sunnyjovita

Alibaba Cloud Student Ambassador

Hope you like my story 😀

Sunny Jovita – Binus International University

Introduction

Being a student ambassador means you are willing to take extra responsibilities to be more productive outside your own university’s activities. One day, I found a program from Alibaba Cloud Indonesia (“Alibaba Cloud Indonesia Program Duta Mahasiswa”). It was a student ambassador program, and I applied myself. And then, long story short, you will surely know after reading this, the process was never easy but it’s truly worthwhile! I feel like boosting my self-development so much here. 

Chapter 1 – Joining the Alibaba Cloud as a student ambassador

It has been over 3 months since I officially joined Alibaba Cloud Indonesia as a student ambassador. The selection process I have gone through was not quite easy. However, here I am, being genuinely grateful that they chose and trusted me to be one of 20 student ambassadors, across all universities in Indonesia. 

In this first month, we were given a full explanation of how the program worked throughout. We were also informed what we would be working on for our first project.

Chapter 2 – 1st project (Promoting Alibaba Cloud’s webinar to universities)

As student ambassadors, we were responsible for promoting Alibaba Cloud events to universities (particularly our own university) to influence students so that they become more familiar with Alibaba Cloud Indonesia (becoming an intern, gaining wider knowledge in Cloud Computing, etc). 

For our 1st project, we needed to promote Alibaba Cloud’s webinar with unique link registration. As a result, Finally I managed to gain 542 participants (294 joined the webinar) from 896 people who registered. This webinar benefited me in grasping the essentials of cloud computing, allowing me to broaden my knowledge. Furthermore, Alibaba Cloud provided us with a free test certification.

To gather such a huge number of participants, I collaborated with Binus University to help me advertise the webinar across all of the campuses. I conducted a meeting between my lecturer (Sir Ardimas), Binus Collab division (Sir Dimas), and also my mentor (Ms Laura Valencia) from Alibaba Cloud. Eventually, the collaborated ended up successfully as I expected 😀 

Chapter 3 – 2nd project Cloud 101 #ShareStoryChallenge

For our second project, we were supposed to create a campaign (ex: workshop, webinars, competitions) to promote Alibaba Cloud. With my team “Cloud 101”, we were doing a marketing campaign #ShareStoryChallenge where the participants needed to share their story after passing the Alibaba Cloud exams. What’s so special about this campaign? our objective is to introduce Cloud Computing to students who are not familiar with Cloud Computing and Alibaba Cloud Indonesia. So, by taking courses in Alibaba edu platform, you can get incredible Cloud Computing insights and know more about Alibaba Cloud which will be a perfect guide for you to gain new knowledge to meet your own success (Open to everyone, IT and non IT fields). 

And as a result, I finally managed to engage 14 people to pass the clouder certificates from 18 participants. Despite the fact that it fell short of expectations, it still paid off because all of my friends won the challenge!

Please kindly check our proposal:

https://docs.google.com/document/d/1g7qJoK9ow-tM25fmQHLWNmSS90WtRLHlJcCtmzefRZQ/edit?usp=sharing

my friends certificates:

https://drive.google.com/drive/folders/1wqA1Mat3CVco6JG3xGVECnbsQzSCA0Vy?usp=sharing

Chapter 4 – Webinars

The second webinar, by Ms Tifi Liu, who explained the marketing aspect of Alibaba Cloud, The third webinar Mr Arthur Renaldy provided us a full overview of Cloud Computing.  

Thanks to Miss Laura, Stephanie Gao, and Christy Zhou, who organized the first HQ sharing session, offered a thorough explanation regarding their expertise in business operations. The second HQ session, Mr Siddharth Pandey and Jeremy Pedersen spoke about their expertise as solution architects. From those webinars, I learnt about their experience working at Alibaba Cloud, what we need as students to be able to work in this industry, and many values which will help me grow my future career. Despite the fact that many of the webinars were not relevant to my fields (Computer Science), I am grateful to have had the opportunity to gain such essential information.

Last Chapter – Conclusion

June 6, 2022

The journey has finally come to an end! 

Take a look on what I managed to achieve for the past 3 months, being one of Alibaba Cloud student ambassador, Here is what I got:

And last but not least, to be chosen as a student ambassador of Alibaba Cloud itself!! (Not gonna lie, this was truly an achievement and a stepping stone for me).

I am deeply thankful to be part of Alibaba Cloud student ambassador, and to be given a chance to grow as who I am today. Being a student ambassador means you are willing to take extra responsibilities to learn much more beyond a formal education. Yea it sounds tough, but trust me, you can clearly see me now all the hard work pays off!

This amazing program matches me the best. So far, we as ambassadors already got so valuable lessons and experiences through projects and webinars that we probably would never gain it from our normal education as a university student. Getting new friends, doing projects together, chatting with the heads, and other knowledge gained from the Alibaba courses.

Once again, I want to thank our dearest mentor, Ms Laura Valencia for this amazing opportunity. Not to mention my teammates, Sundus Nurhasanah, Lenny Raufi Syafitri, Nesri Monika, Juan Patrick, and other amazing new friends I have gathered thanks to the Student Ambassador program. 

We get the chance to execute real campaigns and projects, by working individually and also teamwork. It all matters in order to improve our skills better. By this, we become even more dedicated and one step away from being experts!

Last but not least, I hope this story inspires you. Bear in mind that upgrading skills does not always have to go through difficult or complicated ways. You can always start from the simplest thing, such as merely joining online classes, webinars, workshops, and others. From these, I am pretty sure other possibilities that will help you to achieve your goals will open themselves up.  

Instead of blaming the circumstances, the limits that I faced made me have greater effort and have a stronger fighting spirit than everyone else” 

Such an amazing experience! Definitely a 10/10

1st project (Promoting Alibaba Cloud’s webinar to universities)

For our 1st project, we needed to promote Alibaba Cloud’s webinar with unique link registration. As a result, Finally I managed to gain 542 participants (294 joined the webinar) from 896 people who registered. This webinar benefited me in grasping the essentials of cloud computing, allowing me to broaden my knowledge. Furthermore, Alibaba Cloud provided us with a free test certification.

To gather such a huge number of participants, I collaborated with Binus University to help me advertise the webinar across all of the campuses. I conducted a meeting between my lecturer (Sir Ardimas), Binus Collab division (Sir Dimas), and also my mentor (Ms Laura Valencia) from Alibaba Cloud. Eventually, the collaborated ended up successfully as I expected 😀 

Joining the Alibaba Cloud Student Ambassador!

Hi everyone!

Well, it has been over 3 months since I officially joined Alibaba Cloud Indonesia as a student ambassador. The selection process i have gone through was not quite easy. However, here I am, being genuinely grateful that they chose and trusted me to be one of 20 student ambassadors, across all universities in Indonesia.

2nd Project – Cloud 101 #ShareStoryChallenge

May 16 2022

60 days and still counting…

Being a student ambassador means you are willing to take extra responsibilities to be more productive outside your own university’s activities.

Now, I’m in the middle of doing a marketing campaign project with my team Cloud 101. The members are: Sundus Nurhasanah, Lenny Raufi Syafitri, Nesri Monika, Juan Patrick, and me!

What’s so special about this campaign? Well, our objective is to introduce Cloud Computing to students who are not familiar with Cloud Computing and Alibaba Cloud Indonesia. So, by taking courses in Alibaba edu platform, you can get incredible Cloud Computing insights and know more about Alibaba Cloud which will be a perfect guide for you to gain new knowledge to meet your own success (Open to everyone, IT and non IT fields). 

Here is the campaign!

——————————————————————————————————————

đŸ™ŒđŸ»Halo Teman-TemanđŸ™ŒđŸ»
Kami dari student ambassador Alibaba Cloud Indonesia menyelenggarakan share story challenge. Share story challenge adalah campaign peserta Alibaba Cloud untuk membagikan cerita kelulusan sertifikasi clouder di sosial media masing-masing. Teman-teman bisa simak video tutorial dan presentasi kami berikut ini: https://bit.ly/TutorialChallengeAlibabaCloud

Registration: https://bit.ly/ShareStoryAlibaba
Periode: 16 Mei – 29 Mei 2022
Biaya: FREE (Gratis)

Benefits:
– Student Membership Alibaba Cloud (khusus mahasiswa/pelajar)
– Personal branding dan meningkatkan awareness cloud computing
– Hadiah merchandise + e-money

Yuk ajak teman-teman ikutan challenge dan semua bisa ikutan challenge (terbuka untuk umum) ! đŸ€©đŸ‘‹

——————————————————————————————————————

This campaign will definitely help the participants to boost their personal branding (since they will get certificates after passing the exam courses) and market the Alibaba Cloud brand name widely in Indonesia.

Finally, it comes to an end…

After 3 months of being Student Ambassador Batch 1 of Alibaba Cloud Indonesia, my unforgettable experience finally comes to an end. As a first-timer being a Student Ambassador, I’m truly blessed with this opportunity and I’m thankful that I learned it from a great company with amazing goals that support sustainability.

Even though there were some challenging tasks during the process, (and the work-from-home/university’s task situations), I’m glad to be a part of Alibaba Cloud Indonesia team. I’ve gained a lot of new insights, experiences, and also new friends!

Thus, I want to thank my mentor, Kak Laura Valencia for her guidance, advice, and support for the past 3 months whenever I need a help during making my projects 😀

Also, honorable mention to my teammates! Sundus Nurhasanah, Lenny Raufi Syafitri, Nesri Monika, and Juan Patrick. Thank you for all of the support and teamwork we had! Although we are all from different universities across Indonesia, but being able to work with you was a once-in-a-lifetime opportunity. Wish you guys tons of luck for your upcoming journeys! 

Regards,

Sunny Jovita

Number System Converter www.p-tools.com

Author: Jeconiah Richard, Calvin Scorpiano Halim, Rowin Faadhilah, Sunny Jovita, Mileno Valdo Elvano

Numbers are expressions that are used to describe quantity or used in making calculations. There are varieties of number types and they are used differently. Some are used in calculations, and in code they are used to describe other symbols or elements. Equally important, there are number systems, which are the technique to represent numbers in computer system architecture. In the other words, number system is commonly utilized to identify each type of number and how their functions.

Problem

In this modern era, computers represent all information and data from audio, images, videos, etc in binary numbers. Furthermore, people commonly use letters or words to communicate with each other. We send messages or information by typing letters or words. However, it is evident that computers don’t have brains like us. So how do they understand us?

Our Solution

Each numbering system holds different values than the others, but they can be converted into one another. Since manual conversion of these numbers usually take many steps and time, our group is motivated to create a number system converter for this project. With a number system converter, conversion would be easier to complete. Although there are many converters that are existing on the internet, we want to create something that is our own and it is more advanced rather than the other converters.

The Algorithms

For this project, our group had agreed to assign decimal number system as the main conversion. In other words, all the conversions start from decimal to other bases or otherwise, before changing it to another base.

How the program works

We made JavaScript functions that converts the different conversions into decimal, and from decimal into all the other conversions. When the ’Convert’ button is clicked, JavaScript will check which field is inputted by the user and ensures that only a single field is filled in. Once that check is passed, a function is called and it will convert the input into decimal form if it is not already. 11COMP6504 Computer Architecture Operating Systems After that, the function takes the decimal base to start converting the other conversions and return the resulting conversion in an array. This array will then be displayed in the order of its index in the fields to show the result of the conversion to the user.

Demo video: https://youtu.be/gbzbOVmACW4

COBY: COVID-19 Telegram Chatbot by EmployingMachine Learning Algorithms

Author: Muhammad Naufaldi, Sunny Jovita, Christensen M. Frans, Muhammad L. I. Hanafi and Nunung N. Qomariyah

COVID-19 pandemic has been one of the biggest concerns nowadays. People always curious and ask for immediate responses regarding the current situation. The chatbot can be very useful in this kind of situation which allows the system to understand text, which means it can respond appropriately. In order to be able to return the correct responses, the chatbot needs to learn how to classify the text data input from the users. In this paper, we study three different machine learning algorithms to work on text classification problems, namely Naive Bayes, Neural Network, and Support Vector Machine (SVM). An experiment was carried out to study which machine learning algorithms produce the most accurate responses when they are implemented in the Artificial Intelligence (AI) chatbot systems. In order to make sure the tests are consistent and fair, we conducted the experiment on the same dataset, and assessed the accuracy of their respective responses. In addition, we have also successfully implemented each of these algorithms as chatbots on a social media platform, Telegram.

Link for video: https://youtu.be/aiUFY9W1SgA

Which is Better Ubuntu or Kali ?

Sunny Jovita – 2031939046

Week 13

Disclaimer: This blog is for educational purposes only.

Ubuntu is a Linux based Operating System and belongs to Debian family of Linux. Since it is Linux based, it is freely available for use and it’s open source.

Kali Linux is an open source open source operating system and it is freely available for use. Kali Linux comes packed with 100+ of penetration testing, security research, digital forensics, reverse engineering, and ethical hacking tools.

Differences between Ubuntu and Kali Linux from GeeksforGeeks

However, apart from the differences above, it is not fair to compare them on the same level. In my opinion, if you are looking for operating system for network security, penetration testing, etc, Kali Linux is the best choice. Nevertheless, if you want a user friendly, general purpose operating system with the best GUI, Kali Linux cannot compete Ubuntu.

In other words, we can describe Ubuntu and Kali Linux below:

  1. Ubuntu is more suited for personal uses and beginners who want to learn Linux. It is also used by many people who want their computer to be virus safe. I other words Ubuntu is user friendly general desktop/laptop operating system.
  2. Meanwhile, Kali Linux was Backtrack and Backtrack was Ubuntu with penetration packages installed. Kali comes with a number of penetration tools be it wifi or databases, build to be used instantly.

Port Scanning

Sunny Jovita – 2301939046

Week 12

Disclaimer: This blog is for educational purposes only.

Port scanning is a method of determining which ports on a network are open and could be receiving or sending data. It is also a process for sending packets to specific ports on a host and analyzing responses to identify vulnerabilities.

The goal behind port and network scanning is to identify the organization of IP addresses, hosts, and ports to properly determine open or vulnerable server locations and diagnose security levels. Both network and port scanning can reveal the presence of security measures in place such as a firewall between the server and the user’s device.

Here are some of the more prominent ports and their assigned services:

  1. Port 20 (UDP) holds File Transfer Protocol (FTP) used for data transfer
  2. Port 22 (TCP) holds Secure Shell (SSH) protocol for secure logins, ftp, and port forwarding
  3. Port 53 (UDP) is the Domain Name System (DNS) which translates names to IP addresses
  4. Port 80 (TCP) is the World Wide Web HTTP

In addition, numbers 1024 through 49151 are considered “registered ports” meaning they are registered by software corporations. Ports 49,151 through 65,536 are dynamic and private ports – and can be used by nearly everyone.

A port scanner generally sends a TCP or UDP network packet and asks the port about their current status. Below are three types of responses:

  1. Open, Accepted: The computer responds and asks if there is anything it can do for you.
  2. Closed, Not Listening: The computer responds that “This port is currently in use and unavailable at this time.”
  3. Filtered, Dropped, Blocked: The computer doesn’t even bother to respond.

Steps to do Penetration Testing

Sunny Jovita – 2301939046

Week 11

Disclaimer: This blog is for educational purposes only.

In this post today, I will explain the best steps on how to do a successful penetration testing.

Step 1 – Signing NDA

Before performing a penetration testing, it is important for your client and you to sign a NDA (Non Disclosure Agreement). Non-disclosure agreement is an important legal framework used to protect sensitive and confidential information from being made available by the recipient of that information. The purpose of signed NDA is to make the pentester commit to keeping all the confidential information and the findings safe.

Step 2 – Define the scope of the test

In here, you need to define the scope of the test, including the systems to be addressed, what testing method to be used, any data to provide to the tester, from where it will be tested, and by whom it will be tested. This stage is important for both tester and the client so they have a full understanding of what is expected and what information the tester will potentially have access to.

  1. Extend of the testing
  2. What will be tested
  3. From where it will be tested (internal, VPN, external)
  4. By whom it will be tested (personnel, 3rd party, internal)

Step 3 – Performing the penetration testing

Detail process:

  1. Tools (based on the type of the test)
  2. Scanning
  3. Getting access
  4. Maintaining access

Step 4 – Reporting and delivering results

Once the test is finished, the data is ready to be analyzed to determine what vulnerabilities could be exploited. With all of these information, we can go now to the last phase of pentesting. 

The final phase of pentesting is reporting. Inside the report, it includes all the findings and the processes conducted during the pentest mission. The tester submits the report to the client. The report will be the best communication tool for your pen test results. So the report must be very clear, meaningful, and understandable for both technical and non technical sides. A good report supports these following sections;

  1. Background or introduction -> explains the purpose of the pent testing. (goal: the client should gain a clear idea about the goal and the expected results of the pent testing)
  2. Information gathering
  3. Vulnerability assessment
  4. Vulnerability confirmation
  5. Post exploitation
  6. Risk/exposure
  7. Conclusion to give a final overview of the test.

With the right steps to pentest, hopefully it will succeed.