Nov 24, 2011

CAREERS IN IT:PATHS AND PROFILES

Ever since India made its appearance on the entrepreneurship map with call centres and tier-B software outsourcing companies, IT or information technology has been the buzzword for the technical student diaspora of India. IT has remained the largest employing sector for the millions of engineering graduates India spews out every year. There has been lot of speculation about this field with the recession throwing people out of their jobs, and the media celebrating the loss of IT's boom and lustre and all. But speculation is one thing and facts are another. Before planning your career in IT, you need to know what the game is all about, and have a bigger picture about where things stand.


The dominance of the IT job market is due in part to numerous factors, including the continued explosive growth of the Internet and e-commerce, lower hardware and software prices allowing more companies to upgrade their technology, increased demand for information security specialists due to the amplified severity and sophistication of malicious software and cyber-threats, the advent of smarter applications enabling companies to analyze data and develop business intelligence and the dawn of the mobile computing era.


 In this article, let us take a look at the most popular and paying careers in IT, and the path to reach there, as well as how these job environments would feel like. It is important to clearly identify your career objectives, and develop a learning plan with the necessary skills, degrees, and IT certifications to keep your competitive edge and achieve your goals.


I.T Careers in Demand:


DATABASE ADMINISTRATORS
Database Administrator Online Training
Database Administrators

Database Administrators organize and manage a company's data.

Database administrators ensure that business data is readily available, the database is secure, and database performance satisfies business requirements.
The corporate database is the heart of key business systems that drive payroll, manufacturing, sales, transaction processing and more, so database administrators are recognized, and rewarded, for playing a crucial role in an organization's success. Beyond database administrators' high salary potential, a job in databases offers the personal satisfaction of solving business problems and seeing [in real-time] how your hard work benefits the firm.
A typical database administration learning plan begins with an undergraduate degree in computer science or computer information systems (CIS). A balance of technical, business and communication skills is critical to a database administrator's success, so the next step in a DBA's education is often a master's degree with an information systems concentration, typically an MBA in Management Information Systems (MIS) or CIS. Database administrators continue to learn and advance their career with certifications in one or more of the leading database management systems (DBMS); In-demand database systems include Oracle, Microsoft SQL Server, IBM DB2 & MySQL.

Database Administrator Education Requirements

Database administration positions typically require at least a bachelor’s degree in Computer Information Systems (CIS), Computer Science, Database Administration or a related field of study. Many employers prefer to hire MBAs for database administration jobs; Besides the extra database training, MBAs are familiar with a wide range of business areas, e.g., accounting, marketing, and management, and they're typically more adept at communicating with technical and non-technical employees - two consistent traits of highly successful DBAs. Popular MBA concentrations for database administrators include Management Information Systems (MIS), Database Management, and CIS. Database administrators will further distinguish themselves and advance their careers with specialized training and certifications in the leading database management systems, such as Oracle 11g, Microsoft SQL Server 2008, IBM DB2, Sybase and MySQL
  • Database administrators implement, support, and manage the corporate database.
  • Database administrators create and configure relational database objects.
  • Database administrators are responsible for data integrity and availability.
  • Database administrators design, deploy, and monitor database servers.
  • Database administrators design data distribution and archiving solutions.
  • DBAs ensure database security, including backups and disaster recovery.




    • Database administrators are proficient in one or more of the leading database
      management systems, e.g., MySQL, Microsoft SQL Server, IBM & Oracle.
    NETWORK ADMINISTRATORS
    network administrator training
    Network Administrators

    Network Administrators manage networks and communications systems.

    Network administrators install, support, and manage the computer networks and business systems that keep information flowing. Network admins implement and maintain network hardware & software, identify & solve network problems, and ensure network security, availability & performance standards.
    In challenging economic times, organizations retain and/or hire network administrators to optimize existing networks for reduced costs and increased operational efficiency. During economic recovery and growth, companies purchase new network and communications technologies to gain a competitive advantage, leading to increased demand for network administrators to install, secure and optimize the new systems. This consistent demand for network administrators, independent of economic conditions, has led many employment experts to dub network administrator a "recession proof career."
    The U.S. Dept. of Labor forecasts employment for network administrators to increase by 23% from 2008 to 2018, much faster than the average for all occupations. With demand at an all-time high, it's an ideal time to learn network administration. There are numerous network administration training programs and accredited degrees featuring coursework in contemporary network technologies; 

    Network Administrator Education Requirements

    Network administrators are often required to have at least an undergrad or graduate degree in computer science, network administration, systems engineering,  or a related field of study. Upon completion of a formal education program, network administrators can further distinguish themselves and increase employment and advancement opportunities by earning network-centric certifications, such as CompTIA's Network+, Cisco's CCNA, and Microsoft's MCTS: Server 2008 Network Infrastructure Configuration.
    Fundamental skills and courses to look for in a network administration degree program include systems administration training, LAN & WAN installation & configuration, routing & switching, and some variety of network security training. A networking degree that includes certifications will help you graduate with a distinct competitive advantage. Effective communication skills are also key, as network administrators must be able to easily communicate complex ideas and solutions to both technical and non-technical employees. Beyond these basics, choose a degree with the courses that interest you most, or those featuring networking skills that are hot right now, such as virtualization or cloud computing.
  • Network administrators configure and manage an organization's network.
  • Network administrators implement, monitor, and optimize network security.
  • Network administrators troubleshoot, identify, solve & document network problems.
  • Network administrators install and support employee hard-lines, smartphones, and tablets.
  • Network administrators monitor & optimize the network for optimal speed and performance.
  • Network admins install, configure & maintain network hardware, such as Cisco routers & switches.
  • Network admins install, configure & upgrade network software, such as corporate antivirus programs.



  • WEB DEVELOPER
    web development training
    Web Developer


    Web Developers write code for web pages & web-based applications.
    Web developers create the web pages and web-based applications that comprise the Internet. A basic web development work-flow includes collecting or creating web content (copy, images, multimedia, etc.), planning web site layout and navigation, developing web pages and testing in multiple web browsers, and optimizing the website for peak performance & superior user experience.
    Successful web developers are fluent in the programming languages that fuel the web. All web developers need a command of HTML, Javascript & CSS. It's also helpful to know a server-side programming language, such as PHP, Microsoft .NetVisual Basic, or Java 2 Enterprise Edition (J2EE), to develop complex business and mobile applications. Web developers can further distinguish themselves and increase their earning potential by learning and/or getting certified in one or more of the leading database systems, such as MySQL, Microsoft SQL Server, IBM DB2, or Oracle, to write web applications that interact with the corporate database.
    Web development projects require frequent revisions and enhancements, so web developers need strong communication skills to better interact with project managers, clients, and team members. Creativity and an understanding of color theory and design concepts will also add to your range and value as a web developer. Web developer jobs exist in all settings, including enterprises and government agencies, small to medium-sized businesses, and working alone as freelancers.

    Web Developer Education Requirements

    Hands-on programming experience is the key requirement for securing employment as a web developer. Hiring managers for web development positions will typically ask to see a portfolio with samples of the web pages and applications you've created. Professionals new to web development can learn the requisite programming skills and start building their portfolio through an accredited degree program in Web Design, Web Development, Software Engineering or a related field of study. Fundamental programming skills to look for in a web development education program include HTML, CSS, and JavaScript. Multimedia skills are quickly becoming a standard education requirement for web developers as as well, e.g., Flash Animation. Beyond these basics, prospective web developers should choose a degree program with the focus area(s) that interest them most, such as graphic design, interactive media, Flash animation, and mobile media development. Campus-based programs and online training formats work equally well with web development subject matter.


  • Web developers are fluent in programming languages like HTML, Javascript & PHP.
  • Web developers create, test, and optimize web pages and web-based applications.
  • Web developers use Cascading Style Sheets (CSS) to control the layout of websites.
  • Web developers understand database technologies like MySQL, SQL Server and Oracle.
  • Web developers can integrate corporate websites with the organization's database.
  • Web developers architect (plan) the layout, navigation, and functionality of a website.
  • Web developers communicate with clients and colleagues to troubleshoot and optimize websites.  

  • IT SECURITY SPECIALIST

    best it security specialist training
    IT Security Specialist

    IT Security Specialists Protect an Organization’s Information Systems.

    In an era of increasing security threats, cyber crimes and cyber warfare, enterprises must carefully protect their information assets. IT Security Specialists utilize an in-depth understanding of information security risks, threats and attacks, along with the technologies, policies and procedures needed to design and implement secure computer systems.
    IT security specialists educate employees about computer security, install security software to prevent cyber-attacks, monitor networks for security breaches, and inevitably respond to the attacks that breach an organizations security with the appropriate countermeasures. Some IT security professionals specialize in computer crime investigation; these specialists use cutting-edge forensics hardware and software to gather data & evidence for use in prosecuting cyber crimes.
    Job market demand for IT security specialists is booming in all types of organizations, including corporations, educational institutions, health care practices, and government agencies. According to the U.S. Bureau of Labor Statistics, employment of IT security specialists is expected to increase by 23% from 2008 to 2018, more than double the 11% average for all jobs.

    IT Security Specialist Education Requirements

    Hiring managers for IT security specialist positions generally require at least an undergraduate degree (associate or bachelor) in information security, computer information systems, network security, computer science or a related field of study. IT job experience and security-centric certifications will aid candidates in securing IT security specialist positions.
    IT security pros develop plans to safeguard computer files against unauthorized modification, destruction or disclosure.
    Specific coursework and in-demand skill sets to look for in an IT security specialist education program include networking and network security, operating system administration, business continuity & disaster recovery, hardware & software configuration, risk management and computer forensics. IT security specialists need strong communication skills, as they are responsible for educating technical and non-technical staffers on computer security protocols and awareness.
  • IT security specialists implement, monitor and upgrade computer virus and malware protection systems.
  • IT security specialists encrypt data transmissions and erect firewalls to conceal confidential information during transmit.
  • IT security specialists who specialize in computer forensics gather data & evidence for use in prosecuting cyber crimes.
  • IT security pros specializing in forensics can set up & operate an investigator’s lab and process computer crime scenes.
  • IT security specialists implement password authentication, to keep unauthorized users from accessing computer files.
  • IT security specialists modify security files to incorporate new software, correct errors, or change user access status.
  • IT security pros perform risk assessments and tests on running data processing activities and security measures.


  • GRAPHIC DESIGNER
    graphic design training
    Graphic Designers
    Graphic Designers fuse creativity with technology to create visually engaging graphics that communicate a message.
    If you’re creative, have a good eye for color & composition, and a love of technology, then graphic designer may be the career path for you. Graphic designers’ duties vary widely and may include creating advertisements, designing web pages, laying out catalogs & newsletters, designing logos & marketing collateral, and a range of other web, print and interactive materials your company or clients require.
    The demand for well designed graphics - and graphic designers - is at an all time high. From web design and multimedia advertising to print publishing and 3D package design, clients expect and demand their branding to increase sales and elevate their status. Self-employment opportunities are abundant for the skilled entrepreneurial designer. Contributing to the positive outlook for graphic designers is the omnipresent need for web and multimedia design projects, now that almost every business and individual has a website or social media presence requiring eye-catching graphics.
    While being a graphic designer can be a fun job, a career in graphic design should not be taken lightly. If you want to be a successful graphic designer, it’s important to carefully construct your learning plan, continually advance your skills and training to keep pace with the latest digital design technologies, and build on your portfolio of work. Word of mouth and feedback from past employers typically plays into the decision to hire graphic designers, so reputation and quality of service are essential to success.

    Graphic Designer Education Requirements

    An undergad or graduate degree in graphic design, fine arts, multimedia production, or a similar field of study in the creative arts is required education for most graphic design positions. Hands-on graphic design experience is just as important - or more important depending on who you ask - so regardless of how you learn or where you train, be sure to keep a comprehensive portfolio of your best design projects, as this is how professional graphic designers showcase their work to prospective clients and employers. Because your design portfolio is a critical factor in getting hired, all of our featured graphic design degrees include dedicated courses and/or assistance in graphic designer portfolio & resume compilation.
    As the demand for web and multimedia graphic designers continues to increase, art and computer schools are bolstering their degree and certificate programs with coursework in modern digital design topics, such as computer animation, interactive media, 3D modeling, web application design, and digital photo manipulation. Skills and expertise in the latest graphic design software is also vital, especially the Adobe Creative Suite, the most respected and widely used collection of design programs. Prospective print graphic designers should learn Adobe Illustrator, InDesign, Photoshop & Acrobat Pro, while web graphic designers should focus on Adobe Photoshop, Dreamweaver, Flash & Fireworks.
  • Graphic Designers design websites, email templates, and social media hub pages.
  • Graphic Designers create layouts for magazines, brochures, and other print pieces.
  • Graphic Designers design corporate logos, business cards, and company letterhead.
  • Graphic Designers make promotional displays, teasers, and signs for public exhibitions.
  • Graphic Designers create banner ads and rich media marketing campaigns for web pages.
  • Graphic Designers work closely with Copywriters, Creative Directors, and Marketing Managers.
  • Courtesy: itcareersfinders.com

    By Sharath with No comments

    Nov 23, 2011

    MICROSOFT FUNDS CAREER GUIDE IN INFORMATION SECURITY: DOWNLOAD


    ISC2 Career Guide

    Microsoft has funded a non-profit organisation in creating a 'career guide' about the scope and prospects that Information Security sector holds. The publication was released last month and has reached numerous schools, educators, conferences and is also available online.


    This 35 page book covers all facets of careers in Security, like job profiles, salaries certifications and other opportunities of growth in the fielsd. It also lists many schools and institutes offering coaching and certifications.

    "Thinking about a career in information security? A profession that was new and obscure just 25 years ago has become one that society has come to rely on and offers a plethora of career opportunities.

    The (ISC)² Career Guide: Decoding the Information Security Professionsheds light on these opportunities and can help prepare you for an exciting and challenging career in information security.

    The 40-page guide offers you background on the profession, advice from profession pioneers, a catalogue of colleges and universities that offer degree programs in information security, job descriptions and salary information, as well as a listing of professional certifications and organizations. Download it for free today!"


    By Sharath with No comments

    INDIA INNOVATES: SOME OF THE BEST INNOVATIONS FROM INDIA IN RECENT TIMES


    The Indian technology industry got its start running call centers and doing low-level IT work for western firms. Then, in the 2000s, it started taking on higher-level IT tasks, offering management consulting services, and performing sophisticated R&D. Now there is another transition happening, one far more significant: a transition to development of innovative technology products. Instead of providing IT services as the big outsourcing companies do, a new breed of startups is developing high-value products based on intellectual property. The Indian industry group NASSCOM estimates that, in 2008, the country’s software product revenues totaled $1.64 billion. It forecasts that this will grow to $11 billion per year by 2015. -Vivek Wadhwa (TechCrunch)

    Here are some of the hottest innovators from India  and their story.


    H P Khincha
     K. Chandrasekhar of Forus Health.
    Chandrasekhar learned that that the vast majority of the 12 million people in India who are blind could have maintained their sight if only their problems had been diagnosed and treated on time. The diagnostic equipment for a single hospital cost at least US$60,000—which put it out of the reach of most regional clinics—and required ophthalmologists to perform the diagnosis. Chandrasekhar and Forus cofounder Shyam Vasudev decided to leave their jobs as senior executives at NXP Semiconductor (an offshoot of Philips) to create an affordable, all-in-one, intelligent pre-screening device that is non-invasive and can be used by minimally trained technicians in rural India. The device provides an indicative report in 10 minutes for five major eye-related problems, including diabetic retina. This frees the doctor up to treat patients rather than administer tests. The product costs less than $15,000, and Forus expects the price to drop to half that in volume production.

    Ajit Narayananand.
    Ajit Narayananand (29 years)
    Innovator of the Year
    Ajit Narayanan, 29, exemplifies the spirit of innovation in India. Toiling for a few years at a startup, Invention Labs Engineering, incubated at the IIT (Indian Institute of Technology) Madras, Narayanan has developed an alternate communication system for millions of people who remain incommunicado with the society due to their disabilities.
    Avaz
    Avaz, (voice in Hindi) is the tool which uses a variety of software and hardware to provide a voice to these muted millions using just their muscle movements.
    There are an estimated 10 million people in India who suffer from speech impediments. They may not have speech but they have a lot to say. And they can benefit from Narayanan's device. AVAZ is a communication device for people with speech disorders such as cerebral palsy, autism, mental retardation, and aphasia.
    Avaz works by converting limited muscle movements, such as head or finger movements, into speech. His invention broadly falls under the category of Augmentative and Alternative Communication (AAC) technologies.

    Alefia Merchant.
    Alefia Merchant (32 years)
    Humanitarian of the Year

    Novel method of screening for eye disease in children under the age of five.

    An estimated 1.4 million children in the world are blind and 90 percent of them are found in developing countries. In India, these children often face a lifetime of disability.

    Poor vision affects every aspect of their lives - economic, social, and psychological. Ultimately, it undermines their function and acceptability in their families and in society.
    If children with visual disabilities were detected sufficiently early, approximately 40 percent of such cases could be prevented or treated and the remaining could be rehabilitated to minimize the child's handicap.
    In India, there are many hurdles in detecting, diagnosing, and treating such children. There is no organized screening program focused on identifying children under the age of five for sight-threatening eye conditions. The World Health Organization reports the lack of adequate community-based, primary-care screening programs as an important barrier to improvements in current morbidity and mortality rates due to eye-related diseases.
    A novel method for eye-testing
    Third year medical student at University of Montreal, Montreal, Canada, Alefia Merchant has developed a novel method of screening for eye disease in children under the age of five.
    Merchant developed the method during September 2009 till June 2010 as part of her community pediatric ophthalmology project at the Narayana Nethralaya Postgraduate Institute of Ophthalmology, Bangalore, Karnataka. She was the co-investigator of the project along with Ashwin Mallipatna who is consultant pediatric eye surgeon at Narayana Nethralaya, Bangalore.
    Merchant's method exploits existing, low-cost, and readily-available digital camera technology to photograph a child's eye for signs of vision-threatening disease as an alternative to standard medical technology in current use.
    Gautam Kumar.Gautam Kumar (26 years)
    Social Innovator of the year
    System to detect gas leakages - RoboticWares, Bhubaneshwar
    Passionate to innovate, Gautam Kumar has developed a system that detects leakage of liquid petroleum gas (LPG) and sends warning messages to people connected with the device over their cell phones. He calls the device Suraksha which means "safety" in Hindi.
    Kumar along with his cofounder Kushal Nahata got the idea to develop the device when he read about a gas leakage accident in Bhubaneshwar in which a few people lost their lives. "The incident reminded of a similar but bigger accident that occurred near Kushal's parents' house in Chandni Chowk, New Delhi, a few years back," recalls Kumar. The duo immediately felt the need of an alarm system which could warn people in time to save lives or even avoid such hazards before it is too late.
    The device from Roboticwares is based on the olfactory kind of sensors which enables an intelligent machine to detect a certain type of smell and based on preset rules perform the actions which are programmed in it. Kumar's Suraksha can be configured to communicate with a maximum of five people by registering their cell phone numbers on the device.


    Akash Lal.

    Akash Lal (29 years)
    Improving software quality using automated verification

    Microsoft Research, Bangalore


    With software becoming all pervasive in our daily lives, it must become all the more reliable and shouldn't crash or behave unexpectedly. And the way to address this is through automated verification of programs.
    Though automated verification can significantly improve the quality of software with little manual effort, the available verification tools have been used to test sequential programs. This is a concern as modern software is invariably concurrent.
    The problem of automatically verifying concurrent programs is two-fold: one has to explore different inputs to the program, and also explore different interleavings that happen between threads in the program for each input.
    Akash Lal's work shows that verification of real-world concurrent programs is possible. His innovation bridges the worlds of sequential and concurrent programs. 

    Agilewiz Snapshot.Akshay Shah (29 years)
    iWeb Technology Solutions, Mumbai
    A business process management generator which can create applications on the fly.
    While working in Pune for enterprise resource planning software maintenance and support, Akshay Shah realised that the popular ERPs available in the market were very complex in nature.
    He felt the need to develop a software which could churn out on-demand and cost effective applications for business process management. He developed a software platform called AgileWiz, a short form of agile wizard.
    The Agilewiz technology is based on the concept of platform-as-a-service which can build fully functional application modules by feeding appropriate metadata as input.
    The Agilewiz has a business rules management system (BRMS) which ensures that implementers do not have to repeatedly rely on software principals for critical but necessary customizations of the product.
    Shah says that the platform has been designed from ground up and is technology independent. Any ERP, e-governance, hospital management, or a payroll application can be developed quickly using Agilewiz.

    Deepak Ravindran.
    Deepak Ravindran (22 years)
    Innoz Technologies, Haryana
    A mobile based search engine to deliver information on any topic.
    Deepak Ravindran calls it the "instant cup of knowledge". His mobile based service, SMSGyan, promises information on almost any topic to the user on his mobile phone without asking him to click on any link.
    There are a host of services existing which would give users information on certain topics on their mobile phones but most of these are either limited to a sector, such as railway enquiry, or they send links to the user's mobile phone asking the user to click on them to access desired information.
    Such services have not become very popular with the vast majority of the people because they don't have GPRS connection on their mobile phones or the connection is weak. Though India has almost 700 million users today, the smart phone penetration still remains very low.
    Gyan means "knowledge" in Hindi, and the SMSGyan provides myriad information services which include dictionary, encyclopaedia, job search, health, stock market, and more via text messages.
    The idea was seeded when one day, Hisam, one of the founders of Innoz Technologies, was in transit and wanted to know the meaning of a word and found that his basic phone was of no use to get the information. Since the phone had no application and no Internet connection to go to a dictionary and enquire, Hisam had to do without knowing the meaning.
    "This kind of a thing has happened to each one of us and it can be frustrating," says Ravindran. The team then sat down to put together an answer engine which would give users answers to various kinds of queries from anywhere at any time.
    The SMSGyan platform can work with any number of databases or resources. It delivers mobile-optimized results. These text results support upto a maximum 500 characters of information across all operators in India.
    A user would have to type an SMS with the keyword GYAN followed by the query and send it to 56161. For example, to know the stock price of Infosys, a user would have to type "GYAN Stock Infosys" and send it to the specified number.

    Aishwarya Lakshmi Ratan.
    Aishwarya Lakshmi Ratan (29 years)
    Microsoft Research, Bangalore
    A hybrid paper, pen, and digital slate solution for a low-cost digital record management system.
    Technologies that exist today either require users to use a digital pen and a digital slate, which are not very user-friendly, or they require users to digress totally from pen and paper to a personal digital assistant or a computer-based interaction.
    All of these technologies are expensive as compared to a pen and paper medium. And therefore, such technologies have not taken off in countries like India where the masses are still comfortable using pen and paper to write in their regional languages.
    Aishwarya Ratan has come up with a low-cost digital system which lets the users have the convenience of using a normal pen and a plain paper to record data and instantly store it in the digital form.
    This solution has been piloted with self help groups (SHGs) who microfinance and maintain records of each person's savings and loans. Conventionally, the data was recorded at a site on papers and it was later converted into digital data.
    Aishwarya's team chose a low-cost digital slate and pen prototype device that allows handwritten entries, made with the pen on ordinary paper forms placed on the device, to be instantly digitized.

    Harit Soni.Harit Soni (27 years)
    Ecolibrium Energy, Ahmedabad
    Smart grid technology to optimise the use of electricity in India.
    Supported by the Ministry of New and Renewable Energy of the Government of India, Ecolibrium is a smart-grid startup aimed at enabling consumers to manage power consumption in real-time. A humungous amount of electricity is wasted because of the lack of a feedback loop between suppliers and consumers.

    India has a power deficit of 12 percent with almost 300 million people living without electricity. Transmission losses amount to 1.5 percent of India's gross domestic product. Harit Soni, founder of Ecolibrium Energy, opines that achieving energy efficiency is more cost effective and environment-healthy than setting up new power plants to fulfil India's power demands.
    At Ecolibrium Soni has led the development of indigenous smart grid technologies. The smart grid is essentially addition of communication and application layers on top of the existing power transmission layer. Though smart grid technologies are available, India needs a customized solution to address the transmission and distribution losses. 

    Krishna Gopal Singh.Krishna Gopal Singh (29 years)
    EnNatura Technology Ventures, Delhi
    Eco-friendly printing ink that reduces harmful emissions by almost 99 per cent.
    The offset printing industry emits 500,000 tons of volatile organic compounds (VOCs) annually into the atmosphere.
    These emissions are huge contributors to global warming and are also detrimental to the health of millions of workers in the global print industry.
    The major source of pollution is the petroleum components in such inks which are released in the atmosphere as harmful emissions during the drying and the washing processes of printing, causing photochemical smog formation and ozone depletion.
    Printers who are exposed to regular emissions are in danger of acquiring respiratory ailments such as tuberculosis and even cancer. The current eco-friendly solutions available in the global market are either expensive or do not produce the same quality output as the widely-available petroleum based inks.
    Krishna Gopal Singh, chief technology officer of Ennatura Technology Ventures, Delhi, has formulated a biodegradable printing ink which is mainly composed of the resin, the solvent which is used to dissolve the resin, the color pigment, and additives.
    Singh and his team created a functional resin from renewable feedstock so that all the chemical reactions involved in the printing process don't result in emission of volatile organic compounds.
    This particular kind of resin is pH-sensitive and the inks formulated with it print well with mildly acidic fountain solutions used in lithography printing.

    Manav Bhatia.Manav Bhatia (32 years)
    Alcatel-Lucent, Bangalore
    Securing the Internet service provider's routing network.
    Routing in the Internet is a very complex task and routing protocols play the key role in ensuring that Internet works in a sane way.
    And Manav Bhatia's security and authentication algorithms help in making the routing protocols more secure and less susceptible to attacks, such as Denial of Service (DoS) or traffic redirection, so that data transfers happen seamlessly over the Internet.
    Having spent a considerable amount of time studying and working in routing protocols, Bhatia started noticing that protocols were not as secure as they were always thought to be.
    He looked closely at how these protocols used the cryptographic authentication mechanisms and saw vulnerabilities in almost all the popular protocols deployed in the service provider and enterprise networks. Bhatia worked on the mechanisms that were defined by the Internet Engineering Task Force (IETF) standards and fixed the vulnerabilities.
    The IETF is a global community of network designers, operators, and researchers responsible for producing technical specifications for the evolution of the Internet architecture and smooth operation of the Internet.

    By Sharath with No comments

      • Popular
      • Categories
      • Archives