The Timmons Group, LLC St. Louis, MO Jun 2009 to Aug 2013 HR Manager / ConsultantHydroChem, Inc Houston, TX Mar 2008 to May 2009 HR Manager - MW RegionHogan Services, Inc St. Louis, MO Nov 2004 to Jan 2008 HR/Payroll/Benefits ManagerHydromat, Inc Maryland Heights, MO Jan 1999 to Oct 2004 HR Manager (Payroll and Benefits)Hydromat, Inc Maryland Heights, MO Jan 1995 to Jan 1999 Asst Controller / HR CoordinatorWashington University School of Medicine
Aug 1989 to Dec 1994 Senior Departmental Accountant / HR Assistant
Education:
Maryville University St. Louis, MO 1998 MBA in AccountingUniversity of Missouri St. Louis, MO 1993 Bachelor of Science in Accounting
Name / Title
Company / Classification
Phones & Addresses
Mr. Kenneth Timmons President
The Stone Depot Stone - Natural
49 Ash Lake Ct, Halifax, NS B3S 1B7 9028350741
Kenneth Timmons Detention Officer-shift Sgt
County of Wayne Real Estate Agents and Managers
224 E Walnut St Rm 226, Durham, NC 27704
Kenneth Timmons President
The Stone Depot Stone - Natural
9028350741
Kenneth Timmons Director
Angelina County Citizens' Chamber of Commerce
Kenneth Timmons President , Director
Cedar Grove Cemetery Perpetual Care Corporation
Us Patents
Securing Mobile Computer Systems In A Corporate Environment
David C. Challener - Raleigh NC Kenneth D. Timmons - Raleigh NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 900
US Classification:
713200, 713201
Abstract:
The present invention provides a method and system for securing a computer. The method includes providing a zone of authorized operation for the computer; determining if a possessor of the computer is authorized to have possession when the computer and the possessor leaves the zone of authorized operation and pass through a portal; and allowing continued access to the computer without requiring a password if the possessor is authorized. The method and system is transparent to the possessor and provides no advantage in hiding the computer from the portal. This method and system may be easily applied in a corporate environment and is particularly apt for securing mobile computer systems.
Method And Apparatus For Automatic Solid State Drive Performance Recovery
Donald R. Frame - Apex NC, US Jeffrey R. Hobbet - Holly Springs NC, US Michael Scott Mettler - Durham NC, US Kenneth Dean Timmons - Raleigh NC, US
Assignee:
Lenovo (Singapore) Pte. Ltd. - Tech Park
International Classification:
G06F 12/00 G06F 13/00 G06F 13/28
US Classification:
711162, 711103, 711171
Abstract:
A method and apparatus are disclosed for automatic solid state drive performance recovery. A detection module detects a first SSD exceeding a fragmentation threshold. A plurality of drives comprises the first SSD and stores a data copy of data stored on the first SSD. An erase module erases a mapping table for the first SSD. The mapping table maps Logical Block Addresses LBA to physical addresses for the first SSD. A rebuild module rebuilds the data and the mapping table on the first SSD from the data copy.
System, Method, And Program For Managing A User Key Used To Sign A Message For A Data Processing System
Barry Atkins - Raleigh NC, US David Carroll Challener - Raleigh NC, US Frank Novak - Raleigh NC, US Joseph Gary Rusnak - Durham NC, US Kenneth D. Timmons - Raleigh NC, US William W. Vetter - Raleigh NC, US
Assignee:
Lenovo (Singapore) Pte. Ltd. - Singapore
International Classification:
G06F 15/16
US Classification:
709229, 380273, 380277, 713167, 713183
Abstract:
A system, method, and program for managing a user key used to sign a message for a data processing system having an encryption chip are disclosed. A user is assigned a user key. In order to encrypt and send messages to a recipient(s), the messages are encrypted with the user key. The user key, in turn, is encrypted with an associated key. The associated key is further encrypted using an encryption chip key stored on the encryption chip. The encrypted messages are communicated to a recipient to validate an association of the user with the encrypted messages. The associated key is decrypted with the encryption chip key. The user key is decrypted with the associated key, and the messages are decrypted with the user key. Thereafter, validation of the association of messages with the user is removed by revoking the associated key. In a preferred embodiment, encryption resources are centralized in a server system having the encryption chip.
Apparatus, System, And Method For Memory Configuration Analysis
Daryl Cromer - Cary NC, US Donald R. Frame - Apex NC, US Michael Scott Mettler - Durham NC, US Kenneth Dean Timmons - Raleigh NC, US
Assignee:
Lenovo (Singapore) Pte. Ltd. - Tech Park
International Classification:
G06F 3/03 G06F 3/00 G06F 3/023 G06F 3/027
US Classification:
702186, 702185, 702188, 702189
Abstract:
An apparatus, system, and method are disclosed for memory configuration analysis. A classification module determines an overall performance of an array of memory devices in a computer memory , wherein overall performance has a substantially inverse relationship with a highest quantity of members of a subset of the array and a substantially direct relationship with an individual performance capability of the members. A counting module takes a count of members of the array whose individual performance capability varies in a selected direction from the overall performance of the array. A comparison module takes a selected action such as issuing a memory configuration warning if the count crosses a predetermined threshold comprising a predetermined percentage for comparison with the count, as qualified by the individual performance capability, divided by an unqualified count of members of the array.
Apparatus, System, And Method For Memory Upgrade Path Optimization
Daryl Cromer - Cary NC, US Donald R. Frame - Apex NC, US Michael Scott Mettler - Durham NC, US Kenneth Dean Timmons - Raleigh NC, US
Assignee:
Lenovo (Singapore) Pte. Ltd. - Tech Park
International Classification:
G06F 12/00
US Classification:
711114, 711 5, 711104, 711105, 711170
Abstract:
An apparatus, system, and method are disclosed for memory upgrade optimization. A requirements module receives one or more of a capacity upgrade goal for an overall capacity of the array and a performance upgrade goal for an overall performance of the array. An analysis module identifies a first potential capacity change that can be achieved at a lower overall performance and a second potential capacity change that can be achieved at a higher overall performance. A reconfiguration module generates one or more of a first reconfiguration recommendation calculated to yield an overall capacity improvement that takes into consideration the capacity upgrade goal and the first potential capacity change and a second reconfiguration recommendation calculated to yield an overall performance improvement that takes into consideration the performance upgrade goal and the second potential capacity change.
System And Method For Verifying The Identity Of A Remote Meter Transmitting Utility Usage Data
David Challener - Raleigh NC, US Kenneth Timmons - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L009/00
US Classification:
705063000, 700286000, 702062000
Abstract:
In a central system for receiving reports of utility usage from a number of remote meters, a provision is made for assuring that a received report has actually been transmitted from a meter that has been registered with the central system. During the registration process, the meter transmits its public cryptographic code to the central system. With each report of utility usage, the meter sends a version of a message encrypted with its private cryptographic key. The central system decrypts this message with the meter's public key. If it matches an unencrypted version of the message it is known that the meter sent the report. The unencrypted message may be generated by the central system and transmitted to the meter in a request for a report, or it may be generated by the meter and sent along with the encrypted version.
System And Method For Verifying The Identity Of A Remote Meter Transmitting Utility Usage Data
David Challener - Raleigh NC, US Kenneth Timmons - Raleigh NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G08B 23/00
US Classification:
340870020
Abstract:
In a central system for receiving reports of utility usage from a number of remote meters, a provision is made for assuring that a received report has actually been transmitted from a meter that has been registered with the central system. During the registration process, the meter transmits its public cryptographic code to the central system. With each report of utility usage, the meter sends a version of a message encrypted with its private cryptographic key. The central system decrypts this message with the meter's public key. If it matches an unencrypted version of the message it is known that the meter sent the report. The unencrypted message may be generated by the central system and transmitted to the meter in a request for a report, or it may be generated by the meter and sent along with the encrypted version.
Method For Enticing Computer Users To Return To An Electronic Commerce Portal
Kenneth D. Timmons - Raleigh NC, US Philip L. Childs - Raleigh NC, US Howard Locker - Cary NC, US Michael T. Vanover - Raleigh NC, US
International Classification:
G06Q 30/00
US Classification:
705 14
Abstract:
A method for enticing computer users to return to an electronic commerce portal is disclosed. In response to a user registering to a merchant server for the first time, a unique number is associated with the user. Hardware information is then obtained from a computer utilized by the user. A digital certificate is generated by encrypting the unique number along with the obtained hardware information. The digital certificate is subsequently sent to the user computer for generating a unique customer number to be displayed on a web page of the user computer. On a periodic basis, the merchant server sends a master number to the user computer to be displayed on a web page of the user computer. In response to a notification of the master number matches the unique customer number on the user computer, a prize claiming process can be initiated.