Monthly Archives: February 2015
Sri Lanka’s new Foreign Minister Mangala Samaraweera said on Saturday in Beijing that the new government in Colombo will not allow a repeat of last year’s visits by a Chinese submarine that had raised concerns in India.
Asked following his two-day visit to Beijing if the new Colombo government would, as ousted President Mahinda Rajapaksa had done, allow Chinese submarines access to Sri Lankan ports, Samaraweera said, “I really don’t know under which sort of circumstances that led to some submarines.. to the port of Colombo on the very day the Japanese Prime Minister was visiting Sri Lanka. But we will ensure that such incidents, from whatever quarter, do not happen during our tenure.”
Samaraweera held talks with Chinese Premier Li Keqiang and Foreign Minister Wang Yi during his visit.
The focus of his talks was to lay the groundwork for new Sri Lankan President Maithripala Sirisena visit to China starting March 26 – his second overseas tour following his February visit to India.
Samaraweera said the new government would bring Sri Lanka’s foreign policy “back to the centre” and make it more balanced, but rejected suggestions that this meant diluting the close ties Rajapaksa built with China.
“Back to the centre I don’t think has any bearing on Sri Lanka China relations. It will remain as they were, and we will try to strengthen relations with China further in terms of rest of the world”.
On Saturday, Sri Lanka discussed with China’s Commerce Minister Gao Hucheng the Chinese government’s new Maritime Silk Road initiative. Foreign Minister Wang Yi said China was interested in port development, maritime cooperation and search and rescue cooperation with Sri Lanka.
Samaraweera said Sri Lanka was waiting for the Silk Road plan’s blueprint to be released by China, but was open to working with China on the project.
“In the context of the 21st century maritime road we are looking at it, discussing about it and especially in areas which are economically beneficial to Sri Lanka we will certainly cooperate with the concept.”
China emerged as Sri Lanka’s biggest source of financial aid during the Rajapaksa years. Chinese loans have amounted to as much as $ 5 billion.
Samaraweera acknowledged there were concerns about the interest rate payments owed to China, which emerged as an election issue.
“We do have some concerns. In fact, the Minister of Finance and senior officials of the Finance Ministry are studying this matter at the moment and I believe there will be a very high level delegation from the Ministry of Finance and policy planning who will come to China immediately after the President’s visit to discuss these loans”.
The new government is also reviewing a $ 1.5 billion Colombo Port City project undertaken by a Chinese firm on account of environmental concerns.
Samaraweera assured China that the report of the review would first be shared with China which would be consulted before any final decisions were made.
Most people think it’s difficult – or even impossible – to determine how well they’re performing during a job interview. But if you look closely, the hiring manager’s body language and subtle cues will probably tell you exactly how they feel about you as a candidate.
“It behooves you to read between the lines and gauge the interviewer’s actions and responses, so you can shift your approach, presentation style, or better clarify your answers,” says Lynn Taylor, a national workplace expert and the author of “Tame Your Terrible Office Tyrant: How to Manage Childish Boss Behavior and Thrive in Your Job.”
For example, you can take note of what appeals most to the hiring manager about your background and what triggers a yawn, such as long-winded answers – and take a different direction. “Other times the fit just isn’t there, or you had an off day. In the worst-case scenario, by looking for subtle cues, you’ll be better prepared at the next job interview,” she says.
If you detect any signs that the interview is going horribly, it’s important to maintain your confidence and a positive attitude, no matter how discouraged you may be.
“The hiring manager may just be distracted for other reasons or could be having a bad day,” Taylor says. “So don’t give up and shut down.”
Here are 15 telltale signs the interview may not end with a job offer:
1. The hiring manager doesn’t maintain eye contact.
If you feel like saying, “Hey … I’m over here!” as your interviewer seems to be looking everywhere but at you, that’s not always a great sign. “Gauge what is going on and whether and how you can improve the situation,” Taylor says. “Maybe you need to take up the energy level a notch, or perhaps you should find a way to connect with the interviewer on a more personal level.”
2. They display negative body language.
If the interviewer is crossing their arms, leaning away from you, or looking at the door, it could mean they aren’t impressed or interested.
“This is a good time for you to lean forward with enthusiasm as you speak; it’s likely to get attention and exude confidence,” says Taylor.
3. They seem distracted.
If the hiring manager is texting or checking email, surfing the web on his or her computer, or walking around the room as you speak, this is never a good thing.
“Try to make your presentation and dialog more engaging,” says Taylor. Then ask yourself, “Would I really want to work for someone who is this distracted?”
4. They cut the interview short.
If the interview comes to an abrupt end, just minutes after entering the room, you probably aren’t going to get the job. Of course there may be a special circumstance, like an emergency – but if the hiring manager wraps things up quickly and doesn’t explain or apologize, that’s not a great sign.
“You can’t ask for more time, but you should thank the interviewer for his time and remain poised,” says Taylor.
5. They don’t smile, ever.
“Maybe this is just their personality – but if you noticed the hiring manager laughing and smiling prior to entering the interview room, and then they suddenly look like their cat just died, it could mean they’re simply not excited by you as a candidate,” Taylor explains.
“If you feel daring, try a few lighthearted comments. And if that doesn’t work, consider whether this is just the tip of a very chilly iceberg. You might want to run for the hills while you can, anyway,” she says.
6. They go on the offensive.
When you feel like you’re playing a battle of the wits, as the hiring manager tries repeatedly to put you in the hot seat, this isn’t great. “Don’t play the game and challenge back. Remain calm and determine if this is an aberration in the discussion – or the sign of a merciless tyrant,” says Taylor.
7. They pause often as they try to think of the next question.
“Sometimes in a bad interview, it seems like it takes five minutes for the hiring manager to come up with the next question,” she says. “This happens because hiring managers don’t always know how to handle their lack of interest.” You don’t have to be reactive, however. This is your opportunity to take the floor and ask questions.
8. They don’t listen carefully to your answers or ask pertinent follow up questions.
If you feel like you’re speaking to a wall, try a different tack, such as asking for their opinion on the topic: “How do you structure your team for those kinds of projects?” Once you get the interviewer talking, they’re more likely to perk up, Taylor says.
9. The interviewer mentions there are other qualified candidates in the running.
“This is a warning of sorts so you’re not too let down later,” she explains. Remain undeterred; as long as you’re in the interview, you still have a shot.
10. It seems as if they’re reading your resume for the first time.
It’s possible that a hectic day is at fault and your interviewer wants to be thoughtful about his questions, but if they seem somewhat clueless about your background, or detached, you can assume the interest level is dwindling.
11. There’s little discussion or enthusiasm about your skills, accomplishments, or goals.
This one may seem obvious – but it’s worth mentioning, says Taylor. “When this happens, ask about what would define success for them in the job and at the company.”
12. The conversation doesn’t flow, and there are lots of pauses or interruptions as you try to respond.
“Chemistry is measurable … by your gut,” says Taylor. “You know when the conversation flows and you have a feeling of camaraderie and when you don’t. Don’t discount your own emotional intelligence or how you physically feel during the interview.”
13. They don’t mention ‘next steps’ or ask about your availability.
“If you’re not introduced to other managers or the interviewer fails to show interest in moving forward, you can be proactive,” she says. For instance, if you feel like you still have a shot at the job, you can always say: “I’m very interested in the position; what would be the next step?” It’s at least another data point on where you stand.
14. You get the limp handshake.
If on your way in the interviewer had a nice, firm handshake, and then on your way out you get a “cold fish handshake,” which seems obligatory at best, you probably won’t be getting an offer.
But, still be firm with yours and smile, regardless, Taylor suggests.
15. You’re asked to follow up with an assistant.
“This may be a sign that the hiring manager doesn’t want to spend further time evaluating you for the position, unless the follow up is about a second interview,” she says.
“By taking careful note of job interviewer indicators, you can shift your approach and take action in the moment, when it counts the most,” Taylor adds. “Also remember that just because you didn’t feel you performed well doesn’t mean you lost out. The job interview is also your opportunity to vet the prospective boss and company, so remain objective.”
COLOMBO: Shaken by the successful rally staged by pro-Mahinda Rajapaksa elements at Nugegoda on February 18, Sri Lankan President Maithripala Sirisena and Prime Minister Ranil Wickremesinghe are girding up their loins to face a perceived threat from the former President in the June parliamentary elections.
Alarmed by the fact that some MPs of his Sri Lanka Freedom Party (SLFP) had attended the rally, Sirisena called a meeting of party MPs and reprimanded those who attended the rally and the leaders who allowed party men to attend it.
To keep his flock of MPs from fleeing to Rajapaksa’s camp and also to attract MPs and others from the opposite side, Sirisena proposed the formation of a National Government or an enlarged multi-party government. News reports on the meeting did not say whether the MPs were in agreement with Sirisena on this question, but the President’s Office put out a statement saying the MPs had agreed to a National Government.
Later, Health Minister Rajitha Senaratne said that in the proposed National Government, the size of the cabinet will be expanded from 27 to 45, and the number of non-cabinet ministers will go up by 55 (presently non-cabinet ministers number only 17). The poll promise of downsizing the council of Ministers has been sacrificed at the altar of political expediency.
In a recent interview to New York Times, Prime Minister Wickremesinghe revealed that Sirisena does not intend to give Rajapaksa an SLFP ticket to fight the parliamentary election, though the former President is a “Patron” of the party.
Reacting to a barb from the Rajapaksa camp that Wickremesinghe and his United National Party (UNP) have no right to be in the government when the UNP has only 49 MPs in a House of 225, Wickremesinghe has pointed out that Sirisena won the Presidential election in alliance with the UNP, along with a public pledge to make him PM.
The Sirisena-Wickremesinghe group also thinks that early parliamentary polls will be to its advantage. Hence the decision to go for mid-term polls in June, although parliament has one more year to go.
When the FBI sabotages the efforts of consumers and businesses to secure their data through encryption, the agency is essentially attacking the security foundations of the online world created over the past 20 years. (Youtube photo) As Google’s Android smartphone operating system was coming under attack in fall 2012 from malware with the colorful names of “Loozfon” and “FinFisher,” the FBI’s Internet Crime Complaint Center issued an alert to help defend against the threat. “Depending on the type of phone,” the FBI said, “the operating system may have encryption available. This can be used to protect the user’s personal data.”
How times have changed.
Last fall, when Apple and Google announced they were cleaning up their operating systems to ensure that their users’ information was encrypted to prevent hacking and potential data loss, FBI Director James Comey attacked both companies. He claimed the encryption would cause the users to “place themselves above the law.”
The tech community fired back. “The only actions that have undermined the rule of law,” Ken Gude wrote in “Wired,” “are the government’s deceptive and secret mass-surveillance programs.”
The battle resumed in February 2015. Michael Steinbach, FBI assistant director for counterterrorism, said it is “irresponsible” for companies like Google and Apple to use software that denies the FBI lawful means to intercept data.
Yet the FBI does have a lawful means to intercept it: the Foreign Intelligence Surveillance Act. Its scope was vastly expanded by Congress in the wake of the 9/11 attacks.
It’s worth noting that the FBI never asked Congress to force tech companies to build “back doors” into their products immediately after the 9/11 attacks. Only after Google and Apple took steps to patch existing security vulnerabilities did the bureau suddenly express concern that terrorists might be exploiting this encryption.
In fact, the bureau has a host of legal authorities and technological capabilities at its disposal to intercept and read communications, or even to penetrate facilities or homes to implant audio and video recording devices. The larger problem confronting the FBI and the entire U.S. intelligence community is their over-reliance on electronic technical collection against terrorist targets.
The best way to disrupt any organized criminal element is to get inside of it physically. But the US government’s counterterrorism policies have made that next to impossible.
The FBI, for example, targets the very Arab-American and Muslim-American communities it needs to work with if it hopes to find and neutralize home-grown violent extremists, including promulgating new rules on profiling that allow for the potential mapping of Arab- or Muslim-American communities. The Justice Department’s refusal to investigate the New York Police Department’s mass surveillance and questionable informant-recruitment tactics among immigrants in the Arab- and Muslim-American communities has only made matters worse.
Overseas, the Cold War style of spying – relying on US embassies as bases from which CIA and other US government intelligence personnel operate – is increasingly difficult in the areas of the Middle East and southwest Asia undergoing often violent political change.
Steinbach testified about this before the House Homeland Security Committee earlier this month. “The concern is in Syria,” he explained, “the lack of our footprint on the ground in Syria – that the databases won’t have the information we need.”
Notice his reference to technology “databases” rather than the importance of the human element. The US intelligence community’s emphasis should be on the spy on the ground who actually gathers critical information and makes any penetration of a terrorist organization possible.
This problem is true for Yemen as well, as a recent “Washington Post” story highlighted:
“The spy agency has pulled dozens of operatives, analysts and other staffers from Yemen as part of a broader extraction of roughly 200 Americans who had been based at the embassy in Sana, officials said. Among those removed were senior officers who worked closely with Yemen’s intelligence and security services to target al-Qaeda operatives and disrupt terrorism plots often aimed at the United States.”
The CIA’s failure to field agents under nonofficial cover, or to recruit enough reliable local informants on the ground who could communicate securely with CIA handlers outside Yemen, is symptomatic of the agency’s failure to break with its reliance on embassy-based operations throughout that part of the world. Compromising encryption technology will do nothing to solve the intelligence community’s human-intelligence deficit. This is a problem the agency must address if it is ever going to be successful in finding and neutralizing terrorist cells overseas.
It boils down to the fact that the FBI and the US intelligence community have failed to adapt their intelligence-collection practices and operations to meet the challenges of the “new world disorder” in which we live. As former CIA officer Philip Giraldi has noted:
” Intelligence agencies that were created to oppose and penetrate other nation-state adversaries are not necessarily well equipped to go after terrorists, particularly when those groups are ethnically cohesive or recruited through family and tribal vetting, and able to operate in a low-tech fashion to negate the advantages that advanced technologies provide.”
The CIA has repeatedly attempted – sometimes at high cost – to penetrate militant organizations like al Qaeda and Islamic State. Nonetheless, Washington’s overall counterterrorism bias in funding and manpower has been toward using the most sophisticated technology available as the key means of battling a relatively low-tech enemy.
The FBI’s new anti-encryption campaign is just the latest phase in the government’s attempt to deny Islamic State and related groups the ability to shield their communications. If these militant groups were traditional nation-states with their own dedicated communications channels, we’d all be cheering on the FBI’s efforts. But the Internet has become the primary means for global, real-time communications for individuals, nonprofits, businesses and governments. So it should not be treated as just another intelligence target, which is certainly the FBI’s and Natural Security Agency’s current mindset.
Using the legislative process to force companies to make defective electronic devices with exploitable communications channels in the hope that they will catch a tiny number of potential or actual terrorists is a self-defeating strategy. If implemented, the FBI’s proposal would only make all Americans more vulnerable to malicious actors online and do nothing to stop the next terrorist attack.
When the FBI sabotages the efforts of consumers and businesses to secure their data through encryption, the agency is essentially attacking the security foundations of the online world created over the past 20 years. Last year, total global online business-to-consumer sales were nearly $1.5 trillion. That figure is expected to pass $2 trillion in just a few years’ time. Encryption of those transactions is vital to the long-term success of the global online marketplace.
The FBI’s attack on the encryption revolution is an assault on the efforts by citizens to maintain their Fourth Amendment rights against unlawful search and seizure. Instead of fighting the modern encryption revolution, the government should be embracing it.
South Korea’s iconic company Samsung has run into turbulent weather. This is the company that challenged Apple products and rode on the “android wave” in India and rest of the world to claim number 1 spot in many a mobile devices tally.
In February 2015, most analysts and market research firms released 2014 trackers recording a slip in Samsung market position. It’s losing ground, is the refrain from just about every quarter, except an international consumer research firm called GfK, which actually happens to be a reputed brand name with international presence.
Samsung commissioned this research and has been using data from GfK to counter all research groups. These groups are literally screaming with delight about the impending decline of Samsung as new nimble players at price points more in tune with developing market realities flood the mobile phone and tablet market. The basis of all these arguments is the difference between tracking parameters. Almost all market-research firms in the sector track shipments, GfK data tracks retail sales.
Now, the question is: What is the probability that shipment figures can be grossly different from the ones aggregated from the retail sales data? When tracked over a reasonable time-period, like a year or so, shouldn’t these tally or at least be somewhat close instead of a huge differential that is getting thrown around in the media reports? Moreover, broadly speaking, in case of a mismatch, shipment figures should generally be higher than the retail sales figures.
One reason of the mismatch, cited by Samsung is coverage of distribution and retail points. The Samsung statement said the coverage is inadequate for research agencies and that perhaps is the reason of the anomaly. If I were to give this argument to my colleagues at Cyber Media Research, who also track the handset market the argument will not really find feet, as sample sizes are indicative enough and even if there is a margin of error, it cannot be a very wide margin, as claimed by Samsung.
The other possibilities for this mismatch include a market flush with counterfeit handsets, which may not be the case. The turbulence for Samsung continues. The company needs to clear the air around this, instead of entering into data wars with the analysts.
It obviously is a matter of survival and growth for Samsung, in the face of tough competition from brands unheard of. New players continue to enter fray and elsewhere in the world there have been instance of a rank new player rising to the top of market in just three years. Whoever said staying No 1 is easy.
The many-million-dollar question is: Can Samsung weather it out with an India strategy? It’s time. Move fast. Clear the air and answer the question, Samsung.
With malware and other security threats continue to chase mobile users, a new McAfee report reveals mobile app providers have been slow to address the most basic SSL vulnerabilities – improper digital certificate chain validation.
In September 2014, the Computer Emergency Response Team (CERT) at Carnegie Mellon University released a list of mobile apps possessing this weakness, including apps with millions of downloads to their credit.
Intel Security’s McAfee Labs Threats Report: February 2015, includes assessments of the mobile threat landscape and the failure of mobile app developers to patch critical secure sockets layer (SSL) vulnerabilities, potentially impacting millions of mobile phone users.
McAfee Labs also revealed details on the increasingly popular Angler exploit kit, and warned of increasingly aggressive potentially unwanted programs (PUPs) that change system settings and gather personal information without the knowledge of users.
The new report comes shortly after F-Secure released a similar report highlighting growth of malware and banking related threats for Internet users in India.
In January, McAfee Labs tested the 25 most popular apps on CERT’s list of vulnerable mobile apps that send login credentials through insecure connections and found that 18 still have not been patched despite public disclosure, vendor notification, and, in some cases, multiple version updates addressing concerns other than security. McAfee Labs researchers simulated man-in-the-middle (MITM) attacks that successfully intercepted information shared during supposedly secure SSL sessions. The vulnerable data included usernames and passwords and in some instances, login credentials from social networks and other third party services.
Although there is no evidence that these mobile apps have been exploited, the cumulative number of downloads for these apps ranges into the hundreds of millions. Given these numbers, McAfee Labs’ findings suggest that the choice by mobile app developers to not patch the SSL vulnerabilities has potentially put millions of users at risk of becoming targets of MITM attacks.
“Mobile devices have become essential tools for home to enterprises users as we increasing live our lives through these devices and the applications created to run on them ,” said Vincent Weafer, SVP of McAfee Labs, part of Intel Security. “Digital trust is an imperative for us to truly engage with and benefit from the functionality they can provide. Mobile app developers must take greater responsibility for ensuring that their applications follow the secure programing practices and vulnerability responses developed over the past decade, and by doing so provide the level of protection required for us to trust our digital lives with them.”
Another Q4 development followed closely by McAfee Labs was the rise of the Angler exploit kit – one of the cybercrime-as-a-service economy’s latest contributions to off-the-shelf tools delivering ever greater malicious functionality. Researchers saw cybercriminals migrate to Angler in the second half of 2014, when it surpassed Blacole in popularity among exploit kits. Angler employs a variety of evasion techniques to remain undetected by virtual machines, sandboxes, and security software, and frequently changes patterns and payloads to hide its presence from some security products.
This crimeware package contains easy-to-use attack features and new capabilities such as file-less infection, virtual machine and security product evasion, and the ability to deliver a wide range of payloads including banking Trojans, rootkits, ransomware, CryptoLocker, and backdoor Trojans.
The report also identified a number of other developments in the final quarter of 2014:
Mobile Malware. McAfee Labs reported that mobile malware samples grew 14 percent during the fourth quarter of 2014, with Asia and Africa registering the highest infection rates. At least 8 percent of all McAfee-monitored mobile systems reported an infection in Q4 2014, with much of the activity being attributed to the AirPush ad network.
· Potentially Unwanted Programs. In Q4, McAfee Labs detected PUPs on 91 million systems each day. McAfee Labs sees PUPs becoming more and more aggressive, posing as legitimate apps while performing unauthorized actions such as displaying unintended ads, modifying browser settings, or collecting user and system data.
· Ransomware. Beginning in Q3, the number of new ransomware samples began to grow again after a four-quarter decline. In Q4, the number of new samples grew 155 percent.
· Signed Malware. After a brief drop in new malicious signed binaries, the pace of growth resumed in Q4 with a 17 percent increase in total signed binaries.
· Total Malware. McAfee Labs now detects 387 new samples of malware every minute, or more than six every second.
Colombo: The Indo-Lanka civil nuclear agreement would not permit India to dump its radioactive waste in Sri Lankan territory, a senior minister has said.
‘Management of radioactive waste does not authorise India to unload radioactive waste produced in Indian Nuclear Power Plants in Sri Lankan territory,’ Minister of Power and Energy Champika Ranawaka said.
The Minister was commenting on the bilateral agreement signed on February 16 in New Delhi on cooperation in the peaceful uses of nuclear energy.
He said the agreement focussed on peaceful uses of nuclear energy in line with multilateral conventions entered by both India and Sri Lanka.
The agreement will facilitate cooperation in the transfer and exchange of knowledge, expertise, sharing of resources, capacity-building and training of personnel in peaceful uses of nuclear energy.
Ranawaka said Sri Lanka hopes to sign an MoU with Pakistan on the development of nuclear applications.
A similar MoU had been already signed with a Russian state-owned atomic energy entity.
As smartphone technology continues to evolve, innovate and improve, mobile phones now offer users more functions and features than ever before.
Whilst users enjoy larger, higher spec screens, more powerful processors and an array of different functions, all these new features dramatically impact battery performance.
A study carried out in 2014 by the research company GMI found that people regard longer battery life to be the most important consideration when buying a new smartphone.
There has of course been some innovation with regards to battery charging, but generally speaking, battery life technology is perhaps the only feature of current smartphones which has not only failed to improve a great deal in the past 5 years or more, but which has arguably taken a backwards step in terms of innovation.
Do you remember the battery life of your old Nokia, for example?
You’d often get several days of heavy useage before you would need to recharge. Compare that to your current smartphone and it is probably the case that you struggle to get through a full day without needing to charge your device.
The fact that smartphones need to be recharged so frequently is perhaps the biggest annoyance of users.
However, a company from Israel claims it has developed new technology which will help to ease the battery related woes of smartphone users.
According to The Guardian, a research team from Tel Aviv University looking into Alzheimer’s disease have inadvertently discovered a new type of peptide molecule which can gather and store charge much quicker than the options available currently.
The research team, in partnership with StoreDot, claim that whilst the the new technology does not improve overall battery performance, it is capable of charging a smartphone battery in just one minute.
The Guardian goes onto say that StoreDot is already in talks with more than a dozen phone manufacturers and there is a possibility that this technology could be available to users as early as next year.
A battery which could fully charge in just one minute is likely to appeal to every smartphone user. However, there are a few points to highlight regarding this breakthrough.
First of all, the StoreDot battery would not work on existing smartphone batteries as it requires a special kind of charger.
StoreDot says that its battery would likely result in an additional $50 on top of the cost of smartphone handsets, although some users may think this is a small price to pay for a battery which could be charged so quickly.
StoreDot also says that its technology could be used to charge car batteries, as well as on tablets, laptops and other electronic gadgets.
Software Development is no longer considered as an art. But it was made as an engineering practice. A successful software developer is a person who is able to write each line of code with passion. And passion cannot be obtained by any software engineering degree, it must come from within yourself.
1.Be passionate about the being a software developer. If you are not passionate for sitting in front of the PC for the whole day, simply enjoying the lines of code you write; this is not for you.
2.Always start with the simple hello world.
3.Don’t try to learn all the programming languages. What you need to know is the concepts.
4.Don’t start programming with a languages such as C/C++. Try something like Java or C Sharp.
5.When you face an error. Always tell to yourself, “I’m NOT ALONE, Someone in this world should have faced the same error before”. And GOOGLE the exact error message. Chances are 99% you will find the answer.
6.Be more public. If you will not show others that you are cool and you deserve more, how will they know? There is simple way to do that – start blogging, ask and answer questions, ensure Google knows something about you. Share your knowledge in your team and project. If you learned something new, why do not share it. You will forget it if will not be trying it.
7.Never use Microsoft notepad to do coding. Use at least Notepad++.
8.When you see an application(web application or windows), tell yourself. If this is an application. Then it’s technically possible for me to build a similar one.
9.When you see an application(web application or windows), try to model it in your mind. Always ask yourself, can you build a similar application yourself. If not try to find the place where you think you might get stuck. And try to Google and find how to do it.
10.If you get stuck in a code logic for more than two hours; STOP your work; go out to have a tea or coffee, before trying it again.
11.Be confident. Help others and ask from others. Different people will have different aspects to solve an issue.
12.Never be ashamed, when you find the bug as a single line of code. Usually most of the bugs can be corrected in a single line of code. What matters is, how hard you tried in different aspects to solve the issue.
13.Find a mentor. This does not mean that you a need a person who will help you in doing your job – it is a coach or a more senior staff then you are. This means that you need a person who stays where you want to be and you need to take a leaf from his/her book. And if he will not be high enough – you will need to find another. But all the time you need to have that person. Also have people, friends if you will, who will help you keep on track. It could be your wife or girlfriend , or best friend who always supports you (in my case he is a developer, but this doesn’t matter).
A cross platform messaging app, Whatsapp messenger, which allows user to send messages, now added the latest feature of voice calling. To get this feature, Android users need to update to the latest version and then find out a friend who already has the feature. After this, your friend, who has who has that facility should call you up to activate the facility.
If some one calls a user who has the older version of the app, the message tells the user that the app needs to be updated. The version of WhatsApp that supports calling is 2.11.528. Initially, when WhatsApp was testing this feature in a limited way, it worked only on Android phones running the Lollipop.