Thursday, December 12, 2013

Characteristics of a Director

A Director position holder must be:

1. A strategic thinker can provide thought leadership to projects and products
      I always believe in "Strategic Thinking" as it is a powerful and invaluable skill, one that leads to greater chances of success in projects one is involved in. It involves:

  1.       Setting goals 
  2.       Developing long-range plans
  3.       Anticipating the unexpected 
  4.       Continuous analysis of one's environment
  5.       Cooperating with One's competitors to have an added advantage.

2. Data driven planning, specifically in the world of Big Data and decision making
    It is a known fact, that the decisions to any new product design, develop, test and launch are purely based on Data, All the decisions on management or recommendations have been made consciousness, which has been derived based on the data present on those sections.I always have presented my research with data to my management and my recommendations to the entire teams I worked with, for all of us to come to a conscious and make informed decisions.

3. Strong motivator and team builder
    I like not to take any thing personally, I like to work with anyone at any time basis, I am a student of life and share my positive experiences with life to motivate others, how to handle conflicting situations and more.

4. High degree of customer orientation
    We are consumers first, if we think like this and walk in the shoes of consumers a Mile before making any choice, we are at added advantage, this is what I always do.

5. Must be an advocate of lean processes
    I strongly believe in the best use of available resources, as it is the key to success. It is vital to identify the value of the project/product, stream line all values, create a work flow, by establishing a pull to complete project/product, try to get as much perfection as possible, and restart this process...This was majorly my process impromenet cycles.

6. Be committed to organizational development and operational excellence
    There is a big saying, I absolutely believe in "The food container you eat from, do not poke holes in it, rather take care of it".

7.  Hands on experience in building and delivering enterprise class software products

--Extract from a LinkedIn website.

Friday, December 6, 2013

Connecting to Remote System using Private SSH Key

Connection to remote system using secure keys can be accomplished by various tools such as RDP and SSH clients.  Remote machine has to create a key based on the credentials and this has to be used, while doing the remote connection.

When we used to connect using SSH clients, permission to the file plays a role in connection to the remote system, even if all of the rest are fine.

This will create a panic and will get the work to stop unless until the the file permissions meet the required credentials.

It is quite easy and we have to confirm that the current user alone should have read permission and rest of the users or groups should not have any permission.

This can be achieved by running the following command:

chmod 400 privatekeyfile.pem

This will do the necessary credential changes and the command "ls -l" would get the following like,

-r-------- 1 user group 1678 Dec  6 15:07 privatekeyfile.pem

Now, you can connect to the remote system using SSH, like

ssh -i privatekeyfile.pem user@servername


Monday, August 5, 2013

Create Documentation for Source Code - DOxygen

Documentation plays a vital role in all the development process in multiple ways.  Some of them includes description of the declaration, definition and implementations, indication of author when the source is common base across multiple developers, mark up of timeline when it is being developed during a time period and so on.

Apart from all of the above, documentation helps the users of the source to understand it clearly based on the comments provided.  It also gives options for finding relation between classes, callers and calls to and of the function.

DOxygen is one of the good tool that I came across which gives a documentation with detailed parsing of the source with various diagrams that would help a most for a starter.

DOxygen is a standalone tool that is used for the creation of document for any source code.  It supports a wide range of programming language such as C, C++, C#, Objective-C, IDL, Java, VHDL, PHP, Python, Tcl, Fortran, and D. It uses a tool named "DOT" for creating pictures of classes, graphs of calls and callers.  This tool has been provided by Graphviz.

Usage of DOxygen is not much complicated, but it requires a continuous part in the development of source code, where the developer has to put appropriate comments.

DOxygen provides standard formats for providing comments in the source base.  It also provides various functions which can be used effectively during the document creation.


A list of various functions that DOxygen provides can be found in the following page.
             DOxygen Functions

Configuration and usage of has been explained more neatly in the following link.
             DOxygen Manual

Tuesday, July 30, 2013

Data Security in an extended mode

Data security is one of the major constraint in the internet or in applications.  Hacking is one of the best techniques that was developed by the science/computing community.  But the actual usage of this technique is not in the acceptable range.

There comes the data security and there are various techniques that have arrived to make the data more secure.  Some of them does not withstand with the rapid development of hacking techniques whereas most of them took large time and resources for their operations, which is again a bottleneck in the regular usage.


There comes a new technique called functional encryption.  By this method, an encrypted application/function has been transferred over the internet and the end users get relevant data based on the characteristics of the user, rather than the whole data.  This enables transfer of the same data package to multiple users and each of them get data what they are in need of.  This system gives a higher end of encryption technique which would be a bottleneck to the hacking community.

References on Functional Encryption: