Description of the image

Namaste! Welcome to my blog, where you’ll find a diverse range of carefully crafted articles. These articles fall into two major categories:

  1. Articles that deepen your understanding of core engineering principles, System Engineering, Product/Program management, and Risk Assessment strategies. Technology is an ever-evolving force that shapes and revolutionizes our world, and I’m excited to explore it with you. #ProductManagement, #SystemEngineering and #Cybersecurity

  2. Articles that share valuable insights and initiatives that have the power to create a meaningful difference in the world. Whether it’s exploring new destinations, discussing social issues, or celebrating the magic of music, you’ll find thought-provoking content here.#Travel, #SocialResponsibility, and #Music:

Life is an extraordinary mixture of experiences, emotions, and growth, and I’m here to share and learn together! 📚

About me!

I know by name DEEKU, and I work as an R&D Software Specialist. Played diversified roles like Product/Program manager, Cloud Migration Architect and cybersecurity SME. I believe in leading by example and making sure technical issues must be balanced with the needs of customers and the organizational interest.

Unlocking Knowledge 🎓
Certified: SAFe® 5 Product Owner/Product Manager.
Certified: Azure Security Engineer Associate.
Certified: Azure Cloud Infrastructure.
ISO 14971 and IEC 62304.

Join me on this inspiring journey of positive change and exploration.

LinkedIn Medium


Read the Blog


What You Need to Know About Convincing Customers for Downtime

What You Need to Know About Convincing Customers for Downtime

What You Need to Know About Convincing Customers for Downtime? In today’s digital landscape, ensuring uninterrupted service is a top priority for organizations, especially in sectors where any disruption can have significant consequences, such as healthcare, finance, and insurance. However, during critical system upgrades, migrations, or maintenance, downtime becomes unavoidable. Effectively managing and convincing customers about the necessity of downtime requires a strategic approach. I would broadly categorise this into two aspects
Enhancing IoT Security and Reliability - Importance of loading user profiles

Enhancing IoT Security and Reliability - Importance of loading user profiles

Overview When developing IoT solutions for customers, managing device security and user profiles is critical, especially when running processes with elevated privileges or performing system-level tasks. Suppose you are developing a small application that needs to make configuration changes on IoT devices. In such cases, you might write code to run system-level commands or scripts to manage tasks like network settings, certificate installations, or device-specific configurations. However, simply executing these commands without considering the user context or security requirements can lead to unpredictable results.
Security as a Functional Requirement- A Paradigm Shift in System Engineering

Security as a Functional Requirement- A Paradigm Shift in System Engineering

In the medical industry, where machines monitor and manage patient life, security is crucial. Consider a scenario where a hospital’s networked devices, such as infusion pumps, heart monitors, or ventilators, are compromised by a cyberattack. A hacker gaining control over these devices could alter dosages, manipulate vital signs, or disrupt the functionality of critical life-support systems, putting patients’ lives at immediate risk. Such incidents highlight the critical importance of security in patient care.
System Engineering Acquisition Process: A CRM Acquisition Scenario

System Engineering Acquisition Process: A CRM Acquisition Scenario

Article Header Image is created using AI Engine and prompt used is : “Flying car in the sky, with futuristic engineering . Conceptual art style, with a focus on light and shadow” . We appreciate the advancements in technology that enable us to bring creative ideas to life. Special thanks to the developers and researchers who contribute to these innovative tools. The acquisition process refers to the systematic approach of acquiring a product, system, or service to meet specific needs within a system lifecycle.
Understanding Uncertainties in System Engineering

Understanding Uncertainties in System Engineering

Imagine we’re going to bake cookies, and there are two types of uncertainties we might face: epistemic and aleatory. 1. Epistemic Uncertainty (Lack of Knowledge) Epistemic uncertainty is like not knowing what kind of cookies people will like. Imagine we don’t know if people will prefer chocolate chip or oatmeal raisin cookies. This uncertainty is because we don’t have enough information about people’s preferences. In system engineering, it’s like not knowing exactly how a new machine will work or what people will think about it in the future.