Search

Roger Geiwitz Phones & Addresses

  • Pagosa Springs, CO
  • Littleton, CO
  • Castle Rock, CO
  • 6295 Killarney St, Aurora, CO 80010 (303) 617-8460 (303) 400-0868
  • Golden, CO
  • Broomfield, CO
  • San Diego, CA
  • Miami, FL
  • Golden, CO
  • Las Vegas, NV

Public records

Vehicle Records

Roger Geiwitz

View page
Address:
1339 Jasmine St, Denver, CO 80220
Phone:
(303) 886-2014
VIN:
5NMSG3AB1AH394244
Make:
HYUNDAI
Model:
SANTA FE
Year:
2010

Resumes

Resumes

Roger Geiwitz Photo 1

Senior Data Integration Architect

View page
Location:
2399 Blake St, Denver, CO 80205
Industry:
Information Technology And Services
Work:
Client Server Associates
Senior Data Integration Architect

Janus Capital Group 2014 - 2014
Composite Data Architect

Datasource Consulting, An Exl Company 2014 - 2014
Senior Data Integration Architect

Lpl Financial - Offices of Weisman, Tessier, Lambert & Halloran Oct 2012 - Dec 2012
Composite Software Data Virtualization Specialist

Re/Max Apr 2012 - Sep 2012
Lead Etl Specialist
Education:
Parks Junior College
Skills:
Etl
Data Warehousing
Informatica
Data Modeling
Oracle
Interests:
1997
May 98
July 98
Isi Data Warehouse Symposium
Roger Geiwitz Photo 2

Senior Data Integration Architect

View page
Location:
Pagosa Springs, CO
Work:
Client Server Associates
Senior Data Integration Architect

Publications

Us Patents

Data Security System And Method

View page
US Patent:
57519498, May 12, 1998
Filed:
May 23, 1995
Appl. No.:
8/447650
Inventors:
Robert David Thomson - Colorado Springs CO
Roger Geiwitz - Monument CO
Assignee:
MCI Corporation - Washington DC
International Classification:
G06F 1300
US Classification:
39518701
Abstract:
A security system and method are provided for securing user access to server tables having data arranged in rows and columns. The server table is contained in a server computer which is accessible by a plurality of user terminals joined thereto. The server computer includes relational database software for creating and maintaining tables, including the server table, and views defining subsets of the tables. A security table is stored in the computer for identifying authorized user access to preselected rows of the server table for pre-identified users. An access view is stored in the computer for automatically joining the security and server tables to limit user access to the server table to the preselected rows thereof based on the security table. A single security table may therefore be used and is readily updated by merely deleting, adding, or updating entries.
Roger A Geiwitz from Pagosa Springs, CO, age ~69 Get Report