Uncategorized

Lorem Markdownmus

Lorem markdownum mirantem. Ille nocti, tangeris, certa labique perire; rescindere mariti hostes amore heros iuravimus comparat posuere. Quam accepere verbis; in reddere leto maius ante irata, ad nec Iovis belua,...

oop

Reflection on OOP

In a forum, students were sharing stories about system failures that cause big consequences. One story tells about how the failed system is causing the loss of $450 mil. in...

Implementing Class Diagram with Python

Previously, I wrote a post about how to create a Class diagram from a given scenario. In summary, to design a class diagram is to understand the scenario wholly and...

NoSQL and SQL

Another alternatives for SQL to store data is the NoSQL technology, for example is MongoDB. NoSQL technology is unlike SQL, it stores data as a non-tabular objects (MongoDB, n.d.). Thus,...

Designing Class Diagram for Self-Service Checkout System with Object-Oriented Design

In one assignment, I have to design a Class diagram with a scenario of a self-service checkout system for a supermarket. But before we jumped into creating the diagram, it...

2021 Bitcoin's Flash Crash

Despite being praised for its use of blockchain technology, a technology that offers the integrity of information (Sarker et al., 2021), Bitcoin (BTC) is still prone to error and faulty....

nism

NISM Reflection

As technology advances further, so do security issues. There is a correlation between cybercrimes and the growth of technology (Utica University, n.d.). New technologies mean new touchpoints for cybercriminals to...

Evaluation of Assignment I & II

Doing the second assignment, where we started to get our hands to do the security audit, we found that it’s not easy to evaluate the site security without having the...

Minutes of Meeting: NISM/II

Collaborative Learning Discussion 2: Scanning Exercise

ssd

SSD Reflection

As technology advances, there is a security trade-off along with it – that is new vulnerabilities (Scheneier, 2014). An article said that the rate of cybercrime is growing consistently with...

Final Project Evaluation

Our final product is different from our design proposal document. Several features that we committed earlier was deprioritized. Those features are Trust-based authorization and encrypt-decrypt based on user key. Trust-based...

Unit 8-10: Collaborative Discussion 2 Summary - TrueCrypt

From the report, we can see that there are vulnerabilities contained within TrueCrypt ranging from low to medium severity (Junestam & Guigo, 2014),. In addition, these issues are bugs rather...

Programming Language Concepts

What is ReDOS and what part does ‘Evil Regex’ play?

Unit 1-3 Discussion Summary

Creating proper data management should be an important matter in software development. In the 2017 top ten list, Sensitive Data Exposure (SDE) were included. Although it’s not on the list...

sepm

SEPM Course Reflections

Project management in software development is not only about making sure that the project is not failing. Although it is one of the concerns, project management is also about how...

Final Project Reflections

After finishing the final project, compared to the first project in unit 6, one important thing that I learned is that not everything that we stated in unit 6 is...

Reflection on Software Quality: McCall Quality Factor Model & Deutsch and Willis Factor Model

McCall’s model is factored through the perspective of three sides: product operation, product revision, and product transition factors. It supports 11 factors out of 28 known factors (Boukouchi, 2013). It...

Collaborative Discussion: Factors Affecting User Experience (Summary)

The Components of User Experience proposed (Thüring & Mahlke, 2007) doesn’t cover all aspects that affect user experience. In my opinion, there is an alternative framework that we can use,...

Collaborative Discussion 1: Project Failures Study – Summary

As we have shared our opinion about the reasons why a project failed, I can see that there is no exact answer to that question. From this discussion, I tried...

Collaborative Discussion 1: Project Failures Study

Question 1: What do you believe are the three most common reasons for project failure?

rpmm

Collaborative Discussion 2: Abi’s Case of Whizzz

Clearly, if Abi changed data values in this study he would be acting unethically. But is it any more ethical for him to suggest analysing correct data in a way...

RPMM Literature Review

Digital Marketing of Small and Medium Scale Enterprises in Jakarta, Indonesia

RPMM Literature Review Outline

Digital Marketing of Small and Medium-Scale Enterprises in Jakarta

Collaborative Discussion 1: Q Industries

While their product and services might look good – provide security to society and align with some of the BSC code of conduct such as acting in the public interest,...