A Glimpse in Software Modeling and Architecutre

Software for the most part are highly complex and expensive engineering solution. Therefore building them right the first time is extremely valuable to the stake holders. As any other complex structure, taking the time to plan in advance and remove as many road blocks as possible has proven over the years to be a great strategy. Most software engineering follow a Software Development Life Cycle (SDLC). Regardless of the project management methodology or development preference, Requirement Analysis and Modeling have consistently stood as top most priorities and that for obvious reasons. One cannot develop a system without knowing what the system is intended for.

Continue Reading

The promise of anonymity

Anonymity is the quality or state of being unknown to most people [1]. Today, the growing threats of identity theft, browser tracking and privacy invasions seem to have left only two options to the majority of the web users community. Surf the web on unsecure waters or refrain from browsing at all. Fortunately, the recent years have also seen the emergence of alternative options that allow the user to navigate the internet without the need to reveal his identity, origins or history. These anonymous alternative have empowered the few learned users with the gift of the invisible man while browsing the web. But at what cost?

Continue Reading

From Piracy to Legacy: The Concept of Decriminalization

Software Piracy is defined as the act of illegally using, copying or distributing a software without ownership or legally acquired rights. According to the Business Software Alliance (BSA) report on piracy, despite the EULAs, over 36% of the software in use today are illegally acquired. Copyright laws are established to guarantee that the organization that invest time and money to develop application and software maintain the right to fully profit from its invention while contributing to the common knowledge bank. In light of that, wouldn’t piracy decriminalization be a better alternative to the current laws in protecting that core ideology?

Continue Reading

The SQL adventure of “Order By” and “Group By”

Most DBMS support DDL, DML and DCL commands. The DDL or Data Definition Language is used to define the structure of the database, the DML or Data Manipulation Language is used to manage the data and the DCL or Data Control Language is used to control the accessibility and privileges on the data. While each one of these languages are highly important in creating and maintaining the integrity, security and reliability of the data, DML nonetheless appears to be the most utilized language in the world of DBMS. This, is mainly due to its data retrieval statements “SELECT”.

Continue Reading

Is data security still relevant?

I woke up this morning with an email showing that the password and the recovery email of one of my email accounts were changed overnight by a user whose IP address routes to Belgium. I knew for sure that at 3 am (time of the incident), I had not requested a password change and I was definitely not in Belgium. So, What do I do?

Continue Reading

Object Oriented VS Structured Programming

The Goal of Programming languages and procedures has always been to give the ability to computers to imitate the human brain in how information is processed, categorized and utilized. The latest paradigm in program languages that comes the closest to reaching that goal is Object Oriented Programming also known as OOP. This newer paradigm comes in contrast with the prior Structured Programming model or SP that paved the way to computing as we know it today. What is OOP and how does it differ from its SP predecessor will set the tone for our analysis.

Continue Reading

Big Data: The Good, the Bad and the Ugly

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affir mation, and particularly describing the place to be searched, and the persons or things to be seized”. By this IV amendment of the US-Bill of rights as ratified in 1971, the US congress guarantees the protection of what is private.

Continue Reading

The cost of data distribution

From large tracking databases such as airline reservation and ecommerce systems to a child’s baseball card collection, databases are collections of information organized to provide efficient data storage and retrieval. A database could be as simple as the file cabinet at your neighboring barbershop or as complex and computerized as the database powering Google’s search engines.

Continue Reading