N.VIJAYKUMAR

N.VIJAYKUMAR

IT PROFESSIONAL

About

My name is Vijaykumar and I live in Bangalore, India, My knowledge areas are IT architecture, Cloud computing, AWS, VMware, Red Hat, SAP Hanna and ITIL, and CMMI process management. Managed technology projects, and developed technology architecture. I have also published books and whitepapers. I had to resign from Infosys on medical grounds and am now looking for content creation jobs I have designed the following architectures in • AWS • VMware • Red hat • Azure Publications Paperback Concise cloud compute https://www.partridgepublishing.com/India/Books/bookdetail.aspx?bookid=BK190050 Concise Cloud Compute: It Professionals’ Handbook ISBN: 978-1-5437-0573-7 Self-published 48 hours, that is what it takes to design and deploy VMware Cloud: Architects and system administrators’ companion https://www.amazon.in/hours-takes-design-deploy-VMware-ebook/dp/B084TRPSNK Design and Deployment of Cloud services using Amazon Webservice - AWS: A Handbook for IT administrators and Cloud computing architects https://www.scribd.com/document/461384812/SAP-Hanna-the-game-changer-Vijay-Kumar-pdf SAP Hanna, the game changer Kindle Edition dazzling datacentres https://www.amazon.in/Dazzling-Datacenter-understand-datacenter-components-ebook/dp/B01HLDAP8U SAP Hanna, The Game Changer - Vijay Kumar PDF | Download Free PDF | Sap Se | Business Intelligence (scribd.com) Also published white papers in Infosys Limited, Interop Cloud Computing Conference, and NIRMA University –e-governance conference

1 Articles Published

Articles by N.VIJAYKUMAR

1 articles

Digital Evidence - How to Use FTK for Examining Evidence

N.VIJAYKUMAR
N.VIJAYKUMAR
Updated on 24-Oct-2024 395 Views

What is Digital Evidence?Digital Evidence refers to any actionable information, which is gathered from any electronic device, capable of revealing the mystery behind a crime. Such evidence is admissible in any court of law. Data is retrieved from computer's, electronic devices. Forensic involve sealing the crime scene, collecting fingerprints, electronic evidence, confiscating all related evidence material or otherwise. It is a simple task if the systems are operational. This process forensically is termed as Live Acquisition of Data.What is Cloning?Cloning is a method of creating a replica of a system drive. Clones are critical in scenario's where duplication has to ...

Read More
Showing 1–1 of 1 articles
« Prev 1 Next »
Advertisements