CS 373 Spring 2022 — Week 11 Blog, Joseph Muffoletto
What did you do this past week?
This past week, I spent the majority of my time working on my distributed computing lab. It was a much larger project than the previous, and the implementation was rather complex. Aside from the lab, I completed my presentation for my Verification/Synthesis course, made a presentation for my fraternity, and had dinner with my family when they were in Austin for the weekend.
What’s in your way?
I need to catch up in my Verification/Synthesis course. I am quite behind on the homework, so I will be meeting with the professor this week to create a plan going forward.
What will you do next week?
I will continue catching up in my Verification course, complete the literature review for my Reinforcement Learning course project, work with my SWE group to complete phase 3, and catch up on my Roman History assignments.
What did you think of Paper 11. More getters and setters?
I thought the builder design pattern was interesting. It's unfortunate that the examples in the paper are centered around UI design in Java. While this may be useful for professional Java Applet developers, the examples are not very relevant to our project.
What was your experience of select, project. and cross join? (this question will vary, week to week)
I was unaware that these functions existed in Python. They were definitely interesting, but their utility is a bit questionable. For large data operations that would utilize these functions, it's very likely that developers would just use a more efficient third-party module (e.g. Pandas).
What made you happy this week?
I got to watch my sister's final lacrosse game with Texas A&M. They played a great game vs. UT’s team, and although they lost, it was an exciting and hard-fought battle. I was also very happy that my presentation went well. I spent quite a bit of time preparing for it, so it was satisfying when it was well received.
What’s your pick-of-the-week or tip-of-the-week?
The Youtube channel, PwnFunction
They upload videos about security exploits in common software. The videos are very interesting and demonstrate that massive system vulnerabilities arise from the smallest of mistakes.