This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Wednesday, 19 June 2013

marams hub


About Me

Dear Readers/Subscribers,

I would like to thank you, for visiting my Blog. Hope you are finding good stuff out here.
My name is Rajesh Maram, B.Tech,MBA,PGDBM.
I have completed my B.Tech in Computer Science and Engineering with JNTU, Hyderabad. Later, I have Pursued my MBA,PGDBM with NDIM, New Delhi.

Right now I am working as a Research Associate with Francorp India.

Regards,
Rajesh Maram,
https://www.facebook.com/nagarajeshmaram
https://twitter.com/NagaRajeshMaram



Saturday, 15 June 2013

Best practices for the IP protection


The World Intellectual Property Organization(WIPO) has defined four primary types of intellectual property (IP) viz. patents, copyrights, trademarks, and trade secrets. These are distinct in nature from one another but have common consequences if these are lost, stolen, misused or made unavailable. Importance of protecting IP is different than protecting regular information assets. 
The industry today demands the IT teams to deliver services with BYOD, virtualization and cloud services. As these changes are being implemented across organizations, the CISOs and IS managers are posed with a lot of questions around securing their most valued asset, i.e. IP. The need of the hour is to build a scalable, integrated and flexible IT ecosystem that not only delivers as per the demands of business users, but also addresses the new paradigm of security requirements.  
FORMULATING A STRONG IP STRATEGY

To begin with, organizations must invest in a well-written Non Disclosure Agreement (NDA) with various entities like employees, contractors, and third-parties. The Read More