Zoox Inc.
Software Architect
Riot Games Apr 1, 2013 - Apr 30, 2017
Software Architect
Zoox Inc. Apr 1, 2013 - Apr 30, 2017
Manager, Robot Data Platform and Stardash
The Java Posse Sep 2005 - Nov 2014
Co-Host
Netflix Apr 1, 2009 - Mar 1, 2013
Manager, Engineering Tools
Education:
Santa Clara University Sep 1981 - Jun 1985
Bachelors, Bachelor of Science, Computer Science, Engineering
Santa Clara University
Bachelors, Bachelor of Science In Electrical Engineering, Computer Engineering
Skills:
Software Engineering Java Software Development Object Oriented Design Cloud Computing Web Applications Distributed Systems Open Source Agile Methodologies C++ Rest Scalability Linux Java Enterprise Edition Git Architectures Python Unix Tomcat Architecture Apache Amazon Web Services Subversion Xml Continuous Integration Shell Scripting Oop Groovy Acting Maven Civil Litigation Invertebrate Zoology Environmental Awareness Restaurants Go Open Source Software Object Oriented Programming Representational State Transfer
Interests:
Poverty Alleviation Science and Technology Environment Health
Carl E. Quinn - San Jose CA, US Torbjorn Norbye - Concord CA, US Joseph Paul Nuxoll - Los Gatos CA, US
Assignee:
Sun Microsystems, Inc. - Santa Clara CA
International Classification:
G06F 9/44
US Classification:
717107
Abstract:
One embodiment of the present invention provides a system that facilitates creating a hierarchical model from a programming language file that includes components. The system operates by obtaining a component from the programming language file. Upon obtaining the component, the system passes an encoder to the component and requests that the component encode itself using the encoder, thereby causing the encoder to generate elements in the hierarchical model. Each element includes an attribute that identifies the component, thereby allowing the component to be subsequently identified by referencing the attribute in the corresponding element in the hierarchical model.
Protection Of Digital Content Using Block Cipher Crytography
Pierre Chavanne - Davis CA, US John Hwa - Fremont CA, US Lakshmana Pamarthy - Santa Clara CA, US Carl Quinn - San Jose CA, US Ralph Hill - Los Gatos CA, US Eric Swenson - Soquel CA, US Motomasa Futagami - Sunnyvale CA, US Atsushi Mituszawa - Kanagawa, JP
International Classification:
H04L009/00
US Classification:
380/043000
Abstract:
Protection of digital content using a specific application of block cipher cryptography is described. The digital content is encrypted using an encryption key and a calculated initialization vector. The digital content includes a plurality of strides of data and each stride includes a string of data to be encrypted and a block of data to be encrypted. The calculated initialization vector to be used to encrypt the block of data is derived from the string of data in the stride to be encrypted. Furthermore, the initialization vector is calculated by performing an exclusive disjunction function on a seed value and the string of data for each stride.
Protection Of Digital Content Using Block Cipher Crytography
Pierre Chavanne - Davis CA, US John Hwa - Fremont CA, US Lakshmana Pamarthy - Santa Clara CA, US Carl Quinn - San Jose CA, US Ralph Hill - Los Gatos CA, US Eric Swenson - Soquel CA, US Motomasa Futagami - Sunnyvale CA, US Atsushi Mituszawa - Kanagawa, JP
International Classification:
H04L 9/00
US Classification:
380262000
Abstract:
Protection of digital content using a specific application of block cipher cryptography is described. The digital content is encrypted using an encryption key and a calculated initialization vector. The digital content includes a plurality of strides of data and each stride includes a string of data to be encrypted and a block of data to be encrypted. The calculated initialization vector to be used to encrypt the block of data is derived from the string of data in the stride to be encrypted. Furthermore, the initialization vector is calculated by performing an exclusive disjunction function on a seed value and the string of data for each stride.
The present disclosure is directed to a hierarchical data structure, and systems and techniques for using the same. In one example, first device data including a plurality of files and corresponding to message data generated by one or more components of a device during a time period, may be received. The first plurality of files may be stored on one or more data stores and at a first location according to a hierarchical data structure, the hierarchical data structure based at least in part on a message time, a data identifier, or a device identifier. Second device data, associated with the time period and including a second plurality of files, may be obtained. The second device data may then be stored at a second location on the one or more data stores according to the hierarchical data structure.
Tracy and Carl Quinn of San Jose, California, said buying a Model S underscored their commitment to a healthier environment. We're a pretty green family in general,'' said Tracy Quinn. We put solar panels on our roof.''
LA, CASenior Vice President at Aon Consulting Past: Selection and Assessment Research Consultant at Bell Atlantic Over 20 years experience in Human Capital/Human Resources Consulting.
Leadership, Talent Management, Employee Selection & Assessment, HR Outsourcing... Over 20 years experience in Human Capital/Human Resources Consulting.
Leadership, Talent Management, Employee Selection & Assessment, HR Outsourcing, Performance Management and Succession Planning, Executive Coaching, etc. Significant experience in business development, cross business unit sales...