Dr. Archer graduated from the University of Colorado School of Medicine at Denver in 1978. He works in Westminster, CO and specializes in Family Medicine. Dr. Archer is affiliated with North Suburban Medical Center and St Anthony North Health Campus.
Kellogg Eye CenterUniversity Of Michigan Kellogg Eye Center 1000 Wall St STE 2051, Ann Arbor, MI 48105 7347638122 (phone), 7349368571 (fax)
Kellogg Eye CenterUniversity Of Michigan Canton Health Center 1051 N Canton Ctr Rd, Canton, MI 48187 7348445400 (phone), 7348445298 (fax)
Education:
Medical School University of Chicago Pritzker School of Medicine Graduated: 1978
Procedures:
Eye Muscle Surgery Lens and Cataract Procedures Ophthalmological Exam
Conditions:
Cataract Glaucoma
Languages:
English
Description:
Dr. Archer graduated from the University of Chicago Pritzker School of Medicine in 1978. He works in Canton, MI and 1 other location and specializes in Ophthalmology and Ophthalmology/pediatrics. Dr. Archer is affiliated with University Of Michigan Hospitals & Health Center and VA Ann Arbor Healthcare System.
Isbn (Books And Publications)
Atlas of Pediatric Ophthalmology and Strabismus Surgery
Kaiser Permanente
Agile Organizational Coach and Trainer
Kaiser Permanente Nov 2015 - Aug 2018
Senior Project Manager and Agile Team Coach - Business Intelligence and Clinical Technologies Space
Pearson Sep 2013 - Nov 2015
Senior Agile Technical Project and Program Manager, Higher Education Technology Products
Douglas County Jan 2009 - Sep 2013
It Project Manager and Scrum Master
Douglas County Aug 2007 - Dec 2008
Applications Specialist
Education:
Metropolitan State University of Denver
Bachelors, Bachelor of Science, Computer Information Systems
Skills:
Agile Methodologies Sdlc Scrum Agile Project Management Software Development Software Project Management Integration Program Management Requirements Analysis Oracle Microsoft Sql Server Testing Quality Assurance Pmo Business Analysis Resource Management Unix Security Team Leadership Problem Solving Process Improvement Ms Project Collaborative Leadership Windows 7 Work In A Fast Paced Environment Cross Functional Team Leadership Itil Service Strategy Virtual Teams Agile and Waterfall Methodologies Kanban Outstanding Interpersonal Communication Skills Proactive Self Starter Atlassian Jira Vmware Infrastructure Google Apps Customer Service Incident Management Organizational Leadership Written and Oral Presentation Skills It Infrastructure Operations Process Orientation Integrity Conflict Resolution Multi Tasking Analytical Reasoning Organizational Effectiveness Outstanding Time Management Skills Unix Operating Systems Cloud Computing Iaas Hybrid Cloud
Certifications:
Certified Scrummaster Itil Foundation Certificate In It Service Management Certified Safe???? 4 Agilist Certified Safe???? 4 Program Consultant Certified Safe???? 4 Release Train Engineer License 000048993 License Gr750044110Sa Safe Agilist Certified Safe® 4 Agilist Certified Safe® 4 Program Consultant Certified Safe® 4 Release Train Engineer Scrum Alliance, License 000048993 Peoplecert, License Gr750044110Sa Scaled Agile, Inc.
Limetree
Chief Operations Officer
Archer Business Cogitatum
Founder, Chief Executive Officer
The Sharelingo Project
Advisory Board Member
Limetree
Executive Advisor
Verizon Jun 2017 - Dec 2018
New Product and Develoment Leader
Education:
The University of Texas at Dallas May 2000
Masters, Master of Arts, Management
Iowa State University May 1992
Bachelors, Bachelor of Science, Computer Science
Iowa State University May 1991
Bachelors, Bachelor of Science, Computer Engineering
Skills:
Telecommunications Security Leadership Product Management Wireless Cloud Computing Strategic Partnerships Cross Functional Team Leadership Mobile Devices Integration Strategy Product Development Software Development Go To Market Strategy New Business Development Innovation International Business Entrepreneurship Healthcare Information Technology Mobile Security Mobile Technology Mobile Health M2M Wireless Technologies
An exemplary system and method are directed at receiving an audio signal and process the audio signal into a remapped audio signal based on a plot profile. The plot profile may include at least one of an identified range of audio frequencies. The processing may comprise retrieving an identified range of audio frequencies from the plot profile; determining a range of impaired audio frequencies in the audio signal based on the identified range of audio frequencies; shifting the frequency of at least a portion of the impaired audio frequencies to outside of the identified range; and continuing to retrieve identified ranges of audio frequencies from the plot profile. The shifting of the impaired audio frequencies of the audio signal may be performed until no further identified ranges of audio frequencies are available for consideration.
Steven T. Archer - Dallas TX, US Paul V. Hubner - McKinney TX, US Kristopher A. Pate - Sachse TX, US Francisco A. Dias - Krum TX, US
Assignee:
Verizon Patent and Licensing Inc. - Basking Ridge NJ
International Classification:
G06F 11/00 G06F 7/04
US Classification:
726 22, 726 24, 726 26, 713188, 713189
Abstract:
An exemplary malware detection device includes a data pathway provided between a first data transfer device and a second data transfer device and a processor attached to the data pathway. A memory accessible by the processor contains at least one malware signature and instructions for controlling the processor to interconnect the first and second data transfer devices, direct at least a portion of a data transfer across the data pathway to the processor for analysis, independently analyze the portion of the data transfer using the malware signature, identify malware contained in the portion of the data transfer, and interrupt the data transfer based on the identification of malware.
System And Method For Providing Authentication Continuity
Steven Thomas Archer - Dallas TX, US Lawrence J. Zaykowski - Old Forge PA, US Kristopher Alan Pate - Sachse TX, US Paul V. Hubner - McKinney TX, US Jack Mitchell Farris - Randolph NJ, US
Assignee:
Verizon Patent and Licensing Inc. - Basking Ridge NJ
A computer-implemented method may include receiving first monitored information relating to a user at a time of initial user authentication with a particular application or resource. It may be determined that a second authentication is required at a second time subsequent to the time of initial user authentication. Second monitored information may be captured at the second time. The second monitored information may be compared to the first monitored information to determine whether continued authentication is maintained. Access to the particular application or resource when it is determined that continued authentication is not maintained.
Method And Apparatus For Managing Radio Frequency Identification (Rfid) Tags
An approach is provided for managing network addressable radio frequency identification (RFID) tags. A management agent collects data from a radio frequency identification (RFID) tag that is assigned a network address for visibility within a data network. The agent generates a management message including the data for transmission over the data network to a manager configured to communicate with the agent using a management protocol.
Paul Andrew Donfried - Richmond MA, US Steven T. Archer - Dallas TX, US Ashley Evans - Stonington CT, US Peter S. Tippett - Great Falls VA, US
Assignee:
Verizon Patent and Licensing Inc. - Basking Ridge NJ
International Classification:
G06F 17/30
US Classification:
726 29, 707769, 707E17014
Abstract:
A method, performed by a computer device, may include receiving personal data from a user device associated with personas, where each of the personas corresponds to at least one classification of requesters, associating the received personal data with at least one of the personas, and identifying any of the classifications that correspond to the personas associated with received personal data. The method may further include receiving, from a data requester, a query including a request for the personal data; associating the data requester with a classification; and comparing the classification associated with the data requester to the classifications associated with personal data. The method may further include sending, to the data requester, a message containing the personal data in response to the classification of the data requester corresponding to the classifications of the personal data.
Method And Apparatus For Mapping Radio Frequency Identification (Rfid) Tags To Network Addresses
Francisco A. Dias - Krum TX, US Paul V. Hubner - McKinney TX, US Steven T. Archer - Dallas TX, US Kristopher A. Pate - Sachse TX, US
Assignee:
Verizon Business Network Services Inc. - Ashburn VA MCI Communications Services, Inc. - Ashburn VA
International Classification:
G06F 21/00
US Classification:
726 32
Abstract:
A computing device is configured to receive media content and determine if the received media content includes a stego message. If the media content includes a stego message, then the computing device is further configured to decode at least a portion of the stego message, and perform a task based in part on the decoded portion of the stego message.
Unauthorized Data Transfer Detection And Prevention
Steven T. Archer - Dallas TX, US Paul V. Hubner - McKinney TX, US Kristopher A. Pate - Sachse TX, US Francisco A. Dias - Krum TX, US
Assignee:
Verizon Business Network Services Inc. - Ashburn VA
International Classification:
G06F 21/00 G06F 15/173
US Classification:
726 1, 709224
Abstract:
A method includes receiving a policy via a network connection, wherein the policy includes at least one signature. Receiving a data communication message from a processor of a computing device via a system bus. Identifying a class, and selectively forwarding the data communication message based in part on the received policy and the identified class.