Scrum Program Iteration / PI Planning

Pi program iteration plan
Safelite m weeks. n groups. n*9+ people.
Dev opps documentation support dev business test teams architects participate.
m/2 sprint and 1 for learning
Objective
Risk
Dependwncy
Automation and story.
Project board
Program board – feature and risk depndency from each project to be delivered sprint wise.
One feature dependent on another feature frim other team

Consider trainings leave…
Buffer between dependency. Cooling period – learning

Find api having defect and automate
Bugs from previous sprints

Retro and confirmation of pi planning

Risk parking lot
Resolved
Accepted
Owned
Mitigated

Confidence vote. Fist of five at the end.
Dependency found should be discussed in detail

Retrospective
Feature Story grooming. Inspect and adapt. Time boxed. Business owners missing. Business numbers. Along with business values.
Demo. Critical view of last 10 weeks.

Actions listed
Readiness kanban

Posted in Computers and Internet | Leave a comment

Big data

Key areas for an architect to note on big data solution:

I have frequently came across developers coming and saying my code was working fine with smaller size of data. With 14 gb of data the script is failing on single or two node cluster where one table data size is in kbs while other table data size in gbs.

The key areas are use of

1. Decomposition techniques.

2. Task dependency graph and average degree of concurrency.

It is important for one to understand the cluster size available and the amount of data one wants to process and also the kind of join one wants to apply.

On the same cluster one may be able to process the smaller size of data but as the table records grow one is not able to process the data. In such case one need to apply the right decomposition technique. It can be recursive, data, exploratory or speculative data decomposition. Also data can be decomposed at the input level or intermidatery or output level. The key is to divide and conquer.

It could be a matrix multiplication where one knows the final output or the intermediate output accordingly the data decomposition technique applied will vary based on the size of data, cluster and the task dependency graph used.

One may multiply each cell in separate task and then combine the output of each cell in a row in a separate task.

The other person may do multiplication of cell and then addition in a single task.

In both case no task is dependent on each other. Putting these different ways of execution into task dependency graph and calculating the average degree of concurrency would help one to choose the right graph with given set of resources.

One may be able to get the output in single MR step for smaller data but may not with larger size of data. This would require one to do application profiling considering size of cluster, input, output and the above mentioned techniques used. One may learn the framework and implement but such expertise will come with experience and the size of data handled and growing data on daily basis.

/////////////////

https://www.youtube.com/watch?v=EB0HLwmbx9I

////////////////

http://www.socialsamosa.com/2014/03/social-media-analytics/

Aware:

One will collect data based on cookies what I surf on mobile, on desktop, when I am in public or when I am alone or with spouse/friend.

Accordingly demand side platforms working for advertisers will target those ads to the end user.

Activated:

Repeatedly looking at those ads due to inclination towards those things, once nerves gets activated towards it.

Addicted:

One gets some coupon / voucher from HR / training department which is not very big amount. The item which has got activated in the mind is also not very costly, the first thing one does is to start exploring things around this item and ready to spend another equal amount matching the voucher from own pocket and buys the item.

One may get addicted to it and would like to buy the same item again with all money from his/her own pocket.

Amplified:

The activated thought has got amplified.

///////

use linux to download data. put on hadoop. to extract. write pig script call UDF written in java. use patterns and matchers. sum up the data and put it in DB. Call services. show the numbers on browser.

///////

sentimental analysis: nlp – gate library. twitteR in R-studio.

http://www.datasciencecentral.com/profiles/blogs/one-page-r-a-survival-guide-to-data-science-with-r

///////

Posted in Computers and Internet | Tagged , , | Leave a comment

Living Vipassana

Living Vipassana

This blog is about inspiring people to continue their meditation practice. If you would like to contribute a post to this blog, send it to ryanshelton7@yahoo.com with your name and where you’re from and I’ll be happy to share it.

Posted in Uncategorized | Tagged | 2 Comments

Salasar Balaji, Mukundgarh, JhunJhunu, Navalgarh

Every Mansing(h)ka in his life time atleast after marriage or after having kid in first year or third year will go for jadula to Salasar Balaji an these other places.

 

The best route I felt while going in ac indica was first going to Salasar Balaji from Jaipur via Sikkar, then to Mukundgarh, then to JhunJhunu, stay over night at Rani Sati temple and next day morning on the way back to Jaipur visit Navalgarh.

 

The roads were best among India and was able to complete the trip in 24 hours with my 2 month kid and wife.

 

One will not find any problem in going to Salasar Balaji as its a well know place.

 

Mukundgarh has a "Pitro ki Bagichi" Mansingka’s. One should go to Mukundgarh village and not the Mukundgarh Mandi to reach the Mansingka’s Haveli. It is near to the fort and the Poddar’s Museum in Mukundgarh village. The relatives of Mansingka’s Mr. Murarilalji Murarka (01594-252315, 9784319378, Stationary shop on Gopinath Mandir Rd in Mukundgarh) has the keys of the Haveli. Haveli is opposite to the well which is well constructed. It is not a very famous place.

 

One comes across Laxmangarh while traveling from Salasar to Mukundgarh.

 

At Rani Sati temple there is a very big dharamshala to stay overnight and to get the evening meals one should reach before 9 pm. The rooms are available with double bed and coir mattress and common separate male / female toilets at the cost of 50 Rs. / free of cost.

 

At Navalgarh we have to visit "Dher ke Balaji" which is not a very famous temple. It is about 2 kms away from Navalgarh on Navaladi Road. One has to go there via Bawdi Gate in Navalgarh. Here also one will come across "Poddar’s Museum".

 

Jaipur to Sikar is about 110 kms. Sikar to Salasar is about 60 kms. Laxmangarh is about 35 kms from Salasar. Laxmangarh to Mukundgarh is about 25 kms. Mukundgarh to Jhunjhunu is about 26 kms. Jhunjhunu to Sikkar via Navalgarh is about 65 kms. And Sikkar to Jaipur is about 110 kms.

 

The travel we used was from Mr. Kapil (9414676303), driver – GulabSingh (9252086307). The total trip was about 510 kms. completed in 24 hours. Started at about 1 pm and reached back at 2 pm next day. The charges were about 6 Rs. per km for AC Indica.

Posted in Travel | 1 Comment

Application’s Performance over Embedded Devices

 

 

 

Application’s Performance over Embedded Devices  

  Dipanshu Mansingka, TBU

Persistent Systems Limited

 

Embedded Devices:

Embedded devices are the systems having hardware as per the requirement and perform few dedicated functionalities. Smartphone’s, Pocket PC’s are the embedded devices with operating systems and microprocessors. (http://en.wikipedia.org/wiki/Embedded_system)

Different Applications on embedded devices:

Sales Force Automation Tool (SFA)

In today’s world, pocket pc, palm devices and other similar devices are extensively used by Corporate as part of their Enterprise applications like Sales Force Automation Tools. The sales person accepts the order and issues invoices using devices, this data is synchronized to the server in real time, and therefore this data transfer has to be fast and secured. It allows the manufacturing plant to know the stock required at the given ware house on a given day. The sales person should be able to view his productivity based on volumes and amount, to meet the daily, weekly and monthly targets.

Here is the link on study of SFA for Procter & Gamble (http://www.ee.usyd.edu.au/~eief/PrizesInformation-PrizesForCommunicationSkills-3ThirdYear-Paper2002KimTran.htm)

Thermal and infra red image reporting to avoid disasters

Electrophysics Corp. have systems that capture the thermal and infra red images and send them across to mobile / embedded devices, along with the defect report mentioning the problems. Infrared cameras are used to find leakages on different surfaces. Thermal cameras are used to detect the overheating of the transformers etc. The performance of the system matters, as it has to analyze the pictures with high resolutions and report in time with great accuracy; else it will cause the damage to the transformer or the metallic surface in which leakage has to be detected. This metallic surface has to be of high quality if it has to be used in rocket launchers or in space.

Car navigation device

Some companies design the hardware for an embedded system using an operating system and ensure its compatibility with other hardware device which do not have any operating system. Like the hardware device designed for car navigation device using GPS system along with radio and TV antenna; and having wince operating system, was attached with the car music system having a touch screen of about 3” * 6”. (http://www.mozen.com, http://www.carmanpark.co.kr, http://www.carmanshop.com).

Email Synchronization

Persistent works for clients like Good Technology (www.good.com) and Seven Networks (www.seven.com) who develop products to synchronize Microsoft Exchange services, Dominos services and other ISP accounts on Smartphone’s, Pocket pc’s from different companies. Both, GPRS and CDMA devices, have to synchronize these services in real time. Think of the scenario where the user has kept his handset switched off while boarding the plane and when he disembarks from the airplane, he switches on the phone, and all the mails are synchronized on the device. The place where he has landed is a different circle or place where the mobile service provider do not have their own services and hence the user has to use some other service provider services for which extra charges are charged.

Improving Performance:

Problem 1:

For a sales force application designed for different devices, the performance issue comes with the server and all the devices having different database format. The pdb database on palm devices does not support relational database.

Solution

The records are to be in xml format separating the fields of record with special characters like ‘|’.  Both, at server and client end the data has to be converted and stored in the format supported, at server end it will depend on the database used. Since the devices will not support the relational database, design should support the search sort of records from different individual tables. Developer has to write a code to find the specific details from the table and then run the loop into the other table to get the required output to be displayed.

Problem 2:

Suppose there’s a GPS device fixed in your car which has different applications to play movies, songs, games, and TV and radio channels; and view pictures. This device can be operated using a remote control.

Picture this scenario: As you get into the car and start driving, you will switch on the device using the remote. As you drive you may try to shuffle between different applications, but by mistake instead of opening the application to play songs you open the movie application. You then try to get back to the song application. As you try to exit the movie application, it will not process the input until the whole list of movies on the storage card is displayed. Frustrating, is it not?

Solution

Use of right API’s while coding plays an important role for the application and device to give good performance. If one is using Windows CE the use of PeekMessage increases power efficiency. This document, highlights how the use of PeekMessage helps in improving the performance of a battery. http://mysearch.intel.com/corporate/default.aspx?culture=en-US&q=PeekMessage&searchsubmit.x=0&searchsubmit.y=0

Now, lets consider the above example of an application listing thousands of songs and movie clips. The Developer can make use of API’s like PeekMessage and check for new messages/events at certain intervals, while the whole list of songs are displayed.  Based on these new messages /events, the current processing of listing the songs / movies or any such objects can be terminated. This will allow the user to immediately switch from the current application to the new application.

Problem 3:

The car navigation system should be able to track the current position of the moving car with the accuracy of less than a meter distance. If there is a left, right or U turn ahead it should be able to direct the user well in advance. Also on such devices the UI (user interface) should be well designed.  It should not lead the user to too many forms or clicks before giving the final result. While the user is driving the car or travelling, it is not feasible to navigate through many clicks on the device. Mozen has car navigation devices with other facilities.  However, about 15 months back when I had viewed these simulators, I personally, did not take to the product as it involved too many clicks to get the final output.

Solution

A well designed UI which has less forms and user clicks to reach the desired output.

Problem 4:

If we consider the products developed by Seven Networks or Good Technology, if the user has to continuously have the channel to send and receive mails, GPRS connection will be used. To keep the connection alive based on the heart bit set, even if there is no email traffic, flowing packets will be sent across between the device and the IP gateway of the operations center via mobile service provider using GPRS. This is an extra overhead to the system.

Solution

The other way is of SMS Push. The email can be pushed as SMS by broadcasting. The SMS is received immediately by the device once it’s switched on after disembarkation from the plane.

Performance of the application and device is of utmost important on such mobile gadgets, than the number of functionalities provided. 

The other factors which affect the performance are

1.       The time taken on the touch screen to convert the touch into a message and give the required output on the screen

2.       Battery consumption should be less, which depends on how the hardware is designed and equally on the design and coding of applications, especially games.

3.       How fast the user is able to shuffle between the applications, between the different objects within the application.

4.       How efficiently the user is able to access to different applications at the same time, like listening to music in background and viewing pictures simultaneously.

5.       Applications stored and run from the SD card or the flash memory embedded into the device, also makes a huge difference.  If one uses the Windows CE operating system than the remote tools that are part of Platform Builder or eVC 4.0, the difference can be found and measured.

6.       It is equally important to decide what kind of processing your application requires. To be able to choose & decide the right processor, refer: The paragraph “Which is better?” on http://www.cs.umass.edu/~verts/cs32/endian.html.

7.       Memory Management: The embedded devices use flash memory that is costly. Also, it depends upon the memory pages supported by the processor selected. The operating system is customized based on the functionality provided. The Windows CE is customized using Platform Builder. Now Visual Studio 7.0 has a separate version along with Platform Builder and other remote tools to check the performance of the applications on the devices. If your car navigation device does not support internet browsing, the components can be removed from the operating system. The Persistent library in Pune has the book “Building Powerful Platforms with Windows CE”. The other books in the library are

CT_No

NAME

ATHR1

W-20

Building Poweful Platforms with Windows CE

James Y. Wilson

W-21

Windows CE 3.0 Application Programming

Nick Grattan

W-25

Programming Microsoft Windows CE

Douglas Boling

 

Based on my stay in Korea, I realized that in the developed countries such gadgets are very popular.  About 80 % of cars have GPS devices with above mentioned functionalities in their vehicles. Almost every youngster in the metro trains, are busy using such devices. Individuals are seen carrying devices other than the mobile phone which may be for playing games or have an IPTV or other such functionalities.  Why can’t the user have one device that will have both the functionality of mobile devices and also have games and a facility for IPTV, and at the same time, it gives the required performance at the competitive cost.

Embedded devices take input from touch screens and buttons as well. These inputs are sent to the operating system in the form of key code. The operating system converts the key code into the message / event and passes it on to the active application. In devices that display system’s home screen having buttons for multiple applications, the user can switch between the applications, the key codes are passed on to the home application that puts the message / event in the queue of the active application. The home application runs in the background. Home application determines which of the two applications can run, which application should get killed on the activation of other application.

Hardware:

So far we have discussed about the applications written for customized embedded devices using operating systems. Other than this, if one is designing and manufacturing hardware, the device manufacturers using Windows CE operating system have to perform tests using Windows Logo Test kit, that helps them to get their devices certified from Microsoft to get the required performance bench mark.  http://www.google.co.in/search?hl=en&q=Logo+Test+Kit+(LTK)+&meta

One of the leading mobile device manufacturer‘s study showed that, although their device has great features and UI, it does not succeed in the market due to the code which has a high battery.  So also with when writing game applications, care has to be taken to avoid high battery consumption. This becomes the major hurdle when selling the device. If you take the Nokia charger, any new device from Nokia can be charged using the same charger, while that of another manufacturers’ would require different chargers for different devices.

Reference: Blogs on http://dipanshumansingka.spaces.live.com

/////////////////////

http://www.howtoselectguides.com/dotnet/obfuscators/#dp_methods

////////////////////

Parameters to analyse the test automation tool

Commercial 
                 Commercial Stability
                 Market Share
Cost Constraints
                 Onetime cost
                 Ongoing Cost
                 Additional H/W
                 Additional S/W
                 Internal Cost
Quality Constraints
                 Shared License
                 Documentation Supplier
                 Help Online
                 Tool Integration with other product
                 Additional Skill level required
Training      
                 Free Training
                 Training Offshore
Tool Test    
                 Implementation
                 Construct Product model
                 Additional Scripting Required
                 Re-run test for compatibility
                 Integration test
                 Performance Measures
                 Data Driven test
                 Synchronization
                 Object Identification
          Support
 
//////////////////////

Posted in Computers and Internet | Leave a comment

Virus on Mobile devices

Family of Virus on Mobile devices.

 

Platforms: Symbian, Blackberry, Palm, WINCE, J2ME

 

File type: .sis, .mid, .prc, java midlet

 

Size: 3KB to 180 KB. Based on the list of virus information I have come across.

 

Types:

 

Trojan: trojan, is a piece of software which appears to perform a certain action but in fact performs another. http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29

 

Email worm:

 

A type of Worm that uses E-mail as its spreading vector.

 

Adware: http://en.wikipedia.org/wiki/Adware Some types of adware are also spyware and can be classified as privacy-invasive software.

 

A type of Advertising Display Software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as Tracking Technologies.

Some consumers may want to remove Adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.

On the other hand, some users may wish to keep particular adware programs if their presence subsidizes the cost of a desired product or service or if they provide advertising that is useful or desired, such as ads that are competitive or complementary to what the user is looking at or searching for.

 

Bluetooth worm:

 

A type of Worm that uses Bluetooth technology as its spreading vector. Bluetooth is a wireless communications technology.

See also Worm.

 

Different ways in which devices and systems are attacked:

 

  1. Overwrites the application.
  2. Hacking. Hack tools, send other Trojans using Bluetooth to other devices.
  3. Replace system font.
  4. Replace system and 3rd party applications.
  5. Replicate on other devices, using Bluetooth. See other devices using Bluetooth drains the battery. Also uses SMS / MMS for replication to other devices.
  6. Gets installed with other applications.
  7. Blocks the memory card.
  8. Localized to other languages.
  9. Disables applications like messaging, phonebook.
  10. Drops win32 worms on memory card.
  11. Disables 3rd party files managers.
  12. Corrupts uninstaller information.
  13. Pretend to be games application.
  14. Disables the auto startup of anti-virus applications.
  15. Sends phone and SMS messages to remote servers.
  16. Damage the application manager.
  17. Automate phishing via SMS.
  18. Lock the PDA, requires hard reset.
  19. On reboot disables all functionality except make / receive calls.
  20. Transfers application to desktop and installs toolbar for IE.
  21. Embeds itself into other .sis files, installable present on the device.
  22. Pretends to be a patch.
  23. Drops other virus along with itself.
  24. Pretend to be the cracked version of the email application.
  25. Displays random animation of graphics.
  26. Copy data into the text file and then send it to others over Bluetooth.
  27. Pretends to be a photoID program.
  28. Pretends to be a wap browser.
  29. Pretends to be a Macromedia flash player.
  30. Hides all the installed application. User cannot see them.
  31. Sends the IP address and starts communicating remotely.

http://www.eicar.org/anti_virus_test_file.htm


Important links:

 

http://www.smobilesystems.com/homepage/virus.jsp

 

http://en.wikipedia.org/wiki/Mobile_virus

 

http://www.f-secure.com/glossary/eng/malware-code-glossary.shtml

 

////////

 

How to hard reset different devices:

 

http://www.smobilesystems.com/homepage/reset_codes.jsp

 

////////

http://www.bizjournals.com/columbus/stories/2008/05/12/daily38.html

Posted in Computers and Internet | Leave a comment

Appreciation

Others about me

What others have to say about me clients, managers with employers, colleagues, friends in personal life and others.

 

Employer

http://www.persistent.co.in

————————————————————————————————————————————–

RE: thanks for the bonus.
Tue 1/10/2012 1:31 AM

Indeed!

XXX
VP, Infra Systems Engg.

Sent: Monday, January 09, 2012 11:05 AM
To: Mansingka, Dipanshu (CDS- Hyderabad); XXX
Subject: RE: thanks for the bonus.

Well deserved.
🙂

-XXXX
VP, Engg.

————————————————————————————————————————————–

RE: thanks for the bonus. we got it with october salary.
Wed 11/2/2011 5:54 AM
You’re welcome. You guys rock! And this bonus is just another way to say thank you for your valuable contributions.
XXXX
CTO
————————————————————————————————————————————————————————————
Sat 6/30/2012 12:41 AM
Thank You
All,
I would like to sincerely thank you for your you hard work and many successes for XXXXXXXXXXXXXXX.
When we added the additional staff for XXX, we knew it would be tough when the time came to scale back to our nominal numbers.
Now that we’re here, it’s even more bittersweet than I imagined.
Dipanshu has been here since nearly the beginning, and he and his leadership (and many shared words) will be dearly missed.
XXXXXX has similarly been with us on the QA side from very early on. Every bug she ever filed against me was correct (unfortunately).
XXXXXX, too has had quite a tenure. Every bug he ever field against me was actually a “feature”. J
XXXXXX – I’m sure will miss living inside our Config DB. Or maybe he won’t. J
XXXXXX, I know will be sorely disappointed to no longer work on our ever-changing position on OSI. J
XXXXXX – well I actually met Jagan. “Double One Five Oh”. Oh – it was a pleasure, XXXX. A double pleasure.
In a strange way – the high quality of your output contributed directly to the timely roll out of XXX, and the natural conclusion we are faced with now.
Basically I’m saying this is all your fault. 😉
I truly wish you all the best with your future accounts and endeavors. I’m sure you all have bright futures ahead for you. I would not be surprised if we collaborated again soon.
If you’d like to keep in touch outside of XXX – you can find me here: yyy@yyy.com
Best wishes,
XXXXX
XXXXXXXXXX
VP Engineering

Appreciation of my mentor-ship.

From: Santosh Prakash
Sent: 27 August 2010 09:46
To: Poosarla Gayatri; Swathi Gottimukkala; Dipanshu Mansingka; Hari
Kasturi
Cc: Paresh Deshmukh; Mitsu Chatrola; Priya Gadgil; Santosh Prakash;
Srikanth Ambeer; Suresh Gade; Teresa Sebastian; Santosh Prakash
Subject: RE: XXXXX Server: Release x.xx

Further I would like to
appreciate efforts put in by the Software Test Engineers team. They are
considering almost all the scenarios for each requirement and raising the
appropriate bugs.

They have learnt when to reject
the build, when to accept it, how to speak to the dev team and I got the
positive feedback from my team on the Testing efforts which is great
J

Santosh
Prakash | Senior Team Lead – Enterprise

email | Cell: +91- | Tel: +91-40-

Persistent
Systems
Ltd. | 20 Glorious Years | www.persistentsys.com

5-Jul-2010 04:05:58 PM

Hari Kasturi
Dipanshu helped us for click and Buy project. done exceptional test plan which is for review with the client.

Appreciation for conducting Blood Donation camp

From: Kishor Bhalerao
Sent: Tuesday, June 29, 2010 7:17 PM
To: Mahesh V; Manisha Tapaswi; Arpit Kulkarni; Dipanshu Mansingka
Subject: RE: Appreciation for conducting Blood Donation camp

Team,

Congrats…..!

Regards,

Kishor Bhalerao | Senior Vice President – HR |
Persistent Systems

Innovation in software product design, development and delivery www.persistentsys.com

From: Manisha Tapaswi
Sent: Tuesday, June 29, 2010 6:18 PM
To: Mahesh V; Dipanshu Mansingka
Cc: Kishor Bhalerao; Arpit Kulkarni; buhr
Subject: FW: Appreciation for conducting Blood Donation camp

Hi Mahesh / Dipanshu,

Great!! Good Job..

Keep it up… J

Regards,

Manisha Tapaswi |Sr. Manager –
Human Resources | Persistent Systems Limited

Persistent Systems – Innovation
in software product design, development and delivery –
www.persistentsys.com

RE: Blood Donor’s Day.
Jitendra Gokhale
Sent: Monday, June 14, 2010 2:20 PM
To:
Cc:
Attachments:

Good work team. Keep the Persistent flag high.

Regards,

Jitendra

RE: Appreciation for conducting Blood Donation camp
Arpit Kulkarni
Sent: Tuesday, June 29, 2010 4:42 PM
To:
Cc:
Attachments:
Great !!!

From: Mahesh V
Sent: Tuesday, June 29, 2010 4:41 PM
To: Kishor Bhalerao; Manisha Tapaswi; Arpit Kulkarni
Cc: Dipanshu Mansingka
Subject: Appreciation for conducting Blood Donation camp

Hi,

Hyderabad Persistent employees (PSL & PSSL)  accepting
memento from Chandra Babu Naidu’s spouse for conducting Blood Donation camp
regularly.

 Regards,

Mahesh V | Assistant Manager – Human
Resources
| Persistent Systems Limited

Innovation in software product design, development and delivery- www.persistentsys.com

////////////////////////////////////////////////////////

-----Original Message-----
From: Manisha Jadhav 
Sent: Wednesday, February 17, 2010 1:23 PM
To: Dipanshu Mansingka
Cc: Jitendra Gokhale; Sudhir Alekar
Subject: RE: Bio Asia. my feedback.

Hi Dipanshu,

Thank you for very much for your valuable contribution for not only attending event at short notice but also providing useful inputs which will definitely help us for promoting our life sciences & healthcare service offerings.

Regards,

Manisha Jadhav| Business Development Strategist| Persistent Systems Limited
8888888_888888888888@persistent.co.in | Cell: +91 88888-88888| Tel: +91 (20) 8888 8888
Persistent Systems - Innovation in software product design, development and delivery -  www.persistentsys.com

17th June 2009

Feedback from Developer at Persistent working on the product developed by Persistent on Blackberry; of which me and my subordinate are doing testing.

Dipanshu Mansingka [2:33 PM]: ok do let us know if we can be part of the team from hyd

Manikandan P [2:34 PM]: yeah sure,  you guys are doing great job in testing

Dipanshu Mansingka [2:35 PM]: thankyou

Manikandan P [2:35 PM]: I liked the report sent by Rajesh

 good one

Dipanshu Mansingka [2:35 PM]:

Manikandan P [2:35 PM]: Himmat also said, document is good

Dipanshu Mansingka [2:35 PM]: thankyou

_______________________________________________________________________________________________________________________________________________________________________________

From: Matt Fonck
Sent: Wednesday, May 13, 2009 10:40 PM
To: Dipanshu Mansingka
Subject: Re: Thankyou.

Thank YOU Dipanshu!   It was a pleasure for me to work with you, and I very much enjoyed and appreciated your support.

Warm regards,
– Matt

—– Original Message —–
From: “Dipanshu Mansingka”
To: “Matt Fonck”
Sent: Tuesday, May 12, 2009 11:00:56 PM GMT -08:00 US/Canada Pacific
Subject: Thankyou.

Hi Matt,

I had great time working with you.

It was good to see account growing, as we stated working on automation.

Now Pankaj is taking care of both manual and automation testing. Leela from now onwards will be reporting to Pankaj.

Thank you for everything and giving the opportunity to work with you and the team.

Thanks & Regards,

Dipanshu Mansingka | Sr. Team Lead – Mobile Device Practice | Persistent Systems Limited

Innovation in software product design, development and delivery –  www.persistentsys.com

From: Matt Senne [Client]
Sent: Thursday, January 22, 2009 8:52 PM
To: Dipanshu Mansingka
Cc: Jon Mutter;

Subject: Re: PointGuard does not block phone numbers with (+91) Country code.

Thanks for clearing that up! We aren’t able to do these tests here (Columbus, OH) and your methodical testing and clear results are extremely helpful, Dipanshu.-Matt Senne

From: Vishnuvardhan Papaiahgari [Client]
Sent: Tuesday, November 27, 2007 12:05 AM
To: Dipanshu Mansingka
Cc: Ajit Dongre, Rammohan MVB
Subject: RE: Thank you!!!

Hi Dipanshu,

It was great to have you in the team and I do appreciate your contribution to different projects. I wish you all the best.

Thanks,
Vishnu.


http://www.bizjournals.com/columbus/stories/2008/05/12/daily38.html

From: Dipanshu Mansingka
Sent: Monday, November 26, 2007 2:00 AM
To: Haroon Abdelrahman; Vishnuvardhan Papaiahgari
Cc: Ajit Dongre, Rammohan MVB
Subject: Thank you!!!

Hi Haroon and Vishnu,

I would like to thank you both of you for providing me the opportunity to work with XXXXX Team.
I have relocated to Hyderabad office, due to personal reasons.

Regards,
Dipanshu.
//////////////////////////////////////////////////////

 

From: Samir Karande (Senior Technical Manager, Telecom Operations)

 

Subject: RE: Firewall test plan for review

 

Dipanshu – Very good job on ******* and that too while juggling priorities between ***** and *******.

Keep it up.

-samir

From: Shripad Agavekar (Technical Manager, Telecom Competency Center)

 

Subject: RE: Firewall test plan for review

 

Splendid job Richa, bang on target and more to follow. Please convey the message to Dipanshu, the engineer from ***** who contributed to the test scenarios working on part time basis. 

Best regards, 

–Shripad

From: Michael Bauer ( Sales Director Persistent Systems Inc.)

Subject: FW: Firewall test plan for review

Hi Richa and Shripad,

I wish to congratulate you on doing an outstanding job. I talked to George and his team informed him the test plan you sent was very good. Thank you for all of your efforts in making this client happy!

Regards,

Michael Bauer

From: George Tuvell (client *****)

Subject: Re: Firewall test plan for review

Richa,

The test plans look great. I just spoke with Michael Bauer and here is how we are moving forward:

**********************************************************************………

Thanks,

George

/////////////////////////////////////////////////

Employer

 

http://www.carmanpark.co.kr

 

Thank you for your good feasibility study report.

I think that you can follow-up this study more.

So I add my request for your report.

If any question , make e-mail or discuss in weekly meeting.

From Skyline Choi

 

/////////////////////////////////////////////////

Employer

 

Perot Systems 

 

Subject: Reg the bugtraq updates

Hi Dipanshu

Your bug comments and the way your updates on the bug are really good and upto great extend we value as great . Please keep up and by looking at your comments you are confident what you are doing and all your observation and the bug writing style resembles a true tester.

Amitabh – I have observed that he is the successful bug man of among the team

If you want to convince yourself please take some of his bugs and read

Regards 

Umamahesh 

Thanks a lot Dipanshu…

/////////////////////////////////

Wishing you all the very best, Dipanshu ….

 

It was great to have you as a colleague and the support extended by you towards the growth of Good account…!!!!

 

Please do not hesitate to get in touch with me should you need any kind of support from here…

 

Take care n enjoy life…

 

amitabh

 

//////////////////////////

 

Client

 

Good Technology 

 

Dipanshu –  

You are awesome!  Sorry to see you go, use me for a reference anytime.

So you are going to Microsoft, eh?

J

 – Jan

/////////////////////////////////

 

Hi Dipanshu, 

You are welcome.  Thanks for all the hard work you put in for the past year.  I wish you all the best in your future endeavors. 

Best,

Radhika

/////////////////////////////////

Others:

Abhay Mahajan [abhay.mahajan@samsung.com]

I specially wants thank you &  I deeply appreciate your photography.

 I happy  by ur prompt action of  giving generously to see ur  yahoo photo-Links from time to time.  Reamrkable , U   are  a very nice photogropher  &  moreover  generous in  giving us to see ur  Photographic artwork…!! ur really Great..!! I am really happy with you.!!

I am really soory that i could not give my timely appreicate words for ur excellent photo workdone ! due my busy offfice work schedule..

I hope you will forgive me for that..  

/////////////////////////////////

Hi dear Dipanshu…!!

Good morning..!!

 Just now i hv   seen all the photos . I am very much  happy to see ur ur photography  & your zeeel to see new touriest place.. Hats off..!! Great keep it..!!

 Nevertheless many  thanks for generously  making us avaible to us to see all ur photogrhapy Links ..  

This realy inspaires me to see all these places.

 Thaking you

Best regards

Abhay

/////////////////////////////////

Posted in Personal | Leave a comment

Cyber Crime

It’s incomplete, but enough matter to get info. 
 

Cyber Crime:

 

Everyone has email accounts on different ISP like yahoo, gmail, hotmail, etc. Anyone can create fee accounts on these sites.

 

  1. Fake emails on Job Requirements. There are many companies who does not display there contact emails ids on website. People will create fake email ids using the domain name of these companies using above ISPs. Example. Say the company name is ABC Ltd. and there domain is www.abc.com . The people who want to cheat will create fake ids like abc@yahoo.com; abc@hotmail.com; etc. Since people in India are attracted to go to UK, Canada, USA they look for the company or hotel websites from such countries. The mail draft designed is such that it looks professional.
  2. Lotteries. Similarly there are mails from the ids using yahoo, saying yahoo has announced a lottery system or they will use other similar domains, where free email accounts can be created. When you reply to them they will say first deposit the money and then you will get the lottery.
  3. Transfer of funds. There are many mails which will have matter like I am so and so of so and so from so and so country. It will further have matter saying I want to transfer so many million dollars, give your bank account details, card details, etc.  Never reply to such mails and give your details.

 

The first option of job is the most tempting one and lot of people gets caught into this trap.

Posted in Computers and Internet | Leave a comment

Email replies, Korea, Solutions for Day to Day problems faced.

I really appreciate the prompt replies I get here from the concerned authorities: 
 
1. With respect to Subway in Seoul
Dear Mr.Dipanshu,

We are very sorry to hear your inconvenience.

Currently the section between Gupabal and Daehwa is managed by Seoul Metro and Korail, so I forwarded your complanint to those two corporations.

As for SMRT(Subway line no.5,6,7&8), you’ve send the complaint letter to, we also have the same kind of maps you’ve seen from Gupabal station.

I’m afraid we have information about the first and last train only in Korean, but try to add it in English in the future.

Regarding the train information, I would like to give you small tips.

1. When you look at the map from  any station, you will find the two lines of the

   time table which show the first and the last train.

   The upper one,the bigger letter means weekdays’ first and last

   train information, and the lower one,the smaller letter means

   weekends’ and holidays’.

2. According to train timetable, trains which run in Seoul area,

   are supposed to enter the designated destinations till 1:00

   AM during weekdays, and 12:00 AM for weekend and holidays.

   But for the  Korail area which runs between Seoul and Ilsan,

   Suwon, Incheon, Bundang, Uijeongbu city, the last train is 12:00

   Am for both Weekdays and  Weekend(holidays).

3. When you need urgent information using subway system, please call

  1330, the tourist information  service for foreigners. They also provide

   subway information.

I hope this will be help for you and please feel free to contact me 

for subway information.

Best regards,

Yeon-Hwa KIM(Ms)  

SMRT(Seoul Metropolitan Rapid Transit Corporation)
Dept. of International Affairs
180, Chunhodaero Seongdong-gu, Seoul, KOREA
Tel. 82-2-6311-2893
Fax. 82-2-6311-2644
Email. IREVER@smrt.co.kr
http://www.smrt.co.kr
////////////////////////////////////////////////////////////

Dear Sir / Madam,

I cannot speak Korean, so I am not calling the help line.

I am a foreigner and can speak English.

Please pass on the following message to the concerned authority:

///////////////////////////

Please discuss the following point and if found appropriate do the required corrections at the subway stations for the foreigners, who cannot read and understand Korean.

On every subway station on the map of subway in the bottom left hand corner there is time written for the first train and the last train going from the station in both the directions.

I had been following these timings on Saturday and Sunday also. Last Saturday and last to last Sunday at Gupabal station I had to face problem as these timings mentioned are not for Saturdays and Sundays. When I reached Gupabal, there was no train available for Dahewa, though I reached one hour before the timings mentioned on the map for the last train. There is no way to understand that those timings are for working days only.

At the station I did not find any other place where same has been mentioned in English. The time table of trains is not required, but the last train and first train for the weekends.

I use subway on weekend only, and considering these times mentioned on the map at the station I was planning by travels.

//////////////////////////

Thanks,

Dipanshu.

//////////////////////////

2. Use of T-Money Card in Bus

Dear Sir,

Yes, to be correct,
one has to tag in on boarding, and tag out at exiting.

While it is proper to tag in at the entrance and
tag out at the exit,
either one is OK.

I believe the driver was upset,
because for security reasons,
they don’t like people getting off at the front.

KSCC ?? ?? [kscc@t-money.co.kr]
/////////////////////////////////////////

Dear Sir,

On last Sunday I had used T-Money card in the bus for two times.

Do I have to punch the card both while entering into bus and while exiting from the bus.

For the first time I had punched card while getting in and did not punch the card while getting down, and got down after 3 stops.

For the second time late in the night while coming from Gupabal Station to Chongbalsan station, I had punched the card at the start and at the end also I punched the card to the machine, next to driver and not at the machine on the back side. Was it correct?

The driver wanted to say me something and was looking little angry, but he was not able to convey me as he did not know English and I do not understand Korean.

Thanks & Regards,

Dipanshu Mansingka,

///////////////////////////////////////////////////

3. Purchase and use of T-Money Card

Dear Sir,

On Saturday evening I have purchased this card from Jamsil station.

00000000 00000000  0000   2500won.

I am from India and do not understand Korean language.

Here are my queries

  1. The person took 12500won and gave card for 2500won. Please explain and clarify how it works.
  2. I am at Jeongbalsan, metro station 312. Which are the nearby places to Jeongbalsan to recharge the card. Please do let me know.

Can I create my login on the site and check my balance and usage.

Till now I have used at only following places and I feel more money has been deducted from my card.

1.      Saturday Evening Jamsil to Jeongbalsan(312)

2.      Sunday afternoon Jeongbalsan(312) to Geungjiongjeon Palace(327).

3.      Sunday Evening Geungjiongjeon Palace(327) to Jeongbalsan.(312)

Thanks & Regards,

Dipanshu Mansingka,

////////////////////////////////////

Dear Sir,

Thank you for your inquiry.

First of all, the card itself costs around 2,500 ~ 6,000 Won
depending on the model.
I believe you bought one which costs 2,500 Won.

The 10,000 Won must be the recharging value
that has been loaded into the card.
Since T-money is a pre-paid card,
you have to recharge it when the balance is low.

Regarding your 2nd question,
you can recharge it at the subway stations.
Simply show it to the officer working at the ticket booth,
and give him the money you want to be charged into your card.
Also, you can recharge it at convenience stores
with "T-money" logo attached at the windows.

As of present, our homepage doesn’t have the service for
checking the balance and usage.
But we are planning to have that service in the near future.

Thank you,
and best regards.
//////////////////////////////////

Thank you for the quick response.

If possible can you check and let me know, as per the details given below in my first mail, whether the right amount has got deducted for my traveling in subway or I did not used it properly and more amount got deducted.

What is the difference and benefit of different cards like 2500 to 6000 won range.

I cannot understand Korean language.

Thanks & Regards,

Dipanshu

//////////////////////////////////////////

Dear sir,
I have checked your usage, and here’s the answer.

From Jamsil to Jeongbalsan : 1,400 Won was deducted.
From Jeongbalsan to Geungijiongjeon Palace : 1,100 Won was deducted.

The public transportation fare in the Seoul Metropolitan Area is distance-based.
That is, up to 10 Km, only basic fare of 800 Won is deducted.
After 10 Km, additional 100 Won is deducted according to the total kilometers travelled.
So, the further you travel, the fare will be added.

Is it clear now?

We thank you for using T-money,
and we will try to upgrade our system so that
foreigners can easily understand and use the system.

The price of cards differ to the models.
We have diverse types of T-money,
such as plain card-typed one like the one you have purchased,
up to accessory types such as watches, bracelets, rings and more.

Thank you.
////////////////////////////////////////////

But my balance shown is less than 6400 won.

1400 + 1100 + 1100 is 3600.

10000 ? 3600 should be 6400.

Regards,

Dipanshu.

//////////////////////////////////////////////

Dear sir,
sorry for my late reply.

Attached file is the transaction file.
Please see it for any errors.

Best regards.
/////////////////////////////////////////////

4. Pension office

—- 원본메세지 —-
 보낸사람: Dipanshu [dipanshu@carmanpark.co.kr]
 받는사람: webadmin@nps4u.or.kr
 날 짜: 2006년 8월 1일(화) 12:41:57
 제 목: email address of Goyang office.

p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;margin-bottom:.0001pt;font-size:12.0pt;font-family:’Times New Roman’;}
span.EmailStyle17
{font-family:Arial;color:windowtext;}
@page Section1
{size:8.5in 11.0in;margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
{page:Section1;}

Dear Sir / Madam,

I do not understand Korean. Please provide me email address of Goyang office near Madu and Jeongbalsan.

Regards,

Dipanshu Mansingka,

/////////////////////////////////////

Thank you for your e-mail.

Goyang Regional Office
    Zip Code : 411-718
Address : 2nd, 5th Floors, KT PLAZA Bldg.(KT플라자 빌딩), 1010 Madu-dong, Ilsan-gu, Goyang City, Gyeonggi Province
Phone No. : 031)920-5420, 920-5430
Fax No. : 031)932-8891
How to get there : Get off at Madu Station of Subway Line No. 3 and take Exit No. 5.
(or Jeongbalsan Station of Subway Line No. 3 and take Exit No. 4).
Go straight about 300 meters to KT PLAZA

Posted in Travel | Leave a comment

Software Engineering

I will take the different projects which I did during my career and do kind of reverse engineering to see what different models or patterns those projects were following.
 
After recuritment at the campus in CDAC, the first project in my career on which I worked was on Palm OS 3.0 started in Dec. 2000 and went on for about an year. The project was to access desktop on a palm os device. At that time Palm use to provide service called as Palm Net ( i think the name is correct), using which the palm devices were able to communicate. The tool we used at that time was Code Warrior 5.0 and later 6.0. We first did it for black and white device and then later for the colored device. The project touched almost all the different features of the device which an engineer should know. Database, File Handling, TCP IP communication, bitmap compression and decompression, encryption and decryption, preferences settings, mapping the events from device to desktop, mapping the image on the device, use of RAS on the server, use of terminal services on the desktop to support multiple users, using the same desktop or server at one time from the device. The other advantage I had working for a small/middle level company was that I was directly put on the project and was working on it. In first six months I had learnt much more than my other batchmates who joined the bigger companies and were still going under formal trainings and had not experienced the live project. I feel that this project in a way was following the spiral modal. There are two reasons due to which I feel like this. One was we designed every thing and started development, the first thing we did was captured the complete bitmap of the desktop and sent to the device, and second we used database on palm to store the image which was slow to read and then display. Even if we were removing the bmp header and sending only raw data to device, still the size was large for the complete image, even after compression to PNG. Also lot of time was wasted in transfer of complete data after a single click as it use to change the whole desktop screen. We had to again redesign the few things, which affected the complete project. One thing we did was to implement the neighbouring algorithm to divide the desktop and second was to transfer only the relevant area of desktop. Secondly replaced database with file to store raw bitmap data on device.

Later I had another good project on palm os 4.0 version, the tool used was Code Warrior 9.0. I think the device from M series was m404. It was on a sales force automation tool. Here the client had provided the existing code and given access to there test database along with vpn username and password and one vpn pin card, which is generated at run time. Here we had to understand the complete logic, work flow, database design, form design, synchronisation over SSL, using xml files for transfer of data, etc., which was already existing. And then the design documents were given to add the new modules, along with creating, forms, database, etc. The design documents were having the details of forms, database, xml file format and business logic for the same. It was related to calculation of daily summary and monthly summary calculations of the sales person, volume vise, currency wise for each product and changes in business logic of few other modules was also required. Here in this project at the start it was kind of reverse engineering, where no documents were describing the flow of earlier modules. It had used the third party library for the forms and as there was no SSL support at the os level, it used the third party library for the same. We were two people working on the client side of this module and my other 4 colleagues on the server side of it which was in java. The other colleague helping me though senior to me had no experience on palm, he was from windows ce background. Here it took almost about a month or little more time to understand the current code and its style of writing, as there are less resources on palm, lot of resources were customised, like creating  a form with tabs and so on. Then it was not of much difficulty to implement the same, as the design documents provided by client had all the required major details, though at the time of implementation there were changes in business logic at times. In all it was a well designed application, where no changes were required in the current system to add the new modules.

As mentioned below in one of the paragraph that I had a chance to work independently for one of the company and for a volunteer organisation, it gave me enough confidence to take a free lancing project on palm os, I had one fresher to help me, we did this project for about an year on weekends. Here we tried to use the third party library PAF. We designed the generic forms and derived from a base class to give a look and feel of windows, like having title bar with form title and buttons along the title bar, like a tool bar button. It mostly involved the work around palm database and the forms. It was a relational database, though palm does not support it, we implemented it on the device. Initial two months I had hard time gaining my confidence to do the same, as I was alone doing it, then once it started going, I took help of this young guy, to replicate the forms and database for other tables and modules. We had given very minimum clicks on the form and it was very easy to jump from one form to another. On top of the form were the resources to edit and enter the new records. The bottom part displayed the old records. The user had facility to order/filter the list on the base of different columns.

After this I had a chance to work on a project to automate the tests carried out for a server client application. Where mobile devices are the clients and server is behind the ip gateway / sms gateway, along with exchange services. Here for stress testing mails, notes, meetings, and other exchange services had to be continously created and sent on the server from both desktop or device and synchronise on the device if sent from desktop using outlook or synchronise on the desktop if sent from the device. One had to note the time taken to complete the cycle in different circumstances. One had to find where it was taking more time, whether picking from exchange server by the application server or while sending by gateway to the device and similarly in the other direction with different settings of sms push or constant connectivity. For this on desktop we used xml to create config file, which had required test data. This was parsed and read by module using mapi/cdo to send the mails to the server. Similarly on the device we converted the data received into the xml format. Using usb communication the data was transferred to the desktop and compared. For palm os device, Treo 600 or 650, using version 5.0 os, there are 8 to 10 apis for usb communication which were used. The ui created on desktop was using mfc application, the xml parser used was one available on msdn. Later in other project I ported this parser to use it from the win ce device. All the methods exposed by interfaces on desktop are not available for device for writing the parser.

The second project which I did with the same company after this was on Natural Language Dialogue System. SinceI had never learnt Artificial Intelligence while studing at CDAC or in my engineering, also was never that good in grammer, it was really cool thing to work on. Few things I learnt were — 1. How will you implement the operation of web page resources using a remote control. The idea given was to divide the page diagonally into four parts. Then four buttons on remote up, down, right, left can be used to scroll into each of these areas. These areas can be further subdivided into small areas and note the position of currently focused resource. 2. Shank’s theory on NLP. In day to day life every one does not speaks grammatically correct language. If this is so, then how to make a dialogue system where human interacts verbally with machine. Whatever system you develop using NLP, it performs certain specific task related to a particular domain. Categorise your requirements into the domains. In general whatever human speaks has a noun and verb, main nouns, main verbs, conjunctions. Conjunctions plays an important role depending upon where they are used. The domain can be classified using noun or using verbs. example – Meeting, Mail. or send, receive, arrange, cancel. Consider the case where domains have been defined based on nouns like Meeting and Mail which uses Xchange services or Lotus note services. So the task for Mail domain, based on there verbs are send, receive, delete, etc. If one says "I want to send a mail", which is a correct sentence, but in practise one might say "I want to send mail", "I want send mail". One can build the tree by parsing this sentance around the verb "send". Once the domain is defined, the slots required to be filled for this domain can be defined. Some slots have to be explicitly questioned and get filled from the user of system and some can be implicitly done. Based on the slots required to be filled system will question the user and expect the input from the user. Like in above case, user has not mentioned to whom he wants to send a mail and what will be the subject of the mail or the body/text. Now here text and body are the sentences which does not require parsing. Whatever user says has to be accepted as said. Now look at the example on conjunction. User can say "I want to send a mail to Susheel and Vijay" or user can say "I want to arrange a meeting and also want to send a mail to Vijay". In first sentence "and" is used in the same domain to separate the two nouns, while in second case it separates the two tasks related to two different domains. In first case verb "send" will be at the root of the tree, while in second case conjunction "and" will be at the root of the tree. This project was kind of mix of spiral and fountain/downfall model. Initial part/phase was like a spiral model. Then once one domain was done, for other domain it was replicating it, so was like a fountain model, on one side you support the old system and at the same time on other side develop and add new things to it. The different components of it were database to store grammer and the set of sentences which system will ask randomly for each slot of domain to the user, if the slot is not filled. Conceptual anaylzer was the important component which was parsing the sentences using language grammer and ready made engines freely available on net. COM dlls using the dlls which was using MAPI to communicate with the exchange server. The system can be designed in such a way that it can be used for any language provided conceptual anaylzer is properly written. The database can be changed to store, the nouns, verbs, conjunctions, …. for different languages, which are used by conceptual analyzer to parse the sentence.

My third assignment was with a different company much bigger in size, it was totally a different experience. In small companies the processes are not so precisely followed, there are small teams, one gets a chance to take a glimpse of each and every thing happening in project design, development, testing, documentation, manuals, etc. In  bigger companies there are different groups and there tasks are precisely defined. There are many tools used to maintain builds, code, versioning, tools for testing like SILK. At that time it was one of the few companies in India using Silk. Later lot of companies tried to pull people from them. Silk has many components like Silk Radar, Silk Test, etc. My job was to do nothing but fix the bugs. One has to be smart enough to decide which bugs to fix and which to be deferred so that weekly bug fix count is maintained. If the application is very big its hard time for the new comer. It was about 40 MB application and about 20 different dlls used. The application supported two different OS with totally different kind of processors. At that time most of the code was in C, with each file having 1000’s of line of code. From that time the version under development, company was trying to port the code into C++. It is really hard time, if the lead gives you bugs from totally different modules to fix, it takes hell lot of time to understand such big modules and then to fix it. At the end of the day the productivity is measured by bug count fixed and not the severity, complexity of the bug. I had one priority three bug, which was almost like adding a new feature to the system. As I was new to the code, it almost took a month for me to just fix this bug, it was kind of modification to the library storing the templates of dtp software. The oject in library was not storing the position from where it was dragged and dropped. The feature had to be modified so that user can drag the object from library and it gets placed on those position on the paper. It seems so simple to do, when some one reads my last two line, but practically its quite different and when it has to be done for two machines with different os.

For about an year I also had a chance to work independently. Here I had to work for a back office of a shipping company and also worked along with it voluntarily for an organisation to make the database systems. During this period I made about 6-7 small different systems used internally by the different teams. It gave me a confidence to work independently. I alone had to do everything from design, documentation and coding. I used VB and access. It involved used of network, to display latest data in the form of tickers at the bottom of your pc. Also gave a fair idea of the shipping domain, also went through the training on shipping merchant’s guide. All of these projects were downfall model. For ticker I created one application with no UI on the server whose job was to query at particular time intervals and update the data for different regions. The other application client was installed on the pc’s of manager whose job was to read data at the server and display it on the desktop of managers. The other database applications involved using all the different security features of MS Access. Like normal users were not able to see the database, and were able to see only the forms. Also they were not able to edit or delete the records. Only administrator or there team manager was able to change the records. Also the productivity of the team mates was calculated based on it. Every user had id and password protection. The system use to make charts and graphs from the data and display it to the manager, which were used for weekly and monthly reports. Reports were calculated automatically for an individual or a team or a region. The system use to note the login time and log off time, of the user, to calculate his her productive time involved in a shift. There were other similar systems to create list of all the port agents across the globe and put the data on intranet. It also involved database related to military shipments, calculation of per deim, freight control, different tariffs.

Lastly I also had a chance to get hands on experience of working on .net using C# and till this project, my experience on database was limited and more on systems programming. But here the relational database of test results and tests was huge. It was independent work. My other colleague was given this work and after a month or so, same was handed over to me. I had a pressure of delievering it at the earliest, I had to do this sitting at the onsite office. Without going through any documents of requirements or deep understanding, with the help of other colleague there got the glimpse of how the system worked. The system had designed its own object model and did not allowed to access the data directly using msdn api’s. The query which I wrote was correct, in the format required by the model. It executed on live database on a holiday day of thanks giving, but on working day after that it did not work. The other colleagues verified it and said there is nothing wrong in it and it should work. After that I returned back and other colleague with good experience and understanding of this database and system, said that the query needs to be broken in parts for a particualr view of the table. The system did not allowed to access the table directly, one had to use views to access it. The same was applied and it start working. It was a good lesson for me to work on large RDBMS (relational database management system). Before this I had  worked on database using M-Access and MS-SQL for NLP project, which had limited size of tables and database and count of data was not this huge. This tool written was executed every day from command prompt with necessary input and was creating text log and also updating the other system. It was calculating the occurence of specific bugs from one system running the tests and updating the count of the same in the other system having records for each bugs.

Posted in Computers and Internet | Leave a comment