Leadership qualities

Some people claim that leadership qualities must be inborn and whoever got it are considered as the natural born leader and some other people claim that leadership qualities are nothing but skills acquired, learned, attained by training and experience hence these qualities can be achieved by anyone. Quite often, the word leader and manager are mixed up and used interchangeably. The matter of fact is that a leader may be a manager, but a manager is not necessarily a leader. Managers have subordinates; they administer the people who work for them while leaders, not necessarily managers have followers. Managers by their position or authority may expect the least commitment from their subordinates. Generally subordinates are driven by the desire to achieve the negotiated benefits with the least effort in contrast the managers expect from their subordinates maximum commitment. Prime ministers, presidents, kings, and queens are not leaders but representative authorities. Some famous leaders as the commander of army, strategist or a person with strong influence was Alexander the great, Mahatma Gandhi, Martin Luther King and so on, these people moved and led the mass by their charisma and skill set. Looking at these figures one might think that being a leader must mean being revolutionary. True leaders are the one, who connects, inspires, mobilize, who are close to their followers, and who are capable to express their visions in a tangible reach, because of these traits there is a high expectation of maximum benefit and change of circumstances therefore the follower are more devoted and committed for the sake of their own interests.   Leadership style Many powerful leaders...

Why many projects fail

As a certified prince of Persia, having the “Six Sigma” under the black belt and sitting on a throne of Pmbook yet many seemingly easy projects fail. Why are so many projects failing? Not exhausted but the three main reasons why projects fail are: Lack of understanding of the magical pyramid of time, cost, and scope Lack of real world experience, expertise comes from books Neglecting communication and opposing forces   Lack of understanding of the magical pyramid of time, cost, and scope Projects by definition have a beginning and an end (time); almost always have a limited budget (cost/ resources) and an almost intangible expected goal, quality (scope). The challenge is to deliver the highest quality in the shortest time for the lowest cost. It is safe to say that the majority of the projects fail on these three corners (time, cost and scope). On the first corner, the expected, quality, features, results or outcome can not be visualized or expressed in a clear and understandable way hence cause room for misinterpretation. Lack of imagination, vision and communication is the main challenge on this corner (scope). Underfinanced and over allocated resources compromise the given time, the scope or both of the projects on the second corner (cost). No project should be started without a secured cash flow unless you have a heavy hitting strategist on board. On the third corner (time), the required time is most often over or underestimated. Often the calculated or estimated amount of time needed for a project is based on ideal norms, theories but in reality it’s merely guess work. It would be ok...

Big Data, Big Challenges

The three challenges of “Big Data”, Performance, Intelligence and Communication. End Point Protection agents on 140,000 computers generate daily 60 Gigabytes of log files. Retrieving this data to a centralized storage for analysis purposes takes several hours and already has a small impact on the enterprise bandwidth. 2.7 million Users who access provided services generate 15 Gigabytes of log files in one hour and 360 Gigabyte every 24 hours. The perimeter defense cycles thousands of rules and in average 250 signatures for every single user session. This is only a fraction of Big Data, but it already comes with its challenges. The necessity to store huge amount of data are caused by mainly three different needs To meet the need of governance and become compliant with legal requirements. Statistical data analysis wich might lead to product or process improvements. Data as a new comodity for sale (in raw or refined form) to the highest bidder.   The Performance Challenge Approximately 50,000 call logs per second is just an average number of data created by a national Telco company. The present hardware is able to record and store this data. However, analyzing and enriching every single call log with additional information tells a story of one of many challenges. MIPS million instruction per second was the name of a CPU (computer) back in the day and it was fast. Nowadays MTPS million transaction per second is very common and just indicates how much data is processed in a second as background noise. In a finance sector where not only the throughput but also low latency is crucial, there are challenges...

Pattern matching

Back in the day, it was quite common to work with floppy disks as data storage. The first and foremost rule was to work only with a copy.  So the command on a DOS (Disk Operating System) “Diskcopy.exe A: B:” was used to make copies from disks to work with. However, the rule was difficult to apply when the disks came with copy protection which prevented making backup copies. Driven by the need of the market to make backups a company delivered solution software named “Copy II PC” which overcame this obstacle. Copy II PC was able to make backup copies from a copy protected disks in a way that was not feasible with Diskcopy or other copy software.   What was the alternative to get around of software restrictions Understanding the mechanism of disk based copy protection, the structure of an unformatted and formatted disk and logical characteristics. Using a debugger (debug.exe), one of the easier ways to analyze the logical structure of a disk, memory or written software. Comparing HEX by HEX the copy with the original disk to discover the differences.   Replicate the difference when it’s detected Sometimes the disk volume number, disk label name, entries on sector 0 (zero) or other sectors which are not generically readable were used to validate the software. Replicating any detected differences manually solved most of the time these issues. Sometimes however it was necessary to run a trace to see where in the code the validation runs. Disassembling and changing the key (validation pattern) to empty was one way another was to pipe the entire validation process to NOP (No...