Dr. Archer graduated from the University of Colorado School of Medicine at Denver in 1978. He works in Westminster, CO and specializes in Family Medicine. Dr. Archer is affiliated with North Suburban Medical Center and St Anthony North Health Campus.
Kellogg Eye CenterUniversity Of Michigan Kellogg Eye Center 1000 Wall St STE 2051, Ann Arbor, MI 48105 7347638122 (phone), 7349368571 (fax)
Kellogg Eye CenterUniversity Of Michigan Canton Health Center 1051 N Canton Ctr Rd, Canton, MI 48187 7348445400 (phone), 7348445298 (fax)
Education:
Medical School University of Chicago Pritzker School of Medicine Graduated: 1978
Procedures:
Eye Muscle Surgery Lens and Cataract Procedures Ophthalmological Exam
Conditions:
Cataract Glaucoma
Languages:
English
Description:
Dr. Archer graduated from the University of Chicago Pritzker School of Medicine in 1978. He works in Canton, MI and 1 other location and specializes in Ophthalmology and Ophthalmology/pediatrics. Dr. Archer is affiliated with University Of Michigan Hospitals & Health Center and VA Ann Arbor Healthcare System.
Isbn (Books And Publications)
Atlas of Pediatric Ophthalmology and Strabismus Surgery
Lowe's Florence, KY Mar 2012 to Aug 2012 Customer Service/Sales AssociateCITIGroup Florence, KY Nov 2010 to Aug 2011 Customer Service/SalesSpec's Fine Foods, Wine & Spirits Austin, TX Jul 2007 to Aug 2010 Department ManagerHome Depot
Oct 2005 to Jun 2007 Customer Service/Sales AssociateWhole Foods Market Austin, TX Dec 2004 to Oct 2005 ChefRebecca's Fine Dining at the Lodge in Cloudcroft Cloudcroft, NM Oct 2004 to Dec 2004 Intern ChefHome Depot
Feb 2003 to Oct 2004 Customer Service/Sales AssociateHome Depot Austin, TX Feb 2003 to Oct 2004 Student/Student ChefInternal Revenue Service Austin, TX Jan 1985 to Feb 2003 Supervisory Tax Examiner (Manager)
Education:
Le Cordon Bleu's Culinary Academy Austin, TX Jan 2005 Associate in Culinary Arts
An exemplary system and method are directed at receiving an audio signal and process the audio signal into a remapped audio signal based on a plot profile. The plot profile may include at least one of an identified range of audio frequencies. The processing may comprise retrieving an identified range of audio frequencies from the plot profile; determining a range of impaired audio frequencies in the audio signal based on the identified range of audio frequencies; shifting the frequency of at least a portion of the impaired audio frequencies to outside of the identified range; and continuing to retrieve identified ranges of audio frequencies from the plot profile. The shifting of the impaired audio frequencies of the audio signal may be performed until no further identified ranges of audio frequencies are available for consideration.
Steven T. Archer - Dallas TX, US Paul V. Hubner - McKinney TX, US Kristopher A. Pate - Sachse TX, US Francisco A. Dias - Krum TX, US
Assignee:
Verizon Patent and Licensing Inc. - Basking Ridge NJ
International Classification:
G06F 11/00 G06F 7/04
US Classification:
726 22, 726 24, 726 26, 713188, 713189
Abstract:
An exemplary malware detection device includes a data pathway provided between a first data transfer device and a second data transfer device and a processor attached to the data pathway. A memory accessible by the processor contains at least one malware signature and instructions for controlling the processor to interconnect the first and second data transfer devices, direct at least a portion of a data transfer across the data pathway to the processor for analysis, independently analyze the portion of the data transfer using the malware signature, identify malware contained in the portion of the data transfer, and interrupt the data transfer based on the identification of malware.
System And Method For Providing Authentication Continuity
Steven Thomas Archer - Dallas TX, US Lawrence J. Zaykowski - Old Forge PA, US Kristopher Alan Pate - Sachse TX, US Paul V. Hubner - McKinney TX, US Jack Mitchell Farris - Randolph NJ, US
Assignee:
Verizon Patent and Licensing Inc. - Basking Ridge NJ
A computer-implemented method may include receiving first monitored information relating to a user at a time of initial user authentication with a particular application or resource. It may be determined that a second authentication is required at a second time subsequent to the time of initial user authentication. Second monitored information may be captured at the second time. The second monitored information may be compared to the first monitored information to determine whether continued authentication is maintained. Access to the particular application or resource when it is determined that continued authentication is not maintained.
Method And Apparatus For Managing Radio Frequency Identification (Rfid) Tags
An approach is provided for managing network addressable radio frequency identification (RFID) tags. A management agent collects data from a radio frequency identification (RFID) tag that is assigned a network address for visibility within a data network. The agent generates a management message including the data for transmission over the data network to a manager configured to communicate with the agent using a management protocol.
Method And Apparatus For Mapping Radio Frequency Identification (Rfid) Tags To Network Addresses
Francisco A. Dias - Krum TX, US Paul V. Hubner - McKinney TX, US Steven T. Archer - Dallas TX, US Kristopher A. Pate - Sachse TX, US
Assignee:
Verizon Business Network Services Inc. - Ashburn VA MCI Communications Services, Inc. - Ashburn VA
International Classification:
G06F 21/00
US Classification:
726 32
Abstract:
A computing device is configured to receive media content and determine if the received media content includes a stego message. If the media content includes a stego message, then the computing device is further configured to decode at least a portion of the stego message, and perform a task based in part on the decoded portion of the stego message.
Unauthorized Data Transfer Detection And Prevention
Steven T. Archer - Dallas TX, US Paul V. Hubner - McKinney TX, US Kristopher A. Pate - Sachse TX, US Francisco A. Dias - Krum TX, US
Assignee:
Verizon Business Network Services Inc. - Ashburn VA
International Classification:
G06F 21/00 G06F 15/173
US Classification:
726 1, 709224
Abstract:
A method includes receiving a policy via a network connection, wherein the policy includes at least one signature. Receiving a data communication message from a processor of a computing device via a system bus. Identifying a class, and selectively forwarding the data communication message based in part on the received policy and the identified class.
Paul V. Hubner - McKinney TX, US Kristopher A. Pate - Sachse TX, US Steven T. Archer - Dallas TX, US Robert A. Clavenna - Lucas TX, US
Assignee:
Verizon Corporate Services Group Inc. - Basking Ridge NJ MCI Communications Services - Ashburn VA Verizon Business Network Services Inc. - Ashburn VA
International Classification:
G06K 9/60 H04M 11/04
US Classification:
382305, 4554041
Abstract:
A system and method for recording emergency data during a 911 call. The emergency data recorded may be in the form of a digital image. The digital image may be of the event prompting the 911 call. The digital image may be a single image, a series of images, or streaming video. The emergency data may be received on a portable electronic device, such as a cell phone, through a digital imaging device, such as a digital camera. The emergency data may then be transmitted to a server, wherein the emergency data is stored. The emergency data may be accessed by a 911 dispatcher during a 911 call to review the image data to aid in assessing the emergency recorded in the emergency data.