Venafi
Senior Software Engineer
Symantec Mar 2008 - Jun 2012
Principle Software Engineer
2008 Avinti 2004 - 2008
Senior Software Engineer and Architect
Rwp Consulting Jan 2002 - Jan 2004
Senior Software Engineer
Cenus Technologies 2000 - 2002
Senior Software Engineer
Education:
Brigham Young University 1978
Bachelors, Bachelor of Science, Microbiology
Brigham Young University
Skills:
Software Engineering Unix Agile Methodologies Software Development Scrum C C# Linux Visual Studio C++ Xml Java Enterprise Software .Net Test Automation Rest Subversion Cloud Computing Wcf Software Project Management Microsoft Sql Server Perl Shell Scripting Object Oriented Design Distributed Systems Software Design Python Java Software Development Testing Sql Tomcat Web Applications Web Services Software Quality Assurance Mysql Javascript Postgresql Objective C Design Patterns Tcp/Ip Soa Ruby Apache Bash Agile Project Management Oop Soap Agile
Bruce R. Cutler - Murray UT Reid W. Poole - Orem UT Renea B. Campbell - Orem UT
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 1760
US Classification:
395712
Abstract:
A method for migrating a file system and access rights associated with the file system from a first network operating system to a second network operating system. The method according to this invention achieves a highly reliable and relatively quick process for migrating from one network environment to another network environment. Mapping information associating objects in the first network environment with objects in the second network environment is maintained in the object database of the first network environment. A process is initiated in the first environment to read and communicate the file system and file access rights from the first environment to the second environment. A process is initiated in the second environment to accept the file system and file access rights from the first environment. The second process recognizes object identifiers associated with the first environment and accesses the mapping information to determine which object in the second environment is associated with the object from the first environment The second process then obtains an object identifier of the object in the second environment and stores the object identifier in the file object list of the file so that the object in the second environment has identical access rights to the file as did the corresponding object in the first environment.
Trumpeter Reid Poole, holds his Jazz Performance and Music Education Degrees from the University Of Northern Colorado. While attending UNC Reid was a member ...