Blockchain Query Language

2023-12-07T14:22:16+00:00

In the blockchain and cryptocurrency industry, leveraging custom metrics and analytics is crucial for the development of risk analysis applications. Traditionally, SQL serves as the primary language for querying precomputed tables, derived from aggregations on raw data extracted from the blockchain. However, this approach can become cumbersome and error-prone, particularly as database schemas grow [...]

Architecture Viewpoints

2023-12-07T13:40:07+00:00

In the area of system engineering, working at the architecture level requires close cross-discipline collaboration with different languages and practices. System architecture description involves domain experts with their own concerns and rationale. The organization of architecture descriptions into views using viewpoints provides a mechanism for the separation of concerns among the stakeholders, while still providing the view [...]

Process Modeling & Simulation

2023-12-07T13:39:47+00:00

In the Oil & Gas industry, the use of simulation plays a vital part in developing integrated chemical processes. By helping save time and money before the actual process implementation, this practice can assist with troubleshooting, design, control, and more. Process modeling and simulation typically involves using dedicated software to define a process as interconnected components, [...]

Online Education for K-12

2023-12-07T13:34:08+00:00

Software is becoming a critical layer of all our lives; it is the language of the world. In the future, not knowing the language of computers will be as challenging as being illiterate or innumerate today. Computational thinking in particular is how software engineers solve problems, it combines mathematics, logics and algorithms, and teaches [...]

Cyber Security

2023-12-07T13:40:13+00:00

When securing organization’s interconnected IT infrastructure, there is a lot of rules and configuration parameters to set by security teams, and these configurations are often done manually. The security features obviously increases as time goes by, and become quickly unmanageable. Moreover, a security policy to implement isn't that complex and long if it was writen out in [...]