About
Articles by Rohit
-
5 Questions to Ask Before Choosing an Approach to ZTNA
5 Questions to Ask Before Choosing an Approach to ZTNA
By Rohit Kalbag
-
Turn Your Old Smartphone into a Secure Live IP Streaming Camera With CloudConnexa™
Turn Your Old Smartphone into a Secure Live IP Streaming Camera With CloudConnexa™
By Rohit Kalbag
-
Three Ways to Integrate Device Posture Checks With Your VPN
Three Ways to Integrate Device Posture Checks With Your VPN
By Rohit Kalbag
Activity
-
Exciting new beginnings as I step into my second innings! I am thrilled to announce that I will be joining Verizon as Senior Manager - AI Product…
Exciting new beginnings as I step into my second innings! I am thrilled to announce that I will be joining Verizon as Senior Manager - AI Product…
Liked by Rohit Kalbag
-
Introducing the A.C.T.I.O.N. Framework Your essential project management approach. 🌟 In this guide, I show my A.C.T.I.O.N. framework. A -…
Introducing the A.C.T.I.O.N. Framework Your essential project management approach. 🌟 In this guide, I show my A.C.T.I.O.N. framework. A -…
Liked by Rohit Kalbag
-
As a passionate advocate against modern slavery and exploitation, I'm so proud to serve on the board of EverFree. I've seen firsthand the profound…
As a passionate advocate against modern slavery and exploitation, I'm so proud to serve on the board of EverFree. I've seen firsthand the profound…
Liked by Rohit Kalbag
Experience & Education
Licenses & Certifications
Publications
-
Data Management, IN Services and Interworking in DAWN - A Distributed Architecture for Wireless PCS Networks: An Overview
-
-
Interworking of A Distributed Architecture for Wireless PCS Networks with Conventional Networks: Issues and Illustrations
-
Patents
-
Download localized portion of large database based on cellular network topology
Issued US 9,578,679
A wireless mobile communication device includes a wireless communication subsystem configured to wirelessly communicate through a local data access point to cause a query to be delivered to a remote access point location database. The location database contains information about the location of local data access points within a widespread area. The query is for location information for data access points located near the wireless device. The wireless device receives nearby access point location…
A wireless mobile communication device includes a wireless communication subsystem configured to wirelessly communicate through a local data access point to cause a query to be delivered to a remote access point location database. The location database contains information about the location of local data access points within a widespread area. The query is for location information for data access points located near the wireless device. The wireless device receives nearby access point location information from the database, and the device causes at least a portion of the access point location information to be delivered to a user. This may be done through a user interface, upon request of the user, and while the wireless communication subsystem is not connected to a local data access point.
Other inventors -
Method, apparatus, and computer program product for authenticating subscriber communications at a network server
Issued US 8,964,633
An apparatus for authenticating subscriber communications at a network server includes a determining element and an identification element in communication with the determining element. The determining element may be configured to receive an incoming message. The identification extractor may be configured to extract a device identifier and an address identifier from the incoming message. The determining element may be further configured to determine whether the device identifier and the address…
An apparatus for authenticating subscriber communications at a network server includes a determining element and an identification element in communication with the determining element. The determining element may be configured to receive an incoming message. The identification extractor may be configured to extract a device identifier and an address identifier from the incoming message. The determining element may be further configured to determine whether the device identifier and the address identifier of the incoming message match both a registered device identifier and a registered address identifier associated with the registered device identifier, respectively.
Other inventors -
-
Wireless mobile communication device with autonomous Wi-Fi control based on motion of device
Issued US 8,964,709
A wireless mobile communication device may include a Wi-Fi data communication system, an operational condition detection system, and a Wi-Fi activation system. The operational condition detection system may be configured to detect an operational condition of the wireless mobile communication device, other than actuation of a user-operated control. The operational condition may be when a motion sensor senses that the wireless mobile communication device has been substantially motionless. The…
A wireless mobile communication device may include a Wi-Fi data communication system, an operational condition detection system, and a Wi-Fi activation system. The operational condition detection system may be configured to detect an operational condition of the wireless mobile communication device, other than actuation of a user-operated control. The operational condition may be when a motion sensor senses that the wireless mobile communication device has been substantially motionless. The Wi-Fi activation system may be configured to autonomously turn power on to the Wi-Fi data communication system upon detection of an operational condition of the wireless mobile communication device by the operational condition detection system, other than actuation of a user-operated control.
-
Wireless mobile communication device with autonomous Wi-Fi control based on location of device
Issued US 8,953,569
A wireless mobile communication device may include a Wi-Fi data communication system, an operational condition detection system, and a Wi-Fi activation system. The operational condition detection system may include a location sensor. The operational condition detection system may be configured to detect an operational condition of the wireless mobile communication device, other than actuation of a user-operated control, including when the location sensor determines that the wireless mobile…
A wireless mobile communication device may include a Wi-Fi data communication system, an operational condition detection system, and a Wi-Fi activation system. The operational condition detection system may include a location sensor. The operational condition detection system may be configured to detect an operational condition of the wireless mobile communication device, other than actuation of a user-operated control, including when the location sensor determines that the wireless mobile communication device is near a Wi-Fi access point. The Wi-Fi activation system may be configured to autonomously turn power on to the Wi-Fi data communication system upon detection of an operational condition of the wireless mobile communication device by the operational condition detection system, other than actuation of a user-operated control, including when the location sensor senses that the wireless mobile communication device is near a Wi-Fi access point.
-
Wireless mobile communication device with autonomous Wi-Fi control based on usage of battery in device
Issued US 8,948,145
A wireless mobile communication device may include a Wi-Fi data communication system, an operational condition detection system, and a Wi-Fi activation system. The operational condition detection system may include a battery use detector. The operational condition detection system may be configured to detect an operational condition of the wireless mobile communication device, other than actuation of a user-operated control, including when the battery use detector detects that the wireless…
A wireless mobile communication device may include a Wi-Fi data communication system, an operational condition detection system, and a Wi-Fi activation system. The operational condition detection system may include a battery use detector. The operational condition detection system may be configured to detect an operational condition of the wireless mobile communication device, other than actuation of a user-operated control, including when the battery use detector detects that the wireless mobile communication device is not operating on battery power or is operating while the battery is being charged. The Wi-Fi activation system may be configured to autonomously turn power on to the Wi-Fi data communication system upon detection of an operational condition of the wireless mobile communication device by the operational condition detection system, other than actuation of a user-operated control, including when the battery use detector detects that the wireless mobile communication device is not operating on battery power or is operating while the battery is being charged.
-
Techniques for providing enhanced network security
Issued US 8,943,570
Exemplary network infrastructures and methods employing a Security Gateway utilize client authentication for use of a secure connection between an application client and an application server of a protected network. Once a secure connection has been set up, a Security Gateway can start a timer for establishing a period within which a password and username are to be received from the application client before traffic is allowed to exit the Security Gateway. If a username and password are…
Exemplary network infrastructures and methods employing a Security Gateway utilize client authentication for use of a secure connection between an application client and an application server of a protected network. Once a secure connection has been set up, a Security Gateway can start a timer for establishing a period within which a password and username are to be received from the application client before traffic is allowed to exit the Security Gateway. If a username and password are provided while the timer is running, the Security Gateway can contact a single sign on (SSO) server to check whether the username and password are correct. If the username and password are valid, the Security Gateway can start relaying traffic externally to the application server. If an invalid username and password are provided or the timer times out before receipt of a username and password, the secure connection can be terminated.
-
Downloading web-based email
Issued US 8,862,688
Web-based email methods and systems for downloading emails from an email service provider's servers to a user's local system and/or other local storage medium are provided. The user can select the emails to download and the systems and methods can retrieve the selected emails from storage. The text of the emails can be reformatted into a text file. The systems and methods can present a web page to the user from which the email text file can be downloaded. The web page can include attachments to…
Web-based email methods and systems for downloading emails from an email service provider's servers to a user's local system and/or other local storage medium are provided. The user can select the emails to download and the systems and methods can retrieve the selected emails from storage. The text of the emails can be reformatted into a text file. The systems and methods can present a web page to the user from which the email text file can be downloaded. The web page can include attachments to the emails. The text files can be concatenated into a one or more text files and the attachments can be compressed into one or more files. Optionally, the text file(s) and the compressed file(s) can be emailed to an alternate email address. Optionally, the email text and attachments can be formatted for viewing by a local email client.
-
Autonomous actuation of Wi-Fi radio based on cellular network load
Issued US 8,842,615
A wireless mobile communication device may include a first and second transceiver, a network load detection system, and a second transceiver controller. The first transceiver may be configured to wirelessly communicate with a first wireless communication network, such as a wireless cellular communication network. The second transceiver may be different from the first transceiver and may be configured to wirelessly communicate with a second wireless communication network which may be different…
A wireless mobile communication device may include a first and second transceiver, a network load detection system, and a second transceiver controller. The first transceiver may be configured to wirelessly communicate with a first wireless communication network, such as a wireless cellular communication network. The second transceiver may be different from the first transceiver and may be configured to wirelessly communicate with a second wireless communication network which may be different from the first wireless communication network, such as the Internet and at least one Wi-Fi access point. The network load detection system may be configured to detect load information indicative of an amount of load on the first wireless communication network. The second transceiver controller may be configured to autonomously power on the second transceiver when the load information indicates a heavy load on the first wireless communication network.
Other inventors -
-
METHOD AND DEVICE FOR PROVIDING INTER-DOMAIN HANDOFF CONFIGURATION INFORMATION TO A DUAF MODE ACCESS TERMINAL
Issued US 8,804,666 B2
A dual mode Access Terminal (AT) is operable to communicate both in a Circuit Switched (CS) network domain and an Internet Protocol (IP) Multimedia Subsystem (IMS) network domain. Up-to-date handoff configuration information is transmitted from an IMS server to the AT during a registration of the dual mode AT with an IMS network or during establishment of a call session of AT. The handoff configuration information is used in a call handoff of an ongoing call of the AT between the CS network and…
A dual mode Access Terminal (AT) is operable to communicate both in a Circuit Switched (CS) network domain and an Internet Protocol (IP) Multimedia Subsystem (IMS) network domain. Up-to-date handoff configuration information is transmitted from an IMS server to the AT during a registration of the dual mode AT with an IMS network or during establishment of a call session of AT. The handoff configuration information is used in a call handoff of an ongoing call of the AT between the CS network and the IMS network. In the examples, the handoff configuration information includes a handoff number for use in a handoff to the Circuit Switched (CS) network and a handoff Uniform Resource Identifier (URI) for use in a handoff to the IMS network.
Other inventors -
-
Method and system for routing traffic across multiple interfaces via VPN traffic selectors and local policies
Issued US 8,638,794
Method and system for routing traffic across multiple network interfaces with use of VPN traffic selector as part of decision making, for example, in the context of a mobile communication network. A packet data unit (PDU) is generated in association with an application that can be selectively activated on a mobile device and carries a destination Internet protocol (IP) address representing a server that supports the application. A broker associated with the mobile device retrieves information…
Method and system for routing traffic across multiple network interfaces with use of VPN traffic selector as part of decision making, for example, in the context of a mobile communication network. A packet data unit (PDU) is generated in association with an application that can be selectively activated on a mobile device and carries a destination Internet protocol (IP) address representing a server that supports the application. A broker associated with the mobile device retrieves information relating to traffic selectors and determines whether the PDU is associated with an operator application or a non-operator application based on the destination IP address and the information relating to traffic selectors. The broker routes the PDU to one of the multiple network interfaces based on whether the PDU is from an operator application traffic and local policies. When the PDU is associated with an operator application and the mobile device is not connected to its operator network, the PDU is routed via a virtual private network (VPN) selector.
Other inventors -
Enabling seamless access to a Wi-Fi network
Issued US 8,588,413
A disclosed method for enabling a seamless authenticated access to an Aggregator's Wi-Fi network includes steps of receiving a request to establish a data session from a mobile device and at a public mobile service provider network, authenticating the mobile device in response to the request to establish the data session, and establishing the data session upon successful authentication. The method further includes steps of receiving an activation key associated with the mobile device from the…
A disclosed method for enabling a seamless authenticated access to an Aggregator's Wi-Fi network includes steps of receiving a request to establish a data session from a mobile device and at a public mobile service provider network, authenticating the mobile device in response to the request to establish the data session, and establishing the data session upon successful authentication. The method further includes steps of receiving an activation key associated with the mobile device from the mobile device and at the public mobile service provider network and recording the activation key against an identification of the mobile device such as a Mobile Directory Number assigned to the mobile device. The activation key is used to generate a password, which is used to authenticate the mobile device request to access the Aggregator's Wi-Fi network.
Other inventors -
Mechanism to detect restricted access via internet hotspot
Issued US 8,296,428
A wireless device automatically detects the redirection of its internet access via a wireless hotspot network. An algorithm in the device provides the flexibility to detect either or both of DNS redirection and HTTP redirection, as well as to automatically accommodate such internet redirection. The algorithm allows a wireless device user to be alerted and account for internet redirection when such internet redirection is automatically detected upon entering service via a hotspot. Alternatively,…
A wireless device automatically detects the redirection of its internet access via a wireless hotspot network. An algorithm in the device provides the flexibility to detect either or both of DNS redirection and HTTP redirection, as well as to automatically accommodate such internet redirection. The algorithm allows a wireless device user to be alerted and account for internet redirection when such internet redirection is automatically detected upon entering service via a hotspot. Alternatively, the wireless device may attempt to automatically meet the hotspot requirements and complete the internet access through the hotspot.
-
TIMED OVERRIDE OF INCOMING CALL RESTRICTIONS TO FACILITATE CALL-BACK AFTER AN EMERGENCY CALL
Issued US 8,244,204
A mechanism is provided to suspend or modify incoming call
restrictions for a subscriber station for some time period when
it is detected that an emergency call was made by that subscriber
station, so as to disable the restriction that would
otherwise block completion of an incoming call to that station.
This allows a call placed by emergency personnel in
response to the emergency call from the subscriber station
(i.e. when the emergency personnel calls back the user that…A mechanism is provided to suspend or modify incoming call
restrictions for a subscriber station for some time period when
it is detected that an emergency call was made by that subscriber
station, so as to disable the restriction that would
otherwise block completion of an incoming call to that station.
This allows a call placed by emergency personnel in
response to the emergency call from the subscriber station
(i.e. when the emergency personnel calls back the user that is
involved in the emergency) to bypass any restrictions setup by
the subscriber or by the network that would otherwise block
the callback and allows the emergency callback to potentially
reach the caller. This approach results in a systematic solution
to blocking of emergency callbacks that applies to various
kinds of restriction services yet is relatively simple to administer.Other inventors -
-
Method and system for network assisted discovery of femto cells
Issued US 8,538,399
Method and system for a femto serving switch system. A request for registering a wireless device with a femto cell environment is received. The wireless device is registered based on the request with respect to the femto cell environment. Information related to the femto cell environment and one or more applications is then obtained, based on which a femto discovery notification (FDN) is generated. Such generated FDN is then delivered to the wireless device to assist the wireless device to…
Method and system for a femto serving switch system. A request for registering a wireless device with a femto cell environment is received. The wireless device is registered based on the request with respect to the femto cell environment. Information related to the femto cell environment and one or more applications is then obtained, based on which a femto discovery notification (FDN) is generated. Such generated FDN is then delivered to the wireless device to assist the wireless device to operate in the femto cell environment.
-
Determining chargeable duration at the home agent for a prepaid MIP session
US 7,366,136
Duration based accounting for a packet data service, for example offered as a prepaid mobile IP (MIP) service through a public mobile wireless communication network, uses last detected user activity to determine the end of each session for accounting purposes. The accounting policy or algorithm defines user activity so as to include receipt of signaling related to the MIP session, such as signaling related to a termination by the user or the user's mobile station, in addition to packet data…
Duration based accounting for a packet data service, for example offered as a prepaid mobile IP (MIP) service through a public mobile wireless communication network, uses last detected user activity to determine the end of each session for accounting purposes. The accounting policy or algorithm defines user activity so as to include receipt of signaling related to the MIP session, such as signaling related to a termination by the user or the user's mobile station, in addition to packet data routed for the mobile station. If a session ends due to a network termination, e.g. binding expires or the network disconnects upon prepaid quota exhaustion, then the last user activity used for accounting purposes is the last data packet communication to/from the mobile station or the last received MIP session-related signaling message. For example, if MIP signaling terminates the session, then the session duration runs until receipt of that signaling.
Other inventors -
-
MECHANISM TO DETECT RESTRICTED ACCESS VIA INTERNET HOTSPOT
US 8,131,847 B2
The disclosed wireless device automatically detects the redirection of its internet access via a wireless hotspot network. The exemplary device algorithm provides the flexibility to detect either or both of DNS redirection and HTTP redirection, as well as to automatically accommodate such internet redirection. The proposed algorithm allows a wireless device user to be alerted and account for internet redirection when such internet redirection is automatically detected upon entering service via…
The disclosed wireless device automatically detects the redirection of its internet access via a wireless hotspot network. The exemplary device algorithm provides the flexibility to detect either or both of DNS redirection and HTTP redirection, as well as to automatically accommodate such internet redirection. The proposed algorithm allows a wireless device user to be alerted and account for internet redirection when such internet redirection is automatically detected upon entering service via a hotspot. Alternatively, the wireless device may attempt to automatically meet the hotspot requirements and complete the internet access through the hotspot.
-
METHOD AND DEVICE FOR PROVIDING INTER-DOMAIN HANDOFF CONFIGURATION INFORMATION TO A DUAL MODE ACCESS TERMINAL
US 8,249,016 B1
Handoff configuration information is provided to a dual mode
Access Terminal (AT) operable to communicate both in a
Circuit Switched network domain and a IP Multimedia Subsystem
(IMS) network domain. Up-to-date handoff configuration
information is transmitted during a registration of the
dual mode AT with an IMS network or, alternatively during
establishment of a call session of the dual mode AT. An IMS
server assigns and sends the handoff configuration information
to…Handoff configuration information is provided to a dual mode
Access Terminal (AT) operable to communicate both in a
Circuit Switched network domain and a IP Multimedia Subsystem
(IMS) network domain. Up-to-date handoff configuration
information is transmitted during a registration of the
dual mode AT with an IMS network or, alternatively during
establishment of a call session of the dual mode AT. An IMS
server assigns and sends the handoff configuration information
to the dual mode in a response message to a registration
request or, alternatively in a request for a call session establishment
and in a response message to the request for the call
session establishment. The handoff configuration information
is used in a call handoff of an ongoing call of the dual
mode AT between the CS network and the IMS network. In
the examples, the handoff configuration information includes
a han doff number for use in a han doff to the Circuit Switched
(CS) network and a handoff Uniform Resource Identifier
(URI) for use in a handoffto the IMS network.Other inventors -
-
Message delivery using a voice mail system
US 8,130,919
Voicemail systems and methods can provide a user with means for receiving categorized messages from parties. The categories can be independent of the intended recipients of the messages, such that multiple users can receive the same message. A user can subscribe to receive categorized messages within selected categories or from selected parties. A registered party, including a merchant, an organization, a government agency and/or another party, can input messages to selected categories and can…
Voicemail systems and methods can provide a user with means for receiving categorized messages from parties. The categories can be independent of the intended recipients of the messages, such that multiple users can receive the same message. A user can subscribe to receive categorized messages within selected categories or from selected parties. A registered party, including a merchant, an organization, a government agency and/or another party, can input messages to selected categories and can input distribution parameters for the messages. Expiration dates can be associated with the messages such that messages can be deleted once expired.
-
Message delivery using a voice mail system,
US 7,561,679
Voicemail systems and methods can provide a user with means for receiving categorized messages from parties. The categories can be independent of the intended recipients of the messages, such that multiple users can receive the same message. A user can subscribe to receive categorized messages within selected categories or from selected parties. A registered party, including a merchant, an organization, a government agency and/or another party, can input messages to selected categories and can…
Voicemail systems and methods can provide a user with means for receiving categorized messages from parties. The categories can be independent of the intended recipients of the messages, such that multiple users can receive the same message. A user can subscribe to receive categorized messages within selected categories or from selected parties. A registered party, including a merchant, an organization, a government agency and/or another party, can input messages to selected categories and can input distribution parameters for the messages. Expiration dates can be associated with the messages such that messages can be deleted once expired.
-
Session classification for differentiated prepaid accounting
US 7,545,761
Session level classification of wireless packet data communications enables differentiated duration-based accounting. In a network offering prepaid services, for example, an applicable accounting policy is identified each time a user requests a new session. Different session classifications are possible under the identified policy. For example, if the prepaid subscriber also subscribes to a push-to-talk (PTT) service, the policy enables classification of each session as either PTT or non-PTT. A…
Session level classification of wireless packet data communications enables differentiated duration-based accounting. In a network offering prepaid services, for example, an applicable accounting policy is identified each time a user requests a new session. Different session classifications are possible under the identified policy. For example, if the prepaid subscriber also subscribes to a push-to-talk (PTT) service, the policy enables classification of each session as either PTT or non-PTT. A different policy would apply if the prepaid subscriber did not subscribe to the PTT service. A network element serving the mobile station during the session monitors packets, until it can detect a packet enabling appropriate classification under the applicable policy. The prepaid platform bases its accounting on the session classification. For a prepaid subscriber with PTT service, for example, a non-PTT session receives normal prepaid treatment based on session duration, whereas packet transport for a PTT session may be free.
-
System for and method of using a loopback mechanism to perform network testing
US 7,957,304
A system for and method of actively running performance tests is presented. The system and method allow a device connected, via a VPN or IPSec tunnel, to a VoIP or other service provider network, to run network performance tests using the IP address assigned by a VPN concentrator. The device utilizes the IP address assigned by the VPN concentrator as a means for performing loopback testing. These performance tests characterize the connectivity of the network. Systems and methods then use this…
A system for and method of actively running performance tests is presented. The system and method allow a device connected, via a VPN or IPSec tunnel, to a VoIP or other service provider network, to run network performance tests using the IP address assigned by a VPN concentrator. The device utilizes the IP address assigned by the VPN concentrator as a means for performing loopback testing. These performance tests characterize the connectivity of the network. Systems and methods then use this characterization to do call admission control, traffic shaping or prioritization.
Recommendations received
6 people have recommended Rohit
Join now to viewMore activity by Rohit
-
As I watched the Boston Celtics celebrate their championship win, I couldn't help but feel a sense of pride being part of the Verizon team that…
As I watched the Boston Celtics celebrate their championship win, I couldn't help but feel a sense of pride being part of the Verizon team that…
Liked by Rohit Kalbag
-
It's a wrap !! ... As I bid farewell to ZoomInfo after 3 amazing years, I am filled with immense gratitude for the incredible journey and…
It's a wrap !! ... As I bid farewell to ZoomInfo after 3 amazing years, I am filled with immense gratitude for the incredible journey and…
Liked by Rohit Kalbag
-
My husband just did a timeline of his journey to where we are now … it was cool to read the chain ⛓️💥 of events that took place ; I knew when I met…
My husband just did a timeline of his journey to where we are now … it was cool to read the chain ⛓️💥 of events that took place ; I knew when I met…
Liked by Rohit Kalbag
-
Had an incredible experience speaking at the Apex Assembly today at San Jose! 🚀 I shared insights on Cloud Native best practices tailored for the…
Had an incredible experience speaking at the Apex Assembly today at San Jose! 🚀 I shared insights on Cloud Native best practices tailored for the…
Liked by Rohit Kalbag
-
It was a great honor to give a keynote last week at the IEEE Network Operations & Management Symposium (NOMS ) in Seoul, South Korea…
It was a great honor to give a keynote last week at the IEEE Network Operations & Management Symposium (NOMS ) in Seoul, South Korea…
Liked by Rohit Kalbag
-
I am delighted to share that today I started my summer internship at Pfizer! I am so excited about the Pfizer Summer Growth Experience and look…
I am delighted to share that today I started my summer internship at Pfizer! I am so excited about the Pfizer Summer Growth Experience and look…
Liked by Rohit Kalbag
-
Our very own Sanyogita Shamsunder has just joined NextNav as their new Chief Operating Officer! NextNav is a leader in next-gen positioning and…
Our very own Sanyogita Shamsunder has just joined NextNav as their new Chief Operating Officer! NextNav is a leader in next-gen positioning and…
Liked by Rohit Kalbag
-
Today marks a special moment for me. Pune, my birthplace, has always been a gem; landmark of rich tapestry of history, culture, and innovation…
Today marks a special moment for me. Pune, my birthplace, has always been a gem; landmark of rich tapestry of history, culture, and innovation…
Liked by Rohit Kalbag
-
I'm excited and humbled to share that I've been promoted in my team. I have such amazing, kind, and brilliant colleagues around me who helped me get…
I'm excited and humbled to share that I've been promoted in my team. I have such amazing, kind, and brilliant colleagues around me who helped me get…
Liked by Rohit Kalbag
-
Don't miss out on the opportunity to Go Beyond at #CiscoLive 2024 ! Register for BRKATO-1007 session asap to explore how to simplify validation of…
Don't miss out on the opportunity to Go Beyond at #CiscoLive 2024 ! Register for BRKATO-1007 session asap to explore how to simplify validation of…
Liked by Rohit Kalbag
-
Congratulations Imran Bora, CFA on finishing your third marathon!! You are an epitome of grit, hard work and resilience. We are so very proud of…
Congratulations Imran Bora, CFA on finishing your third marathon!! You are an epitome of grit, hard work and resilience. We are so very proud of…
Liked by Rohit Kalbag
-
Everything starts with the customer, and at Verizon we have a big opportunity to connect with them in a way we’ve never done before. I’ve tapped…
Everything starts with the customer, and at Verizon we have a big opportunity to connect with them in a way we’ve never done before. I’ve tapped…
Liked by Rohit Kalbag
Other similar profiles
-
Matt Mehus
Connect -
Abhijit Trasi
Connect -
Rhea Kalyanpur
Connect -
Vinod Naidu
Development Manager at CDK Global (Formerly ADP Dealer Services)
Connect -
Yuriy Chapran
Senior Product Manager at OpenVPN Inc.
Connect -
Martin Zapata
Connect -
Sarah Wein
Biomedical Engineering Graduate from New Jersey Institute of Technology
Connect -
Corey Wendling
Connect -
Brett Rogers
Connect -
Courtney Finnerty
teacher at Palm Beach County School District
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More