Tableau Software
Senior Quality Assurance Engineer
Tableau Software
Quality Assurance Engineer
Coco Communications Corp. Oct 2007 - May 2014
Ste
Coco Commmunications Oct 2007 - May 2014
Software Test Engineer
Education:
California State University, Long Beach 1999 - 2003
Bachelors, Bachelor of Science, Computer Science
Skills:
Agile Methodologies Test Planning Linux Software Quality Assurance Scrum Software Development Software Design Mobile Devices Python C Mobile Applications C++ Java Unix C# Device Drivers Javascript Css Product Management
Streaming Media Concern since 2004
Data Administration
Cintech LLC 1983 - 2008
Consultant
ATTWS 1993 - 1999
Manager, Database Operations
Education:
Western Washington University 1979 - 1982
Skills:
Data Analysis Robotics Embedded Software Research Embedded Systems Databases Python Perl Shell Scripting Engineering Management Software Engineering Programming Systems Engineering Distributed Systems Saas Linux Requirements Analysis Agile Methodologies Software Project Management Management Product Management Integration Testing Subversion Telecommunications C++ Mobile Devices Software Development Sdlc Sql Pl/Sql Ms Sql Server Oracle Database Jira Project Management Vendor Management Cloud Computing Software Design Oracle Database Administration Database Administration Rman It Project and Program Management Performance Tuning Payment Card Industry Data Security Standard Pci Data Guard
Interests:
Scrambling Engineering Management Autonomous Systems Mobile/Embedded Systems Data Modelling Visualization [[ Quasi Technical Remote Sensing Environment Merchant Marine Engineering Science and Technology Complex Systems Snowshoeing Sailing Hiking Disaster and Humanitarian Relief Robotics Visualization[[ Quasi Technical Scuba Technical Cert Qualified
Patrick Drew McDaniel - Chatham NJ, US Martin Joel Strauss - Summit NJ, US
Assignee:
AT&T Intellectual Property II, L.P. - Reno NV
International Classification:
H04M 1/66
US Classification:
455411, 455410, 37911201, 37911414
Abstract:
The present invention is a system and method for establishing a secure connection using a public a wireless telephone network. The method utilizes a proxy base station and establishes an encrypted session over the public wireless network between a wireless handset and the proxy base station. The proxy base station further establishes a connection with second communication station such as a landline phone. The proxy base station determines a most secure channel between the base station and the second communication station by consulting a database of channels and associated measures of security.
Automated Disambiguation Of Fixed-Serverport-Based Applications From Ephemeral Applications
Oliver Spatscheck - Randolph NJ, US Subhabrata Sen - New Providence NJ, US Jacobus E. Van der Merwe - New Providence NJ, US Patrick McDaniel - State College PA, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
G06F 15/173
US Classification:
709224
Abstract:
Provided are methods for partitioning communication data in a network and disambiguating fixed or non-ephemeral communication data from ephemeral communication data and services. In one example, kmeans data clustering is used to partition or cluster server ports based on a location of the server ports in a 2-dimensional space. The location of the server ports may be based on a number of connections per server port and the number of servers using that port.
End-To-End Secure Wireless Communication For Requesting A More Secure Channel
Patrick Drew McDaniel - Chatham NJ, US Martin Joel Strauss - Summit NJ, US
Assignee:
AT&T Intellectual Property II, L.P. - Atlanta GA
International Classification:
H04M 1/66
US Classification:
455411, 455410, 37911201, 37911414
Abstract:
The present invention is a system and method for establishing a secure connection using a public a wireless telephone network. The method utilizes a proxy base station and establishes an encrypted session over the public wireless network between a wireless handset and the proxy base station. The proxy base station further establishes a connection with second communication station such as a landline phone. The proxy base station determines a most secure channel between the base station and the second communication station by consulting a database of channels and associated measures of security.
Method And Apparatus For On Demand Certificate Revocation Updates
Aviel Rubin - West Caldwell NJ, US Patrick McDaniel - Ann Arbor MI, US
International Classification:
G06F015/173
US Classification:
709/225000, 709/223000
Abstract:
A method of distributing revocation state information includes receiving first update scheduling information from a first party, and sending digital certificate revocation state information to the first party according to a schedule that is based on the first update scheduling information.
Method And System For Determining And Enforcing Security Policy In A Communication Session
Patrick McDaniel - Chatham NJ, US Atul Prakash - Ann Arbor MI, US
International Classification:
G06F011/30
US Classification:
713/201000, 713/153000, 380/277000
Abstract:
A method and system for determining and enforcing security policy in a communication session are provided in distributed systems. Policy encompasses the provisioning, authorization, and access control within the protected environment. Hence, all communication security requirements are explicitly stated through policy. A policy instantiation is constructed at run-time through policy determination. Conditional, abstract, and discretionary policies stated by communication participants are reconciled to arrive at an instantiation. The resulting instantiation is a concrete specification of the mechanisms, configurations, and access control model to be implemented by the session. The semantics of an instantiation are achieved through policy enforcement. The policy enforcement architecture implements session policies through the composition and configuration of security mechanisms using a novel event-bus architecture. Policy is enforced through the observation of and reaction to relevant events. The method and system of the invention diverges from past subscription-based event architectures by introducing additional infrastructure allowing significant implementation flexibility, robustness, and efficiency.
William Aiello - Vancouver, CA Charles Kalmanek - Short Hills NJ, US William Leighton - Scotch Pines NJ, US Patrick McDaniel - State College PA, US Subhabrata Sen - New Providence NJ, US Oliver Spatscheck - Randolph NJ, US Jacobus Van der Merwe - New Providence NJ, US
Assignee:
AT&T Corp - New York NY
International Classification:
G06F 15/16
US Classification:
726011000
Abstract:
A reverse firewall for removing undesirable traffic from a computing network, such as a virtual private network (VPN), is disclosed. The reverse firewall uses firewall rules that may be determined and maintained within the enterprise network to control communication sent between computers in the computing network. The reverse firewall rules may be used to identify the communications between computers in the network that are undesirable and/or intrusive. For example, a computer in a network that is infected with a worm or that is surreptitiously hosting a denial-of-service attack may be identified by the reverse firewall and quarantined. The reverse firewall may be implemented in hardware and/or software.
Method And Apparatus For Creating Router Configuration
SUBHABRATA SEN - Providence NJ, US Albert G. Greenberg - Seattle WA, US Charles Kalmanek - Short Hills NJ, US Patrick Drew McDaniel - State College PA, US
International Classification:
H04L 12/28
US Classification:
370254
Abstract:
A method and apparatus for creating one or more router configurations in a network are disclosed. For example, the method receives a request to create a router configuration, and retrieves automatically one or more templates in response to the request. The method then instantiates the router configuration by applying the one or more templates.
Method And Apparatus For Creating Router Configuration Templates
SUBHABRATA SEN - N. Providence NJ, US ALBERT G. GREENBERG - Seattle WA, US CHARLES KALMANEK - Short Hills NJ, US PATRICK DREW MCDANIEL - State College PA, US
International Classification:
H04L 12/28 H04L 12/66
US Classification:
370254, 370352
Abstract:
A method and apparatus for creating router configuration templates are disclosed. For example, the method creates one or more command strings for performing at least one of: a context substitution, or a functional substitution, and stores the one or more command strings as the router configuration template.
Sacramento, CA Pacific Palisades, CA Humboldt County, CA Seattle, WA Los Angeles, CA
Work:
CAL FIRE - Forester
Education:
Humboldt State University
Patrick Mcdaniel
Work:
LKQ Corporation - Analyst
Education:
Ohio University - Applied Business Tech
Tagline:
I love therefore I am
Patrick Mcdaniel
About:
Marketing mad scientist at 2nd Mile Marketing. In former lives Pat has pastored churches, been a CPA, been a sales manager, and an all around funny guy. Hopefully, he still is.
Tagline:
I find and share interesting (insightful) ideas- for marketing your biz online. And for life.