Can Airlines or Travel apps predict your next travel ? An Interesting Insight

techuva banner

YES ! Your Airline does knows where you will travel next upto 61% accuracy.

airline cards
airline cards

Yes people travel for a wide variety of purposes like for Work, Tour, Leisure, Hobby etc. Airline Industry’s competition has reached a point where they are spending crores of rupees on data mining, pattern matching, browser cookies sharing, loyalty programs etc.

eg : The Loyalty Program of the private airlines are “BIG Golden eggs” for analysis and understanding their precious customer’s choices, pattern and several insights.

Big Data Analytics to Airline Loyalty programs is a classic example of data can be analyzed and understood in different dimensions. In airlines industry, transactions are an indicator of the satisfied needs of members, and not necessarily an indicator of the latest needs.

Members may not necessarily make the same transactions again and again in airlines, unlike industries like Flipkart of Amazon. Hence, looking at interactions data and open data augmentation can help airlines to predict the needs of customers better. Airlines can leverage such data to understand what type of traveler a member is and predict what destinations would interest him/her. It doesn’t ends there – Data is shared across their trusted partners. Collaboration is the Key.

Everytime when a customer books a ticket to destination – more offers and value additions of that place is shared to the customer to make “upsell”. Airline analysts feels that “Customer in hand, is worth 3 new customers”.

Consumers can get concerned when they are repeatedly targeted by blanket advertisements. However, they are delighted when they are served offers that match their needs. In this case, an airline loyalty program that truly understands you can make your dream trip a reality.

Predictive analytical techniques can help brands to pick up 6 different categories like persona attributes, needs, sentiment, nice-to-have, relationships and life events of their members from various data sources.

This enables Performance Marketing to be executed in the right manner, leaving users delighted.

For example, the date of your marriage or bday could be detected from the digital footprints you leave behind online. Airlines can leverage these techniques using cookies, shared data from other vendors to send the right offers at the right time. What if the airline loyalty program sends Alicia an irresistible “flights and stay” offer to the Goa or Singapore just in time around the bonus.

 

So Performance Marketing , Analytics & Upsell – It’s the future.

stay tuned.. for more.

-Shan
Techuva Solutions Pvt LtdA Digital Transformation & Personalised IoT Company focussed on delivering customised IOT Solutions.

Hybrid Cloud – Why Enterprises are moving there ?

Public Cloud – For the last decade, the cloud computing has been the focus of IT decision makers and corporate IT Heads, but many security-conscious businesses have been hesitant to move data and workloads into the cloud.

Now, with the underlying technology behind cloud services available for deployment inside organisations, a new model of cloud computing is gaining a foothold in business: the hybrid cloud.

What is hybrid cloud?

What customers want to do is simply use multiple clouds – like One or more public clouds connected to something in a data center. That thing could be a private cloud, that thing could just be traditional data center infrastructure.

Hybrid cloud is the combination of one or more public cloud providers (such as Amazon Web Services or Google Cloud Platform) with a private cloud platform — one that’s designed for use by a single organisation — or private IT infrastructure. The public cloud and private infrastructure, which operate independently of each other, communicate over an encrypted connection, using technology that allows for the portability of data and applications.

So in other words .. Hybrid cloud is particularly valuable for dynamic or highly changeable workloads. For example, a transactional order entry system that experiences significant demand spikes around the holiday season is a good hybrid cloud candidate. The application could run in private cloud, but use cloud bursting to access additional computing resources from a public cloud when computing demands spike. To connect private and public cloud resources, this model requires a hybrid cloud environment.

Public cloud’s flexibility and scalability eliminates the need for a company to make massive capital expenditures to accommodate short-term spikes in demand. The public cloud provider supplies compute resources, and the company only pays for the resources it consumes.

So for end-consumer -hybrid is defined cloud as: “Two or more disparate cloud computing environments that are used in conjunction to serve a workload or an application in concert through a single management plane.”

There are tools to manage the same, such as Egenera PAN Cloud Director, RightScale Cloud Management, CliQr’s CloudCenter and Scalr Enterprise Cloud Management Platform help businesses handle workflow creation, service catalogs, billing and other tasks related to hybrid cloud.

The benefits of going hybrid

With the hybrid cloud model, IT decision makers have more control over both the private and public components than using a prepackaged public cloud platform.  “you get everything that you want.” This includes increased efficiency and the flexibility to meet disparate needs.

So analysts calls this as “It lets you pick the right cloud for the right workload,”

Building a hybrid cloud with private infrastructure that’s directly accessible — in other words, not being pushed through the public internet — greatly reduces access time and latency in comparison to public cloud services.

Where hybrid doesn’t work

Although hybrid cloud provides several advantages over the public-cloud-only, it still suffers from the same privacy and security issues that plague the popular perception of public cloud platform providers. Allowing information to be transported across a network that can be subject to third-party interference or tapping is, to many organizations, an unnecessary and unacceptable security risk.

Who uses hybrid cloud?

The industries that are moving to hybrid, such as media and finance.

Hybrid clouds are frequently deployed in the financial sector, particularly when proximity is important and physical space is at a premium — such as on or adjacent to a trading floor. Pushing trade orders through the private cloud infrastructure and running analytics on trades from the public cloud infrastructure greatly decreases the amount of physical space needed for the latency-sensitive task of making trade orders. This is crucial for data security, as well. Threshold-defined trading algorithms are the entire business of many investment firms. Trusting this data to a public cloud provider is, to most firms, an unnecessary risk that could expose the entire underpinnings of their business.

Infact, Law firms also utilize hybrid cloud infrastructures with private elements, often as encrypted offsite data stores, to safeguard against the potential for loss due to theft, hardware failure, or a natural disaster such as a cyclones or hurricanes destroying the original documentation or evidence.

 

So ultimately, our conclusion –

While the upfront cost of server hardware for the private end of the hybrid cloud is high, the control that IT departments can wield over hardware selection and system design for the private component offers an invaluable way of properly tailoring resources to the business’s needs. Assembling a private cloud to handle a standard workload, with burst compute offloaded to the public cloud, can be a long-term budget-friendly arrangement.

Hybrid cloud allows organizations to leverage public cloud services without offloading the entirety of their data to a third-party data center. This provides a great deal of flexibility in computing tasks, while keeping vital components within the company firewall.

Stay tuned for more..

– Techuva Design and Artistic team.

Making Web Content Go Viral – A Big Deal today

Viral marketing can be as powerful as the internet buzz suggests, but the relationship between effort and reward is not always proportional.

Viral Marketing

So what’s it  & what is the buzz about it ?
Viral marketing refers to a technique in marketing a product or a service where users help in spreading the advertiser’s message to other websites or the users create a scenario which can lead to multi-fold growth.

e.g:  A Viral Marketing of Job Portal in India has lead to 19.5X growth in next quarter.. which lead to an explosion in business growth.

A much more bigger example is the “ALS Ice Bucket Challenge” more than 650,000 people posted videos of their ALS challenge world wide.

So many viral ad campaigns have capitalised on the massive popularity of viral videos. So what happens is that People pass the links around to each other, and the video acquires a much larger audience than its makers expected it to garner. It needs to have a special quality that lends it to multiple viewings.

Advertisers have been smart to embrace viral videos. Attaching a brand name to a video is a great way for a company to expose itself to people who might not otherwise be interested in that brand. – this is what many companies like Cadbury, Coca-Cola, P&G & other media houses have done in the past.

So what poses as a challenge : The problem with trying to use a viral video to advertise a product is that you cannot always anticipate what will become a hit. A video goes viral because there is something new or exciting about it that resonates with people – so 8 / 10 times , its hard predict the outcome.

Currently, There is no market research that would be able to dictate exactly what people want to see in a video. The whole point is that people want to see something that they have not seen before.

The best viral marketing campaign examples – most part of it is due to luck. Many of these brands released multiple videos, most of which failed to become sensations.

So technically – Viral marketing is the rapid sharing of an idea, a portion of this idea contains a marketing message about buying a product or service.. which all the majors brands capitalise .

So here are 4 things, The market research says about making your content a viral.

  1. Think outside of traditional marketing                     –  Looking for a new approach.
  2. Take your marketing into the real world                  – Connecting it to reality.
  3. Reward your customers                                            – Increasing the Loyalty Base
  4. Team up with unlikely partners                                –  Taking the road less travelled

 

So one of the key aspect to marketing is “being real”, Do remember Consumers cannot be fooled. The biggest mistake a company can make is to fake authenticity. Don’t even try.

So in a nutshell –

Viral content usually has a well-designed viral strategy behind it, it is, in part, also due to luck, but creativity and preparation are also extremely important… So being Unique, Being True is the key…

For a complete new brand experience – talk to us for free .  or email us @ info@techuva.com

Stay tuned for more.
– Techuva Design and Artistic team.

Robots are coming for your job — here’s what to do about it

Robots are coming

The fear of job loss due to automation is no longer relegated to only physical-labor manufacturing jobs and relatively simple transaction-based, customer-service workers (i.e., bank tellers, grocery store clerks, and travel agents). Companies are increasingly adopting sophisticated “cognitive” technologies across a new swath of knowledge-worker jobs in fields such as finance, health care, and insurance.

“Most of the benefits we see from automation is about higher quality and fewer errors, but in many cases it does reduce labor,”  So “Is Any Job Truly Safe?”

Technology has not only done away with low-wage, low-skill jobs. They cited robots operating trucks in some Australian mines; corporate litigation software replacing employees with advanced degrees who used to sift through thousands of documents prior to trials; and on Wall Street, the automation of jobs previously done by bankers with MBAs or PhDs.

This means 6 of 10 jobs can be automated and replaced by machines in the coming decade in Construction, Factory Operations, Driverless Cabs, Operation Theatres and IT and Middleware developments.. including IT system operation and management (analytics, big data and RPAs).

So what do we do ? Machines are becoming smarter, cheaper and adaptive learning also…

FIVE STEPS TO REMAIN RELEVANT AND EMPLOYED

While the Industry is a sobering representation of an industry-wide, knowledge-worker, job-loss scenario, there is an upside potential concerning the adoption of such advancing technology. It’s the promise of augmentation. Augmentation can be driven through five key strategies knowledge workers should pursue to add value to machines and have machines add value to them:

  1. Stepping up
  2. Stepping aside
  3. Stepping in
  4. Stepping narrowly
  5. Stepping forward

Individuals who take on these strategies must be willing “to burn the midnight oil to improve their own skills, and either make friends with smart machines or find a way to do things they cannot do. Complacency is not an option. But despondency isn’t required either.”

People who step up make high-level decisions. They are senior executives who decide where cognitive technologies need to be utilised, and how new systems fit into the business organisation overall.

Goals for IT / Operation heads of Companies are – “They are deciding what smart people do, what smart machines do, and how they work together.”

 

One the major challenges today are :
One of the big causes for the stagnation of middle class wages is essentially because of clever computer programs.

also “It’s easy to villainize technology,” but fact is – “but there is a lot of opportunity there at the same time.”

Big Companies like Uber has already made press statements like : “Uber is investing heavily in building cars that do no need drivers”. by 2025 – 50% of the worldwide cars will not require drivers and fossil fuels. They will all be Driverless and Hydrogen / Polymer Lithium-ion Cells, which needs to be recharged only once a month.

A Defence Secretary once said  – “The next war could possibly destroy mankind, but it don’t need a Army.. but more buttons”

 

 

 

 

 

 

 

Stay tuned for more info on Automation in operations – Customised Electronics – Next Major Revolution”

 

– Techuva 

Social Media and Sentiment Analysis – MyPollbook

MyPollBook

 

MyPollBook

Every Businesses have tried a wide range of ideas to analyze and predict customer behavior & their next move. Technological evolutions, the rise of social media, in particular, has massively increased the number of ways in which a customer can contact a company or look for new business.

Every message on social platforms like Facebook, Blogs, Digital Platforms have a potential to reach millions of people and thus it can work both ways. A good post can boost company’s market reputation many folds, while a simple complaint can also drastically bring it down – which is every company’s biggest worry

Thus, social media has become a major concern for businesses. B2C in particular faces this issue on a wider scale due to increase in the number of consumers and proportionately, an increase in the amount of data. But we are not here to simply state problems you already know exist. We are here to provide solutions. And the solution here would be Social Media Sentiment Analysis for business.

Why Social Media Sentiment Analysis is Important to B2C and B2B Companies?

Social media has become the marketing powerhouse for B2C businesses. Its important for Creating relevant, engaging and timely content in itself is a challenge for a majority of businesses today and amidst all the challenges of managing social media, one negative review can blow away all the efforts taken in popularizing your brand.

To circumvent this possibility,  businesses all over the world have employed many social media experts to handle issues before they become a threat to their brand. Social media sentiment analysis for B2C and B2B businesses monitors and analyzes this large dataset and generates insights into the consumer mindset.

Your next potential customer is already on the Internet looking for options and worst thing 2 out of 5 times they are lost to the competition..

 

This is how it works ..

Sentiment Analysis

 

90% of B2C marketers use social media in their content marketing programs, making it the most popular platform to publish content.

Social Media Sentiment Analysis are done by following techniques today :

  1. Creative Ads
  2. Blogs
  3. Polls
  4. Video Ads
  5. Integrated Ads

MyPollBook from Techuva Solutions is an integrated social networking mobile application which is aimed at millennials, corporates to share, chat, do polls, participate in campaigns etc. Get a fast answer while out in a shop or allow votes to flood in to your poll over time so you can make a more measured decision.

MyPollBook pushes polls to its customers (User Polls and Admin Polls) to its 1000+ viewers and help collect feedbacks real time. This model helps B2C or B2B partners to understand the sentiments / value position of their customers real time.

It helps to do 2 things quickly

  1. Net Sentiment – whether perception of your brand is positive or negative
  2. Passion Intensity – the strength of positive or negative feelings on social media

Following are things MyPollBook allows us to do :

  1. Competitive intelligence
  2. Campaign effectiveness and proof of worth
  3. Guarding your brand’s reputation

Algorithms used :

  1. Rule Based
  2. Geography Based
  3. Random Walk
  4. Semantic
  5. Semi Suprvised
  6. Triangulation

If you need a self-hosting plan and you are a school / college / business house (for your employees) etc… Have a One to One call with Our Architects

Our Pricing Model includes from Free to a custom built model which suits your requirements. Refer Pricing

So #KeepPolling & Stamp your opinion with us.

MyPollBook

DBaaS : Why ? DB As A Service & Its Benefits.

Database as a service (DBaaS) is a cloud computing service model which provides customers with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. This is all taken care by the Vendor themselves.

All of the administrative tasks and maintenance are taken care of by the cloud provider directly. Sounds Very Easy rt ?. Of course, if the customer opts for more control over the database, this option is available and may vary depending on the provider.


The whole reason why you would use a cloud solution is easy scaling. The second point is crucial if you need to be able to do point-in-time restores of individual databases, or be able to easily move databases to separate servers.

 

Eg. When Techuva (An IOT , ERP Company based on India) had around 50+ IOT devices sending data every 2 minutes.. when they had to scale up to 200+ devices.. they didn’t had run around to buy new servers or  buy new hard-discs or enable large servers..  The Auto Scaling helped them to increase from 50 GB HDD to 200 GB HDD and increase from 4 GB ROM TO 16 GB ROM without any downtime.  Thanks to AWS RDS.

DB on Cloud and DBaaS enables automates installation, disk provisioning and management, patching, minor version upgrades, failed instance replacement, as well as backup and recovery of your SQL Server databases. Cloud Solutions also offers automated Multi-AZ (Availability Zone) synchronous replication, allowing you to set up a highly available and scalable environment fully managed by Vendors directly.

Well right now : All the DBA features aren’t available on the Cloud DB Solutions, such as :

  1. You need full control over the database instances, including access to the operating system and software stack.
  2. You want your own experienced database administrators managing the databases, including backups, replication and clustering.
  3. Your database size and performance needs exceed the current maximums, or other limits of the Vendor
  4. You need to use SQL Server features or options not currently supported

So, What are things that you need to worry, When you are data is lying in someone’s Cloud

  1. Review which IP or Domains have access to your DB.
  2. Periodically take Backups and Snapshots and store it in a different server.
  3. Have stronger Password restrictions
  4. Don’t store Personally Identifiable Information or Sensitive Information in Plain Text.
  5. Validate all the requests from the application for authenticity using a Hash Key or AuthKey or SessionID to avoid any eavesdrops.

Remember the hacker out there just needs access to your data and he can analyse & sell it to competition at this convenience,

So as a DB Owner / Application Owner – Keeping the dark horses away from your Data is Most Important,

Need some IT Consulting ? talk to our experts free @ info@techuva.com

Stay tuned …
Techuva Solutions Pvt Ltd.

What is SQL Injection & What are steps to fix it ? – most common problems of e-commerce sites

SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server (also commonly referred to as a Relational Database Management System – RDBMS). Since an SQL Injection vulnerability could possibly affect any website or web application that makes use of an SQL-based database, the vulnerability is one of the oldest, most prevalent and most dangerous of web application vulnerabilities.

How SQL Injection works

In order to run malicious SQL queries against a database server, an attacker must first find an input within the web application that is included inside of an SQL query.

In order for an SQL Injection attack to take place, the vulnerable website needs to directly include user input within an SQL statement. An attacker can then insert a payload that will be included as part of the SQL query and run against the database server.

The following server-side pseudo-code is used to authenticate users to the web application.

app_user_name      = request.POST[‘username’]
app_user_passwd  = request.POST[‘password’]

# SQL query vulnerable to SQLi

sql = “SELECT id FROM users WHERE username=’” + uname + “’ AND password=’” + passwd + “’”

# Execute the SQL statement database.execute(sql)

 

The above script is a simple example of authenticating a user with a username and a password against a database with a table named users, and a username and password column.

The above script is vulnerable to SQL Injection because an attacker could submit malicious input in such a way that would alter the SQL statement being executed by the database server.

A simple example of an SQL Injection payload could be something as simple as setting the password field to password’ OR setting an inner query to (delete * from users) 

This would result in the query to be executed and data can be corrupted or manipulated.


What’s the worst an attacker can do with SQL?

SQL is a programming language designed for managing data stored in an RDBMS, therefore SQL can be used to access, modify and delete data. Furthermore, in specific cases, an RDBMS could also run commands on the operating system from an SQL statement.

Below are few things an attacker can inflict serious trouble to any organisation :

  • An attacker can use SQL Injection to bypass authentication or even impersonate specific users.
  • One of SQL’s primary functions is to select data based on a query and output the result of that query. An SQL Injection vulnerability could allow the complete disclosure of data residing on a database server.
  • Since web applications use SQL to alter data within a database, an attacker could use SQL Injection to alter data stored in a database. Altering data affects data integrity and could cause repudiation issues, for instance, issues such as voiding transactions, altering balances and other records.
  • SQL is used to delete records from a database. An attacker could use an SQL Injection vulnerability to delete data from a database. Even if an appropriate backup strategy is employed, deletion of data could affect an application’s availability until the database is restored.
  • Some database servers are configured (intentional or otherwise) to allow arbitrary execution of operating system commands on the database server. Given the right conditions, an attacker co

An SQL Injection needs just two conditions to exist – a relational database that uses SQL, and a user controllable input which is directly used in an SQL query.

In the example below, it shall be assumed that the attacker’s goal is to exfiltrate data from a database by exploiting an SQL Injection vulnerability present in a web application.

Example on how to avoid SQL Injections 

Default Example : 

String name = //user input 
int age = //user input 
Connection connection = DriverManager.getConnection(...); 
PreparedStatement statement = connection.prepareStatement( "SELECT * FROM people WHERE lastName = ? AND age > ?" ); 
statement.setString(1, name); //lastName is a VARCHAR 
statement.setInt(2, age); //age is an INT 
ResultSet rs = statement.executeQuery(); 
while (rs.next()){ //... }

Now the above code can be violated by executing like name = (update employee set password=’123′)   or name = ‘delete * from employee’   – this could completely put things at a toss

Safer Approach :

List<Person>; people = //user input

Connection connection = DriverManager.getConnection(…);
connection.setAutoCommit(false);

try

{

             PreparedStatement statement = connection.prepareStatement( “UPDATE people SET lastName = ?, age = ? WHERE id = ?”);
for (Person person : people)
{
statement.setString(1, person.getLastName());
statement.setInt(2, person.getAge());
statement.setInt(3, person.getId());
statement.execute(); }
connection.commit();
}

catch (SQLException e)
{
connection.rollback();
}

So these design and coding principles have  to applied during intial phase of the project so every sprint or every iteration code gets better and better.

-Tech Team from Techuva Solutions