishing
that produces blogs we recognize today. For instance, the use of some sort of browserbased software is now a typical aspect of "blogging". Blogs can be hosted by dedicated
blog hosting services, or they can be run using blog software, such as WordPress,
Movable Type, Blogger or LiveJournal, or on regular web hosting services.