Published: Dec 25, 2018 Tags: career Category: Management To be a great technical expert, you do not only do exceptional technical work, and also exceptional job to let people see your skills. Build your personal brand Your personal brand is how others perceive you. It means you can ask others, capture their language, …
Read MorePublished: Dec 09, 2018 Tags: career Category: Management 之前在网络上搜集到了多种关于职场建议的养分,也结合个人的经验教训,提取出些所谓的精华,大言不惭,称之为职场菜根谭。 职场潜规则 入职工资很重要: 这就是企业对于你的价值的一种认可程度,当然对自己的价值也需要有个清晰的认识,做决定时候应综合考虑 人事部不是你的倾谈对象 你的能力并不能确保你的安全: 熟悉企业‘政治’,摸清游戏规则 不要和老板作对: 赢率太小 学会要求加薪:证明价值,不能威胁上司,立场应该为“我很喜欢这个公司还有目前的业务,但是我觉得目前的工资跟我实际做的工作有差距,我希望工资能体现我的价值” 晋升方面不要 …
Read MorePublished: Dec 07, 2018 Tags: ai, smartcity Category: Engineering I had the honer to give an 'AI for Smart Cities' presentation in 'Big Data & AI Asia' conference Dec 5. The conference was hold in Suntec and it was a big event around hundreds people participated. I managed to convey the following messages in my talk: …
Read MorePublished: Aug 11, 2018 Tags: web, backend Category: Engineering Recently, I used Node.js quite a lot to handle personal projects. It is easy to start, and also easy to get wrong. This blog covers the basics part of Node.js development. Module Require Every module in node is singleton. Use require to use module, the …
Read MorePublished: Mar 14, 2018 Tags: security Category: Engineering Authentication and Authorization are two relevant but different concepts, which causes confusion sometimes. Both of them are important for SaaS solution. This blog explains the basic of these two concepts. Single sign on In classic intranet scenarios, …
Read MorePublished: Mar 07, 2018 Tags: architecture, cloud Category: Engineering Microservice is a software architecture style, in which complex applications are composed of small, autonomous process communicating with each other using language-agnostic API, which is a very common cloud pattern. Microservices Design Principles …
Read MorePublished: Feb 26, 2018 Tags: blockchain, security Category: Engineering This blog explain the potential scenarios of blockchain usage. The content comes from good articles on web. 分布式数字货币系统 现实生活中常用的纸币具备良好的可转移性,可以相对容易地完成价值的交割。 但是对于数字货币来说,数字化内容容易被复制,数字货币的持有人可以将同一份货币发给多个接受者,这种攻击称为“双重支付攻击”。 中心化控制下,数字货币的实现相对容易。 但是,很多时候很难找到 …
Read MorePublished: Jan 24, 2018 Tags: security Category: Engineering Hypertext Transfer Protocol Secure (HTTPS) is a safer version of HTTP, which is the communications protocol of the World Wide Web. An HTTPS session is encrypted using either the SSL protocol (Secure Socket Layer) or TLS protocol (Transport Layer Security) and …
Read MorePublished: Jan 22, 2018 Tags: booknotes Category: Management This blog contains the booknotes of the book "The Personal MBA". How to Learn One of the beautiful things about learning any subject is the fact that you don't need to know everything. You only need to understand a few critically important concepts that …
Read MorePublished: Jan 07, 2018 Tags: security Category: Engineering Cryptography is the core part of security, this blog introduces the basic concepts in cryptography and uses .NET as code example. Randomness System.Random and its problems System.Random is a pseudo random number generator A seed value is passed into the …
Read More