Profile

Cover photo
Dipti Ranjan Nayak
Works at Protogenist Info Systems (P) Ltd
Attended Regional College Of Management
Lives in Bhubaneswar
311 followers|10,712 views
AboutPostsPhotosVideos+1's

Stream

Have him in circles
311 people
Angelika Davey's profile photo
Tedora Vohs's profile photo
Lalaine u. Holger Theobald's profile photo
Sadie Murray's profile photo
Massimo Luciani's profile photo
Jørgen Johansen's profile photo
Suman Das's profile photo

Dipti Ranjan Nayak

Shared publicly  - 
2
Add a comment...

Dipti Ranjan Nayak

Shared publicly  - 
 
Event Gateway, IM, and SMS injection in ColdFusion 8
1
Add a comment...
People
Have him in circles
311 people
Angelika Davey's profile photo
Tedora Vohs's profile photo
Lalaine u. Holger Theobald's profile photo
Sadie Murray's profile photo
Massimo Luciani's profile photo
Jørgen Johansen's profile photo
Suman Das's profile photo
Work
Occupation
Administrative
Employment
  • Protogenist Info Systems (P) Ltd
    Director, 2011 - present
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
Bhubaneswar
Previously
Salipur
Links
Other profiles
Contributor to
Story
Introduction
Working at Protogenist Info Systems
Education
  • Regional College Of Management
    2009
Basic Information
Gender
Male
Birthday
June 5
Other names
dipti
Dipti Ranjan Nayak's +1's are the things they like, agree with, or want to recommend.
Two Party Threat Model and Trust Assumptions
blog.protogenist.com

This threat model assumes that all databases (DBs) do not trust each other and that no information from one set of data should be learned by

Diptiranjan Nayak - Business Networking on Ecademy
www.ecademy.com

Join Ecademy for online networking, networking events, business support and networking groups for entrepreneurs and small business owners.

Is the stored biometric information “personal”? How sensitive and unique...
blog.protogenist.com

In some Canadian jurisdictions, personal information is defined as recorded information about an identifiable individual, other than contact

Managing Safe Recipients
blog.protogenist.com

The Safe Recipients list allows you to specify email addresses or domain names that will not filter the messages you send to them. You can a

Protecting Embedded-Systems Security
blog.protogenist.com

The key to preventing such disasters is to equip mobile devices with software that is secure by design. As the experience of the PC world sh

On-chip Optical Interlink
blog.protogenist.com

With the rapid expansion of cloud computing and server farms, data centers are having a hard time keeping the amount of cabling, and power,

What is a Non-Delivery Report?
blog.protogenist.com

Email systems support a service called Delivery Status Notification or DSN for short. This feature allows end users to be notified of succes

Tips for Creating an Effective Sign-up Form
blog.protogenist.com

There are many aspects that make a sign-up form effective. Follow these guidelines when including a sign-up form within your marketing campa

Quantum public keys
blog.protogenist.com

A quantum public key is a quantum state drawn from a set of non-orthogonal states. Multiple copies of the same key can be issued and distrib

Parallel Distributed Network Simulator
blog.protogenist.com

PDNS is based on the ns2 simulation tool. Each PDNS federate differs from ns2 in two important respects. First, modifications to ns2 were re

Memory errors in C : Terminology
blog.protogenist.com

Using terminology from SafeC, memory errors in C programs can be classifieds into two different types: Spatial memory errors and; Temporal m

Event Gateway, IM, and SMS injection in ColdFusion 8
blog.protogenist.com

ColdFusion 8 enables Event Gateways, instant messaging (IM), and SMS (short message service) for interacting with external systems. Event Ga

Designing and implementing security & privacy controls
blog.protogenist.com

We apply generally accepted frameworks – such as ISO27001, CoBIT and ISF – to enable secure businesses through Cloud computing. Our risk bas

Uses of Optics in Computing
blog.protogenist.com

Currently, optics is used mostly to link portions of computers, or more intrinsically in devices that have some optical application or compo

Run Time Infrastructure Kit
blog.protogenist.com

(Run Time Infrastructure Kit) RTI-Kit is a component of the Federated Simulations Development Kit (FDK). It provides a set of libraries for

RFID today and tomorrow
blog.protogenist.com

Many of us already use RFID tags routinely. Examples include: Proximity cards, that is, the contactless cards used for building access. Auto

6 Simple Steps to Beat Phishing
blog.protogenist.com

Everybody knows about phishing. Phishers impersonate a trusted web site, commonly a bank or an online payment provider, in order to extract

Hierarchical Load Balance for Large-Scale Network Simulation
blog.protogenist.com

Scalability Challenge in Network Simulation. To achieve scalable performance, MaSSF uses a distributed simulation engine running on a cluste

The Advantages and Problems of URL Filtering
blog.protogenist.com

While a single spam campaign might be sent from thousands of locations around the world in order to defeat IP-blacklists, it is much more di

Keyword Search Over Semistructured And Structured Databases
blog.protogenist.com

Keyword-based search is very useful for unstructured documents, and often is the onlyway to query such data. Keyword search also can be very