Amit Jaju (for Info only, not official)

author

Amit Jaju

We are collecting authors'profile. As soon as we get, we update it. Please note this is not official profile. The information including photo is collected from web.

| Contact |

| twitter |

| Linkedin |

    Media Object

    Short extract

    ...Intel Corp. predicts the number of internet-connected devices to go from the current 15 billion to around 200 billion in 2020—which is also the number of potential devices that might be prone to being hacked. In the present scenario, businesses face difficulty in securing their assets from potential threats; imagine the risk of cybercrime with 200 billion devices coming online. While there is no denying the future threats of cybercrime, we simply cannot undermine the importance and risks associated with upcoming technology. Connecting cars, planes, pacemakers and even power grids to computer systems has given us more access to the immense efficiency and automation than was unimaginable some decades ago. So will be the growth in security threats that come attached to the connected cyberspace. Here are some of the areas that future cyber criminals would focus on. Data protection and privacy: The parameter of data protection already serves as a great challenge with respect to online services. ...

    Live Mint on Nov. 6, 2017, 4:36 p.m.

    Media Object

    Short extract

    ...Intel Corp. predicts the number of internet-connected devices to go from the current 15 billion to around 200 billion in 2020—which is also the number of potential devices that might be prone to being hacked. In the present scenario, businesses face difficulty in securing their assets from potential threats; imagine the risk of cybercrime with 200 billion devices coming online. While there is no denying the future threats of cybercrime, we simply cannot undermine the importance and risks associated with upcoming technology. Connecting cars, planes, pacemakers and even power grids to computer systems has given us more access to the immense efficiency and automation than was unimaginable some decades ago. So will be the growth in security threats that come attached to the connected cyberspace. Here are some of the areas that future cyber criminals would focus on. Data protection and privacy: The parameter of data protection already serves as a great challenge with respect to online services. ...

    Live Mint on Nov. 6, 2017, 4:36 p.m.

    Media Object

    Short extract

    ...The first modern-day Industrial Revolution dates back to 1800s and had manufacturing processes for metals, chemicals, textiles and mining; leading to an increase in productivity and output. Robots have evolved tremendously over the years and are now being widely used in various sectors such as defence, disaster management, search and rescue operations, and the entertainment industry in the form of electronically operated toys. Automation is an extension of robotics and can be termed as the next phase of industrial revolution. The present industrial revolution seeks to disrupt the existing processes and enhance them with programmable logic. While it is easy to identify a repetitive process or task, it is equally difficult to program such a code that can make a machine carry out this activity on a perpetual basis. ...

    Live Mint on Aug. 21, 2017, 1:24 a.m.

    Media Object

    Short extract

    ...However, it wasn’t too long before biometrics became a part of the daily lives of most individuals: employee attendance systems, eKYC, door access in offices, logging into systems and entering various secure premises were all dominated by biometric authentication. More recently, biometric authentication has been integrated in our mobile devices, banking transactions and government identifications; with an attempt to give higher-security control over critical data. Understanding biometrics A number of traditionally time-consuming processes are now being automated by using biometrics. Biometric authentication technology is being used for access control or validating transactions. Globally, it is increasingly being used for mobile phone-based financial transactions. India has not been far behind in adopting this technology to its utmost potential. ...

    Live Mint on July 12, 2017, 4:25 p.m.

    Media Object

    Short extract

    ...Irrespective of the forecasts, the cutting edge technology underlying the currencies—known as blockchain—is here to stay. Blockchain technology has emerged to be crucial for cryptocurrencies to become accountable, resourceful and economical in monetary exchanges. Security implications of blockchain Blockchain is a distributed public ledger recording transactions or events that have taken place, validated by users at regular intervals. A blockchain network consists of a large number of nodes that store blocks of data and also verify their integrity. Each time a transaction is carried out, it is automatically stored in a block, which is then added to the previously existing block on every node in the network, thereby creating a chain of data on each node. That said, these blocks are only added to all the nodes if at least 51% of these nodes verify their integrity. ...

    Live Mint on May 1, 2017, 5:28 p.m.

    Media Object

    Short extract

    ...At the same time, demonetization has made many consumers become more dependant on their mobile phones to make payments. These two instances alone led to a surge in mobile phone purchases, along with users downloading new apps and signing up for mobile-based payment platforms. A juxtaposition of these developments has resulted in an explosion in the amount of data or information being posted online. Reports estimated the approximate number of webpages (around the globe) was a little more than 45 billion in 2016. Millions of social media updates, photos and videos are posted every minute, which reach out to billions of people worldwide. These numbers are bound to increase manifold in 2017. But in many cases, users do not understand the information uploaded online and the legalities involved around their rights related to this information. Most websites and apps, which seemingly provide ‘free’ sign-up services, are not really free. ...

    Live Mint on April 2, 2017, 7 p.m.

    Media Object

    Short extract

    ...Since the demonetization announcement in early November 2016, the value of one bitcoin has increased by over 30% (on 9 January 2017), with speculation that this could be attributed to aggressive buying by Indians, looking at it as a probable ‘safe haven’ currency. Understanding bitcoins A bitcoin is a virtual medium of exchange, a type of cryptocurrency, which is created and tracked online and is secured using cryptography. It is based on blockchain technology, which makes the transactions irreversible, decentralised and publicly verifiable. Blockchain maintains an audit trail, making the transactions quite transparent. A key feature associated with bitcoins is the absence of a centralised authority to issue, exchange, monitor and regulate the currency. ...

    Live Mint on Jan. 18, 2017, 4:23 p.m.

    Media Object

    Short extract

    ...Since the demonetization announcement in early November 2016, the value of one bitcoin has increased by over 30% (on 9 January 2017), with speculation that this could be attributed to aggressive buying by Indians, looking at it as a probable ‘safe haven’ currency. Understanding bitcoins A bitcoin is a virtual medium of exchange, a type of cryptocurrency, which is created and tracked online and is secured using cryptography. It is based on blockchain technology, which makes the transactions irreversible, decentralised and publicly verifiable. Blockchain maintains an audit trail, making the transactions quite transparent. A key feature associated with bitcoins is the absence of a centralised authority to issue, exchange, monitor and regulate the currency. ...

    Live Mint on Jan. 18, 2017, 4:23 p.m.