Zerotier, Inc.
Founder
Red Digtal Cinema Dec 2013 - Mar 2015
Software Engineer
National Climatic Data Center Feb 2011 - Dec 2013
Network Security and Software Engineer
Kd Secure Oct 2009 - Dec 2010
Senior Software Engineer
Synthesis Studios Sep 2008 - Nov 2009
Software and Hardware Engineer
Education:
University of Cincinnati 1999 - 2003
Bachelors, Bachelor of Science, Genetics, Biology
Skills:
Software Engineering Linux Distributed Systems Algorithms Programming Java Python Unix Web Applications Software Development C++ Mysql Sql Software Design Data Mining Network Engineering Machine Learning Jquery Html Javascript Web Development Perl .Net Ruby Git Evolutionary Computation Evolutionary Biology Databases C C# Xml Php Optimization Mobile Devices Simulations Subversion Ruby on Rails Postgresql Computer Science Simulation
Interests:
Data Center Automation E Commerce Biotechnology Big Data Life Sciences Enterprise Software Big Data Analytics Internet Infrastructure
Name / Title
Company / Classification
Phones & Addresses
Adam Ierymenko President
AUTOCONSTRUCTIVE TECHNOLOGIES CORPORATION
21 Holyoke St, Quincy, MA 02171
Adam Ierymenko
GENERAL NEGENTROPICS CORPORATION
Us Patents
Systems, Methods, And Devices For Detecting Security Vulnerabilities In Ip Networks
John J. Donovan - Hamilton MA, US Daniar Hussain - Cambridge MA, US Adam Ierymenko - Jamaica Plain MA, US Paul Parisi - Boxford MA, US Richard Person - Newburyport MA, US Marc Siegel - Dedham MA, US Charles Stefanidakis - Newbury MA, US
International Classification:
G06F 21/00 G06F 15/173 G06N 5/02
US Classification:
709224, 726 25, 706 47
Abstract:
This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack (for an IP camera, unauthorized person seeing a camera image); and (3) Spoofing Attack (for an IP camera, unauthorized person seeing substitute images). A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint (a hash of device configuration data) may be used as a private key to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks.
System And Method For Carrying Out An Inspection Or Maintenance Operation With Compliance Tracking Using A Handheld Device
Jeffrey York - San Ramon CA, US Marc Siegel - Dedham MA, US Albert Ho - Westford MA, US Christopher Tossing - Waltham MA, US Adam Ierymenko - Jamaica Plain MA, US Daniar Hussain - Cambridge MA, US
International Classification:
G06Q 10/00 G01C 21/00 H04Q 5/22
US Classification:
705 9, 705 8, 705 7, 701213, 705 28, 340 101
Abstract:
The present invention is a system and method for inspections and compliance verification of industrial equipment using a handheld device. An inspector first segments an inspected component into logical inspection points. The inspector then scans a unique machine-readable tag, such as an RFID tag, with a handheld device at each logical inspection point. The inspector then takes a media sample, such as a digital photograph, of the physical component referred to by each corresponding logical inspection point. Then the inspector associates the media samples with the corresponding scan of the unique machine-readable tag. For each of the actions the inspector carries out on the handheld device, a timestamp is added that represents evidence of a date and a time of physical visitation to the associated logical inspection point. The inspector may then annotate the media samples in such ways that substantiate inspector statements of problems with inspected components found during inspection.
System And Method For Carrying Out An Inspection Or Maintenance Operation With Compliance Tracking Using A Handheld Device
Jeffery York - San Ramon CA, US Marc Siegel - Boston MA, US Albert Ho - Westford MA, US Christopher Tossing - Ashland MA, US Adam Ierymenko - Jamaica Plain MA, US Daniar Hussain - Pittsburgh PA, US
International Classification:
G06Q 10/00 H04Q 5/22
US Classification:
705301, 705317, 340 101
Abstract:
The present invention is a system and method for inspections and compliance verification of industrial equipment using a handheld device. An inspector first segments an inspected component into logical inspection points. The inspector then scans a unique machine-readable tag, such as an RFID tag, with a handheld device at each logical inspection point. The inspector then takes a media sample, such as a digital photograph, of the physical component referred to by each corresponding logical inspection point. Then the inspector associates the media samples with the corresponding scan of the unique machine-readable tag. For each of the actions the inspector carries out on the handheld device, a timestamp is added that represents evidence of a date and a time of physical visitation to the associated logical inspection point. The inspector may then annotate the media samples in such ways that substantiate inspector statements of problems with inspected components found during inspection.
System And Method Used For Configuration Of An Inspection Compliance Tool With Machine Readable Tags And Their Associations To Inspected Components
Albert Ho - Boston MA, US Marc Siegel - Boston MA, US Christopher Tossing - Ashland MA, US Adam Ierymenko - Jamaica Plain MA, US Daniar Hussain - Pittsburgh PA, US
International Classification:
G06Q 10/00
US Classification:
705317
Abstract:
The present invention relates to configuration of inspection systems and compliance verification systems using a handheld device and a remote database. Disclosed here is a method for configuring a project having one or more installation of assets for use with an industrial inspection compliance system, including the steps of (a) defining an installation and storage area for the project; (b) assigning the assets uniquely into the one or more installation or storage area; (c) segmenting each asset into components; (d) assigning logical inspection points for the project, installations, and the assets; (e) defining inspection criteria for each logical inspection point; (f) assigning tag locations for a machine-readable tag having a unique serial number at or near each logical inspection point; (g) capturing a media sample of each logical inspection point; (h) capturing location coordinates for each logical inspection point; and (i) requiring the collection of data such as a unique machine-readable tag serial number, media sample, location coordinates, and an encrypted security signature to confirm that the inspection actions actually occurred.
System And Method Used For Configuration Of An Inspection Compliance Tool With Machine Readable Tags And Their Associations To Inspected Components
Albert Ho - Boston MA, US Marc Siegel - Boston MA, US Christopher Tossing - Ashland MA, US Adam Ierymenko - Jamaica Plain MA, US Daniar Hussain - Pittsburgh PA, US
Assignee:
KD Secure LLC - Boston MA
International Classification:
G06F 19/00 G06K 19/06
US Classification:
235492, 235385
Abstract:
The present invention relates to configuration of inspection systems and compliance verification systems using a handheld device and a remote database. Disclosed here is a method for configuring a project having one or more installation of assets for use with an industrial inspection compliance system, including the steps of (a) defining an installation and storage area for the project; (b) assigning the assets uniquely into the one or more installation or storage area; (c) segmenting each asset into components; (d) assigning logical inspection points for the project, installations, and the assets; (e) defining inspection criteria for each logical inspection point; (f) assigning tag locations for a machine-readable tag having a unique serial number at or near each logical inspection point; (g) capturing a media sample of each logical inspection point; (h) capturing location coordinates for each logical inspection point; and (i) requiring the collection of data such as a unique machine-readable tag serial number, media sample, location coordinates, and an encrypted security signature to confirm that the inspection actions actually occurred.
Youtube
Adam Ierymenko on Evolvable Instruction Sets ...
Adam Ierymenko of Grey Thumb Boston discusses evolvable instruction se...
Duration:
1h 1m 36s
myStartUp.Live w/Adam Ierymenko of ZeroTier
Streamed live on September 15th, 2017.
Duration:
30m 1s
Redecentralize interviews: ZeroTierOne with A...
interview with Adam Ierymenko on - a technology for flat virtual Eth...
Duration:
36m 56s
Artificial Life with Nanopond
Eight hours of undirected program evolution in Nanopond version 1.9 sh...
Duration:
15m 2s
ZeroTier Networking Demo
In the following Networking Field Day video, ZeroTier Founder Adam Ier...
Duration:
16m 20s
ZeroTier Technical Deep Dive
In the following Networking Field Day video, ZeroTier founder Adam Ier...
Duration:
38m 20s
ZeroTier The Planetary Data Center
In the following Networking Field Day video, ZeroTier Founder Adam Ier...
Duration:
29m 1s
Mechanisms as Minds: What Camping Tents Can T...
Grey Thumb Boston: December 2008 Dr. John Rieffel of Tufts University ...