Wednesday, March 5, 2014

Do you deserve to be appreciated at work?


Have you heard? "Employee Appreciation Day" is coming this Friday - March 7th.

Are you ready to be appreciated? Perhaps you're expecting lunch out with the boss or a mug full of candy? Or, maybe you're pretty sure no one appreciates you at all. (Perhaps it's time for a new job, no?) Have you stopped to think about what you're doing at work that should be earning you some major kudos?

Whether you're employed in a traditional position, serving as a temporary worker or even volunteering while seeking your next full-time gig, keep the following tips in mind to inspire people to to consider you appreciation worthy:

Demonstrate initiative. It’s no surprise that this tops the list. We all prefer to work with people who raise their hands to offer to pitch in. Don’t spend key meetings looking around the room hoping someone else will take on the new project. When you step up to the plate and take on additional responsibilities, you’ll gain favour with bosses and colleagues and win a chance to enhance your credentials.

Admit when you make a mistake. Isn't it refreshing when someone says, “I made a mistake; let me fix it?” Unfortunately, many people in the workplace prefer to pass blame along or lay low until everyone forgets about the problem. Those who try to pass the buck risk being the victim of workplace gossip that could prevent them from getting a new job down the road. Of course, ideally, you won’t make a lot of mistakes that you’ll need to admit, but you can win points in many cases by taking responsibility and making a point to correct the situation.

Learn new things. If you’ve been at the job for many years, but haven’t made a point to continue your education and attend conferences and trainings, you probably are falling behind your less experienced colleagues. When you want a new job or it’s time to start a business, you’ll be missing mandatory skills. The best employees always seek opportunities to learn new things, even when they’re otherwise occupied keeping up with the day-to-day tasks. It’s a challenge, but it makes a difference between a good employee and a great one.

Do what you say you will do. Do you follow through and complete promised projects? We all have had colleagues who raise their hand at meetings, but spend the rest of the week avoiding the work they agreed to do. Don’t be that person.

Share credit. Rarely do we accomplish big projects at work without someone else’s help. Colleagues who share credit when credit is due generally have better rapport than their more selfish colleagues. Nice guys really can finish first, so look for ways to share the glory.

Know what battles to pick. It’s a rare person who always likes every decision that higher-ups make that affects his or her job. Usually, there’s plenty to disagree about, and lots of big and small battles to wage at work. Successful employees make it a point to keep quiet and not complain until it really matters. If you’re the employee who is generally agreeable, it is much more likely that someone will take notice if you have a major concern or complaint. Like the boy who cried wolf, if you’re always railing against the rules, most people will stop listening.

Be ready for work. If you need to spend the first hour of your day checking social media and updating your status on Facebook, do that before you get into the office. You need to be ready for work when you get there. You harm your reputation when you don’t start your day along with everyone else.

Do the work. It sounds easy, right? Just get the work done. However, it’s not always so obvious to everyone that getting the work done is half the battle. Amazing employees find a way to get the work done, even when it means sometimes putting aside their own pet projects or favorite things in order to accomplish a big goal.

A nice article from LinkedIn by Miriam S.

Wednesday, February 26, 2014

Creation of Public Key(PPK) from Private Key(PEM)

Users dealing with connectoin to encrypted environments uses Keys as a encryption mechanism for communication between the hosts.

These Keys are of two types namely Private Key(PEM) and Public Key(PPK).

Private Key(PEM)s are usually generated by the host to which the encrypted connection has to be made.  But tools such as "Putty" which are used as SSH based connection tools, connects with the remote machines requires Public Key(PPK) to create sessions with the host.

Public Key(PPK) are generated using tools provided by "Putty" such as "Putty Key Generator" in Windows or using "ssh-rsa" utility in Linux, when we have Private Key(PEM).

Creation of Public Key(PPK) would end with "Couldn't load objects" when using "Putty Key Generator".  This is due to the unavailability of new line at the end of the Private Key(PEM).

This has been fixed with the latest versions of "Putty", however it is not required to update "Putty" for this small purpose.

Sunday, February 16, 2014

Summary Cloud Computing and Big Data Tools/Utilities/Projects

Cloud Computing and Big Data Processing are two great current domains in the field of Computing.  There are numerous projects that are running on this two great domains at various sectors.

A summary of various projects that are available on these data points can be found in the following link:

http://hadoopecosystemtable.github.io/

Hope this would give a good startup for many.

Thursday, December 12, 2013

Characteristics of a Director

A Director position holder must be:

1. A strategic thinker can provide thought leadership to projects and products
      I always believe in "Strategic Thinking" as it is a powerful and invaluable skill, one that leads to greater chances of success in projects one is involved in. It involves:

  1.       Setting goals 
  2.       Developing long-range plans
  3.       Anticipating the unexpected 
  4.       Continuous analysis of one's environment
  5.       Cooperating with One's competitors to have an added advantage.

2. Data driven planning, specifically in the world of Big Data and decision making
    It is a known fact, that the decisions to any new product design, develop, test and launch are purely based on Data, All the decisions on management or recommendations have been made consciousness, which has been derived based on the data present on those sections.I always have presented my research with data to my management and my recommendations to the entire teams I worked with, for all of us to come to a conscious and make informed decisions.

3. Strong motivator and team builder
    I like not to take any thing personally, I like to work with anyone at any time basis, I am a student of life and share my positive experiences with life to motivate others, how to handle conflicting situations and more.

4. High degree of customer orientation
    We are consumers first, if we think like this and walk in the shoes of consumers a Mile before making any choice, we are at added advantage, this is what I always do.

5. Must be an advocate of lean processes
    I strongly believe in the best use of available resources, as it is the key to success. It is vital to identify the value of the project/product, stream line all values, create a work flow, by establishing a pull to complete project/product, try to get as much perfection as possible, and restart this process...This was majorly my process impromenet cycles.

6. Be committed to organizational development and operational excellence
    There is a big saying, I absolutely believe in "The food container you eat from, do not poke holes in it, rather take care of it".

7.  Hands on experience in building and delivering enterprise class software products

--Extract from a LinkedIn website.

Friday, December 6, 2013

Connecting to Remote System using Private SSH Key

Connection to remote system using secure keys can be accomplished by various tools such as RDP and SSH clients.  Remote machine has to create a key based on the credentials and this has to be used, while doing the remote connection.

When we used to connect using SSH clients, permission to the file plays a role in connection to the remote system, even if all of the rest are fine.

This will create a panic and will get the work to stop unless until the the file permissions meet the required credentials.

It is quite easy and we have to confirm that the current user alone should have read permission and rest of the users or groups should not have any permission.

This can be achieved by running the following command:

chmod 400 privatekeyfile.pem

This will do the necessary credential changes and the command "ls -l" would get the following like,

-r-------- 1 user group 1678 Dec  6 15:07 privatekeyfile.pem

Now, you can connect to the remote system using SSH, like

ssh -i privatekeyfile.pem user@servername


Monday, August 5, 2013

Create Documentation for Source Code - DOxygen

Documentation plays a vital role in all the development process in multiple ways.  Some of them includes description of the declaration, definition and implementations, indication of author when the source is common base across multiple developers, mark up of timeline when it is being developed during a time period and so on.

Apart from all of the above, documentation helps the users of the source to understand it clearly based on the comments provided.  It also gives options for finding relation between classes, callers and calls to and of the function.

DOxygen is one of the good tool that I came across which gives a documentation with detailed parsing of the source with various diagrams that would help a most for a starter.

DOxygen is a standalone tool that is used for the creation of document for any source code.  It supports a wide range of programming language such as C, C++, C#, Objective-C, IDL, Java, VHDL, PHP, Python, Tcl, Fortran, and D. It uses a tool named "DOT" for creating pictures of classes, graphs of calls and callers.  This tool has been provided by Graphviz.

Usage of DOxygen is not much complicated, but it requires a continuous part in the development of source code, where the developer has to put appropriate comments.

DOxygen provides standard formats for providing comments in the source base.  It also provides various functions which can be used effectively during the document creation.


A list of various functions that DOxygen provides can be found in the following page.
             DOxygen Functions

Configuration and usage of has been explained more neatly in the following link.
             DOxygen Manual

Tuesday, July 30, 2013

Data Security in an extended mode

Data security is one of the major constraint in the internet or in applications.  Hacking is one of the best techniques that was developed by the science/computing community.  But the actual usage of this technique is not in the acceptable range.

There comes the data security and there are various techniques that have arrived to make the data more secure.  Some of them does not withstand with the rapid development of hacking techniques whereas most of them took large time and resources for their operations, which is again a bottleneck in the regular usage.


There comes a new technique called functional encryption.  By this method, an encrypted application/function has been transferred over the internet and the end users get relevant data based on the characteristics of the user, rather than the whole data.  This enables transfer of the same data package to multiple users and each of them get data what they are in need of.  This system gives a higher end of encryption technique which would be a bottleneck to the hacking community.

References on Functional Encryption: