Search

Daniel T Jump

age ~34

from Renton, WA

Daniel Jump Phones & Addresses

  • Renton, WA
  • Snoqualmie, WA
  • Whittier, CA
  • Anaheim, CA
  • Valley Center, CA
  • Fullerton, CA
  • Eugene, OR
  • Menifee, CA

Work

  • Company:
    Rockledge securities
    Jul 2008
  • Position:
    Dispatch/customer relations

Education

  • School / High School:
    California State University at Fullerton- Fullerton, CA
    2010
  • Specialities:
    BA in English

Resumes

Daniel Jump Photo 1

Ceo Of Contoso

view source
Location:
Greater Seattle Area
Industry:
Computer Software
Daniel Jump Photo 2

Underwriter

view source
Location:
Chicago, IL
Industry:
Financial Services
Work:
Zurich North America
Underwriter

Cna Insurance Jun 2015 - Jan 2019
Life Sciences Underwriter
Education:
University of Illinois at Urbana - Champaign 2011 - 2015
Bachelors, Bachelor of Science, Finance
Palatine High School 2007 - 2011
Skills:
Microsoft Excel
Microsoft Office
Powerpoint
Microsoft Word
Customer Service
Teamwork
Financial Analysis
Research
Public Speaking
Social Media
English
Sql
Accounting
Html
Data Analysis
Leadership
Time Management
Event Planning
Analysis
Management
Interests:
Kayaking
Entrepreneurship
Investing
Do It Yourself Projects
Biking
Travel
Fishing
Biographies
Languages:
Spanish
Daniel Jump Photo 3

Principal Software Engineering Manager

view source
Location:
Seattle, WA
Industry:
Computer Software
Work:
Microsoft
Principal Software Engineering Manager

Descry Aug 1998 - Aug 2000
Senior Software Developer
Education:
Eastern Washington University 1994 - 1999
Bachelors, Bachelor of Science, Computer Science, Physics
Skills:
Software Engineering
Software Design
Software Development
C++
Distributed Systems
Object Oriented Design
C#
Algorithms
Visual Studio
Win32 Api
Agile Methodologies
.Net
Xml
Wpf
Web Services
Software Project Management
Multithreading
Asp.net
Silverlight
Scalability
Javascript
Java
Wcf
Daniel Jump Photo 4

Daniel Jump

view source
Daniel Jump Photo 5

Daniel Jump

view source
Location:
United States
Industry:
Computer Networking
Daniel Jump Photo 6

Daniel Jump

view source
Location:
Greater Seattle Area
Industry:
Computer Software
Daniel Jump Photo 7

Daniel Jump Anaheim, CA

view source
Work:
Rockledge Securities

Jul 2008 to 2000
Dispatch/Customer Relations
Education:
California State University at Fullerton
Fullerton, CA
2010 to 2013
BA in English

License Records

Daniel A Jump

License #:
23161 - Expired
Category:
Cosmetology
Issued Date:
Jul 1, 1969
Effective Date:
Jan 1, 2009
Expiration Date:
Dec 31, 2008
Type:
Cosmetologist

Us Patents

  • Systems And Methods For Changing Items In A Computer File

    view source
  • US Patent:
    7395269, Jul 1, 2008
  • Filed:
    Dec 20, 2004
  • Appl. No.:
    11/018386
  • Inventors:
    Li Hua - Redmond WA, US
    Daniel B. Jump - Duvall WA, US
    Isaac E. Nichols - Seattle WA, US
    Joshua M. Pollock - Seattle WA, US
    Ravishankar Shanmugam - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 17/40
  • US Classification:
    707101, 707102, 707205
  • Abstract:
    Systems and methods for changing items of a computer file, such as an archive file, can include an application programmed to create a file including a first item and a second item, the application storing the file on a storage medium. Systems can also include an input/output module associated with the application, the input/output module retiring the first item upon a change to the first item resulting in an increase or a decrease in a size of the first item. Upon retiring the first item, the input/output module can write a third item at an end of the file, the third item including the change to the first item. Methods can include retiring the first item upon a change to the first item, and writing a third item after the second item, the third item including the change to the first item.
  • System And Method For Sharing Objects Between Computers Over A Network

    view source
  • US Patent:
    20050218739, Oct 6, 2005
  • Filed:
    Apr 1, 2004
  • Appl. No.:
    10/816319
  • Inventors:
    Matthew Maddin - Seattle WA, US
    Shaheeda Nizar - Redmond WA, US
    Daniel Jump - Duvall WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F015/16
    H02K023/60
  • US Classification:
    310120000
  • Abstract:
    A method and system to share objects that may reside on different machines. These objects can be accessed and shared using a computer network such as the Internet. The objects can comprise computer programming objects, that may include but are not limited to, application programming interfaces (APIs), programming object libraries, computer program object definitions, and other like information for computer network based applications. The method and system do not require a computer server since the invention may operate more like a peer-to-peer or multipoint computer network. The method and system can work with both peer-to-peer networks and client-server networks without requiring computers in a network to be identified as servers or as non-server (client) type computers.
  • Systems And Methods For Changing Items In A Computer File

    view source
  • US Patent:
    20060136356, Jun 22, 2006
  • Filed:
    Dec 20, 2004
  • Appl. No.:
    11/018863
  • Inventors:
    Li Hua - Redmond WA, US
    Daniel Jump - Duvall WA, US
    Isaac Nichols - Seattle WA, US
    David Ornstein - Seattle WA, US
    Joshua Pollock - Seattle WA, US
    Ravishankar Shanmugam - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 17/30
  • US Classification:
    707001000
  • Abstract:
    Systems and methods for changing items of a computer file can include a storage medium, and an application programmed to create a file including a first item and a second item, the application storing the file on the storage medium, and the first item including padding. The system can also include an input/output module associated with the application, the input/output module being programmed to use at least a portion of the padding of the first item to accommodate a change in a size of the first item. A method can include providing a file including at least a first item and a second item, the first item including padding, changing the first item, and using at least a portion of the padding of the first item to accommodate a change in a size of the first item.
  • Isolation And Presentation Of Untrusted Data

    view source
  • US Patent:
    20110099609, Apr 28, 2011
  • Filed:
    Oct 28, 2009
  • Appl. No.:
    12/607074
  • Inventors:
    Vikas Malhotra - Redmond WA, US
    Benjamin E. Canning - Seattle WA, US
    Daniel B. Jump - Redmond WA, US
    David C. LeBlanc - Monroe WA, US
    Benjamen E. Ross - Seattle WA, US
    James Campbell - Seattle WA, US
    Brian Carver - Kirkland WA, US
    Joshua Pollock - Seattle WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 21/00
    G06F 3/00
    G06F 15/16
  • US Classification:
    726 4, 715700, 709203, 726 26
  • Abstract:
    Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.
  • Techniques To Store Secret Information For Global Data Centers

    view source
  • US Patent:
    20130167200, Jun 27, 2013
  • Filed:
    Dec 22, 2011
  • Appl. No.:
    13/334360
  • Inventors:
    Jonathan Birch - Redmond WA, US
    Amit Date - Redmond WA, US
    Daniel Jump - Redmond WA, US
    Vikas Malhotra - Kirkland WA, US
    Bradley Albrecht - Snohomish WA, US
    Ali Deniz Demircioglu - Bellevue WA, US
  • Assignee:
    MICROSOFT CORPORATION - Redmond WA
  • International Classification:
    H04L 9/32
    G06F 12/14
  • US Classification:
    726 4, 726 27, 726 29, 726 7
  • Abstract:
    Techniques to store secret information for global data centers securely are described. Various embodiments may provide a front end service for a back end data store. The front end service may be responsible for deployment, upgrade, and disaster recovery aspects, and so forth, of data center maintenance. Data centers may access data and data-related services from the back end data store through the front end service. Secrets that are needed to access secure data may be stored on behalf of the data centers without providing the secrets to the data centers. Other embodiments are described and claimed.
  • Detection Of Invalid Escrow Keys

    view source
  • US Patent:
    20130185557, Jul 18, 2013
  • Filed:
    Jan 13, 2012
  • Appl. No.:
    13/350360
  • Inventors:
    Venkataramann Renganathan - Sammamish WA, US
    Brian Thomas Carver - Kirkland WA, US
    Daniel Browne Jump - Redmond WA, US
    David Charles LeBlanc - Monroe WA, US
    Samuel Ira Weiss - Sacramento CA, US
  • Assignee:
    MICROSOFT CORPORATION - Redmond WA
  • International Classification:
    H04L 9/30
  • US Classification:
    713168
  • Abstract:
    A secure hash, such as a Hash-based Message Authentication Code (“HMAC”), is generated using a piece of secret information (e.g., a secret key) and a piece of public information specific to each escrow key (e.g., a certificate hash or public key). Using the secret key ensures that escrow key validation data can only be generated by knowing the secret key, which prevents an attacker from generating the appropriate escrow key validation data. Using the certificate hash as the public data ties each escrow key validation data to a particular certificate, thereby preventing the attacker from simply copying the validation data from another escrow key. Any escrow key that is found to be invalid may be removed from the file container and a system audit log may be generated so that a company, individual, or other entity can be aware of the possible attempt at a security breach.
  • Identifier Generation Using Named Objects

    view source
  • US Patent:
    20130198831, Aug 1, 2013
  • Filed:
    Jan 27, 2012
  • Appl. No.:
    13/360329
  • Inventors:
    Daniel B. Jump - Redmond WA, US
    Brian T. Carver - Kirkland, WA, US
    David C. LeBlanc - Monroe, WA, US
  • Assignee:
    MICROSOFT CORPORATION - Redmond WA
  • International Classification:
    G06F 21/00
    G06F 9/46
  • US Classification:
    726 16, 718100
  • Abstract:
    A candidate identifier for a process is generated and an attempt is made to have a named object created that has a name that is the candidate identifier. In response to the attempt succeeding and the named object being created, the candidate identifier is used as an identifier for the process. In response to the attempt not succeeding and the named object not being created, the generating and attempting are repeated.
  • Isolation And Presentation Of Untrusted Data

    view source
  • US Patent:
    20180196940, Jul 12, 2018
  • Filed:
    Mar 7, 2018
  • Appl. No.:
    15/914916
  • Inventors:
    - Redmond WA, US
    Benjamin E. CANNING - Seattle WA, US
    Daniel B. JUMP - Redmond WA, US
    David C. LeBLANC - Monroe WA, US
    Benjamen E. ROSS - Seattle WA, US
    James CAMPBELL - Seattle WA, US
    Brian CARVER - Kirkland WA, US
    Joshua POLLOCK - Seattle WA, US
  • International Classification:
    G06F 21/53
    G06F 21/62
    G06F 21/60
  • Abstract:
    Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.

Youtube

Daniel Jump

Broertje JumpT????

  • Category:
    People & Blogs
  • Uploaded:
    02 Aug, 2007
  • Duration:
    52s

Madonna Confessions Tour: Daniel Cloud Campos...

The fabulous Cloud does his thang during Jump.

  • Category:
    Music
  • Uploaded:
    18 Nov, 2007
  • Duration:
    27s

Daniel Day-Lewis - 'Movies 101' Part 4

Part 4 of 5. This is Daniel Day-Lewis's 2005 appearance on the AMC int...

  • Category:
    Entertainment
  • Uploaded:
    08 May, 2008
  • Duration:
    9m 40s

Daniel Johnston - God

From 1983's 'Yip/Jump Music'.

  • Category:
    Music
  • Uploaded:
    17 Jun, 2009
  • Duration:
    2m 31s

Cologne Arm Jump - Daniel Ilabaca Parkour Tour

www.facebook.com Sneak peak of the movement Daniel did when we visited...

  • Category:
    Film & Animation
  • Uploaded:
    25 Oct, 2010
  • Duration:
    31s

"Star Trek: The Beginning" Teaser Trailer - B...

"Star Trek: The Beginning" Teaser Trailer - By Daniel Broadway Visual ...

  • Category:
    Film & Animation
  • Uploaded:
    26 Apr, 2009
  • Duration:
    1m 32s

Daniel Johnston - The Beatles(1983)

Title- The Beatles Artist- Daniel Johnston Album- Yip Jump Music Year-...

  • Category:
    Music
  • Uploaded:
    24 Feb, 2009
  • Duration:
    2m 32s

Daniel Johnston - Worried Shoes

From 1983's Yip/Jump Music.

  • Category:
    Music
  • Uploaded:
    06 Oct, 2009
  • Duration:
    6m 38s

Other Social Networks

Daniel Jump Photo 8

Daniel Jump Google+

view source
Network:
GooglePlus
Daniel Jump - tag... tag... tag.... - - ... ,["101044401036883153362","htt... Jump" ...

Facebook

Daniel Jump Photo 9

Dan Jump Around

view source
Daniel Jump Photo 10

Daniel Jump

view source
Daniel Jump Photo 11

Daniel Jump

view source
Daniel Jump Photo 12

Daniel Jump

view source
Daniel Jump Photo 13

Daniel Jump

view source
Daniel Jump Photo 14

Daniel Jump

view source
Daniel Jump Photo 15

Daniel Jump

view source
Daniel Jump Photo 16

Daniel Jump

view source

Googleplus

Daniel Jump Photo 17

Daniel Jump

Work:
Microsoft
Education:
Eastern Washington University
Daniel Jump Photo 18

Daniel Jump

Daniel Jump Photo 19

Daniel Jump

Tagline:
Tag... tag... tag....
Daniel Jump Photo 20

Daniel Jump

Daniel Jump Photo 21

Daniel Jump

Myspace

Daniel Jump Photo 22

Daniel Jump

view source
Locality:
RIDGEFIELD PARK, New Jersey
Gender:
Male
Birthday:
1950
Daniel Jump Photo 23

Daniel Jump

view source
Locality:
FULLERTON, California
Gender:
Male
Birthday:
1948
Daniel Jump Photo 24

Daniel Jump

view source
Locality:
BUCHAREST, Romania
Gender:
Male
Birthday:
1946
Daniel Jump Photo 25

daniel jump

view source
Locality:
ESTACADA, Oregon
Gender:
Male
Birthday:
1945

Classmates

Daniel Jump Photo 26

Daniel Jump

view source
Schools:
Walthill High School Walthill NE 1963-1967
Community:
Michael Loofe, Cal Brummund, Arie Jones, Gayus Mccauley, Carol Culbertson, Randall Sailors, Alice Means, John Mahaney, Terry Gaer, Jeanne Kunzie, Beverly Archer
Daniel Jump Photo 27

Ft. Zumwalt North High Sc...

view source
Graduates:
Dan Jump (1980-1984),
Bekah Newbold (1988-1992),
Tracy Smith (1987-1991),
Angela Quillman (1984-1988)

Flickr


Get Report for Daniel T Jump from Renton, WA, age ~34
Control profile