Its been a busy June with no time to pen down an article. I have been busy swimming- incorporating an activity which was an integral part of daily routine in my youth. Before I continue, for those who want the details on choosing a proper swimsuit please skip straight to the paragraph starting with: proper swimsuits, as I am going to ramble on with some background before getting to the point… thank you! Continue reading
Some of us are familiar with the children’s game- run run fire on the mountain. The above picture is for real- while I was travelling back home from work the other day. Smoke was filling the sky, but was not accompanied by any apparent shouts or screams or the siren of the emergency service teams. I parked my car to one side and waited for a while, listening for more signs of distress; but there were none. I could neither wait for long nor help in any tangible way, as my toddler was travelling with me in the car and his safety took preference over this road-side situation.
However, alongwith sharing this picture, I would like to raise awareness on what to dos and not to dos during an emergency situation. Continue reading
The recent ransomware attack has happened. And I take this as a subject of my post; not to highlight its importance but to use it to demonstrate that when basic steps are taken, data can be kept safe.
Lets understand this further:
Introduction to computer virus-
Wikipedia describes it thus-A computer virus is a type of malicious software program (“malware”) that, when executed, replicates by reproducing itself (copying its own source code) by infecting other computer programs by modifying them. Infecting computer programs can include as well, data files, or the “boot” sector of the hard drive. When this replication succeeds, the affected areas are then said to be “infected” with a computer virus.
I took an online course on studying Introduction to Cyber Security through futurelearn.com– very informative. As part of this course, I received a threatsaurus by Sophos. This is an A-Z of computer and data security threats in easy to understand language. You can read more on their website. Continue reading
Yes, yes, I know- huh! Is what I thought too. But let’s rewind to the beginning..
With my child reaching school-going age, the school hunt has begun. My checklist includes- Which school, distance from home, syllabus, extracurricular activities, sports, school meals, uniform, transport- to name a few parameters!
This particular school situated at Karvenagar has great reviews, CBSE curriculum, nutritious meals- suffice to say, it weighed high on my preferred school list. So, next step was to ensure we get the admission form. Which meant twice-weekly follow up on the school website. This fortunately, led to success and we were able to submit our application. What does this application comprise, you might wonder? Well- Parent details, address details, religion, caste, extracurricular activities of interest and an additional form which parents are urged to fill- Why do you want to send your child to school? I assumed a well-written, witty yet realistic paragraph would earn brownie points. Hence I swallowed any duh’s I had, finalized a draft and then wrote a few paragraphs in cursive handwriting.
I had the great opportunity to work on a handful of migration projects for the Public sector account I was part of. This was an offshore-onshore collaboration. Yes, there are pros & cons- jobs taken away from locals, offshoring to staff that is poorly trained, ROI questioned and what’s the credibility of such an organisation, yada yada yada- which is a whole different debate.
My article is about a totally different aspect- so I shall continue, with due respect to the incomplete debate in the above paragraph please. Continue reading