SlideShare a Scribd company logo
1 of 17
1
2
Exiting software applications fail to
handle the Volume, Velocity and
Variety of data (structured,
unstructured, semi structured
data) generated by connected
people, devices and things.
1
3
Existing software applications fail
to provide individual attention,
immediate response and real time
tailor made services to people
(based on their
behaviour/sensitivity at that
moment)
2
4
Existing software applications fail
to support the digital processes
with embedded (NOT integrated)
social collaboration, unified
communication (as part of the
process workflow)
3
5
Existing software applications fail
to support the seamless
movement of data over unified
heterogeneous networks like
Wired, Wireless and Machine to
Machine
4
6
Existing Software Applications are
not accessible through Omni
channel: TV, Phablet, Tablet,
Desktop, Laptop etc., and also fail
to continue with the
transaction/experience while
shifting from one channel to
another channel
5
7
Existing software applications do
not support the user interfaces
like touch and anticipatory
technologies (mood, gestures
etc.,)
6
8
Existing Software applications are
‘Serious’ transaction focused and
NOT ‘Enjoyable’ interaction
focused with embedded
Gamification within the
transaction workflow
7
9
Existing software applications do
not support embedded
transactional predictive analytics
and fail to provide real time
insight and foresight in the
context of the transaction
8
10
Existing software applications are
built on single tenant architecture
(not multi tenant) and only work
on rigid infrastructure (not elastic
storage, networks, computing
power)
9
11
Existing software applications do
not support pay as you go
transactions as the charge back
features are not integrated within
the application
10
12
Existing software applications fail
to communicate with non living
things like cars, machines,
equipment, plants, jet engines,
medical devices etc.,
11
13
Existing software applications fail
to run in hybrid environments like
On premise, public cloud and
private cloud12
14
Existing software applications fail
to analyze the real time behaviour
and sensitivity of customers &
employees based on the
convergence of social
conversations, call data, mails,
CRM feedback etc.,
13
15
Existing software applications
have high security vulnerability as
they have to run on complex
environment like cloud, mobile,
machine to machine
communication, wireless networks
etc.,
14
16
Existing software applications are
tuned with long release cycles and
fail to support incremental and
faster release of updated software
to operations hourly, daily or
weekly (high frequency)
15
Blog : http://vsr-blog.blogspot.com/
Facebook : http://www.facebook.com/VSR111
Twitter : http://twitter.com/VSR111
Talks http://soundcloud.com/vsr111
SlideShare : http://www.slideshare.net/vsr0001
Channel : http://www.youtube.com/TheVSRTV
LinkedIn : http://in.linkedin.com/in/vsr111
Thank You!
VSR

More Related Content

What's hot

Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder
 

What's hot (17)

Information System & Organizational System
Information System & Organizational SystemInformation System & Organizational System
Information System & Organizational System
 
Demo: Connect, Combine, Publish Easily with Data Virtualization
Demo: Connect, Combine, Publish Easily with Data VirtualizationDemo: Connect, Combine, Publish Easily with Data Virtualization
Demo: Connect, Combine, Publish Easily with Data Virtualization
 
Introduction to software
Introduction to softwareIntroduction to software
Introduction to software
 
Information Technology(IT)
Information Technology(IT)Information Technology(IT)
Information Technology(IT)
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
Resume2011
Resume2011Resume2011
Resume2011
 
Ijcet 06 10_002
Ijcet 06 10_002Ijcet 06 10_002
Ijcet 06 10_002
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
user centeredness_info systems
user centeredness_info systemsuser centeredness_info systems
user centeredness_info systems
 
Information System
Information SystemInformation System
Information System
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
Grid computing components
Grid computing componentsGrid computing components
Grid computing components
 
Internal Control Considerations Middleware Technologies2
Internal Control Considerations   Middleware Technologies2Internal Control Considerations   Middleware Technologies2
Internal Control Considerations Middleware Technologies2
 
Embedded systems software
Embedded systems softwareEmbedded systems software
Embedded systems software
 
Retire Your Legacy Applications & Reduce Costs
Retire Your Legacy Applications & Reduce CostsRetire Your Legacy Applications & Reduce Costs
Retire Your Legacy Applications & Reduce Costs
 
Remote Asset Monitoring Solution
Remote Asset Monitoring SolutionRemote Asset Monitoring Solution
Remote Asset Monitoring Solution
 
Services, Compliance and Innovation
Services, Compliance and InnovationServices, Compliance and Innovation
Services, Compliance and Innovation
 

Similar to 50% of existing IT Applications will NOT survive!: Top 15 Reasons

A Mobile Expert System Application for Solving Personal Computer Problems.pdf
A Mobile Expert System Application for Solving Personal Computer Problems.pdfA Mobile Expert System Application for Solving Personal Computer Problems.pdf
A Mobile Expert System Application for Solving Personal Computer Problems.pdf
Kayla Smith
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
Francisco Anes
 
Mfuse - Building & Managing Mobile Solutions - Whitepaper - Oct12
Mfuse - Building & Managing Mobile Solutions - Whitepaper - Oct12Mfuse - Building & Managing Mobile Solutions - Whitepaper - Oct12
Mfuse - Building & Managing Mobile Solutions - Whitepaper - Oct12
Paul Galbraith
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it application
Kumar
 
ACCESS_WP_Hiker_App_framework-web
ACCESS_WP_Hiker_App_framework-webACCESS_WP_Hiker_App_framework-web
ACCESS_WP_Hiker_App_framework-web
Paul Plaquette
 
Key Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility SolutionKey Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility Solution
roshanjk
 

Similar to 50% of existing IT Applications will NOT survive!: Top 15 Reasons (20)

Software 2.0 - Transformation of Software Services
Software 2.0 - Transformation of Software ServicesSoftware 2.0 - Transformation of Software Services
Software 2.0 - Transformation of Software Services
 
SOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdfSOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdf
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
A Mobile Expert System Application for Solving Personal Computer Problems.pdf
A Mobile Expert System Application for Solving Personal Computer Problems.pdfA Mobile Expert System Application for Solving Personal Computer Problems.pdf
A Mobile Expert System Application for Solving Personal Computer Problems.pdf
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Mfuse - Building & Managing Mobile Solutions - Whitepaper - Oct12
Mfuse - Building & Managing Mobile Solutions - Whitepaper - Oct12Mfuse - Building & Managing Mobile Solutions - Whitepaper - Oct12
Mfuse - Building & Managing Mobile Solutions - Whitepaper - Oct12
 
Fundamentals of Mobile App Development Technology
Fundamentals of Mobile App Development TechnologyFundamentals of Mobile App Development Technology
Fundamentals of Mobile App Development Technology
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
Interactive Applications in .NET
Interactive Applications in .NETInteractive Applications in .NET
Interactive Applications in .NET
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Iaetsd efficient file transferring in
Iaetsd efficient file transferring inIaetsd efficient file transferring in
Iaetsd efficient file transferring in
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it application
 
ACCESS_WP_Hiker_App_framework-web
ACCESS_WP_Hiker_App_framework-webACCESS_WP_Hiker_App_framework-web
ACCESS_WP_Hiker_App_framework-web
 
Download
DownloadDownload
Download
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...
 
Key Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility SolutionKey Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility Solution
 

More from VSR *

Why you can not become a Business Leader: Top 20 Valid Reasons
Why you can not become a Business Leader: Top 20 Valid Reasons Why you can not become a Business Leader: Top 20 Valid Reasons
Why you can not become a Business Leader: Top 20 Valid Reasons
VSR *
 
Cloud & Mobility Goldmines
Cloud & Mobility GoldminesCloud & Mobility Goldmines
Cloud & Mobility Goldmines
VSR *
 

More from VSR * (20)

TRANSITIONING FROM TRADITIONAL TO DIGITAL BUSINESS MANAGEMENT
TRANSITIONING FROM TRADITIONAL TO DIGITAL BUSINESS MANAGEMENTTRANSITIONING FROM TRADITIONAL TO DIGITAL BUSINESS MANAGEMENT
TRANSITIONING FROM TRADITIONAL TO DIGITAL BUSINESS MANAGEMENT
 
Sustainable Technology, Innovation and R&D
Sustainable Technology, Innovation and R&DSustainable Technology, Innovation and R&D
Sustainable Technology, Innovation and R&D
 
Digitalizng MSMEs with Lean Digital Thinking : AatmaNirbhar Bharat & Industry...
Digitalizng MSMEs with Lean Digital Thinking : AatmaNirbhar Bharat & Industry...Digitalizng MSMEs with Lean Digital Thinking : AatmaNirbhar Bharat & Industry...
Digitalizng MSMEs with Lean Digital Thinking : AatmaNirbhar Bharat & Industry...
 
4th Industrial Revolution is Beyond Cyber Physical Systems
4th Industrial Revolution is Beyond Cyber Physical Systems 4th Industrial Revolution is Beyond Cyber Physical Systems
4th Industrial Revolution is Beyond Cyber Physical Systems
 
24 Tips for Leading Self & Leading Others
24 Tips for Leading Self & Leading Others 24 Tips for Leading Self & Leading Others
24 Tips for Leading Self & Leading Others
 
Lean Digital Enterprise Evolution in a Hyper Connected World
Lean Digital Enterprise Evolution in a Hyper Connected World Lean Digital Enterprise Evolution in a Hyper Connected World
Lean Digital Enterprise Evolution in a Hyper Connected World
 
Projects FAIL if We do not Consider 5 DIMENSIONS!
Projects FAIL if We do not Consider 5 DIMENSIONS!Projects FAIL if We do not Consider 5 DIMENSIONS!
Projects FAIL if We do not Consider 5 DIMENSIONS!
 
12 Building Blocks to Build a Digital Enterprise
12 Building Blocks to Build a Digital Enterprise 12 Building Blocks to Build a Digital Enterprise
12 Building Blocks to Build a Digital Enterprise
 
Digital Apps At the Speed of Thought - Confluence of Agile & DevOps
Digital Apps At the Speed of Thought - Confluence of Agile & DevOpsDigital Apps At the Speed of Thought - Confluence of Agile & DevOps
Digital Apps At the Speed of Thought - Confluence of Agile & DevOps
 
My Keynote Speech on Power of Digital Technologies to Transform Media & Enter...
My Keynote Speech on Power of Digital Technologies to Transform Media & Enter...My Keynote Speech on Power of Digital Technologies to Transform Media & Enter...
My Keynote Speech on Power of Digital Technologies to Transform Media & Enter...
 
Building 1000s of NextGen Leaders: Our Aspiration
Building 1000s of NextGen Leaders: Our Aspiration Building 1000s of NextGen Leaders: Our Aspiration
Building 1000s of NextGen Leaders: Our Aspiration
 
Why you can not become a Business Leader: Top 20 Valid Reasons
Why you can not become a Business Leader: Top 20 Valid Reasons Why you can not become a Business Leader: Top 20 Valid Reasons
Why you can not become a Business Leader: Top 20 Valid Reasons
 
20 Lessons I learned in my career
20 Lessons I learned in my career20 Lessons I learned in my career
20 Lessons I learned in my career
 
Global Delivery Model 2.0 (GDM 2.0)
Global Delivery Model 2.0 (GDM 2.0)Global Delivery Model 2.0 (GDM 2.0)
Global Delivery Model 2.0 (GDM 2.0)
 
Taste of Failure is Key for Sustainable Success
Taste of Failure is Key for Sustainable SuccessTaste of Failure is Key for Sustainable Success
Taste of Failure is Key for Sustainable Success
 
SMAC: The Game Changer
SMAC: The Game Changer SMAC: The Game Changer
SMAC: The Game Changer
 
Scale up Business
Scale up BusinessScale up Business
Scale up Business
 
Convergence of Cloud Computing & Project Management
Convergence of Cloud Computing & Project ManagementConvergence of Cloud Computing & Project Management
Convergence of Cloud Computing & Project Management
 
Volunteerism - Catalyst for Career Progression
Volunteerism - Catalyst for Career ProgressionVolunteerism - Catalyst for Career Progression
Volunteerism - Catalyst for Career Progression
 
Cloud & Mobility Goldmines
Cloud & Mobility GoldminesCloud & Mobility Goldmines
Cloud & Mobility Goldmines
 

Recently uploaded

Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
vineshkumarsajnani12
 

Recently uploaded (20)

Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 

50% of existing IT Applications will NOT survive!: Top 15 Reasons

  • 1. 1
  • 2. 2 Exiting software applications fail to handle the Volume, Velocity and Variety of data (structured, unstructured, semi structured data) generated by connected people, devices and things. 1
  • 3. 3 Existing software applications fail to provide individual attention, immediate response and real time tailor made services to people (based on their behaviour/sensitivity at that moment) 2
  • 4. 4 Existing software applications fail to support the digital processes with embedded (NOT integrated) social collaboration, unified communication (as part of the process workflow) 3
  • 5. 5 Existing software applications fail to support the seamless movement of data over unified heterogeneous networks like Wired, Wireless and Machine to Machine 4
  • 6. 6 Existing Software Applications are not accessible through Omni channel: TV, Phablet, Tablet, Desktop, Laptop etc., and also fail to continue with the transaction/experience while shifting from one channel to another channel 5
  • 7. 7 Existing software applications do not support the user interfaces like touch and anticipatory technologies (mood, gestures etc.,) 6
  • 8. 8 Existing Software applications are ‘Serious’ transaction focused and NOT ‘Enjoyable’ interaction focused with embedded Gamification within the transaction workflow 7
  • 9. 9 Existing software applications do not support embedded transactional predictive analytics and fail to provide real time insight and foresight in the context of the transaction 8
  • 10. 10 Existing software applications are built on single tenant architecture (not multi tenant) and only work on rigid infrastructure (not elastic storage, networks, computing power) 9
  • 11. 11 Existing software applications do not support pay as you go transactions as the charge back features are not integrated within the application 10
  • 12. 12 Existing software applications fail to communicate with non living things like cars, machines, equipment, plants, jet engines, medical devices etc., 11
  • 13. 13 Existing software applications fail to run in hybrid environments like On premise, public cloud and private cloud12
  • 14. 14 Existing software applications fail to analyze the real time behaviour and sensitivity of customers & employees based on the convergence of social conversations, call data, mails, CRM feedback etc., 13
  • 15. 15 Existing software applications have high security vulnerability as they have to run on complex environment like cloud, mobile, machine to machine communication, wireless networks etc., 14
  • 16. 16 Existing software applications are tuned with long release cycles and fail to support incremental and faster release of updated software to operations hourly, daily or weekly (high frequency) 15
  • 17. Blog : http://vsr-blog.blogspot.com/ Facebook : http://www.facebook.com/VSR111 Twitter : http://twitter.com/VSR111 Talks http://soundcloud.com/vsr111 SlideShare : http://www.slideshare.net/vsr0001 Channel : http://www.youtube.com/TheVSRTV LinkedIn : http://in.linkedin.com/in/vsr111 Thank You! VSR