About
As Chief of Staff, CISO’s Office & Lead, Data Protection at SMFG India Credit Company, I…
Articles by Prathamesh
Activity
-
LinkedIn just rolled out an update: starting November 3, your data will be used to train AI. But honestly, what difference does it make? Most of the…
LinkedIn just rolled out an update: starting November 3, your data will be used to train AI. But honestly, what difference does it make? Most of the…
Liked by Prathamesh Churi
-
Absolute genius 👏 Whoever wrote this! Be like Google Maps. #mindset #growth #inspiration #lifelesson #leadership
Absolute genius 👏 Whoever wrote this! Be like Google Maps. #mindset #growth #inspiration #lifelesson #leadership
Liked by Prathamesh Churi
-
This was a wonderful and very insightful session among the pioneer set of DPOs of India who are shaping the DPO role in the country ! Loved the…
This was a wonderful and very insightful session among the pioneer set of DPOs of India who are shaping the DPO role in the country ! Loved the…
Liked by Prathamesh Churi
Experience
Education
-
University of Mumbai
-
-
Pursued an ME in Information Technology, specializing in Information Security and Cryptography. My research focused on secure computing and cryptographic techniques to enhance data protection.
Key coursework included:
- Enterprise Security & Risk Management
- Advanced Data Mining & Business Intelligence
- Cloud Computing & Digital Forensics
- Advanced Software Architecture & Network Design
- Software Quality Assurance & Fuzzy Design
This program strengthened my…Pursued an ME in Information Technology, specializing in Information Security and Cryptography. My research focused on secure computing and cryptographic techniques to enhance data protection.
Key coursework included:
- Enterprise Security & Risk Management
- Advanced Data Mining & Business Intelligence
- Cloud Computing & Digital Forensics
- Advanced Software Architecture & Network Design
- Software Quality Assurance & Fuzzy Design
This program strengthened my expertise in cybersecurity, risk management, and advanced computing, equipping me with both theoretical and applied knowledge in securing enterprise environments. -
-
Completed a BE in Computer Engineering, building a strong foundation in software development, computer security, and system design. Studied key subjects such as database management systems, computer networks, software engineering, microprocessors, image processing, data structures, algorithms, and programming languages like C, C++, and Java. Gained hands-on experience in web programming and human-computer interaction.
Held leadership roles as Class Representative (2009-2013) and…Completed a BE in Computer Engineering, building a strong foundation in software development, computer security, and system design. Studied key subjects such as database management systems, computer networks, software engineering, microprocessors, image processing, data structures, algorithms, and programming languages like C, C++, and Java. Gained hands-on experience in web programming and human-computer interaction.
Held leadership roles as Class Representative (2009-2013) and Documentation Head of the Technical Council (2012), contributing to academic and technical initiatives. This program honed my expertise in computing, problem-solving, and cybersecurity while developing strong leadership and organizational skills.
Licenses & Certifications
Volunteer Experience
-
Member, LITD 17 – Information Security, Cybersecurity & Privacy Protection Sectional Committee, Bureau of Indian Standards (BIS)
Bureau of Indian Standards
- Present 3 months
Science and Technology
Serving as a contributing member of the BIS LITD 17 Committee, responsible for formulation and review of Indian Standards in the domain of information security, cybersecurity, and privacy protection. Actively engaged in aligning national standards with ISO/IEC frameworks to support India’s digital trust, resilience, and data protection ecosystem.
-
Senior Member
IEEE
- Present 2 years 2 months
Science and Technology
Recognized as a Senior Member of IEEE for professional contributions to technology, research, and industry practices.
-
Lifetime Member - Associate Level
Computer Society of India, Mumbai Chapter
- Present 9 years 9 months
Education
- I am the lifetime member of Computer Society of India
- My role is to conduct / attend various seminars , Conferences , Guest lectures which comes under CSI Organizer -
Board of Studies
Patkar-Varde College of Arts, Science, Commerce & Economics
- 4 years 5 months
Education
I am the BoS member for B.Sc and M.Sc ( Information Technology Programs).
-
Lifetime member -Associate Level
Indian Society for Technical Education
- Present 9 years 7 months
Education
- I am lifetime member of ISTE .
- My role is to conduct / attend various seminars , Conferences , Guest lectures which comes under ISTE Organizer -
Lifetime member
International Association of Engineering
- Present 9 years 3 months
Science and Technology
- The International Association of Engineers (IAENG) is a non-profit international association for the engineers and the computer scientists.
-Later, with the efforts from its members, IAENG membership became open to all the members in the engineering and computer science community.
- the IAENG members include research center heads, faculty deans, department heads, professors, research scientists/engineers, experienced software development directors and engineers, and…- The International Association of Engineers (IAENG) is a non-profit international association for the engineers and the computer scientists.
-Later, with the efforts from its members, IAENG membership became open to all the members in the engineering and computer science community.
- the IAENG members include research center heads, faculty deans, department heads, professors, research scientists/engineers, experienced software development directors and engineers, and university postgraduate and undergraduate students etc., from over one hundred different countries. -
Co- session Chairperson
IEEE Indiacom 2017
- Present 9 years 2 months
Science and Technology
We are conducting a special session on : teaching learning process . All accepted paper will be published by IEEE explore digital library .
I am co charing the session with prof. Dr. Seema Shah -
Advisory Board Member
Informatics in Education Journal
- Present 4 years 5 months
Education
-
Regional Editor, International Journal of Forensic Software Engineering
Inderscience
- Present 4 years 4 months
Science and Technology
Publications
-
An era of Cloud ERP : Significant Differentiation with Premise ERP
Computer Research Global Journals
This paper is the outcome of research in ERP solutions. It talks about how changing in technology is affecting the overall growth of IT industry specifically ERP solution providers. It also gives insight on how different types of organizations are adapting to the change in technology for their betterment. The insights are based on the thorough analysis of the past and current situation in the ERP market. It tries to differentiate cloud and on-premise ERP solution on various parameters. This…
This paper is the outcome of research in ERP solutions. It talks about how changing in technology is affecting the overall growth of IT industry specifically ERP solution providers. It also gives insight on how different types of organizations are adapting to the change in technology for their betterment. The insights are based on the thorough analysis of the past and current situation in the ERP market. It tries to differentiate cloud and on-premise ERP solution on various parameters. This document also gives the answer to the future of this market segment.
Other authorsSee publication -
Development of Innovative Course Outcomes using SMART goals
IJRTE (Scopus Indexed Journal)
Built layer of OBEE architecture forms an innovative way to towards development of course outcomes from lesson outcomes. The process of development of course outcomes is crucial and time-consuming without appropriate guidance and support. This paper, therefore, provides guidelines /rules towards a development of outcomes according to the OBEE architecture. The paper also suggests a sample Course outcomes taking one engineering course as a case study. The phenomenon of making course outcome is…
Built layer of OBEE architecture forms an innovative way to towards development of course outcomes from lesson outcomes. The process of development of course outcomes is crucial and time-consuming without appropriate guidance and support. This paper, therefore, provides guidelines /rules towards a development of outcomes according to the OBEE architecture. The paper also suggests a sample Course outcomes taking one engineering course as a case study. The phenomenon of making course outcome is based on a SMART approach. The process also suggests that we should involve industry domain experts and Alumni students which give a proper academic and practically oriented shape to the documented course outcomes. As a result, the entire OBEE process becomes smoother and functional in the entire semester.
Other authorsSee publication -
Honey-Patterns: Recognizing Pattern based Attacks on Websites
International journal of Computer Application( IJCA)
The exact definition of a honeypot is contentious. However, the concept can be defined as “A server that is configured to detect an intruder by mirroring a real production system. It appears as an ordinary server functioning normally, but all the data and transactions are phony. Located either in or outside the firewall, the honeypot is used to learn about an intruder's techniques as well as determine the vulnerabilities of the system" Honeypot is a closely monitored decoy that is employed in…
The exact definition of a honeypot is contentious. However, the concept can be defined as “A server that is configured to detect an intruder by mirroring a real production system. It appears as an ordinary server functioning normally, but all the data and transactions are phony. Located either in or outside the firewall, the honeypot is used to learn about an intruder's techniques as well as determine the vulnerabilities of the system" Honeypot is a closely monitored decoy that is employed in networks to study the trail of hackers and to alert network administrators of a possible intrusion. Honey net is a method for detection of abnormal activity in the network. Honey net is an additional layer of security. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Data Capture and Data Control are properties of honeyed, used extensively by the research community to study issues in network security, such as Internet worms, Spam control, DoS attacks, etc. In this paper, we will be focusing on the attack part.
Other authorsSee publication -
Alchemizing Education System By Developing 5 Layered Outcome Based Engineering Education (OBEE) Model
IEEEXplore Digital Library - MITE 2016, Tamilnadu
This paper proposes an architecture for Outcome Based Engineering Education (OBEE). Outcome Based Education (OBE) is one of the most substantial move in Engineering Education in recent years. The paper suggests an innovative and productive way to achieve outcome based education by S.M.A.R.T (Specific, Measurable, Achivable, Reliastic, Time Bound) approach. This research emphasizes on SMART OBEE Architecture which an ideal teacher must follow. The architecture consist of 5 layers namely Build…
This paper proposes an architecture for Outcome Based Engineering Education (OBEE). Outcome Based Education (OBE) is one of the most substantial move in Engineering Education in recent years. The paper suggests an innovative and productive way to achieve outcome based education by S.M.A.R.T (Specific, Measurable, Achivable, Reliastic, Time Bound) approach. This research emphasizes on SMART OBEE Architecture which an ideal teacher must follow. The architecture consist of 5 layers namely Build layer, Assessment layer, Feedback layer, Target layer and Time management layer. Build layer provides the direction towards development of Course Objectives. Through content delivery, teacher can assess the students using various assessment tools. A feedback can be taken from the students in order to enhance the quality of the course. Time management layer is an integrated layer and provides synchronization among all the activities in Engineering education framework which is drawn. The proposed system also defines the term SMART Teacher.
Other authorsSee publication -
Title: E -Zip: An Electronic Lock for Secured System
IEEEXplore - IEEE sponsored International Conference on Advances in Electronics, Communication& Computer Technology (ICAECCT-16)
Security is one of the major concern in today’s era, may be it is for your home, locker, your cabin or a restricted area in any institution. This research is aimed at developing a fruitful security system which provides secured log access to authorized people with the feature of an email notification to the administrator along with the captured image of the user. These systems are profoundly welcomed, since it can be monitored from a remote zone. The research have an advantage over physical…
Security is one of the major concern in today’s era, may be it is for your home, locker, your cabin or a restricted area in any institution. This research is aimed at developing a fruitful security system which provides secured log access to authorized people with the feature of an email notification to the administrator along with the captured image of the user. These systems are profoundly welcomed, since it can be monitored from a remote zone. The research have an advantage over physical lock in term of safety, storage and handiness. There is a necessity to provide safe access to personal rooms, lockers and avoid intruders has compelled to make security systems more digitally compatible. A digital interface can be used to make it more comfortable for access. Sometimes, it becomes tedious to carry physical key to your locker in case of multiple users. The conventional physical key can be replaced by digital password to open your lock. An important feature of this system is to enter the password using Bluetooth enabled smartphone.
-
Model -View-Controller architecture in BI Dashboards : Designing best practices
IEEE Xplore Digital Library , IndiaCom-2016 , New-Delhi
This paper focuses on a new approach to develop the strategy of Model-View-Controller Architecture pattern in traditional Business Intelligence (BI) dashboards. With the increasing demand of market, we need to store the information so that its retrieval will be simpler for processing management's decisions. The value of information is drastically changing in past years and ultimately all organizations have moved to Quality work. Quality and appropriateness of the information becomes a key…
This paper focuses on a new approach to develop the strategy of Model-View-Controller Architecture pattern in traditional Business Intelligence (BI) dashboards. With the increasing demand of market, we need to store the information so that its retrieval will be simpler for processing management's decisions. The value of information is drastically changing in past years and ultimately all organizations have moved to Quality work. Quality and appropriateness of the information becomes a key challenge for most of the organizations in past decades. The Business Intelligence architecture therefore consists of the ETL tools and processes, the data warehouse, the technical infrastructure, and the end-user tools. The problem associated with business intelligence architecture is the storage of heterogeneous data sources which might leads to inconsistency. The business intelligence information should also be presentable in different format for analyst's decision making. Model-View-Controller (MVC) architecture pattern resolve the issues of typical Business intelligence model by components and process Seperatability technique. Model component of MVC architecture provides the heterogeneous data from operational systems. View provides multiple and synchronized views so that information can be presentable in different format at the same time. Controller handles analyst's input which is associated with each view generated by MVC architecture pattern.
Other authorsSee publication -
Jumbling- Salting: An Improvised Approach for Password Encryption
IEEE Xplore Digital Library , RMUTT university Thailand
Abstract: This paper presents an improvised approach for the major aspect of password protection issue is to secure it by means of encryption process. In cryptanalysis, a dictionary attacks or brute force attacks are the most common ways of cracking passwords. A new approach for improvising the scheme of password encryption is using the process of Jumbling-Salting (JS). In order to augment the security aspect regarding passwords, we are devising JS algorithm which prevents dictionary and brute…
Abstract: This paper presents an improvised approach for the major aspect of password protection issue is to secure it by means of encryption process. In cryptanalysis, a dictionary attacks or brute force attacks are the most common ways of cracking passwords. A new approach for improvising the scheme of password encryption is using the process of Jumbling-Salting (JS). In order to augment the security aspect regarding passwords, we are devising JS algorithm which prevents dictionary and brute force attacks by increasing the length of cipher text in a considerable limit. In this algorithm, the jumbling process selects characters from pre-defined character set and adds them into the plain password using mathematical modulus (%) function; salting comprises of adding a random string into jumbled password. Ultimately AES block is implemented which obtains a fixed length version of JS algorithm which ensures that there is increase in time to crack the cipher text password, by forming a highly secured version of encrypted password.
-
Implementation of Model-View-Controller Architecture Pattern for Business Intelligence Architecture
International Journal of Computer Application (IJCA) , NY, USA
This paper presents a new approach to develop the strategy of Model–View–Controller architecture pattern in Business Intelligence (BI) architecture. The Business Intelligence architecture consists of the ETL tools and processes, the data warehouse, the technical infrastructure, and the user-interface tools. The major issue related to Business Intelligence architecture is to store the data from heterogeneous sources. The heterogeneous sources might lead to inconsistencies in storage and…
This paper presents a new approach to develop the strategy of Model–View–Controller architecture pattern in Business Intelligence (BI) architecture. The Business Intelligence architecture consists of the ETL tools and processes, the data warehouse, the technical infrastructure, and the user-interface tools. The major issue related to Business Intelligence architecture is to store the data from heterogeneous sources. The heterogeneous sources might lead to inconsistencies in storage and retrieval of data. Another issue related to Business Intelligence architecture is to provide multiple and synchronized views. The Business information must be presentable in various formats with 'look and feel' approach. Model-View-Controller provides independent approach to the components of Business Intelligence architecture. Model provides guideline for storing the heterogeneous data in one format and implements core functionality of the system. View provides multiple and synchronized views so that information can be available in presentable format. Controller handles user's input. All the three independent components are tightly coupled which ensures consistent and flexible Business Intelligence architecture.
Other authorsSee publication -
JSH Algorithm: A Password Encryption Technique using Jumbling-Salting-Hashing
International Journal of Computer Application (IJCA) , NY, USA
This paper presents a new algorithm for improvising password encryption using Jumbling-Salting-Hashing technique. One of the most important password protection issue is to secure encrypted passwords on server's database. In cryptanalysis, a dictionary attack or brute force attack are the most common ways of guessing passwords. In order to augment the security aspect regarding passwords, we are devising JSH algorithm which will be responsible for preventing dictionary or brute force attacks on…
This paper presents a new algorithm for improvising password encryption using Jumbling-Salting-Hashing technique. One of the most important password protection issue is to secure encrypted passwords on server's database. In cryptanalysis, a dictionary attack or brute force attack are the most common ways of guessing passwords. In order to augment the security aspect regarding passwords, we are devising JSH algorithm which will be responsible for preventing dictionary or brute force attacks on the passwords. In this algorithm, the jumbling process consists of randomly selecting characters from pre-defined character set and adding them into the plain password; salting comprises of prepending a random string and hashing process is implemented using cryptographic hash function to obtain a fixed length "fingerprint" which is stored in the server's database. As JSH algorithm deals with randomization, the password encryption technique forms a highly secured form of encrypted password which makes it difficult to decrypt reducing the probability of guessing password.
Other authorsSee publication -
Model-View-Controller Architecture Pattern in Business Intelligence
National Multidisciplinary Conference on Commerce , Management and Technology ,V-CMT -2015 .
This paper presents a new approach to develop the strategy of Model–View–Controller architecture pattern in Business Intelligence (BI) architecture. Model-View-Controller provides independent approach to the components of Business Intelligence architecture.
ISBN number : 978-93-85880-11-7 , Won " First Prize " For research paper among 44 research papers presented in the conference.
Patents
-
Lightweight Vehicle to Infrastructure Message Verification Method for VANET
Filed IN 202021032638
-
Method for predicting disease using machine learning
Filed IN 202011032563
Courses
-
Cyber security trends and Applications with IIT patna
-
-
Dale carnegie training
-
-
ISTE Approved Short Term Training Program ( STTP ) on Cloud Computing
-
-
ISTE Approved Short Term Training Program on Advanced Data Mining : Tools and Techniques
-
-
ISTE approved , Technically sponsored by CSI mumbai and IEEE Bombay section Short term Training Program on : Internet of Things ( Considerations and Applications)
-
-
Official (ISC)² Certified in Cybersecurity (CC) Self-Paced Training
NA
-
Short Term Training Program on Cloud Computing
-
Projects
-
JS algorithm as a file encryption algorithm
- Present
-
Jumbling- Salting: An Improvised Approach for Password Encryption
-
This Project presents an improvised approach for password encryption . The major aspect of password protection issue is to secure it by means of encryption process. In cryptanalysis, a dictionary attacks or brute force attacks are the most common ways of cracking passwords. A new approach for improvising the scheme of password encryption is using the process of Jumbling-Salting (JS). In order to augment the security aspect regarding passwords, we are devising JS algorithm which prevents…
This Project presents an improvised approach for password encryption . The major aspect of password protection issue is to secure it by means of encryption process. In cryptanalysis, a dictionary attacks or brute force attacks are the most common ways of cracking passwords. A new approach for improvising the scheme of password encryption is using the process of Jumbling-Salting (JS). In order to augment the security aspect regarding passwords, we are devising JS algorithm which prevents dictionary and brute force attacks by increasing the length of cipher text in a considerable limit. In this algorithm, the jumbling process selects characters from pre-defined character set and adds them into the plain password using mathematical modulus (%) function; salting comprises of adding a random string into jumbled password. Ultimately AES block is implemented which obtains a fixed length version of JS algorithm which ensures that there is increase in time to crack the cipher text password, by forming a highly secured version of encrypted password.
-
Honey pot Security for website testing
-
The projects tracks the User's activity on a particular website. The number of possible attacks are already coded in the script. If any user tries to perform any malicious action on website , the tracking code will track the user's statistics like IP address , host address , Timing parameters , Type of Attack etc. We have used PHD-MySQL platform for coding .
Other creators
Honors & Awards
-
Best Employee Quarterly Award
SMFG India Credit
-
Reviewer Excellence Award
Elsevier
Received Reviewer Excellence Award in elsevier IJIM Data Insights.
-
Outstanding Reviewer Excellence Award
Springer
I received Outstanding Reviewer Excellence Award from Springer Journal of Computing in Higher Education (SSCI IF 2.6)
-
Reviewer Excellence Award
Springer
Received 𝗥𝗲𝘃𝗶𝗲𝘄𝗲𝗿 𝗘𝘅𝗰𝗲𝗹𝗹𝗲𝗻𝗰𝗲 𝗔𝘄𝗮𝗿𝗱 𝟮𝟬𝟮𝟭 from most reputed journal of Springer- “Educational Technology Research and Development (ETR&D)” this year. The Journal is indexed by Scopus (Q1) and SSCI Web of Science with an Impact Factor of 4.5.
-
Best Reviewer Award
IEEE TALE 2020
I received best reviewer award in TALE 2020, Japan
-
Session Chair
IEEE TALE 2020
I was the session Chair of IEEE TALE 2020 which was happened virtually in Japan
-
Session chair
4th International ICACDS 2020
I was invited as a Session Chairperson in 4th International ICACDS 2020 conference.
-
Appreciation for Best Faculty
NMIMS University
Got appreciation award for the best faculty in Convocation 2019 of NMIMS University
-
Young Researcher (Below 40 Years) Award
GISR Foundation
Conferred an award of “Best Young Researcher (Below 40 Years)” in International Academic and Research Excellence Award (IARE- 2019) ceremony . After strict scrutiny and on recommendation of external experts for this Award, It has been chosen among a few outstanding persons from India and Overseas.
-
Keynote speaker
3rd International Conference of Advances of Data Science and Computing
I was keynote speaker in 3rd International Springer ICACDS 2019 Conference on the topic - “Privacy Preserving Data Publishing Technique using Data Generalization”
-
Session Chair
3rd International Conference of Advances of Data Science and Computing
I was the session chair of the track “Data Science” in Third International Springer CCIS series conference- ICACDS 2019
-
Conference Co-Convener
International Conference on Advances in Computing and Data Science
Invited as starring committee member ( co convenor) in Springer ICACDS - 2019
-
Special Award in Education
Somavanshi Kshatriya Sangh (SKS Sangh)
I got a Special Educational Award from SKS ( Somavanshi Kshatriya Samaj ) Sangh
The SKS sangh is a maharashtrian Community of a population around 1 Lakh . I belongs to this community.
Following dignitaries were present during my award function :
1. Mrs. Manisha Chaudhari, MLA , Mumbai Suburban.
2. Mr. kesari Patil , Founder and CEO , Kesari Tours and Travels.
3. Mrs. Dr. Vijaya Vad , Ex President, Maharashtra Marathi Vishwakosh Sahitya Sangh. -
Associate Editor
International Journal of Advances in Intelligent Informatics
More details at : http://ijain.org/index.php/IJAIN/about/editorialTeam
-
Session Chairperson
Rajmangala University of Technology, Thanyaburi, Thailand
Session chair at 2nd International IEEE Conference on Science and Technology ( TICST 2017) which will be held at , RMUTT University, Thailand 🇹🇭.
-
Corporate Faculty - Campus Connect Partner
Infosys Private Limited
I am a part of Infosys Campus Connect program as a corporate trainer .
-
Editorial Board Member
Circulation in Computer Science
I am part of Editorial team of Circulation in Computer Science ( CCS) , A scholarly review journal
-
Co session Chairperson
INDIACom 2017- 4 th International Conference on global computing
Honoured with Co session chairperson in INDIACom 2017- 4 th International Conference on global computing which was held at New Delhi
-
Best Research Paper Award
VCMT-2015 National Multidisciplinary Conference
I was Awarded with Best Research paper award for the research paper titled "Model -view -Controller Architecture pattern in Business Intelligence Model" . there were 44 research papers presented in the Conference.
-
School Topper
Maharashtra State Board
I was the Topper of the school , secured 88.61% ( 1st Position) in S.S.C.Board Examination.
-
Taluka level 1 st Rank in Marathi and Hindi Elocution competition
Dr. Homi Bhabha School
Hold first rank at taluka level among 25 schools , in elocution competition.
Languages
-
English
Native or bilingual proficiency
-
Hindi
Native or bilingual proficiency
-
Marathi
Native or bilingual proficiency
Recommendations received
29 people have recommended Prathamesh
Join now to viewMore activity by Prathamesh
-
🎉🎉 Exciting News from HCIN! 🎉🎉 We are proud to announce that our 20 editorial board members were recognized in the World's Top 2% Scientists…
🎉🎉 Exciting News from HCIN! 🎉🎉 We are proud to announce that our 20 editorial board members were recognized in the World's Top 2% Scientists…
Liked by Prathamesh Churi
-
This compilation of controls is drawn from ISO/IEC 27001:2022, NIST SP 800-53 Rev. 5, and CIS Controls v8. It is not intended to be an exhaustive…
This compilation of controls is drawn from ISO/IEC 27001:2022, NIST SP 800-53 Rev. 5, and CIS Controls v8. It is not intended to be an exhaustive…
Liked by Prathamesh Churi
-
“Digital transformation in governance is no longer a choice, it’s a necessity!” 💡 What an incredible experience it was to be a speaker at AI Maitri…
“Digital transformation in governance is no longer a choice, it’s a necessity!” 💡 What an incredible experience it was to be a speaker at AI Maitri…
Liked by Prathamesh Churi
-
I had just finished my 10th Board exams when the world went into lockdown – a change that altered life as I knew it. My entire 11th and 12th grade…
I had just finished my 10th Board exams when the world went into lockdown – a change that altered life as I knew it. My entire 11th and 12th grade…
Liked by Prathamesh Churi
-
In light of the upcoming DPDPA rules, we decided to host an event on “DPDPA: From Policy to Practice – The Future of Data Privacy in India” in…
In light of the upcoming DPDPA rules, we decided to host an event on “DPDPA: From Policy to Practice – The Future of Data Privacy in India” in…
Liked by Prathamesh Churi
-
Can’t explain Deadlocks better than this, xD
Can’t explain Deadlocks better than this, xD
Liked by Prathamesh Churi
-
Had an amazing week visiting Wolters Kluwer’s Alphen office in the Netherlands. Beyond productive discussions and brainstorming sessions, it was…
Had an amazing week visiting Wolters Kluwer’s Alphen office in the Netherlands. Beyond productive discussions and brainstorming sessions, it was…
Liked by Prathamesh Churi
-
I have been listed in the World’s Top 2% Scientist List, released by Stanford University & Elsevier for 2025. Thank you all for your support and…
I have been listed in the World’s Top 2% Scientist List, released by Stanford University & Elsevier for 2025. Thank you all for your support and…
Liked by Prathamesh Churi
-
I am thrilled to share that I have been recognized among the #Top2% of scientists globally for 2025, as released by Stanford University, USA and…
I am thrilled to share that I have been recognized among the #Top2% of scientists globally for 2025, as released by Stanford University, USA and…
Liked by Prathamesh Churi
-
Proud to See Indore’s Digital Vision Aligning with Global Leaders! Earlier this June, I had the privilege of attending the Global Digital Forum in…
Proud to See Indore’s Digital Vision Aligning with Global Leaders! Earlier this June, I had the privilege of attending the Global Digital Forum in…
Liked by Prathamesh Churi
-
As part of UK–India AIxcelerate 2025–26, the UK–India Centre for Artificial Intelligence (under the Technology Security Initiative) will host its…
As part of UK–India AIxcelerate 2025–26, the UK–India Centre for Artificial Intelligence (under the Technology Security Initiative) will host its…
Liked by Prathamesh Churi
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More