Lorin R Sutton

age ~55

from Leesburg, VA

Also known as:
  • Lorin Ray Sutton
  • Lorin Yutton

Lorin Sutton Phones & Addresses

  • Leesburg, VA
  • Tucson, AZ
  • Winchester, VA
  • Woodbridge, VA
  • Chantilly, VA
  • Reston, VA

Work

  • Company:
    Cisco systems, inc
    Jun 2010
  • Position:
    Engineer - custom applications

Education

  • School / High School:
    University of Phoenix
    2013
  • Specialities:
    Bachelors of Science in Information Technology

Resumes

Lorin Sutton Photo 1

Lorin Sutton

view source
Lorin Sutton Photo 2

Lorin Sutton Winchester, VA

view source
Work:
Cisco Systems, Inc

Jun 2010 to 2000
Engineer - Custom Applications
Booz Allen Hamilton
McLean, VA
Nov 2007 to Jun 2010
Associate
AOL, LLC
Dulles, VA
May 1995 to Nov 2007
Senior Programmer / Analyst
Education:
University of Phoenix
2013 to 2000
Bachelors of Science in Information Technology

Vehicle Records

  • Lorin Sutton

    view source
  • Address:
    9325 E Daniel Pl, Tucson, AZ 85710
  • Phone:
    5202964477
  • VIN:
    KMHDU4AD1AU835724
  • Make:
    HYUNDAI
  • Model:
    ELANTRA
  • Year:
    2010

Us Patents

  • Reducing Duplication Of Files On A Network

    view source
  • US Patent:
    20030105716, Jun 5, 2003
  • Filed:
    Feb 4, 2002
  • Appl. No.:
    10/061270
  • Inventors:
    Lorin Sutton - Woodbridge VA, US
    Craig Despeaux - Reston VA, US
    Walter Hall - Berryville VA, US
    Michael Adamski - Marshall VA, US
  • International Classification:
    G06F017/60
    G06F007/00
    G06F015/16
  • US Classification:
    705/050000, 707/006000, 709/206000
  • Abstract:
    Systems and techniques for improving the performance of a network system having one or more sending systems and one or more receiving systems may include determining the digital signature of a received digital file, comparing the digital signature against stored digital signatures of digital files accessible to the receiving system, and determining whether to store the received digital file and/or a location identifier for the stored version of the received digital file based on a result of the comparison.
  • Identifying Unwanted Electronic Messages

    view source
  • US Patent:
    20080120704, May 22, 2008
  • Filed:
    Jan 28, 2008
  • Appl. No.:
    12/020630
  • Inventors:
    Lorin Sutton - Winchester VA, US
    Craig Despeaux - Reston VA, US
    Michael Adamski - Marshall VA, US
  • Assignee:
    AOL LLC - Dulles VA
  • International Classification:
    H04L 9/32
    G06F 15/16
  • US Classification:
    726004000, 709206000
  • Abstract:
    An unwanted message may be identified by inspecting the payload portion of a message being communicated, comparing the characteristics of the payload portion with stored data indicating characteristics of other messages, and identifying a security condition based on a comparison of the message inspected. The characteristics inspected may include the payload portion of a message or the whole message when the characteristics are being compared against messages being exchanged on more than one local exchanging system. Furthermore, the characteristics of messages may be tracked for comparison against the characteristics of future messages. A threshold number of those characteristics may subsequently implicate a hostile security condition, even if a current comparison of these characteristics does not reach the threshold necessary to implicate a hostile security condition.
  • Identifying Unwanted Electronic Messages

    view source
  • US Patent:
    20020162025, Oct 31, 2002
  • Filed:
    Jan 31, 2002
  • Appl. No.:
    10/059147
  • Inventors:
    Lorin Sutton - Woodbridge VA, US
    Craig Despeaux - Reston VA, US
    Michael Adamski - Marshall VA, US
  • International Classification:
    G06F011/30
  • US Classification:
    713/201000, 709/223000
  • Abstract:
    An unwanted message may be identified by inspecting the payload portion of a message being communicated, comparing the characteristics of the payload portion with stored data indicating characteristics of other messages, and identifying a security condition based on a comparison of the message inspected. The characteristics inspected may include the payload portion of a message or the whole message when the characteristics are being compared against messages being exchanged on more than one local exchanging system. Furthermore, the characteristics of messages may be tracked for comparison against the characteristics of future messages. A threshold number of those characteristics may subsequently implicate a hostile security condition, even if a current comparison of these characteristics does not reach the threshold necessary to implicate a hostile security condition.

Youtube

Teaser

A quick "teaser" video of Joseph & Madilyn's wedding video. Something ...

  • Duration:
    16s

To the dog park...

The layer of drool is worth the fun. These guys love it every week.

  • Duration:
    29s

Sutton Stracke Gets Ready To Send Her Son to ...

Lisa Rinna enjoys her breakfast at home while she calls the girls to i...

  • Duration:
    7m 9s

Hmm, this can't be good.

via YouTube Capture.

  • Duration:
    19s

Another sparkler

via YouTube Capture.

  • Duration:
    19s

My take on "real housewives of Beverly Hills"...

realhousewives #realhousewiveso... #kylerichards #camille.

  • Duration:
    20m 32s

Googleplus

Lorin Sutton Photo 3

Lorin Sutton


Get Report for Lorin R Sutton from Leesburg, VA, age ~55
Control profile