What Is a Software License?

A software license is a contract between the company that created and provided an application, underlying source code, or related product and the end user. The license is a text document designed to protect the intellectual property of the software developer and to limit any claims against it that might arise from the use of the software.

A software license also contains legally binding definitions for the distribution and use of the software. End-user rights, such as installation, warranties, and liability, are also often set forth in the software license, including protection of the developer’s intellectual property.

Most software falls…

Today I am going to talk about some inspection techniques that help evaluate interaction designs. These include heuristic evaluation, walk-throughs, web analytics, A/B testing, and predictive models. These techniques tend to be relatively inexpensive and easy to learn, and they are also very effective, which makes them attractive.

Heuristic Evaluation


Last week ,we guided you to setup the booting part of our operating system. In this article, we are going to implement C language to our project instead of Assembly language.

So, let’s get started!

Setting Up a Stack

Since all non-trivial(not lightweight) C programs use a stack, and setting up a stack is not harder than to make the esp register point to the end of an area of free memory. So far, in this development process, the only things in memory are GRUB, BIOS, the OS kernel, and some memory mapped I/Os. …

By any standard of measure, an operating system is the most critical software installed on a computer. Not only does an operating system act as the administrator of many computer processes, but it also allows users to harness the power of the various sound, graphics and memory assets within the computer’s hardware infrastructure. For the vast majority of users today, a computer would be useless if it did not include some form of an operating system.

Popular technology culture has introduced most of us to one of the two major operating systems in use: macOS and the Windows operating system.

What is Ethical Hacking?

Hacking is the process of finding vulnerabilities in a system and using these found vulnerabilities to gain unauthorized access into the system to perform malicious activities ranging from deleting system files to stealing sensitive information. Hacking is illegal and can lead to extreme consequences if you are caught in the act. People have been sentenced to years of imprisonment because of hacking. Nonetheless, hacking can be legal if done with permission. Computer experts are often hired by companies to hack into their system to find vulnerabilities and weak endpoints so that they can be fixed. This…

The Japanese principle Ikigai can help you choose your college major

Ikigai is a fairly popular Japanese concept that loosely translates into “the reason for being” or a “thing you live for”, and is based on the things that you wake up for in the morning. The concept of Ikigai touches upon 4 main questions you ought to ask yourself when trying to look for happiness.

  1. What do you love?
  2. 2. What are you good at?
  3. 3. What does the world need?
  4. 4. What can you get paid for?

These four questions that Ikigai revolves around are captured in the…


In-Demand Data Science Careers

Data science experts are needed in virtually every job sector — not just in technology. In fact, the five biggest tech companies — Google, Amazon, Apple, Microsoft, and Facebook — only employ one half of one percent of U.S. employees. However — in order to break into these high-paying, in-demand roles — an advanced education is generally required.

“Data scientists are highly educated–88 percent have at least a master’s degree and 46 percent have PhDs–and while there are notable exceptions, a very strong educational background is usually required to develop the depth of knowledge necessary to be a data scientist,”…

What Is Database Security And Why Is It Important?

🤔What is database security?

Basically, database security is any form of security used to protect databases and the information they contain from compromise. Examples of how stored data can be protected include:

Software – software is used to ensure that people can’t gain access to the database through viruses, hacking, or any similar process.
Physical controls – an example of a physical component of database security could be the constant monitoring of the database by company personnel to allow them to identify any potential weaknesses and/or compromises. …

Pasan lahiru dissanayake

software engineering undergraduate university of kelaniya

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store