Dr. Morgan graduated from the University of Massachusetts Medical School in 1997. He works in Beverly, MA and 1 other location and specializes in Pediatrics. Dr. Morgan is affiliated with MassGeneral For Children At North Shore Medical Center.
Dr. Morgan graduated from the Michigan State University College of Osteopathic Medicine in 1981. He works in Traverse City, MI and 1 other location and specializes in Urgent Care Medicine. Dr. Morgan is affiliated with Munson Medical Center.
Dr. Morgan graduated from the Oregon Health & Science University School of Medicine in 1999. He works in Sussex, WI and specializes in Family Medicine. Dr. Morgan is affiliated with Oconomowoc Memorial Hospital and Waukesha Memorial Hospital.
Radiology Associates Of Northern Kentucky 375 Thomas More Pkwy STE 209, Fort Mitchell, KY 41017 8593414842 (phone), 8593314319 (fax)
Education:
Medical School Ohio University College of Osteopathic Medicine Graduated: 1992
Languages:
English
Description:
Dr. Morgan graduated from the Ohio University College of Osteopathic Medicine in 1992. He works in Crestview Hills, KY and specializes in Diagnostic Radiology. Dr. Morgan is affiliated with St Elizabeth Healthcare Florence.
Ying Chen - San Jose CA Edward Gustav Chron - Sunnyvale CA Windsor Wee Sun Hsu - Sunnyvale CA Stephen Paul Morgan - San Jose CA Honesty Cheng Young - Saratoga CA
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1200
US Classification:
711 4, 714 6
Abstract:
A system for ensuring high reliability in a block service disk array system while promoting high performance by logically writing all changes to strides on the array while physically writing ahead to a log only a subset of the changes. Specifically, for changes of only a strip or so, the changes are written to a log, along with a commit record, and then written to disk, later deleting the changes from the log. In contrast, for relatively larger changes, i. e. , for an entire (or nearly entire) stride, the old stride is not overwritten by the new, but rather is written to a new location on the disk, with the new and old locations and a commit record (but not the new stride itself) being logged and with the entries for the locations in the stride mapping table swapped with each other. In an alternate embodiment, blocks can be written to temporary locations in a RAID-1 area and lazily moved to home locations in a RAID-5 area of an array of disks.
Interlock For Preventing Human Error In Hot Pluggable Systems
Windsor Wee Sun Hsu - Sunnyvale CA Stephen Paul Morgan - San Jose CA Shauchi Ong - San Jose CA Honesty Cheng Young - Saratoga CA
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1300
US Classification:
710304, 710302, 361193, 310325
Abstract:
A hot pluggable system includes an interlock between a component fail detect module and a component lock mechanism, such that the component is locked in place when it operates properly and is automatically released to permit a person to remove the component from the system when the component fails. In this way, the risk of human errors in removing the wrong component is reduced.
Security Method And System For Persistent Storage And Communications On Computer Network Systems And Computer Network Systems Employing The Same
A multi-stage login procedure and system involves a first stage in which a login ID and a public key (encrypted) is transmitted from a client computer to a server computer and a key-exchange key (encrypted) is provided from the server computer to the client computer. In a second stage, a first split symmetric key and a server authentication string is generated and encrypted by the client computer and then transmitted to the server computer. In addition, the server computer generates a second split symmetric key and combines the same with the first split symmetric key to obtain a complete symmetric key for encrypting further communications from the server to the client computer. The server also generates a client authentication string, encrypts the same and transmits the encrypted string, the server authentication string (encrypted and incremented) and the second split symmetric key (encrypted) to the client computer. In a third stage, the client computer uses the server authentication string to authenticate the server. In addition, the client computer combines the second split symmetric key with the first split symmetric key to obtain the complete symmetric key for encrypting further communications from the client computer to the server computer.
Internet Authentication With Multiple Independent Certificate Authorities
Stephen Paul Morgan - San Jose CA, US John Irish - Olney MD, US Frank Michael Pittelli - Edgewater MD, US Michael David Varga - Milpitas CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/00
US Classification:
713175, 713157
Abstract:
A system for authentication to support secure data transfer includes a protocol wherein a certificate payload, an ID payload, and a signature payload all respectively contain at least two certificates, IDs, and signatures, concatenated together. The certificates are generated by different certificate authorities (CA) that have no trust relationship with each other. One certificate can be granted to a person and another to a particular host computer intended to be used by the person, so that for secure data transfer to take place, both a certified user and a certified host computer must be involved.
System And Method To Use Unmodified Operating System On Diskless Computer
International Business Machines Corporation - Armonk NY
International Classification:
G06F 13/12 G06F 13/38
US Classification:
710 62, 710 74
Abstract:
A system and method for using a conventional, unmodified operating system that routinely issues disk I/O requests in a diskless network computer. An adapter receives the disk I/O requests and translates them to network I/O requests, transparently to the CPU. The requests are satisfied using the network. In this way, the operating system need not be modified to issue network calls instead of disk requests.
Tim Harnett - Mountain View CA, US Achyutram Bhamidipaty - San Jose CA, US Abinas Tewari - San Jose CA, US Stephen Manley - Livermore CA, US Stephen Morgan - San Jose CA, US Peter Nicklin - San Jose CA, US Jean-Francois Roy - San Leandro CA, US
Assignee:
TIBCO Software Inc. - Palo Alto CA
International Classification:
G06F 7/00 G06F 17/30
US Classification:
707755
Abstract:
Methods, program products, and systems implementing dynamic parsing rules are disclosed. Log data from a variety of log producers can be parsed using parsing rules to generate information about an information system. The parsing rules can include system parsing rules and custom parsing rules. A state machine can be used to detect conflicts between various parsing rules. A central server can distribute the system parsing rules and custom parsing rules to one or more remote servers for distributed processing. In a hierarchical parsing system, a first tier parser can be used to identify types of sources generating the log data. Log data from each type of log source can be sent to a second tier parser that corresponds to the type of log source.
Method For Managing Workloads In An Autonomic Computer System For Improved Performance
Stephen Morgan - San Jose CA, US Edward Chron - Sunnyvale CA, US Lance Russell - Hollister CA, US
International Classification:
G06F015/173
US Classification:
709/226000
Abstract:
A method and system for managing workloads in an autonomic computer system based on feedback and feed-forward performance information. The method establishes a performance objective for the system, determines a measure of instantaneous demand in the system, continuously tracks the objective with respect to the measure, forecast a future demand based on an autoregressive time series of the system, and adjusts the control parameters of the system to meet the objective. The performance objective is associated with a confidence level and typically includes a desired system response time. The tracking step includes obtaining performance data on the system and storing the performance data in a persistent data store. The demand forecasting uses a Spectral Forecasting procedure to forecast a future workload from a present workload.
Edward Chron - Sunnyvale CA, US Frederick Douglis - Basking Ridge NJ, US Stephen Morgan - San Jose CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30
US Classification:
707200000
Abstract:
A mechanism is provided that aggregates data in a way that permits data to be deleted efficiently, while minimizing the overhead necessary to support bulk deletion of data. A request is received for automatic deletion of segments in a container and a waterline is determined for the container. A determination is made if at least one segment in the container falls below the waterline. Finally, in response to one segment falling below the waterline, the segment from the container is deleted. Each object has an associated creation time, initial retention value, and retention decay curve (also known as a retention curve). At any point, based on these values and the current time, the object's current retention value may be computed. The container system continually maintains a time-varying waterline: at any point, objects with a retention value below the waterline may be deleted.
Jun 2012 to 2000 Account ExecutiveBBDO NY New York, NY Jun 2010 to Jun 2012 Assistant Account ExecutiveMcCann Erickson New York, NY Jun 2009 to Aug 2009 Strategic Planning Department InternSave Darfur Coalition Washington, DC Jun 2008 to Aug 2008 Domestic Policy InternPowell Tate Weber Shandwick Washington, DC Jun 2007 to Aug 2007 Public Affairs Intern"Full Court Press" Hamilton, NY Sep 2006 to Mar 2007 Co-hostWalter Reed Army Medical Center Washington, DC Jun 2005 to 2006 Volunteer
Education:
Colgate University Hamilton, NY May 2010 Bachelor of Arts in English
Jun 2011 to 2000 Volunteer/ Park Interpreterxerox Colorado Springs, CO Dec 2013 to Dec 2014 Customer Service and Sales RepresentativeDiscover Goodwill of Southern and Western Colorado Colorado Springs, CO May 2012 to Oct 2012 Laundry Processor/ folderKohl's Monroe, NY Aug 2010 to Nov 2010 Truck Unloading/ StockerHome Depot Monroe, NY Jan 2010 to Jun 2010 Lot AttendantWal-Mart Monroe, NY Aug 2009 to Nov 2009 Sales AssociateShopRite Monroe, NY Aug 2007 to Sep 2007 Cart Associate
Education:
Pikes Peak Community College Woodbury, NY Aug 2009 High School Diploma in Medical
1999 to 2000 Principal ConsultantRaytheon Engineers & Constructors, Inc Cambridge, MA 1997 to 1999 Senior Program Manager, CompletedWESTT, Inc Menlo Park, CA 1995 to 1997 Director Factory Information SystemsRaychem, PolySwitch Division Menlo Park, CA 1991 to 1995 Project Engineering ManagerBDM International, Inc Albuquerque, NM 1988 to 1991 Program ManagerRaytheon, Submarine Signal Division Portsmouth, RI 1987 to 1988 CIM Project Engineer, Responsible for CIMUnited Technologies, Pratt & Whitney Aircraft East Hartford, CT 1982 to 1987 Sr. Manufacturing Systems Engineer, ProgressivelyDestructive Testing Holden, MA 1980 to 1982 Start-up management
Education:
Worcester Polytechnic Institute Worcester, MA 1982 B. S. in Mechanical Engineering
Name / Title
Company / Classification
Phones & Addresses
Mr. Stephen Morgan Partner
Morgan Anderson Phillips LLP Attorneys & Lawyers - Family. Attorneys & Lawyers - Estate Planning
University of Wisconsin Law School Degree - JD - Juris Doctor - Law Graduated - 1972 University of Wisconsin, Madison Degree - BA - Bachelor of Arts Graduated - 1969
Specialties:
Criminal Defense - 34% Business - 33% Litigation - 33%
Associations:
American Bar Association - Member Dane County Bar Association - Member State Bar of Wisconsin - Member
Zonana said he helped evaluate Stephen Morgan, who was found not guilty by reason of insanity in the 2009 shooting death of Johanna Justin-Jinich in Middletown, Conn., where she was attending college.
Stephen Morgan, 31, of Marblehead, Mass., appeared Thursday morning in Middletown Superior Court. He said he understood his rights and that he may face 25 to 75 years in prison or a state mental hospital.
Date: Oct 13, 2011
Category: U.S.
Source: Google
Youtube
Meet FOX Weather's Stephen Morgan
Stephen Morgan joins FOX Weather from Houston, Texas. #foxweather #wea...
Duration:
1m 31s
Farewell to Meteorologist Stephen Morgan
FOX 26 Meteorologist Stephen Morgan is leaving Houston to join the FOX...
Duration:
6m 36s
Stive Morgan - Eclipse Of The Moon ( 2017)
Stive Morgan - Eclipse Of The Moon (... 2017) 01 Solar Wind part 1 ( ...
Duration:
1h 10m 43s
Stive Morgan Greatest Hits 2021 - The Best So...
Thanks for watching! Don't forget to SUBCRIBE, Like & Share my video i...
Duration:
1h 34m 28s
Stephen's Best Place: Grammar Edition
FOX Weather's Stephen Morgan bring a special Grammar forecast to celeb...