Correlation between intelligence and ethics, nor is ruthlessness

There is no predictable correlation between intelligence and ethics, nor is ruthlessness necessarily an evil thing. And there is nothing like enforced, uninterrupted contemplation to learn to distinguish one from another….

— JAMES H. SCHMITZ

What is cloud computing? 

Cloud Computing Diagram
Cloud Computing Diagram

Cloud computing is a service driven model for enabling ubiquitous, convenient, on demand network access to a shared pool computing resources that can be rapidly provisioned and released with minimal administrative effort or service provider interaction.

Related References

Technical Debt

Technical Debt
Technical Debt

During the software engineering process, there are different issues which should be dealt with or else they will subject the project to unnecessary costs later. The technical debt perspective should be considered in each step of software development. For instance, when analyzing the cost of cloud approaches, you need to take into consideration the technical debt. You should as well factor the engineering aspect when making technical decisions such as choosing between cloud services vs. homegrown solutions.

What is technical debt?

Technical debt refers to the implied cost which will be incurred to do additional rework on a system after the engineering process is done. For example, engineers can choose to go for an easy option so that they can save time during the product design. The right steps which they will avoid will later need to be implemented which will mean a product has to be recalled or it will have to be fixed after it has reached the market which will cost more in terms of resources and manpower.

What are the most common types/causes technical debts?

Deliberate tech debt

In this case, engineers are aware of the step which is necessary during project implementation, but they will ignore it provided they can go for a shortcut which will save on cost and avail the product to the market. For instance, when analyzing the advantage of using the public cloud, some engineers may assume certain benefits, and later they will realize they are very necessary hence they are forced to go back and procure the system. It will lead to wastage in the company. Some engineers will not like doing the same process every now and then; they can avoid a given process only to expose the final product to flaws which will require re-engineering.

Accidental/outdated design tech debt

After designing a product or software, with time the technology will advance and render the design less effective in solving certain needs. For instance, due to advancement in technology, the tools you incorporated in a given software may end up being flawed which will make the product less effective which may necessitate re-engineering. Engineers may try their level best to come up with great designs, but advancement in technology can make their designs less effective.

Bit rot tech debt

It is a situation where a complexity develops over time. For example, a system or a component can develop unnecessary complexity due to different changes which have been incorporated over time. As engineers try to solve emerging needs, they can end up exposing the product to more complications which can be costly in the long run.

Strategies for minimizing technical debt

How to minimize deliberate tech debt

To avoid the tech debt, you need to track the backlog when engineers started the work. If you can track the backlog and identify areas where the engineers are trying to save time, you can avoid the debt.

Minimizing Accidental/outdated design tech debt

You need to refactor the subsystem every now and then so that you can identify the technical debt and fix it. For example, if the software is exposing you to unnecessary slowdowns, you need to fix the errors and make it meet industry standards.

Addressing Bit rot tech debt

Engineers should take time to understand the system they are running and clear any bad codes.

What Is Machine Learning?

Machine Learning
Machine Learning

Machine learning is Artificial Intelligence (AI) which enables a system to learn from data rather than through explicit programming.  Machine learning uses algorithms that iteratively learn from data to improve, describe data, and predict outcomes.  As the algorithms ingest training data to produce a more precise machine learning model. Once trained, the machine learning model, when provided data will generate predictions based on the data that taught the model.  Machine learning is a crucial ingredient for creating modern analytics models.

Professional Emails include a signature Block

eMail, Professional Emails include a signature Block
eMail

I encountered, what I will admit is a pet peeve today, which is why I’m writing this article.  I needed contact someone whom I correspond with regularly, but I have no reason to call or be called by them.  So, after checking my phone, went to their email thinking this would be a fast and easy way to gather the contact information.  Well, not true.  I did eventually gather the information and contact the person, but what a waste of time, which is time they are being billed for one way or another.

Example Signature Block

Ewing A. BusinessProfessional

Senior, Technical Generalist

Favinger Enterprises, Inc.

100 Spacious Sky, Ice Flats, AZ 85001

Phone: (800) 900-1000 | http://www.favingerentprises.com

 

Which email should have a signature block?

  • The signature block should be on every email (both initiated by you and replied to by you), this was true even before the days of remote work, but for remote workers, contingent works, and works who travel frequently it can be a productive enhancer.
  • Plus, it is simply the professional thing to do and saves everyone time and frustration. Not to mention it makes you look unprofessional not having one. do you really want to do that to your personal brand?
  • As if that were not enough, including your signature block is free advertising for you and the company you represent.
  • Additionally, most email accounts let you build one or more signature block, which can be embedded in your email.

Where to place your Signature Block?

  • The signature block should go at the bottom of your email. I still use the five lines below the last line of the body of the email to provide white space before the closing, as I learned when writing business letters decades ago.

What should be in a signature Block?

  • The signature block should be compact and informative and at a minimum should include:

The Closing

  • The closing is simply a polite way of saying I’m ending my message now. I usually go with the tried and true ‘Sincerely’, but others go with ‘Thank you’, ‘Best Regards’, or ‘Best Wishes,’. The main points, it should be short, polite, and professional.
  • This section should be followed by two lines

Your Name

  • This line is your professional name (First Name, Middle Initial, and Last name) and designations (Ph.D.…etc.)
  • This is your chance to say who you are and brand yourself to the reader, in a way which your email address cannot. Especially, when you consider that many of us don’t control what work email address is assigned to us.

Your Business Title

  • Including your business title provides some insight into your role and professional expertise.

Your Company Name

  • Much like your title, providing the Company Name and Address lets the reader know who you represent and, perhaps, more importantly, it is free advertising for the company.

Your Phone Numbers

  • Including your phone numbers, both office and cell (if different) enable people to quickly reach out to you if they need or want to. Not everybody keeps all their infrequent business contacts in the phone directory.
  • Putting your phone numbers on your signature block, also, enable the potential caller to verify that the numbers which they may have are still correct.

There are other items are sometimes included, such as:

  • A company logo to enhance the appearance and quality of a signature block
  • The Company’s website to help customer find out more about the company and to direct business to the company
  • The senders email to reinforce the email address in the header of the email.

However, the guidance provided above will make you look a lot more professional in a hurry if you have not been including a signature block in your emails.

Printable PDF Version of This Article

My Most Used Windows 10 Keyboard Shortcuts

Shortcut Keystrokes
Shortcut Keystrokes

While there are a great number of useful windows 10 shortcuts, I have the list below the combination, which I use daily.  Many of the shortcuts can be used across multiple applications (e.g. Notepad++, MS Word, SQL Server, Aginity, etc.) and save a considerable amount of mouse work.  Overall, these shortcut keys are more efficient and faster than using the mouse to perform the same task on a repetitive basis.

You may want to investigate the numerous other Windows 10 shortcuts keys, which best apply to your daily activities, but these are the ones, which I have found most useful and which I have committed to memory.

Table of My Most Used Windows Shortcuts

Key
Strokes

Behavior

Alt
+ Tab

Switch
between open apps

Ctrl
+ A

Select
all items in a document or window

Ctrl
+ Alt + Tab

Use
the arrow keys to switch between all open apps

Ctrl
+ C

Copy
the selected item

Ctrl
+ D

Delete
the selected item and move it to the Recycle Bin

Ctrl
+ F

Select
the search box

Ctrl
+ V

Paste
the selected item

Ctrl
+ X

Cut
the selected item

Esc

Stop
or leave the current task

F5

Refresh
the active window

F11

Maximize
Window

Related References

 Microsoft > Windows Support > Keyboard shortcuts in Windows