Meeting Startups at Conquest, 2019

I’m one of the mentors at the Conquest, 2019. I met up with some of the Startups.

Aayush

Aayush built a cost-effective ingestible battery-less electronic Health Pill that transmits data via a patch that can be easily applied on the body. That patch communicates with a Smartphone App and helps in the prediction and prevention of Heart attacks and Sudden Cardiac Arrests.

The Health Pill uses MicroSensor Technology that can be swallowed by a person. The pill enters the Gastro-Intestinal Tract in the stomach and becomes electrically activated when it reacts with the digestive acids present in the stomach, thus generating a natural electric current. The embedded Bio-Medical sensors once activated, record specific physiological Health metrics from the body. These health data are transmitted to an app via a Wearable Transmission Patch that can easily stick to the body.

These data are stored in the cloud which is can be accessed by family members, friends, caretakers, and doctors who have access to the data. The app monitors health data round the clock and simultaneously identifies, analyzes, and can warn about 9-11 minutes prior to a Heart Attack or Sudden Cardiac Arrest. Emergency Alerts are sent to the victim, predefined members, and to the nearest Hospital along with the current GPS location of the victim.

Aayush built a unique microsensor technology, which is cost-effective, smart private healthcare technology that can be used without the need of doctor’s assistance. Aayush plans to license their product and technology to various hospitals, once their patent is granted.

Xplorazzi

Xplorazzi is building an automated tool which will take retail shop shelf images and CCTV video feed to create Planograms.

Planograms are a crucial part of today’s retail stores. It can be done manually to comply with audit requirements or use software that is an additional cost to the retailers.

Xplorazzi uses imaging technology, deep learning, and sales data to build a smartphone app that will aid retail stores to do items assessment. This will create a consistent visual record to automate the process and use the details for Audit, Assortment Analysis, Stock Management, Shelf-Space availability, and Dynamic Analysis Reports.

Untangled Cloud

Untangled Cloud makes it easy to work across multiple Cloud providers such as Amazon’s AWS, Google Cloud, and Microsoft’s Azure.

Untangled Cloud provides analytics and tools to help Startups and SMEs make better decisions while choosing the right cloud service providers. They help in upskilling teams to learn more about the services of various cloud providers. They also plan to build tools to help migrate from one cloud provider to the other easily and seamlessly.

Pigeon

Pigeon is “Zapier for Notifications.”

Pigeon has built an easy to use system that helps businesses manage user notifications & preferences across multiple channels — emails, apps, instant messaging apps, and text messages in one place.

Pigeon targets 3 distinct areas;

  1. Content Management System (CMS) for Notifications: Normally, notification messages are coded in by the developers. With Pigeon’s online Email, Push & SMS editors, marketing & sales teams are empowered to make changes themselves, resulting in faster iterations and can avoid wasted dev cycles.
  2. User Preferences Manager: Users are used to applications like Facebook that provide a high degree of control over notifications. With Pigeon, your users can choose which devices they would like to receive notifications, the time and even control the types of notifications. Pigeon handles all the processing for you. Developers don’t need to re-create this and can focus on their core business logic.
  3. Event-Driven Notification System: With our unique event-based model, Pigeon empowers marketing & sales teams to control the logic of the notifications online. Developers simply hook various events through the app.

Loka

Loka is a hyper-local vernacular QnA app for consumers & local businesses.

Loka’s hypothesis is that about 90% of Indians do not speak English and would rather use a vernacular language that they are comfortable in. They want to bank on that fact and build a community of local businesses and consumers that communicate in vernacular Indian languages.

Loka wants to be the growth-hack platform for local businesses and consumers to ask questions and get answers from their neighborhoods in their local languages.

PROI

PROI is developing a hardware-based POS system for retailers that aims to build a data-driven analytics solution.

There are 10-15 million retail stores in India. But the retail sector is very traditional and unorganized. There is no Inventory and Supply Chain Management system, no data-driven In-Store Management and Forecasting and no large scale retail data provision for the hyperlocal market. In order to organize this industry, PROI will be collecting the data and setting the path for future collaborators. They plan to connect the entire Supply Chain – Retailers, Manufacturers, and Hyper-Local Markets.

PROI aims to help SMEs to compete at the same level as the big players in the industry by providing them the capability to make data-driven decisions and optimize their supply chain. They follow a bottom-up approach while approaching the Hyperlocal market environment.

5 Tips for Paranoid People on the Internet

Internet Security

Do you remember that old quote, “Just because you’re paranoid doesn’t mean they aren’t after you?” It seems like it is becoming more and more relevant every day. Almost weekly, a new scandal emerges from Big Tech, detailing the wholesale trading and theft of our personal information. But aside from all the headline-grabbing, one-off incidents, the much bigger concern is the day to day invasions of our privacy that are just standard policy for many of these companies.

In fact, it’s how they make most of their money.

Add to this the ever increasing and complex systems of government surveillance and tracking (most of which we’ll probably never really learn about), and you can be forgiven for feeling like you’re being watched every second you’re online.

Fortunately, there are plenty of people who feel the same. Many are finding ways and creating tools to help all of us stay safe and maintain our privacy while using the internet. The quick, simple steps that follow will block you from the most invasive spying and tracking on the internet, boost your privacy, and keep you safe.

1. Purge your Facebook

There may be no other organization that has become more notorious with invasions of privacy as quickly as Facebook. In just a couple of years, Mark Zuckerberg and his company seem to have completely fallen from grace in the eyes of many politicians, security experts and, indeed, users. They have been (justifiably?) blamed for stoking genocide in Myanmar, Brexit, numerous mental health crises, and even destroying the foundations of human society.

These examples may seem extreme, but there is no denying that Facebook has capitalized on the monetization and manipulation of their customers’ personal data like no other company operating today. The most simple step you can take to avoid Facebook’s reach is to delete your account (Instagram too, which Facebook own). If this isn’t possible, there are few ways to reduce its impact on your internet browsing. Here are a few browser extensions that will quickly limit many of the platform’s tools for tracking your activity and boost your privacy.

  1. Disconnect Facebook
  2. uBlock and
  3. Newsfeed Eradicator

2. Use Tor Browser

While Google claims that incognito mode will keep you’re browsing activity and identity private, it is still part of the Google ecosystem – so you can never be completely sure. You might want to try alternatives to Google Chrome, Safari, and their competitors by using the Tor Browser. Tor is a web browser dedicated to maximum online privacy. Using 3 layers of encryption, Tor completely masks your identity by anonymizing your location, browser, and activity and batching it all together with every other Tor user. So essentially, you become lost in the virtual crowd. This also means that the more popular Tor grows, the more effective it is at hiding you.

Tor is one of the most popular tools amongst online activists, journalists, political dissidents in repressive governments, and security experts. Follow their lead and start using it today.

For ultimate online privacy, combine Tor with a VPN.

3. Use a VPN based outside of the 14 eyes

Installing a VPN (Virtual Private Network) on your devices is by far the easiest and most effective step to take if you want to increase your online privacy. You can’t be spied on if they can’t find you – and that’s where a VPN comes in handy. A VPN uses military grade encryption, IP masking and other tools to hide your online activity while on both private and public networks. This helps keep your location hidden, your data safe from leaking or theft, and your browsing activity secret from corporate and governmental tracking.

To go a step further, make sure that your VPN provider is outside the jurisdictions of the 14 Eyes surveillance alliance.

4. Try to avoid using Smart Home Products

It’s actually quite surprising that the recent story about 1,000s of Amazon employees listening to customers through their Alexa devices didn’t receive greater news coverage. Maybe it just shows how desensitized we’ve all become to such stories. It also shouldn’t be too surprising to anybody concerned with online privacy. Since the earliest days of smart home devices, security experts have been warning us about the ease with which they can be hacked and used to spy on households. Companies like Amazon may only be listening in for marketing purposes, but plenty of criminals are using them to track your routines and steal your identity.

The most effective way to be sure nobody is spying on you in your own home, through your smart devices, is to avoid using them altogether.

5. Start using Cryptocurrency for Payments

If you can ignore all the hype and noise around Bitcoin and other cryptocurrencies’ rollercoaster prices, and focus instead on its core principles and uses, you’ll understand how it is a great tool for online financial privacy. Aside from companies tracking your online purchases and using this to manipulate you into buying more stuff, online financial fraud is one of the biggest, ever-present aspects of using the internet. From the very first online transactions, conmen, fraudsters, and thieves have been finding ways to extract money from your bank accounts and credit cards.

One way to shield yourself from this happening is to separate your online transactions from your bank accounts. This is one of the many uses of Cryptocurrency such as Bitcoin. Despite what many people will tell you, Bitcoin is not 100% anonymous. However, by using a Bitcoin address to pay for online goods and services, and taking extra measures like shuffling your purchases amongst multiple bitcoin addresses, you can add a layer of privacy to your online transactions not possible with traditional banks and credit cards.

It can sometimes feel like maintaining privacy while using the internet is a crazy, unrealistic dream. This doesn’t have to be the case, however. By taking the simple, quick steps outlined here, you can easily boost not just your online privacy, but also safety from hacks, data leaks, and other forms of cybercrime. Using the internet will feel a lot less like you’re under siege from advertisers, governments and other shady figures, and free to browse in complete anonymity.

The Dangers of Public WiFi

Woman looking at Security Cameras

WiFi is a miraculous invention that allows for simple and effective public internet usage over a wireless connection. With so many public establishments offering free wifi, it has become very easy to simply log in while you’re sitting at your local coffee shop and browse away.

Of course, there are some dangers that every user should be aware of while using the internet, especially if they are using public wifi. Although many public wifi providers employ stringent security measures to help curb illicit activity over their services, the use of public wifi still poses a very real danger to those who browse on it unawares.

So what kind of things should we be aware of when we’re using public wifi? What kinds of risks are we taking when we log on to public wifi hotspots unprotected? And what are some of the ways we can protect ourselves? The solutions can range from simple habit changes to finding the best VPN services out there to help protect your connection.

What are the risks?

The most obvious risk that goes along with unprotected wifi usage is identity theft. Hackers and other malicious actors are very proficient at scraping identifying information from little slip-ups in public and are ready to use that information to access your bank accounts and other secure services.

Another thing that you’re at risk of is the loss of privacy. People may be able to gain access to your private emails, documents, pictures, and video without your knowledge. Certain types of attacks can even give hackers access to your webcam and microphone long after you’ve logged off of the hotspot you were using!

These types of things can be very scary and unwanted, so it’s definitely important to try and curb these risks whenever you use public wifi. The first step to protecting yourself here is to stay informed. Knowing is half the battle, so you’ll want to know exactly how these hackers and no-goodniks plan on stealing your data.

How does this happen?

There are a number of crafty ways that hackers have of getting into your stuff and stealing what they want. Being aware of these strategies is going to be your main weapon against unsafe wifi usage. Keeping these sorts of malicious strategies in mind whenever you use risky wifi hotspots will cause you to act more cautiously as you connect and browse.

  • Malware and spyware. This is malicious software that actors will try and illicitly install on your machine. With stuff like this, the possibilities are endless. The malware may just brick your computer, or it could hijack part of its processor for international espionage. Spyware is bad too and allows the attacker to mine data from your machine and potentially access sensitive information.
  • Man-in-the-middle attacks are an attempt by a hacker or other entity to place their access in the middle of a connection that their victim believes is secure. The best way to think of this is to consider it similar to eavesdropping. The methods behind this can range from brutish to ingenious, but the end result is typically a loss of sensitive information.
  • Malicious hotspots are wifi hotspots set up by hackers or other no-goodniks with special hidden settings that give them access to traffic moving through the hotspot, and potentially even the devices that connect to it. This one can be especially insidious because any hotspot you connect to in public can potentially be compromised. One thing to look out for is hotspots with names that don’t look right, or that are simple misspellings of trusted establishments.
  • Snooping and Sniffing is similar to malicious hotspot usage but doesn’t require a compromised hotspot in order to work. Basically, hackers use special software kits designed to allow them to spy on wifi signals. Using this method, attackers can potentially gain access to everything you do online, so it’s important to always be vigilant.

There are a few easy steps you can take to make your connection more secure right off the bat;

  • Disable any file sharing settings on your device. This will stop your computer from automatically sending and receiving files, which obviously makes it that much harder for malicious people to access them.
  • Only use websites with “HTTPS” next to the URL. These websites employ encryption for security purposes and are safer to log into over public wifi channels.
  • Always remember to turn off your wifi and Bluetooth when you’re done using them. This will prevent your computer from automatically connecting to illicit hotspots and compromised devices.
  • Use a VPN. A virtual private network, or VPN, allows you to tunnel your connection through a private secure server. This lets you keep your identity safe while browsing and can also have other perks like unblocking region-locked content. The best VPN services also have malware protection features.

The Books of 2018

Books by Oinam (2018)

I have a fascination with the novel by Arundhati Roy, The God of Small Things. It is that one novel which I remember while starting to read serious fiction. Of course, I went through the usual teen-romance, teen-detectives, et al before I outgrew them soon enough in my early days. This year, I decided to re-read her book and it took me a really long time to finish it.

For quite a while, I’ve been practicing minimalism. Sometime last year, I decided to experiment with the idea of “essentialism” instead of just plain minimalism — stick to the essentials but pick the best possibilities in it. I like to consider minimalism as one of many ways to essentialism. I re-read Joshua Becker’s book – Simplify. If you’re into minimalism and want to explore more, you should also watch, Minimalism: A Documentary About the Important Things.

My target for 2018 was to read about 50 books but ended up short at about 40. Some were re-reads and it was a good decision. Going forward, instead of trying to read more, I’ll experiment with re-reading good ones and going deep into them — less but more quality time with each book.

I also continued with the habit of including physical versions of the books that I read. That is one way to make my daughters learn and practice “reading books”. Reading on a Kindle makes them feel like I’m just looking at another screen.

I have lined quite a list of interesting books for this year.

Continue reading

The Making of Autochrome v3

Autochrome v3

Autochrome v2

It all started with an eagerness to create one of the simplest WordPress Photoblog. After a rough work with the first version of Autochrome, the second version saw a huge improvement in speed, crispness and a clear focus to the photos. Autochrome v2 leveraged the powers of WordPress while achieving minimalism and simplicity to give users a no-nonsense WordPress Photography Theme.

What we wanted to achieve with Autochrome v3

We really wanted to push the limit with Autochrome v3. We knew we needed to do something different so users can achieve more with the third version. There were few interim version of Autochrome which were never published but rather thrown away because they were not good enough, not worthy to be the successor of Autochrome v2.

While continuing and even pushing the envelope on minimalism and simplicity, we knew Autochrome v3 have to be faster, way faster, and have a laser focus on the Photographs and nothing else.

Continue reading

Hello Ruby – Programming Book for Children

Hello Ruby is a children’s book that teaches programming fundamentals through stories and kid-friendly activities.

An interesting initiative by Linda Liukas, who teaches programming and makes the world of technology more approachable through a non-profit called Rails Girls.

She is on a journey to combine software with storytelling. She is writing and illustrating a book for young children about the magical world of technology – Hello Ruby.

She is raising $10,000 on Kickstarter for Hello Ruby (already over-subscribed).

Continue reading

Introducing Acorn WordPress Theme at Theme6

Acorn Wordpress Theme

After multiple delays and hesitations, I have finally released Theme6, a site dedicated to carefully crafted and well designed themes and templates. I’m lucky to have partnered with an awesome designer – Saneef Ansari. Our first release is a Typographically tailored theme for WordPress – Acorn.

Acorn is a mobile-first, retina-ready responsive theme focused on typography and content. It is designed to be clean, simple, minimal and to stay out of the way to focus full attention to your blog posts, articles and content.

Our idea is to keep it as simple as possible, without the need for any additional plugins nor custom fields. It would work without any special need to add/edit the contents of the blog posts or articles.

We are thrilled and would be adding more well designed themes in future.

Apply to Sourcebits’ Product Studios

Sourcebits

I have known Rohit Singal for a while though we never met in person until last month, to talk about Sourcebits’ new initiative – its innovative Product Studios model.

Sourcebits is one of those rare service companies in India, who can churn out beautifully designed products backed by an equally high calibre of engineering. Their primary focus is in mobile strategy, design & development.

Sourcebits has done work for giants like GE, SAP, Intel, MIT, P&G, Hershey’s and Coca-Cola, as well as emerging technology companies such as Skyfire, Knocking, Peel, TwitPic, CloudOn and Sling Media since 2006.

In May, 2011, Sourcebits raised $10M from Sequoia Capital and IDG Ventures. They are currently head-quartered in San Francisco with design and development centers in Bangalore (India), Niigata (Japan) and Mexico.

Continue reading

Research your provider before hosting your website

Many people, especially those who are just starting off with a new online website and/or business, go straight for the cheapest web hosting provider they can find. It’s actually important to look for established and reputed providers such as Mediatemple, 1and1, Hostgator, Bluehost who offer the right balance between price, features and a high standard of support and service.

Just as transit services are the life blood of a city, so web hosting and telecom networks are the life blood of the Internet. But there’s a difference. If the buses and trains stop working, the city grinds to a halt and then gets back to normal when services resume. If your web hosting server goes down even briefly, you lose visitors in droves and it’ll cripple your online business permanently.

It is even more damaging if the problem is something chronic, like slow page loading speeds. Even a second delay in page loading results in sizable drop in customer satisfaction and reduces the conversion rate too. Then there’s security, use of tools, pricing, scalability and any number of issues that are critical to your online business and its survival an growth. That’s why you need a rock-solid web hosting provider who knows what website owners need and provides it without fail.

Continue reading

Practical Typography — a must-read free book

I just finished reading Matthew Butterick’s online book – Practical Typography. It’s an awesome book with an equally impressive design.

If you’re the very busy type, you can try the section, Typography in ten minutes. However, you should bookmark the site and read the whole. It has tons of useful information, tips, tricks and details about typography for the web and elsewhere.

Go read the read the book online. The book is free to read and if you enjoy it, there are ways you can pay for the book.

UPDATES