I am Neha Jain and I am a part of the IBM India Software Labs since July 2009. I graduated in Bachelors of Computer Science & Engineering in 2009. The 2.5 years in more in IBM have been a rewarding journey and I look forward to being a much more active participant in the community of developers around the globe. I am a part of the WebSphere group and have been in the test team and currently a part of development team. I have presented at several internal conferences like RTLE(Regional Technical Leader's Exchange), WIT(Women In Technlogy) forums and DeveloperWorks webinar on SOA Governance. I have authored a couple of developerWorks articles. Besides this I am an IBM Certified SOA Associate and an Oracle Certified Programmer for Java Programming (formally known as SCJP).
I try to bring a lot of passion to the work I do everyday and not do it as a chore. Besides that my art hobbies and my faith keep me on track and help me maintain a balance.
As women, creation is something we have been endowed with naturally, similarly creating a new piece of code from scratch or improving something in an existing code, or solving problems for customers who are facing issues bring immense joy, something which can only be felt when you do it.
As freshers from college we have immense amount of hopes accompanied by some fears about the corporate life ahead. As women in technology, it is our responsibility to carve a niche for ourselves. If we keep on complaining and pitying ourselves, the world will see us in that light. But if we stand up and be a change, we are bound to be treated with the same respect. Respect in work comes in the way you face the challenges ahead of you and in the way you code, create or manage to be a change. And this spirit to never give up no matter what comes from a balance in all aspect of our lives.
We might settle for lesser roles or become lax in work, college or elsewhere under the pretense of being a "poor woman", But we have to stand up as a "strong woman" who earns that respect.
As women we are natural motivators, and we should use this trait to become a teamplayer and help the team bind cohesivally.
Another important aspect is that we might become so overly concerned about the code and the technical depths that we forget to build our overall personality and presentation skills. Remember, it is very important to communicate what you do and sometimes bragging about your abilities might just help others know better about your achievements.
Today we are no short of examples of successful women leaders, CEOs and enterpreneurs in technology. IBM's new CEO, Ginni Rometty is an inspiration for each of the young girls out there. Quite a few times, when we might feel limited by our own abilities and start the comparsion and fall into an endless loop of self-pity, the best thing would be to live a life true to ourself and bring out the immense potential which each of us have been blessed with.
As freshers when we leave our homes to live in a completely new city- everything from managing your daily routine to your work might seem a Herculean task. But if you decide to be in harmony with yourself, everything will just fall in place. I personally take out time to exercise and cycle in the morning followed by a winning day at work and back home to decide whats cooking for dinner. Add to that the project deadlines, the unresolved defects, the bug in your code, the certifications you plan to do. The key is not to get boggled down by all this, but let these things fuel your path to success and enjoy every experience.
A career in technology is indeed a rewarding one for women. There are so many support groups and programs focused on women that you will almost never feel alone. Today competition has given way to collaboration. So with our inherent abilities to create, solve problems and look at things from a bigger perspective, we ought to become assets for our teams charting their path to success along with ours.
Hi I am Dhivya from the Team VIVID WINNERS and we got the ALL GIRLS TEAM AWARD in the TGMC'10 contest. Now I am doing Final year IT in Mepco Schlenk Engineering College, Sivakasi. I like to share about our project details. Our project is INFORMATION KIOSK which aimed at developing an information kiosk for Sivakasi (which is in TamilNadu, India) that is of importance to a person to know more information about the city. This system will be more useful for the tourist and the person who is new to the city. It also has some useful links like matrimonial, employment opportunity, e-governance and also e-agriculture. One can also read the daily newspaper. The tourist can view the route from the main bus station in Sivakasi to their desired location. IBM TGMC contest make us to gain more knowledge and we feel proud to share our experience.
My team mate Jothi wants to share the project submission process "We submitted our project as in the format specified by TGMC. And at the time of the submission we didn’t think that we will go this much. But we won the all girls team award . During the face to face evaluation we were really very happy to get a chance to share our experience with IBM TGMC. "
What Kanthimathi and Senbagareka(my team mates) felt when we were there in the felicitation ceremony is "Our Eyes gleamed with surprise when we came to know that we are one among the finalist in the felicitation ceremony . We were inspired by the video played in the begining of the ceremony.The thoughtful speech given by highly experienced people in IBM was awesome.We were out of the world when our names were pronounced in the Felicitation ceremony.That was one of the best moment in our life.And we were very proud to receive the “ALL GIRLS TEAM AWARD”. The price we won is always a memento reminding our great time in DELHI."
I want to thank my guide Prof.T.Revathi who supported us to do this project. She gave us lot of ideas to do this project. She referred the scoring criteria for the project submission and told us to use Ajax, to take backup of the database and to make the website available in the local language too. She also mailed us some reference web pages to do those things. And also she helped us during SRS preparation. She taught us about the OOAD concepts.
I also want to thank our department staff Mr.A.S.Karthik Kannan who gave us some ideas and corrections in our project to make our project the Perfect One. I like to thank Dr.K.Vijayalakshmi and Mrs. S. Kavi Priya who helped us to complete our project on time. I like to thank my entire department Staffs since they all encouraged us to do this project because of that we got energy during our tough time.
It's been seven years now since I entered the IT world and the journey so far has been so eventful that I won't go with common tag line - 'Time just flies......' :)
Setting up yourself and excelling in this competitive world and at the same time balancing your responsibilities at home does demand a lot from you. Every modern girl dream of standing on their own feet and be economically independent. That's the dream one chases for first 20-25years of one's life. I won't deny that, same was my dream too. I completed my Masters in Computer Technology and fortunately got a good break in good IT company. We all know that change is law of nature but the pace with which technology changes is really tuff to catch up with latest. One needs to regularly brush up their skills very frequently and that does demand a good amount of time from you.
So, that was about my professional role, going toward personal me, I am happy to share that despite being daughter and sister, I have the responsibilities of being a wife, daughter-in-law and most importantly mother of two small kids. If one starts counting the responsibilities that comes with that package, it won't be possible. Here, comes in picture what we call in IBM - Work/Life Balance. I would say, the stage I am in right now, is the most crucial and difficult stage. There are challenges in your professional life that you can not leave taking up as well as in personal life that you can not get rid of. There's testing time all through the way. You are being tested for your patience level almost daily. No wonder, we find many cases of Stress and frustrations in such situations. But, the key here is how we sail in these testing times, how we balance out things, how to set a demarcation between professional and personal life and coming out a winner in both area.This is the phase when the most precious thing that you can think is - TIME. One needs to make best use of the time available. Time management is the key. There are some other important skills that comes as good help. These are :
- Delegation of non-important work.
- Focusing on key areas.
- Saying 'No' to things that are really not in your area and you are not willing to go for that.
- Spending some time for self only, when you can do some thinking/planning on course of action you really want to pursue.
- Choosing the right direction.
- Open for brainstorming, discussion with peers, seniors, family whenever you are in delima.
KritiKamra 270004QYED 4,227 Views
Meet Bhawana, the energetic and bright woman of substance at IBM who dons many a hat on a daily basis to juggle her work in Tech Sales for Rational and her role as a mother to her young daughter. She manages her work on a tight schedule and we were lucky to capture some of her tricks in an interview with her.
Please read on to know more about a career in tech sales for women, meticulous time management and putting a child to bed on time…daily!
Thank you Bhawana, for sharing the details of your life and work with us. You certainly have taken the road less traveled by women and are a deep source of motivation!
Tell us about your role at IBM
What are the top 3 things about being associated with Rational
1. I love the challenge! As always there are many ways of achieving the desired and it is stimulating to think of what could be the best, the most optimal solution. I
2. You really need to know your stuff..It’s not just selling a box…it’s talking about technology. You need to be convincing which is only possible if you know the Rational portfolio.. breadth and depth. It needs you to constantly read, learn, try.
3. On a lighter note, people in my social circle (daughter’s school especially) take me seriously. I am able to live having my own identity, somebody with some grey matter and not just a Mrs. Gupta or Jiya’s mom
How do you manage a demanding role as this and your family life?
I have processes set for daily routines which require minimum intervention during the week when I am busy with work. Weekends are completely home time. Saturday mornings devoted to restocking house with groceries. Sunday mornings are breakfast outings coupled with a movie at INOX.
I have an eight year old daughter, Jiya. This means I need to cater to her various needs all the time.. It’s my role to keep things balanced and stay focused on her and my work. Time management is the key to this and I follow it strictly. 7pm to 9pm is the time I spend with my family listening to her endless stories while eating. Post that, it is routine homework, storytime and finally bedtime at 8.30 pm. My ‘me’ time start at 9 pm till about 11pm, when I devote uninterrupted time to reading and updating myself to stay ahead at work.
All in All it’s a balance between professional and personal needs. One doesn’t really have to stop doing anything. You have to strike the balance. It could take time, there are trying phases as well (no household help) but it all still works out with some help from the spouse and colleagues. Colleagues also play a big role in helping you manage this balance.
Would you recommend a career in tech sales to women and aspiring students?
Although I chanced upon a role in tech sales, I would still recommend it. The moment you hear sales, you associate men with the role. That is why, I think it’s important for women to join this field to explore their boundaries. You have to travel which is challenging for a women with kids. Ultimately what matters is how determined are you to make it work. If you have the energy, the grit and the determination, I say you must go for it! Do something different and strive harder than the others and prove that women can really multitask.
Meet Kalpana, the immense source of inspiration at IBM India Software Lab. Kalpana has a rich pool of experience and has a calm demeanor, even on her busiest days! Director at IBM ISL and a mother to her 24 year old son, Kalpana integrates work and family beautifully while ensuring she gets out for a walk and enjoy mystery novels to de-stress.
Kalpana is passionate about contributing to women's growth in technical field and she extended her warm support to talk to us and provide encouragement to be positive, brave and above all..happy! Read her interview to know more.
Thank you Kalpana for opening the group with your valuable words.You are certainly our pillar of strength!
An introduction: Professional background, family, interests
I have 29+ years of industry experience and have been with IBM for last 19 years. I have been with India Software Lab(ISL) since its inception in 2001 and have played key leadership roles across functions in growing the lab to its current level.
Born and brought up in Bangalore, I have completed my Masters Degree in Engineering from the Indian Institute of Science, Bangalore in 1982, after which I embarked on an 11-year career with PSI Data Systems.
Family - I am married to a Chartered Accountant, have a son who is 24 years old and stay with my extended family which includes my mother-in-law.
I like listening to old hindi music and read a lot and mostly fiction.
What made you choose a career in technology? Can you explain how you guided your career to be where you are today?
When I was in doing my undergraduate degree, I had a friend who was always talking about a post-graduate degree course in Engineering in the premier Indian Institute of Science (IISc) at Bangalore and that she was applying for it. So I just went along, took the entrance test, got through it and joined the Bachelor’s course in Electrical and Electronics Engineering. I also went on to do my Masters in Engineering from IISc itself. Thereby, a chance discussion and a lot of encouragement and support from my parents, my father in particular, took me along this path and here I am enjoying a career in technology!
How have you balanced your professional and personal demands simultaneously?
I like the current term a lot better - "Work Life Integration" than the work life balance. It has been a challenge given that we work in a global company. I try to keep the week-ends for my family and be there for important events or testing times. I ensure I am there when I am most needed. The flexibility work options provided by IBM are useful. I also built a good team with the team members having a strong mutual trust - this team contributes to each one managing work and life.
Our health tends to take a back seat due to work and personal commitments. What are your suggestions for nutrition and fitness?
I believe that if the woman in the house stays fit and healthy, she can then ensure the others are healthy too. Health is one area where we must lead by example. Personally, I try and make time for walking, and I try to walk a lot! Also, have been interested in Yoga and have picked it up in the last couple of years.
Any advice on women who choose to pursue a career in technology?
Given our education and experience we have the skills to take up a career and be successful. But the challenge has been on who we think is responsible for our career. Personally I feel we are equally responsible as our manager and the organization. But first and foremost we have to decide “to want a career” and learn to look at work as not a physical place but a state of being, of integration with our regular flow of daily life. Career in technology is great place to be today - given the changes that are happening and how much technology is influencing our daily lives and also the various business. Opportunities are many. Go for it.
In addition, Focus on Personal Excellence, never be satisfied with what you know, Integrity, Positive Attitude are important; try to maintain good relationship with people you work with; Never hesitate to ask someone to teach you what you want to learn and keep continuously learning.
Every database management system must be able to protect data against unauthorized access and modification. This also holds true for IBM DB2 Database for Linux, UNIX, and Windows® (DB2). DB2 uses several mechanisms, such as authentications, authorizations, and privileges, to meet this need. However, to protect its resources (such as processes, containers, system files), DB2 mostly relies on the native operating system.
Tivoli Access Manager for Operating System (TAMOS) is an IBM solution that uses a centralized policy management approach to protect resources on UNIX or Linux operating systems. Therefore, you can use it to provide an extra layer of security in addition to that provided by the native operating system.
Following is an overview of the topics covered by the article:
The UNIX and Linux operating systems pose several security concerns from an enterprise perspective. TAMOS addresses these concerns by providing operating system-level access control for UNIX and Linux operating systems. The TAMOS centralized policy management technique prevents unauthorized access, and monitors accesses to sensitive data and resources.
TAMOS is implemented as a series of daemons, kernel extensions, and control files for either the UNIX or Linux operating system. The TAMOS kernel extensions intercept all the system calls. The centralized authorization daemon named
The flow chart in Figure 1 demonstrates how TAMOS implements the security layer by intercepting the system calls at the kernel level.
Figure 1. Sample flowchart to illustrate TAMOS kernel interception
There are several prerequisite system requirements that must be met before you can begin to install and configure IBM TAMOS. However, a detailed description of these prerequisites is beyond the scope of this article.
You can install TAMOS in one of four ways:
The example in this section describes the first type of installation — how to perform a GUI mode installation of TAMOS, and specifically on a Linux server. The examples in later sections of the article also assume use of the Linux operating system.
To begin an interactive GUI-mode installation, locate your TAMOS CD and run the program with the name:
Figures 2 and 3 show sample screenshots from the TAMOS installation wizard.
Figure 2. Tamos Installation screen
Figure 3. Recommended System Settings
As you proceed through the wizard, it guides you through the installation and configuration of TAM Runtime, using the appropriate LDAP server.
The silent mode of installation uses response files to install silently. The native installation uses the native software installation utility provided by the operating system.
This section explains how to configure TAMOS on a UNIX or Linux operating system after you perform a native installation. When you use Installshield multiplatform to install, TAMOS is already configured as part of the installation process. However, if you perform a native installation, you still need to configure TAMOS after the installation.
The command you use to configure TAMOS after a native installation is
Listing 1. Sample command for configuration of TAMOS
The term DB2 resources refers to DB2 processes, containers, system files, etc. that are present on the operating system where DB2 is installed. TAMOS uses various access controls such as Access Control Lists (ACLs) and Protected Object Policies (POPs) to protect these resources. It uses the static mode of creating objects in a policy database to protect them. Every DB2 resource that has to be protected must be explicitly created as an object in the policy database and must have an ACL/POP attached to it.
A root user who has all permissions on a UNIX or Linux machine tries to switch his identity to a DB2 instance user (for example, db2ins95) and tamper with some DB2 processes. This is where TAMOS would step in to provide protection. TAMOS provides a way you can protect surrogate operations by using surrogate resources. You start by creating an object.
Listing 2. Sample command for creating an object
You could then use a command like the one in Listing 3 to create a policy to prohibit root from switching user identity to db2ins95.
Listing 3. Sample command for creating an ACL
The above ACL shows the root user is not given the surrogate permission bit "G". Now you can use a command like the one in Listing 4 to attach the policy to the object for enforcement.
Listing 4. Sample command for attaching a policy to an object for enforcement
Now, as shown in Listing 5, if the root user tries to change identity to a DB2 instance user, he is not allowed to do so.
Listing 5. Identity change to DB2 instance user not allowed
The example in this section has shown you how to create objects and apply policies to them. Specifically, it showed you how to protect DB2 resources by controlling whether a root user can switch to a DB2 instance user. This ability to control root account use is one of the key features of TAMOS.
This section demonstrates how TAMOS can help you deal with two real-world issues faced by DB2 customers.
Some DB2 customers have reported experiencing an instance crash due to a
Assume that you have a DB2 instance named
Listing 6. List DB2 instance processes
Next, connect users to SAMPLE database, as shown in Listing 7.
Listing 7. Connect users to SAMPLE database
Listing 8 shows
Listing 9 is an example of the resulting entries in the db2diag.log file after the instance crash. These entries indicate that the instance crash occurred due to
Listing 9. Sample db2diag.log entries
Now you will see how TAMOS can help you prevent the scenario described above.
First, create an object for the
Listing 10. Create object
Next, as shown in Listing 11, create a policy that does not give DB2 instance user db2ins95 and root user permission to kill the process.
Listing 11. Create policy
Now the ACL is defined not to give DB2 instance user db2ins95 and root user the kill (that is, the "k") permission bit. The last step is to enforce the policy on the object, as shown in Listing 12.
Listing 12. Enforce the policy on the object
Listing 13. List DB2 instance processes
Now, as shown in Listing 14, when the db2ins95 or root user tries to kill the
Listing 14. kill -9 not permitted
TAMOS can also help you track who actually issued the kill command, which can lead to you identifying the real culprit. This tracking functionality is discussed later in the article.
DB2 support has also documented several problem reports where a customer has accidentally deleted tablespace containers while performing operating system maintenance activities. In some cases, this has resulted in the loss of a significant amount of data. This type of scenario also results in the tablespace becoming inaccessible. The example described in this section illustrates this type of scenario.
As in Case 1, for this example assume that you have a DB2 instance named
Listing 15. Connect users to SAMPLE database
As shown in Listing 16, create a tablespace with one container named
Listing 16. Create a tablespace
Create a table named
Listing 17. Create tables
Then, as shown in Listing 18, insert some sample data into the table.
Listing 18. Insert sample data
To simulate what would happen if the tablespace were accidentally deleted, issue an
Listing 19. Delete the tablespace container
Now, as shown in Listing 20, when users reconnect to the database and try to access the table, they receive an error.
Listing 20. Access attempt returns error
The tablespace has become inaccessible because its container was deleted, and all the data you inserted in the table is lost!
Now you will see how TAMOS can help you in the type of situation outlined above by preventing users from removing the containers, and thereby securing your system against potential data loss.
In this example, the container, which is simply a file resource on the operating system, is in the /test directory. As shown in Listing 21, create an object for /test/cont1 under the file resource.
Listing 21. Create an object
Next, create a policy to protect against users being able to remove this object, as shown in Listing 22.
Listing 22. Create a policy
Now, the ACL is defined to give the root user read, write, and execute permissions, but not the deletion (that is, the "d") permission bit. The last step is to enforce the policy on the object, as shown in Listing 23.
Listing 23. Enforce the policy on the object
Now, as shown in Listing 24, when the root user tries to remove the container, he is not allowed to do so. TAMOS has just prevented accidental data loss due to deletion of the container.
Listing 24. Container deletion not permitted
This section describes how you can use TAMOS to monitor or track operations performed against DB2 processes and resources.
For example, in the scenario described in Case 1 above, a
TAMOS provides three levels of auditing:
The following example illustrates resource level auditing. Assume that as described in Case 1, the policies shown in Listing 25 are in place for your system.
Listing 25. Case 1 policies
With the above policies, the ACL
Now, as shown in Listing 26, create a POP with a specification that all actions on the protected object will be audited. This tells TAMOS to track when a
Listing 26. Create a POP to audit all actions
Enforce the policy on the object by attaching the POP to the object, as shown in Listing 27.
Listing 27. Enforce the policy on the object
Listing 28. List DB2 instance processes
Now, as shown in Listing 29, a user attempts to kill the
Listing 30 is an example of the resulting entries in the audit.log file after the attempt to issue the
Listing 30. Snapshot from the audit.log
The above record shows that a
This article introduced you to the IBM Tivoli Access Manager for Operating Systems (TAMOS) solution. It provided an overview of how you can install and configure TAMOS, and showed how it can be used to protect DB2 processes and resources on UNIX and Linux operating systems. Once you understand the concepts of TAMOS, you will be in a better position to provide security to your system resources on top of that provided by the native operating system.
KritiKamra 270004QYED 4,120 Views
Welcome note by Kalpana Margabandhu
Director, WebSphere Adapters and AIM Development, India
IBM Application & Integration Middleware Division,
IBM India Software Lab, IBM Software Group
Welcome to developerette!
developerette is a unique space for women in technology.
Through this group, our endeavor is to focus on you, the women in technology, and involve you in various activities that not only help you advance your learning and careers, but also help you integrate your professional and personal lives.
There are several activities that you can expect on this group to enable and guide you to achieve your professional goals. Read the features on women just like us, who have overcome their barriers to build successful careers in technology. There are several articles that will guide you to make progress at work and home and stay healthy on busy days! Participate in the webinars that will cover technical topics as well as discussions on topics that are special to women. Let's have healthy dialogues, share and meet on a common platform!
I welcome all the women in the developer community, in technology and in any other technical field to join this group and be a part of an empowering and uplifting program like none other.
Click on http://ibm.co/developerette to join and don't forget to bring your friends!