In the first episode, while intoxicated, he urinated on future teammate Jason Thacker's bed, and stole his pillow. One night when everyone in the household ...
Name / Title
Company / Classification
Phones & Addresses
Jason Thacker
MARION ADULT SOFTBALL ASSOCIATION
Jason Thacker Organizer
URBAN EARTH LLC
3296 Hickoyr Blf Dr, Marietta, GA 30062 3296 Hickory Blf Dr, Marietta, GA
Jason Thacker Chief Tech, VP Research & Technology, Chief Technology Arc, M
WHITE BADGER GROUP, LLC Computer Integrated Systems Design, Nsk · Business Services
2211 Rayford Rd STE 111-308, Spring, TX 77386 881 N Church Rd, Reading, PA 19608 750 Yorkshire Dr, Breinigsville, PA 18031
Jason Thacker Branch Manager, Chief Information Officer
Indiana Department of Education Educational Office · Administrative Educational Programs · Educational Program · Education Office · School/Educational Services · Elementary/Secondary School · Legal Services Office Administrative Educational Programs
3172346792, 3172320511, 3172347033, 3172320525
Us Patents
System And Method For Single Use, Fixed Process Privilege Elevation
- New York NY, US Hai Van NGUYEN - Houston TX, US Jason S. THACKER - Cypress TX, US Nicholas R. ADAM - The Woodlands TX, US Binh NGUYEN - Sugarland TX, US
Assignee:
JPMorgan Chase Bank, N.A. - New York NY
International Classification:
H04L 29/06 G06F 21/45 H04L 9/32
Abstract:
A system and method for assigning a single use real-time privilege are disclosed. A processor validates credentials of a user based on comparing credentials data of the user with pre-stored reference data in response to receiving a request to access a target computer to execute a single process; creates a single use blockchain private key for the single process and generates the passcode in response to a successful validation of the credentials. The processor also writes request data corresponding to the private key and the passcode onto a blockchain. In response to receiving user login data and the passcode to access the target computer, the processor validates passcode by confirming that the passcode matches the request data wrote in the blockchain; and assigns a single use real-time privilege to the user for executing the single process in response to successful validation of both the passcode and the received request.
System And Method For Implementing A Vulnerability Management Module
- New York NY, US Hai Van NGUYEN - Houston TX, US Binh NGUYEN - Sugarland TX, US Jason S. THACKER - Cypress TX, US Nicholas R. ADAM - The Woodlands TX, US
Assignee:
JPMorgan Chase Bank, N.A. - New York NY
International Classification:
H04L 29/06
Abstract:
Various methods, apparatuses/systems, and media for implementing a vulnerability management module are provided. A receiver receives a request for dynamically scanning vulnerability of a target computing device based on testable vulnerability criteria extracted from a database. A processor dynamically executes the testable vulnerability criteria from the SCCM based on the received request; creates a static SCCM advertisement with a dynamic pre/post validation check capability based on a result of the dynamically executing the testable vulnerability criteria; reports a success or a failure of the static SCCM advertisement related to the testable vulnerability criteria to indicate whether a vulnerability exists within the target computing device; and automatically remediates the vulnerability when it is determined that the vulnerability exists within the target computing device.
Systems And Methods For Maintaining Immutable Data Access Logs With Privacy
- New York NY, US Jason S. THACKER - Cypress TX, US Nicholas R. ADAM - The Woodlands TX, US Hai Van NGUYEN - Houston TX, US Binh NGUYEN - Sugarland TX, US
International Classification:
G06F 21/62 H04L 9/30 G06F 21/60
Abstract:
Systems and methods for maintaining immutable data access logs with privacy are disclosed. In one embodiment, in a cloud provider comprising at least one computer processor, the cloud provider having a plurality of clients, a method for maintaining immutable data access logs with privacy may include: (1) receiving data from a data owner, wherein the data owner is one of the clients; (2) storing the data in cloud storage; (3) executing an action or condition that impacts the data stored in cloud storage; (4) generating a log entry associated with the action or condition; (5) encrypting at least a portion of the log entry with a public key for the data owner; and (6) committing the log entry including the encrypted portion to a distributed ledger so that the committed log entry is immutable and cryptographically verifiable.
Systems And Methods For Zero-Footprint Email And Browser Lifecycle
- New York NY, US Hai Van Nguyen - Houston TX, US Nicholas R. Adam - The Woodlands TX, US Jason S. Thacker - Cypress TX, US
International Classification:
G06F 21/53 G06F 21/57
Abstract:
Systems and methods for zero-footprint email and browser lifecycle, dependency, and configuration management are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for implementing zero-footprint email and browser lifecycle management may include: (1) launching a restricted sandbox with no dependencies installed; (2) executing an email client or browser session with no dependencies in the restricted sandbox; (3) receiving a request for a dependency from the email client or browser; (4) halting initialization of the request; (5) validating the request; (6) retrieving an approved configuration for the dependency; (7) resuming initialization of the request; and (8) destroying contents of the restricted sandbox when the email client or browser session is complete.
Www.bitboxusa.com
Director of Software Development
Kirkland's Feb 2016 - Feb 2018
Director of Ecommerce Support
Kirkland's Apr 2014 - Mar 2016
Director of Ecommerce Systems
Tractor Supply Company Feb 2012 - Mar 2014
Ecommerce It Manager
Delta Air Lines Nov 2010 - Feb 2012
Senior Learning Designer
Education:
Institute of Fort Lauderdale 1999
The Art Institute of Fort Lauderdale Inc 1997 - 1999
Radford University 1991 - 1993
Northside High School 1989 - 1989
Skills:
E Commerce Instructional Design Project Management Sharepoint E Learning Project Planning It Service Management Software Documentation Crm Program Management Training Cross Functional Team Leadership Ms Project Saas Leadership User Interface Design Sem Web Applications Business Development User Experience Process Improvement Requirements Analysis Blended Learning Graphic Design Social Media Marketing Sdlc Learning Management Systems Mobile Applications Management Web Development
Portageville High School Portageville MO 1991-1995
Community:
Amber Long, Billy Williams, Travis Robinson, Chad Swilley, Candice Nowell, Joy Brewer, Holly Miller, Jannie Gooden, Kim Nowell, Matthew Carroll, Terresse Garmon