Search

Eric Kotz Phones & Addresses

  • Seattle, WA
  • Charlotte, NC
  • Rochester, NY
  • Elma, NY
  • Rison, AR
  • Elba, NY
  • 517 Ebb Pl, Charlotte, NC 28210

Work

Position: Clerical/White Collar

Education

Degree: High school graduate or higher

Resumes

Resumes

Eric Kotz Photo 1

Software Firmware Engineer, Surface Quality Dve

View page
Location:
4010 Lake Washington Blvd northeast, Kirkland, WA 98033
Industry:
Information Technology And Services
Work:
Ceton Corporation - Charlotte, NC since Sep 2011
Quality Assurance Manager

Microsoft - Charlotte, North Carolina Area Mar 2007 - Sep 2011
Senior Support Escalation Engineer

Rochester Institute of Technology - Rochester, New York Area Jun 2006 - May 2007
Senior Residential Computing Consultant

WITR - Rochester, New York Area Jan 2006 - May 2007
Engineering Director

Rochester Institute of Technology - Rochester, New York Area Dec 2004 - Jun 2006
Systems Administrator
Education:
Rochester Institute of Technology 2002 - 2007
Networking, Security and System Administration, Information Technology
University of North Carolina at Charlotte 2007
Software and Information Systems, Computing
Skills:
Servers
Networking
Technical Support
Hardware
Active Directory
Windows Server
Windows 7
Linux
Microsoft Technologies
Windows
Computer Security
System Deployment
Cloud Computing
Hyper V
Cablecard
Network Security
Customer Service
Customer Satisfaction
Group Policy
Cable Television
Tcp/Ip
Performance Tuning
Windows Desktop Administration
Wireshark
Printing
Os X
Iptv
Dns
Centos
Red Hat Linux
Software Deployment
Dos
Enterprise Storage
Terminal Services
Microsoft Cluster
Windows Phone
Windows Registry
Desktop Deployment
Memory Management
Ubuntu Linux
Windbg
Android
Apple Ios
Windows 8
Windows 8.1
Dhcp
Ubuntu
Windows 10
Windows Server 2008 R2
Windows Server 2012 R2
Interests:
Education
Environment
Science and Technology
Human Rights
Health
Languages:
English
Certifications:
Mcse
Mcse: Security
Mcsa
Mcitp
Mcts
Mcdst
Mcp
Microsoft Certified Solutions Associate
Mcps: Microsoft Certified Professional
Mcsa1: Security on Windows Server 2003
Mcsa1: Windows Server 2003
Mcse1: Security on Windows Server 2003
Mcse1: Windows Server 2003
Mcts: Microsoft Windows Vista, Configuration
Mcts: Business Desktop Deployment
Mcitp: Enterprise Support Technician on Windows Vista
Mcitp: Consumer Support Technician on Windows Vista
Mcts: Windows Server 2003 Hosting, Configuration and Management
Mcts: Windows Server 2008 Active Directory, Configuration
Mcts: Windows Server 2008 Network Infrastructure, Configuration
Mcts: Windows Server 2008 Applications Infrastructure, Configuration
Mcitp: Server Administrator on Windows Server 2008
Mcitp: Enterprise Administrator on Windows Server 2008
Mcts: Windows Server Virtualization, Configuration
Mcts: Windows Small Business Server 2008, Configuration
Mcts: Windows Essential Business Server 2008, Configuration
Mcts: Microsoft Desktop Optimization Pack, Configuration
Mcts: System Center Virtual Machine Manager 2008, Configuration
Mcts: Windows Internals
Mcts: Volume Licensing Specialist, Small and Medium Organizations
Mcts: Volume Licensing Specialist, Large Organizations
Mcts: Connected Home Integrator
Mcts: Windows 7, Configuration
Mcitp: Enterprise Desktop Administrator on Windows 7
Mcitp: Enterprise Desktop Support Technician on Windows 7
Mcts: Windows Server 2008 R2, Desktop Virtualization
Mcsa1: Security on Windows Server 2003 Plus Recertification
Mcts: Windows Small Business Server 2011, Configuring
Mcsa: Windows Server 2008
Mcsa: Windows 7
Mcps: Microsoft Certified Professional (Link)
Mcsa1: Security on Windows Server 2003 (Link)
Mcsa1: Windows Server 2003 (Link)
Mcse1: Security on Windows Server 2003 (Link)
Mcse1: Windows Server 2003 (Link)
Mcts: Microsoft Windows Vista, Configuration (Link)
Mcts: Business Desktop Deployment (Link)
Mcitp: Enterprise Support Technician on Windows Vista (Link)
Mcitp: Consumer Support Technician on Windows Vista (Link)
Mcts: Windows Server 2003 Hosting, Configuration and Management (Link)
Mcts: Windows Server 2008 Active Directory, Configuration (Link)
Mcts: Windows Server 2008 Network Infrastructure, Configuration (Link)
Mcts: Windows Server 2008 Applications Infrastructure, Configuration (Link)
Mcitp: Server Administrator on Windows Server 2008 (Link)
Mcitp: Enterprise Administrator on Windows Server 2008 (Link)
Mcts: Windows Server Virtualization, Configuration (Link)
Mcts: Windows Small Business Server 2008, Configuration (Link)
Mcts: Windows Essential Business Server 2008, Configuration (Link)
Mcts: Microsoft Desktop Optimization Pack, Configuration (Link)
Mcts: System Center Virtual Machine Manager 2008, Configuration (Link)
Mcts: Windows Internals (Link)
Mcts: Volume Licensing Specialist, Small and Medium Organizations (Link)
Mcts: Volume Licensing Specialist, Large Organizations (Link)
Mcts: Connected Home Integrator (Link)
Mcts: Windows 7, Configuration (Link)
Mcitp: Enterprise Desktop Administrator on Windows 7 (Link)
Mcitp: Enterprise Desktop Support Technician on Windows 7 (Link)
Mcts: Windows Server 2008 R2, Desktop Virtualization (Link)
Mcsa1: Security on Windows Server 2003 Plus Recertification (Link)
Mcts: Windows Small Business Server 2011, Configuring (Link)
Mcsa: Windows Server 2008 (Link)
Mcsa: Windows 7 (Link)
Microsoft
Eric Kotz Photo 2

Eric Kotz

View page

Business Records

Name / Title
Company / Classification
Phones & Addresses
Eric Kotz
Principal
Thoughtcube Inc
Business Services at Non-Commercial Site
517 Ebb Pl, Charlotte, NC 28210

Publications

Us Patents

Secure Access To Accessory Device Resources

View page
US Patent:
20210326459, Oct 21, 2021
Filed:
Apr 21, 2020
Appl. No.:
16/854793
Inventors:
- Redmond WA, US
Robert D. Young - Kirkland WA, US
Nathan C. Sherman - Bellevue WA, US
Chirag Shah - San Jose CA, US
Brandon Records - Issaquah WA, US
Astha Keshan - San Jose CA, US
Eric Kotz - Seattle WA, US
M. Nashaat Soliman - Redmond WA, US
International Classification:
G06F 21/60
G06F 21/44
H04L 9/32
H04L 9/30
Abstract:
An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.
Eric P Kotz from Seattle, WA, age ~40 Get Report