Rajesh Ranjan has over 8 years of experience as a senior application engineer working with PLM tools like Windchill. He has extensive experience implementing, customizing, and upgrading various versions of Windchill for over 40 clients. Currently he works for Tristar, a PLM consulting company, where he provides services including Windchill implementations, upgrades, customizations, and technical support.
Part 10: 5G Use cases - 5G for Absolute Beginners3G4G
An introductory training on 5G for newbies available on Udemy - http://bit.ly/udemy5G
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Computing and AI technologies for mobile and consumer applications 2021 - SampleYole Developpement
Penetrating everyday products will see the market for AI technologies for the consumer market reach $5.6B in 2026.
More information : https://www.i-micronews.com/products/computing-and-ai-technologies-for-mobile-and-consumer-applications-2021/
The Internet of Things is bringing a massive surge of smart, connected devices that will enable new services and efficiencies across industries. This requires wireless technologies to scale up or down depending on the application performance needs—to connect virtually anything. And now, LTE is evolving for low-throughput, delay-tolerant IoT use cases. The new narrowband LTE technologies (eMTC & NB-IoT) will deliver lower complexity, longer battery life, and deeper coverage for wide-area IoT applications.
Part 10: 5G Use cases - 5G for Absolute Beginners3G4G
An introductory training on 5G for newbies available on Udemy - http://bit.ly/udemy5G
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Computing and AI technologies for mobile and consumer applications 2021 - SampleYole Developpement
Penetrating everyday products will see the market for AI technologies for the consumer market reach $5.6B in 2026.
More information : https://www.i-micronews.com/products/computing-and-ai-technologies-for-mobile-and-consumer-applications-2021/
The Internet of Things is bringing a massive surge of smart, connected devices that will enable new services and efficiencies across industries. This requires wireless technologies to scale up or down depending on the application performance needs—to connect virtually anything. And now, LTE is evolving for low-throughput, delay-tolerant IoT use cases. The new narrowband LTE technologies (eMTC & NB-IoT) will deliver lower complexity, longer battery life, and deeper coverage for wide-area IoT applications.
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...Radisys Corporation
ETSI Workshop – RCS VoLTE and Beyond
Kranj, Slovenia
October 11, 2012
Adnan Saleem discusses the advantages of moving to VoLTE/RCS for mixed mobile operators – and addresses the key challenges along the way.
VoLTE Service Monitoring - VoLTE Voice CallJose Gonzalez
There is currently no accepted standard for the measurement or monitoring of VoLTE Services, even though we believe that this is vital to assure the quality and reliability of such services - and to establish a framework for reliable comparison across implementations.
To this end Ascom has defined a formal definition and implementation strategy to help the Operations team solve a range of challenges, including issues related to EPC, IMS and the Application Server. We will describe this solution in a number of short articles.
This article describes the architecture of our solution and the VoLTE Voice Call test case.
Ana Robnik, Research and Strategic Development Consultant, Iskratel, representing sAFE project, ETSI and Sintesio Foundation - Activities and Vision in support to the NG eCall transition
Saruhan Karademir, Microsoft
David Weston, Microsoft
Windows Defender Application Guard (WDAG) brings the next generation isolation into the browser space. It merges the best of Hyper-V virtualization and Microsoft Edge sandboxing technologies to bring hardware-enforced isolation of untrusted websites from the user’s data and operating system. In this talk, we will walk through the WDAG security promise and architecture. We will explain how it was built from the ground up with security as the number one priority showcasing the architectural decisions that added layers of defense. Finally, we explore how Microsoft’s internal security teams engaged from the very beginning of this feature’s development, helping shape WDAG’s design, finding and fixing critical vulnerabilities, and building additional defense-in-depth layers before the product reached a single customer.
A big challenge for mobile network operators in the new, ever-evolving 5G era is the signaling security of the standardized protocols used in order to exchange data. Telecommunication companies face this challenge and have to be on the verge every time there is a potential hacker attack. What is the best way to approach these striking threats and even to be ready before it occurs?
In our webinar, Positive Technologies will offer you several breakthrough strategies on how to deal with security flaws in telecom.
Our expert will show you the evolution of protocol security, share insights into the potential activities of a hacker and give useful advice about compliance with security standards.
3GPP Release 17: Completing the first phase of 5G evolutionQualcomm Research
This presentation summarizes 5G NR Release 17 projects that was completed in March 2022. It further enhances 5G foundation and expands into new devices, use cases, verticals.
Data Centre Hubs: Where to Next by Lim Kok Chen, CienaMyNOG
Exabytes of content and cloud data being created everyday. A handful of major content and cloud service providers like Google, Meta (Facebook), Amazon, and Microsoft have by far become the dominant users of global communication network. Post pandemic, networks has become essential tools to support the work and life of hundreds of millions of users. The content and cloud traffic demands are having profound impacts on our network today and shaping the future of connectivity. In this session, we will discuss the market trend of data center hub.
Em 2020 o mundo experimentou uma situação inédita para a maioria dos seres humanos: uma pandemia global, provocada por um vírus desconhecido, que gerou mudanças significativas na vida de todos. No universo das empresas, foi observado um movimento de intensa digitalização de processos e adequação ao distanciamento social. Muitas delas, inclusive as indústrias, adotaram o trabalho remoto para seus colaboradores. Conforme as empresas adaptaram as suas operações, os criminosos também estabeleceram mudanças. São facilmente encontradas notícias relativas a golpes por email, WhatsApp e telefone. E com “chave de ouro”, 2021 foi aberto com o mega (ou seriaTera?) vazamento de dados de brasileiros, o que fornece mais combustível para esses golpes. O ICS-SOC (Centro de Operações de Segurança Cibernética Industrial, localizado no Rio de Janeiro) da TI Safe protege seus clientes contra ataques cibernéticos que possam afetar suas operações, fundamentais para a população e a cadeia de suprimentos do Brasil.Os dados de (milhões de) ataques de 2020, relativos a projetos desenvolvidos pela empresa, foram analisados para entender o aumento dos ataques em relação a 2019. Por uma questão de privacidade dos dados dos clientes, as informações serão apresentadas em percentuais.
Description and comparison of 3G, 4G and 5G Core Networks. You can find my detailed report in https://medium.com/@sarpkoksal/core-network-evolution-3g-vs-4g-vs-5g-7738267503c7
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
After our successful launch of '5G for Absolute Beginners' course (http://bit.ly/5Gbegins) in 2020, we decided to create an introductory training course on 6G Mobile Wireless Communications technology. The course is ready and the best way to navigate it is via the Free 6G Training page at: https://bit.ly/6Gintro - this will ensure that you have the latest version of each video and also the most recent version of the 6G technologies videos as and they are added.
In this part, we will try and look at the answer as to when is 6G coming. The rough answer is 2030 but there is a good consensus within the research community and the industry that 6G will happen somewhere between 2028 and 2032. This will depend on a lot of different factors, for example how quickly is everyone adopting the new technologies, what are the killer applications and use cases and what devices and gadgets are available.
This course is part of #Free6Gtraining initiative (https://www.free6gtraining.com/)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
6G and Beyond-5G Page: https://www.3g4g.co.uk/6G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Free 6G Training Blog: https://www.free6gtraining.com/
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...Radisys Corporation
ETSI Workshop – RCS VoLTE and Beyond
Kranj, Slovenia
October 11, 2012
Adnan Saleem discusses the advantages of moving to VoLTE/RCS for mixed mobile operators – and addresses the key challenges along the way.
VoLTE Service Monitoring - VoLTE Voice CallJose Gonzalez
There is currently no accepted standard for the measurement or monitoring of VoLTE Services, even though we believe that this is vital to assure the quality and reliability of such services - and to establish a framework for reliable comparison across implementations.
To this end Ascom has defined a formal definition and implementation strategy to help the Operations team solve a range of challenges, including issues related to EPC, IMS and the Application Server. We will describe this solution in a number of short articles.
This article describes the architecture of our solution and the VoLTE Voice Call test case.
Ana Robnik, Research and Strategic Development Consultant, Iskratel, representing sAFE project, ETSI and Sintesio Foundation - Activities and Vision in support to the NG eCall transition
Saruhan Karademir, Microsoft
David Weston, Microsoft
Windows Defender Application Guard (WDAG) brings the next generation isolation into the browser space. It merges the best of Hyper-V virtualization and Microsoft Edge sandboxing technologies to bring hardware-enforced isolation of untrusted websites from the user’s data and operating system. In this talk, we will walk through the WDAG security promise and architecture. We will explain how it was built from the ground up with security as the number one priority showcasing the architectural decisions that added layers of defense. Finally, we explore how Microsoft’s internal security teams engaged from the very beginning of this feature’s development, helping shape WDAG’s design, finding and fixing critical vulnerabilities, and building additional defense-in-depth layers before the product reached a single customer.
A big challenge for mobile network operators in the new, ever-evolving 5G era is the signaling security of the standardized protocols used in order to exchange data. Telecommunication companies face this challenge and have to be on the verge every time there is a potential hacker attack. What is the best way to approach these striking threats and even to be ready before it occurs?
In our webinar, Positive Technologies will offer you several breakthrough strategies on how to deal with security flaws in telecom.
Our expert will show you the evolution of protocol security, share insights into the potential activities of a hacker and give useful advice about compliance with security standards.
3GPP Release 17: Completing the first phase of 5G evolutionQualcomm Research
This presentation summarizes 5G NR Release 17 projects that was completed in March 2022. It further enhances 5G foundation and expands into new devices, use cases, verticals.
Data Centre Hubs: Where to Next by Lim Kok Chen, CienaMyNOG
Exabytes of content and cloud data being created everyday. A handful of major content and cloud service providers like Google, Meta (Facebook), Amazon, and Microsoft have by far become the dominant users of global communication network. Post pandemic, networks has become essential tools to support the work and life of hundreds of millions of users. The content and cloud traffic demands are having profound impacts on our network today and shaping the future of connectivity. In this session, we will discuss the market trend of data center hub.
Em 2020 o mundo experimentou uma situação inédita para a maioria dos seres humanos: uma pandemia global, provocada por um vírus desconhecido, que gerou mudanças significativas na vida de todos. No universo das empresas, foi observado um movimento de intensa digitalização de processos e adequação ao distanciamento social. Muitas delas, inclusive as indústrias, adotaram o trabalho remoto para seus colaboradores. Conforme as empresas adaptaram as suas operações, os criminosos também estabeleceram mudanças. São facilmente encontradas notícias relativas a golpes por email, WhatsApp e telefone. E com “chave de ouro”, 2021 foi aberto com o mega (ou seriaTera?) vazamento de dados de brasileiros, o que fornece mais combustível para esses golpes. O ICS-SOC (Centro de Operações de Segurança Cibernética Industrial, localizado no Rio de Janeiro) da TI Safe protege seus clientes contra ataques cibernéticos que possam afetar suas operações, fundamentais para a população e a cadeia de suprimentos do Brasil.Os dados de (milhões de) ataques de 2020, relativos a projetos desenvolvidos pela empresa, foram analisados para entender o aumento dos ataques em relação a 2019. Por uma questão de privacidade dos dados dos clientes, as informações serão apresentadas em percentuais.
Description and comparison of 3G, 4G and 5G Core Networks. You can find my detailed report in https://medium.com/@sarpkoksal/core-network-evolution-3g-vs-4g-vs-5g-7738267503c7
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
After our successful launch of '5G for Absolute Beginners' course (http://bit.ly/5Gbegins) in 2020, we decided to create an introductory training course on 6G Mobile Wireless Communications technology. The course is ready and the best way to navigate it is via the Free 6G Training page at: https://bit.ly/6Gintro - this will ensure that you have the latest version of each video and also the most recent version of the 6G technologies videos as and they are added.
In this part, we will try and look at the answer as to when is 6G coming. The rough answer is 2030 but there is a good consensus within the research community and the industry that 6G will happen somewhere between 2028 and 2032. This will depend on a lot of different factors, for example how quickly is everyone adopting the new technologies, what are the killer applications and use cases and what devices and gadgets are available.
This course is part of #Free6Gtraining initiative (https://www.free6gtraining.com/)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
6G and Beyond-5G Page: https://www.3g4g.co.uk/6G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Free 6G Training Blog: https://www.free6gtraining.com/
1. RAJESH RANJAN
16410 SW Estuary Dr., Beaverton OR 97006 | Cell: +1-503-869-5330; Email: rranja01@gmail.com
Career Summary
Senior Application Engineer over 8 years of IT experience in development, requirement gathering, design
documentation and supporting of existing system.
- Strong knowledge of Implementation, Development, Upgrade, Administration, Functionality (Windchill
8.0/9.0/10.0/10.1/10.2/11.0).
- Sun Certified Java Developer
- Experience of working in Agile Development
- Proficient in understanding Client requirements, mapping them into the System, quickly develop the poc (proof
of concept),Presenting complex demonstrations ofPLM product solutions,Consulting the efficient and alternate
business solutions to clients.
- Sound understanding of object oriented programming and design
- Excellent technical, communication and interpersonal skills under minimal supervision.
- Worked in onsite offshore model. Managed offshore team and delivered good quality work.
Employment Summary
Tristar (March 2015 – Present)
TriStar is a company that specializes in Product Lifecycle Management (PLM). Tristar provide business advisory, process
consulting, systems selection and implementation, as well as user adoption and training services.
Infosys Ltd. (Sept 2008 – March 2015)
(Sept 2008 – January 2013 – India)
(May 2013 – March 2015 – USA on H-1B)
Infosys Limited is a global leader in consulting, technology and outsourcing providing business consulting, technology,
engineering and outsourcing services
Technical Summary
Languages: Java, JSP, Servlet, HTML, UML
Databases: Oracle, SQL Server
Tools: Product Life Cycle Management tools (Windchill8.0, 9.1, 10.1, 10.2,11.0, FlexPLM7.1), Eclipse, Rational
ClearCase, Rational Rose, Cognos
Framework: Spring, Struts Framework
System: Win XP, UNIX, Mac
Applications: MS Word, Excel, PowerPoint, Visio
Certification Details
SCJP : Sun certified Java Programmer
SCWCD : Sun certified web component developer
OCA : Oracle Certified Associate
Work Experience at Tristar (March 2015 – Present)
Senior Application Engineer
At Tristar I have worked for more than 40+ clients in just 1.5 years. Below are couple of project details listed.
2. Worked on Implementation of Workflows, Lifecycle and Change Management.
Worked on Implementation project for Medical Device company.
Worked on Windchill Reporting and Windchill Business Reporting (Cognos).
Worked on PartsLink and CounterPart. Customization of PartsLink to get the value from Windchill Attribute.
Installation of Windchill and its related component.
Customization and Configuration of Out of the box functionality to meet the customer requirement.
Knowledge of Windchill APIs.
UI customization involves adding of new action.
Writing custom data utilities.
Performed Rehosting of Windchill.
Configured Windchill with AD Integration.
Running WinDU and WinRU task on different versions of Windchill (8.0, 9.1, 10.1, and 10.2).
Worked on various Windchill upgrade from (8.0 to 10.2, 9.1 to 10.2, 10.0 to 10.2)
Worked on SAGE Export.
Certified PTC Trainer
Oracle to SQL Migration
Creo Installation and Configuration.
Creo Distributed Batch to export the CAD Data.
Windchill Change & Product Structure Management certified professional.
Stream-Flo Inc. 03/2015 – 09/2015
Description: Windchill Update, customization, rehosting.
Roles and Responsibilities:
Windchill update from 10.1 M10 to 10.1 M30.
Rehosting of Windchill from Production to Development.
Schedule backup and maintenance activity.
Workflow and Life cycle management configuration.
Generating custom ECN Report.
SAGE Export Windchill parts.
Update of Windchill object based on different action performed.
Custom Auto-Numbering rule created to reuse from existing sequence for any number that were never
used.
Created custom user picker on CN.
Usage of CounterPart to add attribute.
Report creation using Query Builder and Cognos.
Customer support.
AC Dispensing 05/2016 – 07/2015
Description: Windchill Upgrade 9.1 to 10.2 and Implementation
Roles and Responsibilities:
Running WinDU and WinRU task.
LDAP Export and Import
Database export and import.
Create custom Lifecycle state and Roles.
Create version series.
Run upgrade Manager.
Created backup script.
Installation of FlexLM License server.
Creo Installation.
Worker Agent configuration.
Development server setup.
Workflow customization.
Change Management customization to populate the custom attribute value from CR to CN.
Custom report using Query Builder.
Production support after upgrade.
3. MEDInstill 03/2016 – 05/2016
Description: Windchill Implementation
Roles and Responsibilities:
Statement of work preparation.
Requirement gathering and business mapping.
Implementation which involves creating new OIR, Sub Types, Applying ACL rule etc.
Rehosting of Windchill from Production to Development.
Lifecycle creation and configuration.
Created custom document Loader using Macro to load patent document.
Production Support after go-live.
Hilliard Corp. 01/2016 – 02/2016
Description: Windchill Upgrade 10.1 to 10.2
Roles and Responsibilities:
Running WinDU and WinRU task.
LDAP Export and Import
Database export and import.
Create custom Lifecycle state and Roles.
Create version series.
Run upgrade Manager
Created backup script.
Worker Agent configuration.
System Administration Training 10.2
Production support after upgrade.
Work Experience at Infosys Ltd. (September 2008 – March 2015)
Technology Analyst
Windchill8.0 to 10.2 Upgrade 12/2013 – 03/2015
Description:
FWPDM System comprises various footwear applications which are developed on top of Windchill8.0. Application like
Material and Supplier is windchill customized application. Upgraded the existing system to Working with windchill10.2 with
PartsLink.
Roles and Responsibilities:
Actively involved in each step of Upgrade.
Code conversion from Rose modeled classes to annotation based classes.
Running WinDU and WinRU task on different versions of Windchill (8.0, 10.1, and 10.2).
Exporting LDAP and converting it for target system.
Installation and configuration of Windchill10.2 environments.
Setting up cluster environment.
Vault setup for different environment.
Configurations of classification structure to work with 10.2 system.
Customization and running loaders to load the test users.
Eclipse Project setup with Windchill10.2.
4. Product Image Library 04/2013 – 12/2013
Description:
Product Image Library is the repository of Images across all the Nike Application. Any Image which is used in Nike will
be stored to Product Image Library. All application will consume the images from this system.
Roles and Responsibilities:
Engage with prospective/existing clients to understand and scope research requirements and propose most
appropriate solution, technology and methodology.
Design the requirement of Footwear and Apparel Application to integrate with Library.
Development of the Footwear and Apparel system to integrate with Library.
Conduct meetings and brainstorming sessions with Architect and Business System Analyst to discuss the
design details.
Discuss the design document with development team to implement the requirement.
Work with Offshore team to get the deliverables from Offshore.
Involved in detail design discussion and creation with Architect to implement the requirement.
Footwear and Apparel Product Data management consultation and maintenance
05/2009-03/2013
Description:
FWPDM comprises of various footwear applications, which helps business users in end-to-end product creation. FLM
(Footwear Line Management) application is used by marketing team at NIKE, Inc. to capture the market requirements
for shoes. It is the first application in Footwear build process wherein marketing requirements like price of the shoe,
color and width of the shoe, season offerings and geography offerings are created and maintained. CD&M (Color
Design and Merchandising) application is used by color designers and PLMs to attach images to color ways for product
and approve it. VS (Virtual Sample) application is used to design rich images which are again feed into CD&M.BML
stands for Brand Media Library which acts as repository for apparel, equipment and footwear photo -shoot images and
later on feed to downstream systems such as .net and LA promo. PCM (Product Creation Management) suites of
applications are sued by business users and factories to create and attach BOM to products.
Once attached samples and end product is manufacture with the help of data present in this application.
Material and Supplier Application contains the list of all the materials available for given season and all the suppliers
and its details.
Apparel PDM application is developed on FlexPLM7.1, which helps business users in end-to-end product creation and
maintenance.
Roles and Responsibilities:
FWPDM:
Worked with BSA to understand the requirement and implement the requirement.
Unit testing of the development carried out.
Estimate the time required to do the development work.
Monitors project progress by tracking activity; resolving problems; publishing progress reports;
recommending actions.
Recommends controls by identifying problems; writing improved procedures.
Determines operationalobjectivesby studying business functions;gathering information;evaluating output
requirements and formats.
Automated the process to reduce the number of issues reported by the users.
Prepares technical reports by collecting, analyzing, and summarizing information and trends.
Provided Knowledge Transfer session to new person joined the project.
Prepared Knowledge Transfer document to capture the Information.
APPDM:
Worked with BSA to understand the requirement and implement the requirement.
Unit testing of the development carried out.
Worked on Server Side plugin, Client side plugin and JSP override to implement the business requirement.
Worked on FlexPLM configuration to implement the business requirement.
Worked with business user to clear the issues.
Worked on defect fixing and enhancement.
5. Windchill8.0 to 9.1 Upgrade 03/2010 – 08/2010
Description:
FWPDM System comprises various footwear applications which are developed on top of Windchill8.0. Application like
Material and Supplier is Windchill customized application. Upgraded the existing system to Working with windchill9.1.
Roles and Responsibilities:
Automated the process to reduce the number of issues reported by the users.
Understanding client process and system.
Installation and configuration of Windchill9.1.
Unit testing of the completed task.
Code Migration and understanding of changed API.
Rose model generation
Documentation of the process and information
AWARDS & RECOGNITIONS
Awarded “Most Valuable Player” by Nike for contribution to Production Support Project.
Awarded “Spot Award” at Infosys Ltd. For contribution to Windchill9.1 Upgrade project.
Awarded “Sprint Player Award” at Nike for contribution to FWPDM-APPDM Integration Project.
EDUCATION
Shivaji University, Kolhapur, Maharashtra India.
Bachelor inAutomobile (2004-2008)