Search

Barry Mosakowski Phones & Addresses

  • 1214 Willowbrook Dr, Cary, NC 27511 (919) 650-3283
  • Myrtle Beach, SC
  • 1521 Linden St, Cheswick, PA 15024
  • 3341 Joanne Dr, Raleigh, NC 27603
  • 1230 University Ct, Raleigh, NC 27606
  • 200 Maple Creek Ct, Apex, NC 27502
  • North Myrtle Beach, SC
  • 1214 Willowbrook Dr, Cary, NC 27511

Work

Position: World wide architect for ibm blockchain

Skills

Rtp • Cloud Computing • Citrix • Software • Cas

Resumes

Resumes

Barry Mosakowski Photo 1

World Wide Architect For Ibm Blockchain

View page
Work:

World Wide Architect For Ibm Blockchain
Skills:
Rtp
Cloud Computing
Citrix
Software
Cas

Publications

Us Patents

Policy-Based Security Certificate Filtering

View page
US Patent:
7984479, Jul 19, 2011
Filed:
Apr 17, 2006
Appl. No.:
11/405069
Inventors:
Roy F. Brabson - Raleigh NC, US
Barry Mosakowski - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/00
H04L 29/06
H04L 9/32
US Classification:
726 1, 726 10, 713155, 713156, 713157, 713158
Abstract:
Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i. e. , treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i. e. , treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.

Policy-Based Security Certificate Filtering

View page
US Patent:
8458768, Jun 4, 2013
Filed:
May 19, 2011
Appl. No.:
13/111907
Inventors:
Roy F. Brabson - Raleigh NC, US
Barry Mosakowski - Cary NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/06
US Classification:
726 1, 726 10, 713155, 713156, 713157, 713158
Abstract:
Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i. e. , treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i. e. , treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.

Reliable And Resilient End-To-End Connectivity For Heterogeneous Networks

View page
US Patent:
20080259790, Oct 23, 2008
Filed:
Apr 22, 2007
Appl. No.:
11/738499
Inventors:
Dinakaran Joseph - Apex NC, US
Jon K. Franks - Apex NC, US
Christopher N. Freeman - Cary NC, US
Sivaram Gottimukkala - Morrisville NC, US
Jason P. Hawrysz - Durham NC, US
Lap T. Huynh - Cary NC, US
Barry Mosakowski - Cary NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04J 1/16
US Classification:
370230
Abstract:
Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes. Finally, the method can include re-binding the application endpoint to a second of the different network resource nodes in response to detecting the outage.

Reliable And Resilient End-To-End Connectivity For Heterogeneous Networks

View page
US Patent:
20110038256, Feb 17, 2011
Filed:
Oct 25, 2010
Appl. No.:
12/911707
Inventors:
Dinakaran Joseph - Apex NC, US
Jon K. Franks - Apex NC, US
Christopher N. Freeman - Cary NC, US
Sivaram Gottimukkala - Morrisville NC, US
Jason P. Hawrysz - Durham NC, US
Lap T. Huynh - Cary NC, US
Barry Mosakowski - Cary NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 11/00
US Classification:
370221
Abstract:
Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes. Finally, the method can include re-binding the application endpoint to a second of the different network resource nodes in response to detecting the outage.

Reliable And Resilient End-To-End Connectivity For Heterogeneous Networks

View page
US Patent:
20120213059, Aug 23, 2012
Filed:
Feb 28, 2012
Appl. No.:
13/406653
Inventors:
Dinakaran Joseph - Apex NC, US
Jon K. Franks - Apex NC, US
Christopher N. Freeman - Cary NC, US
Sivaram Gottimukkala - Morrisville NC, US
Jason P. Hawrysz - Durham NC, US
Lap T. Huynh - Cary NC, US
Barry Mosakowski - Cary NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/00
US Classification:
370221
Abstract:
Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. Finally, the method can include re-binding the application endpoint to a second of the different network resource nodes in response to detecting the outage.

Crowd-Sourced Qa With Trusted Compute Model

View page
US Patent:
20220353076, Nov 3, 2022
Filed:
Apr 28, 2021
Appl. No.:
17/242711
Inventors:
- Armonk NY, US
Timothy Peter Ellison - Hampshire, GB
Haechul Shin - Durham NC, US
Gennaro A. Cuomo - Durham NC, US
Barry Mosakowski - Raleigh NC, US
Mark Anthony Parzygnat - Raleigh NC, US
International Classification:
H04L 9/32
H04L 29/06
G06F 9/451
H04L 9/30
G06F 11/36
Abstract:
An approach is provided in which the approach collects distributed test results from multiple users, wherein at least one of the multiple users is an untrusted user. The approach aggregates the distributed test results in response to determining that each one of the distributed test results corresponds to the same system under test. The approach then presents the aggregated test results as a trusted test result.

Optimizing Performance Of A Blockchain

View page
US Patent:
20200052881, Feb 13, 2020
Filed:
Aug 8, 2018
Appl. No.:
16/058612
Inventors:
- Armonk NY, US
Barry Mosakowski - Raleigh NC, US
Jianjun Zhang - Cary NC, US
International Classification:
H04L 9/06
G06F 21/60
G06F 17/30
G06F 9/46
Abstract:
An example operation may include one or more of monitoring, by an adaptive traffic engine, transactions data of a blockchain, detecting, by the adaptive traffic engine, a transaction commit event time out in a blockchain, determining, by the adaptive traffic engine, a processing queue of a the blockchain, measuring, by the adaptive traffic engine, a sending rate of the blockchain, and adjusting the sending rate, by the adaptive traffic engine, based on the transaction commit event time out, the processing queue and the sending rate to optimize performance of the blockchain.

Dynamic And Secure Cloud To On-Premise Interaction And Connection Management

View page
US Patent:
20170201509, Jul 13, 2017
Filed:
Jan 11, 2016
Appl. No.:
14/992481
Inventors:
- Armonk NY, US
Chih-Hsiung Liu - Taipei, TW
Barry Mosakowski - Raleigh NC, US
Srinivasan Muralidharan - Apex NC, US
International Classification:
H04L 29/06
H04L 12/26
H04W 12/06
H04L 12/24
Abstract:
The described herein relates to a method executed by a passport service executed by at least one processor coupled to at least one memory. The method includes creating a passport on a cloud application that comprises connectivity details for a tunnel and activating an on-premise appliance of an on-premise system by delivering the passport to the on-premise appliance to build the tunnel. The method further includes generating a passport token via the passport, wherein the passport token comprises dynamically generated connectivity properties. The method also includes binding the cloud application and the on-premise appliance based on the dynamically generated connectivity properties of the passport token and the connectivity details of the passport.
Barry Mosakowski from Cary, NC, age ~54 Get Report