Thursday, September 1, 2022

Sunday, May 15, 2022

Secrets of a successful presentation


1. Practice makes you perfect. If you want to improve your presentation skills, keep practicing, and do more presentations.

2. Your main objective of most presentations is to motivate the audience or convey the message/content you have created clearly. For this, you need to understand what the audience wants and deliver the content nicely to create an impression.

3. It is important to understand your audience and then deliver the content. Don’t deliver the content based on what you know, understand the audience, and prepare/tune/customize the content.

4. If you are meeting the executives, you should be ready with the elevator pitch. Every executive is different and you need to understand what they like, what they don’t like, and their priorities. Tune your content to meet the executive personality and needs.

5. When you structure the presentation, opening, messaging, and closing are the 3 phases. When you open the presentation, try and convey to the audience what is in it for them or why is this important to gather their attention. Keep the opening interesting all the time as it is important to grab the attention of the audience very early in the presentation.

6. There are different types of presentations. For all the different presentations you make, you need to have a clear agenda and a clear summary/call for action.

7. Even the greatest speakers get nervous. So, it is fine to be nervous. Channel your nervousness to prepare and just give your best. If you are honest in your presentation and have done your homework to understand the audience to prepare the content, the audience will see your honesty and appreciate your presentation. Accent, little hiccups during the presentation, minor English mistakes etc. does not matter if you are honest in your effort and give the audience what they want during your presentation.  The last sentence is important to understand considering that India is a diverse country and English is not our mother tongue.

8. Give your best and don’t worry about the rest. If you have followed all the basics before a presentation, you will never fail and will almost all the time pass with distinction. There is nothing like get 100% marks in presentation as there will always be something to improve.

9. Great presenters also create an impact by presenting with slides that look great, telling stories that resonate, showing emotions and voice modulation as required, use effectively the tools available for them to present (e.g. pointers, using whiteboards etc.), using metaphors to catch attention, eye contact, using pause, pitch and pace effectively, using the dias properly (physical presentations) are all important. But all these things make presentations better but there is no substitute for having the right content to meet the audience's needs. If you can design the presentation to meet all the audience objectives and if you can deliver it to make it interesting and exciting, you will create a lasting impression as you impact positively both the right and left brains of your audience.

• Interacting with the audience and engaging is important. Ask questions get feedback so that you can tune the presentation as you go.  

• Manage the time and handle questions/distractions effectively. Use “Let us take it offline or I will get back to you” are 2 ways of managing questions that may not be relevant to the presentation objective or that can hinder you from finishing the presentation within the allotted time.

• Set expectations on when you will take/answer questions. Listening actively and paraphrasing the question and then answering is a good technique as it can help when addressing a large audience where the question may not be heard by all. The time you are paraphrasing also gives you some time to internalize and prepare your answer for the question.

• There may/will be disruptions to presentations in the form of questions from some hecklers during your presentation. You need to know how to deal with these disruptions and not allow these distractions to affect your delivery. See the slides for more tips

• Every person is unique. Don’t fake during a presentation or copy someone’s style unless you are comfortable pulling off without losing your personality. If you like some style of a great presenter, customize it for your own style and your personality. For example, just because somebody looks good walking around the dias, don’t copy it if you are not comfortable. You can start moving around little bit or occasionally and if you don’t see it impact your personality or presentation, embrace the change.

Continue to cover the most key aspects in short catchphrases that capture the audience's imagination.

Courtesy: My sessions with senior technologists @HPE.

Difference between Authentication & Authorization

Authentification can be defined as the verification of a claim of identity by a user, a process, or a device, often as a prerequisite to granting it access to resources within a system.  This can be done once or many times during a particular session, workday or other period of activity consisting of multiple steps & tasks.

Authorization is the real-time decision that a system-issued identity claiming to have access rights to that system can be verified to be a (a) System-issued valid identity which is (b) being used or presented by the subject it has been issued to.

Simply put, authentication is the process of verifying who someone is, whereas authorization is the process of verifying what specific applications, files & data a user has access to.

courtesy: http://medium.com





Thursday, May 5, 2022

Difference Between a Data Leak and a Data Breach

 A data breach is the outcome of a planned cyber attack, but a data leak is the accidental exposure of sensitive data by a business. Cybercriminals do not create data leaks, they discover them and then use them to launch data breach attacks. 

Data leaks tend to result from poor security practices. A business can also be impacted if any of its vendors have a data leak. Because these vulnerabilities occur throughout a vast attack landscape they’re difficult to detect and remediate before it’s too late. 

Without a sophisticated data protection solution, businesses will remain vulnerable to data breaches through their third-party network.

Courtesy - www.upgaurd.com 

Wednesday, February 16, 2022

Type or Category or Classification of Design Patterns

 Type or Category or Classification of Design Patterns

Creational  Based on the concept of creating an object.
    Class
      Factory MethodThis makes an instance of several derived classes based on interfaced data or events.
    Object
      Abstract FactoryCreates an instance of several families of classes without detailing concrete classes.
      BuilderSeparates object construction from its representation, always creates the same type of object.
      PrototypeA fully initialized instance used for copying or cloning.
      SingletonA class with only a single instance with global access points.
        
  Structural  Based on the idea of building blocks of objects.
    Class
      AdapterMatch interfaces of different classes therefore classes can work together despite incompatible interfaces.
    Object
      AdapterMatch interfaces of different classes therefore classes can work together despite incompatible interfaces.
      BridgeSeparates an object's interface from its implementation so the two can vary independently.
      CompositeA structure of simple and composite objects which makes the total object more than just the sum of its parts.
      DecoratorDynamically add alternate processing to objects.
      FacadeA single class that hides the complexity of an entire subsystem.
      FlyweightA fine-grained instance used for efficient sharing of information that is contained elsewhere.
      ProxyA place holder object representing the true object.
 
  Behavioral  Based on the way objects play and work together.
    Class
      InterpreterA way to include language elements in an application to match the grammar of the intended language.
      Template
       Method
Creates the shell of an algorithm in a method, then defer the exact steps to a subclass.
    Object
      Chain of
      Responsibility
A way of passing a request between a chain of objects to find the object that can handle the request.
      CommandEncapsulate a command request as an object to enable, logging and/or queuing of requests, and provides error-handling for unhandled requests.
      IteratorSequentially access the elements of a collection without knowing the inner workings of the collection.
      MediatorDefines simplified communication between classes to prevent a group of classes from referring explicitly to each other.
      MementoCapture an object's internal state to be able to restore it later.
      ObserverA way of notifying change to a number of classes to ensure consistency between the classes.
      StateAlter an object's behavior when its state changes.
      StrategyEncapsulates an algorithm inside a class separating the selection from the implementation.
      VisitorAdds a new operation to a class without changing the class.

 

Featured

TechBytes on Linux

This is a growing list of Linux commands which might come handy for the of Linux users. 1. Found out i had to set the date like this: ...

Popular Posts