Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Dr. Vamsi Mohan Vandrangi

Chief Technology Officer (CTO) at Hub Technologies

Bangalore, India

Dr. Vamsi Mohan’s philosophy of constant innovation and digital disruption is embedded and resonates across his experience.
He possesses a Doctorate in Computer Science and Engineering. He is an IIM Ahmedabad alumnus. Dr. Vamsi Mohan is a guide, researcher and scientist. He has published numerous papers in national and international journals on digital transformation, cyber security and secure data models. He holds several patents in secure data transmissions and cyber security.
He has garnered numerous awards and recognitions. He was named one of the Next100 CIOs for the year 2020. He is a top – 50 global thought leader and influencer for the RPA, data center technologies and cyber security. He speaks frequently at several national and international industry conferences.
Prior to Huber, Dr. Vamsi Mohan served in various senior engineering leadership roles driving digital innovation centers and business incubators globally. His influence spans enterprise architecture, platform engineering, product management and next-gen technology solutions focusing on future-proofing business through accelerated digital transformation.

Available For: Authoring, Consulting, Influencing, Speaking
Travels From: Bangalore, Karnataka
Speaking Topics: Digital Transformations, Disruptive Technologies, and Technology Environment

Dr. Vamsi Mohan VandrangiPoints
Academic60
Author19
Influencer0
Speaker31
Entrepreneur0
Total110

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Enterprise
Business Unit: Digital Transformations, Enterprise Architecture and Technology
Theatre: ASIA, India

Areas of Expertise

Agile
AI 30.07
Analytics
Blockchain
Culture 30.59
Customer Experience 30.36
Cybersecurity 36.11
Design Thinking
Digital Transformation 31.42
Emerging Technology 30.88
Fintech
Future of Work
HR 30.27
Innovation 30.27
Leadership 30.84
Management
Mobility
Open Innovation
Predictive Analytics
Privacy
Climate Change 32.59
Change Management 30.26
Business Strategy 30.18
Digital Disruption 30.05
Health and Safety 31.11
Cloud 30.30
Data Center 31.61
Social 30.41
Edtech 30.12
RPA 30.27
Autonomous Vehicles 30.19

Industry Experience

Financial Services & Banking
High Tech & Electronics
Higher Education & Research
Manufacturing
Telecommunications

Please signin or signup to view publication section.

Publications

1 Academic Whitepaper
Secure Data Transmission through IBE and Symmetric Encryption Techniques (publication)
Journal of The Gujarat Research Society
November 20, 2019
There are many techniques, methods and methodologies in secure data transmission. However, still users are failing to transmit the data securely. Hackers are succeeding in attacking the data for every few minutes. In cyber security attacks, SQL Injection and Cross Site Scripting attacks are very prominent. SQL Injection (SQLI) executes malicious code in the form of SQL statement at database by directly executing the query or changing the requested parameters, changing the triggered URL. In case of Cross-Site Scripting, the attacker targets to execute the malicious code at the client side. In this paper, for secure data transmission, we proposed a model using IBE and AES encryption techniques. we explained the proposed model "How to transmit the data securely?".

See publication

Tags: Cybersecurity

16 Article/Blogs
A future reality - Hackers attacking human memories
LinkedIn
July 05, 2021
Neurostimulators may be a boon for patients who are suffering from Parkinson's disease or people suffering from deep depression. The Black Mirror series may sound like science fiction, it is worth realizing that we are already on the way to understand how human memories are created, processed, and restored. Many experiments in the recent past shown the possibilities of improving human memories (especially short-term memories).

See publication

Tags: AI, Cybersecurity, Health and Safety

AI is the future strategy of Enterprises
LinkedIn
February 06, 2021
Artificial Intelligence is optimizing the way of doing business. It is helping enterprises in enabling predictions with supreme accuracy, automating business processes, and complex decision making.

See publication

Tags: AI, Autonomous Vehicles, Business Strategy

THE NEW WAYS OF EMPLOYEE UPSKILLING DURING COVID-19 LOCK DOWN
ANECDC
May 17, 2020
The corporate culture is getting changed during and post COVID-19 lockdown. Most of the employees are asked to work from home except essential workers and employers are reviewing their risk mitigation strategies and planning to sustain their revenues. The practice of engaging employees is getting changed due to remote working culture.

See publication

Tags: Edtech, Leadership, Social

Robotic Process Automation - Solid steps to cognitive revolution
LinkedIn
April 24, 2019
It is evident, many enterprises are started using software robots to perform business processes by spying the ways in which people perform their routine jobs. Robotic process automation (RPA) is an emerging trend rapidly growing in the digital market. In today's world, the biggest adopters of RPA include banks, insurance companies, utilities and telecommunications companies. Many enterprises and financial intuitions are started using RPA together with intelligent cognitive technologies/frameworks like Chabot, speech recognition, and machine learning to automate the tasks. RPA tools mimic the “routine manual” tasks performed by the human workers. The market provides a broad range of solutions with tools either operating on individual desktops or enterprise servers or from the cloud. Leveraging the capabilities of cognitive with RPA can help enterprises to become more efficient and agile in the process of digitization.

See publication

Tags: Digital Transformation, Digital Disruption, RPA

Your obsessive smartphone habits just became the Cambridge Dictionary’s word ("Nomophobia"​) of the year
LinkedIn
December 03, 2018
Communication helped us to improve many things in the fast paced world. People are able to communicate with others who are thousand miles away from them. Smartphones often serve as a go-to source for many and the addictive behaviour to smart phones are also increased.

The Cambridge English Dictionary added a new word "nomophobia" (or, no-mobile-phone-phobia). Due to excessive technology or I might be wrong... due to excessive using of smart phones, the distraction level of a normal human being is increased. The more technology the more distraction. Ultimately blaming the technology that it is not allowing us to concentrate. Is it right?

See publication

Tags: Culture, Digital Transformation, Health and Safety

The Data Center Is Dead, and EDGE Infrastructures Emerge
LinkedIn
November 23, 2018
Traditional Data Centers are getting dead due to Cloud revolution. Enterprises believe deploying data in Cloud is the best way to store and process. However, new methods and techniques are changing the trends. We have observed in the last decade, computing workloads have been migrating from traditional hosting at on-premise data centers to cloud. According to Cisco, the cloud traffic is likely to rise nearly fourfold by 2020, increasing to 14.1 ZB per year by 2020.

See publication

Tags: Cloud, Data Center, Digital Transformation

Serverless Technologies -The Future of Business Computing
LinkedIn
August 26, 2017
Initially, the definition of serverless architecture was limited to applications which are dependent on third-party services in the cloud. The rise of Machine learning, Mobile and IoT applications is fueling the growth of serverless computing platforms. It is a cloud computing execution model in which the cloud provider dynamically manages the allocation of machine resources. Pricing is based on the actual amount of resources consumed by an application, rather than on pre-purchased units of capacity. However, what is not clear is whether this reduction of resource usage and operational efforts are valid and whether these reductions are consistent across all serverless computing platforms.

See publication

Tags: Cloud, Data Center, Innovation

The Leadership Way : Building Trust in the Workplace
LinkedIn
August 15, 2016
When I think about all of the different dynamics that combine to create a successful workplace, one of the most important factors, in my mind, is trust. In a trusting environment, we’re empowered to make decisions and encouraged to take risks.

Leadership experts will always agree on one thing: to be a successful leader you must be a trustworthy leader. And in today's uncertain corporate world, it is not surprising that study after study shows a decline in the employee trust on their leaders. If your employees don't trust your organization leaders, they cannot truly lead them. Employees will doubt every word their leaders say, and leaders will have no credibility to influence. According to the leadership surveys, one in four employees doesn't trust their Leaders.

See publication

Tags: Culture, Leadership, Social

Attitude Problems in the Workplace: How to deal employees shift from a victim mindset?
LinkedIn
June 30, 2016
In the Corporate World, "attitude" is a bit of a buzzword. One's mental attitude, whether positive or negative, healthy or unhealthy, is said to be a key factor in the success of organizations and professional relationships.

People are the pillars for maintaining the right culture to grow organizations. Organizations often feel trapped when dealing with attitudes of entitlement among their staff members. Leaders have to nurture the skills to manage and control workplace attitude problems. It is becoming a bad symptom having attitude problems in the Workplace. People are spending an average eight hours a day, five days a week for about 45 weeks a year. That is a long time, and it essentially means that people are spending probably the majority of their lives at work.

See publication

Tags: Culture, Leadership, Social

7 Common Mistakes You Must Avoid While Hiring
LinkedIn
May 27, 2016
There is a heck of a lot on-line to help a job candidate shine in the interview than for the hiring managers. Employers today aren't necessarily only looking for candidates with the right set of technical skills and years of experience under their belt.

According to Edward Fleischman, chief executive officer of Executive Search says "In an effort to find new hires that are great cultural fits, employers are putting more emphasis on soft skills, or intangible qualities, that are not always apparent on a piece of paper".

See publication

Tags: Culture, HR, Leadership

The Leadership Nature
LinkedIn
May 14, 2016
According to Harward Business Review, Considering the challenges of the 21st century enterprise: things change too fast for one individual to know how best to respond; there are hundreds of explanations for any small event, and multiple perspectives are needed to understand what that event means and decide what to do; a pipeline of future leaders is essential to companies’ long term success.

When it comes to leadership, talk really is cheap. The best leaders don’t lead from position or authority. Leadership is in Action and Not in Talk. Many leaders talk about many things. They quote many examples and give hours of speech on leadership behavior and qualities. But when it comes to their own, the things play differently. Leadership should be in their Action. People do not want to hear the words; they want to see results. Politicians are the best example of this topic. They provide excellent material in the form of words and serve as a perfect sample of how some “leaders” spend too much time talking (way too much, actually) and not enough time doing. It is the same even in Corporates. By seeing their actions, people are losing faith on their leadership teams. It is witnessed in many exit interviews. It is a dangerous situation for the Corporates.

"Never tell people how to do things. Tell them what to do and they will surprise you with their ingenuity" —General George Patton

See publication

Tags: Culture, HR, Leadership

Are Exit Interviews a Waste of Time?
LinkedIn
May 04, 2016
Nothing good comes from an exit interview.

Most of the employees think "Nothing good comes from an exit interview. You won't learn anything you don't already know and no one wins in the process. That's pretty declarative". But is it true? Who created that impression?

"Exit interviews offer the opportunity for the employer to clear up misunderstandings and demonstrate concern for the employee's point of view."

The exit interview with a resigned employee is the best opportunity to obtain information about what the organization is doing well - and, what the organization needs to do to improve. Exit interviews are a rich source of information for organization's improvement.

See publication

Tags: Culture, HR, Leadership

Cyber Security Challenges in the Digital World
LinkedIn
April 28, 2016
In the growing digital world, Cyberattacks have become an everyday threat. They not only affect financial and customer data, but machinery and industrial engineering companies through networked production systems and software-laden products. A holistic approach is needed to fully counter these threats.

Recently hackers attack on Intelligence Agency, data theft from US government agencies, a spy attack on the German federal government. A recent American Bar Association survey found that one in four law firms with at least 100 attorneys have experienced a breach. Leading New York Law Firms hacked by Cyber attackers. Four North American hospitals The Ottawa Hospital, Kentucky Methodist Hospital, Chino Valley Medical Center and Desert Valley Hospital were recently infected with ransomware in March 2016: Spectacular cases of cybercrime like these are now a regular feature of daily news headlines. Indeed, cyber security attacks have become a major threat to companies around the globe and across all industries. From the year 2010, annual cyberattacks globally have increased ten times over.

See publication

Tags: Cybersecurity, Digital Transformation, Emerging Technology

Neutralizing the Negative Workplace Environment
LinkedIn
April 25, 2016
Every organization wants zero attrition and hundred percent success. However growing organizations frequently experience issues with negative workplace environment. Even it is common for the organizations which are top 5 in "Great Place to Work" award winners.

Happy employees, workplaces create successful organizations. Negative employee attitudes and less-than-professional behavior can poison the workplace environment. Employee morale describes the overall outlook, attitude, satisfaction, and confidence that employees feel at work. When employees are positive about their work environment and believe that they can meet their most important career and vocational needs at work, employee morale is positive or high.

See publication

Tags: Culture, HR, Leadership

Building A Winning Culture
LinkedIn
April 09, 2016
What holds an organization together and motivates the people within it to do the right things rather than the easy things? The answer, for many top-performing companies, i.e. A Winning Culture. In recent Bain survey, 81% of executives agreed that a company without a winning culture was “doomed to mediocrity”.

The organizations are often in a situation how to develop successful teams and reap the benefits of high performing culture. The research is shown that high performance culture shown increase of profitability sometimes as high as 700% or even more. A company’s culture can have a powerful impact on its performance. Culture is an interface that binds an organization together to form the successful teams.

See publication

Tags: Culture, HR, Leadership

Are Corporates benefiting with employee longer notice period?
LinkedIn
November 07, 2015
High attrition has been plaguing the IT sector in India because of various reasons. According to Live mint, the attrition rate at mid-level positions ranges between 18% and 32%, while at the junior level it is around 40-50%. The intention behind long notice period in corporate companies is getting changed. Because of long notice periods, many corporates are facing with more number of attritions than actual. In Industry, long notice periods introduced for smooth knowledge transition before employee leaving the current company. However, long notice period back firing the Corporates and diluting the health atmosphere and culture of the companies.

See publication

Tags: Culture, HR, Leadership

4 Conference Publications
Secure Data Transmission through IBE and Symmetric Encryption Techniques
International Conference on Smart Technology in Computer Science and Information Technology (CSIT-2019)
November 20, 2019
There are many techniques, methods and methodologies in secure data transmission. However, still users are failing to transmit the data securely. Hackers are succeeding in attacking the data for every few minutes. In cyber security attacks, SQL Injection and Cross Site Scripting attacks are very prominent. SQL Injection (SQLI) executes malicious code in the form of SQL statement at database by directly executing the query or changing the requested parameters, changing the triggered URL. In case of Cross-Site Scripting, the attacker targets to execute the malicious code at the client side. In this paper, for secure data transmission, we proposed a model using IBE and AES encryption techniques. we explained the proposed model "How to transmit the data securely?".

See publication

Tags: Cybersecurity

User Centric Security Models for Improving the Data Security from SQL Injections and Cross Site Scripting Attacks
International Conference on Internet of Things, Big Data Analytics and Information Technology (ICITBDIT– 19)
October 20, 2019
SQL Injection Attacks (SQLIA) and Cross-site Scripting Attacks (XSSA) are frequently used by hackers to hack the user data. SQL Injection (SQLI) executes malicious code in the form of SQL statement at database by directly executing the query or changing the requested parameters, changing the triggered URL. In case of Cross-Site Scripting, the attacker targets to execute the malicious code at the client side.

See publication

Tags: Cybersecurity

Security Framework for Detecting the SQL Injection and Cross Site Scripting Vulnerabilities
7th International Conference on Research Developments in Applied Science, Engineering & Management
June 20, 2019
From the last two decades, SQL Injection Attacks (SQLIA) and Cross-site Scripting Attacks (XSSA) became prominent of taint-based vulnerabilities which has caused many security breaches in the digital industry. SQL Injection (SQLI) executes malicious code in the form of SQL statement at database end whereas in the case of Cross-site scripting, the attacker targets to execute the malicious code at the web browser (client) side. In this paper, we are trying to propose a security framework to detect SQLI and XSS attacks. Regression Neural Network (RNN) introduced to identify and control the dynamic systems.

See publication

Tags: Cybersecurity

A Detection Framework for SQL Injections and Cross Site Scripting
International Journal of Science & Engineering Development Research (IJSDR)
January 15, 2019
Designing secure web applications are most important aspect to avoid SQL injections and Cross Site Scripting (XSS) attacks. XSS vulnerabilities are classified into three types. i.e., Reflected XSS, Stored XSS and Dynamic XSS. From these types of XSS, DOM XSS is different from the two others. There are many researches and detection methods proposed for Reflected XSS and Stored XSS. However, it is not suitable for Dynamic XSS. Due to increase of web applications, the threats are getting increased. XSS often included in OWASP top-10 list from the last decade and hence an appropriate XSS detection method is necessary. In this paper, we propose a detection framework for SQLI and XSS. We introduced Regression Neural Network (RNN). It provides accurate and quick solution to regression, approximation, classification and fitting problems. RNN can be used in system identification of dynamic systems as well as control of dynamic systems. Here we are integrating multi-objective optimization which involves integration of objective formulation from dragon fly optimization (DA) and Genetic algorithm (G A). Integrating of optimization algorithm, crossover and mutation is used instead of alignment process of DA.

See publication

Tags: Cybersecurity

7 Journal Publications
User Centric Security Models for Improving the Data Security from SQL Injections and Cross Site Scripting Attacks
Journal of The Gujarat Research Society
October 20, 2019
SQL Injection Attacks (SQLIA) and Cross-site Scripting Attacks (XSSA) are frequently used by hackers to hack the user data. SQL Injection (SQLI) executes malicious code in the form of SQL statement at database by directly executing the query or changing the requested parameters, changing the triggered URL. In case of Cross-Site Scripting, the attacker targets to execute the malicious code at the client side.

See publication

Tags: Cybersecurity

Security Framework for Detecting the SQL Injection and Cross Site Scripting Vulnerabilities
International Journal of Scientific Research and Review
June 20, 2019
From the last two decades, SQL Injection Attacks (SQLIA) and Cross-site Scripting Attacks (XSSA) became prominent of taint-based vulnerabilities which has caused many security breaches in the digital industry. SQL Injection (SQLI) executes malicious code in the form of SQL statement at database end whereas in the case of Cross-site scripting, the attacker targets to execute the malicious code at the web browser (client) side. In this paper, we are trying to propose a security framework to detect SQLI and XSS attacks. Regression Neural Network (RNN) introduced to identify and control the dynamic systems.

See publication

Tags: Cybersecurity

Proposed Adaptive Algorithms to Prevent SQL Injections
International Journal of Advance Engineering and Research Development
December 22, 2017
For the last two decades, SQL injection attacks are considered as common for Web applications. By growing of digitalization, the security attacks are increasing and most commonly SQL Injection Attacks (SQLIAs). Injection attacks considered in the first place (A1) as per the OWASP Top 10 Application Security Risks for the year 2017. To overcome these attacks, many researchers and scientists proposed various algorithms to adopt. However, software industry has not completely succeeded from the SQL injection attacks and vulnerabilities. In this paper, we examined various algorithms proposed by different researchers to prevent the SQL injections.

See publication

Tags: Cybersecurity

Secure Web Applications Against Cross Site Scripting (XSS): A Review
International Journal of Trend in Scientific and Development (IJTSRD)
November 30, 2017
Cross Site Scripting (XSS) attacks are most common vulnerability issues in the digital era for the Web applications. These attacks occur, when an attacker uses a web application to send malicious code in the form of client side script. These scripts exploit the vulnerabilities in the code and resulting in a serious consequence like theft of cookies, passwords and any confidential user data. In extreme cases, the user may have lost his/her control on the browser. In this paper, we explained detection, and prevention of Cross Site Scripting (XSS) vulnerability attacks through a systematic review process.

See publication

Tags: Cybersecurity

Detection and Prevention of SQL Injection Vulnerabilities in Web Applications: A Review
International Advanced Research Journal in Science, Engineering and Technology
September 25, 2017
In recent time, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web applications are targeted through SQL Injection attacks (SQLIA). In this paper, we explained various method of detection and preventive measures on SQL Injection Attacks through a systematic review process.

See publication

Tags: Cybersecurity

Debunking of common attacks in web applications
International Journal of Current Research
March 28, 2017
Cyber-attacks are becoming commonplace in our society these days as the world becomes more connected. Security attacks on information security infrastructure have continued to evolve steadily and legacy network based attacks have been replaced by more sophisticated web application based attacks. It is vitally important to discuss web application attacks considering the number of attacks happened in the recent years. In this paper, we define each of them in detail and emphasize their differences. We also conclude our studies in this area with providing a diagram which gives a comprehensive overview about Web attacks.

See publication

Tags: Climate Change

The Intensity of Fault Slip through in Software Process
International Journal of Scientific and Engineering Research (IJSER)
March 18, 2012
The improvement of software development process is gradually refining. Software companies are trying to deliver bug-free, efficient product in a less time. Now a days, the competition between the IT companies are increased and the companies need improvements that can decrease the lead-time and improve the delivery precision. It is not enough, if companies develop the products on time but also need to be considering the quality of the product. Efficient and effective testing methods find bugs in early stages rather than finding in later stages or in production time. Early catching of bugs will reduce the rework time and also cheaper to find and remove. Rework commonly accounts more than half of the development time. The main reason for high rework cost is because of fault slippage from earlier phases. As an input to this improvement, this article explains the intensity of fault-slippage, which determines the faults that could have been more cost efficient to find in earlier phases of software development and life-cycle.

See publication

Tags: Change Management, Digital Transformation

1 Keynote
Need for Threat Intelligence & How to Operationalize it for your Organisation
UNICOM - The Cyber Security Summit 2020
March 06, 2020
Cyber Security Practitioners face many trials and tribulations as they protect and defend their organizations. To seek the best possible protection, they should have well understanding of the threats, which may cause the greatest risk and how to address them proactively. This will enable a quicker and more cohesive response to incidents.

See publication

Tags: Cybersecurity, Digital Transformation, Leadership

3 Speaker Awards
The-Cyber-Security-Summit-Bangalore-2020
Unicom
March 06, 2020
Cyber Security Practitioners face many trials and tribulations as they protect and defend their organizations. To seek the best possible protection, they should have well understanding of the threats, which may cause the greatest risk and how to address them proactively. This will enable a quicker and more cohesive response to incidents. Mr. Vamsi Mohan Vandrangi is going to speak more on "Need for Threat Intelligence & How to Operationalize it for your Organisation". At the event, he will talk on the challenges, how to put threat intelligence to work via automated processes.

See publication

Tags: Cybersecurity, Data Center, Digital Transformation

Selenium Day conference 2020
1.21GWS
January 31, 2020
The IT frameworks are getting changed drastically. Software Industry has already in transition from Monolithic frameworks to Microservices frameworks. In this Microservices transformation, Is the traditional way of testing is still valid? How do we test the Microservices? Mr. Vamsi Mohan is going to speak more on "Testing for Microservices". At the event, he will discuss on several examples of Microservices testing strategies, best practices and the open source tools for Microservices testing.

See publication

Tags: Digital Transformation, Emerging Technology, Innovation

Digital Transformation Summit for Managers
1point21gws
August 29, 2019
The financial technology (Fintech) is at a tipping point—either disrupt or get disrupted. As startups and technology firms entice new and challenging customers, those that demand customized and targeted experiences, how will the industry as a whole compete and imbibe intelligence to the existing processes? It is time for migrating from the RPA (Robotic Process Automation) to IPA (Intelligent Process Automation)
Robotic Process automation offers considerable potential for addressing the key pain points in the traditional Fintech system of repetitive tasks. However, there is a limitation to the usability and impact of robots. IPA can address the limitations of current RPA through leveraging Machine Learning, Natural Language Processing and other AI capabilities. IPA choreographs connections among the systems and people, automates structured tasks, and generates intelligence from process execution.
IPA is an emerging set of new technologies that combines fundamental process redesign with robotic process automation, artificial intelligence and machine learning. Intelligent Process Automation is the next wave of Fintech efficiency and the future of automation to a point towards the confluence of enterprise systems and intelligent automation.

See publication

Tags: Digital Transformation, Emerging Technology, Leadership

2 Speaking Engagements
Testing Microservices
1.21 GWS (Selenium Day)
January 30, 2020
The IT frameworks are getting changed drastically. Software Industry has already in transition from Monolithic frameworks to Microservices frameworks. In this Microservices transformation, Is the traditional way of testing is still valid? How do we test the Microservices? Mr. Vamsi Mohan spoke on "Testing for Microservices". At the event, he discussed on several examples of Microservices testing strategies, best practices and the open source tools for Microservices testing.

See publication

Tags: Digital Transformation, Emerging Technology

Testing for Microservices
1.21 Gigawatts
January 30, 2020
The IT frameworks are getting changed drastically. Software Industry has already in transition from Monolithic frameworks to Microservices frameworks. In this Microservices transformation, Is the traditional way of testing is still valid? How do we test the Microservices? Mr. Vamsi Mohan is going to speak more on "Testing for Microservices". At the event, he will discuss on several examples of Microservices testing strategies, best practices and the open source tools for Microservices testing.

See publication

Tags: Business Strategy, Customer Experience, Digital Transformation

1 Whitepaper
Digital Customer Experience
Tech Mahindra Ltd
August 09, 2019
A corporate white paper on the Digital Customer Experience.

See publication

Tags: Customer Experience, Digital Transformation, Leadership

Blog

Opportunities

Contact Dr. Vamsi Mohan Vandrangi

Media Kit

Share Profile

Contact Info

  Profile

Dr. Vamsi Mohan Vandrangi


Latest Tweets