Apr 2013 to 2000 Lead Central Customer Service RepresentativeClean Harbors Environmental Services Norwell, MA Feb 2012 to Apr 2013 Central Customer Service RepresentativeFive Star Quality Care, Inc Newton, MA May 2009 to Feb 2012 Audit and Processes CoordinatorFidelity Investments Boston, MA Jul 2006 to Mar 2009 Security Representative
Education:
University of Massachusetts Lowell, MA 2013 Master of Science in Environmental Studies, Environmental Engineering SciencesUniversity of Massachusetts - Boston Boston, MA 2009 to 2010 Classes in Environmental Engineering, Chemistry, PhysicsBridgewater State College Bridgewater, MA 2006 Bachelor of Arts in Communications, Public Relations
Skills:
RCRA and DOT training and knowledge Working knowledge of Environmental Regulations and the Massachusetts Contingency Plan Knowledge of hydrology and hydraulics principles as well as water and soil properties Advanced skills in Excel, Word, PowerPoint and Adobe Proficient in detailed report writing in multiple systems
Us Patents
Extensible Fingerprinting Functions And Content Addressed Storage System Using The Same
An extensible fingerprint comprised of an ordered list of fingerprints generated by applying each of a plurality of distinct fingerprinting functions to the content of a data item. The extensible fingerprint can be extended by using a new fingerprinting function to compute a new fingerprint and adding the new fingerprint to the list so that the old extensible fingerprint of a data item is used as a prefix of the new extensible fingerprint for that data item. Thus, the fingerprint can be incrementally extended over time. A content-addressed storage system uses extensible fingerprints as addresses and can also change over time.
Referent-Controlled Location Resolution Of Resources In A Federated Distributed System
When receiving a client data access request directed to a first data container serviced by a first federation member, data of the first requested data container may be used to resolve a context identifier and identify a volume location database (VLDB) associated with a second federation member servicing a second data container. A look up request may then be sent to the VLDB to identify one or more locations of the second data container. The client's original data access request illustratively may then be responded to with the identified one or more locations of the second data container.
Non-Volatile Solid-State Memory Based Adaptive Playlist For Storage System Initialization Operations
An initialization process in a storage server is made more efficient by at least partially avoiding serial and/or sequential access to the data blocks that are needed for such process. To accomplish this, the blocks needed for the initialization process are identified prior to performing the initialization process. The blocks or a list of references to the blocks are stored in a non-volatile solid-state memory, such as a flash-based memory, that is separate from the main drive subsystem and has a much shorter power-up and read-access time than the main drive subsystem. The list or stored set of blocks may be used to access the blocks more efficiently when needed, by accessing two or more of such blocks in parallel, as well as performing block accessing and volume mounting in parallel.
Speculative Copying Of Data From Main Buffer Cache To Solid-State Secondary Cache Of A Storage Server
A network storage server includes a main buffer cache to buffer writes requested by clients before committing them to primary persistent storage. The server further uses a secondary cache, implemented as low-cost, solid-state memory, such as flash memory, to store data evicted from the main buffer cache or data read from the primary persistent storage. To prevent bursts of writes to the secondary cache, data is copied from the main buffer cache to the secondary cache speculatively, before there is a need to evict data from the main buffer cache. Data can be copied to the secondary cache as soon as the data is marked as clean in the main buffer cache. Data can be written to secondary cache at a substantially constant rate, which can be at or close to the maximum write rate of the secondary cache.
Method And Apparatus For Generating And Using Location-Independent Distributed Object References
James Waldo - Dracut MA, US Timothy Blackman - Arlington MA, US Daniel Ellard - Belmont MA, US Robert Sproull - Newton MA, US Jane Loizeaux - Lowell MA, US Michael Warres - Cambridge MA, US
Assignee:
Sun Microsystems, Inc. - Santa Clara CA
International Classification:
G06F 9/46
US Classification:
719330000
Abstract:
Location-independent references include a live reference containing a location of a remote object and a universally unique identifier (UUID) which provides a unique global reference to that remote object. If a method call to the remote object using the live reference fails, the UUID is used to obtain a new reference to the remote object and the new reference is then used to make another method call. A new reference can be obtained from an identifier directory that contains a mapping between UUIDs and location-independent references. When a remote object is first created, or when a remote object is moved from one location to another, the remote object registers with any and all such directories that it can find in its environment. These registrations are leased; that is, if they are not occasionally refreshed by the remote object which registered them, they are dropped from the directory.
Method And Apparatus For Constructing A Storage System From Which Digital Objects Can Be Securely Deleted From Durable Media
In a data storage system, content-containing objects to be stored are added to a storage hierarchy that is based on content relationships. The content of each stored object is encrypted and a stub is associated with that object. For each stored object other than a root object, the stub comprises a function of a decryption key for the content of that object and the stubs of all of the ancestors of that object. The stubs can be used to calculate a new stub for a data object to be inserted into the storage hierarchy and to generate a decryption key for an existing object. Since these latter calculations for an object involve the stubs of all ancestors of that object, deleting a stub for an object securely deletes that object and all its descendants. An object can be moved by recalculating its stub.
Transparent Redirection Of Clients To A Surrogate Payload Server Through The Use Of A Proxy Location Server
- Sunnyvale CA, US Daniel Joseph Ellard - Belmont MA, US
International Classification:
H04L 29/06
US Classification:
709203
Abstract:
In some embodiments, a first location server, in response to a request from a client to access an object, determines whether a first location information stored at the first location server indicates locations of instance(s) of the object. The first location server, in response to a determination that the first location information indicates the locations of the instances of the object, determines a first location of a first instance of the object at a first payload server and a second location of a second instance of the object at a second payload server from the first location information. The first location server determines priority values of the first and second locations. The first location server generates a reply to the request, the reply indicating the first and second locations of the first and second instances of the object, and the priority values of the first and second locations.
Speculative Copying Of Data From Main Buffer Cache To Solid-State Secondary Cache Of A Storage Server
- Sunnyvale CA, US Daniel J. Ellard - Belmont MA, US
International Classification:
G06F 12/02 G06F 12/08
US Classification:
711103, 711135
Abstract:
A network storage server includes a main buffer cache to buffer writes requested by clients before committing them to primary persistent storage. The server further uses a secondary cache, implemented as low-cost, solid-state memory, such as flash memory, to store data evicted from the main buffer cache or data read from the primary persistent storage. To prevent bursts of writes to the secondary cache, data is copied from the main buffer cache to the secondary cache speculatively, before there is a need to evict data from the main buffer cache. Data can be copied to the secondary cache as soon as the data is marked as clean in the main buffer cache. Data can be written to secondary cache at a substantially constant rate, which can be at or close to the maximum write rate of the secondary cache.