Jithin James

deep learning, machine learning, data science.

fast.ai fellow


Experience

Cisco

Software Engineer

Working as Python back-end engineer

April 2019 - Present

OVH Group

MTS II

Worked on Hubic backend. Involved in debugging issues, creating support tool interface and workflows. See here: cds-split-upload and cds-split-download

May 2017 - July 2018

VMware Software India Pvt. Ltd.

MTS I

Worked on vCloud Hybrid Services (vCloud Air - vCA) Engineering team. Handled scripts to automate workflow for performing the Disaster Recovery migration operations, debug and root-cause various issues.

August 2016 - May 2017

VMware Software India Pvt. Ltd.

Intern

Involved in verifying and validating various builds of VMware products. Also deployed a Mesos-Marathon cluster on vCA cloud for running Docker applications.

August 2015 - July 2016

Intern

Part of an intensive 6 week part-time mobile/internet technology start-up accelerator and software development workshop sponsored by the Massachusetts Institute of Technology (MIT) and Google. Was able to learn entrepreneurship skills and software development skills for mobile and web platform based start ups. The course was instructed by alumni and student/instructors from MIT's business and engineering schools.

June 2013 - July 2013

Education

VIT University Vellore

Master of Technology
Information Technology - Networking Specialization
August 2014 - May 2016

Government Engineering College Thrissur

Bachelor of Technology
Computer Science & Engineering
August 2010 - May 2014

Carmel Central School Valapad

All India Senior School Certificate Examination
Computer Science
June 2008 - March 2010

Skills

Programming Languages & Tools

Interests

Apart from being a developer, I enjoy most of my time being outdoors. I love gardening.

I follow a number of drama, crime, thriller, sci-fi and comedy genre movies and TV shows, I love backpacking, I like to read books and I spend a large amount of my free time exploring the latest advancements in the field of AI.


Awards & Certifications

  • Machine Learning - Andrew Ng - Coursera - July 2018
  • Introduction to Data Science in Python - Coursera - February 2017
  • Developing Innovative Ideas for New Companies: The First Step in Entrepreneurship - Coursera - January 2014

Projects

Graphico

Government Engineering College Thrissur

A research tool for mass participation survey, using the Twitter API, which helps scientists and researchers to find correlations between any factors they wish to research on. Worked on developing the application both on server as well as client side. Acquired skills needed for working with REST API’s and OAuth mechanism.

March 2014


Publications

RSJ Approach for User Authentication

Some of the common works like, upload and retrieval of data, buying and selling things, earning and donating or transaction of money etc., are the most common works performed in daily life through internet. For every user who is accessing the internet regularly, their highest priority is to make sure that there data is secured. But the intention of malicious users is to access and misuse others data. For providing security against threats, here we are proposing a novel RSJ Approach by User Authentication. RSJ approach is a secure way for providing the security to the user form both bots and malicious users.

CAESAR CLOUD: A Comprehensive Approach for Enhancing Cloud Security and Service Availability based on Reputation

Recent years have seen a surge in the arena of computing, especially in the field of cloud computing. Many more companies like Amazon, Citrix, Salesforce, Verizon are now extending their reach by providing various services like cloud hosting, cloud backups, file sharing, application and software services. Apart from this surge in cloud usage, it has now become impaired with the issues relating to performance, security, and storage. Among this, security is a major concern both for the cloud user (CU) as well as the cloud service provider (CSP). This paper focuses on the subtle issue in security, the Distributed Denial of Service (DDoS) attack.