I see that many people are confused by the meaning of authentication and authorisation. People use the two interchangeably. They tend to use both authentication and authorisation for the same thing. But actually there is a difference between the two.
When it comes to security, you will hear a lot of people talking about things like hashing and encryption. But what are they? What are the differences? What are the practical approaches when it comes to choose which one to use? In
I am a software engineer and I frequently develop software individually (other than my regular job) in my spare times. Recently, I decided to develop a program with rather large scope compared to my previous freelance works. Until this time, when
This will be the last post of 2013. I wish you all a happy new year. I see that many people have trouble when it comes to use case diagrams. Many people think they know what a Use Case Diagram
I see that people can get confused easily when it comes to differentiate functional and non-functional requirements. Let's quickly see the differences. Functional requirements concentrate on achieving a task without paying attention to the quality factors that users of a
If you are a Systems Engineer or a Software Engineer you are probably familiar with UML diagrams and notations used in them. Today I realised that there might be many people confusing Composition and Aggregation relations between entities/objects. Composition: You