Cryptography – Diffie Hellman key exchange – RSA Algorithm – how and why

To be watched in the order above…wish we had math teachers in school who explained it this way.


  1. Lectures 32, 33, 34 deal with Cryptography and cover all the important topics in 3 hours.
  2. If you are the old-fashioned learner, then The Code Book by Simon Singh ( is an entertaining and explanatory book on Cryptography. This book takes a story-telling approach and still manages to make you understand Symmetric and Public-Key cryptography and fascinate you with the 2000 year old rivalry between code-makers and code-breakers.

NOSQL High Scalability

Choosing your next NoSQL database

Introduction to NoSQL by Martin Fowler

Speaking Tree

Three Golden rules of wise living

Sense of ownership binds you

Understanding ASP.NET Dynamic Compilation

By default, ASP.NET Web pages and code files are compiled dynamically when users first request a resource, such as an ASP.NET page (.aspx file), from a Web site. After pages and code files have been compiled the first time, the compiled resources are cached, so that subsequent requests to the same page are extremely efficient.

ASP.NET supports the dynamic compilation of ASP.NET pages (.aspx files), ASP.NET Web services (.asmx files), ASP.NET HTTP handlers (.ashx files) and ASP.NET application files (Global.asax), as well as other files, such as source code and class files. For more information about ASP.NET file types, see ASP.NET Web Project File Types. For more information about the ASP.NET compilation process, see the “Compilation Life Cycle” section of ASP.NET Application Life Cycle Overview for IIS 5.0 and 6.0.

Decrypting HTTPS traffic

Containerization on Mobile via virtualization

Cellrox MDM

I love the fact that they pioneered the idea of multiple “personas” on a smartphone.

Samsung KNOX does the same thing now. So does BB10.

Interesting twist to how MDM can be achieved via virtualization –

Cellrox – an Israeli company has already developed a “Thinvisor” that runs multiple VMs on a single OS (Android) instance – thus MDM is done by creating 2 personas – “business” and private. A wipe is accomplished merely by deleting the business persona.


“In the extreme, worst-case scenario of the fired employee, IT need only wipe and remove the business persona. The user’s private persona can remain untouched, avoiding the common horror story of people’s baby pictures being deleted forever by an IT mistake.

Because of the level at which Cellrox operates, it needs to partner with handset makers and possibly carriers to get its product to end users. In a busy market it’s not clear who will win these battles, but Cellrox’s approach looks like a winner. Of course, it might be that cell phone virtualization won’t become really respectable until Apple invents it, but it’s coming, one way or another.”

MDM in my own words

Mobile Device Management (MDM) tools act as a Swiss-army knife in the hands of IT administrators. It provides multiple and diverse advantages both for the organization and the employee. Employees are guaranteed secure and real-time access to corporate information, be it in the form of email, applications or content and organizations benefit from the control they can exercise over end-users’ devices. Companies can rest assured that the confidentiality of enterprise data is maintained and devices accessing corporate resources are not compromised.

A unified, vendor-independent messaging framework across smartphone platforms could be a viable alternative to platform-specific solutions like c2dm and APNS in that they don’t require exposure to an external network when an on-premise installation is sought. The message sizes and message formats on the payload become platform neutral and applications can leverage this consistency and uniformity across device platforms.

Secrets of success

Secrets of success