Posts

Showing posts from May, 2022

In the Beginning, God Created the Earth

The statement “In the beginning, God created the heavens and the earth,” has brought a lot of reactions to my mind especially after taking this course: From Atoms to Humans. The creation has phased itself with either the lawful self-assembly’s actions (produces order spontaneously) or the agent-designed assembly’s actions (requires energy moving  through the system). Scriptures state that in the beginning, the earth was without form, and void; and darkness was upon the face of the deep.  This confirms the thesis of the dark matter in the universe as the foundation or source of the galaxies that we have. But this dark matter needs energy called dark energy to influence the expansion of the universe. This energy is mysterious to scientists but understood by us through revealed truth as the power of God. Hence, He is above all creations either lawfully self-made or agent-designed made. Our current cultures make us consider darkness as negative, harmful, or evil. But as a...
  Brigham Young University - Idaho CSE 341 Project Web Backend Development - Fall 2022            Customer Record Manipulation (CRM)                                               Author: Fabrice Tshiyoyi Banyingela & Komlavi Djossou Supervisor: Shawn Porter Supervisor email: portersh@byui.edu         Acknowledgment Our sincere gratitude to my course’s Professor Shawn Porter for his time in supervising our project. Introduction Nowadays, programmers have seen how crucial it is to consider the needs of web users by producing a design that meets the client’s requirements. Creating these systems requires skills in database, frontend, and backend development to help users have a well-functioned project. Description Thi...

Lesson 8: OAuth

OAuth is an authentication protocol used for app (web or mobile) data access authorization. This method helps to make use of a third-party system such as Google, Facebook, or GitHub to gain access to the application. A common example is making use of your Google mail (Gmail) or Facebook account to register and log in to Glitch.com. So this protocol needs three parties in any OAuth mechanism: the client (the user), the consumer (eg: Glitch), and the service provider (eg: Google). The OAuth uses the following steps: 1.     Within your application such as Glitch.com, a window appears allowing the user to login/register using an existing account with Facebook or Google Mail 2.     Once authenticated and authorized, the third-party app acknowledges the permission and redirects the user back to your app via a pre-configured URL. Your application exposes an endpoint for such callback operations and hits the third-party provider API to ask for an acce...