Curriculum Vitae
KIRANKUMAR. A
*-***,************(Vill),
Nagalapuram(Man),
Chittoor(Dist)-517589
Contact Number: (0-855*******
Email address: **************@*****.***
Career Objective:
To establish my career with an esteemed organization that will offer opportunities to use my technical and managerial skills in the best possible way for achieving the organizational goals, and thereby to grow with the organization.
Personal Information:
Date of Birth : 16-03-1989
Languages Known : English and Telugu (Read and Write)
Personal skills : Excellent verbal and written communication skills, team player,
Positive attitude, out-of-box thinking.
Academic Profile:
Qualification Institution University/ Board Percentage (%) Year
B.E. (CSE) Jaya Engineering College, Chennai. Anna
University 62% 2006-2010
Inter Vikas junior College AndraPradesh State Board 72.07% 2005-2006
X Karunya english medium school SSC 73.66% 2003-2004
Software Exposure:
Languages : C, C++, Java.
Database : SQL.
Operating Systems : Ubuntu , Windows 9X.
Servers : IBM AIX 6.1 , AS 400
Scripting Languages : HTML.
Certification:
• IBM AIX 6.1 Administration (completed)-89%
Technical Exposure:
• AIX 6.1 Installations and Administration.
• LVM management such as creating VG, LV
• File system Management.
• Taking mksysb backup and restoration.
• NIM installation, User administration.
• Basic knowledge in Networking.
Other Exposure:
• Went to an industrial visit WIPRO Pvt. Ltd. Pondicherry.
Academic Project:
• Title: Efficient remote data possession checking in critical information and infrastructure.
• Team: 2 Members.
• Platform : Java
• Description: In this we present System is to verify the backup files in the remote server by using Cyclic Redundancy Checks techniques. The verification is done by comparing the two different digest values. This process verifies the backup files have been corrupted or uncorrupted from the remote server. Checking data possession in networked information systems such as those related to critical infrastructures is a matter of crucial importance Remote data possession checking protocols permit checking that a remote server can access an uncorrupted file in such a way that the verifier does not need to know beforehand the entire file that is being verified.
Hobbies:
• Reading news papers.
• Spend time by Browsing
Honors and Awards:
• Volunteer in Foss Conference ’08 organized by NRCFOSS & ILUGC.
• Participated in the Two-Day National Conference WEBTOPS, 4th Generation Organized by the Departments of CSE at WUSC, Chetpet.Organized Symposiums at College level.
Achievements:
• Was selected to participate in Software Freedom day – 2009 national level in technical events.
• Organized Blood Donation camps at college level.
• Was selected to participate in national level conference WEBTOPS-2007.
• Participated in the open source demo conducted in MIT, Carte Blanche ’09.
Declaration
I hereby acknowledge that the information furnished above is true to the best of my knowledge and belief.
Place:
Date:
[A. KIRANKUMAR]