Ibm
Executive It Specialist
Associates Financial 1998 - 2000
Systems Analyst
Education:
The University of Texas at Austin 1994 - 1997
Bachelors, Bachelor of Business Administration, Management, Finance
Southlake Carroll High School 1990 - 1993
Skills:
Enterprise Architecture It Strategy Integration Solution Architecture Cloud Computing Software Development Service Oriented Architecture Pre Sales Requirements Analysis Sdlc Software Project Management Business Intelligence Software Development Life Cycle Websphere Ibm Db2 Technical Solution Design Enterprise Solution Design Application Infrastructure Social Media Analytics Cognitive Computing Internet of Things Video Analytics Emergency Management Data Analysis Cloud Storage Hybrid Cloud Virtualization Db2
Languages:
English
Certifications:
Ibm Level 2 Certified It Specialist Ibm Certified System Administrator - Websphere Application Server Network Deployment V6.1 Foundations of Ibm Cloud Computing Architecture V1 Soa Fundamentals Master Certified It Specialist Ibm Design Thinking Practitioner Api Management Data Science Ibm Agile Explorer Master Inventor Government Insights & Solutions (Silver) Business and Industry Insight Technical Specialist Profession Certification - Level 3 Ibm Selling Profession Certification - Level Ii Ibm Bluemix - Practitioner Cloud Technical Sales Foundations Data Science Foundations Cloud Essentials I
A method for monitoring safety conditions within an environment includes monitoring an environment by identifying one or more users accessing the environment based on existing and generic profiles selected based on visual recognition and analysis techniques, and consensually monitoring activity within the environment. A context of a situation of the one or more users accessing the environment is determined, based on a set of predetermined rules tailored to the environment, identified users of the one or more users, and monitoring data from monitoring the activity of the one or more users within the environment. Responsive to determining the context of the situation within the environment is an unsafe, based on the monitoring data and the set of predetermined rules, a mitigating action is selected from a set of mitigating actions corresponding to the determined context of the situation, and the mitigating action that is selected is automatically deployed.
Assisted Smart Device Context Performance Information Retrieval
In an approach to determine performance information of a target item operating under a particular set of context information, a method, in response to receiving a request for performance information of a target item, and operating with a first computing device, identifies context information of the first computing device. The method determines whether a knowledge base includes a response that correlates to the request for performance information of the target item operating within context information similar to the first computing device. The method, in response to determining that the knowledge base includes the response that correlates to the request for performance information of the target item, sends the performance information to the first computing device, and initiates a communication channel between the first computing device and a second computing device operating the target item and having similar context information of the first computing device.
Cognitive Vetting System For Unsolicited Residential Visitors
- Armonk NY, US Tsz Cheng - Grand Prairie TX, US Jeff L. Edgington - Fort Worth TX, US Pandian Mariadoss - Allen TX, US
International Classification:
G07C 9/00 G06N 5/04
Abstract:
A method, computer system, and a computer program product for cognitive vetting is provided. The present invention may include determining that an identified person is not expected. The present invention may include retrieving historical information relevant to a past interaction with the identified person. The present invention may then include enabling a present interaction with the identified person. The present invention may lastly include determining a recommendation based on an analysis of the retrieved historical information and the present interaction.
Certifying Authenticity Via Dynamic Dimensional Coordinate Scanning And Decentralized Data Storage
- Armonk NY, US James Appleyard - North Richland Hills TX, US Gregory S. Jones - Lewisville TX, US Jeff Edgington - Fort Worth TX, US
International Classification:
H04L 29/06 G06F 16/27 G06Q 30/06 H04L 9/06
Abstract:
An example operation may include one or more of an authentication system determining authentication rules, the authentication system determining scan properties, the authentication system operating a scanning device to capture scan data for a physical object based on the scan properties and the authentication rules, the authentication system generating a data block based on the scan data and the scan properties, and the authentication system transmitting the data block to a decentralized database.