Jun 2010 to 2000 Engineer - Custom ApplicationsBooz Allen Hamilton McLean, VA Nov 2007 to Jun 2010 AssociateAOL, LLC Dulles, VA May 1995 to Nov 2007 Senior Programmer / Analyst
Education:
University of Phoenix 2013 to 2000 Bachelors of Science in Information Technology
Lorin Sutton - Woodbridge VA, US Craig Despeaux - Reston VA, US Walter Hall - Berryville VA, US Michael Adamski - Marshall VA, US
International Classification:
G06F017/60 G06F007/00 G06F015/16
US Classification:
705/050000, 707/006000, 709/206000
Abstract:
Systems and techniques for improving the performance of a network system having one or more sending systems and one or more receiving systems may include determining the digital signature of a received digital file, comparing the digital signature against stored digital signatures of digital files accessible to the receiving system, and determining whether to store the received digital file and/or a location identifier for the stored version of the received digital file based on a result of the comparison.
Lorin Sutton - Winchester VA, US Craig Despeaux - Reston VA, US Michael Adamski - Marshall VA, US
Assignee:
AOL LLC - Dulles VA
International Classification:
H04L 9/32 G06F 15/16
US Classification:
726004000, 709206000
Abstract:
An unwanted message may be identified by inspecting the payload portion of a message being communicated, comparing the characteristics of the payload portion with stored data indicating characteristics of other messages, and identifying a security condition based on a comparison of the message inspected. The characteristics inspected may include the payload portion of a message or the whole message when the characteristics are being compared against messages being exchanged on more than one local exchanging system. Furthermore, the characteristics of messages may be tracked for comparison against the characteristics of future messages. A threshold number of those characteristics may subsequently implicate a hostile security condition, even if a current comparison of these characteristics does not reach the threshold necessary to implicate a hostile security condition.
Lorin Sutton - Woodbridge VA, US Craig Despeaux - Reston VA, US Michael Adamski - Marshall VA, US
International Classification:
G06F011/30
US Classification:
713/201000, 709/223000
Abstract:
An unwanted message may be identified by inspecting the payload portion of a message being communicated, comparing the characteristics of the payload portion with stored data indicating characteristics of other messages, and identifying a security condition based on a comparison of the message inspected. The characteristics inspected may include the payload portion of a message or the whole message when the characteristics are being compared against messages being exchanged on more than one local exchanging system. Furthermore, the characteristics of messages may be tracked for comparison against the characteristics of future messages. A threshold number of those characteristics may subsequently implicate a hostile security condition, even if a current comparison of these characteristics does not reach the threshold necessary to implicate a hostile security condition.
Youtube
Teaser
A quick "teaser" video of Joseph & Madilyn's wedding video. Something ...
Duration:
16s
To the dog park...
The layer of drool is worth the fun. These guys love it every week.
Duration:
29s
Sutton Stracke Gets Ready To Send Her Son to ...
Lisa Rinna enjoys her breakfast at home while she calls the girls to i...