Lorem markdownum mirantem. Ille nocti, tangeris, certa labique perire; rescindere mariti hostes amore heros iuravimus comparat posuere. Quam accepere verbis; in reddere leto maius ante irata, ad nec Iovis belua,...
In a forum, students were sharing stories about system failures that cause big consequences. One story tells about how the failed system is causing the loss of $450 mil. in...
Previously, I wrote a post about how to create a Class diagram from a given scenario. In summary, to design a class diagram is to understand the scenario wholly and...
Another alternatives for SQL to store data is the NoSQL technology, for example is MongoDB. NoSQL technology is unlike SQL, it stores data as a non-tabular objects (MongoDB, n.d.). Thus,...
In one assignment, I have to design a Class diagram with a scenario of a self-service checkout system for a supermarket. But before we jumped into creating the diagram, it...
Despite being praised for its use of blockchain technology, a technology that offers the integrity of information (Sarker et al., 2021), Bitcoin (BTC) is still prone to error and faulty....
As technology advances further, so do security issues. There is a correlation between cybercrimes and the growth of technology (Utica University, n.d.). New technologies mean new touchpoints for cybercriminals to...
Doing the second assignment, where we started to get our hands to do the security audit, we found that it’s not easy to evaluate the site security without having the...
As technology advances, there is a security trade-off along with it – that is new vulnerabilities (Scheneier, 2014). An article said that the rate of cybercrime is growing consistently with...
Our final product is different from our design proposal document. Several features that we committed earlier was deprioritized. Those features are Trust-based authorization and encrypt-decrypt based on user key. Trust-based...
From the report, we can see that there are vulnerabilities contained within TrueCrypt ranging from low to medium severity (Junestam & Guigo, 2014),. In addition, these issues are bugs rather...
Creating proper data management should be an important matter in software development. In the 2017 top ten list, Sensitive Data Exposure (SDE) were included. Although it’s not on the list...
Project management in software development is not only about making sure that the project is not failing. Although it is one of the concerns, project management is also about how...
After finishing the final project, compared to the first project in unit 6, one important thing that I learned is that not everything that we stated in unit 6 is...
McCall’s model is factored through the perspective of three sides: product operation, product revision, and product transition factors. It supports 11 factors out of 28 known factors (Boukouchi, 2013). It...
The Components of User Experience proposed (Thüring & Mahlke, 2007) doesn’t cover all aspects that affect user experience. In my opinion, there is an alternative framework that we can use,...
As we have shared our opinion about the reasons why a project failed, I can see that there is no exact answer to that question. From this discussion, I tried...
Clearly, if Abi changed data values in this study he would be acting unethically. But is it any more ethical for him to suggest analysing correct data in a way...
While their product and services might look good – provide security to society and align with some of the BSC code of conduct such as acting in the public interest,...