Scrum Program Iteration / PI Planning

Pi program iteration plan
Safelite m weeks. n groups. n*9+ people.
Dev opps documentation support dev business test teams architects participate.
m/2 sprint and 1 for learning
Objective
Risk
Dependwncy
Automation and story.
Project board
Program board – feature and risk depndency from each project to be delivered sprint wise.
One feature dependent on another feature frim other team

Consider trainings leave…
Buffer between dependency. Cooling period – learning

Find api having defect and automate
Bugs from previous sprints

Retro and confirmation of pi planning

Risk parking lot
Resolved
Accepted
Owned
Mitigated

Confidence vote. Fist of five at the end.
Dependency found should be discussed in detail

Retrospective
Feature Story grooming. Inspect and adapt. Time boxed. Business owners missing. Business numbers. Along with business values.
Demo. Critical view of last 10 weeks.

Actions listed
Readiness kanban

Advertisements
Posted in Computers and Internet | Leave a comment

Big data

Key areas for an architect to note on big data solution:

I have frequently came across developers coming and saying my code was working fine with smaller size of data. With 14 gb of data the script is failing on single or two node cluster where one table data size is in kbs while other table data size in gbs.

The key areas are use of

1. Decomposition techniques.

2. Task dependency graph and average degree of concurrency.

It is important for one to understand the cluster size available and the amount of data one wants to process and also the kind of join one wants to apply.

On the same cluster one may be able to process the smaller size of data but as the table records grow one is not able to process the data. In such case one need to apply the right decomposition technique. It can be recursive, data, exploratory or speculative data decomposition. Also data can be decomposed at the input level or intermidatery or output level. The key is to divide and conquer.

It could be a matrix multiplication where one knows the final output or the intermediate output accordingly the data decomposition technique applied will vary based on the size of data, cluster and the task dependency graph used.

One may multiply each cell in separate task and then combine the output of each cell in a row in a separate task.

The other person may do multiplication of cell and then addition in a single task.

In both case no task is dependent on each other. Putting these different ways of execution into task dependency graph and calculating the average degree of concurrency would help one to choose the right graph with given set of resources.

One may be able to get the output in single MR step for smaller data but may not with larger size of data. This would require one to do application profiling considering size of cluster, input, output and the above mentioned techniques used. One may learn the framework and implement but such expertise will come with experience and the size of data handled and growing data on daily basis.

/////////////////

https://www.youtube.com/watch?v=EB0HLwmbx9I

////////////////

http://www.socialsamosa.com/2014/03/social-media-analytics/

Aware:

One will collect data based on cookies what I surf on mobile, on desktop, when I am in public or when I am alone or with spouse/friend.

Accordingly demand side platforms working for advertisers will target those ads to the end user.

Activated:

Repeatedly looking at those ads due to inclination towards those things, once nerves gets activated towards it.

Addicted:

One gets some coupon / voucher from HR / training department which is not very big amount. The item which has got activated in the mind is also not very costly, the first thing one does is to start exploring things around this item and ready to spend another equal amount matching the voucher from own pocket and buys the item.

One may get addicted to it and would like to buy the same item again with all money from his/her own pocket.

Amplified:

The activated thought has got amplified.

///////

use linux to download data. put on hadoop. to extract. write pig script call UDF written in java. use patterns and matchers. sum up the data and put it in DB. Call services. show the numbers on browser.

///////

sentimental analysis: nlp – gate library. twitteR in R-studio.

http://www.datasciencecentral.com/profiles/blogs/one-page-r-a-survival-guide-to-data-science-with-r

///////

Posted in Computers and Internet | Tagged , , | Leave a comment

Living Vipassana

This blog is about inspiring people to continue their meditation practice. If you would like to contribute a post to this blog, send it to ryanshelton7@yahoo.com with your name and where you’re from and I’ll be happy to share it.

Link | Posted on by | Tagged | 2 Comments

Salasar Balaji, Mukundgarh, JhunJhunu, Navalgarh

Every Mansing(h)ka in his life time atleast after marriage or after having kid in first year or third year will go for jadula to Salasar Balaji an these other places.

 

The best route I felt while going in ac indica was first going to Salasar Balaji from Jaipur via Sikkar, then to Mukundgarh, then to JhunJhunu, stay over night at Rani Sati temple and next day morning on the way back to Jaipur visit Navalgarh.

 

The roads were best among India and was able to complete the trip in 24 hours with my 2 month kid and wife.

 

One will not find any problem in going to Salasar Balaji as its a well know place.

 

Mukundgarh has a "Pitro ki Bagichi" Mansingka’s. One should go to Mukundgarh village and not the Mukundgarh Mandi to reach the Mansingka’s Haveli. It is near to the fort and the Poddar’s Museum in Mukundgarh village. The relatives of Mansingka’s Mr. Murarilalji Murarka (01594-252315, 9784319378, Stationary shop on Gopinath Mandir Rd in Mukundgarh) has the keys of the Haveli. Haveli is opposite to the well which is well constructed. It is not a very famous place.

 

One comes across Laxmangarh while traveling from Salasar to Mukundgarh.

 

At Rani Sati temple there is a very big dharamshala to stay overnight and to get the evening meals one should reach before 9 pm. The rooms are available with double bed and coir mattress and common separate male / female toilets at the cost of 50 Rs. / free of cost.

 

At Navalgarh we have to visit "Dher ke Balaji" which is not a very famous temple. It is about 2 kms away from Navalgarh on Navaladi Road. One has to go there via Bawdi Gate in Navalgarh. Here also one will come across "Poddar’s Museum".

 

Jaipur to Sikar is about 110 kms. Sikar to Salasar is about 60 kms. Laxmangarh is about 35 kms from Salasar. Laxmangarh to Mukundgarh is about 25 kms. Mukundgarh to Jhunjhunu is about 26 kms. Jhunjhunu to Sikkar via Navalgarh is about 65 kms. And Sikkar to Jaipur is about 110 kms.

 

The travel we used was from Mr. Kapil (9414676303), driver – GulabSingh (9252086307). The total trip was about 510 kms. completed in 24 hours. Started at about 1 pm and reached back at 2 pm next day. The charges were about 6 Rs. per km for AC Indica.

Posted in Travel | 1 Comment

Application’s Performance over Embedded Devices

 

 

 

Application’s Performance over Embedded Devices  

  Dipanshu Mansingka, TBU

Persistent Systems Limited

 

Embedded Devices:

Embedded devices are the systems having hardware as per the requirement and perform few dedicated functionalities. Smartphone’s, Pocket PC’s are the embedded devices with operating systems and microprocessors. (http://en.wikipedia.org/wiki/Embedded_system)

Different Applications on embedded devices:

Sales Force Automation Tool (SFA)

In today’s world, pocket pc, palm devices and other similar devices are extensively used by Corporate as part of their Enterprise applications like Sales Force Automation Tools. The sales person accepts the order and issues invoices using devices, this data is synchronized to the server in real time, and therefore this data transfer has to be fast and secured. It allows the manufacturing plant to know the stock required at the given ware house on a given day. The sales person should be able to view his productivity based on volumes and amount, to meet the daily, weekly and monthly targets.

Here is the link on study of SFA for Procter & Gamble (http://www.ee.usyd.edu.au/~eief/PrizesInformation-PrizesForCommunicationSkills-3ThirdYear-Paper2002KimTran.htm)

Thermal and infra red image reporting to avoid disasters

Electrophysics Corp. have systems that capture the thermal and infra red images and send them across to mobile / embedded devices, along with the defect report mentioning the problems. Infrared cameras are used to find leakages on different surfaces. Thermal cameras are used to detect the overheating of the transformers etc. The performance of the system matters, as it has to analyze the pictures with high resolutions and report in time with great accuracy; else it will cause the damage to the transformer or the metallic surface in which leakage has to be detected. This metallic surface has to be of high quality if it has to be used in rocket launchers or in space.

Car navigation device

Some companies design the hardware for an embedded system using an operating system and ensure its compatibility with other hardware device which do not have any operating system. Like the hardware device designed for car navigation device using GPS system along with radio and TV antenna; and having wince operating system, was attached with the car music system having a touch screen of about 3” * 6”. (http://www.mozen.com, http://www.carmanpark.co.kr, http://www.carmanshop.com).

Email Synchronization

Persistent works for clients like Good Technology (www.good.com) and Seven Networks (www.seven.com) who develop products to synchronize Microsoft Exchange services, Dominos services and other ISP accounts on Smartphone’s, Pocket pc’s from different companies. Both, GPRS and CDMA devices, have to synchronize these services in real time. Think of the scenario where the user has kept his handset switched off while boarding the plane and when he disembarks from the airplane, he switches on the phone, and all the mails are synchronized on the device. The place where he has landed is a different circle or place where the mobile service provider do not have their own services and hence the user has to use some other service provider services for which extra charges are charged.

Improving Performance:

Problem 1:

For a sales force application designed for different devices, the performance issue comes with the server and all the devices having different database format. The pdb database on palm devices does not support relational database.

Solution

The records are to be in xml format separating the fields of record with special characters like ‘|’.  Both, at server and client end the data has to be converted and stored in the format supported, at server end it will depend on the database used. Since the devices will not support the relational database, design should support the search sort of records from different individual tables. Developer has to write a code to find the specific details from the table and then run the loop into the other table to get the required output to be displayed.

Problem 2:

Suppose there’s a GPS device fixed in your car which has different applications to play movies, songs, games, and TV and radio channels; and view pictures. This device can be operated using a remote control.

Picture this scenario: As you get into the car and start driving, you will switch on the device using the remote. As you drive you may try to shuffle between different applications, but by mistake instead of opening the application to play songs you open the movie application. You then try to get back to the song application. As you try to exit the movie application, it will not process the input until the whole list of movies on the storage card is displayed. Frustrating, is it not?

Solution

Use of right API’s while coding plays an important role for the application and device to give good performance. If one is using Windows CE the use of PeekMessage increases power efficiency. This document, highlights how the use of PeekMessage helps in improving the performance of a battery. http://mysearch.intel.com/corporate/default.aspx?culture=en-US&q=PeekMessage&searchsubmit.x=0&searchsubmit.y=0

Now, lets consider the above example of an application listing thousands of songs and movie clips. The Developer can make use of API’s like PeekMessage and check for new messages/events at certain intervals, while the whole list of songs are displayed.  Based on these new messages /events, the current processing of listing the songs / movies or any such objects can be terminated. This will allow the user to immediately switch from the current application to the new application.

Problem 3:

The car navigation system should be able to track the current position of the moving car with the accuracy of less than a meter distance. If there is a left, right or U turn ahead it should be able to direct the user well in advance. Also on such devices the UI (user interface) should be well designed.  It should not lead the user to too many forms or clicks before giving the final result. While the user is driving the car or travelling, it is not feasible to navigate through many clicks on the device. Mozen has car navigation devices with other facilities.  However, about 15 months back when I had viewed these simulators, I personally, did not take to the product as it involved too many clicks to get the final output.

Solution

A well designed UI which has less forms and user clicks to reach the desired output.

Problem 4:

If we consider the products developed by Seven Networks or Good Technology, if the user has to continuously have the channel to send and receive mails, GPRS connection will be used. To keep the connection alive based on the heart bit set, even if there is no email traffic, flowing packets will be sent across between the device and the IP gateway of the operations center via mobile service provider using GPRS. This is an extra overhead to the system.

Solution

The other way is of SMS Push. The email can be pushed as SMS by broadcasting. The SMS is received immediately by the device once it’s switched on after disembarkation from the plane.

Performance of the application and device is of utmost important on such mobile gadgets, than the number of functionalities provided. 

The other factors which affect the performance are

1.       The time taken on the touch screen to convert the touch into a message and give the required output on the screen

2.       Battery consumption should be less, which depends on how the hardware is designed and equally on the design and coding of applications, especially games.

3.       How fast the user is able to shuffle between the applications, between the different objects within the application.

4.       How efficiently the user is able to access to different applications at the same time, like listening to music in background and viewing pictures simultaneously.

5.       Applications stored and run from the SD card or the flash memory embedded into the device, also makes a huge difference.  If one uses the Windows CE operating system than the remote tools that are part of Platform Builder or eVC 4.0, the difference can be found and measured.

6.       It is equally important to decide what kind of processing your application requires. To be able to choose & decide the right processor, refer: The paragraph “Which is better?” on http://www.cs.umass.edu/~verts/cs32/endian.html.

7.       Memory Management: The embedded devices use flash memory that is costly. Also, it depends upon the memory pages supported by the processor selected. The operating system is customized based on the functionality provided. The Windows CE is customized using Platform Builder. Now Visual Studio 7.0 has a separate version along with Platform Builder and other remote tools to check the performance of the applications on the devices. If your car navigation device does not support internet browsing, the components can be removed from the operating system. The Persistent library in Pune has the book “Building Powerful Platforms with Windows CE”. The other books in the library are

CT_No

NAME

ATHR1

W-20

Building Poweful Platforms with Windows CE

James Y. Wilson

W-21

Windows CE 3.0 Application Programming

Nick Grattan

W-25

Programming Microsoft Windows CE

Douglas Boling

 

Based on my stay in Korea, I realized that in the developed countries such gadgets are very popular.  About 80 % of cars have GPS devices with above mentioned functionalities in their vehicles. Almost every youngster in the metro trains, are busy using such devices. Individuals are seen carrying devices other than the mobile phone which may be for playing games or have an IPTV or other such functionalities.  Why can’t the user have one device that will have both the functionality of mobile devices and also have games and a facility for IPTV, and at the same time, it gives the required performance at the competitive cost.

Embedded devices take input from touch screens and buttons as well. These inputs are sent to the operating system in the form of key code. The operating system converts the key code into the message / event and passes it on to the active application. In devices that display system’s home screen having buttons for multiple applications, the user can switch between the applications, the key codes are passed on to the home application that puts the message / event in the queue of the active application. The home application runs in the background. Home application determines which of the two applications can run, which application should get killed on the activation of other application.

Hardware:

So far we have discussed about the applications written for customized embedded devices using operating systems. Other than this, if one is designing and manufacturing hardware, the device manufacturers using Windows CE operating system have to perform tests using Windows Logo Test kit, that helps them to get their devices certified from Microsoft to get the required performance bench mark.  http://www.google.co.in/search?hl=en&q=Logo+Test+Kit+(LTK)+&meta

One of the leading mobile device manufacturer‘s study showed that, although their device has great features and UI, it does not succeed in the market due to the code which has a high battery.  So also with when writing game applications, care has to be taken to avoid high battery consumption. This becomes the major hurdle when selling the device. If you take the Nokia charger, any new device from Nokia can be charged using the same charger, while that of another manufacturers’ would require different chargers for different devices.

Reference: Blogs on http://dipanshumansingka.spaces.live.com

/////////////////////

http://www.howtoselectguides.com/dotnet/obfuscators/#dp_methods

////////////////////

Parameters to analyse the test automation tool

Commercial 
                 Commercial Stability
                 Market Share
Cost Constraints
                 Onetime cost
                 Ongoing Cost
                 Additional H/W
                 Additional S/W
                 Internal Cost
Quality Constraints
                 Shared License
                 Documentation Supplier
                 Help Online
                 Tool Integration with other product
                 Additional Skill level required
Training      
                 Free Training
                 Training Offshore
Tool Test    
                 Implementation
                 Construct Product model
                 Additional Scripting Required
                 Re-run test for compatibility
                 Integration test
                 Performance Measures
                 Data Driven test
                 Synchronization
                 Object Identification
          Support
 
//////////////////////

Posted in Computers and Internet | Leave a comment

Virus on Mobile devices

Family of Virus on Mobile devices.

 

Platforms: Symbian, Blackberry, Palm, WINCE, J2ME

 

File type: .sis, .mid, .prc, java midlet

 

Size: 3KB to 180 KB. Based on the list of virus information I have come across.

 

Types:

 

Trojan: trojan, is a piece of software which appears to perform a certain action but in fact performs another. http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29

 

Email worm:

 

A type of Worm that uses E-mail as its spreading vector.

 

Adware: http://en.wikipedia.org/wiki/Adware Some types of adware are also spyware and can be classified as privacy-invasive software.

 

A type of Advertising Display Software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as Tracking Technologies.

Some consumers may want to remove Adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

On the other hand, some users may wish to keep particular adware programs if their presence subsidizes the cost of a desired product or service or if they provide advertising that is useful or desired, such as ads that are competitive or complementary to what the user is looking at or searching for.

 

Bluetooth worm:

 

A type of Worm that uses Bluetooth technology as its spreading vector. Bluetooth is a wireless communications technology.

See also Worm.

 

Different ways in which devices and systems are attacked:

 

  1. Overwrites the application.
  2. Hacking. Hack tools, send other Trojans using Bluetooth to other devices.
  3. Replace system font.
  4. Replace system and 3rd party applications.
  5. Replicate on other devices, using Bluetooth. See other devices using Bluetooth drains the battery. Also uses SMS / MMS for replication to other devices.
  6. Gets installed with other applications.
  7. Blocks the memory card.
  8. Localized to other languages.
  9. Disables applications like messaging, phonebook.
  10. Drops win32 worms on memory card.
  11. Disables 3rd party files managers.
  12. Corrupts uninstaller information.
  13. Pretend to be games application.
  14. Disables the auto startup of anti-virus applications.
  15. Sends phone and SMS messages to remote servers.
  16. Damage the application manager.
  17. Automate phishing via SMS.
  18. Lock the PDA, requires hard reset.
  19. On reboot disables all functionality except make / receive calls.
  20. Transfers application to desktop and installs toolbar for IE.
  21. Embeds itself into other .sis files, installable present on the device.
  22. Pretends to be a patch.
  23. Drops other virus along with itself.
  24. Pretend to be the cracked version of the email application.
  25. Displays random animation of graphics.
  26. Copy data into the text file and then send it to others over Bluetooth.
  27. Pretends to be a photoID program.
  28. Pretends to be a wap browser.
  29. Pretends to be a Macromedia flash player.
  30. Hides all the installed application. User cannot see them.
  31. Sends the IP address and starts communicating remotely.

http://www.eicar.org/anti_virus_test_file.htm


Important links:

 

http://www.smobilesystems.com/homepage/virus.jsp

 

http://en.wikipedia.org/wiki/Mobile_virus

 

http://www.f-secure.com/glossary/eng/malware-code-glossary.shtml

 

////////

 

How to hard reset different devices:

 

http://www.smobilesystems.com/homepage/reset_codes.jsp

 

////////

http://www.bizjournals.com/columbus/stories/2008/05/12/daily38.html

Posted in Computers and Internet | Leave a comment

Appreciation

Others about me

What others have to say about me clients, managers with employers, colleagues, friends in personal life and others.

 

Employer

http://www.persistent.co.in

————————————————————————————————————————————–

RE: thanks for the bonus.
Tue 1/10/2012 1:31 AM

Indeed!

XXX
VP, Infra Systems Engg.

Sent: Monday, January 09, 2012 11:05 AM
To: Mansingka, Dipanshu (CDS- Hyderabad); XXX
Subject: RE: thanks for the bonus.

Well deserved.
🙂

-XXXX
VP, Engg.

————————————————————————————————————————————–

RE: thanks for the bonus. we got it with october salary.
Wed 11/2/2011 5:54 AM
You’re welcome. You guys rock! And this bonus is just another way to say thank you for your valuable contributions.
XXXX
CTO
————————————————————————————————————————————————————————————
Sat 6/30/2012 12:41 AM
Thank You
All,
I would like to sincerely thank you for your you hard work and many successes for XXXXXXXXXXXXXXX.
When we added the additional staff for XXX, we knew it would be tough when the time came to scale back to our nominal numbers.
Now that we’re here, it’s even more bittersweet than I imagined.
Dipanshu has been here since nearly the beginning, and he and his leadership (and many shared words) will be dearly missed.
XXXXXX has similarly been with us on the QA side from very early on. Every bug she ever filed against me was correct (unfortunately).
XXXXXX, too has had quite a tenure. Every bug he ever field against me was actually a “feature”. J
XXXXXX – I’m sure will miss living inside our Config DB. Or maybe he won’t. J
XXXXXX, I know will be sorely disappointed to no longer work on our ever-changing position on OSI. J
XXXXXX – well I actually met Jagan. “Double One Five Oh”. Oh – it was a pleasure, XXXX. A double pleasure.
In a strange way – the high quality of your output contributed directly to the timely roll out of XXX, and the natural conclusion we are faced with now.
Basically I’m saying this is all your fault. 😉
I truly wish you all the best with your future accounts and endeavors. I’m sure you all have bright futures ahead for you. I would not be surprised if we collaborated again soon.
If you’d like to keep in touch outside of XXX – you can find me here: yyy@yyy.com
Best wishes,
XXXXX
XXXXXXXXXX
VP Engineering

Appreciation of my mentor-ship.

From: Santosh Prakash
Sent: 27 August 2010 09:46
To: Poosarla Gayatri; Swathi Gottimukkala; Dipanshu Mansingka; Hari
Kasturi
Cc: Paresh Deshmukh; Mitsu Chatrola; Priya Gadgil; Santosh Prakash;
Srikanth Ambeer; Suresh Gade; Teresa Sebastian; Santosh Prakash
Subject: RE: XXXXX Server: Release x.xx

Further I would like to
appreciate efforts put in by the Software Test Engineers team. They are
considering almost all the scenarios for each requirement and raising the
appropriate bugs.

They have learnt when to reject
the build, when to accept it, how to speak to the dev team and I got the
positive feedback from my team on the Testing efforts which is great
J

Santosh
Prakash | Senior Team Lead – Enterprise

email | Cell: +91- | Tel: +91-40-

Persistent
Systems
Ltd. | 20 Glorious Years | www.persistentsys.com

5-Jul-2010 04:05:58 PM

Hari Kasturi
Dipanshu helped us for click and Buy project. done exceptional test plan which is for review with the client.

Appreciation for conducting Blood Donation camp

From: Kishor Bhalerao
Sent: Tuesday, June 29, 2010 7:17 PM
To: Mahesh V; Manisha Tapaswi; Arpit Kulkarni; Dipanshu Mansingka
Subject: RE: Appreciation for conducting Blood Donation camp

Team,

Congrats…..!

Regards,

Kishor Bhalerao | Senior Vice President – HR |
Persistent Systems

Innovation in software product design, development and delivery www.persistentsys.com

From: Manisha Tapaswi
Sent: Tuesday, June 29, 2010 6:18 PM
To: Mahesh V; Dipanshu Mansingka
Cc: Kishor Bhalerao; Arpit Kulkarni; buhr
Subject: FW: Appreciation for conducting Blood Donation camp

Hi Mahesh / Dipanshu,

Great!! Good Job..

Keep it up… J

Regards,

Manisha Tapaswi |Sr. Manager –
Human Resources | Persistent Systems Limited

Persistent Systems – Innovation
in software product design, development and delivery –
www.persistentsys.com

RE: Blood Donor’s Day.
Jitendra Gokhale
Sent: Monday, June 14, 2010 2:20 PM
To:
Cc:
Attachments:

Good work team. Keep the Persistent flag high.

Regards,

Jitendra

RE: Appreciation for conducting Blood Donation camp
Arpit Kulkarni
Sent: Tuesday, June 29, 2010 4:42 PM
To:
Cc:
Attachments:
Great !!!

From: Mahesh V
Sent: Tuesday, June 29, 2010 4:41 PM
To: Kishor Bhalerao; Manisha Tapaswi; Arpit Kulkarni
Cc: Dipanshu Mansingka
Subject: Appreciation for conducting Blood Donation camp

Hi,

Hyderabad Persistent employees (PSL & PSSL)  accepting
memento from Chandra Babu Naidu’s spouse for conducting Blood Donation camp
regularly.

 Regards,

Mahesh V | Assistant Manager – Human
Resources
| Persistent Systems Limited

Innovation in software product design, development and delivery- www.persistentsys.com

////////////////////////////////////////////////////////

-----Original Message-----
From: Manisha Jadhav 
Sent: Wednesday, February 17, 2010 1:23 PM
To: Dipanshu Mansingka
Cc: Jitendra Gokhale; Sudhir Alekar
Subject: RE: Bio Asia. my feedback.

Hi Dipanshu,

Thank you for very much for your valuable contribution for not only attending event at short notice but also providing useful inputs which will definitely help us for promoting our life sciences & healthcare service offerings.

Regards,

Manisha Jadhav| Business Development Strategist| Persistent Systems Limited
8888888_888888888888@persistent.co.in | Cell: +91 88888-88888| Tel: +91 (20) 8888 8888
Persistent Systems - Innovation in software product design, development and delivery -  www.persistentsys.com

17th June 2009

Feedback from Developer at Persistent working on the product developed by Persistent on Blackberry; of which me and my subordinate are doing testing.

Dipanshu Mansingka [2:33 PM]: ok do let us know if we can be part of the team from hyd

Manikandan P [2:34 PM]: yeah sure,  you guys are doing great job in testing

Dipanshu Mansingka [2:35 PM]: thankyou

Manikandan P [2:35 PM]: I liked the report sent by Rajesh

 good one

Dipanshu Mansingka [2:35 PM]:

Manikandan P [2:35 PM]: Himmat also said, document is good

Dipanshu Mansingka [2:35 PM]: thankyou

_______________________________________________________________________________________________________________________________________________________________________________

From: Matt Fonck
Sent: Wednesday, May 13, 2009 10:40 PM
To: Dipanshu Mansingka
Subject: Re: Thankyou.

Thank YOU Dipanshu!   It was a pleasure for me to work with you, and I very much enjoyed and appreciated your support.

Warm regards,
– Matt

—– Original Message —–
From: “Dipanshu Mansingka”
To: “Matt Fonck”
Sent: Tuesday, May 12, 2009 11:00:56 PM GMT -08:00 US/Canada Pacific
Subject: Thankyou.

Hi Matt,

I had great time working with you.

It was good to see account growing, as we stated working on automation.

Now Pankaj is taking care of both manual and automation testing. Leela from now onwards will be reporting to Pankaj.

Thank you for everything and giving the opportunity to work with you and the team.

Thanks & Regards,

Dipanshu Mansingka | Sr. Team Lead – Mobile Device Practice | Persistent Systems Limited

Innovation in software product design, development and delivery –  www.persistentsys.com

From: Matt Senne [Client]
Sent: Thursday, January 22, 2009 8:52 PM
To: Dipanshu Mansingka
Cc: Jon Mutter;

Subject: Re: PointGuard does not block phone numbers with (+91) Country code.

Thanks for clearing that up! We aren’t able to do these tests here (Columbus, OH) and your methodical testing and clear results are extremely helpful, Dipanshu.-Matt Senne

From: Vishnuvardhan Papaiahgari [Client]
Sent: Tuesday, November 27, 2007 12:05 AM
To: Dipanshu Mansingka
Cc: Ajit Dongre, Rammohan MVB
Subject: RE: Thank you!!!

Hi Dipanshu,

It was great to have you in the team and I do appreciate your contribution to different projects. I wish you all the best.

Thanks,
Vishnu.


http://www.bizjournals.com/columbus/stories/2008/05/12/daily38.html

From: Dipanshu Mansingka
Sent: Monday, November 26, 2007 2:00 AM
To: Haroon Abdelrahman; Vishnuvardhan Papaiahgari
Cc: Ajit Dongre, Rammohan MVB
Subject: Thank you!!!

Hi Haroon and Vishnu,

I would like to thank you both of you for providing me the opportunity to work with XXXXX Team.
I have relocated to Hyderabad office, due to personal reasons.

Regards,
Dipanshu.
//////////////////////////////////////////////////////

 

From: Samir Karande (Senior Technical Manager, Telecom Operations)

 

Subject: RE: Firewall test plan for review

 

Dipanshu – Very good job on ******* and that too while juggling priorities between ***** and *******.

Keep it up.

-samir

From: Shripad Agavekar (Technical Manager, Telecom Competency Center)

 

Subject: RE: Firewall test plan for review

 

Splendid job Richa, bang on target and more to follow. Please convey the message to Dipanshu, the engineer from ***** who contributed to the test scenarios working on part time basis. 

Best regards, 

–Shripad

From: Michael Bauer ( Sales Director Persistent Systems Inc.)

Subject: FW: Firewall test plan for review

Hi Richa and Shripad,

I wish to congratulate you on doing an outstanding job. I talked to George and his team informed him the test plan you sent was very good. Thank you for all of your efforts in making this client happy!

Regards,

Michael Bauer

From: George Tuvell (client *****)

Subject: Re: Firewall test plan for review

Richa,

The test plans look great. I just spoke with Michael Bauer and here is how we are moving forward:

**********************************************************************………

Thanks,

George

/////////////////////////////////////////////////

Employer

 

http://www.carmanpark.co.kr

 

Thank you for your good feasibility study report.

I think that you can follow-up this study more.

So I add my request for your report.

If any question , make e-mail or discuss in weekly meeting.

From Skyline Choi

 

/////////////////////////////////////////////////

Employer

 

Perot Systems 

 

Subject: Reg the bugtraq updates

Hi Dipanshu

Your bug comments and the way your updates on the bug are really good and upto great extend we value as great . Please keep up and by looking at your comments you are confident what you are doing and all your observation and the bug writing style resembles a true tester.

Amitabh – I have observed that he is the successful bug man of among the team

If you want to convince yourself please take some of his bugs and read

Regards 

Umamahesh 

Thanks a lot Dipanshu…

/////////////////////////////////

Wishing you all the very best, Dipanshu ….

 

It was great to have you as a colleague and the support extended by you towards the growth of Good account…!!!!

 

Please do not hesitate to get in touch with me should you need any kind of support from here…

 

Take care n enjoy life…

 

amitabh

 

//////////////////////////

 

Client

 

Good Technology 

 

Dipanshu –  

You are awesome!  Sorry to see you go, use me for a reference anytime.

So you are going to Microsoft, eh?

J

 – Jan

/////////////////////////////////

 

Hi Dipanshu, 

You are welcome.  Thanks for all the hard work you put in for the past year.  I wish you all the best in your future endeavors. 

Best,

Radhika

/////////////////////////////////

Others:

Abhay Mahajan [abhay.mahajan@samsung.com]

I specially wants thank you &  I deeply appreciate your photography.

 I happy  by ur prompt action of  giving generously to see ur  yahoo photo-Links from time to time.  Reamrkable , U   are  a very nice photogropher  &  moreover  generous in  giving us to see ur  Photographic artwork…!! ur really Great..!! I am really happy with you.!!

I am really soory that i could not give my timely appreicate words for ur excellent photo workdone ! due my busy offfice work schedule..

I hope you will forgive me for that..  

/////////////////////////////////

Hi dear Dipanshu…!!

Good morning..!!

 Just now i hv   seen all the photos . I am very much  happy to see ur ur photography  & your zeeel to see new touriest place.. Hats off..!! Great keep it..!!

 Nevertheless many  thanks for generously  making us avaible to us to see all ur photogrhapy Links ..  

This realy inspaires me to see all these places.

 Thaking you

Best regards

Abhay

/////////////////////////////////

Posted in Personal | Leave a comment