Meeting Charleston
Today, I attended the Alumni Symposium. During freshman year, one of my classes had encouraged attendance to the (then in-person) symposium, but I was unable...
The four important attributes:
Other suggestions:
I believe most software engineers should be licensed, depending on the type of software they are constructing. One of the main reasons doctors and lawyers are licensed is the risk, sometimes life-or-death, associated with their professions. Licensing ensures that professionals have met certain education standards that qualify them to make the best decisions for their patients’ and clients’ fate. In the same way, if a software engineer works on programs that determine specifications for bridges, for example, the government should certainly license him/her to support public safety. This is just as important as licensing the engineers who build the bridge itself. Likewise, software engineers who work on programs that involve sensitive data such as credit card information and, hence, have great data-breach potential should be licensed. Similar to that of doctors and lawyers, the work of these engineers requires access to private data. Government licensing would ensure that they are educated about industry standards for handling that data and maintaining its privacy while performing their work. Other areas of software engineering such as web development may not involve enough risk to warrant licensing.
PUBLIC - Implementing mechanisms to protect sensitive data belonging to the public that is used by the software. This could include credit card data, browsing data, social security numbers, and the like.
CLIENT AND EMPLOYER - Documenting functionality issues with software identified by the client or employer and making necessary fixes to maintain usability by the public.
PRODUCT - Planning for product improvements to maintain professionalism with up to changing standards. For example, integrating new safety mechanisms that have become standard in the industry
JUDGMENT - Declining a task due to lack of training. For example, declining a request to build in a language not yet known with an unreasonable timeframe to fully learn the language
MANAGEMENT - Requiring new engineers to go through an onboarding process which familiarizes them with company procedures and policies they will be held accountable for
PROFESSION - Setting up an internship program for college Computer Science students
COLLEAGUES - Exchanging code review with a colleague working on similar projects
SELF - Pursuing continuing education such as open source projects and online courses outside of work
The motivation behind the system, countering terrorism, is beneficial to society, but the software engineer has to balance this with preventing harm to the public in other ways such as the breach of sensitive data. Upholding this responsibility would require software engineers to account for and work to mitigate this risk at all stages of development. To approach this project ethically, they would need to consider how to protect the data from harmful use by either external or internal users. External protection would involve systems such as encryption to prevent access by unauthorized users. On the internal side, project leads should perform advanced background checks on engineers prior to employment. Even in the internal work environment, they would need to implement privacy mechanisms such as anonymizing personal identifiers within the database to engineers unless an unusual pattern is detected.
Today, I attended the Alumni Symposium. During freshman year, one of my classes had encouraged attendance to the (then in-person) symposium, but I was unable...
The journey does not end after a software project has gone live. This week’s reading was “Continuing the Journey” - Chapter 9 of Client-Centered Software Dev...
“Databases reside at the heart of most software applications” (SD Chapter 6, pg 168). This week’s readings cover Chapter 6 of our textbook, Client-Centered S...
This week’s reading (Chapter 5 of Client-Centered Software Development) covers domain classes and unit/system testing. According to the text, “domain classes...
Proper documentation for both internal and external users of a software application is crucial to its sustained success after deployment. This week, we read ...
This week, we read “From STUPID to Solid Code!” by William Durand. This article is packed with high-level do’s and dont’s of programming. The “dont’s” are co...
This week, our class chose and reflected on articles from Software, Computer, or CoACM magazines. While perusing software magazines (finding good ones was an...
6.4. Exercise - Find the Oldest Bug Find the oldest bug that’s still open in your chosen project. Write a blog entry describing the problem, with a theory ab...
This week, our assignment was to explore http://opensource.com/, reading at least two medium-length articles from the site and blogging about what we learned...
This class, CSCI 462, is centered around contributing to an open-source software project through bug fixes, documentation fixes, and other improvements. Befo...
Hi everyone! My name is Janneke (pronounced ‘Yah-Nuh-Kuh’) Morin.
24.6 Explain why program inspections are an effective technique for discovering errors in a program. What types of error are unlikely to be discovered throug...
I feel like our team made great progress on the most recent deliverable (deliverable 4)! We met via Zoom more often than we did between any other two variabl...
23.6 Figure 23.14 shows the task durations for software project activities. Assume that a serious, unanticipated setback occurs, and instead of taking 10 day...
21.4 Explain why an object-oriented approach to software development may not be suitable for real-time systems.
This is my first reflection on our team’s testing project. I think this will be a helpful exercise as we move into the final stages of building our testing f...
20.10 You work for a software company that has developed a system that provides information about consumers and that is used within a SoS by a number of othe...
19.3 Why is it impossible to infer the emergent properties of a complex system from the properties of the system components? In the words of Ian Sommerville,...
18.4 Define an interface specification for the Currency Converter and Check Credit Ratings services shown in Figure 18.7.
17.10 Your company wishes to move from using desktop applications to accessing the same functionality remotely as services. Identify three risks that might a...
16.9 Design the interfaces of components that might be used in a system for an emergency control room. You should design interfaces for a call-logging compon...
9.8 Briefly describe the three main types of software maintenance. Why is it sometimes difficult to distinguish between them? Fault repairs to fix bugs and v...
15.10 The reuse of software raises a number of copyright and intellectual property issues. If a customer pays the software contractor to develop a system, wh...
8.7: Write a scenario that could be used to help design tests for the wilderness weather station system. Context: According to Chapter 7, Design and Implemen...
Mythical Man-Month - Does adding more labor to a project linearly reduce the time to completion? Or does it do the opposite, particularly to an already late ...
5.3: You have been asked to develop a system that will help with planning large-scale events and parties such as weddings, graduation celebrations, and birth...
2.1 Suggest the most appropriate generic software process model that might be used as a basis for managing the development of the following systems. Explain ...
4.5: Using the technique suggested here, where natural language descriptions are presented in a standard format, write plausible user requirements for the fo...
Our readings this week began with a focus on several software engineering failures which resulted in devastating incidents such as plane crashes (Space Craft...
11.4: What is the common characteristic of all architectural styles that are geared to supporting software fault tolerance? Architectural styles geared to su...
The Complexity of Software and Its Evolution Software is, by definition, complex. Frederick P. Brooks, in his article “Essence and Accidents of Software Engi...
1.3: What are the four important attributes that all professional software should possess? Suggest four other attributes that may sometimes be significant.
Hi everyone! My name is Janneke (pronounced ‘Yah-Nuh-Kuh’) Morin.