Kumar Srivastava

San Francisco Bay Area Contact Info
7K followers 500+ connections

Join to view profile

About

I build delightful products.

Activity

Join now to see all activity

Experience & Education

  • Turing Labs Inc.

View Kumar’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Publications

  • Using Analytics to Enable Data-Driven Decisions in a Digital Ecosystem

    As businesses in today’s mobile-first digital world interact with partners, developers, and internal resources through app experiences and APIs, the number of sources of useful data has exploded. Success for enterprises requires end-to-end visibility across your entire digital value chain - from the backend, to the APIs that expose data and services, to the developers and apps that consume your APIs and build the customer experiences. Whether you are a product manager, app developer, API…

    As businesses in today’s mobile-first digital world interact with partners, developers, and internal resources through app experiences and APIs, the number of sources of useful data has exploded. Success for enterprises requires end-to-end visibility across your entire digital value chain - from the backend, to the APIs that expose data and services, to the developers and apps that consume your APIs and build the customer experiences. Whether you are a product manager, app developer, API developer, or API operations engineer, this course is designed to help you identify the metrics you should track for business and operational success of your API program, and gain an understanding of the analytics capabilities of Apigee Edge.

    See publication
  • Business Level Monitoring of Business Ecosystems

    Apigee

    Enterprises are adopting API strategies to open up access to their back-end systems enabling developers to innovate and build web and mobile apps. Today's economy is exploding with business being done via apps, and as a result more and more transactions flow from end users and developers to enterprises.

    See publication
  • Protecting end user privacy in the app economy

    Apigee

    As enterprises adjust to the new reality of business having moved beyond their core and legacy systems of record - to millions of mobile devices and social networks at the edge of the enterprise, to new distribution channels in the shape of apps which are often built by third party or partner developers - the question of end user privacy becomes increasingly important. As the app economy matures, it’s participants will have to quickly move from self governance to establishing standards or even…

    As enterprises adjust to the new reality of business having moved beyond their core and legacy systems of record - to millions of mobile devices and social networks at the edge of the enterprise, to new distribution channels in the shape of apps which are often built by third party or partner developers - the question of end user privacy becomes increasingly important. As the app economy matures, it’s participants will have to quickly move from self governance to establishing standards or even regulation to address end-user privacy expectations.

    See publication
  • Pragmatic Big Data for the App Economy

    Kumar Srivastava

    Meeting key business objectives (in the context of a platform strategy) such as increasing market share or profitability in the enterprise’s niche can be achieved by increasing the enterprise’s user base, the user engagement and improving the product mix.

    See publication
  • Survival Guide for the API Product Manager

    e-book

    As a product manager managing an API program, one can have several different factors to consider, track and plan for your API program. The considerations also vary by the stage of the API program that you are managing i.e. you could be launching a new API program or be tasked with managing a program that have been in existence for some time.
    The basics of product management do not change. Identifying your customers and ensuring that your product serves their needs is still the first and…

    As a product manager managing an API program, one can have several different factors to consider, track and plan for your API program. The considerations also vary by the stage of the API program that you are managing i.e. you could be launching a new API program or be tasked with managing a program that have been in existence for some time.
    The basics of product management do not change. Identifying your customers and ensuring that your product serves their needs is still the first and foremost goal of managing an API program.
    There are several customers for an API program but the main customer is the app developer that will use your APIs to build Apps. The end user of these apps is also your customer because actual use of your API will be done by end users using the apps that your developers would have built. Internally to your organization, your business line manager, operations, developers and internal system owners are also your customers as their workflows and day-to-day deliverables are tied intimately with your product.
    A successful API program hinges on your ability to delight your developers. A happy developer leads to incredible apps that use your APIs in ways that you could not have predicted leading to a more diverse end user set and higher profits.

    See publication
  • Data as Currency and Dealmaker

    Apigee

    The article describes data as fast becoming the de-facto currency for facilitating business deals and that a driver of a new model of collaboration. Data marketplaces are an up-and-coming business and while the Internet is full of open data, there's also plenty of data that companies will be willing to pay for - particularly if it's timely, curated, well aggregated, and insightful.

    Ability for businesses to access and synthesize data is a competitive edge. We will see more and more…

    The article describes data as fast becoming the de-facto currency for facilitating business deals and that a driver of a new model of collaboration. Data marketplaces are an up-and-coming business and while the Internet is full of open data, there's also plenty of data that companies will be willing to pay for - particularly if it's timely, curated, well aggregated, and insightful.

    Ability for businesses to access and synthesize data is a competitive edge. We will see more and more enterprises exposing their data schemas, formats and other related capabilities publicly though a common data description language and data explorer capabilities accessible by both humans and machines.

    See publication
  • What's your API's cachiness factor?

    Apigee

    This article describes the "cachiness factor" as the degree to which your API design supports the caching of responses. An API proxy can be designed to do a number of things when a request arrives including to determine the quality or fidelity of the data requested by the app or end user, pre-fetch data based on temporal and spatial locality, pre-fetch data based on similarity, and so on.

    "Cachiness in an API design refers to understanding how a piece of retrieved data can be reused to…

    This article describes the "cachiness factor" as the degree to which your API design supports the caching of responses. An API proxy can be designed to do a number of things when a request arrives including to determine the quality or fidelity of the data requested by the app or end user, pre-fetch data based on temporal and spatial locality, pre-fetch data based on similarity, and so on.

    "Cachiness in an API design refers to understanding how a piece of retrieved data can be reused to serve other API requests. Such an understanding can be transformed into a set of actions that store the retrieved copy of the data in an optimal form for reuse.This coupled with insights from API usage analytics can provide direct benefits in terms of app performance and operational costs."

    See publication
  • Protecting users, apps and APIs from abuse

    Apigee

    This article discusses common kinds of abuse and spam problems for APIs, apps and users. Also steps developers can take to protect their apps and end users, and API providers can take to protect their APIs.

    Protecting users, apps, and APIs from abuse
    http://blog.apigee.com/detail/protecting_users_apps_and_apis_from_abuse/

    The second post (Dealing with malicious attacks) looked at ways to react when a malicious user or app is detected, including blocking users and apps, quotas…

    This article discusses common kinds of abuse and spam problems for APIs, apps and users. Also steps developers can take to protect their apps and end users, and API providers can take to protect their APIs.

    Protecting users, apps, and APIs from abuse
    http://blog.apigee.com/detail/protecting_users_apps_and_apis_from_abuse/

    The second post (Dealing with malicious attacks) looked at ways to react when a malicious user or app is detected, including blocking users and apps, quotas and throttling or denying service. http://blog.apigee.com/detail/dealing_with_malicious_attacks/

    Part III (User Experience, data quality and dealing with mistakes) deals with considerations for designing for online safety, including the ability to dial the aggressiveness of the protection, detection, and remediation mechanisms up and down, and considerations for fine tuning such systems to optimize the security and experience of legitimate users while protecting APIs, apps, and users against abuse.
    http://blog.apigee.com/detail/user_experience_data_quality_and_dealing_with_mistakes/

    See publication
  • Communication Based Social Networks

    IADIS WWW/Internet 2006

    Over the internet, users interact through different mechanisms such as emails, blogs and discussion boards. With the advent of Session Initiation Protocol (SIP) based sessions, users are able to easily interact with each other through IP telephony and instant messages. Such SIP-based relationships create a wealth of information that can be used to map out relationships between users based on their communication behavior. These relationships can then be represented through social networks. We…

    Over the internet, users interact through different mechanisms such as emails, blogs and discussion boards. With the advent of Session Initiation Protocol (SIP) based sessions, users are able to easily interact with each other through IP telephony and instant messages. Such SIP-based relationships create a wealth of information that can be used to map out relationships between users based on their communication behavior. These relationships can then be represented through social networks. We present a mapping whereby SIP-based sessions can be aggregated to create communication-based relationships which in turn can be used to create comprehensive and detailed social networks.

    See publication
  • Preventing Spam For SIP-based Instant Messages and Sessions

    Columbia University Computer Science Technical Report Series

    As IP telephony becomes more widely deployed and used, tele-marketers or other spammers are bound to start using SIP-based calls and instant messages as a medium for sending spam. As is evident from the fate of email, protection against spam has to be built into SIP systems otherwise they are bound to fall prey to spam. Traditional approaches used to prevent spam in email such as content-based filtering and access lists are not applicable to SIP calls and instant messages in their present form.…

    As IP telephony becomes more widely deployed and used, tele-marketers or other spammers are bound to start using SIP-based calls and instant messages as a medium for sending spam. As is evident from the fate of email, protection against spam has to be built into SIP systems otherwise they are bound to fall prey to spam. Traditional approaches used to prevent spam in email such as content-based filtering and access lists are not applicable to SIP calls and instant messages in their present form. We propose Domain-based Authentication and Policy-Enforced for SIP (DAPES): a system that can be easily implemented and deployed in existing SIP networks. Our system is capable of determining in real time, whether an incoming call or instant message is likely to be spam or not, while at the same time, supporting communication between both known and unknown parties. DAPES includes the deployment of reputation systems in SIP networks to enable real-time transfer of reputation information between parties to allow communication between entities unknown to each other.

    See publication
  • A data driven, analytic approach for mobile phone carriers to increase user satisfaction, market share and profitability

    -

    Mobile phone and device carriers face stiff competition in their ranks. However, mobile phone carriers have access to tremendous amounts of continuous streams of data about users, their usage of mobile phones and services and their history of the service usage. This offers a massive opportunity to carriers to utilize this data to understand their users, the user lifecycle and phone and data usage models to implement market share increasing, profit increasing and customer satisfaction increasing…

    Mobile phone and device carriers face stiff competition in their ranks. However, mobile phone carriers have access to tremendous amounts of continuous streams of data about users, their usage of mobile phones and services and their history of the service usage. This offers a massive opportunity to carriers to utilize this data to understand their users, the user lifecycle and phone and data usage models to implement market share increasing, profit increasing and customer satisfaction increasing strategies with key in house or third party data analytics.

    See publication
  • Building collaborative, internet scale online safety services

    -

    As consumers send more and more time online, they face an ever increasing set of threats such as spam, phishing, malware, scams and spim. Similarly, online vendors and cloud service providers become the target of hacker and abuser attacks through malicious user registration, malicious content generation and distribution to legitimate users. This paper proposes the argument that no one online service provider has the data required to completely protect their customers and the nature of the…

    As consumers send more and more time online, they face an ever increasing set of threats such as spam, phishing, malware, scams and spim. Similarly, online vendors and cloud service providers become the target of hacker and abuser attacks through malicious user registration, malicious content generation and distribution to legitimate users. This paper proposes the argument that no one online service provider has the data required to completely protect their customers and the nature of the threat requires online service providers to work together, share data and jointly counteract the online safety threat. This paper describes a model for data sharing that supports and protects the online service provider’s business and strategic goals while providing a deeper and stronger line of defense for their service offerings. Ultimately, the entire ecosystem becomes more secure while enabling service providers to invest a majority of resources into features and improvements that users expect and care about from the service.

    See publication
  • Challenges in building an internet scale online safety service

    -

    As consumers send more and more time online, they face an ever increasing set of threats such as spam, phishing, malware, scams and spim. Similarly, online vendors and cloud service providers become the target of hacker and abuser attacks through malicious user registration, malicious content generation and distribution to legitimate users. This paper discusses the various challenges, issues and ideas that need careful assessment and planning to ensure that services can successfully deal with…

    As consumers send more and more time online, they face an ever increasing set of threats such as spam, phishing, malware, scams and spim. Similarly, online vendors and cloud service providers become the target of hacker and abuser attacks through malicious user registration, malicious content generation and distribution to legitimate users. This paper discusses the various challenges, issues and ideas that need careful assessment and planning to ensure that services can successfully deal with abuse on their online services or can provider such a service to other service vendors at internet scale.

    See publication

Patents

  • Automatic API façade generation in dynamic multi-tenant environments

    Issued US 10691689

  • Enhancing API messages

    Issued US 10666753

  • Automatic instrumentation of code

    Issued US 10489272

  • Enhancing API Service Schemes

    Issued US 9600251

    Embodiments of enhancing API servicing schemes are disclosed. A set of proxy code associated with servicing the API requests of an application is analyzed during development time to determine if any portion can be modified to improve the service scheme, prior to executing the set of proxy code in a runtime. After the set of proxy code is deployed in a runtime environment, performance data associated with the current service scheme is collected and periodically used to determine whether the…

    Embodiments of enhancing API servicing schemes are disclosed. A set of proxy code associated with servicing the API requests of an application is analyzed during development time to determine if any portion can be modified to improve the service scheme, prior to executing the set of proxy code in a runtime. After the set of proxy code is deployed in a runtime environment, performance data associated with the current service scheme is collected and periodically used to determine whether the service scheme for the API requests of the application is to be updated.

    See patent
  • System and method for investigating anomalies in API processing systems

    Issued US 9569332

    A method is provided for detecting irregularities of one or more application programmer interface (API) entities. The method includes receiving a request for data of one or more API entities. The method further includes monitoring said data from at least one server and detecting irregularities in the data. The method also includes displaying information pertaining to the irregularities to a user.

    See patent
  • Message Organization and Spam Filtering Based on User Interaction

    Issued US 8725811

    Embodiments of message organization and spam filtering based on user interaction are presented herein. In an implementation, user interaction with a plurality of messages in a user interface is monitored, which includes analyzing an amount of time spent by a user in interacting with each message. Subsequent messages may then be filtered based on the monitored user interaction. In another implementation, messages are processed that are received via a network using a spam filter that was…

    Embodiments of message organization and spam filtering based on user interaction are presented herein. In an implementation, user interaction with a plurality of messages in a user interface is monitored, which includes analyzing an amount of time spent by a user in interacting with each message. Subsequent messages may then be filtered based on the monitored user interaction. In another implementation, messages are processed that are received via a network using a spam filter that was generated based on monitored interaction of a user with previous messages. The processing results in a value describing a relative likelihood of importance of each of the processed message to the user. The processed messages are then arranged for display in an order, one to another, in a user interface based on respective values.

    See patent
  • Detecting A Compromised Online User Account

    Issued US US 13/110,202

    One or more techniques and/or systems are disclosed for detecting and/or mitigating a potentially compromised online user account. One or more baselines can be established for a user's online account to determine a normal usage pattern for the account by the user (e.g., frequency of incoming/outgoing emails, text messages, etc.). The online user account can be periodically or continually monitored for use of the same resources used to determine the baseline(s). If a deviation from the baseline…

    One or more techniques and/or systems are disclosed for detecting and/or mitigating a potentially compromised online user account. One or more baselines can be established for a user's online account to determine a normal usage pattern for the account by the user (e.g., frequency of incoming/outgoing emails, text messages, etc.). The online user account can be periodically or continually monitored for use of the same resources used to determine the baseline(s). If a deviation from the baseline is detected, the deviation may be compared against a threshold to determine whether the deviation indicates that the account may be compromised. When an indication of a potentially compromised account is detected, the user can be notified of the indication, so that one or more actions can be taken to mitigate the potentially compromised account.

    See patent
  • Mitigating use of machine solvable Human Interactive Proofs (HIPs)

    Issued US US 13/013,968

    One or more techniques and/or systems are disclosed for mitigating machine solvable human interactive proofs (HIPs). A classifier is trained over a set of one or more training HIPs that have known characteristics for OCR solvability and HIP solving pattern from actual use. A HIP classification is determined for a HIP (such as from a HIP library used by a HIP generator) using the trained classifier. If the HIP is classified by the trained classifier as a merely human solvable classification…

    One or more techniques and/or systems are disclosed for mitigating machine solvable human interactive proofs (HIPs). A classifier is trained over a set of one or more training HIPs that have known characteristics for OCR solvability and HIP solving pattern from actual use. A HIP classification is determined for a HIP (such as from a HIP library used by a HIP generator) using the trained classifier. If the HIP is classified by the trained classifier as a merely human solvable classification, such that it may not be solved by a machine, the HIP can be identified for use in the HIP generation system. Otherwise, the HIP can be altered to (attempt to) be merely human solvable

    See patent
  • Detection and Removal of Undesirable Items in a Data Processing Environment

    Issued US AG06F1516FI

    Functionality is described for addressing a threat to the security of a user device that utilizes a network-accessible service. The functionality operates by assessing the likelihood that the user device is infected by the undesirable item. When the user device makes a request to access the network-accessible service, the functionality can interact with the user device in a manner that is governed by the assessed likelihood that the user device is infected by the undesirable item.

    See patent

Honors & Awards

  • Keynote Speaker

    AI Summit San Francisco

    Closing Keynote Speaker

  • Speaker

    Robobusiness 2017

  • Speaker

    Earley Executive Roundtable SERIES on Chatbots in Financial Services

    http://www.earley.com/training-webinars/roundtable-series-session-3-how-financial-services-organizations-are-using-chatbot

  • Speaker

    IoTWorld 2017

    https://tmt.knect365.com/iot-world/speakers/kumar-srivastava-1

  • Speaker

    Gigaom AI 2017

    https://gigaom.com/ai/

  • Executive Attendee

    IoT6 Exchange 2016

  • Speaker

    Big Data Marketing Summit 2016

    https://theinnovationenterprise.com/summits/big-data-analytics-for-marketing-summit-new-york

  • Speaker, Executive Summit

    AI World, Executive Summit 2016

    http://aiworldexpo.com/speakers/kumar-srivastava/

  • Speaker and Panelist

    Smart Home Summit

    http://get.knect365.com/smart-home-summit-2016-conference-brochure/

  • Speaker & Panelist

    AI Summit San Francisco

    https://theaisummit.com/sanfrancisco/

  • Speaker, Data Driven Product Innovation

    -

    https://theinnovationenterprise.com/summits/data-product-innovation-summit-austin-2016

  • Executive Attendee, LeverageBigData 2016

    Datanami

    http://www.leveragebigdata.com/

  • Speaker and Panelist, Internet of Things World 2016

    https://iotworldevent.com/speaker/kumar-srivastava/

  • Speaker and Panelist, Big Data Innovation Summit, San Francisco 2016

    -

    https://theinnovationenterprise.com/summits/big-data-innovation-summit-san-francisco-2017/speakers

  • Speaker and Panelist, Enterprise Data World/CDO Vision, San Diego 2016

    -

    http://edw2016.dataversity.net/sessionPop.cfm?confid=94&proposalid=9006

  • ClearStory solution named "Visionary"

    Gartner Magic Quadrant for Business Intelligence and Analytics Platforms

    “Smart data preparation on multi-structured data is a core visionary feature in this category, because the need to automatically profile, enrich and infer relationships (to automatically generate a model for analysis)"

  • "You've Got My Back" - Sales Team Appreciation Award

    ClearStory Data Sales

  • Speaker, Data & Analytics Week, Las Vegas 2014

    -

    http://www.so-co-it.com/post/351558/clearstory-data-to-present-on-fast-multi-source-analysis-at-data-analytics-week.html/

  • "Standout Analytics" - Apigee Analytics recognized in The Forrester Wave™: API Management Solutions, Q3 2014"

    The Forrester Wave™

    "Apigee's standout feature is its analytics and it is well-rounded across other criteria and the only vendor to have full capabilities in three of our added value feature criteria: API hosting, mobile app support and turnkey billing," noted the Forrester report."

  • Apigee Kick Ass Club 2014

    Apigee

    Apigee Top Performers.

Languages

  • Hindi

    Native or bilingual proficiency

  • French

    Limited working proficiency

More activity by Kumar

View Kumar’s full profile

  • See who you know in common
  • Get introduced
  • Contact Kumar directly
Join to view full profile

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Kumar Srivastava in United States

Add new skills with these courses