## BIO
OBJECTIVE A challenging career in the area of Applications/Systems programming, Networking, Wireless Communications, Database Systems, Enterprise Application Integration, eCommerce/eBusiness, and Distributed Databases and Object Technology.
EDUCATION Bachelor of Science in Electronic Engineering Technology, Summa Cum Laude
Georgia Institute of Technology, Atlanta, Georgia, June 1990
ROLE Senior Technical Architect, Chief Executive Officer, Chief Technical Officer, Partner, Senior Consultant, Senior Software Engineer, Manager, Project Manager, Project Lead, Developer, Applications Engineer, Database Administrator, Network Administrator, Systems Integrator, Mentor, QA Engineer, Systems Engineer, Trainer, and Sales Engineer
WORK System Architect/Software Engineer: (Jan. 2002 – PRESENT) IIC/CK Global Los Angeles, California
EXPERIENCE Architected and implemented an Authentication Framework/Infrastructure that supports Passwords/PINs, Authentication Protocols (Challenge-response, One-time password, and Digital signatures), Kerberos, Biometrics (Fingerprint recognition, Voice recognition, Handwriting recognition), Personal Tokens using two-factor authentication (Human-interface, Smartcard, CyberKey (mini CD-R), PCMCIA card, and USB). The Authentication Framework/Infrastructure stored and communicated the authentication characteristics in a protected form using Advanced Encryption Standard (AES). The Authentication Framework/Infrastructure used Directory Services like X.500 standard, Active Directory, LDAP, NDS, and customized Databases to store and distribute keys and characteristics of the system. The Authentication Framework/Infrastructure was implemented extending Microsoft&'s Graphical Identification and Authentication (GINA) using C/C++ and COM/DCOM/COM+. The Authentication Framework/Infrastructure was developed to run on Windows NT, Windows 2000, and Windows XP. Architected and implemented a complete GINA for Windows 95, Windows 98, Windows 98 SE and Windows ME (patent pending). Developed Application Programming Interfaces (APIs) that serve as wrappers for both GINAs to provide robust authentication solutions for developers and applications. The Authentication Framework/Infrastructure also supported injecting itself into Legacy application and existing applications to extend and enhance their security model via Enterprise Application Integration (EAI/CORBA/EJB/COM). Rational Unified Process (RUP) was used to model and architect the system requirements. Primarily used the following technologies to provide enterprise-level Information Technology solutions: C++, JAVA (Applets,Beans, J2EE, JFC SWING, JINI, JNI, JMS, Threads, and other features), CORBA, EJB, .NET Framework, GINA, Cryptography, Advanced Encryption Standard (AES), Visual Basic, ActiveX Data Object, Java Server Pages, Servlets, SQL Server, Oracle, XML, XLST, BizTalk,WAP, Mobile Devices, COM+/DCOM/SOAP, Microsoft&'s DNA, Active Directory, LDAP, ADSI, IIS, Java Web Server, Apache, UML for object modeling, ERWIN for data modeling, and the Rational Unified Process (RUP) for the development methodology and OOAD.
System Architect/Software Engineer: (May 2001 – PRESENT) IIC/INNOVION San Jose, California
System Architect/Software Engineer for INNOVION&'s new-age enterprise-level Information Technology solution and Manufacturing Execution System (MES) that utilized Data Warehousing and Data Mining techniques, Web Services, Fault Tolerance and Fail Over, Replication, Reporting/OLAP, NT/Internet Security, and Active Directory to redesign and replace their WonderWare MES application and other corporate products. As the E-Business Architect, I participated in all phases of development and deployment of the Web-based application that integrated pre-existing software with Web services that combined local and remote resources for an overall integrated and distributed solution. The Web services utilized NT, Windows 2000 ,and Windows XP servers to build the new-age distributed, Web-based, scaleable enterprise solution for INNOVION&'s world-wide sites. INNOVION e-Services packaged application provided automation and cost cutting measures to increase the company&'s bottom line and make there factories run more efficiently. INNOVION provides the highest quality ion implantation contract services to the world&'s leading semiconductor manufacturers. INNOVION is committed to providing unique and cost-effective process solutions to its existing and future customer alliances through research, development and cultivation of previously unexplored implant processes. INNOVION e-Services packaged application was designed and developed to support the mission statement of INNOVION. Primarily used the following technologies to provide enterprise-level Information Technology solutions: SECS-GEM, C++, JAVA (Applets,Beans, J2EE, JFC SWING, JINI, JNI, JMS, Threads, and other features), .NET Framework, Visual Basic, VB Webclasses, ActiveX Data Object, Java Server Pages, Servlets, Active Server Pages, PowerBuilder, SQL Server, Oracle, JDBC/ODBC/ADO/OLEDB, HTML, DHTML, XML, XLST, BizTalk,WAP, COM+/DCOM/SOAP, Microsoft&'s DNA, MTS, MSMQ, LDAP, ADSI, IIS, Java Web Server, Apache, PHP, ColdFusion, Crystal Reports, OLAP/OLTP, JavaScript, PERL, Microsoft Office Object Models, UML for object modeling, ERWIN for data modeling, and the Rational Unified Process (RUP) for the development methodology and OOAD.
E-Business Architect/Consultant: (November 2000 – May 2001) Actional Corp. Mountain View, California
E-Business Architect/Consultant for Actional Control Broker Technology. The Actional Control Broker (ACB) defines a new category of e-Business integration designed to address the real-time connectivity requirements of high-performance, multi-channel e-Business. Actional&'s unique “any-to-many†architecture brings unprecedented performance, simplicity and ease-of-use to e-Business application integration, while allowing IT environments to quickly adapt to change. The architecture directly connects user-facing e-Business systems to back-end ERP, custom and legacy environments, without the need for additional middleware or mediation layers. The technology extends the functionality of other applications in their native data formats, native procedures, and native program interfaces. Worked closely with prospects and customers in pre-sales and post-sales situations. My responsibilities involved product presentations and demonstrations as well as onsite proof of concepts, prototype integrations, and product installation and configuration. Worked closely with customers to rapidly design, implement and deploy integration solutions based on Actional products. Developed and delivered technical proposals and proof-of-concept tests that clearly demonstrated the value of Actional products. Delivered hands-on product train
## Area of Expertise
PROFILE OF SKILLS AND TECHNICAL BACKGROUND
SOFTWARE
LOTUS Notes AUTOCAD Microsoft Word PowerBuilder
OLE Rational Rose WordPerfect Multimedia
Internet Programming SA Object EXCEL Delphi
WINDOWS SDK InstallShield Device Drivers Game Programming
Microsoft Foundation Class Borland OWL IBM Open Class Library Data Modeling/Mining
LOTUS Dominos Brio/BI Suite PhotoShop Visio
Visual C++ IBM VisualAge Visual Interdev Crystal Reports
LANGUAGES
C, C++, Visual Basic, PASCAL, COBOL, FORTRAN, SQL, INFORMIX SQL/4GL, MOTOROLA 68000, REXX, IBM Assembly Language, INTEL Assembly Language, BASIC, TSO/ISPF, Object Oriented Program,SOM,DSOM, Amdahl Assembly Language, HyperText Markup Language, DHTML, XML, Soap, Java SWING, Java JNI, Java JMS, Java Micro, WML, WAP, WMLScript, Orbix, Visibroker, IBM Object Request Broker, JAVA, Active Server Pages, Java Server Pages, JavaScript, VBScript, LotusScript, PHP, Visual Basic Automation (VBA), ActiveX/COM, DCOM, MTS, MSMQ, ADSI, Microsoft DNA, .NET, BizTalk, SOAP, PowerBuider, ColdFusion, Net Objects Fusion, SAP&'s ABAP, PeopleSoft&'s PeopleCode, Siebel&'s eScript, Smalltalk, KornShell, C-Shell, Bourne Shell, Sabre, and PERL
OPERATING SYSTEMS
MS-DOS, MacOS, OS/2, Microsoft WINDOWS, UNIX, AIX, Linux, UTS, SYSTEM 7, IBM OS/MVS/XA/ESA/SP, IBM OS/400, VM/CMS, SUNOS, Solaris, HP-UX, and CP/M
PACKAGED APPLICATIONS
Blue Martini, BroadVision, Commerce One, Delano Technology, PeopleSoft, SAP (R/2 and R/3), Siebel, Clarify, Vantive, and JD Edwards
e-BUSINESS PLATFORMS (B2B, B2C , B2B2C, C2C, C2B2C, and M-Commerce)
BEA Weblogic, IBM WebSphere, Oracle OAS, Java Server Pages, Microsoft Active Server Pages, and [login to view URL]
e-BUSINESS INTEGRATION TOOLS
Candle Roma, Level 8 EIT, Vitria Businessware, Tibco, and IONA iPortal
MIDDLEWARE BACKBONES
IBM Component Broker, Iona Orbix, Visiginic Visibroker, and Orbacus
GRAPHICAL USER INTERFACES
DEC Windows, Microsoft WINDOWS, X-WINDOWS (MOTIF), Macintosh User Interface, Presentation Manager,
Microsoft WINDOWS NT, and Microsoft WINDOWS 3.1/95/98,Me
NETWORK OPERATING SYSTEMS
Novell NetWare, Novell NetWare Lite, Appletalk, LANtastic, Microsoft LAN Manager, IBM LAN SERVER, 10NETPLUS, Microsoft WINDOWS NT, and VINES
DATABASES
Oracle, Paradox, Hypercard, DB2/2, DB2, dBASE III, dBASE IV, Access, FoxBase, FroPro, SYBASE, CICS, CLIPPER, and OS/2 Extended Edition Database Manager, SQL Server, MySQL
COMMUNICATIONS
RUMBA, OS/2 Extended Edition Communication Manager, SNA/SDLC, NetView, and DFT/non-DFT 3270/5250 Terminal Emulation
PROTOCOLS
NETBIOS, TCP/IP, ASYNC. or X.25 LINK, SPP/IPC, OSI, NAMED PIPES, NETBEUI, IPX/SPX, Hypertext Transfer Protocol (HTTP), Network File System (NFS), Andrew File System (AFS), X.500, Wireless Application Protocol (WAP) and Lightweight Directory Access Protocol (LDAP), SECS GEM
STANDARDS
IEEE 802.3, IEEE 802.5, Network Driver Interface Interface Specification (NDIS), Open Datalink Interface (ODI), Common Object Request Broker Architecture (CORBA), Client/Server Computing Architectures, Distributed Computing Environment (DCE), Common Gateway Interface (CGI), INTERNET, Open Database Connectivity (ODBC), ActiveX Data Object (ADO), and Open Software Foundation (OSF), XML, WAP, BlueTooth, EJB, MQ Series, UML, Rational Unified Process (RUP), Advanced Encryption Standard (AES), Cryptography, Digital Signatures, Graphical Identification and Authentication (GINA)
REFERENCES
Available on request