Saas • Go To Market Strategy • Solution Selling • Marketing Strategy • Strategy • Business Development • Agile Methodologies • Crm • Mergers and Acquisitions • Citrix • Professional Services • Strategic Partnerships • Leadership • Product Management • Virtualization • Demand Generation • Cloud Computing • Data Center • Lead Generation • It Strategy • Enterprise Software • Business Alliances • New Business Development • Product Marketing • Storage • Software Development • Mobile Devices • Marketing • Software As A Service
Fileshadow
Chief Executive Officer and Founder and President
Pike Associates
Managing Director
Citrix Nov 10, 2014 - Feb 29, 2016
Vice President of Market Development
Solid Instance, Inc. Aug 2011 - Nov 2014
President and Chief Executive Officer
Cemaphore Systems Apr 2002 - Aug 2011
President and Chief Executive Officer
Education:
Princeton University 1973 - 1977
Bachelors, Bachelor of Arts, Architecture
Thacher School, Ojai California 1969 - 1973
Cathedral School For Boys 1967 - 1969
The Thacher School
Skills:
Saas Go To Market Strategy Solution Selling Marketing Strategy Strategy Business Development Agile Methodologies Crm Mergers and Acquisitions Citrix Professional Services Strategic Partnerships Leadership Product Management Virtualization Demand Generation Cloud Computing Data Center Lead Generation It Strategy Enterprise Software Business Alliances New Business Development Product Marketing Storage Software Development Mobile Devices Marketing Software As A Service
Tyrone Pike - Woodside CA, US Jeffrey Looman - Orem UT, US J. Gille - Lindon UT, US Jeffrey Blair - American Fork UT, US
International Classification:
G06F 15/16
US Classification:
709206000
Abstract:
A system and method to improve data access over a network. According to one embodiment of the present invention, a device for caching data from a server, such as e-mail messages, is provided at a location close to an end user. According to another embodiment of the present invention, a centrally stored address list is provided that may be accessed by a client to determine the best or nearest server for data access.
Joseph J. Ekstrom - Lindon UT, US Tyrone Pike - Woodside CA, US John Sutherland - Provo UT, US
International Classification:
H04L 9/00 H04L 9/30
US Classification:
713153, 380 30, 713150
Abstract:
The preferred embodiments of the present invention disclose a security transformation system which includes an e-mail client, a cipher proxy, a dictionary database and an Internet e-mail system. The system is capable of generating and receiving messages and performing a cipher substitution and encryption of key fields of messages when they are stored at a user's Internet e-mail system. When the messages are received or accessed the system permits deciphering and decrypting the message using a reverse security transformation The preferred embodiments of the method of the present invention comprises steps of generating and receiving messages at an Internet e-mail system, performing a security transformation on said messages, encrypting said messages, updating a cipher dictionary at a cipher proxy, and decoding and decrypting the messages when accessed by a user.
Method And Apparatus For Accessing Third-Party Resources
- Fort Lauderdale FL, US Tyrone F. Pike - Woodside CA, US
International Classification:
H04L 29/06
Abstract:
A method, system, and apparatus for providing a client access to third-party resources by utilizing third-party access tokens via a network gateway. The method can prevent the third-party access tokens from being exposed directly to the client environment. The client receives a gateway security credential, which encapsulates the third-party access token in an encrypted form. The client provides the gateway access token to the network gateway where the third-party access token is decrypted and then used to access the third-party resource. Client requests to the network gateway are executed using a custom API. The gateway relays the client requests to the appropriate third-party resources using the third-party-specific API with the decrypted third-party access token. Gateway access tokens are short-lived and can be renewed according to the client-environment life cycle.
Method And Apparatus For Accessing Third-Party Resources
- Fort Lauderdale FL, US Tyrone F. PIKE - Woodside CA, US
International Classification:
H04L 29/06
Abstract:
A method, system, and apparatus for providing a client access to third-party resources by utilizing third-party access tokens via a network gateway. The method can prevent the third-party access tokens from being exposed directly to the client environment. The client receives a gateway security credential, which encapsulates the third-party access token in an encrypted form. The client provides the gateway access token to the network gateway where the third-party access token is decrypted and then used to access the third-party resource. Client requests to the network gateway are executed using a custom API. The gateway relays the client requests to the appropriate third-party resources using the third-party-specific API with the decrypted third-party access token. Gateway access tokens are short-lived and can be renewed according to the client-environment life cycle.
Youtube
Tyrone Pike, Philipsburg, PA 16866
Great private building site. 11.04 acres of nice mix of open-wooded la...
Duration:
2m 33s
Tyrone Pike Interview With Nasdaq
Tyrone Pike gives advice to upcoming entrepreneurs about how to get st...