After one month I was finally given my own project. I wasn’t completely on my own as I had help from a coworker. The codebase used special files to package together the OS for the cisco’s routers and switches. However, these files are extremely old and haven’t been cleaned up in a long time. So my task was to program a tool that could maintain those files automatically. The tool would have to be able parse and load all the information from the files as well as analyze and optimize the packaging. The program is far from completion but has come a long way. My coworker is taking over my work for me since I will be leaving in less than a month. Meanwhile I’ve been assigned to improve the already existing OS packaging tool. So far I’ve added syntax to specify and create empty directories on the OS.
For the most part I’ve been allowed to work on my own. I don’t have an explicit supervision or mentoring to guide me. I’m on my own for most of my work, however, if I ever need to I can go speak to any of my coworkers for advice. My coworkers all very helpful and try to provide help wherever they can. I appreciate that they aren’t breathing down my neck and watching my every move. They treated me well and allowed me work with them as though I was their peer. Furthermore, Cisco pr...
... middle of paper ...
...ng about how professional software development worked. I was constantly thrown off by how complicated it is to set up an environment; managing several builds; and how slow and tedious testing can be. I spent the majority of the time learning about how to use their tools. In the end though I did figure out (with help from my coworkers) how to develop software professionally.
A few of my coworkers had degrees in electrical engineering. I found this incredibly surprising. A lot of them learnt programming on their own with a few classes here and there. Originally I was planning on taking a minor in computer science so I could improve my programming skills, but after this internship, I feel like I don’t have to. I can just learn most of the material on my own.
Overall this has been an extremely satisfying internship. However, next time I’ll choose to live closer to work.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- There are many types of routing or data/packet retransmitting hardware and devices that networks can utilize for security purposes. Some use one or a combination for data transfer. However, each poses a level or type of vulnerabilities, additional unwanted threats, and countless types of risk. The quintessential design is to provide a means to controlling the flow of packet transfer. The main function of the switch, router, gateways, or hubs is having the ability to process and forward data packets on the network.... [tags: gateways, hubs, switches]
673 words (1.9 pages)
- SCADA, or often referred as Process Control Systems (PCS) is interpreted as an overall collection of control systems that measures, reports, and changes processes SCADA is the acronym of Supervisory Control and Data Acquisition, which is a communication technology scheme for collecting data from distant facilities and also controlling them on control systems. In the beginning SCADA system was locally introduced, and it has been applied to larger and wide-area systems as the information technology evolves.... [tags: SCADA, Process control, Security]
1781 words (5.1 pages)
- Now a days there is a trend in using wireless keyboard and mouse. The wireless user interface technology is vast changing and many day to day objects are being transformed into user interface so that it can be easy for us. In this paper we propose a system which uses gloves for interacting with the personal computer. In addition to keyboard, mouse interface is also included in the Glove. To verify the proposal prototype is created. This proposes that when a person presses the switches on fingertip mouse movement also inputting character can be done.... [tags: Gloves, Tactile Switches, Pic Micro Controllers]
1086 words (3.1 pages)
- “Some tourists think Amsterdam is a city of sin, but in truth it is a city of freedom. And in freedom, most people find sin.” This might sounds like a section from a travelling guide, but it also describes why we as a society cannot gain complete freedom. Complete Freedom requires all negative repercussions from individual’s actions to be unpunished, making it impossible to allow any form of justice into the community, turning it into a den of criminals. Due to that, a government with security force to help regulate rules is necessary to keep the whole country going without breaking down.... [tags: Freedom vs Security]
1434 words (4.1 pages)
- Abstract This paper focusses on the analysis of the importance of the security baselines by critically looking at the significance of this security baselines on the computer operating system, application system, and various computer network components. This paper, therefore, strives to provide the organizations that do not have security guidelines in place reasons to adopt them by clearly laying down the benefits that will trickle down to them and the security risks they will be protected against.... [tags: Computer security, Security, Information security]
1420 words (4.1 pages)
- We have conducted an audit of the Network Security Audit. This audit was conducted under the authority of Article VII, Section 5 of the Garland City Charter and in accordance with the Annual Audit Plan approved by the Garland City Council. Objective The objective of this audit is to: A. Provide management with an independent assessment relating to the effectiveness of physical controls in place to prevent unauthorized access to sensitive material. B. Provide management with an evaluation of the IT’s administrative controls that sets tone of an organization, influencing the controls consciousness of its people.... [tags: Security, Information security, Computer security]
1335 words (3.8 pages)
- Denial of service (DoS)- This type of attack occurs when a hacker overloads a server or network device with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to respond to valid requests. By updating to the latest service pack and applying security patches, you can minimize the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove valuable troubleshooting tools, it can effectively remove the possibility of DoS attacks.... [tags: Cyber-security, Enterprise Security]
3468 words (9.9 pages)
- Homespun to Sophisticated: Place as Transformer Works Cited Missing It is common in the transcendental philosophy to associate the act of transcending with a place. Philosophers, artists, and writers fled to Niagara Falls and the White Mountains in search of sublime scenery that would connect them with God. One of the leading Transcendentalists, Ralph Waldo Emerson, states that "Nature deif[ies] us with a few and cheap elements" (Emerson, 27). The essential communion between man and nature, through something he calls the "Oversoul," enables man to transfer the world into the consciousness, thereby uniting himself with God.... [tags: Philosophy Philosophical Papers]
2822 words (8.1 pages)
- Introduction The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad.... [tags: IT Security]
2693 words (7.7 pages)
- Network Security Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems. Purpose and Scope To cover all areas I have listed the network security measures that are associated with each level of the Open Systems Interconnect (OSI).... [tags: Security Network Technology]
980 words (2.8 pages)