<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <generator uri="https://jekyllrb.com/" version="3.10.0">Jekyll</generator>
  <link href="https://www.tekore.com.br/en/feed.xml" rel="self" type="application/atom+xml" />
  <link href="https://www.tekore.com.br/en/" rel="alternate" type="text/html" />
  <updated>2026-05-02T15:15:57+00:00</updated>
  <id>https://www.tekore.com.br/en/</id>
  <title type="html">Tekore (English)</title>
  <subtitle>By Anderson Gusmão</subtitle>
  
  
  <entry>
    <title type="html">Why you should focus on your strengths.</title>
    <link href="https://www.tekore.com.br/en/psychology/2026/05/02/strengths/" rel="alternate" type="text/html" title="Why you should focus on your strengths." />
    <published>2026-05-02T13:59:56+00:00</published>
    <updated>2026-05-02T13:59:56+00:00</updated>
    <id>https://www.tekore.com.br/en/psychology/2026/05/02/strengths</id>
    <content type="html" xml:base="https://www.tekore.com.br/en/psychology/2026/05/02/strengths/">
      This article proposes a shift in perspective. Instead of viewing development as a process of mitigating weaknesses, it argues that true progress—the kind that generates exponential impact—stems from the deliberate deepening of our strengths. Natural talents, when recognized and consistently cultivated, have the potential to take us much further than a continuous effort to simply stop being bad at something.

Paradigm Shift

During a career counseling session, I was recommended the book “StrengthsFinder 2.0” by Donald O. Clifton. The author was one of the pioneers in performance research and in the development of corporate tools aimed at discovering natural talents.

The work brings a powerful proposal regarding personal and professional growth. Instead of spending energy trying to fix weaknesses, the methodology suggests that focus should be directed toward deepening what we already do well. The process begins with an assessment that identifies, among 34 possible talents, the individual’s top five. Based on this result, the book offers a detailed guide on the characteristics of each talent and practical strategies to transform them into structured strengths.

Clifton’s argumentative basis is supported by real-life examples of professionals who achieved mastery in their fields but, when trying to replicate the same level of success in disciplines outside their natural aptitudes, were unsuccessful. Analyzing my own career path, I was able to identify this pattern in several situations.

A Necessary Counterpoint

While the perspective proposed by the book is well-founded, it is prudent to recognize that it is not an inflexible rule. There are scenarios where mitigating a critical weakness is essential—for example, when a limitation prevents an individual from performing fundamental tasks for their role. In these cases, the deficit must be leveled before energies are redirected exclusively toward strengths.

The main goal, however, is to deconstruct the utopian belief that “you can be excellent at absolutely anything, as long as you try hard enough.” In practice, this notion often acts as a source of frustration.

True engagement requires dedication and a strong connection with what one does. If there is no natural affinity for a certain activity, no matter how much effort is put in, the result will tend toward the average. It is possible to reach a functional level, but hardly the level of excellence that defines the leaders of their respective fields.

The Path to Mastery

Reflecting on this topic, I was reminded of an excellent video from Seiiti Arata’s channel, titled “How to Learn Anything Difficult.” It is a material that demystifies mastery: there are no magic formulas or shortcuts, but rather a grueling process of dedication, time, and consistency.

This leads us to the conclusion that extraordinary success is the consequence of a sustainable effort over the long term. This level of persistence is rarely maintained without a genuine appreciation for the field of work. When the activity itself is essentially tedious or incompatible with our inclinations, discipline inevitably runs out. Natural talent is what provides the initial ease, but it is the continuous investment in these strengths that paves the definitive path to mastery.

The Pillar of Self-Knowledge

“Know thyself” is a philosophical maxim from Ancient Greece, inscribed at the Oracle of Delphi and immortalized by Socrates. It invites us to inner reflection and to the understanding of our own limits and virtues, being considered the starting point for both wisdom and professional and personal balance.

In this context, practices such as the constant search for feedback, structured self-reflection, and the use of behavioral assessment tools become indispensable. Self-knowledge is the prerequisite for drawing up a strategic action plan aimed at developing strengths. Investing time and energy in discovering one’s own inclinations is the safest step toward building an authentic and high-impact career.

Conclusion

Ultimately, focusing on strengths does not mean ignoring our flaws, but rather recognizing where our potential for return is truly exponential. Mastery requires the combination of natural talent and disciplined effort. By investing in what flows organically from our nature, we stop being workers of mediocrity to become architects of excellence. The path to extraordinary success is, above all, a journey of self-knowledge and the courage to be what we already are at our best.

    </content>
    
    
  </entry>
  
  <entry>
    <title type="html">How does the computer discover what to load when turned on?</title>
    <link href="https://www.tekore.com.br/en/operating-system/2026/05/01/bootloader/" rel="alternate" type="text/html" title="How does the computer discover what to load when turned on?" />
    <published>2026-05-01T21:53:56+00:00</published>
    <updated>2026-05-01T21:53:56+00:00</updated>
    <id>https://www.tekore.com.br/en/operating-system/2026/05/01/bootloader</id>
    <content type="html" xml:base="https://www.tekore.com.br/en/operating-system/2026/05/01/bootloader/">
      In this article, we explore the technical process of computer initialization, detailing the loading of the Master Boot Record (MBR), the disk sector structure, and the implementation of an Assembly bootloader focusing on boot signature validation.

Bootloader Loading

Upon powering on, the hardware executes the Power-On Self Test (POST). Following component validation, the BIOS searches for bootable storage devices. The first physical sector (the initial 512 bytes, known as the boot sector or MBR) is loaded into RAM. The BIOS validates the integrity of this sector by looking for the “magic signature” 0xAA55 in its last two bytes; if present, execution is transferred to this address and the boot process continues.


  ⚠️ Technical Note: Introduced in 1983, the MBR (Master Boot Record) was the dominant standard for decades. Currently, modern systems use the GPT (GUID Partition Table), which overcomes MBR’s partitioning and disk size limitations. For educational purposes, we will use the MBR model in this article.




Disk Geometry and Sectors

To understand data organization, consider the structure of a conventional Hard Disk Drive (HDD). The disk is organized hierarchically into sectors, tracks, and heads.



The MBR (Master Boot Record) is located in the first physical sector of the disk. This sector has exactly 512 bytes of capacity, the space where the first stage (Stage 1) of the operating system bootloader is defined.

Boot Sector Implementation

Bootloader development is typically done in Assembly, ensuring direct control over hardware and memory mapping. Below is an example implementation:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
# ***********************************************************
# Example Boot Sector
# ***********************************************************

.code16
.intel_syntax noprefix
.text
.org 0x0                                        

LOAD_SEGMENT = 0x1000                     # The 2nd stage loader will be loaded at segment 1000h
FAT_SEGMENT  = 0x0ee0                     # The boot disk FAT will be loaded at segment 0x0ee0 
                                          # (9*512 bytes below the 2nd stage loader)

.global main

main:
    jmp short start                       # Jump to the start of the code
    nop                                   # Alignment (nop) for the boot sector header

.include &quot;bootsector.s&quot;
.include &quot;macros.s&quot;

start:
  mInitSegments                           # Initialize memory segments
  mResetDiskSystem                        # Reset the disk subsystem
  mWriteString loadmsg                    # Display loading message
  mFindFile filename, LOAD_SEGMENT        # Locate the 2nd stage file in the root directory
  mReadFAT FAT_SEGMENT                    # Load the FAT table into memory
  mReadFile LOAD_SEGMENT, FAT_SEGMENT     # Transfer the 2nd stage into RAM
  mStartSecondStage                       # Transfer execution flow to the 2nd stage
 
# Boot process failure handling routine
bootFailure:
  mWriteString diskerror                  # Display disk error message
  mReboot                                 # Request system reboot
  
.include &quot;functions.s&quot;
    
# Data and constants definition
filename:    .asciz &quot;2NDSTAGEBIN&quot;
rebootmsg:   .asciz &quot;Press any key to reboot.\r\n&quot;
diskerror:   .asciz &quot;Disk error. &quot;
loadmsg:     .asciz &quot;Loading DevOS...\r\n&quot;

root_strt:   .byte 0,0      # Root directory offset
root_scts:   .byte 0,0      # Number of sectors in the root directory
file_strt:   .byte 0,0      # Bootloader offset on the disk

.fill (510-(.-main)), 1, 0  # Padding with zeros up to byte 510
BootMagic:  .int 0xAA55     # Magic signature for BIOS recognition


Technical Analysis and Boot Signature

The implementation uses specific directives to ensure compliance with the MBR standard. The critical point lies in padding the sector to reach exactly 512 bytes (lines 49 and 50).

Since the volume of instructions and data may vary, it is necessary to dynamically calculate the required padding. The expression used is:
(510 - (.-main))

Expression components:

  . (dot): Represents the current location counter.
  main: The address of the initial entry point.
  (.-main): Calculates the total byte offset generated so far.
  510 - (.-main): Determines how many bytes remain to reach the 510-byte mark.


The final two bytes (511 and 512) are reserved for the 0xAA55 signature. Without this signature, the BIOS will not recognize the device as bootable.

Binary Generation and Loading into RAM

After assembling the source code, a binary file is generated. When the computer identifies a boot device, the BIOS reads the first sector (512 bytes), copies its content to the physical memory address 0x7C00, and begins executing instructions from that address.



Next Steps and Conclusion

Operating system initialization is a multi-stage process. The analyzed code represents Stage 1, whose primary function is to locate and load the subsequent stage into RAM, as demonstrated by the logic starting at line 23.

In future articles, we will detail the later phases, including the transition to Protected Mode and Kernel loading.

    </content>
    
    
  </entry>
  
</feed>
