Visiting Fellow, Yale Law School - ISP & Gabriel Ferrucci Professor of Information Systems at Quinnipiac University
Location:
Greater New York City Area
Industry:
Higher Education
Work:
Quinnipiac University since Jul 2002
Visiting Fellow, Yale Law School - ISP & Gabriel Ferrucci Professor of Information Systems
IBM Advanced Technology Lab Jun 2000 - Jun 2002
Senior Software Engineer
Education:
Rutgers, The State University of New Jersey-Newark 1985 - 1992
Ph.D., Management Information Systems
XLRI Jamshedpur 1982 - 1984
PG Dip (Hons) in Management, Management
Interests:
RESEARCH INTERESTS
• The evolution of IT and Telecommunications Policies in developing countries
• The intersection of IS Security, Privacy, and Politics
• Historical and global research in IS/IT
• IS and societal transformation
TEACHING INTERESTS
• IS Security
• Networking & Telecommunications
• IT Strategy and IT Project Management
• Knowledge Management
• Data Modeling, Systems Design & IT Architecture
Jul 2014 to 2000 ERP Application Lead4iAPPS Solutions Private Ltd Chennai, Tamil Nadu Feb 2013 to Jun 2014 Technical Project ManagerUnitedHealthCare, CT, USA
Jun 2001 to May 2012 Sr. Application Development Consultant/ManagerRapidigm, PA, USA
Nov 1998 to Jun 2001 Sr. Oracle Financials ConsultantWipro Systems
Jun 1997 to Nov 1998 System MangerSilverline Industries
Jan 1997 to Jun 1997 Sr. System AnalystSysprom, India
Jul 1995 to Jan 1997 System Analyst
Education:
Madurai Kamaraj University 1991 B.E. in Computer Engineering
Us Patents
Secured And Access Controlled Peer-To-Peer Resource Sharing Method And Apparatus
Brian D. Goodman - Roxbury CT, US John W. Rooney - New Fairfield CT, US Ramesh Subramanian - Woodbury CT, US William C. Sweeney - Norwalk CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/173
US Classification:
709225, 709223, 709229, 713201
Abstract:
A peer-to-peer network propagates searches from client to client. Resources within each client are selectively searched in response to authentication and authorization processes. Authentication information may be included in a search request or may be performed by an authentication process external to the client. Authorization is performed by a process external to the client. Only after authentication or authorization may resources of any particular client be accessed. The system allows for secure propagated searches and resource access in a peer-to-peer network environment. The network may further include a server for maintaining a list of clients connected to the peer-to-peer network in order to more efficiently facilitate peer-to-peer communications.
Centrally Enhanced Peer-To-Peer Resource Sharing Method And Apparatus
Brian D. Goodman - Roxbury CT, US John W. Rooney - New Fairfield CT, US Ramesh Subramanian - Woodbury CT, US William C. Sweeney - Norwalk CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/173 G06F 15/16 G06F 7/00
US Classification:
709244, 709238, 709245, 707 10
Abstract:
A peer-to-peer network has a server that maintains a list of addresses of clients connected to the peer-to-peer network. The server generates seed lists for each of the clients connected to the network from the server maintained list. The clients conduct peer-to-peer searches using the seed list provided by the server. The seed lists may be either randomly generated or generated to facilitate network objectives. The clients may periodically request seed list refreshing. The peer-to-peer network may further include authentication and authorization search security checks.
Secured And Access Controlled Peer-To-Peer Resource Sharing
Brian D. Goodman - Roxbury CT, US John W. Rooney - New Fairfield CT, US Ramesh Subramanian - Woodbury CT, US William C. Sweeney - Norwalk CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/173
US Classification:
709225, 709229, 709223, 713176, 726 4
Abstract:
A peer-to-peer network propagates searches from client to client. Resources within each client are selectively searched in response to authentication and authorization processes. Authentication information may be included in a search request or may be performed by an authentication process external to the client. Authorization is performed by a process external to the client. Only after authentication or authorization may resources of any particular client be accessed. The system allows for secure propagated searches and resource access in a peer-to-peer network environment. The network may further include a server for maintaining a list of clients connected to the peer-to-peer network in order to more efficiently facilitate peer-to-peer communications.
Centrally Enhanced Peer-To-Peer Resource Sharing Method And Apparatus
Brian D. Goodman - Roxbury CT, US John W. Rooney - New Fairfield CT, US Ramesh Subramanian - Woodbury CT, US William C. Sweeney - Norwalk CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
709225, 709230, 709231, 709232, 709244
Abstract:
A peer-to-peer network has a server that maintains a list of addresses of clients connected to the peer-to-peer network. The server generates seed lists for each of the clients connected to the network from the server maintained list. The clients conduct peer-to-peer searches using the seed list provided by the server. The seed lists may be either randomly generated or generated to facilitate network objectives. The clients may periodically request seed list refreshing. The peer-to-peer network may further include authentication and authorization search security checks.
Method, System, And Storage Medium For Providing Intelligent Distribution Of Software And Files
Nianjun Zhou - Somers NY, US Ramesh Subramanian - North Haven CT, US
Assignee:
International Business Machines - Armonk NY
International Classification:
G06F015/173 G06F009/44 G06F009/445
US Classification:
709223000, 717173000, 717178000
Abstract:
Exemplary embodiments of the invention relate to a method, system, and storage medium for providing software and file distribution management. The method comprises loading a user profile for a client system into a server via an intelligent agent. The profile contains current software installed, files downloaded, and registered channels for the client system. The method also includes listening in to registered channels by an intelligent agent resident on the client system. If a new message is received, the method includes determining if the new message is applicable to the client system. The applicable messages result in querying the client system to execute a task based upon the message, executing the task in accordance with the client system's preferences, and updating a look-up system with the results of the task execution.