Whаt Iѕ A Cоdе Sniрреt?

Acronyms, Abbreviations, Terms, And Definitions


Whаt Iѕ A Cоdе Sniрреt?

Thе code ѕniрреt iѕ a tеrm uѕеd in рrоgrаmming tо rеfеr tо ѕmаll раrtѕ оf reusable source соdеѕ. Suсh kinds оf соdеѕ аrе аvаilаblе both in binary оr tеxt context. Cоdе ѕniрреtѕ are commonly dеfinеd аѕ unitѕ or funсtiоnаl mеthоdѕ thаt can bе rеаdilу intеgrаtеd intо larger modules рrоviding functionality. Thiѕ technical tеrm iѕ аlѕо uѕеd to refer tо the рrасtiсе оf minimizing thе uѕе of repeated code thаt iѕ common to many applications.

Java рrоgrаmmеrѕ use соdе ѕniрреtѕ аѕ an informative mean tо ѕuрроrt the рrосеѕѕ оf еnсоding. Normally, a ѕniрреt shows an еntirе functional unit corresponding tо code a ѕmаll рrоgrаm, оr a ѕinglе funсtiоn, a сlаѕѕ, a template or a bunch of related funсtiоnѕ.

Prоgrаmmеrѕ use ѕniрреt codes with thе ѕаmе purposes аѕ аn аррliсаtiоn. Fоr еxаmрlе, they uѕе it as a way to ѕhоw the соdе as a proven ѕоlutiоn to a givеn рrоblеm. Thеу mау аlѕо use this tо illuѕtrаtе рrоgrаmming “triсkѕ” of nоn-triviаl imрlеmеntаtiоn to highlight thе ресuliаritiеѕ of a givеn соmрilеr. Sоmе реорlе uѕе thiѕ as an еxаmрlе оf соdе portability оr еvеn tо uѕе thеm tо lower the Jаvа programming timе. Organic аnd thеmаtiс collections of ѕniрреt соdеѕ inсludе thе digital соllесtiоn оf tiрѕ аnd triсkѕ аnd асt аѕ a ѕоurсе fоr lеаrning and rеfining рrоgrаmming.

Thе snippet iѕ ѕhоrt аnd fulfillѕ thе раrtiсulаr tаѕk well, it dоеѕ nоt nееd any еxtrа соdе beyond ѕtаndаrd library and ѕуѕtеm dереndеnt code. Thе ѕniрреt iѕn’t the complete рrоgrаm – аnd for thаt you will ѕubmit thе соdе in the ѕоurсе code rероѕitоrу that iѕ thе bеѕt place to handle the lаrgеr рrоgrаmѕ. Ideally, thе ѕniрреt must be thе ѕесtiоn of соdе, whiсh уоu mау ѕniр оut оf the lаrgеr рrоgrаm аnd very еаѕilу reuse in оthеr рrоgrаm. In order, to mаkе ѕniрреtѕ ѕimрlе tо use, it is good to еnсарѕulаtе in thе funсtiоn, сlаѕѕ аnd роtеntiаllу, аѕ thе framework tо ѕtаrt thе new рrоgrаm.

For a рrоgrаmmеr, having gооd code ѕniрреtѕ iѕ vеrу imроrtаnt. Mаnу people uѕе different wау tо kеер thеir code with them. Thеrе iѕ a lоt of оnlinе ѕоlutiоn аlѕо for thоѕе likе аgаinѕt. Hаving gооd соdе in hаnd is vеrу imроrtаnt tо dеlivеr best in class рrоduсt. Sniрреtѕ should bе аlwауѕ mоdulаr and роrtаblе. Sо that iѕ should bе plugged intо уоur соdе easily. Many реорlе uѕе github giѕt to keep thеir snippets. Rubу рrоgrаmmеrѕ uѕе mоdulеѕ to сrеаtе соdе ѕniрреtѕ.

Databases – What is ACID?


What does ACID mean in database technologies?

  • Concerning databases, the acronym ACID means: Atomicity, Consistency, Isolation, and Durability.

Why is ACID important?

  • Atomicity, Consistency, Isolation, and Durability (ACID) are import to database, because ACID is a set of properties that guarantee that database transactions are processed reliably.

Where is the ACID Concept described?

  • Originally described by Theo Haerder and Andreas Reuter, 1983, in ‘Principles of Transaction-Oriented Database Recovery’, the ACID concept has been codified in ISO/IEC 10026-1:1992, Section 4

What is Atomicity?

  • Atomicity ensures that only two possible results from transactions, which are changing multiple data sets:
  • either the entire transaction completes successfully and is committed as a work unit
  • or, if part of the transaction fails, all transaction data can be rolled back to databases previously unchanged dataset

What is Consistency?

  • To provide consistency a transaction either creates a new valid data state or, if any failure occurs, returns all data to its state, which existed before the transaction started. Also, if a transaction is successful, then all changes to the system will have been properly completed, the data saved, and the system is in a valid state.

What is Isolation?

  • Isolation keeps each transaction’s view of database consistent while that transaction is running, regardless of any changes that are performed by other transactions. Thus, allowing each transaction to operate, as if it were the only transaction.

What is Durability?

  • Durability ensures that the database will keep track of pending changes in such a way that the state of the database is not affected, if a transaction processing is interrupted. When restarted, databases must return to a consistent state providing all previously saved/committed transaction data

Related References

Database – What is TCL?


SQL (Structured Query Language)

TCL (Transaction Control Language) statements are used to manage the changes made by DML statements. It allows statements to be grouped together into logical transactions. The main TCL commands are:


Related References


What is Process Asset Library?




What is Process Asset Library (PAL)?

Process Asset Library (PAL) is a centralized repository, within an organization, which contains essential artifacts that document processes or are process assets (e.g. configuration Items and designs) used by an organization, project, team, and/or work group.  The assets may, also, be leveraged to achieve process improvement, which is the intent of lessons learned document, for example.

What is in the Process Asset Library (PAL)?

Process Asset Library (PAL), usually, houses of the following types of artifacts:

  • Organizational policies
  • Process descriptions
  • Procedures
  • Development plans
  • Acquisition plans
  • Quality assurance plans
  • Training materials
  • Process aids (e.g. templates, checklists, job aides and forms)
  • Lessons learned reports


Related References

CMMI Institute

What Is Capability Maturity Model Integration (CMMI)?

Building Organizational Capability


What is Confluence?



Confluence is the place or process of  merging of two things.

Business Perspective of Confluence

From a business perspective, a confluence is the merging processes, concepts, principles, and/or technologies.

What is an ERP?


Enterprise Resource Planning (ERP)

What does ERP mean?

  • ERP Means “Enterprise Resource Planning”

What is an ERP?

  • An ERP is business software application or series of applications, which facilitate the daily operations of business. An ERP an be commercial-off-the-shelf (COTS) applications (which may or may not be customized) or custom built (home grown) by the business and/or assemblages of different vendor applications and/or models.  ERP applications dules from a variety of vendors.

Common ERP Major Functions

  • ERP application software typically support these major business operations:

Financials Management system (FMS)

  • FMS supports accounting, consolidation, planning, and procurement.

Customer Relationship Management (CRM)

  • CRM facilitates customer interactions and data throughout the customer lifecycle, with the goal of improving business relationships with customers, assisting in customer retention and sales growth.

Human Resources Management System (HRMS)

  • HRMS supports workforce acquisition, workforce management, workforce optimization, and benefits administration

Enterprise Learning Management (ELM)

  • ELM is the integrated application which increases workforce knowledge, and skills, and competencies to achieve critical organizational objectives.

Asset Management (AM)

  • AM support activities for deploying, operating, maintaining, upgrading, and disposing of assets cost-effectively.

Supply Chain management (SCM)

  • SCM is the oversight of materials, information, and finances as they move in a process from supplier to manufacturer to wholesaler to retailer to consumer.

Related References

Business – What is TQM? and What Does it Mean?


Total quality management (TQM) requires permanent changes throughout an organization. Unlike a project-based approach to managing quality, TQM takes an enterprise-wide approach and requires changes to be made to every aspect of the business. This method is a proven success and is a viable option for many companies. Read on to learn more about TQM and how it can benefit your business. We’ll cover why TQM is so beneficial.

The basic idea of TQM is to focus on the customer experience. The process is defined by the steps necessary to achieve success. The overall goal is to make sure every step of the process is repeatable and consistent. All team members are involved, so it is not a one-dimensional approach. Communication is essential to TQM success, as this ensures that everyone is working towards the same goal. And while it may sound like a lot, it doesn’t work the way you think it will.

In TQM, the organization must apply the principles of systems thinking, recognizing that change is necessary. It must have a firm grasp of customer needs, have defined processes, and a clear plan of improvement. It must be prepared to make the changes necessary to achieve success. While TQM is not for everyone, it’s a good choice for a variety of reasons. It will make a company more profitable and will improve its bottom line.

TQM emphasizes strategic decisions and systematic approaches to improving the company. Continuous improvement is better than a big project if it involves addressing root causes. It takes a long-term approach to improve core processes and customer satisfaction. And if you don’t have the budget to implement a large-scale change, TQM may be the right fit for your business. So what are the benefits of TQM?

TQM is a system of continuous improvement that emphasizes the customer’s experience and wants. It focuses on the customer’s satisfaction, and it emphasizes the employee’s ability to take ownership over their work. TQM involves every member of the organization, not just one department. If you’re not sure what TQM is, consider some of the common definitions below: What is TQM? and what does it mean?

TQM focuses on the people and processes in an organization. It aims to create a culture that values evidence-based decision-making. The TQM system can also help organizations improve their customer relationships and reduce the risk of errors. For these reasons, TQM can improve business performance and boost employee engagement. Its main advantages are efficiency and effectiveness, and it will help your business succeed in the long run.

The fundamental differences between TQM and other management strategies are often the details. It is best to use the TQM system in conjunction with the existing structure of your company. In addition to implementing the strategy, you should be aware of its benefits and drawbacks. You should have a culture of continuous improvement and not make a big project. It is best to keep in mind that the principles of TQM are applicable to all types of businesses.

TQM is a system-oriented approach to management. The processes in an organization are modeled as a series of steps, or processes. A well-defined process is one that makes it possible to see and measure the value of everything. If a process isn’t working, TQM might be the answer. TQM is the best way to make your business succeed. You’ll get better results and achieve your objectives by implementing the TQM model.

TQM is a comprehensive management system that focuses on creating and implementing processes. The goal of TQM is to identify and measure the key characteristics of your product or process and use this information to optimize the process. This method is the basis for TQM and it should be implemented in every organization. The key to TQM success is to continually improve the quality of your products and services. Efforts should be in harmony with each other and your customers.

The TQM approach emphasizes the importance of identifying and eliminating unnecessary steps. The TQM approach involves employees in the development of products and services, and it promotes collaboration among all employees. The approach encourages the use of data and creates a more collaborative environment. This way, your employees are more likely to be involved and motivated, and your customers will be happier. This is a key component of the TQM process.

What is Total Quality Management – TQM

What does CRM Mean?


Customer Relationship Management (CRM)


What is CRM?

CRM (customer relationship management) is a type of ERP application, which are used to facilitate sales, marketing, and business development interactions throughout the customer life cycle.

What does a CRM Application do?

A CRM application capabilities, broadly, encompass:

Marketing Integration

  • Lead management, email marketing, and campaign management

Sales Force Automation

  • Contact management, pipeline analysis, sales forecasting, and more

Customer Service & Support

  • Ticketing, knowledge management systems, self-service, and live chat

Field Service Management

  • Scheduling, dispatching, invoicing, and more

Call Center Automation

  • Call routing, monitoring, CTI, and IVR

Help Desk Automation

  • Ticketing, IT asset management, self-service and more

Channel Management

  • Contact and lead management, partner relationship management, and market development funds management

Business analytics integration

  • Analytics application and Business intelligence and reporting integration, which may include internal reporting capabilities.

Related References

Information Technology – What is Greer’s Third Law?


Greer’s Third Law

Greer’s Third Law

A computer program does what you tell it to do, not what you want it to do

Related References

What is Crayne’s Law?


Crayne’s Law

Crayne’s Law

All computers wait at the same speed


“The Serious Assembler” by Charles A. Crayne and Dian Girand, 1985

Related References

Database – What is a Primary Key?

Database Table

What is a primary Key?

What a primary key is depends, somewhat, on the database.  However, in its simplest form a primary key:

  • Is a field (Column) or combination of Fields (columns) which uniquely identifies every row.
  • Is an index in database systems which use indexes for optimization
  • Is a type of table constraint
  • Is applied with a data definition language (DDL) alter command
  • And, depending on the data model can, define parent-Child relationship between tables

Related References

Database – What is DDL?

SQL (Structured Query Language)

What is DDL (Data Definition Language)?

DDL (Data Definition Language), are the statements used to manage tables, schemas, domains, indexes, views, and privileges.  The the major actions performed by DDL commands are: create, alter, drop, grant, and revoke.

Related References

Database – What is DML?


SQL (Structured Query Language)

What is DML (Data Manipulation Language)?

As the name indicates, Data manipulation for working with information inside a database structure.  There are four main DML commands:

  • Select – reading data rows
  • Insert – adding data rows
  • update – changing values within data rows
  • Delete – removing data row

Related References


what is a Logical Data Warehouse (LDW) ?


Acronyms, Abbreviations, Terms, And Definitions

Definition of a Logical Data Warehouse (LDW)

A Logical Data Warehouse (LDW) is  data management architecture for analytics, which combines the strengths of traditional repository warehouses with alternative data management and access strategies.

What is DCL?


What is DCL (Data Control Language)?

Data control language (DCL) is anything that is used for administrating access (permissions/security) to database content.  The main DCL commands are:

  • Grant
  • Revoke

Related References

Software Development Life Cycle – What is RAD?



What is RAD?

Rapid Application Development (RAD) is a type of incremental software development methodology, which emphasizes rapid prototyping and iterative delivery, rather than planning. In RAD model the components or major functions are developed in parallel as if they were small relatively independent projects, until integration.

RAD projects are iterative and incremental

RAD projects follow the SDLC iterative and incremental model:

  • During which more than one iteration of the software development cycle may be in progress at the same time
  • In RAD model the functional application modules are developed in parallel, as prototypes, and are integrated to complete the product for faster product delivery.
  • RAD teams are small and comprised of developers, domain experts, customer representatives and other information technology resources working progressively on their component and/or prototype.

What is a Peer Review?


A peer review is an examination of a Software Development Life Cycle (SDLC) work product by team members, other than the work Product’s author, to identify defects, omissions, and compliance to standards.  This process provides an opportunity for quality assurance, knowledge sharing, and product improvement early during the SDLC life cycle.

What is a software development baseline?


What, exactly, the definition of a baseline it depends on your role and perspective on the SDLC (Software Development Life Cycle) process.   The baseline concept plays in many aspects of SDLC execution, including project management, configuration management, and others.  Additionally, the baseline concept and practice is applicable to all the SLDC methodologies, including, but not limited to the Agile Model, Waterfall Model, Iterative Model, Spiral Model, and V-Model.

Baseline Definition

A baseline is a reference point in the software development life cycle marked by the completion and formal approval of a set of predefined work products for phase completion. The objective of a baseline is to reduce a project’s vulnerability to uncontrolled change and to provide a point in time set of artifacts for references and recovery, if necessary.    Baselining an artifact (requirements specification matrix, design, code, data model, etc.) move it into formal change control (usually, in one or more repository tools) at milestone achievement points in the development life cycle. Baselines are also used to identify the essential software, hardware, and configuration assembly components that make up a specific release of a system.

What is Occam’s razor?


“pluralitas non est ponenda sine necessitate”

–William of Occam (1285–1347/49)

A principle in philosophy, mathematics, and science that assumptions introduced to explain something must not be multiplied beyond necessity, and, therefore, that the simplest of several hypotheses is, usually, is the best explanation of the facts.

There are two essential elements to Occam’s razor, from the Latin:

  • The Principle of Plurality – Plurality should not be used as a fact or put forward as a basis of the argument, without the necessity
  • The Principle of Parsimony – It is pointless to do with more, what can be done with less

What is BYOD?


What is BYOD?

Basically, BYOD (bring your own device) is an information technology trend toward employee-owned devices within a business, in which consumer software and hardware are being integrated into the enterprise workplace.

Benefits of BYOD

The benefits of BYOD depend upon the point of view, here is a quick list

  • Supports integrated remote work and remote workforce augmentation with requiring the acquisition of hardware and software
  • The reduced software learning curve for employees
  • Increased availability of workforce and access to the network.

Drawbacks of BYOD

  • Increased Support requirements
  • Increase Security and data exposure risk
  • Less consistent hardware and Software environment

What is the GIGO principle?


Every now and then, someone will send me a message with an acronym in it, which either I have forgotten or didn’t know.  As it happens a friend of mine ended a message, recently, with ‘GIGO’, which took me a split second to remember, so, I thought I would write it down for future reference.  If nothing else, the writing down of the definition may help me remember it a little faster next time.

What Does GIGO Mean?

Basically, ‘GIGO’ means: Garbage In, Garbage Out

What is the concept of Garbage In, Garbage Out (GIGO)?

From an Information technology and Information science perspective, the GIGO concept is that poor information coming into a process, will produce poor, unreliable, and inconsistent results; and can even break the process.  Here I used the term information because in the modern information ecosphere the input can be more than just the data, it may be Meta Data, Business rules, information processing, and governance practices, as well as, the source system data.

Data Modeling – What is Data Modeling?


Data modeling is the documenting of data relationships, characteristics, and standards based on its intended use of the data.   Data modeling techniques and tools capture and translate complex system designs into easily understood representations of the data creating a blueprint and foundation for information technology development and reengineering.

A data model can be thought of as a diagram that illustrates the relationships between data. Although capturing all the possible relationships in a data model can be very time-intensive, well-documented models allow stakeholders to identify errors and make changes before any programming code has been written.

Data modelers often use multiple models to view the same data and ensure that all processes, entities, relationships, and data flows have been identified.

There are several different approaches to data modeling, including:

Concept Data Model (CDM)

  • The Concept Data Model (CDM) identifies the high-level information entities, their relationships, and organized in the Entity Relationship Diagram (ERD).

Logical Data Model (LDM)

  • The Logical Data Model (LDM) defines detail business information (in business terms) within each of the Concept Data Model and is a refinement of the information entities of the Concept Data Model.   Logical data models are a non-RDBMS specific business definition of tables, fields, and attributes contained within each information entity from which the Physical Data Model (PDM) and Entity Relationship Diagram (ERD) is produced.

Physical Data Model (PDM)

  • The Physical Data Model (PDM) provides the actual technical details of the model and database object (e.g. table names, field names, etc.) to facilitate the creation of accurate detail technical designs and actual database creation.  Physical Data Models are RDBMS specific definition of the logical model used build database, create deployable DDL statements, and to produce the Entity Relationship Diagram (ERD).

Related References

What is Protected Health Information (PHI)?


Protected Health Information (PHI)

The Privacy Rule protects all “individually identifiable health information” held or transmitted by a covered entity or its business associate, in any form or media, whether electronic, paper or oral.  Privacy Rules call this information, protected health information (PHI).

Protected Health Information (PHI) is information, including demographic data, which relates to:

  • the individual’s past, present or future physical or mental health or condition,
  • the provision of health care to the individual, or
  • the past, present, or future payment for the provision of health care to the individual,
  • the individual’s identity, including Personally Identifiable Information (PII), or for which there is a reasonable basis to believe it can be used to identify the individual.

Related References:

What is Personally Identifiable Information (PII)?


Personally Identifiable Information (PII)

Personally Identifiable Information (PII) is any information that can be used to identify, contact, or locate an individual, either alone or combined with other easily accessible sources. It includes information that is linked or linkable to an individual, such as medical, educational, financial and employment information.

Furthermore, Personally Identifiable Information (PII) is information, which:

  •  directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or
  •  indirectly identifies an individual (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors).
  • permits the physical or online contact of a specific individual.

Related Reference

What is Non-Public Information (NPI)?


Non-Public Information (NPI)

Nonpublic Information (NPI), also known as “Nonpublic personal information” (NPI)” is used within the financial industry and their clients to identify a broad group of information, including Personally Identifiable Information (PII) and Protected Health Information (PHI) and other information with legal disclosure constraints.  These items include:

  • any information an individual gives you to get a financial product or service (for example, name, address, income, Social Security number, or other information on an application);
  • any information you get about an individual from a transaction involving your financial products or services. For example; the fact that an individual is your consumer or customer, account numbers, payment history, loan or deposit balances, and credit or debit card purchases; or
  • any information about an individual in connection with providing a financial product or service (for example, information from court records or from a consumer report).

Related References

Definitions: Fungibility






Fungibility is the property of a good or a commodity whose individual units are capable of mutual substitution.

What Are ETL Reconciliation Jobs


Reconciliation ETL jobs are used to record and report that the expected volumes of data were loaded by establishing the volume of data to be loaded (normally in rows), the data actually loaded, and the variance (if any) between them.  This job usually initiates notification and reporting processes when a variance exists for resolution by the designated department and/or agency.

Reconciliation ETL jobs are used to monitor and report key process values, often used with control sequences to determine process behaviors.

Related References