What is Software Development?

Share Button

So you’ve been thinking about software development? You’ve imagined yourself in front of a computer screen writing the next great mobile application or piece of software, and working as an important member of a powerful team. Well, that scenario is actually pretty accurate, but there is more to being a software developer, or engineer than you might think. Read on to find out more about what it means to be a software developer and how you can put yourself on the path to a rewarding technical career.

A Software Development career requires a broad range of skills. The process can be challenging and those who succeed are willing to do the hard work. In addition to working with clients and other professionals, developers create a set of design patterns or algorithms that form the foundation for usable software. They also recommend upgrades or changes to existing software. They maintain detailed records supporting all work products. Some practitioners work in vibrant groups with other designers and some are freelance developers who work independently to create software for single users or smaller companies.

Software developers are detail-oriented. They are eternal optimists who trust that with effort they can succeed. They are meticulous in crafting, testing and improving the software. This field, according to the Department of Labor’s Professions Outlook is wide open with opportunities to make a good income and opportunities for advancement. This is expected to remain true for years to come.

The Software Development Lifecycle (SDLC) for Coleman University Blog

                The Software Development Lifecycle (SDLC)

If this sounds like the type of career that you have been looking for, perhaps it is time to get back into the classroom and make software development your future career. Coleman University’s software development faculty has prepared a focused set of courses that supports gaining the necessary skills for success. A new class starts every 10 weeks and, with five enrollment times per year, and tutoring is offered to students for free. Coleman has a dedicated career services department to help you find that first job and will provide support throughout your career. A career in Software Development provides the basis for pride in craftsmanship and the comfort of working in professional teams.

 

Thank you to our Software Development Faculty Chair, Leticia Rabor for writing this great article! If you would like to learn more about Leticia check out her interview from last year when she visited the Android Developers Conference in San Francisco. Or check out her Faculty Spotlight interview here!

 

Coleman University has been a technology-focused institution of higher learning since 1963. Our accelerated Software Development program give students the opportunity to graduate with a Bachelor’s degree in as little as three years (depending on course load). If this blog has inspired you to think about your future in Software Development give us a call at (858) 499-0202.

Coleman University logo

Share Button

Are You Team Jekyll or Team Hyde?

Share Button

For some, the thrill of playing a new videogame is like nothing else. Meeting a character for the first time, watching a new story unfold, wielding a super-cool new weapon, and  playing with others online are what make gaming so much fun. What you don’t see is all of the coding, programming, structuring, planning, designing, and all around WORK that went into creating this experience. What may have taken 12-15 hours to finish, in reality took months to create and perfect. In fact, you might be surprised to know that there are thousands of jobs related to Game Development and Design and some don’t require coding experience at all! For the Game Development Capstone students at Coleman University, this truth is one that they are learning first hand, and soon they will have their own game for other gamers to play.

For ten weeks Coleman Game Development Capstone students will be working closely in teams to create, from start to finish, an original videogame of their own design. Beginning with the concept art and overall design, these students will build a game that is the culmination of all that they have learned and a test of their skills in teamwork. As scary as that may sound, the Capstone is an opportunity to take what they’ve learned so far in their program and work as part of a team to experience the iterative process of Game Development that celebrates their creativity and talent. The Capstone class will mimic the pressures and expectations that game development companies put on their employees in the real world. This term we have two teams working on Capstone projects and an exciting rivalry is developing. What do Team Jekyll and Team Hyde have in store for their final project? Keep reading to find out!

 

TEAM JEKYLL: MALICE

Taking inspiration from the classic game MARIO, players in the world of Malice will have to race against the clock solving puzzles and battling creatures along the way to save someone they love in a 3D world. The story begins with a young boy who is looking for his younger sister who was taken from their home, followed by his trusty dog that has some cool tricks of his own. In a brilliant twist, Team Jekyll has designed the game to allow players to switch between the young boy and his dog to solve puzzles or leap over traps.  Various monsters and creatures will try to attack you and stop you from finding your sister, and you’ll have to defeat the boss at the end, so this game is definitely going to be exciting! Though this game is fun to play, it won’t be a walk in the park; there are some scary challenges and surprises hidden in this game.

Project Manager: Marisa Hatcher

Level Design/Puzzle Design: Jake Bommer

Programmer/Puzzle Design: Gary Lawrence

3D Modeler: Curt Ljungquist

 

TEAM HYDE: PATH OF THE WARDED

Based on the book The Warded Man, this PC game is a post-apocalyptic challenge that tests the ingenuity of the player at every turn. During the day, players must take care of their farm by reinforcing fences, finding defensive weapons, and preparing for sunset. Once the moon comes up, demons and menacing creatures come out of the woods to try to tear your farm to the ground! Attacks come in three waves and players can set traps in order to destroy as many attackers as possible. Each creature or monster that attacks will have a specific elemental characteristic related to water, fire, wind, or earth. The final version of the game will allow players to customize their character and upgrade their farm to further defend against attacks. After a detailed cut scene, players will have the opportunity to explore their surroundings and engage with their farm. Unfortunately the animals at the farm are not part of the game play and can’t help you defeat any of the demons or monsters, but they provide good company.

Project Manager/Level Designer/Branding: Mari Erdman

Level Design: John Becker

3D Modeler: Eduardo Aviles

3D Modeler: Curt Ljungquist

 

So why are they named Team Jekyll and Team Hyde? When the class began, the 7 students enrolled were expecting to be working on one game, but instead developed into two teams that are working on two different games. As a way to foster healthy competition, and teamwork, the two teams each became Team Jekyll and Team Hyde; two sides of the same… In week ten of their course (March 12-16th) both teams will present a finished product to faculty, staff, and classmates, including offering the opportunity for attendees to play the game as well! If you want to see what these teams are developing, keep your eye on the blog calendar for the announcement of the Capstone presentation. Congratulations to Team Jekyll and Team Hyde! We look forward to seeing the hard work that you are putting into this project and we can’t wait to play it!

 

 

If you are interested in where your own passion for Game Development can take you, give us a call today at (858) 499-0202 and schedule a tour! There’s plenty of opportunity in San Diego to start your career, so take the first step and meet the Coleman Game Development community!

Coleman University logo

Share Button

How Do I Sign Up for the Global Game Jam 2018??

Share Button

We’ve already talked about the Global Game Jam on this blog; and the fact that this opportunity to compete in a global challenge with other gamers is one that can’t be missed. So now that we’ve peaked your interest, this blog will tell you what you should know about the #GGJ2018 and what to prepare for once you’ve signed up.

To start with, we want to tell you what your ticket purchase includes. The hosts of the Global Game Jam event at Coleman, the IGDA, have dedicated the funds from the event to providing food for the participants as well as other resources to help make this event as awesome as possible for all who attend! Starting Friday evening on January 26, 2018 participants will start arriving at the Coleman campus to set up their equipment and find spots to get settled in. You can bring in your own computers, laptops, and monitors to use for the weekend as well as any other special resources that you need to effectively code or design. Since the participants will be here from Friday night to Sunday afternoon Coleman University has not only provided campus space for this event, we will be making sure that there is a computer for everyone who registers. The point of this event is to mimic the conditions and stresses of game design and development so make sure that you come prepared to work hard, but we want you to be comfortable while doing it! So if you prefer to code in your bunny slippers, make sure to bring them along too.

What if you don’t have any team members lined up when you register? Well that is certainly no problem. Once the theme for the challenge is announced on Friday night, participants will then have the opportunity to discuss their ideas with others, and teams will form based on which projects participants want to join. The proposed projects will not all be videogame based because board games, card games, and any other styles of game are all welcome submissions. Since the submissions don’t have to be a videogame, participants who do not have coding experience are not excluded from being a part of this event. A passion for gaming and creating fun projects is the only requirement needed! The fun comes from the thrill of joining a team and bringing a great game to life in only three days.

Once teams have finished their projects, they will be submitted to the Global Game Jam site and published. Visitors to the site can still see games from previous years and even play some of them as well! For a game developer or designer, this can be a great addition to any resume and will add invaluable experience to help put you ahead. Being able to perfect your teamwork and problem solving skills while also creating a game from scratch is something that many recruiters look for in a potential hire. Why not put the Global Game Jam onto your resume this year?

If your family or friends are interested in seeing the event and coming by to show support, they are more than welcome! There will be visiting hours for friends and family, however, since time is limited and teams will have to work around the clock, visitors will not be able to stay overnight. We will also have special guests from radio station FM 94.9 on our campus live streaming and getting involved with participants. Hamby from the Casual Gamers podcast will be on our campus broadcasting from his Twitch channel, so you definitely don’t want to miss out on that! Head over to the official Eventbrite page for more information and the link to register as a participant: http://bit.ly/GGJ18Coleman. See you there! #GGJ2018

Turn your passion for gaming, coding, or design into a degree and a lifelong career! With a degree in Game Design from Coleman University, along with all the first-hand professional game development experience of our instructors, our graduates have the knowledge and the connections to build a solid career in game development and design. Call us today to schedule a tour and learn more about our programs at (858) 499-0202! Turn your “Dreams into Reality” now, classes start January 8, 2018!

Share Button

Ransomware Global Strike: The “WannaCry” Attack

Share Button

 

 

In the height of the westward expansion into California, the “Wild West” became not only a place, but a term that described an entire cultural phenomenon. What made the west so wild were the apparent lawless territories that saw hostile takeovers, train and carriage robberies, kidnapping, and ransoming. Over time the west was settled and developed into new states with their own laws and regulations. The wild part of the west was no longer a threat, at least in the physical world. Today we have a new and almost lawless place, however this territory only exists online. Though there are plenty of companies and programs that work 24/7 to ensure safety online, there are still opportunities for malicious attacks to be carried out. The robberies and takeovers that plagued the westward expansion have now become digital.

A typical scam that you will see online is the email phishing that we talked about in a previous blog. These scams can be easy to avoid as long as the recipient is not engaging with the email or providing any personal information. Unfortunately that does not always protect online users from being attacked for their information. Ransomware has become a bigger threat that is hard to trace and causes an incredible amount of damage. Essentially it is software that takes all of a victim’s personal files and information and holds it for a ransom that must be paid. Recently a large ransomware attack has become global news, with at least 150 countries experiencing the same attack. The most affected victims were the small businesses, universities, and hospitals that were unable to protect themselves and had to either pay the ransom or risk losing all of their data (CNN Money). Reports from China, Germany, Japan, Russia, the US, and Spain confirmed that there had been attacks from the same ransomware and that they had taken the necessary precautions to try and stop its spreading.

Through a patch in the Microsoft Windows software, the ransomware “WannaCrypt” was able to target specific users and take over their systems. Ransomware works as a lock box for your data, keeping you from accessing any of your files or personal information unless you agree to the terms and conditions set up by the creator. Victims were told to use Bitcoin to pay for the return of their files (Microsoft). Many of the Windows users who were targeted were not using an updated, or a licensed version of this software making them even more vulnerable to patches that could not be fixed in the Microsoft updates. In the wake of this viral attack, Microsoft released a statement outlining the efforts they were making to avoid these attacks in the future. However, they also called on the public to become more aware of their own responsibility in updating their computers and backing up their information with an external drive and cloud software. Proactive actions are the key to being safe online. This idea of being proactive is also what stopped the ransomware attack from continuing to spread. A young cybersecurity student in the UK decided to look more closely at the software behind the attack and discovered a kill switch. The malware was using “a very long nonsensical domain name that the malware makes a request to – just as if it was looking up any website – and if the request comes back and shows that the domain is live, the kill switch takes effect and the malware stops spreading” (The Guardian). Once the student located the domain name, all he had to do was buy it. The domain cost $10.69 and was immediately registering thousands of connections every second; once it was purchased the malware was stopped in its tracks. Additionally once this domain was bought he was able to determine the IP addresses attached to the malware and reported them to the authorities. Though this was a great victory, in the world of Cybersecurity it is just a temporary fix. There are just as many entities creating malware as there are cybersecurity experts trying to stop them. What makes this malware attack so dangerous is that it can be replicated and reused at any time.

Backing up files, or storing information in the Cloud, and regularly updating your software are the best measures you can take to protect yourself from ransomware. As we mentioned in a previous blog on email phishing, it is imperative that you avoid any email from a company or bank that is asking for your personal information via email.

If you are interested in becoming a cybersecurity expert yourself, consider a degree from Coleman University. Perhaps it could be you that stops the next big cyber-attack in its tracks! Call (858) 499-0202 for information on our technology focused programs.

 

Share Button

Faculty Spotlight: Thomas Byrne (Cybersecurity Program)

Share Button

Part of what makes Coleman University so unique to San Diego is the incredible faculty that we have on our campus. Technology and its development are not pastimes for our faculty; their careers and passions are built around it. We sat down with one of our Cybersecurity instructors, Mr. Thomas Byrne, to talk about his passion for technology and teaching. Hopefully we can show you something new and exciting about your instructors!

Mr. Byrne (far right) stands with his First Robotics Team at the Central Valley Regional in March of 2016. This photo was taken after the team had secured a spot in a semi-final for the second time that month!

1.So, Mr. Byrne, what drew you to technology and network security?

I grew up with technology and thinking back here are some of my memories: I was literally amazed at my first RED Led watch in the mid 1970’s as well as PONG, which I had hooked up to my TV. I thought to myself “this is the future, these digital readouts.”  Then one day in 1982 my father, who worked at McDonnell Douglas in Long Beach as a Branch Chief Engineer, brought home a Compupro 8/16. It ran CP/M off of 8-inch floppies. One of my favorite games to play on the computer was “Colossal Cave Adventure,” which was a text based adventure game that made you visualize the world you were exploring. I spent a lot of time exploring that cave and one day I got stuck in the cave and actually phoned the author for a game hint in the help file. That was cool, knowing that I could phone the creator of the game. The hint was “Did you get the axe? Did you throw the axe at the Minotaur?” Ooops! I also read a lot when I was a kid, and I eventually came across tech magazines in the electronics store. I read an article and found out that you could punch a hole on the back of that huge floppy to make it double sided; it was so exciting to learn that I could double my storage!  I learned to program in Assembly, which meant manipulating the CPU stack, and I watched my dad write code to track expenses and even predict when airplanes were flying overhead as they landed in LAX. I also received my HAM radio license back when you had to learn Morse code and was communicating with people in Japan and Germany… so that’s how I sort of got hooked on technology, it was my fun time. As for network security, I like to be secure and wanted to learn how to maintain my systems against threats. I saw all the virus activity and did not want to lose my data, so I researched how to stay safe online and really liked understanding how the hackers think and what motivates them. I also learned how vulnerable this technology is, and I wanted to do something about it.

2.How long have you been teaching at Coleman? What inspired you to become a teacher?

I was hired as an Instructor in August of 2010. Before that I was a corporate trainer for Luxottica. I always was someone who could learn and then explain almost any topic and gain insights on it. I really like helping people understand difficult concepts in cybersecurity. This is a huge positive, as a lot of the material can be difficult until you understand it. I try to make it easy to understand, so that my students can remember the material down the road and make use of that knowledge. I try my best to cut through the noise to the essence of what’s really important to know.

3.Do you have a piece of advice or information that you want all of your students to know before they graduate?

There is a job for you, as the world certainly needs trained cybersecurity professionals. It will not be handed to you though. One piece of advice I have is to be very flexible in your careers and gravitate to the areas that interest you. Learn everything you can about security and technology; we live in amazing times and the whole world is going through a digital transformation right now. The world needs your help, so study hard and keep up with all the changes in technology and security. The Internet is a great human resource, so use it; learn how to find good sources of information and never stop learning. It’s very important to learn to interact with others in a positive way and become a good communicator. Be a positive person. Technology is hard for many so help them understand it.

4.Where do you go for the most accurate and up-to-date information on what is happening in technology?

I take advantage of my commute time and listen to podcasts. I’ve got my podcast apps, and I can tie into any podcast out there. I listen to Google, Apple, Microsoft, Security Podcasts, etc. It really comes down to about five companies that are at the head of technology development. It is all interesting to watch and hear, like a big game to see who will come out with the next trend.

5.What are some basic tactics that you would recommend to the public, who may not be fully aware of online cyber risks?

First of all, don’t believe in total privacy online. If you’re on the Internet regularly, you are not doing it privately. If you’re using the Internet you’re going to be in some database somewhere. In regard to keeping your own computers and other devices secure, try not to click on links that you don’t recognize, use two-factor authentication whenever possible, have a password manager for your personal emails and other log-ins, keep up with the news, and don’t go to websites that you can’t verify. Most importantly, don’t allow any action on your devices that you do not personally approve. So if an email comes up with a link that you do not know, reverse it, call the company directly and ask if they contacted you. You need to initiate the connection instead of assuming a provided link is good.

6.What are you involved in outside of the classroom that involves technology development?

Well, I am a mentor for First Robotics. My son wanted to start a robotics club at his high school with two friends, after seeing that other schools around the city, such as Hi Tech High had them. They started a robotics team for Mission Hills High School in San Marcos. I met with them and let them know that I wanted to help out, so I met all the parents of the other students and we worked together to start a robotics team. It’s a lot of work! You have to form the team, and it costs about $4000 to compete in these competitions, so that takes a lot of fundraising. You’re given parameters like the weight of the robots, which has to be 120 pounds, and the cost, which has to be less than $4000, and so on. So you need to get sponsors. We got started in the robotics competitions in San Diego four years ago, and our first project was a defensive robot which was required to have the ability for aerial assist. In that first competition we placed 23rd out of 60 teams, which was pretty high for a rookie team, considering that some of the other teams had been doing this for at least ten years. From there we ended up going to St. Louis to compete, because we won Rookie All Star; we were up against teams from across the nation, but there are also about 30 countries that do this every year as well. Right now there are about 6,000 teams globally that are a part of this competition. We were up against the best and that motivated us to come back even better the next time. So in the following years we have been semi-finalists in both the national and international competitions. This year we were semi-final and quarter-finalists. There are a lot of scholarships attached to this, so students can get money from Boeing and other companies who are looking for engineers to sponsor. Our team is so successful because we have so many mentors who specialize in every aspect of building and implementing.

7.What is an up and coming technology or technology trend that you are really excited about?

Well people like to say that my head is in the clouds, because I am so invested in cloud computing! This is the next paradigm shift in major technology. A cloud service run by major corporations like Google and Microsoft provides the advantage of a powerful storage facility, with massive processing power, and servers that can shift their computing power to adapt to any situation. In regards to hacking, people are going to start seeing the value of the cloud, because it offers more security at less expense, and it is consistently updated. The ability to share and store information will connect the world and give everyone access to technology.

 

We want to thank Mr. Byrne for taking the time to tell us about himself and his passion for technology. Keeping students motivated and engaged is a full-time job and there is a lot more beneath the surface here than you might think. Join us again next month for another spotlight on our incredible faculty at Coleman University! If you would like to know more about First Robotics and the team that Mr. Byrne is mentoring follow the links below.

https://www.firstinspires.org/robotics/frc

https://www.facebook.com/team5137/

 

Share Button

Coleman University Students Can Get Office For FREE!

Share Button

As educators, everyone at Coleman University is united behind a single goal – help prepare our students to become the best they can be. Now, there’s an exciting new benefit that aims to go a long way to achieve that goal. Our school has made an agreement with Microsoft to provide Office to every one of our students for free. This automatically updatable, subscription-based software ensures our students always have the latest version of Word, Excel, PowerPoint, OneNote, and more for as long as they’re a student here and the program continues. According to IDC, students with Office skills are better prepared for work in the professional world.

  • Install on up to 5 compatible PCs and Macs, plus 5 tablets
  • Use with OneDrive for automatic device syncing
  • Gain valuable skills on the world’s most popular document software
  • Use the same programs as the faculty to ensure full file fidelity

This offer is available to all students at Coleman University. To get your complimentary Office, visit Office.com/GetOffice365 and follow the on screen instructions.

Need help? Frequently Asked Questions For Students

HigherEDBanner

Share Button

Meet & Greet With Matt Soseman

Share Button

Matt Soseman is an IT Consultant at Microsoft working with large enterprise companies and government agencies across the United States, helping customers solve complex business problems
using technology. More

Share Button