Richard S. Weldon - Addison TX, US David K. Hess - Dallas TX, US Michael D. Gilvar - Gunter TX, US Eugene C. Wardynski - West Point NY, US
Assignee:
The United States of America as represented by the Secretary of the Army - Washington DC
International Classification:
G06Q 30/00 G06Q 10/00 G06Q 50/00
US Classification:
705 10, 705 1453
Abstract:
Embodiments of the present invention address deficiencies of the art in respect to marketing and provide a novel and non-obvious method, computer system and computer program product for collecting information at experience marketing events. In one embodiment of the invention, a method for collecting information from participants at an experience marketing event is provided. The method can include collecting written information from a participant at a computer terminal and collecting location information from the participant in a defined location of the experience marketing event, wherein the location information is collected from an electronic marker worn by the participant. The method may further include collecting game play data from the participant via a video game provided at the experience marketing event and recording the written information, the location information and the game play data in a record associated with an identity of the participant.
Strongly Authenticated, Third-Party, Out-Of-Band Transactional Authorization System
A system and method to perform an out-of-band authenticated authorization of an activity. A requesting system initiates an authorization request for an activity which is signed using a key pair managed by a transaction server. The authorization request is asymmetrically encrypted for the intended authorizing system and is communicated to the server and stored. The authorizing system receives notification of the request and communicates with the transaction server to retrieve the request, decrypt it and verify the signature. The authorizing system interprets the request and generates an authorization response which is signed and encrypted such that only the requesting system can decrypt it. The response is communicated back to the transaction server which notifies the requesting system. The requesting system communicates with the server to retrieve the response, decrypt it, verify the signature and interpret the response to take action on the activity that initiated the request.
Network Service Integration Into A Network Fabric Of A Data Center
- Coral Gables FL, US Manikandan Subramanian - Flower Mound TX, US David Hess - Arlington TX, US Michael Andra Ballard - Coppell TX, US Adam Scott Wayne - Keller TX, US
Top-of-rack (TOR) switches are connected to a network fabric of a data center. Each TOR switch corresponds to a rack of the data center, and is configured to provide access to the network fabric for computing devices mounted in the rack. In one method, a client device of a user is used to select various network service options. The service options correspond to services that can be provided to computing equipment of the user that is mounted in various racks of the data center. In response to receiving the selection of one or more service options, the network fabric of the data center is configured to connect the computing equipment to the selected services. In one approach, the network fabric is configured by creating and/or configuring one or more virtual networks to provide the connection to the services.
Automated Deployment Of Internet Connectivity To Rack Switches In A Data Center
- Coral Gables FL, US Manikandan Subramanian - Flower Mound TX, US David Hess - Arlington TX, US Michael Andra Ballard - Coppell TX, US Adam Scott Wayne - Keller TX, US
Top-of-rack (TOR) switches are connected to a network fabric of a data center. Each TOR switch corresponds to a respective rack of the data center, and is configured to provide access to the network fabric for computing devices mounted in the respective rack. A request is received, from a client device via a portal of the data center, to provide IP connectivity to one or more computing devices mounted in a rack. IP addresses are assigned that correspond to the IP connectivity. A virtual network is created in a network fabric of the data center. The created virtual network is associated with the assigned IP addresses. One or more of the TOR switches are configured to connect one or more ports of each respective TOR switch to the created virtual network.
Automated Access To Racks In A Colocation Data Center
- Coral Gables FL, US Manikandan Subramanian - Flower Mound TX, US David Hess - Arlington TX, US Michael Andra Ballard - Coppell TX, US Adam Scott Wayne - Keller TX, US
Top-of-rack (TOR) switches are connected to a network fabric of a data center. Each TOR switch corresponds to a rack of the data center, and is configured to provide access to the network fabric for computing devices mounted in the rack. In one method, a TOR switch is mounted in a rack. The TOR switch is connected to a network fabric of a data center. A lock is used to control physical access to the rack. A request to physically access the rack is received from a computing device (e.g., a badge implementing a security token, or a mobile device). The request includes authentication credentials. The computing device is then authenticated. In response to authenticating the computing device, the lock is configured to provide physical access to the rack.
Automated Access To Racks In A Colocation Data Center
- Coral Gables FL, US Manikandan SUBRAMANIAN - Flower Mound TX, US David HESS - Arlington TX, US Mike BALLARD - Coppell TX, US Adam Scott WAYNE - Keller TX, US
International Classification:
H04L 12/24 H04L 12/46 H04L 12/933 H04L 29/06
Abstract:
Top-of-rack (TOR) switches are connected to a network fabric of a data center. Each TOR switch corresponds to a rack of the data center, and is configured to provide access to the network fabric for computing devices mounted in the rack. In one method, a TOR switch is mounted in a rack. The TOR switch is connected to a network fabric of a data center. A lock is used to control physical access to the rack. A request to physically access the rack is received from a computing device (e.g., a badge implementing a security token, or a mobile device). The request includes authentication credentials. The computing device is then authenticated. In response to authenticating the computing device, the lock is configured to provide physical access to the rack.
Automated Deployment Of Internet Connectivity To Rack Switches In A Data Center
Top-of-rack (TOR) switches are connected to a network fabric of a data center. Each TOR switch corresponds to a respective rack of the data center, and is configured to provide access to the network fabric for computing devices mounted in the respective rack. A request is received, from a client device via a portal of the data center, to provide IP connectivity to one or more computing devices mounted in a rack. IP addresses are assigned that correspond to the IP connectivity. A virtual network is created in a network fabric of the data center. The created virtual network is associated with the assigned IP addresses. One or more of the TOR switches are configured to connect one or more ports of each respective TOR switch to the created virtual network.
Network Service Integration Into A Network Fabric Of A Data Center
- Coral Gables FL, US Manikandan SUBRAMANIAN - Flower Mound TX, US David HESS - Arlington TX, US Michael Andra BALLARD - Coppell TX, US Adam Scott WAYNE - Keller TX, US
Top-of-rack (TOR) switches are connected to a network fabric of a data center. Each TOR switch corresponds to a rack of the data center, and is configured to provide access to the network fabric for computing devices mounted in the rack. In one method, a client device of a user is used to select various network service options. The service options correspond to services that can be provided to computing equipment of the user that is mounted in various racks of the data center. In response to receiving the selection of one or more service options, the network fabric of the data center is configured to connect the computing equipment to the selected services. In one approach, the network fabric is configured by creating and/or configuring one or more virtual networks to provide the connection to the services.
Dr. Hess graduated from the West Virginia University School of Medicine in 1998. He works in Glen Dale, WV and specializes in Family Medicine and Internal Medicine. Dr. Hess is affiliated with Reynolds Memorial Hospital.
Dr. Hess graduated from the University of Maryland School of Medicine in 1983. He works in Augusta, GA and 1 other location and specializes in Neurology. Dr. Hess is affiliated with Augusta University Medical Center.
Anal Fissure Benign Polyps of the Colon Chronic Pancreatitis Constipation Diverticulitis
Languages:
English
Description:
Dr. Hess graduated from the Ohio State University College of Medicine in 1984. He works in Cincinnati, OH and 2 other locations and specializes in Gastroenterology. Dr. Hess is affiliated with Good Samaritan Hospital and Mercy Health West Hospital.
Dr. Hess graduated from the George Washington University School of Medicine and Health Science in 1985. He works in New Hyde Park, NY and specializes in Cardiovascular Disease. Dr. Hess is affiliated with North Shore University Hospital, Northwell Health Long Island Jewish Medical Center and Saint Francis Hospital The Heart Center.
Dr. Hess graduated from the West Virginia University School of Medicine in 1991. He works in Bridgeport, WV and specializes in Family Medicine. Dr. Hess is affiliated with United Hospital Center.
A young inexperienced player like Baltimore Orioles pitcher David Hess isnt going to chew out his manager for making that call. Hemight slyly smileabout the decision, but he wont cause a scene.
Date: Apr 05, 2019
Category: Sports
Source: Google
Yankees clinch AL wild card with 11-inning win over Orioles
New York went ahead in the second inning against David Hess whenHicks hit his 26th home runand Voit hit his 11th in 32 games since he was acquired from St. Louis on July 29,a drive that hit the Toyota sign above the Yankees bullpen in right-center. Still learning about New York, Voit had trouble
Morales has also fared well against David Hess, Baltimore's slated starter for Monday. Morales is 4-for-6 with a solo home run in six career plate appearances against the right-hander. That home run came last week in the Blue Jays' 6-0 winon Wednesday at Rogers Centre.
Date: Aug 27, 2018
Category: Headlines
Source: Google
Estrada’s trade value takes a hit after rough outing vs. Phillies
From here the Blue Jays head to Baltimore to face the Orioles and starter David Hess. Thats good news for the Blue Jays, who are 12-1 against the Orioles this season, and better news for Morales, who homered off Hess when they faced last week.
Somehow it seemed fitting that these struggling teams, which entered action a combined 81 games out of first place, would have to go 30 batters in before the first hit by either side: a ground-ball single to centre field by Kendrys Morales against rookie right-hander David Hess.
Date: Aug 23, 2018
Category: Headlines
Source: Google
Man arrested after trooper dies in chase in Yadkin County
"I extend my deepest sorrows to the @NCSHP family as they mourn the loss of Trooper Samuel N. Bullard, who died in a pursuit related motor vehicle collision on Interstate 77 in Yadkin County," tweeted Roxboro Police Chief David Hess. "All @CityofRoxboro Staff will wear a mourning band."
Date: May 23, 2018
Category: Headlines
Source: Google
Machado hits slam and 2-run shot as Orioles beat Rays 9-4
Orioles: RHP David Hess (2-0, 2.12 at Triple-A Norfolk) will make his major league debut in Game 1. Former Rays ace Alex Cobb (0-4, 7.61) tries to right his rocky debut season with Baltimore in the second game.
Date: May 12, 2018
Category: Sports
Source: Google
Ousted Arconic CEO Sent Ominous Letter to Paul Singer
Until Kleinfelds removal over the letter on Monday, Arconic had stood by its CEO, pointing to his track record of diversifying the old Alcoa and undertaking last years separation into two companies. This week, Arconic named David Hess interim CEO. Hess was named to the board last month and is a fo
Date: Apr 20, 2017
Source: Google
Googleplus
David Hess
Work:
Intermountain Healthcare - Enterprise Service Manager (1998) Merit Medical Systems - System Administrator/Network Engineer (1993-1998)
Education:
Brigham Young University - Management Information Systems
Tagline:
Fidei Sapientia Virtus Gratia
David Hess
Work:
Touch This Media - Developer (2012)
Education:
University of California, Riverside - Computer Science, University of California, Merced - Computer Science, Palomar College - Computer Science
Tagline:
I'm David, and stuff.
David Hess
Work:
SkyWest - Maintenance Supervisor (2002) US Air Force (1994-2001)
Education:
Basalt High School
David Hess
Lived:
Dallas, TX
Work:
Data Bakery - Founder (2012)
David Hess
Education:
Wasilla High School
David Hess
Work:
WCI Technologies - Peon (2002)
Tagline:
Only by trying to destroy their product will HP have some success with it, everything they do is wrong