Hotel Somerset Bridgewater, NJ Mar 2013 to Aug 2013 Night AuditorBest Western East Brunswick, NJ Sep 2011 to Apr 2013 Front Desk AgentHotel Indigo Basking Ridge, NJ Jan 2011 to Jun 2011 Night Auditor/Night ManagerSomerset Hills Hotel Township of Warren, NJ Dec 2009 to Jan 2011 Guest Service Representative/Night AuditorFairfield Inn & Suites by Marriott Avenel, NJ Jan 2008 to Dec 2009 Night Manager/AuditorCountry Inn & Suites by Carlson Elizabeth, NJ Jul 2005 to Mar 2009 Supervisor/ MOD
Aug 2011 to 2000 Resident chaplain working towards professional certificationHernando Christian Academy Brooksville, FL Aug 2010 to Jun 2011 High School Math InstructorHillsborough County Public Schools Brandon, FL Jun 2007 to Jun 2010 High school physics instructorCoral Springs Christian Academy Coral Springs, FL Aug 2006 to Jun 2007 Technical directorGrace Christian School Brandon, FL Aug 2004 to Jun 2006 High School Science InstructorVerizon Data Services Tampa, FL Jul 2002 to Nov 2003 Systems TesterVerizon Data Services Tampa, FL Nov 1999 to Jun 2001 Systems EngineerVerizon Data Systems Tampa, FL Jun 1997 to Nov 1999 Systems EngineerVerizon Data Systems Tampa, FL Jul 1994 to Jun 1997 System TesterProduction Support Tampa, FL Jun 1992 to Jul 1994 Systems EngineerGTE Information Services Tampa, FL Jan 1990 to Jun 1992 Senior Critical Support AnalystGTE Telecom Tampa, FL Jul 1989 to Jan 1990 Release EngineerCoopers & Lybrand Lansing, MI Jun 1988 to Jul 1989 IT ConsultantElectronic Data Systems Detroit, MI May 1985 to Jun 1988 Systems EngineerUnited States Army Fort Campbell, KY May 1980 to May 1985 Commisioned Officer
Education:
Asbury Theological Seminary Orlando, FL 2010 to 2013 Master Of Divinity in DivinityAsbury Theological Seminary Orlando, FL 2004 to 2007 MA in Theological StudiesUniversity of Southern California Los Angeles, CA 1981 to 1983 MS in Systems ManagementWest Point New York, NY 1976 to 1980 United States Military Academy in Math/General Engineering
Skills:
Experienced and proficient in all phases of systems life cycle management to include requirements gathering, design, coding (JCL, DCL, COBOL, FORTRAN, PL1), testing, implementation, and production support
2014 to 2000 Stormwater Compliance ManagerWOODLAND FOREST CONSULTING Boise, ID 2008 to 2014 Principal Project ManagerW.H. MOORE COMPANY REAL ESTATE DEVELOPMENT Boise, ID 2008 to 2008 Commercial Real Estate Sales and Leasing ManagerNAI KOWALLIS & MACKEY LLC Boise, ID 2003 to 2008 Commercial Real Estate BrokerNAI KOWALLIS & MACKEY LLC
2003 to 2008CYBERSYSTEMS INFORMATION TECHNOLOGIES Boise, ID 1996 to 2003 Project/Operations ManagerU.S. FOREST SERVICE, BOISE NATIONAL FOREST Mountain Home, ID 1992 to 1996 Supervisory Forester / Senior Contract AdministratorU.S. FOREST SERVICE, TONGASS NATIONAL FOREST Thorne Bay, AK 1985 to 1992 Forester / Logging EngineerU.S. FOREST SERVICE, TONGASS NATIONAL FOREST
1985 to 1992 Senior member of forest
Education:
Forest Engineering Institute, Oregon State University 1989 Bachelor of Science in Forest ManagementVirginia Polytechnic Institute and State University 1987
Dec 2010 to 2000 Senior Network Security EngineerUS Air Force Reserves, Brooks City Base TX
Mar 2005 to 2000 Electronic System Security AnalystUS Army Medical Information Technology Center/ Modis
Dec 2009 to Dec 2010 Network Security EngineerLockheed Martin
Mar 2007 to Dec 2009 Information Assurance EngineerCCC Group Inc San Antonio, TX Dec 2004 to Mar 2007 Administrative Technician IIU.S. Marine Corps Reserve San Antonio, TX Nov 2000 to Mar 2005 Data Network Specialist
Alexandre Gerber - Madison NJ, US Jia Wang - Randolph NJ, US Oliver Spatscheck - Randolph NJ, US Jennifer Yates - Morristown NJ, US Michael Merritt - Mendham NJ, US
A method includes receiving network distance information, receiving a request from a client for an identity of a peer providing content, and identifying a first peer and a second peer providing the content. The network distance information includes a compilation of network distance information provided by a plurality of service providers. The method further includes determining that a network distance between the first peer and the client is less than a network distance between the second peer and the client based on the network distance information, and providing the identity of the first peer to the client.
Alexandre Gerber - Madison NJ, US Jin Wang - Randolph NJ, US Oliver Spatscheck - Randolph NJ, US Jennifer Yates - Morristown NJ, US Michael Merritt - Mendham NJ, US
A method includes receiving network distance information, receiving a request from a client for an identity of a peer providing content, and identifying a first peer and a second peer providing the content. The network distance information includes a compilation of network distance information provided by a plurality of service providers. The method further includes determining that a network distance between the first peer and the client is less than a network distance between the second peer and the client based on the network distance information, and providing the identity of the first peer to the client.
Steven M. Bellovin - Westfield NJ Michael J. Merritt - Berkeley Heights NJ
Assignee:
AT&T Corp. - Murray Hill NJ
International Classification:
H04K 100
US Classification:
380 25
Abstract:
A cryptographic communication system is disclosed which permits computer users to authenticate themselves to a computer system without requiring that the computer system keep confidential the password files used to authenticate the respective user's identities. The invention is useful in that it prevents a compromised password file from being leveraged by crafty hackers to penetrate the computer system.
Steven M. Bellovin - Westfield NJ Michael Merritt - Berkeley Heights NJ
Assignee:
AT&T Bell Laboratories - Murray Hill NJ
International Classification:
H04L 900
US Classification:
380 21
Abstract:
A cryptographic communication system. The system, which employs a novel combination of public and private key cryptography, allows two parties, who share only a relatively insecure password, to bootstrap a computationally secure cryptographic system over an insecure network. The system is secure against active and passive attacks, and has the property that the password is protected against offline "dictionary" attacks. If Alice and Bob are two parties who share the password P one embodiment of the system involves the following steps: (1) Alice generates a random public key E, encrypts it with P and sends P(E) to Bob; (2) Bob decrypts to get E, encrypts a random secret key R with E and sends E(R) to Alice; (3) Alice decrypts to get R, generates a random challenge C. sub. A and sends R(C. sub. A) to Bob; (4) Bob decrypts to get C. sub.
Yehuda Afek - Berkeley Heights NJ Michael J. Merritt - Berkeley Heights NJ Gadi Taubenfeld - Murray Hill NJ
Assignee:
AT&T Corp. - Murray Hill NJ
International Classification:
G06F 1100
US Classification:
395575
Abstract:
Memories which have new benign failure modes. The new failure modes are the omission-crash mode and the eventual-crash mode. Memories having either of these modes fail more benignly than memories having the omission failure mode, but unlike memories having the crash failure mode, memories with the novel failure modes may be used to construct gracefully-degrading fault tolerant objects. Implementations of memories with the new failure modes are disclosed, along with implementations of fault-tolerant objects made from memories with the new failure modes.
Oliver Wendell Holmes School Philadelphia PA 1960-1966, William B. Mann Elementary School Philadelphia PA 1966-1967, Beeber Junior High School Philadelphia PA 1966-1970, Columbia School Philadelphia PA 1972-1973