SlideShare a Scribd company logo
SAFETY, SECURITY, QUALITY, HONESTY
4KENGINEERING
Md Baha Uddin
AGENDA
• Safety
• Security
• Quality
• Honesty
4
K
E
N
G
I
N
E
E
R
I
N
G
2
2
I N T R O D U C T I O N
The telecommunication industry places
paramount importance on safety,
ensuring the well-being of both
professionals and users. Rigorous safety
protocols are upheld to mitigate potential
risks associated with the operation and
maintenance of telecommunication
infrastructure. Security measures are
meticulously implemented to safeguard
sensitive data and communication
channels, fortifying against cyber threats
and unauthorized access. Quality is a
cornerstone of the telecommunication
industry, encompassing superior service,
reliable networks, and cutting-edge
technology to deliver seamless
communication experiences. Honesty and
transparency are fundamental values
upheld in business practices, ensuring
ethical conduct, truthful information
dissemination, and trustworthy
relationships with stakeholders.
4
K
E
N
G
I
N
E
E
R
I
N
G
3
2
0
X
X
S A F E T Y M E A S U R E S
1. 0% Tolerance
2. No excuses
3. Any warning received for EHS
violation (will fine 50% of that day
expenses(1st violation)
4. 2nd Violation will lead for
Termination
5. Any Accident caused for not
maintain safety, will not entertain in
Organization
SAFETY MEASURES
A V O I D I N G U N W A N T E D S C E N A R I O S
P
R
E
S
E
N
T
A
T
I
O
N
T
I
T
L
E
5
2
0
X
X
S E C U R I T Y
1. Materials Received with Double
check
2. Challan need to Check with
Received Materials
3. Receiving in a safer Place
4. Need to Ensure Materials Security
5. Any Incident regarding Material
Receive, will not tolerate. Need to
inform to Project Team if any issues
raised
Q U A L I T Y
1. Quality need to maintain to
100%
2. Quality inspection in a timely
manner
3. QA manager needs to visit site
now and then and need to
punish if any discrepancies
found.
4. Regular training need to
arrange for new recruited
employees.
H O N E S T Y
1. Honesty Is the Best Policy
2. Self-Honesty
3. Honesty to Others
4. Honesty about the Future
Essential for Sobriety and
Survival
S C E N A R I O O F I M P L E M E N T A T I O N
Safety
Uses(%)
Security(%) Quality(%) Honesty(1)
Robi 20 30 80 0.2
ZTE 60 90 95 0.9
Huawei 65 60 80 0.8
NEC 10 90 80 1
4
K
E
N
G
I
N
E
E
R
I
N
G
9
2
0
X
X
R O B I , Z T E , H U A W E I , N E C
P
R
E
S
E
N
T
A
T
I
O
N
T
I
T
L
E
10
2
0
X
X
0
20
40
60
80
100
120
Safety Uses(%) Security(%) Quality(%) Honesty(100)
Safety, Security, Quality, Honesty
Robi ZTE Huawei NEC
THE WAY TO GET STARTED
IS TO QUIT TALKING AND
BEGIN DOING.
Walt Disney
T H A N K Y O U
Md. Baha Uddin
baha4keng@gmail.com
Youtube/TechTalkBD
P
R
E
S
E
N
T
A
T
I
O
N
T
I
T
L
E
12
2
0
X
X

More Related Content

Similar to Safety concerns in Telecom sector in Bangladesh.pptx

First engineering contracting
First engineering contractingFirst engineering contracting
First engineering contracting
MohamedAwaad23
 
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Sandeep Kumar
 
Mejores practicas en proyectos
Mejores practicas en proyectosMejores practicas en proyectos
Mejores practicas en proyectos
LisbethRoosRoos
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Matthew Rosenquist
 
Team Canada Inspection Flyer_Print (5)
Team Canada Inspection Flyer_Print (5)Team Canada Inspection Flyer_Print (5)
Team Canada Inspection Flyer_Print (5)Brad Wackenhut
 
A. DC Human CV
A. DC Human CVA. DC Human CV
A. DC Human CVDaan Human
 
Application-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfApplication-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdf
Anil
 
Application-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfApplication-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdf
Anil
 
Firstcool electromechanical works llc
Firstcool electromechanical works llcFirstcool electromechanical works llc
Firstcool electromechanical works llc
MohamedAwaad23
 
C_COHEN_RESUME
C_COHEN_RESUMEC_COHEN_RESUME
C_COHEN_RESUMECarl Cohen
 
Final ppt g08
Final ppt g08Final ppt g08
Final ppt g08
hetvi naik
 
Trends in software development: Guest Lecture at Amity Business School, India
Trends in software development: Guest Lecture at Amity Business School, IndiaTrends in software development: Guest Lecture at Amity Business School, India
Trends in software development: Guest Lecture at Amity Business School, India
Niamh O Riordan
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
CompTIA
 
Hsse policy group 5 final
Hsse policy group 5 finalHsse policy group 5 final
Hsse policy group 5 final
Samarth Mewada
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
AmeliaJonas2
 
Abid mahmood --hse
Abid mahmood --hseAbid mahmood --hse
Abid mahmood --hse
Abid Mahmood
 
Recommendations to alleviate the Insider Threat from Childs.pptx
Recommendations to alleviate the Insider Threat from Childs.pptxRecommendations to alleviate the Insider Threat from Childs.pptx
Recommendations to alleviate the Insider Threat from Childs.pptx
ayokedube
 

Similar to Safety concerns in Telecom sector in Bangladesh.pptx (20)

First engineering contracting
First engineering contractingFirst engineering contracting
First engineering contracting
 
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
 
Mejores practicas en proyectos
Mejores practicas en proyectosMejores practicas en proyectos
Mejores practicas en proyectos
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Craig Davies - CV COMAH OCTOBER 2014
Craig Davies - CV COMAH OCTOBER  2014Craig Davies - CV COMAH OCTOBER  2014
Craig Davies - CV COMAH OCTOBER 2014
 
Team Canada Inspection Flyer_Print (5)
Team Canada Inspection Flyer_Print (5)Team Canada Inspection Flyer_Print (5)
Team Canada Inspection Flyer_Print (5)
 
A. DC Human CV
A. DC Human CVA. DC Human CV
A. DC Human CV
 
Application-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfApplication-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdf
 
Application-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdfApplication-Modernization-Whitepaper.pdf
Application-Modernization-Whitepaper.pdf
 
Firstcool electromechanical works llc
Firstcool electromechanical works llcFirstcool electromechanical works llc
Firstcool electromechanical works llc
 
C_COHEN_RESUME
C_COHEN_RESUMEC_COHEN_RESUME
C_COHEN_RESUME
 
Final ppt g08
Final ppt g08Final ppt g08
Final ppt g08
 
Trends in software development: Guest Lecture at Amity Business School, India
Trends in software development: Guest Lecture at Amity Business School, IndiaTrends in software development: Guest Lecture at Amity Business School, India
Trends in software development: Guest Lecture at Amity Business School, India
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
Hsse policy group 5 final
Hsse policy group 5 finalHsse policy group 5 final
Hsse policy group 5 final
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
 
updated cv NA
updated cv NAupdated cv NA
updated cv NA
 
Abid mahmood --hse
Abid mahmood --hseAbid mahmood --hse
Abid mahmood --hse
 
403 9
403 9403 9
403 9
 
Recommendations to alleviate the Insider Threat from Childs.pptx
Recommendations to alleviate the Insider Threat from Childs.pptxRecommendations to alleviate the Insider Threat from Childs.pptx
Recommendations to alleviate the Insider Threat from Childs.pptx
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Safety concerns in Telecom sector in Bangladesh.pptx

  • 1. SAFETY, SECURITY, QUALITY, HONESTY 4KENGINEERING Md Baha Uddin
  • 2. AGENDA • Safety • Security • Quality • Honesty 4 K E N G I N E E R I N G 2 2
  • 3. I N T R O D U C T I O N The telecommunication industry places paramount importance on safety, ensuring the well-being of both professionals and users. Rigorous safety protocols are upheld to mitigate potential risks associated with the operation and maintenance of telecommunication infrastructure. Security measures are meticulously implemented to safeguard sensitive data and communication channels, fortifying against cyber threats and unauthorized access. Quality is a cornerstone of the telecommunication industry, encompassing superior service, reliable networks, and cutting-edge technology to deliver seamless communication experiences. Honesty and transparency are fundamental values upheld in business practices, ensuring ethical conduct, truthful information dissemination, and trustworthy relationships with stakeholders. 4 K E N G I N E E R I N G 3 2 0 X X
  • 4. S A F E T Y M E A S U R E S 1. 0% Tolerance 2. No excuses 3. Any warning received for EHS violation (will fine 50% of that day expenses(1st violation) 4. 2nd Violation will lead for Termination 5. Any Accident caused for not maintain safety, will not entertain in Organization
  • 5. SAFETY MEASURES A V O I D I N G U N W A N T E D S C E N A R I O S P R E S E N T A T I O N T I T L E 5 2 0 X X
  • 6. S E C U R I T Y 1. Materials Received with Double check 2. Challan need to Check with Received Materials 3. Receiving in a safer Place 4. Need to Ensure Materials Security 5. Any Incident regarding Material Receive, will not tolerate. Need to inform to Project Team if any issues raised
  • 7. Q U A L I T Y 1. Quality need to maintain to 100% 2. Quality inspection in a timely manner 3. QA manager needs to visit site now and then and need to punish if any discrepancies found. 4. Regular training need to arrange for new recruited employees.
  • 8. H O N E S T Y 1. Honesty Is the Best Policy 2. Self-Honesty 3. Honesty to Others 4. Honesty about the Future Essential for Sobriety and Survival
  • 9. S C E N A R I O O F I M P L E M E N T A T I O N Safety Uses(%) Security(%) Quality(%) Honesty(1) Robi 20 30 80 0.2 ZTE 60 90 95 0.9 Huawei 65 60 80 0.8 NEC 10 90 80 1 4 K E N G I N E E R I N G 9 2 0 X X
  • 10. R O B I , Z T E , H U A W E I , N E C P R E S E N T A T I O N T I T L E 10 2 0 X X 0 20 40 60 80 100 120 Safety Uses(%) Security(%) Quality(%) Honesty(100) Safety, Security, Quality, Honesty Robi ZTE Huawei NEC
  • 11. THE WAY TO GET STARTED IS TO QUIT TALKING AND BEGIN DOING. Walt Disney
  • 12. T H A N K Y O U Md. Baha Uddin baha4keng@gmail.com Youtube/TechTalkBD P R E S E N T A T I O N T I T L E 12 2 0 X X