Hey Floreth, I'm glad you are already blogging here from before.
Can you put a "Label" on posts that are for our course? Choose anything but I suggest TC1014 as your label for this course.
Then use tags for signaling which assignment this is for. So for this post I am commenting on, can you edit this and change it to: Label: TC1014 Tag: Mastery03
SCM Software Configuration Management What? SCM is a software engineering discipline consisting of standard processes and techniques often used by organizations to manage the changes introduced to its software products. SCM helps to eliminate the confusion often caused by miscommunication among team members. The SCM system controls the basic components such as software objects, program code, test data, test output, design documents, and user manuals. Who? The Software Engineering Institute (SEI) advocated a standard definition for CM oriented to software, broadening the definition of the Institute of Electrical and Electronics Engineers (IEEE) and the guidelines of the International Organization for Standardization (ISO). Why? Is software engineering practices associated with software configuration management offer a number of opportunities to address requirements found International Standard, ISO 9001. From management perspective, the principles and practices of
" Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks impact system availability by flooding the target system with traffic or requests or by exploiting a system or software flaw" (PCcare, 2018). What happens during a DoS attack , is that a single attacker directs an attack against a single target, sending packets directly to the target. It basically targets the network bandwidth or connectivity. There are many common forms of DoS attacks , for example: Smurf Fraggle Ping flood Ping-of-death Syn Flood Land Teardrop DNS poisoning Banana Attack Negative Acknowledgement (NACK) Deuthentication (Deauth) One of the most knowledgeable and used is Spam . It consists of sending unwanted e-mail messages to users. It's considered a from of DoS because: It consumes bandwidth that is used by legitimate traffic. It can fill a mailbox or hard disk and result in legitimate e-mail being rejected. Spam is often distributed by hijacking misconfigured
API 101 A pplication p rogram i nterface ( API ) is a set of routines , protocols , and tools for building software applications . An API specifies how software components should interact and APIs are used when programming graphical user interface ( GUI ) components. A good API makes it easier to develop a program by providing all the building blocks. A programmer then puts the blocks together" (webopedia, 2016). Application Programming Interfaces allows applications to talk to other applications. For example: M obile devices all use APIs to connect our mobile app to Facebook. YouTube users consume videos using the universal embeddable video player (like Vimeo) allowing Youtube videos to be embedded on any website around the web, all driven by APIs. Sources & Links: http://www.webopedia.com/TERM/A/API.html http://rightleftcommunication.com/wp-content/uploads/2015/05/api-integration-service-5.png
Hey Floreth, I'm glad you are already blogging here from before.
ResponderBorrarCan you put a "Label" on posts that are for our course? Choose anything but I suggest TC1014 as your label for this course.
Then use tags for signaling which assignment this is for.
So for this post I am commenting on, can you edit this and change it to:
Label: TC1014
Tag: Mastery03
Thanks!