Your cart is currently empty!
Category: Onboarding
-
How to use Fridge and TV Guards to avoid Power Surge on Laptop(s)
Introduction
Electricity is one of the most important advancements of modern life. It powers nearly everything around us ; from lights , cooking and heating in our homes to the growing use of electric vehicles and digital tools i.e laptops,Televisions(TVs) and Fridges. Because itās so essential to daily living and economic progress, having a stable and dependable supply is a necessity. Although power companies work hard to keep things running smoothly, unexpected events like surges or outages can still occur and interrupt service.
Power Surge
A power surge happens when the flow of electricity suddenly increases beyond the normal level. In most Countries the standard voltages for electrical appliances are designed to work with voltage between 220 volts and 240 volts. When a much higher amount of electricity suddenly flows through the wires into your devices, itās called a power surge. These surges can be small or very strong, and they often reduce the performance of your electronics or even damage them completely if they are plugged in.
How Power Surges Happen
Power surges usually can happen in the following ways:
- when the supply of electricity is briefly cut and then suddenly comes back.
- when there is a quick rise in voltage caused by either internal problems or external events.
- when there is a sudden stop in increased power flow, causing electricity to move backward through the system.
These surges can be as small as a slight rise above the safe level of around 240 volts, or as extreme as several thousand volts ā for example, when lightning strikes power lines or a transformer during a storm
Causes of Power Surge
Lightning Strike
When lightning strikes, it produces a very large amount of electricity and millions of volts in just a few seconds. If the lightning hits a power line, transformer, electric pole, or even the ground close to them, the sudden electrical energy can travel through the power cables and enter homes or buildings. One way this causes a power surge is when lightning hits power lines directly. This sends a powerful burst of electricity through the whole power system, which quickly reaches houses and other places connected to the grid
Electrical Overload
Electrical overloads happen when you plug in too many devices on the same power line or extension cord or on a single circuit, causing it to draw more electricity than it can handle. This is common in homes where many appliances are connected to one socket. When this happens, the circuit can get overwhelmed, and a power surge may follow as a large amount of electricity suddenly flows through, creating a spike in voltage.
Faulty Wiring
Damaged or poor-quality wiring inside a building can cause power surges. This usually happens when wires are broken, exposed, or not installed properly. The problem is that you often canāt see faulty wiring because itās hidden behind walls, so it may go unnoticed until something goes wrong.
What problem pattern a Fridge and TV Guard solves
- Surge Protection: To keep your TV/Fridge, Electrical applicances and home entertainment equipment safe from sudden spikes in electricity caused by storms or problems in the power supply.
- Voltage Stabilization: Keeps the voltage steady, protecting your devices from sudden changes in power and making sure they get a consistent and reliable electricity supply.
- Lightning protection: When lightning causes a sudden surge in voltage (a spike in electricity), the guard automatically disconnects your electrical appliances from the power source. This helps prevent high voltage from reaching and damaging the appliances.
When to use the Fridge and TV Guard
The Fridge and TV Guard should be put in use always as they protect your appliances from sudden voltage changes, power surges, and low or high voltages. These guards automatically disconnect power when itās unsafe and reconnect only when the voltage is stable hence, helping prevent damage and extend the life of your fridge, TV, and other electronics. They are safe, reliable, and work best when kept plugged in continuously.
Step By Step: Fridge and TV Guard Installation
If you have already installed any surge protection device in your house you can skip this steps.
- For you to install(new installation). First Ensure you have purchased the surge protection device i.e fridge guard, TV guard, HiVolt Guard. You can purchase them from your local shop, some online shops i.e jumia. They come from various brands and at different prices. You can refer some of the available surge protectors and their respective prices
- After Purchase, unwrap it and connect it directly to your power source or circuit i.e wall socket, before any other electrical appliance is connected. Your Electrical appliances should be connected to the surge protector(Fridge/TV Guard/HiVolt Guard) and not the power source/circuit.
-
Employe Benefit Equipment of Portable Power Station User Guideline
CAUTION
Please read carefully and understand every single words inside the paragraph before you use the portable power station.
Disclaimer
DDM Group shall not be held responsible or liable for any loss, theft, explosion, or damage caused by the portable power station, nor for any third-party liabilities arising from such incidents. Furthermore, DDM Group will not bear the cost of repair or delivery associated with fixing the portable power station. Users are solely responsible for the proper handling, maintenance, and security of the portable power station at all times.
Portable Power Station Model Number
The Portable Power Station Model Number will be provided to you together with the Portable Power Station. Make sure you go to its official website and read through the specifications before you bring it to production:
The consequences of portable power station explosion
The consequences of a portable power station explosion, such as one with a 600W inverter and 268Wh capacity, depend on several factors, including the battery type, the surrounding environment, and the cause of the explosion. Here’s a general overview:
- Magnitude:
- The explosion of a lithium-ion battery, can release significant energy due to thermal runaway. This process involves rapid overheating, gas release, and potential ignition.
- The magnitude of the explosion could cause fire, smoke, and debris, potentially damaging nearby objects and structures.
- Radius:
- The immediate blast radius might be limited to a few meters, but the fire and heat generated could spread further, especially in a confined space like a residential apartment.
- Toxic fumes from burning lithium-ion batteries can also pose health risks to individuals in the vicinity.
- Potential Consequences:
- Property Damage: Nearby furniture, walls, and electronics could be damaged or destroyed.
- Health Risks: Burns, inhalation of toxic fumes, and injuries from flying debris are possible.
- Fire Spread: Inflammable materials in the apartment could ignite, leading to a larger fire.
To mitigate risks, always follow safety guidelines, such as avoiding overcharging, keeping the device away from heat sources, and storing it in a well-ventilated area. If you suspect a battery issue, discontinue use immediately and consult the manufacturer. Let me know if you’d like more safety tips!
User Guideline for the Portable Power Station
Reading the user guide for a portable power station is essential to ensure safe, efficient, and effective usage of the device. The guide provides detailed reminders on
- Setup
- Operation
- Maintenance
This guideline helps you avoid potential hazards like explosions, electrical malfunctions, or improper handling. It also highlights important safety precautions, such as where to place the device and how to charge it correctly to prevent overheating or damage. Byunderstanding the features, limitations, and troubleshooting steps detailed in the guide, you can maximize the lifespan and reliability of the portable power station while minimizing risks and inconveniences. It’s a valuable resource for anyone who wants to use their device confidently and responsibly.
1. Explosive Risks of the Portable Power Station
- Heat and Fire Hazards: Avoid exposing the power station to high temperatures, open flames, or prolonged direct sunlight.
- Electrical Hazards: Never disassemble, modify, or mishandle the power station to prevent electrical risks.
- Liquid Exposure: Keep the device away from water or other liquids to avoid short circuits or damage.
2. Checking the Parts and Accessories of the Portable Power Station
Before usage, inspect all components for completeness and condition:
Parts
- Power Station Body: Ensure the device has no visible damage.
- Power Cord: Verify the cord is intact and operational.
- Mobile App: Download and install the BLUETTI app for monitoring and smart control.
- Ports and Interfaces: Ensure the device has all ports and Interfaces that are working properly with no defects.
- LCD screen:Ensure the LCD screen is not broken and is in good state.
3. Reminders During Charging
Power Outage During Charging:
Whenever there is a power outage during charging you need to the Power station status thus the if you were charging using the AC port it will stop charging,ensure the LCD screen shows that there in no input ,If you have a solar panel you should immediately switch to charging your power station via the solar panel. You can also disconnect non essential devices to preserve power and prioritize essential devices.
How to Check Charging Status:
- Monitor the charging progress using the power stationās display screen or the BLUETTI app.
- Ensure the charging indicator is active to confirm proper operation.
Any health status checking meter or device
For advanced health status checking you can use this listed devices
a). Multimeter (For Voltage & Current Checks)
- MeasuresĀ battery voltageĀ (should be ~12.8V when fully charged).
- ChecksĀ solar/car input voltageĀ (should match specs).
- TestsĀ output consistencyĀ (AC/USB ports).
b). Capacity Testers (For True Battery Health)
- Devices likeĀ ZKETECH EBC-A20Ā orĀ OPUS BT-C3100Ā can:
- MeasureĀ actual remaining capacityĀ (vs. rated 268Wh).
- DetectĀ battery degradationĀ (if capacity drops below 80%).
C. Infrared Thermometer (For Temperature Checks)
- Ensures the battery isnāt overheating (>40°C / 104°F is risky).
- Useful duringĀ fast chargingĀ orĀ high-load usage.
Unplug After Full Capacity:
- Disconnect the power station once it reaches 100% to prevent overcharging or unnecessary wear on the battery.
Do Not Output During Input:
- Avoid charging external devices while recharging the power station to ensure safety and maintain charging efficiency.
4. Usage as a Portable Power Supply
- Determining Compatible Devices:
- Check the wattage of your electronic devices and ensure their total consumption does not exceed the 600W output capacity.
- (Give example on how long it will last if charging a mobile / router , table light and laptop at the same time for a 600W ,268Wh portable power station??)
- Checking Electricity Flow:
- Use the display screen or BLUETTI app1 to verify smooth power supply and proper charging.
- Identifying Abnormal Situations:
- Look out for error codes, unusual sounds, or overheating during use. Stop usage if such issues occur.
- (Give Example??)
- Handling Power Outage During Charging:
- Charging will automatically resume when the power is restored; ensure the connection remains secure. (Please verify??)
- Placement Guidelines:
- Idle: Store the power station in a cool, dry place, away from moisture and direct sunlight. (Please suggest to put into a sealed box??)
- Recharging: Place it on a stable, ventilated surface to prevent overheating.
- Charging Other Devices: Ensure a flat and safe surface, away from flammable materials.
- (When using or charging, put somewhere faraway from any living creature, or find something to hide it ??)
5. Travel with the Portable Power Station
- Fully charge the power station before traveling.
- Use a protective case or cover for transportation to prevent physical damage.
- Check travel regulations for carrying power stations, especially in air travel (e.g., airline restrictions on battery capacity).
6. Sharing the Usage of the Portable Power Station
In case you should share the Portable Power Station to others
- You are not supposed to travel the Portable Power Station to non-DDM Staff home.
- If anyone want to share the usage of the Portable Power Station , he/she should only stay in your home.
- Check the electronic device of the borrower before he/she plug into the portable power station.
Footnotes
- Only if you are using BLUETTI portable power station ā©ļø
-
How to Assign Remote Desktop Access Rights to Technical Support
Definition
What Problems Remote Desktop Access Solves
Step By Step – As a Assignor
Prerequisite
- Chrome Remote Desktop installed in Google Chrome
Step By Step
Step By Step – As a Assignee
Prerequisite
- Chrome Remote Desktop installed in Google Chrome
Setup Process for the Assignor (Granting Access)
Step 1: Install Chrome Remote Desktop
Google Chrome
Ā >remotedesktop.google.com
- Ā
Set up remote access
Ā >and install the Chrome Remote Desktop extension.
access - Follow
on-screen instructions
to complete the setup.
Step 2: Enable Remote Access
-
Chrome Remote Desktop.
-
Set up Remote Access
Ā >Turn On
Choose a name
>Next.
Choose a PIN
Ā >start
Ā <<at least 6 digits>>Ā for security.
Step 3: Share Access with the Assignee
chrome Remote Desktop
Ā >Remote Support
Ā >Share this screen
Ā >Ā Generate Code
- Send the generated
Access Code
to the Assignee.
Step By Step – As a Assignee
Step 1: Open Chrome Remote Desktop
-
Chrome
>remotedesktop.google.com/support
Connect to another computer
>Access Code
>Connect
Step 2: Control the Remote Computer
- Once connected, the Assignee can fully control the Assignorās computer.
- The Assignor can revoke access anytime by clicking
Stop Sharing
Disconnecting the Remote Session
- Close the
Chrome Remote Desktop tab.
- The Assignor can click
Stop Sharing
to end the session.
Troubleshooting Tips
- Ensure both computers are online.
- Verify
Google Chrome
andChrome Remote Desktop
are updated. - Restart
Chrome Remote Desktop
if connections fail. - Check that the correct
Access Code
is used
Footnotes
-
Employee Benefit in DDM Group
Introduction
The principal of decising the degree of Employee Benefit (
v20250110
) provided to the employee in DDM Group is based on the contribution that the employee had been delivered to the Company.
Employee Benefits
Education
Amazon Kindle Book Store A/c
Amazon Kindle Book Store account is an Amazon A/c owned by DDM Group which can be regarded as a Book Library storing more than 50 purchased e-book since 2017 covering following topics:
- Relational Database
- Web Server
- WordPress
- SEO
- History
- Javascript Related
- Python
- Data Engineering
- Cloud Architect
- HTTP
- Graph Database
- Google Analytics
- Google Tag Manager
- Many others…
Eligibility
Capability Eligibility Amazon e-Kindle Book Store A/c Access Immedately after the onboarding procedures are completed Book Purchasing Request 1.) One book every 3 months After probation period. While you (as an employee) are welcome to suggest a book purchase list , it is always recommended (as an employee) to read the books already on-shelf. While the existing books may not be the latest or updated one, you can always find the added-value of the latest technology by looking back to the history and development curve of this particular technology, due to the fact that the latest technology is always invented to solve the problems found in the previous version.Ā Being familiar with both previous and latest technology version are imperative.
As a virtuous citizen in DDM Group, please get use of the scarce resource by fully reading and comprehending the book as much as you can after you have purchased it book.
If you are not sure whether the book is suitable for you, please download the sample book before you submit a book purchasing request.
Rules of purchasing
- All books , no matter related to your professional or not, are welcome
- Maximum USD$70 per book.1
- Only the Book in Amazn e-Kindle version (i.e. physical paperback will not be considered)
- Kindly remind that do not read the book during office hours, unless othewised instructed.
- Do NOT purchase directly in Amazon Book Store by yourself. Always raise the request and let the account owner do the purchase for you.
Online Course Certificate
Nowsaday there are infinity number of online course published by renowned educational institutions are free of charge. In fact, anyone can learn any knowledge with very little or even no cost.
There are some international online course published by accredited top-tier educational institution in the world, which are free of charge but still maintain its standand and quality as below:
- Edx
- Coursera
- AWS Skill Builder
- Neo4j Courses
- SEMRush Free online marketing courses
- Google Skillshop
- Meta Blueprint
- Many others.
In fact , as long as you try to search in Google, you can find a myraid of free online courses for you to study. Only the sky is your limit.
While we are not going to sponsor you for any paid online courses, the attendance or completion of the free online courses is one of the imperative factors of your career promotion or salary adjustment opportunity during the appraisal.
However, if there is a strong reason you should seat into a paid online courses or public examation, for example, AWS Certified Cloud Partitioner, you can submit a sponsorship request and we will consider the level of sponsorship based on the following criteria:
- Past contribution you delivered to DDM Group
- Employement Period in DDM Group
- How the Certicate faciliates you to contribute to DDM Group after you have acquired the desgination.
Again, please understand that in DDM Group the Certificate or designation is always prioritised below the actual capability that you can utilized in your daily tasks.
Equipment and Infrastructure
In order to facilitate you with a well-equipped and safety environment to perform your daily task, you can raise a suggestion if you need any kinds of sponsorship in following items:
- Internet Data Plan
- Microphone or Headset
- Keyword or Mouse
- Video Camera
- Router
- Electricity Power Bank
- Laptop
- Mobile Phone
- WiFi Amplifier
- SaaS
- Medical Support (employees and his/her financial dependent)
Following factors affecting the sponsorship level of the items:
- Employment Period in DDM Group
- Past Contribution delivered to DDM Group
- Urgency
- NecessityĀ
- Return on Investment
- Frequency of Sponsorship request
- Financial Conditionl of DDM Group
Sponsorship Type
Sponsorship Type Description Full Sponsorship Unconditional full sponsorship pay upfront (or by instalment , if applicable) Partial Sponsorship Unconditional partial sponsorship pay upfront (or by instalment, if applicable) Fully Finance Pay Back 1.) Finance upfront.
2.) Contra off financed amount via future salaryFully Finance Work Back 1.) Finance upfront
2.) Settle the financed amount later on via over time work or any other kinds of mutually agreed contribution.Conditional Fully Sponsorship 1.) Sponsorship pay upfront
2.) Contra off the sponsored amount via future salary if the employee contract is terminated (no matter intentionally or unintentionally)These sponsorship shall be interpreted and enforced by DDM Group, which holds the final decision-making authority.
How to apply the sponsorship
Send an Email to your immedate supervisor and elaborate the reasons with following aspects:
- What item you request to sponsor
- Item specification
- Item Market Price (with reference)
- Suggested Sponsorship
- Sponsorship Type
- Sponsorship Amount
- Payment Terms
- Reasons justifying your Request2
- When you can submit the justification or documentation after your purchase.
As a virtuous citizen in DDM Group, please always understand the resource is scarce .You should always present documentation or justification after spending the sponsorship amount. Any abuse or misuse of the sponsorship amount will be regarded as a breach of agreement and may result in disciplinary action, including the termination of the sponsorship or employment contract and the requirement to repay the misused funds.
Footnotes
-
Anti-Virus Software Installation
Introduction
The objective of installing anti-virus software on employee laptops is to ensure the security and integrity of company data and systems. By providing comprehensive protection against malware, viruses, and other malicious threats, anti-virus software helps prevent data breaches, system disruptions, and unauthorized access.
Avast Anti-Virus
Avast Anti-Virus is a comprehensive security solution designed to protect your devices from various online threats. We will adapt Avast in our Anti-Virus Software installation procedure.
What Problem Pattern a Anti-Virus Software Solves
- Core Shields: Provides real-time protection against viruses, malware, and adware.
- Smart Scan: Scans your device for vulnerabilities, hidden threats, and suspicious files.
- CyberCapture: Automatically sends suspicious files to the cloud for analysis and provides a cure if needed.
- Behavior Shield: Alerts you if any of your apps start behaving suspiciously.
- File Shield: Scans files for threats when they are added or opened.
- Wi-Fi Network Security: Helps protect your home Wi-Fi network from intruders.
- Web Shield: Blocks malicious websites and phishing attempts.
- Automatic Updates: Keeps your virus definitions and software up to date
Step By Step – Avast Installation
If you have already installed any anti-virus software in your laptop, you can skip this step.
Install Avast Install
Continue
ĀCONTINUE WITH FREE
RUN FRIST SCAN
Step By Step – Avast Configuration
RUN SMART SCAN
Avast
>Status
RUN SMART SCAN
This computer is protected
Virus Scans
Avast
>Protection
Virus Scans
Full Virus Scan
1Scan history
2Files tested / files infectedĀ āĀ
3RESOLVE ALL
DONE
Core Shields
Avast
>Protection
Core Shields
Property Default Value File Shield Enabled Behavior Shield Enabled Wed Shield Enabled Mail Shield Enabled
Firewall
Avast
>Protection
Firewall > ACTIVE
- Check and block any suspicious running program.4
Network Inspector
Avast
>Protection
Network Inspector
- <<Connected_Network>>5
SCAN THIS NETWORK
- Raise out to your I.T Department if there is any issue found.
- Example of issue in below:
Network Issue Solution Weak WI-FI Password Change to a strong WI-FI Password Example of Network Issue
Footnotes
- While the full scan takes time to run, you can leave the scanning in backend and carry out another task. ā©ļø
- Go to tab “Scan History” after the Full Scan is completed. ā©ļø
- Press “ā” only if at least 1 file is infected. ā©ļø
- If you have no idea about what program is suspicious, please cap screen and send to your I.T department. ā©ļø
- You only need to scan the connected network. i.e. You DO NOT need to scan all the networks which can be detected by your device. ā©ļø
-
Non-Disclosure Agreement for Employee in DDM Group
This Non-Disclosure Agreement (the “Agreement”) , version
v20250108
, is made and entered into as of the Submission Date of the Form, by and between Diamond Digital Marketing Group (“Disclosing Party”), and the Employee (“Receiving Party”).
1. Definition of Confidential Information
For purposes of this Agreement, “Confidential Information” includes all information or material that has or could have commercial value or other utility in the business in which Disclosing Party is engaged. Confidential Information also includes all information of which unauthorized disclosure could be detrimental to the interests of Disclosing Party, or its clients, vendors, or associated organization or individual, whether or not such information is identified as Confidential Information by Disclosing Party.
2. Exclusions from Confidential Information
Receiving Party’s obligations under this Agreement do not extend to information that is:
- Publicly known at the time of disclosure or becomes publicly known through no fault of the Receiving Party;
- Discovered or created by the Receiving Party before disclosure by Disclosing Party;
- Learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party’s representatives; or
- Disclosed by Receiving Party with Disclosing Party’s prior written approval.
3. Obligations of Receiving Party
Receiving Party shall hold and maintain the Confidential Information in strictest confidence for the sole and exclusive benefit of the Disclosing Party. Receiving Party shall carefully restrict access to Confidential Information to employees, contractors, and third parties as is reasonably required and shall require those persons to sign non-disclosure restrictions at least as protective as those in this Agreement. Receiving Party shall not, without the prior written approval of Disclosing Party, use for Receiving Party’s own benefit, publish, copy, or otherwise disclose to others, or permit the use by others for their benefit or to the detriment of Disclosing Party, any Confidential Information.
4. Time Periods
The nondisclosure provisions of this Agreement shall survive the termination of this Agreement and Receiving Party’s duty to hold Confidential Information in confidence shall remain in effect until the Confidential Information no longer qualifies as confidential or until Disclosing Party sends Receiving Party written notice releasing Receiving Party from this Agreement, whichever occurs first. These obligations extend even after the employee’s contract has ended, ensuring that the protection of Confidential Information continues beyond the duration of employment.
6. Severability
If a court finds any provision of this Agreement invalid or unenforceable, the remainder of this Agreement shall be interpreted so as best to effect the intent of the parties.
7. Integration
This Agreement expresses the complete understanding of the parties with respect to the subject matter and supersedes all prior proposals, agreements, representations, and understandings. This Agreement may not be amended except in writing signed by both parties.
8. Waiver
The failure to exercise any right provided in this Agreement shall not be a waiver of prior or subsequent rights.
9. Mutual Agreement
Both parties hereby agree to the terms and conditions outlined in this Agreement.
-
Employees Code of Conduct in DDM Group
Introduction
At DDM Group, we are committed to maintaining the highest standards of integrity, professionalism, and ethical behavior in all of our business activities. Our Code of Conduct serves as a guide for all employees, outlining the principles and values that underpin our corporate culture and decision-making processes. By adhering to these guidelines, we ensure a respectful, fair, and compliant work environment that fosters trust and collaboration. This Code of Conduct (
v20250108
) applies to all employees, contractors, and stakeholders, and we expect everyone to embrace and uphold these standards in their daily actions and interactions.
No Part-Time or Double Job During Office Hours
Employees are expected to dedicate their full attention and effort to their responsibilities and duties during office hours. To ensure optimal performance and commitment, employees are not permitted to engage in part-time or double jobs during their designated working hours with the company. This policy is in place to prevent conflicts of interest, minimize distractions, and maintain a high level of productivity and focus within our organization.
Any employee found to be working another job during office hours will be subject to disciplinary action, up to and including termination of employment. We encourage employees to discuss any potential conflicts with their manager and to seek approval before taking on additional employment outside of regular working hours.
Non-Disclosure Agreement (NDA) Requirement
We recognize the importance of safeguarding our confidential and proprietary information. To ensure the protection of sensitive data and maintain the integrity of the business operations of both DDM Group and our clients, all employees are required to sign a Non-Disclosure Agreement (NDA) upon commencement of their employment. This agreement outlines the obligations of employees to maintain the confidentiality of all information obtained during their tenure with the company. Employees must not disclose, share, or use any confidential information for personal gain or for the benefit of any third party, both during and after their employment with DDM Group. Compliance with this policy is mandatory, and any breach of the NDA will result in disciplinary action, up to and including termination of employment.
Use of Generative AI Tools for Creativity
We acknowledge the potential of generative AI tools to enhance creativity, productivity, and innovation within our organization. However, it is imperative to use these tools responsibly and ethically. The following guidelines are established to ensure proper use of generative AI tools:
- Accuracy and Verification: Employees must verify the accuracy of the content generated by AI tools and ensure it aligns with our company’s standards and values. Any factual information must be cross-checked for correctness.
- Originality and Plagiarism: Content generated by AI tools should be original and not infringe on the intellectual property rights of others. Employees must avoid plagiarism by ensuring proper attribution and avoiding the use of copyrighted material without permission.
- Transparency: Employees should be transparent about the use of AI tools in their work. This includes disclosing when AI-generated content is used and clearly distinguishing it from human-generated content.
- Ethical Use: AI tools should be used ethically and responsibly. Employees must avoid using AI tools to create or disseminate harmful, misleading, or inappropriate content.
- Human Oversight: Generative AI tools should complement, not replace, human judgment and creativity. Employees are responsible for reviewing and refining AI-generated content to ensure it meets quality standards and aligns with the company’s objectives.
- Compliance with Policies: The use of AI tools must comply with all applicable company policies, industry regulations, and legal requirements.
Allowed Generative AI Used Cased
- Generative AI Is requested to apply as per Instruction
- Grammatical correction or rephrasing sentence / paragraph written or edited by human.
- Graphical Processing.
- Reference , Idea and directional framework of the Task.
- Query on the answer of anything.
Prohibited Generative AI Used Case
- Comment after reading.
- Generative AI is explicitly prohibited as per instruction.
- Diretly copy and paste the answer directly from the Generative AI tools in no-brain and without any human comprehension or human modification.
- Task explicitly mentioned to use human creativity
Failure to adhere to these guidelines may result in disciplinary action. By following these principles, we can leverage the capabilities of generative AI tools while maintaining the integrity and ethical standards of our organization.
Code of Conduct for Remote Work
We are committed to maintaining high standards of professionalism, productivity, and ethical behavior, even when working remotely. The following guidelines are designed to ensure a seamless and effective remote working environment for all employees.
- Punctuality and Attendance: Employees are expected to adhere to their scheduled working hours and be available during core business hours. They should attend virtual meetings and appointments on time, and promptly inform their managers of any deviations from their work schedule.
Examples of scenario that should report to their supervisors
- Personal illness or injury.
- Medical appointment.
- Family emergency.
- Home emergency.
- Religious observances.
- Working equipments out of orders / being stolen / being damaged.
- Electricity outrage
- Internet connection inavailability
- Ad-hoc personal leave
- Public holidays of your country.
Employees are required to promptly report to their supervisors in the event of any unforeseen circumstances that prevent them from fulfilling their work duties. In case anyone did not inform his/her supervisor in advance, and did not show up within 2 hours after his/her supervisor contacted him/her, a hearing session will be provided to him/her for self-dense afterwards. If the employee fails to provide strong reasons for their absence, the penalty may include disciplinary action, up to and including termination of the employment contract.
- Integrity: Employees must demonstrate integrity in all their remote work activities. This includes being honest about their work hours, accurately reporting their progress, and delivering high-quality work. Any form of dishonesty or unethical behavior is strictly prohibited.
- Professional Conduct: Employees should maintain the same level of professionalism as they would in the office. This includes dressing appropriately for video calls, using professional language, and treating colleagues with respect.
- Communication: Clear and consistent communication is crucial in a remote work setting. Employees should regularly check in with their managers, respond promptly to messages and emails, and participate actively in virtual meetings.
- Data Security: Employees must ensure the security of company data while working remotely. This includes using secure networks, encrypting sensitive information, and adhering to all company data protection policies.
- Work Environment: Employees should set up a dedicated, comfortable, and distraction-free workspace to facilitate productivity. They should ensure that their work environment complies with health and safety regulations.
- Accountability: Employees are responsible for managing their time effectively and meeting performance expectations. They should use productivity tools and techniques to stay organized and focused on their tasks.
- Work-Life Balance: While working from home offers flexibility, employees should establish clear boundaries between work and personal life to maintain a healthy balance. Taking regular breaks of reasonable duration and adhering to set working hours is encouraged and allowed. This approach helps prevent burnout, promotes mental well-being, and ensures that employees remain productive and focused during their working hours. It is important for employees to manage their time effectively and avoid letting work encroach on their personal life. Employees should also communicate with their supervisor to ensure alignment on work schedules and expectations.
Conclusion
The Code of Conduct at DDM Group embodies the values and principles that guide our actions and decisions. By adhering to these standards, we foster a respectful, ethical, and productive work environment. Each employee’s commitment to these guidelines is essential to maintaining the trust and integrity of our organization. We encourage all employees to uphold these standards in their daily interactions and to seek guidance when needed. Together, we can create a positive and supportive workplace that reflects our shared dedication to excellence and ethical behavior.
-
Internet Speed Test
Definition
Internet speed refers to the rate at which data is transferred between your device and the internet. It’s typically measured in megabits per second (Mbps). There are two key aspects of internet speed:
- Download Speed: The rate at which data is received from the internet to your device.
- Upload Speed: The rate at which data is sent from your device to the internet.
Why Internet Speed Test
Enhance Working Efficiency
Imagine that in our daily life almost 90% of our working time relies on the internet connection. To increase th internet speed can significantly increae our working efficiency
Internet Service Provider (ISP) Cost Estimation
While the monthly ISP Cost is highly depended on the internet speed, to know the current internet speed can let us estimate how much monthly cost we have to increase in order to increase the internet speed
Step By Step on How to Test Internet Speed
Home/Office WiFi
- Connect your laptopt to your Home/Office WiFi. (i.e. NOT to connect WiFi from the Hotspot of your Mobile Device)
- If there is WiFi network with the suffix 5G (e.g. WiFi Network Name = TPLink_5G), always choose this network to do the test.
- https://www.hkbn.net/personal/broadband/en/speedtest
- Record
DOWNLOAD Mbps
- Record
UPLOAD Mbps
HKBN Internet Speed Test
Your Mobile ISP
- Use directly your Mobile Device Data Plan from your ISP. (i.e. NOT using the Hotspot in your Mobile Device and receive WiFi from shared in your home/office.)
- https://www.hkbn.net/personal/broadband/en/speedtest
- Record
DOWNLOAD Mbps
- Record
UPLOAD Mbps
Mobile ISP Internet Speed Magnitude of your WiFi Connection
- Login your Desktop Device
Desktop Tools Bar Connected WiFi - Check if the Receiving bar is full (i.e. You can see 4 waves)
How to speed up your Internet connection speed
Elminiate bottleneck of your Router
The Max Throughput, Bandwidth and WiFi Standard (e.g. WiFi 7 in 2024) will affect the compatibility between your router and the internet connection of your ISP. A fast internet connection but with limited router Max Throughput , Bandwidth and WiFi Standard will slow down your internet connection.
How You Router May Look Like What the Specification Label Look Like How to check the WiFi Standard of your Router
Check out the Router Brand and Model Number from the Router Specification Label (which normally sticked in the bottom of your Router) and the search the WiFi Standard in Google. When the result show up in Google, please double check the Brand and Model Number in the result is same as the Brand and Model Number that you are seeking for.
How to check the WiFi Standard of your Destkop Device
- Login your Desktop Device
Desktop Tools Bar - Find out the connected WiFi Network
- š
Connected WiFi WiFi Specification In Desktop - Following Properties affects the Internet Speed:
Protocol
Network band
Link speed (Receive/Transmit)
How to check the WiFi Standard of your Mobile Phone
- Search in Google the WiFi Standard of your Mobile Phone Brand and Model Number
Example of Mobile Phone Wifi Standard (For Mobile Device – Samsung S22)
Choose appropriate Bandwidth from the WiFi Connection
You may wonder why you can always find 2 WiFi Networks available for connection in our home or office, which they usually show their WiFi Network name as below:
- <<ROUTER_MODEL>>
- <<ROUTER_MODEL>>_2G
- <<ROUTER_MODEL>>_5G
While I don’t want to go through a physics class to explain what is the difference between the two, the rule of thumb is that if both of two networks’ connection level (i.e. weak or strong) are the same , always choose the 5G. The āGā in fact is a unit of the frequency which means:
Higher Frequency > Higher Power > Faster WiFi Transmission Speed
Connected WiFi
Location of your Device
There are 2 factors affecting the transmission speed of your WiFi in your home or office:
Distance between the Router and Your Device
Every router has its maximum distance of transmission. Not surprisingly, the closer your device is to the router, the faster internet speed you will enjoy. If in reality your device cannot stay close (e.g. 5 meters) to the router, you can consider
- Switch to the WiFi Network with suffix of “5G“. (e.g. TPLinkP84_5G”)
- Purchasing a WiFi Range Extenders in your home/office.
Obstacles between the Router and Your Device
Even though your device stays close enough to the router, if following objects are located between the device and the router, the WiFi connection speed will be slow down:
- Microwave (which is running)
- Glass
- Mirror
- Water
So please stay away from these objects if you want to have a faster WiFi speed. Or if it is not feasible to do so, please consider either a stronger Router or WiFi Amplifier.
Firmware of your Mobile Device
The Firmware of your mobile device will always affect the WiFi connection speed in aspects of its Network Driver, Security Update and Bug Fixing. So simply update the Firmware of your mobile device may speed up your WiFi connection.
Whenever there is a updated version of a Firmware, your device will automatically notify you as long as you are online. So simply don’t ignore the Firmware update notification shown in your device.