Chief of Current Operations, Training Support Activity Europe at Department of the Army
Location:
US Military Posts in Europe
Industry:
Defense & Space
Work:
Department of the Army since Jan 2012
Chief of Current Operations, Training Support Activity Europe
Trainng Support Activity Europe Oct 2008 - Jan 2012
Chief, Training Support Center
US Army Apr 1985 - Dec 2006
First Sergeant
3-66 AR BN 1998 - 2000
Scout Platoon Sergeant
3-66 Armor 1998 - 2000
Scout Platoon Sergeant
Education:
Ashford University 2010 - 2012
Master, Organization Management
American Public University System 2004 - 2007
Bachelor, Homeland Security and Terrorism Studies
Michael Edward Aho - Rochester MN, US James Richard Coon - Rochester MN, US Harold Olaf Romo - Rochester MN, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/00 G06F 7/04
US Classification:
713176, 726 30, 705 57
Abstract:
A method, apparatus and computer program product are provided for protecting ongoing system integrity of a software product using digital signatures. A core product load manifest for protecting ongoing system integrity of a software product having a plurality of pieces includes a manifest header including header attributes of the software product. A list of a plurality of manifest items is stored with the manifest header. Each manifest item identifies a corresponding piece of the software product. Each manifest item includes at least one attribute. A manifest digital signature is stored with the manifest header. The manifest header, the header attributes, each of the plurality of items, and each item attribute are included in the manifest digital signature. A digital signature is computed for each signable piece of the software product and is stored with the piece of the software product. The digital signature of each signed software product piece is excluded from the core product load manifest.
Variable Dynamic Throttling Of Network Traffic For Intrusion Prevention
David A. Christenson - Fergus Falls MN, US James R. Coon - Rochester MN, US Christopher T. Gloe - Rochester MN, US Daniel P. Kolz - Rochester MN, US Scott D. McCreadie - Rochester MN, US Timothy R. Seeger - Rochester MN, US Kyong J. Shim - Rochester MN, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 12/56 H04L 12/403 G06F 11/00
US Classification:
370230, 370252, 714 22
Abstract:
Methods, apparatus, and computer program products for variable dynamic throttling of network traffic for intrusion prevention are disclosed that include initializing, as throttling parameters, a predefined time interval, a packet count, a packet count threshold, a throttle rate, a keepers count, and a discards count; starting a timer, the timer remaining on no longer than the predefined time interval; maintaining, while the timer is on, statistics including the packet count, the keepers count, and the discards count; for each data communications packet received by the network host, determining, in dependence upon the statistics and the throttle rate, whether to discard the packet and determining whether the packet count exceeds the packet count threshold; and if the packet count exceeds the packet count threshold: resetting the statistics, incrementing the throttle rate, and restarting the timer.
Edward W. Chencinski - Poughkeepsie NY, US James R. Coon - Rochester MN, US John C. Dayka - New Paltz NY, US Steven G. Glassen - Wallkill NY, US Richard J. Gusefski - Endicott NY, US Michael J. Jordan - Woodstock NY, US Marco Kraemer - Sindelfingen, DE Thomas B. Mathias - Vestal NY, US Peter K. Szwed - Rhinebeck NY, US Garry J. Sullivan - Rochester MN, US Klaus Werner - Moetzingen, DE
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 21/00
US Classification:
380278, 726 9, 713284
Abstract:
A computer program product for integrated key serving is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes using a smart card of two or more smart cards with a support element of two or more support elements to create an encryption key and storing the encryption key in an encrypted file that can only be decrypted by the smart card and the support element used to create the encryption key.
Preventing False Positive Detections In An Intrusion Detection System
James R. Coon - Rochester MN, US Daniel P. Kolz - Rochester MN, US Jeffrey M. Uehling - Rochester MN, US
International Classification:
G06F 21/00 G06F 11/30
US Classification:
726 23
Abstract:
Methods, systems, and products are disclosed for preventing false positive detections in an intrusion detection system that include: establishing one or more activity profiles for an intrusion detection system, each activity profile specifying system activity for detection by the intrusion detection system; receiving, in the intrusion detection system, an exception notification for a specific activity profile, the exception notification specifying that the specific activity profile represents authorized system activity; determining, by the intrusion detection system, whether current system activity matches the specific activity profile; and administering, by the intrusion detection system, the current system activity if current system activity matches the specific activity profile.
Data Stream Optimizer Utilizing Difference Coding Between A Current State Buffer And A Next State Buffer
Jody E. Berk - Rochester MN James R. Coon - Rochester MN Paul R. Day - Rochester MN Peter J. Heyrman - Rochester MN David L. Johnson - Pine Island MN
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 314 G06F 1300
US Classification:
395600
Abstract:
The disclosed data stream optimization process is containing two logical entities, the first being the pre-comparison optimizer component and the second being the comparison component. The pre-comparison optimizer component performs two discrete tasks. First, the input data stream is written into a next state buffer. Second, the elimination of redundancies involves detecting and removing redundant screen attributes, since the terminal's execution time for processing a screen attribute is more than that required for a data character. The comparison component contains three distinct sub-components. First, non-data constructs such as commands and orders are optimized and placed in the outgoing data stream. Second, the screen image that is represented by the data stream is compared to the existing screen image to further reduce the outgoing data stream. This reduced version is further reduced when repeated characters and fields are replaced with repeat orders which take up less space within the outgoing data stream.
Generating A Hybrid Security Certificate Using Multiple Cryptosystems
- Armonk NY, US David Wayne GLASS - Georgetown KY, US David Howard EVANS - Lexington KY, US Clifford Lee HANSEN - Rochester MN, US James Richard COON - Rochester MN, US Richard Victor KISLEY - Charlotte NC, US
International Classification:
H04L 9/32 H04L 9/30 H04L 9/08
Abstract:
Processing within a computing environment is facilitated by generating a hybrid security certificate using multiple cryptosystems. The generating includes obtaining data for inclusion in the hybrid security certificate, and generating a first digital signature associated with a first cryptosystem to cover the data, and a second digital signature associated with a second cryptosystem to cover the data. The generating further includes providing the hybrid security certificate, where the hybrid security certificate includes the data, the first digital signature associated with the first cryptosystem, and the second digital signature associated with the second cryptosystem, and where the first digital signature has no dependency on a key of the second cryptosystem or the second digital signature, and the second digital signature has no dependency on a key of the first cryptosystem or the first digital signature.
- Armonk NY, US James Richard Coon - Rochester MN, US Michael Joseph Jordan - Woodstock NY, US Michael J. Young - Poughkeepsie NY, US Jessica Doherty - Poughkeepsie NY, US Christopher V. DeRobertis - Hopewell Junction NY, US
International Classification:
H04W 12/0471 H04W 12/108 H04L 9/32
Abstract:
A computer-implemented method for remote management of hardware security modules (HSMs) includes receiving a command request from a mobile device. The command request includes an encrypted key part and an encrypted signing key. The HSM decrypts the command request using a key associated with a security zone of the mobile device. The HSM decrypts the encrypted key part and the encrypted signing key. Decrypting the encrypted key part and the encrypted signing key includes using the key associated with the security zone of the mobile device and a key associated with a remote administrator associated with the mobile device. A command is generated for a domain with a target HSM. The command is generated using the decrypted key part and the decrypted signing key. The command is transmitted to the domain for execution by the target HSM. Various other methods, systems, and computer-readable media are also disclosed.
Lanai City Service, Inc. Lanai Harbor Store. Lanai NAPA. Lanai Plantation Store. Dollar Rent A Car Lanai Auto Renting & Leasing. Service Stations - Gasoline & Oil. Convenience Stores. Auto Parts & Supplies - New
1036 Lanai Avenue, PO Box 630610, Lanai City, HI 96763-0610 8085657227, 8085657087
echnology Team, and a Wyss business development lead, working closely with Harvard OTD. The Organs-on-Chips project leaders included Don Ingber, Geraldine Hamilton, PhD, Lead Senior Scientist on the Wyss Institute Biomimetics Microsystems Platform, and James Coon, a Wyss Institute Entrepreneur-in-Residence.
Date: Jul 28, 2014
Category: Health
Source: Google
With billionaire's backing, Wyss spinout aims to retire animals in R&D
Hansjorg Wyss--the Swiss med tech billionaire who founded the institute at Harvard with a donation of $125 million. And the biotech has enough enough money to execute on a 3-year game plan, says CEO James Coon, marketing the chip technology to research labs while forging new industry collaborations.
Date: Jul 28, 2014
Category: Health
Source: Google
Wyss Institute Launches Organs-on-Chips-Focused Startup
The project leaders behindOrgans-on-Chips include Don Ingber, Geraldine Hamilton, Ph.D., lead senior scientist on the Wyss Institute Biomimetics Microsystems Platform, and James Coon, a Wyss Institute entrepreneur-in-residence. Dr. Hamilton and Coon will be taking senior leadership positions at Emu
Date: Jul 28, 2014
Category: Health
Source: Google
Technology translation engine launches 'Organs-on-Chips' company
D., Lead Senior Scientist on the Wyss Institute Biomimetics Microsystems Platform, and James Coon, a Wyss Institute Entrepreneur-in-Residence. Hamilton and Coon will be moving to take senior leadership positions at Emulate, along with multiple members of the research team, smoothing the transition f
Date: Jul 28, 2014
Category: Health
Source: Google
Emulate Scores $12M to Shake Up Drug Testing With Organs on Chips
oday, Cambridge, MA-based Emulate is officially ramping up with a $12 million Series A round that itll partly use to move out of Harvard Universitys Wyss Institute for Biologically Inspired Engineeringwhere its been incubatingand try to set up shop in Kendall Square, says CEO James Coon. Venture