InvestorsHub Logo
Followers 31
Posts 1459
Boards Moderated 0
Alias Born 09/08/2012

Re: KEEPIN-EYE post# 129066

Monday, 01/16/2017 2:00:20 PM

Monday, January 16, 2017 2:00:20 PM

Post# of 235099
Two Subjects Lexical Semantics and Ram Pemmaraju MidShift





I enjoyed your lines of thought and your command of the written word.

Although you make a good point that 2FA is just a subset of Multifactor Authentication, there remains at least one argument for distinguishing between the two.

If Authentication had gone no further than 2FA, all would be fine in this realm from a consumer point of view.

Since multifactor is obviously much more secure than 2FA this is where
distinguishing between the two becomes a necessity.

If there was just one term "Multifactor" a manufacture could claim on their product it is multifactor when indeed their product is only 2FA.

Thus it would become difficult for the Consumer to know which is the more Secure Product. Product A or Product B. As, they both say, Multifactor, but I like the Design on Box A over Box B, therefore as a personal preference I choose Box A, although Box A is only 2FA and I don't know the difference as a non-technical consumer, I just know I need Multifactor to be safe.

Since you mentioned "A fingerprint is hard to steal or crack" I shall cross swords with you and expound on your point.

In the different forms of Biometric Multifactor Authentication , Fingerprint Authentication is less secure. If the person trying to Hack is someone you know, rather than someone you don't, as in a distant Hacker, a fingerprint can be easily duplicated, where as a Retinal Scan would be almost impossible.

______________________________________

To make a leap curriculum, I offer the following mathematical conundrum, and and if you can offer answer:

Three salesmen walk into a small hotel lobby and ask for a room. The clerk says that will be $10 a night each and the gentleman pay the Clerk a total of $30.

Shortly the hotel manager returns and the clerk informed him that he gave 3 Guests a room for the evening. The manager says I know these gentlemen, they are here regularly, please give all 3 a discount of a total of $5.

As the clerk climbs the stairs, (he was always concentrating more on English in School rather than keepin an eye on being proficient Math) he's trying to figure out how much to give each one out of $5. Screw it he says, I'll give each one $1 and places $2 in his own pocket.

He gives each man back $1, which would mean each of the 3 men paid $9. each.

3 × 9 = $27. Plus the $2 the clerk put it in his pocket makes $29.

What happened to the other $1 ?
_______________________________________

Although we sometimes write in jest, and have a little Fun, this is not meant to take away from the MAIN POINT of your Post, which is I believe :

"When I say tree, you think “Alder” and I mean “Pine” and it’s hopeless, and can’t we all just get along? "

I agree, but there are those here whom seem not want any part of friendly conversation and debate and just wish to grab attention by using a desenting point of opinion.

I too wish we could all just get along. But it would seem just as in Liberals and Conservatives, Democrats and Republicans. the oposing view points can not be a happy middle ground of harmony.

Especially not when members are hiding behind an autonomous alias..

Just as the Garden of Eden was seen to be a utopia, then snake crawled on to the scene and ruined it all.

Just as the saying goes " You can't teach an old dog new tricks". But with perseverance, anything that is feasibility possible might become reality.

When in just 66 years, mankind can go from being able to soar from the bounds of earth's gravity with the advent of the airplane to landing a Man on the Moon, anything seemingly impossible, can happen !

Thank You for Keepin-Eye Out for possibilities and having faith in mankind.

Speaking of Possiblities:

SFOR has overcome the overwhelming odds and survived monatarily in way that was feasible, to make it to a point in time when it's IP Technology that was far ahead of its required need in time, to a point where it would not be a just a safe precaution, but a mandated one, in order to survive in the Internet of things "Corner" that mankind has built/painted our selves into today.

Ever since the Avent of the Computer, man has always said we need more Ram.

Thankfully in 1960, our prayers were answered.

_____________________________________________
Mr. Ramarao Pemmaraju, also known as Ram, has been the Chief Technology Officer of StrikeForce Technologies, Inc. since July 2002 and serves as its Secretary. Mr. Pemmaraju joined StrikeForce Technologies Inc. in July 2002 and is the inventor of the ProtectID(TM) product. He has over eighteen years experience in systems engineering and telecommunications. His specific expertise is in architecture, design and product development based on his detailed knowledge of all aspects of telecommunications. Mr. Pemmaraju is one of the original Founders and the inventor of the Cobas product. In May 1999, he was a Founder and the Chief Executive Officer at NetLabs.com Inc. From June 2000 to July 2001, Mr. Pemmaraju served as Systems Architect and Project Leader with Coreon. From October 1998 to May 2000, he served as Systems Engineer with Nexgen Systems. He was a Founder and served as the Chief Engineer of Digitech Telecommunications. He was employed at Computer Sciences Corporation, Synergy Systems, Bellcore and Bell Labs amongst other technology companies typically as a Chief, Design and/or Software Engineer. Mr. Pemmaraju serves as a Director of StrikeForce Technologies, Inc. He holds an MSEE from the Rutgers University and a BE from Stevens Tech.



21 SEP 2012
Ram Pemmaraju '84 Invents New Cybersecurity Technology
SHARE THIS STORY Facebook Twitter LinkedIn
Combining technology and business, Stevens alumnus Ram Pemmaraju (B.E. 1984) embodies the Stevens ideal of cross-disciplinary innovation. From the invention of keystroke encryption to his current position as head of his own computer security company, Pemmaraju has blended his expertise in computer science and business management to succeed in both worlds.

Pemmaraju was initially drawn to Stevens because of its strong focus on engineering. But certain classes and opportunities led him down a different path. An Electrical Engineering class introduced him to microprocessors. Then, his senior project "revolved around programming a PDP-8 using switches on the front panel. That made me interested in computers,” says Pemmaraju.

Due to connections made at Stevens, Pemmaraju was able to hit the ground running in his new field. A relationship started at Stevens led to his first job after graduation – a position with Codenoll, a fiber optic startup company based in New York.

Pemmaraju's next venture was launching his own company, Computer Security Systems.

"That business was started by me and two other graduates from Stevens and employed a number of students from Stevens," he said.

This first foray into owning a business allowed Pemmaraju to assume the roles of both businessman and engineer, laying the foundation for future ventures, including the development of keystroke encryption.

During his time with Computer Security Systems, Pemmaraju gained experience with cybersecurity through building and selling data encryption and access control systems.

"This background helped me with coming up with keystroke encryption as well as out-of-band authentication, which is widely used in securing access to computers," Pemmaraju said.

Keystroke encryption is an essential part of cybersecurity, used widely. CIO Magazine recently lauded the technology in an article titled "9 Unheralded Technology Innovations."

"The software is used by several million people, typically as a component of another security suite or identity theft package," said Pemmaraju.

The technology is available for PC and Mac, as well as Android and iPhone operating systems in the growing smartphone market.

Pemmaraju's passion shines through when he discusses his work with keystroke encryption and cybersecurity.

"Cyber crime has become an epidemic plaguing government and businesses,” he said. “The attacker lures the victim to download malware via phishing or compromised web sites. The malware typically contains a keylogger, which grabs everything you type. This can be passwords, credit card numbers or anything else of value which can lead to the attacker stealing money or corporate and government secrets. The existing defenses such as anti-virus software and firewalls are unable to prevent this, hence the large number of data breaches.”

Keystroke encryption is an elegant answer to this multifaceted problem.

"The best solution is to encrypt everything you type and transport the encrypted keys in a pathway hidden from the malware," said Pemmaraju. "The benefit is the reduction of data breaches and password theft, making the internet safe to use.”

He continues to develop secure technologies at his current company, Strikeforce Technologies. Pemmaraju started the business in 2002 with a few others. Even then, Stevens continued to play a role in Pemmaraju's associations.

"My first technical hire was a Stevens graduate," he said.



Since its inception, the business has expanded to include the core team in New Jersey, offshore development in India and distribution in England, Nigeria, Australia and Dubai. Pemmaraju considers keystroke encryption part of his company's claim to fame. The second part of their specialization is out-of-band authentication. Strikeforce Technologies also offers security software for smartphones using iPhone or Android mobile platforms.

As a small cap public company, Strikeforce Technologies faces different hurdles than a private company.

"[It] has its challenges," Pemmaraju admits.

However, he is perfectly suited to handle the intricacies of a computer-based business. Pemmaraju's dual background in business and technology allow him to evaluate market demands and cybersecurity needs in order to prepare for the future of online security.

"My current plan is to stay in the computer security industry as there is a lot of growth and I can leverage my background effectively," said Pemmaraju. "Fortunately, we are in an industry which is growing rapidly and we have the right products to capitalize on this opportunity."

Pemmaraju currently lives in Old Bridge, N.J. with his wife and two children.
https://www.stevens.edu/news/ram-pemmaraju-84-invents-new-cybersecurity-technology

Moore's Law has brought us to this point in time, where there are about 2 Million Hack attempts a day. Luckily we have more Ram to help protect us.

Moore's law refers to an observation made by Intel co-founder Gordon Moore in 1965. He noticed that the number of transistors per square inch on integrated circuits had doubled every year since their invention. Moore's law predicts that this trend will continue into the foreseeable future.