Engineer, AS Enterprise Collaboration Platform at Cisco Systems
Location:
Washington D.C. Metro Area
Industry:
Computer Software
Work:
Cisco Systems - Advanced Services - Custom Development since Jun 2010
Engineer, AS Enterprise Collaboration Platform
Booz Allen Hamilton Nov 2007 - Jun 2010
Associate
AOL, LLC - Internet Services Mar 2002 - Oct 2007
Principal Systems Programmer / Analyst
America Online, Inc. - Anti-Spam Operations Jul 2002 - Mar 2003
Principal Systems Programmer
America Online, Inc. Jan 2000 - Jul 2002
Technical Manager
Education:
University of Phoenix 2006 - 2010
Skills:
Hibernate MySQL AJAX SOAP PostgreSQL SQL Spring JSP DHTML JSF Servlets XML Mac OS X CSS MS Office Suite Conflict Resolution Vim GWT Apache Tomcat Perl Web Services Linux JavaScript Subversion Java J2EE Solaris Unix Eclipse HTML Red Hat Linux System Administration Agile Operating Systems SOA Software Engineering Windows JDBC Web Applications Software Development Weblogic Agile Methodologies Java Enterprise Edition ZeroMQ Message Broker RESTful WebServices
Jun 2010 to 2000 Engineer - Custom ApplicationsBooz Allen Hamilton McLean, VA Nov 2007 to Jun 2010 AssociateAOL, LLC Dulles, VA May 1995 to Nov 2007 Senior Programmer / Analyst
Education:
University of Phoenix 2013 to 2000 Bachelors of Science in Information Technology
Lorin Sutton - Woodbridge VA, US Craig Despeaux - Reston VA, US Walter Hall - Berryville VA, US Michael Adamski - Marshall VA, US
International Classification:
G06F017/60 G06F007/00 G06F015/16
US Classification:
705/050000, 707/006000, 709/206000
Abstract:
Systems and techniques for improving the performance of a network system having one or more sending systems and one or more receiving systems may include determining the digital signature of a received digital file, comparing the digital signature against stored digital signatures of digital files accessible to the receiving system, and determining whether to store the received digital file and/or a location identifier for the stored version of the received digital file based on a result of the comparison.
Lorin Sutton - Winchester VA, US Craig Despeaux - Reston VA, US Michael Adamski - Marshall VA, US
Assignee:
AOL LLC - Dulles VA
International Classification:
H04L 9/32 G06F 15/16
US Classification:
726004000, 709206000
Abstract:
An unwanted message may be identified by inspecting the payload portion of a message being communicated, comparing the characteristics of the payload portion with stored data indicating characteristics of other messages, and identifying a security condition based on a comparison of the message inspected. The characteristics inspected may include the payload portion of a message or the whole message when the characteristics are being compared against messages being exchanged on more than one local exchanging system. Furthermore, the characteristics of messages may be tracked for comparison against the characteristics of future messages. A threshold number of those characteristics may subsequently implicate a hostile security condition, even if a current comparison of these characteristics does not reach the threshold necessary to implicate a hostile security condition.
Lorin Sutton - Woodbridge VA, US Craig Despeaux - Reston VA, US Michael Adamski - Marshall VA, US
International Classification:
G06F011/30
US Classification:
713/201000, 709/223000
Abstract:
An unwanted message may be identified by inspecting the payload portion of a message being communicated, comparing the characteristics of the payload portion with stored data indicating characteristics of other messages, and identifying a security condition based on a comparison of the message inspected. The characteristics inspected may include the payload portion of a message or the whole message when the characteristics are being compared against messages being exchanged on more than one local exchanging system. Furthermore, the characteristics of messages may be tracked for comparison against the characteristics of future messages. A threshold number of those characteristics may subsequently implicate a hostile security condition, even if a current comparison of these characteristics does not reach the threshold necessary to implicate a hostile security condition.
Youtube
Teaser
A quick "teaser" video of Joseph & Madilyn's wedding video. Something ...
Duration:
16s
To the dog park...
The layer of drool is worth the fun. These guys love it every week.
Duration:
29s
Sutton Stracke Gets Ready To Send Her Son to ...
Lisa Rinna enjoys her breakfast at home while she calls the girls to i...