A data flow diagram (DFD) is a visual representation of how raw data is collected, stored, processed, and coverted into informaton. Think of it as the supply chain for manufacturing information. Remember, raw data is useless, until we process into something useful, and once data becomes useful it now becomes information. In software development there are two types of data flow diagrams: the Logical DFD and the Physical DFD.

A Logical Data Flow Diagram (LDFD) is a visual representation of the activities that data flows through in order to reach its final state (information). The LDFD helps the project team…


“Data is the new gold,” those are the first five words that appear on nearly every About Me section on social media. This is because data, when utilized correcty, becomes information; and information becomes valuable when paired with the right action. Thus, data is what influences how the future will unfold, how people think, and ultimately how people behave. One caveat to data is that it needs to be processed into something meaningful in order for us to extract utility from it. This sounds like an easy task, but because there is so much data being collected, stored, and processed…


As a full-time worker and a full-time student, I got a lot on my plate. Maybe not as much as most people (especially the ones with kids), but I keep my self pretty busy with extracurricar activities, such as freelancing and volunteering my time as a board memeber for the Women in Cybersecurity (WiCyS) San Diego Affiiate. So I don’t really have to imagine managing multiple projects, I am currently, and seemingly endlessly doing that now.

The key to managing projects is to understand the phases within the project management life cycle, which are (Pinto, 2020):

  1. Conceptualization — this is…

The waterfall methodology is a project management planning process that uses a linear, sequential life cycle; whereby each phase of the project must be completed before the next one starts (Pinto, 2020). In software development, there are six phases: planning (also known as process of gathering requirements for the project), design, implementation, and testing, deployment, and maintence. Designing software using the waterfall planning process works well under certian circumstances, specfically:

  • When requirements are fixed and well understood at the very beginning of the project.
  • The software project being developed is stable, therefore no changes or modificatons are needed.
  • The technology…


Hello Everyone 🙋🏻‍♂️ ,

This is an interesting prompt, as I bet we can all relate to working in some kind of virtual environment. Whether it’s here on Canvas, in your living room playing Call of Duty or Fortnite in teams with your friends (shout out to the gamers 🎮 out there ), or maybe you are working from home; then dynamics of how we behave dramatically changes when no one is watching.

The prompt’s background information illustrates the impact that virtual organizations and teams have in business, especially with regards to communication (or should I say miscommunication?). Learning how…


The best way to answer the question above is by first defining the what each role does. A systems analyst (SA), sometimes referred to as a business analyst, or more specfically in the context of our program, a business technology analyst, is a person who is responsible for optimizing the technological capabilities of an organization to meet the needs of its clients by analyzing, designing, and implementing systems that add value toward the clients expecttations of quality (Wick , 2019).

A project manager (PM) on the other hand, is responsible for delivering the project that meets a client’s expectations in…


Which programming error do you feel has the largest impact on potential security breaches and why? How can you ensure the error is prevented during the programming cycle?

A few years ago, I would've said that buffer overflow were the biggest security concern for software developers. Now, in this post-pandemic era we’re a living in, the threats that I believe programmers should be most concerned about relate to web applications, specifically cross-site scripting (XXS) and improper input validation (SQL injection). For this article, I will focus on improper input validation as XXS is a bit more complex and there are…


As a programmer you will be involved in risk management, which includes evaluation and mitigation. How do you feel time constraints and budget would impact your ability to determine which mitigation method to select? Is there a specific methodology you feel warrants more consideration than others?

Image Source: The Blueprint

Pictured, is a the project management triangle; it’s a representation of a project’s quality based on three competing variables: time, cost, and scope (Long, 2020). In software development, security features factors in to the quality of an application because it belongs to the variable of scope, which is related to the functions and features…


Software is is not perfect, it can always be improved. Take for example the advances in artificial intelligence, specifically machine learning and facial recognition software. Research by the National Institute of Standards and Technology (NIST) found that facial recognition software, which uses machine learning algorithms, disproportionately misidentifies women and people of color (Crumpler, 2020).

Amazon Recognition is Amazon’s fully managed SaaS computer vision service that enables developers to analyze images and videos for a variety of use cases including identity verification, Find our more by viewing the video below.
The problem with facia recognition technology is within the data that the machine learning algorithms process. For example, even if an algorithm shows no difference in its accuracy between demographics, disparate impact occurs if certain groups are over-represented in databases. African American males, for example, are disproportionately represented in the mugshot databases many law enforcement facial recognition systems use for matching. If facial recognition becomes an acceptable law enforcement tool, this could mean that African American men will be more frequently identified and tracked since many are disproportionately enrolled in criminal databases.

The problem with facia recognition technology is within the data that the machine learning algorithms process. For example, even if an algorithm shows no difference in its accuracy between demographics, disparate impact occurs if certain groups are over-represented in databases. African American males, for example, are…


Presentation refers to anything your audience can listen to or look at to help them understand your ideas. They are a great way to emphasize ideas, provide clarity, and add visual appeal to your speech. As long as they aid the speaker, rather than replace the speaker, presentation aids can be invaluable. This paper will discuss three types of presentation aids: whiteboards, objects, and presentation slides.

Whiteboard

Whiteboards are a great way to keep your audience engage as you have, essentially, a blank canvas and the ability to write or draw anything. It’s great for developing diagrams and even writing…

Dru Macasieb

I am a life-long learner, educator, and entrepreneur. I am also a proud combat veteran of the US Army. I want to inspire and add value to others.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store