Crmnext
Head of Strategy and Solutions
The Dyfference Consulting Jan 2017 - Dec 2017
Chief Consultant
Fidelity Investments May 2015 - Dec 2016
Vice President, Software - Personal Investing Digital Technology
Bb&T Feb 2008 - Apr 2015
Vp, Digital Channel - Mobile Banking and Online Account Opening Services
Global Computer Associates May 2007 - Jan 2008
Principal Consultant
Education:
Wake Forest University 2012 - 2013
Marist College 1997 - 1999
Master of Science, Masters, Computer Science, Information Systems
Wadia College / Pune University 1988 - 1993
Barnes High School 1980 - 1988
Skills:
Strategy Enterprise Software Product Management Leadership Mobile Devices Management Cross Functional Team Leadership Software Development Go To Market Strategy Product Development Business Analysis Program Management Vendor Management Team Leadership Agile Methodologies Saas Banking Business Strategy Cloud Computing Pre Sales Mobile Technology Marketing Strategy Soa Marketing Business Planning Product Marketing Thought Leadership Crm Mobile Payments Mobile Marketing E Commerce Competitive Analysis Customer Relationship Management Mobile Mobile Product Development Mobile Applications Public Speaking Global Management Usability Technology Strategy Development Writing Security Management Enterprise Management Tools Digital Strategy People Oriented Task Oriented Strategic Partnerships
Interests:
Science and Technology Social Services Children Disaster and Humanitarian Relief
Languages:
English Hindi
Certifications:
Scrum Product Owner Accredited Certification Certified Product Manager Series 99 Leadership Coach, Trainer, Speaker Scaled Scrum Expert Accredited Certification Scrum Coach Accredited Certification International Scrum Institute, License 87896543952170 Association of International Product Marketing and Management (Aipmm) License 87896543952170 Scrum Product Owner
2007 to 2000 Vice President, Digital ChannelGCA Link Central Islip, NY 2007 to 2007 PRINCIPAL CONSULTANTComputer Associates Islandia, NY 1999 to 2006 Vice President, Development, Office of the CTOMARIST COLLEGE ACADEMIC COMPUTING Poughkeepsie, NY 1997 to 1999 Manager, Business DevelopmentINTERNATIONAL DATA CORP Hong Kong, Hong Kong Island 1996 to 1996 Research AnalystTRINITY SERVICES COMPANY LTD Hong Kong, Hong Kong Island 1993 to 1995 Senior Consultant
Education:
WAKE FOREST UNIVERSITY Winston-Salem, NC 2013 Banking SchoolInternational Scrum Institute 2010 Management and MarketingMARIST COLLEGE Poughkeepsie, NY 1999 Masters in Computer Science and Information SystemsWADIA COLLEGE (PUNE UNIVERSITY) Pune, Maharashtra 1993 Bachelors in Computer ScienceNIIT 1993 Associates in System Analysis and Database Management
Us Patents
System And Method For Automatic Network Logon Over A Wireless Network
Sumit B. Deshpande - Central Islip NY, US Srinivas Gudipudi - Hyderabad, IN Muralidhar S. Swarangi - Visakhapatnam, IN Ravi R. Pore - Maharashtra, IN Rohit Shankar - Hyderabad, IN Theodore R. Short - Jacksonville FL, US Yidong Zhu - Lincolnshire IL, US
Assignee:
CA, Inc. - Islandia NY
International Classification:
H04L 29/06
US Classification:
726 5, 726 3, 726 4, 726 7, 726 8, 380270
Abstract:
A method for providing access to one or more resources in a computer network, establishing a connection between a user and the computer network via at least one wireless access point, generating an authentication level for the user associated with accessing the one or more resources, sending a program to the client device, receiving authentication data from the user, and changing the authorization level of the user based upon the authentication data received from the user.
Method And System For Load Balancing Traffic In A Wireless Network
According to one embodiment of the invention, a method for load balancing traffic in a wireless network includes identifying a respective operational parameter from wireless network devices in the wireless network. The respective operational parameter indicates a number of endpoint associations for the wireless network devices. The method also includes detecting a wireless network device with a particular number of endpoint associations by examining each of the respective operational parameters. The method further includes, in response to the detected wireless network device, configuring the wireless network device to limit the number of endpoint associations to a number less than the particular number.
Method And System For Managing Ad-Hoc Connections In A Wireless Network
Srinivas Gudipudi - Nacharam, IN Rohit Shankar - Madhapur, IN Abhilash Purushothaman - Kerala, IN Ravi Pore - Pune, IN Sumit Deshpande - Central Islip NY, US Yidong Zhu - Lincolnshire IL, US Theodore Short - Jacksonville FL, US Tuna Djemil - East Northport NY, US
Assignee:
Computer Associates Think, Inc. - Islandia NY
International Classification:
H04B 7/00
US Classification:
370310200
Abstract:
According to one embodiment of the invention, a method for managing ad-hoc connections in a wireless network includes receiving, at an endpoint device, a connection policy from a managing device over the wireless network. The connection policy indicates network security settings for the endpoint device. The method also includes detecting at the endpoint device an ad-hoc connection. The method further includes responding to the ad-hoc connection based on the connection policy.
Method And System For Managing Access To A Wireless Network
Rohit Shankar - Madhapur, IN Bharat Nadimpalli - Khairatabad, IN Muralidhar Swarangi - Visakhapatnam, IN Srinivas Gudipudi - Nacharam, IN Kartik Singh - Machabollaram, IN Sumit Deshpande - Central Islip NY, US
Assignee:
Computer Associates Think, Inc. - Islandia NY
International Classification:
H04B 7/00
US Classification:
370310200
Abstract:
According to one embodiment of the invention, a method for managing access to a wireless network includes defining access criteria for a plurality of endpoint devices in the wireless network. The access criteria includes a group of access policies controlling access to specific access points in the wireless network. The group of access policies are associated with respective access points and an identifier associated with a user. The method further includes configuring at least one endpoint device of the group of endpoint devices in the wireless network with the access criteria.
Method And System For Generating An Advisory Message For An Endpoint Device
Rohit Shankar - Madhapur, IN Sumit Deshpande - Central Islip NY, US Ravi Pore - Pune, IN Srinivas Gudipudi - Nacharam, IN Abhilash Purushothaman - Kerala, IN Yidong Zhu - Lincolnshire IL, US Theodore Short - Jacksonville FL, US
Assignee:
Computer Associates Think, Inc. - Islandia NY
International Classification:
H04L 9/00
US Classification:
713166000
Abstract:
According to one embodiment of the invention, a method for generating an advisory message for an endpoint device includes determining a threat level for the endpoint device by identifying a connection type between the endpoint device and the wireless network. The method also includes determining a second threat level for the endpoint device by identifying a security policy of the endpoint device. The method further includes generating an advisory message for the endpoint device based on the threat levels. The advisory message indicates vulnerability of the endpoint device.
Method And System For Managing Channels In A Wireless Network
Rahul Golash - Kondapur, IN Rohit Shankar - Madhapur, IN Sumit B. Deshpande - Central Islip NY, US Navin Kumar Sharma - Gaya, IN Rajesh Dharmalingam - Crawford, IN
Assignee:
Computer Associates Think, Inc. - Islandia NY
International Classification:
H04Q 7/00
US Classification:
370329, 370338
Abstract:
According to one embodiment of the invention, a method for managing channels in a wireless network includes retrieving device parameters from a wireless network device communicating on a channel in the wireless network. The device parameters include a parameter indicative of a location of the wireless network device and a parameter indicative of the channel of the wireless network device. The channel is associated with a data transmission frequency. The method also includes generating a list of available channels for the wireless network device by determining a channel pattern in the wireless network. The method further includes specifying the channel on which the wireless network device should communicate based on the generated list of available channels to reduce channel interference to the wireless network device.
- Charlotte NC, US Sumit Deshpande - Rolesville NC, US Matthew Whitley - Cary NC, US Gopinath Rajagopal - Cary NC, US Michael Anthony Dascola - Raleigh NC, US Satya Acharya - Raleigh NC, US Angela Taylor - Raleigh NC, US
International Classification:
H04L 9/32 H04L 29/06
Abstract:
An authentication system may receive a request signature corresponding to a user request to view secure user information on a user device and generate a server-side signature matching the request signature to authenticate the user device to receive the secure user information without authenticating the user. The request signature may include a device identifier corresponding to the device, a token code generated by the authentication system and stored by the user device, a timestamp corresponding to the transmission time of the request signature, and a version of the device identifier, the token code, and the timestamp encrypted using a signature key provided to the user device by the authentication system. The authentication system may generate the server-side signature using the timestamp and stored copies of the device identifier, the token code, and the signature key.
- Winston-Salem NC, US Sumit Deshpande - Rolesville NC, US Matthew Whitley - Cary NC, US Gopinath Rajagopal - Cary NC, US Michael Anthony Dascola - Raleigh NC, US Satya Acharya - Raleigh NC, US Angela Taylor - Raleigh NC, US
Assignee:
Branch Banking and Trust Company - Winston-Salem NC
International Classification:
H04L 9/32 H04L 29/06
Abstract:
An authentication system may receive a request signature corresponding to a user request to view secure user information on a user device and generate a server-side signature matching the request signature to authenticate the user device to receive the secure user information without authenticating the user. The request signature may include a device identifier corresponding to the device, a token code generated by the authentication system and stored by the user device, a timestamp corresponding to the transmission time of the request signature, and a version of the device identifier, the token code, and the timestamp encrypted using a signature key provided to the user device by the authentication system. The authentication system may generate the server-side signature using the timestamp and stored copies of the device identifier, the token code, and the signature key.
Youtube
Marathi Paul Padte Pudhe Jan. 31 '11 - Sumit ...
Watch latest "Marathi Paul Padte Pudhe" webisodes.
Category:
Entertainment
Uploaded:
01 Feb, 2011
Duration:
6m 28s
Marathi Paul Padte Pudhe March 15 '11 - Sumit...
Watch latest "Marathi Paul Padte Pudhe" webisodes.