Skip to main content

We are messed up!

Still it’s not too late to start organizing!

Forming a company is no child’s play. It is hard work. Things won’t work unless we make them work. Now we are facing a real challenge, the challenge of organizing the challenge of working together. We need to find ways that we can contribute. It doesn’t have to be always the hard way. There are various ways in which we can contribute, our company needs our help. We are really messed up. But still it’s not too late to start organizing.

Ever wonder why we are lagging behind? Why we can’t organize? Why we are confused? Sure there are many reasons. But one thing is lack of commitment and guidance. There are people who can work but they are waiting for some guidelines. They need someone to tell them what to do, otherwise they can’t work. It is true, not everyone can think of their own and start working when leadership positions are being filled. So why we are falling back? So why we are messing the whole thing?

One reason is we don’t have enough time. The second reason is we are not been told what to do because we don’t have a plan. It is very surprising when these days someone comes to the class and attempt drawing Gantt charts with white board and a maker. Isn’t it? We have all the software tools that can be used in order to do that. Why can’t we do it at our own peace and email it to others? Aren’t we the IT guys? Aren’t we the final year computing students?
We have been given everything in advance and all we have to do is work out that in advance before coming to the class, so that we can tell the other members what to be done. We have no time for voting, and we have no time to play democracy here. Unless we make things in advance we will not be able to catch with this company thing!

We have all got email adds, so we all can communicate using email. Everyone can be informed before coming to the class what is required of them, because we all know it in advance, we have been given the CDs, etc, etc.

Come on people! Let’s do it because we can really do it! We have the quality and the guts, all we need is little bit of planning in advance! We are the IT guys; we should be smarter than this! Don’t mess it up! Let’s work together as a team giving as much as we can, surely we have no time!

Comments

Popular posts from this blog

Dhivehi to English translation with Microsoft translator

  The Dhivehi language translation feature included in Microsoft translator and Microsoft 365 lets you press a button and translate written Dhivehi into English. Though there are a few hiccups here and there, the service is great and provides an understanding of the overall document. This is more than what we see from any existing models. I was amazed to see a link in one of my outlook web emails, it says “translate message to: English” which could mean nothing usually, however, when I saw the next sentence which said “Never translate from: Divehi”, I thought why would it says Divehi specifically if it doesn’t understand that the entire email was written in Dhivehi? Out of curiosity, I pressed the button, and to my surprise, it was quite good. The essence of the message was retained very well. For example, something like އިޙްތިރާމް ޤަބޫލުކުރެއްވުން އެދެން could be translated as “ I would like to respect you ”, which is ok in terms of translation, but what it meant was greeti...

Fortifying Cybersecurity: A NIST CSF Perspective on Zero Trust and Passkeys

Cybersecurity is like protecting a fortress from invaders. Traditionally, we built strong walls around our castle, trusting those inside and keeping potential threats outside. But in today's digital world, threats can come from within and outside, making traditional defences inadequate. This is where the concept of zero trust comes in. What is Zero Trust? Imagine your home. You don't blindly trust everyone who walks in, right? You might ask for identification or make sure they have a reason to be there. Zero trust is similar. It means not automatically trusting anyone or anything trying to access your digital "home" (like your network or data). Instead, it's about constantly verifying and monitoring every access attempt, regardless of where it comes from. Why Zero Trust Matters: Zero trust addresses three key goals in cybersecurity, often called the CIA triad: Confidentiality : Just like you wouldn't want strangers snooping through your person...

Why Understanding Your Risks is Your Best Cyber Defence

  In today's digital age, headlines blare about "unprecedented data breaches" and "nation-state cyberattacks." It's easy to feel overwhelmed by the ever-evolving cyber threat landscape, where sophisticated zero-day exploits can bypass even the most fortified defences. But amidst this complexity, a fundamental truth remains: effective cybersecurity starts with understanding your risks. As Bruce Schneier stated, "Security is not a product, but a process." Just as a military commander wouldn't enter battle without understanding the terrain and potential threats, organizations must grasp the digital landscape in which they operate. Imagine a battlefield shrouded in thick fog. You wouldn't blindly charge ahead, would you? Risk assessment is akin to possessing a high-powered thermal sight, piercing the fog to reveal the hidden dangers lurking in the digital landscape. It's a systematic process of identifying your organization's critical a...