Search

Alexander Hovanness Tarpinian

from Austin, TX
Age ~59

Alexander Tarpinian Phones & Addresses

  • 300 Bowie St, Austin, TX 78703 (512) 215-2119
  • 300 Bowie St #3503, Austin, TX 78703 (512) 215-2119
  • 6500 Champion Grandview Way, Austin, TX 78750 (512) 795-8204
  • 13312 Kirkglen Dr, Austin, TX 78727 (512) 252-2867
  • Daytona Beach, FL
  • Delray Beach, FL

Resumes

Resumes

Alexander Tarpinian Photo 1

Program Director, Platform Open Technology And International Standards

View page
Location:
Austin, TX
Industry:
Information Technology And Services
Work:
IBM since Jan 2011
Manager, Open Source and Standards Policy

INCITS since Apr 2011
Executive Board Member

INCITS since Apr 2013
Chair, Study Group on Planning

INCITS since Jan 2011
Procedures Board Committee member

JTC 1/SC 38 Distributed application platforms and services since Apr 2013
SOA WG 2 member
Education:
Florida Atlantic University 1992 - 1994
M.S., Computer Science
University of Florida 1985 - 1988
B.S., Computer Science
Skills:
Integration
Software Design
Open Source
Soa
Software Development
Cloud Computing
Pre Sales
Linux
Program Management
Management
Enterprise Architecture
Team Leadership
It Strategy
Solution Architecture
Saas
Enterprise Software
Standards Development
System Architecture
Java
Software Project Management
Testing
Java Enterprise Edition
Virtualization
Unix
Team Management
Service Oriented Architecture
International Standards
Standardization
Interests:
Kayaking
Emerging Technology
Social Media
Linux
Photography
Hiking
Travel
Languages:
English
Armenian
Alexander Tarpinian Photo 2

Alexander Tarpinian

View page

Publications

Us Patents

Creating Software Debug Breakpoints Activated By Specific Call Patterns

View page
US Patent:
7735069, Jun 8, 2010
Filed:
Feb 9, 2006
Appl. No.:
11/351022
Inventors:
Leugim A. Bustelo - Austin TX, US
Andrew Hately - Austin TX, US
Julio E. Ruano - Austin TX, US
Alexander H. Tarpinian - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/44
US Classification:
717129
Abstract:
Provided is a method for defining and organizing computer breakpoints for use during a debugging operation of a software application. The claimed subject matter provides flexible breakpoints that are called depending upon the condition of the corresponding call-stack or, in other words, depending upon a specific calling sequence through which the module containing the breakpoint was reached. A novel type of breakpoint is provided that, rather than causing a halt in execution of a module, changes the state of one or more other breakpoints. In an alternative embodiment, a breakpoint is provided that determines whether or not to execute based upon an examination of the call-stack.

Method For Providing A Broadcast Encryption Based Home Security System

View page
US Patent:
8325926, Dec 4, 2012
Filed:
Feb 7, 2006
Appl. No.:
11/348902
Inventors:
Thomas A. Bellwood - Austin TX, US
Robert B. Chumbley - Round Rock TX, US
Matthew F. Rutkowski - Pflugerville TX, US
Alexander Tarpinian - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/08
US Classification:
380281
Abstract:
Provided is a method for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.

System And Method For Usage Based Key Management Rebinding Using Logical Partitions

View page
US Patent:
20060265338, Nov 23, 2006
Filed:
May 17, 2005
Appl. No.:
11/130726
Inventors:
Matt Rutkowski - Pflugerville TX, US
Thomas Bellwood - Austin TX, US
Robert Chumbley - Austin TX, US
Alexander Tarpinian - Austin TX, US
International Classification:
H04L 9/00
US Classification:
705071000
Abstract:
A system and method for usage based key management rebinding using logical partitions that intelligently organizes the scheduling and re-encryption processing of title keys into logical groups. Candidate title keys of the present invention are sorted into logical groups based upon content meta-data. This meta-data can be based upon content classification, usage patterns, frequency of use, currency of access and other configurable parameters. Title keys are partitioned based on meta-data and priority can be established between partitions. Title keys are re-encrypted with current binding information based on partition priority. Said title keys are tracked to ensure they are re-encrypted.

Method For Tracking The Expiration Of Encrypted Content Using Device Relative Time Intervals

View page
US Patent:
20070016956, Jan 18, 2007
Filed:
Jul 5, 2005
Appl. No.:
11/174966
Inventors:
Thomas Bellwood - Austin TX, US
Robert Chumbley - Austin TX, US
Matthew Rutkowski - Pflugerville TX, US
Alexander Tarpinian - Austin TX, US
International Classification:
H04N 7/16
US Classification:
726026000
Abstract:
Provided is a method for enabling a device without a secure clock to make a determination on the expiration of encrypted content. When the device receives content, the device also receives the content provider's policy on access. This information provides an ATI in UTI units which is to be associated with the content for the purpose of managing the content's expiration. The ATI is converted to the device's DTI units and the DTI is then used to control the availability of the content for decryption and use. The claimed subject matter permits the existence of tolerance, determined by content policy, in the conversion between UTI and the DTI, as well as in the depletion of the ATI. To move or copy content which has an associated remaining ATI, the device converts the ATI into UTI units and provides converted ATI to the target device in conjunction with the associated content.

Broadcast Encryption Based Security System

View page
US Patent:
20130022200, Jan 24, 2013
Filed:
Sep 14, 2012
Appl. No.:
13/620042
Inventors:
Thomas A. Bellwood - Austin TX, US
Robert B. Chumbley - Round Rock TX, US
Matthew F. Rutkowski - Pflugerville TX, US
Alexander Tarpinian - Austin TX, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
H04L 9/00
US Classification:
380255
Abstract:
Provided are techniques for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.
Alexander Hovanness Tarpinian from Austin, TX, age ~59 Get Report