Kumar.Srivastava

Contributor

Kumar Srivastava has spent his career building big data and analytics products as part of a diverse and broad application set such as social networking, online security, identity, reputation and trust management, online fraud and abuse, online search and advertising, digital platforms, mobile applications and monetization services.

Kumar has worked with organizations of all sizes, from Fortune 50 companies to midsize businesses and small startups, and he has been involved in research at Columbia University and has led products that have been honored as industry-defining by customers and analysts.

Srivastava holds several patents and regularly writes thought leadership articles about the convergence of big data, analytics, cloud, mobile and digital and its impact on and opportunity for entrepreneurship and innovation. He has been published in Forbes, Wired, Entrepreneur and other publications, and he wrote a book on APIs and platform product management.

The opinions expressed in this blog are those of Kumar Srivastava and do not necessarily represent those of IDG Communications Inc. or its parent, subsidiary or affiliated companies.

Articles by Kumar.Srivastava

The grand unified theory of metadata governance
Digital Disruptions

The grand unified theory of metadata governance

Metadata fabrics will be critical to IoT success, here's a look at why a curated, healthy metadata fabric is necessary for IoT ROI.
June 23, 2015
Digital Disruptions

Are you ready for the Data of Things?

A discussion of the data produced from the IoT and how organizations need to organize to extract value from it.
May 1, 2015
Digital Disruptions

The IoT will control our mind

It's the era of smart screens, here's a look at the impact of connected screens that have the ability to sense our environment and manipulate it.
March 30, 2015
The Internet of Dangerous Things
Digital Disruptions

The Internet of Dangerous Things

The Internet of Dangerous Things is made up of Things that Annoy, Things that Spy and Things that Destroy. Dealing with these dangerous things will require a unique security architecture referred to as 'Fault Lines and Fuses' architecture.
March 12, 2015