Skip to main content

About Us


   I am an developer. I am a novice programmer with good knowledge of front-end and back-end techniques. I love spending time on fixing little details and optimizing apps. Also I like working in a team, you'll learn faster and much more. As the saying goes: "You don’t get harmony when everybody sings the same note.".
    
    Experience:

    "Accept what life offers you and try to drink from every cup. All wines should be tasted; some should only be sipped, but with others, drink the whole bottle;"
- Paulo Coelho, Brida
    
    My name is Mr. Deployer. I completed my grade XII obtaining 90% with Physics, Chemistry and Maths in 2014. In high school, I participated in various physics and mathematics quizzes and Olympiads which made me competitive and better at these subject’s day by day. With my first class performance in tenth and twelfth grade especially in mathematics, physics and introduction
to computers, I opted for a challenging course of study - Information and Communication Technology (ICT) at the undergraduate level. I completed Bachelor of technology in Information and Communication Technology in 2018.
During my four years of Bachelor’s in ICT at AU which is one of the fourteen A-league colleges in Ahmedabad, I acquired an overall perspective of the discipline gradually developing particular interest in data analytics and visualization, data structures, object oriented programming, cloud computing, digital design and internet of things. To explore my abilities and
skills, I did various projects including both hardware and software oriented. In my fourth semester, I studied and implemented lifecycle of Software development by developing a social networking platform using Java and MySQL and in sixth semester, I did a machine learning project on gender identification using classification algorithms and implement Visual representation techniques to
represent dataset and how all the different Classification algorithm works on dataset. The experience and skill set that I have developed while doing projects at Ahmedabad University helped me to get an internship at Data Analylitics Company. As a full stack intern, I was assigned tasks related to Data visualization and data analysis focusing on approached to multiscale visualization using visual encoding. Within two months of my tenure at Data Analytics Company, I tried to implement different visualization methods using different algorithms like Voronoi. As a part of my task, I took the use-case of Hotel Review in which we have defined KPIs which helps Manager to understand on which areas they need to improve their services to increase their Review and popularity. We used Bubble Chart to visualize the data set and we were able to plot 6 Dimension on 2D Chart
using Retinal Variables. We used few tools and scripts like d3.js framework for Visualization, ReactJS for Application Development, node.js for Filtering Data and Storing in DB and Uses Talent for ETL (Extract, Transform, Load) Process were used to implement the project. My academic pursuits have not, however, prevented me from participating in various extracurricular activities. I was part of Marketing Committee of IEEE -AU Student Branch which gave me an opportunity to network with new people. I have taken part in various technical and non-technical activities and not only that, I also participated in IEEEXtreme 24-hour Coding Competition and ranked 32/1076 in India. Moreover, I also helped in organizing and managing some of the events held at my university. Alongside University academic courses, I was enthusiastic to take Online Certificate Courses like Applied CS with Android offered by Google, Market Research and Consumer Behavior offered by IE Business School, Usable Security offered by University of Maryland, College Park and Responsive Website Basics: Code with HTML, CSS, and JS offered by University of London.
Currently Pursuing Post Graduate Diploma under Information System Security.

Note: Cannot directly refer my identity but one can use google to identify my identity.however, I describe my background and experience.

Regards,
Bit Deployer

Popular posts from this blog

Emotional and Psychological Trauma

What is Emotional and psychological trauma ? Emotional and psychological trauma is any stressful event that occurs in a lifetime that makes you struggle with your emotions, memory,different activities and make you feel helpless and hopeless in this ruthless world. The event may not be objectively scaled it is a subjective sensation about a event and every individual respond differently to the event . For example a death in a family due to accident due to an pothole makes one dad react positively and he goes on to correct every pothole of the city and some other may react it negatively Emotional and psychological trauma can be caused by: In Indian scenarios emotional and psychological trauma can be caused by accident,disasters, sexual assault that may have occurred at any course of life Ongoing family issues, neighbourhood problems , continues rejection from various interviews , household violence , neglect, low performance at school or institution, contin

Office of the Personnel Management (OPM) Data Breach: A Case Study

WHAT HAPPENED IN THE OPM DATA BREACH      As the relationship between humanity and technology develops, an emergent area of concern lies in the security of the information ferried over and handled by this technology. A myriad of information security and data breaches reported upon by news media in the recent past has had the simultaneously fortunate and unfortunate effect of bringing information and network security into the public consciousness. One such incident was the United States (US) Office of the Personnel Management (OPM) data breach.      While there are many aspects of the OPM data breach that are notable, chief among them is that the perpetrator of this data breach has been widely attributed to China. As China increases its economic clout and develops its technological capabilities, its international presence is becoming more and more pronounced—and not always in the best light. Sanger (2018) has noted that by 2009, Google executives had noticed state-sponsored

Are You Prepared Against Cyber Threats?

What is the worth of information Security in 21 st century? Imagine small or medium scale business having around 2500-4000 employees working. What if there is a data bridge of small or medium scale compony? Information carries by Venture are employees’ names, Address, Banking Forms, Tax forms which also includes Social incurrence Number and their dependents names and supporting information which may be sell or used for personal blackmails by intruders which was kind of storyline of Scotty’s Holdings data bridge [1] . Main base of this data bridge was email phishing which were send to all over compony employee pretending to be CEO. Which contains Employer identification number (EIN), Employer’s name, address, and ZIP code, Wages, tips, other compensation and many more fields. But it’s not the first or last compony to be a part of Email phishing Attack. Main purpose of Email Phishing scams is stealing banking credentials or any other form of credentials. Preventions Employer and Emp