Wipro Limited is an Indian multinational IT Consulting and System Integration services company headquartered in Bangalore, India. As of December 2014, the company has 154,297 employees servicing over 900 large enterprise & Fortune 1000 corporations with a presence in 61 countries. On 31 March 2014, its market capitalisation was approximately 7px1.27 trillion , making it one of India's largest publicly traded company and seventh largest IT services firm globally.To focus on core IT Business, it demerged its non-IT businesses into a separate company named Wipro Enterprises Limited with effect from 31 March 2013. The demerged company offers consumer care, lighting, healthcare and infrastructure engineering and contributed to approx. 10% of the revenues of Wipro Limited in previous financial year. Recently Wipro has also identified Brazil, Canada & Australia as rapidly growing markets globally and has committed to strengthen the presence in the respective countries over the next 5 years. Wikipedia.
Wipro Technologies | Date: 2016-08-03
A method for mapping object coordinates from a video frame view to real world coordinates includes obtaining an image from an image capture device and identifying, via one or more hardware processors, an object depicted in the image. Image-frame object coordinates for the object are determined, and one of a plurality of coordinate transformation matrices associated with the image capture device is selected, based on the image-frame object coordinates for the object. Real-world object coordinates for the object are calculated using the image-frame coordinates and the selected coordinate transformation matrix, and a trajectory of the object is determined using the calculated real-world object coordinates.
Wipro Technologies | Date: 2016-01-20
A method of providing visual feedback to a user in a virtual reality environment comprises: capturing (102) position and depth information of the user using a depth sensor (204); determining (104) a potential interaction point between the user and a 3D virtual object (206) associated with the virtual reality environment based on the position and depth information of the user; determining (106), using a virtual depth camera, depth of the 3D virtual object at the potential interaction point; calculating (108) a distance between the user and the 3D virtual object based on the position and depth information of the user and the depth of the 3D virtual object; and rendering (110) a soft shadow of the user on the 3D virtual object based on the distance between the user and the 3D virtual object.
Wipro Technologies | Date: 2016-05-18
Systems and methods for allocating a physical cell identifier, PCI, to a cell are described. Allocated physical cell identifiers are identified (302) based on PCI data. A near PCI list and a far PCI list are generated (304) based on the allocated PCIs and a reference signal received power threshold value. Cell group IDs and cell IDs from the near PCI list and the far PCI list are determined (306). The cell group IDs are assigned (308) to a first bin and the cell IDs are assigned (308) to a second bin. The cell group IDs in the first bin are prioritized (310) based on effective distance, and the cell IDs in the second bin are prioritized (310) based on an effective RSRP value. A PCI is allocated (312) to the cell, determined based on the prioritized cell group IDs and the cell IDs.
Wipro Technologies | Date: 2016-08-10
The present disclosure relates to a method and a system for performing secure read/write operations in the pluggable flash storage device. In one embodiment, a request for at least writing and reading of data in/from the pluggable flash storage device is received. Upon receiving the request for writing data, the storage device is authenticated based on a predetermined signature of the pluggable flash storage device. Upon authenticating the storage device, the at least one of user and the storage controller who made the request is also authenticated and write operation is performed based on successful authentication of the at least one of the user and the storage controller. By way of establishing secure communication between the storage device and the user or the storage controller during the read/write operation the hacking of the data in the storage device or use of the storage device with wrong intent is avoided.
Wipro Technologies | Date: 2016-09-14
This disclosure relates generally to lawful interception of communication networks, and more particularly to a system and method for improved lawful interception of an encrypted message. The method may involve receiving a copy of the one or more encrypted messages; receiving one or more message encryption key generation parameters associated with the one or more encrypted messages from the communication network; receiving one or more composite decryption logics, from an encryption device (104), to decrypt the one or more encrypted messages; decrypting the one or more encrypted messages based on the one or more message encryption key generation parameters and the one or more composite decryption logics for the lawful interception.
Wipro Technologies | Date: 2016-10-19
This disclosure relates generally to Information Technology (IT) and more particularly to a system and a method for software reuse. In one embodiment, the method includes identifying at least one portion of a software code contemporaneous to a user developing a software functionality in the IDE. The at least one portion of the software code corresponds to the software functionality. The method further includes prompting the user to reuse the at least one portion of the software code on the IDE. Thereafter, the method includes restricting the user from performing additional operations on the IDE during subsistence of the prompt. Finally, the method includes enforcing reuse of the at least one portion of the software code in response to obtaining a user approval for the at least one portion.
Wipro Technologies | Date: 2016-09-21
This disclosure relates generally to call monitoring techniques, and more particularly to method and system for identifying faulty communication calls. In one embodiment, a method comprises generating communication call record information for a communication call upon determining release of the communication call on a signaling plane. The method further comprises receiving a notification that media plane resources are still active after release of the communication call on the signaling plane. The method further comprises requesting for and receiving media activity of the communication call on the media plane in response to active media plane resources. The method further comprises identifying the faulty communication call based on the communication call record information and the media activity of the communication call.
Wipro Technologies | Date: 2016-03-30
A method for optimally managing heterogeneous data in a distributed environment comprises initializing a first storage pool capable of storing data from one or more sources, the first storage pool being distributed across one or more computing devices. Data from the one or more sources is stored in the first storage pool. One or more memory pools are generated in a second storage pool based on an amount of data to be stored in the first storage pool and one or more parameters associated with the data stored in the first storage pool. Metadata is created in a first memory pool of the one or more memory pools for the data stored in the first storage pool, the metadata capable of retrieving the data stored in the first storage pool in real-time.
Wipro Technologies | Date: 2016-01-06
Systems and methods for performing memory management among a plurality of devices in a network are described. In one implementation, the method for performing memory management comprises obtaining memory requirements for execution of an application. The memory requirements indicate memory space needed for executing the application. Further, the method comprises creating at least one memory pool, based on the memory requirements, by aggregating physical memories of the plurality of devices. Further, the method comprises executing the application in the at least one memory pool using semaphores and a mutex application programming interface.
Wipro Technologies | Date: 2016-09-28
This disclosure relates generally to a host-peripheral interface, and more particularly to a system and method for dynamically adjusting a low power clock frequency of a host device upon detecting coupling of a peripheral device to the host device. In one embodiment, a method is provided for dynamically adjusting a low power clock frequency of a host device. The method comprises dynamically determining an initial frequency of a low power clock of the host device at which a low power link between the host device and a peripheral device is operational, computing a low power clock frequency range of the host device based on the initial frequency of the low power clock, assessing the low power link in the low power clock frequency range, and adjusting the low power clock frequency to a typical frequency of the low power clock frequency range based on the assessment.