Blog
-
Corporate Participation in Open Source
Joining Open Source Communities: A Step-by-Step Guide to Encourage Corporate Participation in Open Source Projects by Olivia Gallucci.
-
CIA Triad: Confidentiality, Integrity, Availability
The CIA triad is a widely recognized model in cybersecurity. Here, CIA stands for Confidentiality, Integrity, and Availability.
-
Cybersecurity Discord Servers
Are you passionate about cybersecurity? Join the Cybersecurity Community on Discord: Discover the Best Servers for Cybersecurity Enthusiasts!
-
Computer Memory and Performance
Computer memory is how computers access and store information, and it is where programs live and run. Memory also effects performance.
-
Calendar: Plan for A Successful Semester
My calendar helps me organize all the tasks I need to complete and when I need to do them. Additionally, it helps me track and manage time.
-
What’s Next?: The Story of My Website
My name is Olivia Gallucci, and I have been blogging since 2019. This post details the story of my website.
-
Instruction Set Architectures and Performance
Instruction Set Architectures (ISA) or “computer architectures” is a common interface and boundary between software and hardware.
-
Converting High Level Languages to Machine Language
High level languages (HLLs) are designed for humans. However, computers can’t understand HLLs, so it translates them into machine language.
-
Open Source Malware Tactics and Developmental Trends
In August 2021, I began a research project on open source malware under Dr. Amit Ray. This article examines the results collected through…
-
Switching Companies: Should you accept a return offer on your internship?
Switching companies can be scary for people who struggled to get an internship offer: it’s like, will I get another offer?