Skip to main content

The three stages of a tech career

  • Stage one - You don’t know much
    You are in awe of all the other techs. You make a lot of dumb mistakes. You feel like you are swamped all the time. You have to read a lot before you dare try anything for fear of breaking something. Everybody dumps on you because you are the new kid. Things take longer for you to accomplish. You work a lot of overtime, often without pay. You don’t get paid a lot. You wonder if you’ll ever get a break. You realize that school didn’t quite prepare you for the real world. Work hard. You’ll make it.
  • Stage two - You know a lot of stuff
    You’re good and you know it. So does everyone else around you. They can see that you are good. You don’t have to tell them. Things get done quickly. You even amaze yourself sometimes. You are valuable and can command a good salary. The managers and business owners want to keep you on board. They want you to be happy and offer perks to entice you to stay. You get calls from headhunters all the time. It is very flattering and a nice position to be in. Life is good. Enjoy it while it lasts.
  • Stage three - You don’t know much again
    Technology is passing you by. The young techs seem to know so much more than you. It takes longer to figure things out again. You are probably in a position where you can delegate so you do. You are most likely in a management role and spend more time with people issues than tech issues. You are looked on as wise and experienced. You seek input from other techs before making big decisions. It’s not a big deal that you don’t know all the details anymore. You’ve got the big picture. Let others work out the details.

Ref: Techrepublic.com

Comments

Luke Clifford said…
It's sooo true!

made me laugh.
good blog. :)

Popular posts from this blog

Dhivehi to English translation with Microsoft translator

  The Dhivehi language translation feature included in Microsoft translator and Microsoft 365 lets you press a button and translate written Dhivehi into English. Though there are a few hiccups here and there, the service is great and provides an understanding of the overall document. This is more than what we see from any existing models. I was amazed to see a link in one of my outlook web emails, it says “translate message to: English” which could mean nothing usually, however, when I saw the next sentence which said “Never translate from: Divehi”, I thought why would it says Divehi specifically if it doesn’t understand that the entire email was written in Dhivehi? Out of curiosity, I pressed the button, and to my surprise, it was quite good. The essence of the message was retained very well. For example, something like އިޙްތިރާމް ޤަބޫލުކުރެއްވުން އެދެން could be translated as “ I would like to respect you ”, which is ok in terms of translation, but what it meant was greeti...

Why when shared, Windows XP cannot communicate with winodws Vista in the Same Local network?

Network Map in Microsoft® Windows Vista™ diagrams the connections between network devices to help you troubleshoot connectivity problems. Network Map uses a discovery protocol called Link-Layer Topology Discovery (LLTD) in order to query the other devices on the network to determine how the network is organized. Computers running Windows Vista include the software components that implement the LLTD protocol. For other devices on the network to be placed on the map, they must have a discovery protocol enabled that can respond to the mapping computer's requests. This means in order to communicate windows Xp with Windows Vista we need to install a Portocol known as LLTD from microsoft website, unfortunately only licensed versions of widnows XP can download and install this protocol from microsoft website? "Too bad, Our poor, pirated copy users have to face the dificulties.... " but why most of the asians always use pirated copies of any software they USE? But if u crack wind...

Why Understanding Your Risks is Your Best Cyber Defence

  In today's digital age, headlines blare about "unprecedented data breaches" and "nation-state cyberattacks." It's easy to feel overwhelmed by the ever-evolving cyber threat landscape, where sophisticated zero-day exploits can bypass even the most fortified defences. But amidst this complexity, a fundamental truth remains: effective cybersecurity starts with understanding your risks. As Bruce Schneier stated, "Security is not a product, but a process." Just as a military commander wouldn't enter battle without understanding the terrain and potential threats, organizations must grasp the digital landscape in which they operate. Imagine a battlefield shrouded in thick fog. You wouldn't blindly charge ahead, would you? Risk assessment is akin to possessing a high-powered thermal sight, piercing the fog to reveal the hidden dangers lurking in the digital landscape. It's a systematic process of identifying your organization's critical a...