About
Activity
-
This actually blew my mind when William Welch showed it to me. LLM-powered synthetic data! Keep a close on Neosync - we might be launching a first of…
This actually blew my mind when William Welch showed it to me. LLM-powered synthetic data! Keep a close on Neosync - we might be launching a first of…
Liked by Kumar Srivastava
-
Security teams complain how they cannot hire "experienced" professionals. Here is a hacker learning on the job. Doing bing searches, downloading…
Security teams complain how they cannot hire "experienced" professionals. Here is a hacker learning on the job. Doing bing searches, downloading…
Liked by Kumar Srivastava
Experience & Education
Publications
-
Using Analytics to Enable Data-Driven Decisions in a Digital Ecosystem
As businesses in today’s mobile-first digital world interact with partners, developers, and internal resources through app experiences and APIs, the number of sources of useful data has exploded. Success for enterprises requires end-to-end visibility across your entire digital value chain - from the backend, to the APIs that expose data and services, to the developers and apps that consume your APIs and build the customer experiences. Whether you are a product manager, app developer, API…
As businesses in today’s mobile-first digital world interact with partners, developers, and internal resources through app experiences and APIs, the number of sources of useful data has exploded. Success for enterprises requires end-to-end visibility across your entire digital value chain - from the backend, to the APIs that expose data and services, to the developers and apps that consume your APIs and build the customer experiences. Whether you are a product manager, app developer, API developer, or API operations engineer, this course is designed to help you identify the metrics you should track for business and operational success of your API program, and gain an understanding of the analytics capabilities of Apigee Edge.
-
Business Level Monitoring of Business Ecosystems
Apigee
Enterprises are adopting API strategies to open up access to their back-end systems enabling developers to innovate and build web and mobile apps. Today's economy is exploding with business being done via apps, and as a result more and more transactions flow from end users and developers to enterprises.
-
Protecting end user privacy in the app economy
Apigee
As enterprises adjust to the new reality of business having moved beyond their core and legacy systems of record - to millions of mobile devices and social networks at the edge of the enterprise, to new distribution channels in the shape of apps which are often built by third party or partner developers - the question of end user privacy becomes increasingly important. As the app economy matures, it’s participants will have to quickly move from self governance to establishing standards or even…
As enterprises adjust to the new reality of business having moved beyond their core and legacy systems of record - to millions of mobile devices and social networks at the edge of the enterprise, to new distribution channels in the shape of apps which are often built by third party or partner developers - the question of end user privacy becomes increasingly important. As the app economy matures, it’s participants will have to quickly move from self governance to establishing standards or even regulation to address end-user privacy expectations.
-
Pragmatic Big Data for the App Economy
Kumar Srivastava
Meeting key business objectives (in the context of a platform strategy) such as increasing market share or profitability in the enterprise’s niche can be achieved by increasing the enterprise’s user base, the user engagement and improving the product mix.
-
Survival Guide for the API Product Manager
e-book
As a product manager managing an API program, one can have several different factors to consider, track and plan for your API program. The considerations also vary by the stage of the API program that you are managing i.e. you could be launching a new API program or be tasked with managing a program that have been in existence for some time.
The basics of product management do not change. Identifying your customers and ensuring that your product serves their needs is still the first and…As a product manager managing an API program, one can have several different factors to consider, track and plan for your API program. The considerations also vary by the stage of the API program that you are managing i.e. you could be launching a new API program or be tasked with managing a program that have been in existence for some time.
The basics of product management do not change. Identifying your customers and ensuring that your product serves their needs is still the first and foremost goal of managing an API program.
There are several customers for an API program but the main customer is the app developer that will use your APIs to build Apps. The end user of these apps is also your customer because actual use of your API will be done by end users using the apps that your developers would have built. Internally to your organization, your business line manager, operations, developers and internal system owners are also your customers as their workflows and day-to-day deliverables are tied intimately with your product.
A successful API program hinges on your ability to delight your developers. A happy developer leads to incredible apps that use your APIs in ways that you could not have predicted leading to a more diverse end user set and higher profits. -
Data as Currency and Dealmaker
Apigee
The article describes data as fast becoming the de-facto currency for facilitating business deals and that a driver of a new model of collaboration. Data marketplaces are an up-and-coming business and while the Internet is full of open data, there's also plenty of data that companies will be willing to pay for - particularly if it's timely, curated, well aggregated, and insightful.
Ability for businesses to access and synthesize data is a competitive edge. We will see more and more…The article describes data as fast becoming the de-facto currency for facilitating business deals and that a driver of a new model of collaboration. Data marketplaces are an up-and-coming business and while the Internet is full of open data, there's also plenty of data that companies will be willing to pay for - particularly if it's timely, curated, well aggregated, and insightful.
Ability for businesses to access and synthesize data is a competitive edge. We will see more and more enterprises exposing their data schemas, formats and other related capabilities publicly though a common data description language and data explorer capabilities accessible by both humans and machines. -
What's your API's cachiness factor?
Apigee
This article describes the "cachiness factor" as the degree to which your API design supports the caching of responses. An API proxy can be designed to do a number of things when a request arrives including to determine the quality or fidelity of the data requested by the app or end user, pre-fetch data based on temporal and spatial locality, pre-fetch data based on similarity, and so on.
"Cachiness in an API design refers to understanding how a piece of retrieved data can be reused to…This article describes the "cachiness factor" as the degree to which your API design supports the caching of responses. An API proxy can be designed to do a number of things when a request arrives including to determine the quality or fidelity of the data requested by the app or end user, pre-fetch data based on temporal and spatial locality, pre-fetch data based on similarity, and so on.
"Cachiness in an API design refers to understanding how a piece of retrieved data can be reused to serve other API requests. Such an understanding can be transformed into a set of actions that store the retrieved copy of the data in an optimal form for reuse.This coupled with insights from API usage analytics can provide direct benefits in terms of app performance and operational costs." -
Protecting users, apps and APIs from abuse
Apigee
This article discusses common kinds of abuse and spam problems for APIs, apps and users. Also steps developers can take to protect their apps and end users, and API providers can take to protect their APIs.
Protecting users, apps, and APIs from abuse
http://blog.apigee.com/detail/protecting_users_apps_and_apis_from_abuse/
The second post (Dealing with malicious attacks) looked at ways to react when a malicious user or app is detected, including blocking users and apps, quotas…This article discusses common kinds of abuse and spam problems for APIs, apps and users. Also steps developers can take to protect their apps and end users, and API providers can take to protect their APIs.
Protecting users, apps, and APIs from abuse
http://blog.apigee.com/detail/protecting_users_apps_and_apis_from_abuse/
The second post (Dealing with malicious attacks) looked at ways to react when a malicious user or app is detected, including blocking users and apps, quotas and throttling or denying service. http://blog.apigee.com/detail/dealing_with_malicious_attacks/
Part III (User Experience, data quality and dealing with mistakes) deals with considerations for designing for online safety, including the ability to dial the aggressiveness of the protection, detection, and remediation mechanisms up and down, and considerations for fine tuning such systems to optimize the security and experience of legitimate users while protecting APIs, apps, and users against abuse.
http://blog.apigee.com/detail/user_experience_data_quality_and_dealing_with_mistakes/ -
Communication Based Social Networks
IADIS WWW/Internet 2006
Over the internet, users interact through different mechanisms such as emails, blogs and discussion boards. With the advent of Session Initiation Protocol (SIP) based sessions, users are able to easily interact with each other through IP telephony and instant messages. Such SIP-based relationships create a wealth of information that can be used to map out relationships between users based on their communication behavior. These relationships can then be represented through social networks. We…
Over the internet, users interact through different mechanisms such as emails, blogs and discussion boards. With the advent of Session Initiation Protocol (SIP) based sessions, users are able to easily interact with each other through IP telephony and instant messages. Such SIP-based relationships create a wealth of information that can be used to map out relationships between users based on their communication behavior. These relationships can then be represented through social networks. We present a mapping whereby SIP-based sessions can be aggregated to create communication-based relationships which in turn can be used to create comprehensive and detailed social networks.
-
Preventing Spam For SIP-based Instant Messages and Sessions
Columbia University Computer Science Technical Report Series
As IP telephony becomes more widely deployed and used, tele-marketers or other spammers are bound to start using SIP-based calls and instant messages as a medium for sending spam. As is evident from the fate of email, protection against spam has to be built into SIP systems otherwise they are bound to fall prey to spam. Traditional approaches used to prevent spam in email such as content-based filtering and access lists are not applicable to SIP calls and instant messages in their present form.…
As IP telephony becomes more widely deployed and used, tele-marketers or other spammers are bound to start using SIP-based calls and instant messages as a medium for sending spam. As is evident from the fate of email, protection against spam has to be built into SIP systems otherwise they are bound to fall prey to spam. Traditional approaches used to prevent spam in email such as content-based filtering and access lists are not applicable to SIP calls and instant messages in their present form. We propose Domain-based Authentication and Policy-Enforced for SIP (DAPES): a system that can be easily implemented and deployed in existing SIP networks. Our system is capable of determining in real time, whether an incoming call or instant message is likely to be spam or not, while at the same time, supporting communication between both known and unknown parties. DAPES includes the deployment of reputation systems in SIP networks to enable real-time transfer of reputation information between parties to allow communication between entities unknown to each other.
-
A data driven, analytic approach for mobile phone carriers to increase user satisfaction, market share and profitability
-
Mobile phone and device carriers face stiff competition in their ranks. However, mobile phone carriers have access to tremendous amounts of continuous streams of data about users, their usage of mobile phones and services and their history of the service usage. This offers a massive opportunity to carriers to utilize this data to understand their users, the user lifecycle and phone and data usage models to implement market share increasing, profit increasing and customer satisfaction increasing…
Mobile phone and device carriers face stiff competition in their ranks. However, mobile phone carriers have access to tremendous amounts of continuous streams of data about users, their usage of mobile phones and services and their history of the service usage. This offers a massive opportunity to carriers to utilize this data to understand their users, the user lifecycle and phone and data usage models to implement market share increasing, profit increasing and customer satisfaction increasing strategies with key in house or third party data analytics.
-
Building collaborative, internet scale online safety services
-
As consumers send more and more time online, they face an ever increasing set of threats such as spam, phishing, malware, scams and spim. Similarly, online vendors and cloud service providers become the target of hacker and abuser attacks through malicious user registration, malicious content generation and distribution to legitimate users. This paper proposes the argument that no one online service provider has the data required to completely protect their customers and the nature of the…
As consumers send more and more time online, they face an ever increasing set of threats such as spam, phishing, malware, scams and spim. Similarly, online vendors and cloud service providers become the target of hacker and abuser attacks through malicious user registration, malicious content generation and distribution to legitimate users. This paper proposes the argument that no one online service provider has the data required to completely protect their customers and the nature of the threat requires online service providers to work together, share data and jointly counteract the online safety threat. This paper describes a model for data sharing that supports and protects the online service provider’s business and strategic goals while providing a deeper and stronger line of defense for their service offerings. Ultimately, the entire ecosystem becomes more secure while enabling service providers to invest a majority of resources into features and improvements that users expect and care about from the service.
-
Challenges in building an internet scale online safety service
-
As consumers send more and more time online, they face an ever increasing set of threats such as spam, phishing, malware, scams and spim. Similarly, online vendors and cloud service providers become the target of hacker and abuser attacks through malicious user registration, malicious content generation and distribution to legitimate users. This paper discusses the various challenges, issues and ideas that need careful assessment and planning to ensure that services can successfully deal with…
As consumers send more and more time online, they face an ever increasing set of threats such as spam, phishing, malware, scams and spim. Similarly, online vendors and cloud service providers become the target of hacker and abuser attacks through malicious user registration, malicious content generation and distribution to legitimate users. This paper discusses the various challenges, issues and ideas that need careful assessment and planning to ensure that services can successfully deal with abuse on their online services or can provider such a service to other service vendors at internet scale.
Patents
-
Automatic API façade generation in dynamic multi-tenant environments
Issued US 10691689
-
Enhancing API messages
Issued US 10666753
-
Enhancing API Service Schemes
Issued US 9600251
Embodiments of enhancing API servicing schemes are disclosed. A set of proxy code associated with servicing the API requests of an application is analyzed during development time to determine if any portion can be modified to improve the service scheme, prior to executing the set of proxy code in a runtime. After the set of proxy code is deployed in a runtime environment, performance data associated with the current service scheme is collected and periodically used to determine whether the…
Embodiments of enhancing API servicing schemes are disclosed. A set of proxy code associated with servicing the API requests of an application is analyzed during development time to determine if any portion can be modified to improve the service scheme, prior to executing the set of proxy code in a runtime. After the set of proxy code is deployed in a runtime environment, performance data associated with the current service scheme is collected and periodically used to determine whether the service scheme for the API requests of the application is to be updated.
-
System and method for investigating anomalies in API processing systems
Issued US 9569332
A method is provided for detecting irregularities of one or more application programmer interface (API) entities. The method includes receiving a request for data of one or more API entities. The method further includes monitoring said data from at least one server and detecting irregularities in the data. The method also includes displaying information pertaining to the irregularities to a user.
-
Message Organization and Spam Filtering Based on User Interaction
Issued US 8725811
Embodiments of message organization and spam filtering based on user interaction are presented herein. In an implementation, user interaction with a plurality of messages in a user interface is monitored, which includes analyzing an amount of time spent by a user in interacting with each message. Subsequent messages may then be filtered based on the monitored user interaction. In another implementation, messages are processed that are received via a network using a spam filter that was…
Embodiments of message organization and spam filtering based on user interaction are presented herein. In an implementation, user interaction with a plurality of messages in a user interface is monitored, which includes analyzing an amount of time spent by a user in interacting with each message. Subsequent messages may then be filtered based on the monitored user interaction. In another implementation, messages are processed that are received via a network using a spam filter that was generated based on monitored interaction of a user with previous messages. The processing results in a value describing a relative likelihood of importance of each of the processed message to the user. The processed messages are then arranged for display in an order, one to another, in a user interface based on respective values.
-
Detecting A Compromised Online User Account
Issued US US 13/110,202
One or more techniques and/or systems are disclosed for detecting and/or mitigating a potentially compromised online user account. One or more baselines can be established for a user's online account to determine a normal usage pattern for the account by the user (e.g., frequency of incoming/outgoing emails, text messages, etc.). The online user account can be periodically or continually monitored for use of the same resources used to determine the baseline(s). If a deviation from the baseline…
One or more techniques and/or systems are disclosed for detecting and/or mitigating a potentially compromised online user account. One or more baselines can be established for a user's online account to determine a normal usage pattern for the account by the user (e.g., frequency of incoming/outgoing emails, text messages, etc.). The online user account can be periodically or continually monitored for use of the same resources used to determine the baseline(s). If a deviation from the baseline is detected, the deviation may be compared against a threshold to determine whether the deviation indicates that the account may be compromised. When an indication of a potentially compromised account is detected, the user can be notified of the indication, so that one or more actions can be taken to mitigate the potentially compromised account.
-
Mitigating use of machine solvable Human Interactive Proofs (HIPs)
Issued US US 13/013,968
One or more techniques and/or systems are disclosed for mitigating machine solvable human interactive proofs (HIPs). A classifier is trained over a set of one or more training HIPs that have known characteristics for OCR solvability and HIP solving pattern from actual use. A HIP classification is determined for a HIP (such as from a HIP library used by a HIP generator) using the trained classifier. If the HIP is classified by the trained classifier as a merely human solvable classification…
One or more techniques and/or systems are disclosed for mitigating machine solvable human interactive proofs (HIPs). A classifier is trained over a set of one or more training HIPs that have known characteristics for OCR solvability and HIP solving pattern from actual use. A HIP classification is determined for a HIP (such as from a HIP library used by a HIP generator) using the trained classifier. If the HIP is classified by the trained classifier as a merely human solvable classification, such that it may not be solved by a machine, the HIP can be identified for use in the HIP generation system. Otherwise, the HIP can be altered to (attempt to) be merely human solvable
-
Detection and Removal of Undesirable Items in a Data Processing Environment
Issued US AG06F1516FI
Functionality is described for addressing a threat to the security of a user device that utilizes a network-accessible service. The functionality operates by assessing the likelihood that the user device is infected by the undesirable item. When the user device makes a request to access the network-accessible service, the functionality can interact with the user device in a manner that is governed by the assessed likelihood that the user device is infected by the undesirable item.
Honors & Awards
-
Keynote Speaker
AI Summit San Francisco
Closing Keynote Speaker
-
Speaker
Robobusiness 2017
-
Speaker
Earley Executive Roundtable SERIES on Chatbots in Financial Services
http://www.earley.com/training-webinars/roundtable-series-session-3-how-financial-services-organizations-are-using-chatbot
-
Speaker
IoTWorld 2017
https://tmt.knect365.com/iot-world/speakers/kumar-srivastava-1
-
Speaker
Gigaom AI 2017
https://gigaom.com/ai/
-
Executive Attendee
IoT6 Exchange 2016
-
Speaker
Big Data Marketing Summit 2016
https://theinnovationenterprise.com/summits/big-data-analytics-for-marketing-summit-new-york
-
Speaker, Executive Summit
AI World, Executive Summit 2016
http://aiworldexpo.com/speakers/kumar-srivastava/
-
Speaker and Panelist
Smart Home Summit
http://get.knect365.com/smart-home-summit-2016-conference-brochure/
-
Speaker & Panelist
AI Summit San Francisco
https://theaisummit.com/sanfrancisco/
-
Speaker, Data Driven Product Innovation
-
https://theinnovationenterprise.com/summits/data-product-innovation-summit-austin-2016
-
Executive Attendee, LeverageBigData 2016
Datanami
http://www.leveragebigdata.com/
-
Speaker and Panelist, Internet of Things World 2016
https://iotworldevent.com/speaker/kumar-srivastava/
-
Speaker and Panelist, Big Data Innovation Summit, San Francisco 2016
-
https://theinnovationenterprise.com/summits/big-data-innovation-summit-san-francisco-2017/speakers
-
Speaker and Panelist, Enterprise Data World/CDO Vision, San Diego 2016
-
http://edw2016.dataversity.net/sessionPop.cfm?confid=94&proposalid=9006
-
ClearStory solution named "Visionary"
Gartner Magic Quadrant for Business Intelligence and Analytics Platforms
“Smart data preparation on multi-structured data is a core visionary feature in this category, because the need to automatically profile, enrich and infer relationships (to automatically generate a model for analysis)"
-
"You've Got My Back" - Sales Team Appreciation Award
ClearStory Data Sales
-
Speaker, Data & Analytics Week, Las Vegas 2014
-
http://www.so-co-it.com/post/351558/clearstory-data-to-present-on-fast-multi-source-analysis-at-data-analytics-week.html/
-
"Standout Analytics" - Apigee Analytics recognized in The Forrester Wave™: API Management Solutions, Q3 2014"
The Forrester Wave™
"Apigee's standout feature is its analytics and it is well-rounded across other criteria and the only vendor to have full capabilities in three of our added value feature criteria: API hosting, mobile app support and turnkey billing," noted the Forrester report."
-
Apigee Kick Ass Club 2014
Apigee
Apigee Top Performers.
Languages
-
Hindi
Native or bilingual proficiency
-
French
Limited working proficiency
More activity by Kumar
-
Congratulations to General Partner Rashmi Gopinath on being named one of GrowthCap's top 25 Software Investors of 2021! Rashmi has over two decades…
Congratulations to General Partner Rashmi Gopinath on being named one of GrowthCap's top 25 Software Investors of 2021! Rashmi has over two decades…
Liked by Kumar Srivastava
-
Thrilled to partner with Rajeev Madhavan and Chris Rust at Clear Ventures. Clear Ventures focuses on early-stage DeepTech and AI startups in areas we…
Thrilled to partner with Rajeev Madhavan and Chris Rust at Clear Ventures. Clear Ventures focuses on early-stage DeepTech and AI startups in areas we…
Liked by Kumar Srivastava
-
LinkedIn has changed my life in so many ways since I joined back in 2016. I'll always remember how warm of a welcome I received upon joining and…
LinkedIn has changed my life in so many ways since I joined back in 2016. I'll always remember how warm of a welcome I received upon joining and…
Liked by Kumar Srivastava
-
Here's what our Founder and CEO, Prem Kiran, has to say about our recent mention in the Gartner Hype Cycles! Learn what the hype is all about -…
Here's what our Founder and CEO, Prem Kiran, has to say about our recent mention in the Gartner Hype Cycles! Learn what the hype is all about -…
Liked by Kumar Srivastava
-
We’re excited to welcome Paul Erickson as the VP of Sales at Hypersonix Inc.! Paul brings deep experience in developing and leading high-performing…
We’re excited to welcome Paul Erickson as the VP of Sales at Hypersonix Inc.! Paul brings deep experience in developing and leading high-performing…
Liked by Kumar Srivastava
-
Celebrating the spirit of human intelligence powering innovative solutions. Happy Labor Day! #LaborDay2021 #LaborDay
Celebrating the spirit of human intelligence powering innovative solutions. Happy Labor Day! #LaborDay2021 #LaborDay
Liked by Kumar Srivastava
-
Excited to be included in multiple Gartner Hype Cycles and Market Guide! #augmentedanalytics #BI3.0 #revenueintelligence
Excited to be included in multiple Gartner Hype Cycles and Market Guide! #augmentedanalytics #BI3.0 #revenueintelligence
Liked by Kumar Srivastava
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Kumar Srivastava in United States
-
Ankit Kumar Srivastava
-
Amit Kumar Srivastava
-
Tarun Kumar S.
SRE/DevOps - Kubernetes Platform
-
Ravi Kumar Srivastava
99 others named Kumar Srivastava in United States are on LinkedIn
See others named Kumar Srivastava