Manish Devgan

Manish Devgan

Washington DC-Baltimore Area
4K followers 500+ connections

About

Product leader with a proven track record of defining product strategy, delivering…

Activity

Join now to see all activity

Experience

  • Various Startups Graphic
  • -

  • -

  • -

    Reston, VA

  • -

    Reston, VA | San Francisco, CA

  • -

    San Francisco, CA | Reston, VA

  • -

    San Francisco Bay Area, CA | Reston, VA

  • -

    San Francisco Bay Area, CA | Reston, VA

  • -

    Boulder, CO

Education

  • Stanford University Graduate School of Business Graphic

    Stanford University Graduate School of Business

    -

    Innovative Product Leadership: The Emerging Chief Product Officer program combines classroom lectures taught by world-renowned Stanford GSB faculty, Silicon Valley guest speakers, and a hands-on, real-world business challenge. Drawing on the Silicon Valley spirit of creative thinking and problem finding, this unique program includes a real-world product challenge.

  • -

    The program includes interacting directly with HBS faculty who bring their latest research into the classroom. Through case studies, lectures, business simulations, and small-group discussions, participants gain the strategies, tools, and insights to drive profitable growth.

  • -

    High Potential Program (HPP) sponsored by Software AG's Management Board for future leaders

Licenses & Certifications

  • Product Management Certification - 2008, 2011

    Pragmatic Marketing Certified (PMC)

Publications

  • BEA WebLogic Platform 7

    Sams Publishing

    BEA® WebLogic Platform 7 is a fast-paced introduction to the new WebLogic Platform. The focus of this book is to provide you with an in-depth knowledge of the WebLogic Platform 7.0 product and how you can leverage its capabilities and new features to create, configure, manage, and monitor an optimal operational environment for your J2EE applications. Hence, the primary technical topics discussed in this book fall under the realm of WebLogic Server Administration. This book covers in J2EE…

    BEA® WebLogic Platform 7 is a fast-paced introduction to the new WebLogic Platform. The focus of this book is to provide you with an in-depth knowledge of the WebLogic Platform 7.0 product and how you can leverage its capabilities and new features to create, configure, manage, and monitor an optimal operational environment for your J2EE applications. Hence, the primary technical topics discussed in this book fall under the realm of WebLogic Server Administration. This book covers in J2EE concepts and how to develop J2EE applications targeted for the WebLogic Platform.

    Other authors
    See publication
  • Co-author - BEA WebLogic Platform 7.0

    SAMS Publishing (ISBN: 0789727129)

    BEA® WebLogic Platform 7 is a fast-paced introduction to the new WebLogic Platform. The focus of this book is to provide you with an in-depth knowledge of the WebLogic Platform 7.0 product and how you can leverage its capabilities and new features to create, configure, manage, and monitor an optimal operational environment for your J2EE applications. Hence, the primary technical topics discussed in this book fall under the realm of WebLogic Server Administration. This book covers in J2EE…

    BEA® WebLogic Platform 7 is a fast-paced introduction to the new WebLogic Platform. The focus of this book is to provide you with an in-depth knowledge of the WebLogic Platform 7.0 product and how you can leverage its capabilities and new features to create, configure, manage, and monitor an optimal operational environment for your J2EE applications. Hence, the primary technical topics discussed in this book fall under the realm of WebLogic Server Administration. This book covers in J2EE concepts and how to develop J2EE applications targeted for the WebLogic Platform.

    Other authors
    See publication
  • Contributor - Reshaping Your Business with Web 2.0

    McGraw Hill (ISBN: 9780071600781)

    ** Authored - Chapter 8: Security and Compliance: Maintaining Control While Providing Flexibility **
    Book Description:
    Integrate Web 2.0 trends and technologies into the enterprise Written by a team of experts from the Web 2.0 community and Oracle Corporation, this innovative guide provides a blueprint for leveraging the new culture of participation in an enterprise environment. Reshaping Your Business with Web 2.0 offers proven strategies for the successful adoption of an enterprise 2.0…

    ** Authored - Chapter 8: Security and Compliance: Maintaining Control While Providing Flexibility **
    Book Description:
    Integrate Web 2.0 trends and technologies into the enterprise Written by a team of experts from the Web 2.0 community and Oracle Corporation, this innovative guide provides a blueprint for leveraging the new culture of participation in an enterprise environment. Reshaping Your Business with Web 2.0 offers proven strategies for the successful adoption of an enterprise 2.0 paradigm and covers the technical solutions that best apply in specific situations. You will find clear guidelines for using Web 2.0 technologies and standards in a productive way to align with business goals, increase efficiency, and provide measurable bottom line growth.

    Other authors
    See publication

Patents

  • Systems and/or methods for leveraging in-memory storage in connection with the shuffle phase of MapReduce

    Issued US 10,990,288

    Certain example embodiments relate to a computer system for performing a map reduce sequence. Nodes therein include at least one processor and memory and are divided into at least mapper and reducer nodes. Each mapper node executes a map function on input to generate intermediate output elements. Each said intermediate output element includes a first key-value pair. Each element key includes associated map and reduce task identifiers. Each element value includes substantive data, organized as…

    Certain example embodiments relate to a computer system for performing a map reduce sequence. Nodes therein include at least one processor and memory and are divided into at least mapper and reducer nodes. Each mapper node executes a map function on input to generate intermediate output elements. Each said intermediate output element includes a first key-value pair. Each element key includes associated map and reduce task identifiers. Each element value includes substantive data, organized as another key-value pair. The intermediate output elements are stored to memory. Each reducer node: retrieves at least intermediate output element values from the memory of a given mapper node, using specified map and reduce task identifiers; stores the retrieved element values to its memory; executes a reduce function on the retrieved element values, in order; and outputs a result from the reduce function for the map reduce sequence. Disk operations advantageously are reduced or eliminated.

    Other inventors
    See patent
  • Intelligent messaging grid for big data ingestion and/or associated methods

    Issued US 9,680,919

    Certain example embodiments relate to an intelligent messaging grid for Big Data ingestion and/or associated methods. Each node in a network of nodes is dynamically configurable to send and/or receive messages using one of brokered and brokerless communication models. At least some of the nodes have a complex event processing (CEP) engine deployed thereto, the CEP engines being configured to operate on messages received by the respective nodes and being classified as one of at least two…

    Certain example embodiments relate to an intelligent messaging grid for Big Data ingestion and/or associated methods. Each node in a network of nodes is dynamically configurable to send and/or receive messages using one of brokered and brokerless communication models. At least some of the nodes have a complex event processing (CEP) engine deployed thereto, the CEP engines being configured to operate on messages received by the respective nodes and being classified as one of at least two different types of CEP engines. For each message received by a given node that is to be forwarded to a further node along one of multiple possible paths, the given node is configured to route the message to be forwarded to an intermediate node in one of the possible paths. The intermediate node is selected by the CEP engine of the given node based on metadata associated with the message to be forwarded.

    Other inventors
    See patent
  • System and/or methods for policy-based access to data in memory tiers

    Issued US 9,465,752

    A system for providing controlled access to data stored in a plurality of memory tiers, including a volatile local in-process (L1) cache memory of an application executing on a first computing device and at least one managed in-memory (L2) cache on a second computing device, distributed over a plurality of computing devices, the system comprising: one or more communication interfaces; a processing system including at least one processor, the processing system being configured to control the…

    A system for providing controlled access to data stored in a plurality of memory tiers, including a volatile local in-process (L1) cache memory of an application executing on a first computing device and at least one managed in-memory (L2) cache on a second computing device, distributed over a plurality of computing devices, the system comprising: one or more communication interfaces; a processing system including at least one processor, the processing system being configured to control the system to access the L1 cache memory and to access the at least one L2 cache via the one or more communication interfaces, and to perform operations comprising: receiving an access request, via the one or more communication interfaces, requesting access for a user to a data element in the memory tiers, wherein the L2 cache has stored therein the data element and an access policy; detecting whether a copy of the data element is in the L1 cache memory; in response to a detection that a copy of the data element is not in the L1 cache memory, copying the data element and the access policy from the L2 cache to the L1 cache memory and providing the user with access to the copy of data element from the L1 cache memory if the access policy allows access to the user; and in response to a detection that a copy of the data element is in the L1 cache memory, determining, by referring to a copy of the access policy stored in the L1 cache memory, whether the user is allowed to access the data element, and, in response to a determination that the user is allowed to access the data element, providing the user with access to the copy of the data element from the L1 cache memory.

    See patent
  • Systems and methods for collaboration shared state management

    Issued US 9,020,885

    A system and method comprising, sharing information between a plurality of participants in a collaboration; and exposing a set of functions that enable a participant in the plurality of participants to share the information, the set of functions comprising: first functions to facilitate establishing a context in which to interact with the plurality of participants; and second functions to facilitate storing and retrieving values from a shared state, wherein the shared state is accessible within…

    A system and method comprising, sharing information between a plurality of participants in a collaboration; and exposing a set of functions that enable a participant in the plurality of participants to share the information, the set of functions comprising: first functions to facilitate establishing a context in which to interact with the plurality of participants; and second functions to facilitate storing and retrieving values from a shared state, wherein the shared state is accessible within the context.

    Other inventors
    See patent
  • Method for delegated administration

    Issued US 8,831,966

    A method for adaptively delegating a capability, comprising the steps of providing for the delegation of the capability to a first role; allowing the step of providing for the delegation to be initiated by a principal in a second role; and hierarchically relating the capability, the first role and the second role.

    Other inventors
    See patent
  • System and method for hierarchical role-based entitlements

    Issued US 7,992,189

    A system and method for authorization to adaptively control access to a resource, comprising the steps of providing for the mapping of a principal to at least one role, wherein the at least one role is hierarchically related to the resource; providing for the evaluation of a policy based on the at least one role; and providing for the determination of whether to grant the principal access to the resource based on the evaluation of the policy.

    Other inventors
    See patent
  • Systems and methods for personalizing a portal

    Issued US 7,810,036

    A system and method for configuring a portal, comprising providing a first user interface operable to define and/or manage the portal; providing a second user interface operable to define and/or manage personalization of the portal; and wherein the portal can include at least one of the following portal resources: a desktop, a book, a page, a portlet, a shell, a look and feel, and a layout.

    Other inventors
    See patent
  • Method for delegated administration

    Issued US 7,774,601

    A system and method for providing a containment model of role capabilities wherein a parent role can obtain the capabilities of its child role(s).

    Other inventors
    See patent
  • System and method for propagating security information in a web portal system

    Issued US 7,752,651

    In accordance with embodiments, there are provided mechanisms and methods for propagating security information for an application between a first environment and a second environment. These mechanisms and methods can enable embodiments to propagate changes to security information from a first application instance in a first environment to a second application instance in a second environment. For example, an embodiment can receive security information from an adapter associated with a test…

    In accordance with embodiments, there are provided mechanisms and methods for propagating security information for an application between a first environment and a second environment. These mechanisms and methods can enable embodiments to propagate changes to security information from a first application instance in a first environment to a second application instance in a second environment. For example, an embodiment can receive security information from an adapter associated with a test version of an application, and then propagate the security information to a production version of the application residing in a production environment. The ability of embodiments to propagate security information between adapters associated with application versions can enable propagation of changes to security information, i.e., information about changes to permissions, rules, policies and so forth relating to security, between a first environment and a second environment without necessitating taking the production version of the application off line.

    Other inventors
    See patent
  • Method for role and resource policy management optimization

    Issued US 7,653,930

    Methods are disclosed for authorization to adaptively control access to a resource in a resource hierarchy. At least one role for a principal is retrieved from the resource hierarchy or a first cache based on whether the at east one role was previously retrieved from the resource hierarchy. A policy is retrieved from the resource hierarchy or a second cache based on whether the policy was previously retrieved from the resource hierarchy. The policy is evaluated based on the at least one role…

    Methods are disclosed for authorization to adaptively control access to a resource in a resource hierarchy. At least one role for a principal is retrieved from the resource hierarchy or a first cache based on whether the at east one role was previously retrieved from the resource hierarchy. A policy is retrieved from the resource hierarchy or a second cache based on whether the policy was previously retrieved from the resource hierarchy. The policy is evaluated based on the at least one role and a determination on whether to grant the principal access to the resource is made based on the evaluation of the policy.

    Other inventors
    See patent
  • System and method for hierarchical role-based entitlements

    Issued US 7,591,000

    A system and method for authorization to adaptively control access to a resource, comprising the steps of providing for the mapping of a principal to at least one role, wherein the at least one role is hierarchically related to the resource; providing for the evaluation of a policy based on the at least one role; and providing for the determination of whether to grant the principal access to the resource based on the evaluation of the policy.

    Other inventors
    See patent
  • Enterprise application platform

    Issued US 7,496,687

    A business platform can provide access to applications and provide for the integration of resources with other applications, including internal and external applications, services and systems. A portal framework included within the platform can render portals including graphical user interfaces for displaying and receiving content that can be used by various applications. A portal framework can provide an interface to various resources such that information received and displayed by the portal…

    A business platform can provide access to applications and provide for the integration of resources with other applications, including internal and external applications, services and systems. A portal framework included within the platform can render portals including graphical user interfaces for displaying and receiving content that can be used by various applications. A portal framework can provide an interface to various resources such that information received and displayed by the portal framework can be exchanged with internal and external resources using standards-based transport protocols, messaging systems, and document types. An integration framework can be invoked to exchange this information among applications and services. An integration framework can provide access to resources by integrating the resources with an application server. The portal framework and integration framework can be implemented on an application server which can support enterprise applications. This description is not intended to be a complete description of, or limit the scope of, the invention. Other features, aspects, and objects of the invention can be obtained from a review of the specification, the figures, and the claims.

    Other inventors
    See patent
  • System and method for rule-based entitlements

    Issued US 7,451,477

    A system and method of authorization comprising associating at least one role with a resource, associating at least one capability with the at least one role, and determining whether to permit a resource operation based on the at least one capability.

    Other inventors
    See patent
  • Enterprise application platform

    Issued US 7,426,548

    A business platform can provide access to applications and provide for the integration of resources with other applications, including internal and external applications, services and systems. A portal framework included within the platform can render portals including graphical user interfaces for displaying and receiving content that can be used by various applications. A portal framework can provide an interface to various resources such that information received and displayed by the portal…

    A business platform can provide access to applications and provide for the integration of resources with other applications, including internal and external applications, services and systems. A portal framework included within the platform can render portals including graphical user interfaces for displaying and receiving content that can be used by various applications. A portal framework can provide an interface to various resources such that information received and displayed by the portal framework can be exchanged with internal and external resources using standards-based transport protocols, messaging systems, and document types. An integration framework can be invoked to exchange this information among applications and services. An integration framework can provide access to resources by integrating the resources with an application server. The portal framework and integration framework can be implemented on an application server which can support enterprise applications. This description is not intended to be a complete description of, or limit the scope of, the invention. Other features, aspects, and objects of the invention can be obtained from a review of the specification, the figures, and the claims.

    Other inventors
    See patent
  • Method for role and resource policy management

    Issued US 6,917,975

    A method for adaptively managing entitlements, comprising the steps of providing for the association of a role with a first resource; and providing for the association of a policy with a second resource, wherein the policy is based at least partially on the role; and providing for hierarchically relating the role and the policy; and wherein the role is hierarchically equal or superior to the policy.

    Other inventors
    See patent

Languages

  • English

    Full professional proficiency

  • Hindi

    Native or bilingual proficiency

Recommendations received

21 people have recommended Manish

Join now to view

More activity by Manish

View Manish’s full profile

  • See who you know in common
  • Get introduced
  • Contact Manish directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Manish Devgan

Add new skills with these courses