Skip to main content

My Profile

I am currently working as a Program Architect in Mindtree.
I graduated from UVCE in Computer science and engineering and started my career with Kirloskar computer services as a software engineer. I have close to 20 years of solid development experience of building challenging and complex software systems. Most of development experience is in Java based J2EE dominant world till 2007 or so. Later, I ventured into RIA using Flex, then went on creating and implementing digital media management distribution systems, predominantly in PHP/Linux world.
I have been working in Open source software practice. Architecting solution is inherently complex than normal solution architecting, when you are using open source products and technologies. During 2009-2010, I did my MS, Software systems from BITS through distance learning. I took this course to brush my technical basics and it helped me, still helping me.

I worked as software programmer, designed challenging and complex commodity trading risk management suite. I worked as consultant in implementing the OSS inventory solutions in Cramer. Working as consultant had positive impact on my career. I believe consulting experience empowers one with the art of questioning, art of self managing the work, and yet be technical. 
While I started my technology stint with Java, J2EE and also worked in PL/SQL, frameworks like Struts, then, joined RIA development bandwagon with Flex, where I also wrote a paper mentioning the challenges involved in RIA development. In the recent past, jumped on PHP bandwagon proposed content management solutions and strategies, built/deployed media management systems and frameworks.

I worked on cloud enablement of open source media management system, Kaltura. More than the cloud enablement, I would say, the challenges lie in scaling up and distributing the transcoding jobs across multiple instances. In this context, I am architecting the solution for highly scalable transcoding job distribution on AWS cloud, something similar to encoding.com.  I also designed proprietary workflow engine, modeled over JBPM 3.2 (old version). And I have provided data ware housing strategy and architecture re-designs on the existing content management framework being enhanced as a complete media content management and distribution eco-system to one of the TV broadcast companies in Europe. I also have special interests in Alfresco, as an ECM and have created PoC for our customers. I have technically led redemption catalog management, a customized solution implementation on OFBiz, an open source eBusiness suite. In the same project context, I have built SAML authentication clients for seamless integration with SSO solution, and designed OAuth1.0a based server for API integration.

Recently concluded the development of process enriched world-class baggage tracing solution that is in use by major airlines today.
*Pardon me for not mentioning the details due to NDA clauses.

I have worked in projects, product development, product implementation and customization in different organizations/different environments.





Comments

Popular posts from this blog

Key to adopt open source product

Friends, I am working on business solution implementation on open source product called Kaltura. Kaltura is a media management solution and has loads of features that compel any business to take a peek into it. More-over this is the only complete end-to-end open source software available to handle digital assets. But it comes with its own head ache. Considering its open source, its understandable. I feel, handling these would ensure you the success in your open source product implementation. 1. In my opinion, before adopting any open source software, build the capability to deal with the inconsistency bundled in the open source software. 2. I would avoid involving external consultants for 2 reasons.      a. I am not sure, they would bring necessary expertise on to table      b. I fear that there would be little ownership, they will not see big picture of my business (neither I am interested to share it all) 3. Alternative to that is to build the team that is capable of debuggin

Essential GCP services for a new age application

Identity and resource management IAM  Identity aware proxy Resource Manager Stackdriver Monitoring Stackdriver Monitoring: Infrastructure and application monitoring Stackdriver Logging: Centralized logging Stackdriver Error Reporting: Application error reporting Stackdriver Trace: Application performance insights (latency) Stackdriver Debugger: Live production debugging Development management Cloud Deployment Manager: Templated Infrastructure deployment Cloud Console: Web based management console Cloud shell: Browser based terminal/CLI Development tools Cloud SDK: CLI for GCP Container registry: Private container registry Container builder: Build/Package container artifacts Cloud source repository: Hosted private git repository Database services Cloud SQL: Managed MySQL and PostgreSQL Cloud BigTable: HBase compatible non-relational DB Cloud Datastore: Horizontally scalable non-relational (ACID) Cloud Spanner: Horizontally scalable relational D

Secure your application on cloud

Handling sensitive data Define sensitive data for your application. Classify as sensitive data and confidential data. Sensitive data is something like password, credit card account number, something that you should not compromise at all. Confidential data could be your customer’s health record, something that requires your permission before its usage. So, you need to define sensitive data in the context of your application. There are many ways to protect the sensitive data in transit; the easiest way is to use SSL. This is nothing different than handling sensitive data in any traditional application.   However, make sure you apply this rule while designing your application for cloud deployment. Alternatively, you can encrypt the sensitive data and transport. Be noted that any kind of protection you design, will have implications on performance. However this is ignorable considering the nature of sensitive data. If you just want to protect your data from being tampered during