[go: up one dir, main page]

0% found this document useful (0 votes)
40 views26 pages

Calibers Inplant Report

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 26

About My Institute

Rajarshi Shahu Maharaj Polytechnic is established in the year 2008, at the central place in Nashik. It
is affiliated to MSBTE, Mumbai and approved by Government of Maharashtra, DTE Mumbai and the
AICTE, New Delhi. The Polytechnic is in the process of Accreditation and Gradation. The
Polytechnic has well-equipped laboratories, workshop and Hostel facilities. Every department has
separate computational facilities along with LAN, Wi-Fi and necessary softwares. At present the
Polytechnic provides three-year courses leading to Diploma in Engineering of MSBTE, Mumbai in
the following disciplines : Mechanical Engineering, Computer Technology, Electrical Engineering,
Electronics and Telecommunication Engineering and Information Technology .

Vision :-
To empower the comman masses by providing technical education.

Mission :-
 To create and implement innovative best practices to achieve academic excellence.
 To enhance the overall development of students by imparting essential skills.
 To inculcate principles of professional activities by promoting industry institute interaction
and entrepreneurial skills.
 To create an environment awareness for sustainable development.

Value :-

For excellence and set high values in all sectors of education.


Program Educational Objectives (PEOs)

• Provide socially responsible, environment friendly solutions to Computer engineering related


broad-based problems adapting professional ethics.

• Adapt state-of-the-art Computer engineering broad-based technologies to work in multi-


disciplinary work environments.

• Solve broad-based problems individually and as a team member communicating effectively in


the world of work.

Program Outcome’s: -

Program Outcomes are the knowledge, skills, and abilities students possess after
successful completion of the program.

The Computer Engineering Diploma holder will be able to: -


1. Basic knowledge: Apply knowledge of basic mathematics, sciences and basic engineering to
solve the broad-based Computer engineering problem.

2. Discipline knowledge: Apply Computer engineering discipline - specific knowledge to solve


core computer engineering related problems.

3. Experiments and practice: Plan to perform experiments and practices to use the results to
solve broad-based Computer engineering problems.

4. Engineering tools: Apply relevant Computer technologies and tools with an understanding
of the limitations.

5. The engineer and society: Assess societal, health, safety, legal and cultural issues and the
consequent responsibilities relevant to practice in field of Computer engineering.

6. Environment and sustainability: Apply Computer engineering solutions also for


sustainable development practices in societal and environmental contexts and demonstrate
the knowledge and need for sustainable development.

7. Ethics: Apply ethical principles for commitment to professional ethics, responsibilities and
norms of the practice also in the field of Computer engineering.
Abstract

Industrial training is an important phase of a student life. As we are the students of the computer engineering, it
is very needful to us to know the overall structure of the IT industry. For achieving this goal, I completed my
In-plant training at Calibers InfoTech, which is a up going IT based industry located in Nashik at College
Road.
Calibers InfoTech is a company come up with IT solutions and services. Company had started their journey of
delivering high quality services in 2010. It is based in Nasik, India and today continuously moving ahead to
satisfy the clients. Company develop apps that stand out of the group. The company CEO’s says that, they are
quickest growing mobile application development firm and our client base ranges from tiny to medium sized
businesses, as well as start-ups also our purchasers have the benefit of the competitive valuation for our quality
services. We understand the business more than technology. We believe in delivering best web design and
development services and thus we have an expertise in domain keeping the quality in mind.
Acknowledgement

The internship opportunity I had with Calibers InfoTech, Nashik was a great chance for
learning and professional development. Therefore, I consider myself as a very lucky individual as I was
provided with an opportunity to be a part of it. I am also grateful for having a chance to meet so many
wonderful people and professionals who led me though this internship period.

I express my deepest thanks to Mr. Sandesh Shinde CEO of CALIBERS INFOTECH


Located at college road, Nashik for taking part in useful decision & giving necessary advices and
guidance and arranged all facilities to make Training easier. I choose this moment to acknowledge his
contribution gratefully.
Bearing in mind previous I am using this opportunity to express my deepest gratitude
and special thanks to the CALIBERS INFOTECH who in spite of being extraordinarily busy with
her/his duties, took time out to hear, guide and keep me on the correct path and allowing me to carry out
my project at their esteemed organization and extending during the training.

Hope to continue cooperation with all of you in the future,


Sincerely,

Name : Suhani Sanjay Somase

Place : Nashik, Maharashtra.

Date : 02/08/2023
In-plant Training Report
Index

Sr. No Title Page. No

01 Organization Structure.

Introduction, Product & Services, History & Number of


02
Employees.

03 Major Equipment/Instruments/ Computers.

Manufacturing/Development process along with


04 production/Software and control/Implementation
process

Testing of raw materials, components & finished


05
products along with quality assurance procedures

Development strategy used by industry, documentation


06
methods & end user product.

Safety procedure followed and safety gear used


07
(includes preventive maintenance schedule.

08 Assignments

09 Practical Experience in industry.

10 Short report of the project.


Chapter 1: Organization Structure

An organizational structure is a visual diagram of a company that describes what employee’s do, whom
they report to, and how decisions are made across the business. Organizational structures can use functions,
markets, products, geographies, or processes as their guide, and cater to businesses of specific sizes and
industries.

Organization structure:
Usually, each software package development organization handles many projects at any time. Software package
organizations assign totally different groups of engineers to handle different software projects. Every sort of
organizational structure has its own advantages and downsides that the issue “How is that the organization as a
full structured?” should be taken into thought so each software package project is finished before its point in
time.
There are basically 2 broad ways in which a software package development organization is
structured: Project format, and Functional format. These are explained as following below.
1. Project format:
The project development workers are divided supported the project that they work (as shown below
diagram). In the project format, a group of engineers is appointed to the project at the beginning of the
project and that they stay with the project until the completion of the project.
Thus, the identical team carries out all the life cycle activities. Obviously, the functional format needs a lot
of communication among groups than the project format, as a result of one team should perceive the work
done by the previous groups.

Fig:-1.1
2. Functional format:
The event workers are divided supported the useful cluster to that they belong. the various project borrows
engineers from the specified useful teams for specific parts to be undertaken within the project and come
back them to the functional cluster upon the completion of the phase.
In the functional format, totally different groups of programmers perform different phases of a project. For
example, one team may do the necessities specification, another do the planning, and so on. The partially
completed product passes from one team to a different because the project evolves.

Therefore, the useful format needs significant communication among the various groups as a result of the
work of 1 team should be clearly understood by the next teams engaged on the project. This needs sensible
quality documentation to be made when each activity.

Fig:-1.2
3. Hierarchy and organization structure of Calibers InfoTech
Chapter 2: Introduction, Product & Services, History & Number of Employees

Introduction, History and Overview

 Introduction
Calibers InfoTech is a company come up with IT solutions and services. We are based in Nasik, India and today
continuously moving ahead to satisfy our clients. We develop apps that stand out of the group. We are quickest
growing mobile application development firm. Our client base ranges from tiny to medium sized businesses, as
well as start-ups. Our purchasers have the benefit of the competitive valuation for our quality services. We work
closely with purchasers to know their necessities and recommend them value effective, scale-able and strong
mobile solutions.

 Vision
Our Vision is Strong Focus on delivering the Best, Cost Effective Services and solutions to cater to the needs of
our clients.

 Mission
To achieve accomplishment by guaranteeing customers have right assets at the opportune time to build the
capability of business.
Products and Services:

1. Mobile Application Development

Calibers InfoTech is a top-notch mobile app development company


offering mobile application development services for Android. We
engaged in providing highly reliable Android Development services as
per client’s budget and requirements. We design and develop brilliant
mobile applications that meets the needs of business, industry and end
users. We have best expertise in android development. We have
professional staff which understand customer requirement and deliver
product within stipulated time period. Our developers are exceptionally
talented in android development. We have well reputation for excellent
service to customer. Our experts have command on android development and Java language. So, we have built
up a few applications which are most downloaded application. Indeed, even our specialists are dynamic
individual from various android application gathering. So, they are persistently increasing new thoughts and
ability in android improvement field.

2. Web Development

Calibers InfoTech specialized in Website Designing with


appealing look and user-friendly interface. We are a web
design company serving all size of businesses to obtain a
greater revenue from online endeavors. Build
Responsive Web Design to Expand your Business. We
make new age client involvement with spotless, great
and attractive plan. We’re specialized in Website
Designing with appealing look and user-friendly interface. In our Web Designing process, we
understand your business objective and deliver a website which help you stay ahead of
competitors. Our website designing services involves client requirement Analysis, Strategic
planning, Creative ideas, PSD Layout Designing, Layout implementation and maintenance
services.
3. Digital Marketing

Calibers InfoTech is India based digital marketing


company committed to providing digital solutions
globally. Digital marketing can be help for every
business to successfully promote their products, and
services in a cost-effective way. It will help you to
connect with your target audience by using multiple
channels with the goal of driving traffic to your website.
It can be help for every business to successfully promote their products, and services in a cost-
effective way.

4. Custom Software Development

Calibers InfoTech is one of the specialized software


development company offering custom software
development in various domains. We work closely
with clients to understand their need for the software,
objectives, and software requirement specifications
by involving our domain knowledge experts. At
Calibers InfoTech, we don’t simply make custom
programming, we manufacture answers for your business issues. We offer custom programming
advancement administrations for a wide assortment of industry verticals and business areas. It
leverages the technical expertise of our professionals who are empowered with latest
technology software and tools, to offer customized applications of various flavors including
business intelligence solutions, e-business solutions, custom application development and CRM
solutions.
5. Training Program
Calibers InfoTech is Nasik based Programming Languages
Training Company. We give real-time time ventures based
corporate preparing to understudies, working experts
likewise for corporate customers. We give corporate
preparing on furthermore Technology like Java, .Net MVC,
Android, PHP, Python, WordPress and so on. Skills for
Learning workshops are interactive group sessions that can
help you to improve and enhance your skills in academic
communication, statistical analysis, IT, information literacy
and effective study. Each workshop develops a specific
area of your academic skills through a mixture of activities, peer learning, and expert advice from Industrial
experts. These interactive sessions support your success in university assignments by providing detailed
guidance on a specific area of academic skills. You will have the opportunity to practice the skills in focus and
ask any questions. These short, practical sessions can introduce you to a new academic skill or provide a useful
refresher.

6. Number of Employees:

Calibers InfoTech follows the standard policy for the recruitment of the employee. As per the norms and the
Rules & Regulations provided by the HR Department the company is recruiting the manpower through HR
Manager. Currently Mr. Sandesh Shinde. is having the charge of the HR Manager. She does the recruitment
whenever it is a demand of the system for having the manpower.

Following Mentioned are the current employees working for the Calibers InfoTech.

Sr. No Department No. of Employees

01 Admin 01

02 Account Department 01

03 Core Development 06

04 Training Department 02

05 Testing & Implementation 02

06 Marketing & Sales 01

07 Cleaning & Safety 01

Table:-2.1
Chapter 3: Major Equipment/Instruments/ Computers

Computer Hardware used by Calibers Infotech

Sr. No Hardware Quantity


Desktop Computers
Intel Core i3-9100F 9th Gen Desktop
01 Processor 4 Core Up to 4.2 GHz 12
LGA1151 300
RAM 4 GB & HDD 500 GB
Laptop
Dell Latitude 3400, 14-inch Laptop -
02 06
Core i3 8th Gen
8GB Ram & 1TB HDD

03 HP1007 LaserJet Printer 02

04 Canon LIDE300 Scanner (Black) 01

05 32 Port Switch 01

06 Dell Router 01

07 Internet Line 60 MBPS

Table:-3.1

Chapter 4: Manufacturing/Development process along with


production/Software and control/Implementation process

The Agile software development lifecycle is dominated by the iterative process. Each iteration results in
the next piece of the software development puzzle working software and supporting elements, such as
documentation, available for use by customers until the final product is complete.

Each iteration is usually two to four weeks in length and has a fixed completion time.

 Due to its time-bound nature, the iteration process is methodical and the scope of each iteration is
only as broad as the allotted time allows.

 Multiple iterations will take place during the Agile software development lifecycle and each
follows its own workflow.

 During an iteration, it is important that the customers and business stakeholders provide feedback
to ensure that the features meet their needs.

A typical iteration process flow can be visualized as follows:

 Requirements - Define the requirements for the iteration based on the product backlog, sprint
backlog, customer and stakeholder feedback

 Development - Design and develop software based on defined requirements

 Testing - QA (Quality Assurance) testing, internal and external training, documentation development

 Delivery - Integrate and deliver the working iteration into production

 Feedback - Accept customer and stakeholder feedback and work it into the requirements of the next
iteration

Fig:4.1

Chapter 5: Testing of raw materials, components & finished products along with
quality assurance procedures
 Software Testing Life Cycle (STLC) is defined as a sequence of activities conducted to
perform Software Testing.

 Contrary to popular belief, Software Testing is not a just a single activity. It consists of a series of
activities carried out methodologically to help certify your software product.

 Different Phases of the STLC Model

Fig:-5.1

Requirement Analysis
 During this phase, test team studies the requirements from a testing point of view to identify the testable
requirements.
 The QA team may interact with various stakeholders (Client, Business Analyst, Technical Leads,
System Architects etc.) to understand the requirements in detail.
 Requirements could be either Functional (defining what the software must do) or Non-Functional
(defining system performance /security availability).

Test Planning
 Typically, in this stage, a Senior QA manager will determine effort and cost estimates for the project and
would prepare and finalize the Test Plan.
 In this phase, Test Strategy is also determined.
Test Case Development
 This phase involves the creation, verification and rework of test cases & test scripts. Test data, is
identified/created and is reviewed and then reworked as well.
 Activities: Create test cases, automation scripts (if applicable), Review and baseline test cases and
scripts, create test data (If Test Environment is available).

Test Environment Setup


 Test environment decides the software and hardware conditions under which a work product is tested.
 Test environment set-up is one of the critical aspects of testing process and can be done in parallel with
Test Case Development Stage.
 Test team may not be involved in this activity if the customer/development team provides the test
environment in which case the test team is required to do a readiness check (smoke testing) of the given
environment.

Test Execution
 During this phase, the testers will carry out the testing based on the test plans and the test cases
prepared.
 Bugs will be reported back to the development team for correction and retesting will be performed.
 Activities: Execute tests as per plan, Document test results, and log defects for failed cases Map defects
to test cases in RTM, Retest the Defect fixes, Track the defects to closure.

Test Cycle Closure


 Testing team will meet, discuss and analyses testing artifacts to identify strategies that have to be
implemented in the future, taking lessons from the current test cycle.
 The idea is to remove the process bottlenecks for future test cycles and share best practices for any
similar projects in the future.
 Activities: Evaluate cycle completion criteria based on Time, Test coverage, Cost, Software, Critical
Business Objectives, Quality Prepare test metrics based on the above parameters.

Chapter 6: Development strategy used by industry, documentation methods


& end user product
1) Blue-Green Deployment

- Blue-Green deployments use two deployment configurations.

- Both are running, and the one in production depends on the service the route specifies, with each
deployment configuration exposed to a different service.

- You can create a new route to the new version and test it. When ready, change the service in the
production route to point to the new service and the new, blue, version is live.

- If necessary, you can roll back to the older, green, version by switching service back to the previous
version.

2) Using A/B Deployment

- The A/B deployment strategy lets you try a new version of the application in a limited way in the
production environment.

- You can specify that the production version gets most of the user requests while a limited fraction of
requests go to the new version. Since you control the portion of requests to each version, as testing
progresses you can increase the fraction of requests to the new version and ultimately stop using the
previous version.

- As you adjust the request load on each version, the number of pods in each service may need to be
scaled as well to provide the expected performance.

- In addition to upgrading software, you can use this feature to experiment with versions of the user
interface. Since some users get the old version and some the new, you can evaluate the user’s reaction to
the different versions to inform design decisions.

- For this to be effective, both the old and new versions need to be similar enough that both can run at the
same time. This is common with bug fix releases and when new features do not interfere with the old.
The versions need N-1 compatibility to properly work together.

- Open Shift Container Platform supports N-1 compatibility through the web console as well as the
command line interface.

Using a Blue-Green Deployment:


 Blue-Green deployments use two deployment configurations.
 Both are running, and the one in production depends on the service the route specifies, with each
deployment configuration exposed to a different service.
 You can create a new route to the new version and test it. When ready, change the service in the
production route to point to the new service and the new, blue, version is live.
 If necessary, you can roll back to the older, green, version by switching service back to the previous
version.

Using A/B Deployment


 The A/B deployment strategy lets you try a new version of the application in a limited way in the
production environment.
 You can specify that the production version gets most of the user requests while a limited fraction of
requests go to the new version. Since you control the portion of requests to each version, as testing
progresses you can increase the fraction of requests to the new version and ultimately stop using the
previous version.
 As you adjust the request load on each version, the number of pods in each service may need to be
scaled as well to provide the expected performance.
 In addition to upgrading software, you can use this feature to experiment with versions of the user
interface. Since some users get the old version and some the new, you can evaluate the user’s reaction to
the different versions to inform design decisions.
 For this to be effective, both the old and new versions need to be similar enough that both can run at the
same time. This is common with bug fix releases and when new features do not interfere with the old.
The versions need N-1 compatibility to properly work together.
 OpenShift Container Platform supports N-1 compatibility through the web console as well as the
command line interface.

Chapter 7: Safety procedure followed and safety gear used (includes preventive
maintenance schedule
Information technology job safety procedure training typically covers company and employee safety
and security. Dealing with efforts to prevent or mitigate accidents, threats or losses to physical assets, e.g.,
computer hardware, and technology, e.g., software applications, training programs prepare employees to
communicate clearly, comply with legal and regulatory standards and measure success with maintaining a safe
and secure workplace.

Features:
Workplace safety policies seek to eliminate or reduce risk of injury by instituting policies and
procedures as well as hazard control techniques. IT job safety procedure training enables personnel to substitute
existing malfunctioning materials or equipment with less hazardous solutions when appropriate. Upon
completion, participants can establish barriers or limits such as time, distance or physical restraints to prevent
the general population from having contact with the problem, such as overheating computer hardware. In
addition, IT job safety training provide students with the skills to recognize when current operating procedures
are insufficient to prevent future occurrences and recommend enhancements to policies. IT job safety training
may include instruction on the use of safety glasses, gloves or anti-static wrist bands used in computer repairs.

Benefits:
Effective IT job safety procedure training ensures that all employees know the company safety goals
and objectives as well as any applicable policies, practices and procedures. By providing training on a regular
basis, typically annually, companies make safety a priority concern for all staff members. By mandating
participation and ensuring regular follow-up, managers can ensure the training program has a positive impact on
preventing safety violations.

1. Patch, PATCH !
- An unpatched machine is more likely to have software vulnerabilities that can be exploited.
Turn on automatic updates Windows.

2. Install protective software.

- Sophos is available as a free download from IS&T's software grid. Once installed, schedule Sophos
to regularly scan and update your virus definitions automatically.

3. Choose strong passwords.


- Strong passwords use a combination of letters, numbers, and special characters. Create a unique
password for each account. LastPass can manage all of your passwords for you—and it's free.

4. Back up on a regular basis.


- Scheduling routine backups can protect you from the unexpected. Always keep a few months' worth
of retrievable backup. Download and install CrashPlan and learn how to back up your system.

5. Control access to your machine.

- Don't leave your computer in an unsecured, public area, especially if you're logged on. This
includes Athena clusters and Quick stations. The physical security of your machine is just as
important as its technical security.

6. Use email and the internet safely.

- Ignore unsolicited emails. Be wary of attachments, links, and forms in emails that come from
people you don't know, or which seem "phi shy". Avoid untrustworthy (often free) downloads.
Learn more about dealing with spam at MIT.

7. Use secure connections.

- When connected to the internet, your data can be vulnerable while in transit. Use remote
connectivity and secure file transfer options when off campus.

8. Protect sensitive data.

- Securely remove sensitive data files from your hard drive, especially when recycling or repurposing
your computer. Protect sensitive files using the encryption tools built into your operating system.

9. Use desktop firewalls.

- Mac and Windows computers use basic desktop firewalls to protect your computer files from
being scanned. Make sure they are properly configured.

10. Most importantly, stay informed.

- Stay current with the latest developments: Follow IS&T on Facebook and Twitter. Bookmark
IS&T Secure Computing.
Chapter 8: Assignments
<Here you have to write all your
Assignments with code , Output
and screenshots if any>
.

Chapter 9: Practical
Experience in industry

 Gained practical knowledge about industry’s work.

 All the online classes were so helpful because instructor covered all the
necessary topics about web development.

 Every session was interactive that’s why I never faced any problems to follow on.
 This training had helped me to increased my development Skills and Knowledge.

 We learned how to understand the customer’s requirements and achieve it and plan
the web development.

 We learnt various front-end technologies for designing web pages.


Chapter 10: Short report of
the project

 During the in-plant training I have learned various terminology of <Technology


Name>

 The online sessions were so productive because of its integrity and interactive
nature.
 We got assignments and tests every week which helped me a lot for clearing
concepts and understating fundamentals of development.

 Test and assignments were hosted on a very robust and user-friendly website so I
never had trouble while accessing the content.

 I had fun doing assignments and learning new things everyday throughout the in-
plant training period.

 In a month I gained all the knowledge to make a great applications/website.

 I have faced no difficulties in the entire period of in-plant training kudos to Calibers
InfoTech team for helping us at any time and providing us the best in-plant training
experience at the convenience of our home during a global pandemic.

You might also like