MC/DJ at Fingerlakes Entertainment, IT, Network Administrator at Department of Social Services
Location:
Penn Yan, New York
Industry:
Entertainment
Work:
Fingerlakes Entertainment since Jan 2007
MC/DJ
Department of Social Services since Feb 2005
IT, Network Administrator
Education:
American InterContinental University 2013 - 2015
BIT, System, Networking, and LAN/WAN Management/Manager
American Intercontinnental University, Online 2004 - 2006
Business, Business Administration/Management
Skills:
Entertainment Weddings Event Planning Corporate Events Music Radio Mac Public Relations Public Speaking Marketing Web Design Social Media
2011 to 2000 Bookkeeper/Tax PreparerHal Smith Restaurant Group Oklahoma City, OK Aug 2009 to Nov 2011 Restaurant ManagerBrinker, Intl Oklahoma City, OK Mar 2000 to Aug 2009 Restaurant Manager
Education:
Oklahoma State University - OKC Oklahoma City, OK 2011 to 2015 Accounting
Name / Title
Company / Classification
Phones & Addresses
Mr Jason Brewer Owner
Top Choice Automotive Auto Repair & Service
10 Timothy Avenue, Unit 12, Hanwell, NB E3C 2B8 5064549090
A network configuration ( ) including a first network medium which is a 1394 network as well as a second network medium. Each of the first and second network media is coupled to a corresponding plurality of host-computers (H through H and H through H ). The network configuration further includes a link layer gateway computer (H ) coupled to both. the first network medium and the second network medium. The link layer gateway computer is operable to communicate a data packet from a source host computer selected from one of the plurality of host computers coupled to the first network medium to a destination host computer selected from one of the plurality of host computers coupled to the second network medium. Additionally, the link layer gateway computer is operable to communicate a data packet from a source host computer selected from one of the plurality of host computers coupled to the second network medium to a destination host computer selected from one of the plurality of host computers coupled to the first network medium.
A network configuration () including a first network medium which is a 1394 network as well as a second network medium. Each of the first and second network media is coupled to a corresponding plurality of host computers (H through H and H through H). The network configuration further includes a link layer gateway computer (H) coupled to both the first network medium and the second network medium. The link layer gateway computer is operable to communicate a data packet from a source host computer selected from one of the plurality of host computers coupled to the first network medium to a destination host computer selected from one of the plurality of host computers coupled to the second network medium. Additionally, the link layer gateway computer is operable to communicate a data packet from a source host computer selected from one of the plurality of host computers coupled to the second network medium to a destination host computer selected from one of the plurality of host computers coupled to the first network medium.
System And Method For Loading Resolved Java Class Files To A Client Device
The client loads an application class through a gateway server that preloades and preresolves a class, creates a binary representation of new portions of the preloaded and preresolved class, and sends only the new portion to the client.
Rhishikesh Joshi - Dallas TX, US Jason Brewer - Dallas TX, US Sripal Bagadia - Dallas TX, US
Assignee:
Texas Instruments Incorporated - Dallas TX
International Classification:
G06F012/08
US Classification:
711147000, 711202000
Abstract:
In at least some embodiments, a system comprises two processor cores, an external memory coupled to the two processor cores, and a program that is executable at least in part by one or both of the processing cores. When executed by one of the processor cores the program causes the processor core to map a private region of the external memory, which is accessible only to one of the two processor cores, to a pre-reserved region of memory addresses used by the other processor core. The mapping permits the processor core that does not have direct access to the private memory region of the other processor core to access data stored in the private region. In at least some embodiments, the mapped memory can be subsequently unmapped and re-mapped to another private memory region at run-time.
Methods And Systems To Avoid Unproductive Dispatches
David Rives - Mesquite TX, US Jason Brewer - Euless TX, US
International Classification:
H04M 3/22 H04M 1/24 H04M 3/08
US Classification:
379029080
Abstract:
Methods and systems are disclosed to dispatch service resources in a communication network. An example method disclosed herein receives a notice of error for a user service, identifies equipment associated with the user service, analyzes the equipment to generate a dispatch instruction, and automatically executes the dispatch instruction in response to the equipment analysis.
Method And Apparatus For Providing Downloadable Functionality To An Embedded Coprocessor
A wireless data platform (10) comprises a plurality of processors (12,16). Channels of communication are set up between processors such that they may communicate information as tasks are performed. A dynamic cross compiler (80) executed on one processor compiles code into native processing code for another processor. A dynamic cross linker (82) links the compiled code for other processor. Native code may also be downloaded to the platform through use of a JAVA Bean (90) (or other language type) which encapsulates the native code. The JAVA Bean can be encrypted and digitally signed for security purposes.
System With Program For Automating Protocol Assignments When Newly Connected To Varing Computer Network Configurations
Jason M. Brewer - Dallas TX John C. Linn - Richardson TX Keith L. Perrin - Houston TX Robert E. Tonsing - Troy TX
Assignee:
Texas Instruments Incorporated - Dallas TX
International Classification:
G06F 1700
US Classification:
3952005
Abstract:
A method of configuring a mobile computer (H3) among different computer network configurations (N1, N2). In this method, the mobile computer is connected (18) to a first network medium in various steps. In one step, a network interface circuit (NIC) of the mobile computer is coupled to communicate with the first network medium. In another step, the mobile computer is configured to have an IP address allocated for the first network medium. Next, there is the step (20) of performing a program operation on the mobile computer to determine whether a dynamic configuration protocol is available on the first network medium. Another step performs a program operation to store an indicator in a storage resource of the mobile computer representing whether a dynamic configuration protocol is available on the first network medium. Next, the mobile computer is disconnected (22) from the first network medium, including uncoupling the network interface circuit of the mobile computer from communicating with the first network medium. Next, the mobile computer is connected (24) to a second network medium, including coupling the network interface circuit of the mobile computer to communicate with the second network medium, and performing a program operation on the mobile computer to request a user interface input.
Method And Apparatus For Extending Security Model To Native Code
A wireless data platform (10) comprises a plurality of processors (12, 16). Channels of communication are set up between processors such that they may communicate information as tasks are performed. A dynamic cross compiler (80) executed on one processor compiles code into native processing code for another processor. A dynamic cross linker (82) links the compiled code for other processor. Native code may also be downloaded to the platform through use of a JAVA Bean (90) (or other language type) which encapsulates the native code. The JAVA Bean can be encrypted and digitally signed for security purposes.
Alpharetta, GARPSGT/Nighttime Clinical Supervisor at Sleep Disor... For the past 9 years I have worked as a sleep tech. In December of 2002, I passed the required testing to become a Registered Polysomonographic Technologist... For the past 9 years I have worked as a sleep tech. In December of 2002, I passed the required testing to become a Registered Polysomonographic Technologist (RPSGT). My career in sleep began with a small lab in Macon and moved quickly to the Atlanta/North Georgia area where I worked in small labs...