Zurich North America
Underwriter
Cna Insurance Jun 2015 - Jan 2019
Life Sciences Underwriter
Education:
University of Illinois at Urbana - Champaign 2011 - 2015
Bachelors, Bachelor of Science, Finance
Palatine High School 2007 - 2011
Skills:
Microsoft Excel Microsoft Office Powerpoint Microsoft Word Customer Service Teamwork Financial Analysis Research Public Speaking Social Media English Sql Accounting Html Data Analysis Leadership Time Management Event Planning Analysis Management
Interests:
Kayaking Entrepreneurship Investing Do It Yourself Projects Biking Travel Fishing Biographies
Microsoft
Principal Software Engineering Manager
Descry Aug 1998 - Aug 2000
Senior Software Developer
Education:
Eastern Washington University 1994 - 1999
Bachelors, Bachelor of Science, Computer Science, Physics
Skills:
Software Engineering Software Design Software Development C++ Distributed Systems Object Oriented Design C# Algorithms Visual Studio Win32 Api Agile Methodologies .Net Xml Wpf Web Services Software Project Management Multithreading Asp.net Silverlight Scalability Javascript Java Wcf
Li Hua - Redmond WA, US Daniel B. Jump - Duvall WA, US Isaac E. Nichols - Seattle WA, US Joshua M. Pollock - Seattle WA, US Ravishankar Shanmugam - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/40
US Classification:
707101, 707102, 707205
Abstract:
Systems and methods for changing items of a computer file, such as an archive file, can include an application programmed to create a file including a first item and a second item, the application storing the file on a storage medium. Systems can also include an input/output module associated with the application, the input/output module retiring the first item upon a change to the first item resulting in an increase or a decrease in a size of the first item. Upon retiring the first item, the input/output module can write a third item at an end of the file, the third item including the change to the first item. Methods can include retiring the first item upon a change to the first item, and writing a third item after the second item, the third item including the change to the first item.
System And Method For Sharing Objects Between Computers Over A Network
Matthew Maddin - Seattle WA, US Shaheeda Nizar - Redmond WA, US Daniel Jump - Duvall WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F015/16 H02K023/60
US Classification:
310120000
Abstract:
A method and system to share objects that may reside on different machines. These objects can be accessed and shared using a computer network such as the Internet. The objects can comprise computer programming objects, that may include but are not limited to, application programming interfaces (APIs), programming object libraries, computer program object definitions, and other like information for computer network based applications. The method and system do not require a computer server since the invention may operate more like a peer-to-peer or multipoint computer network. The method and system can work with both peer-to-peer networks and client-server networks without requiring computers in a network to be identified as servers or as non-server (client) type computers.
Systems And Methods For Changing Items In A Computer File
Li Hua - Redmond WA, US Daniel Jump - Duvall WA, US Isaac Nichols - Seattle WA, US David Ornstein - Seattle WA, US Joshua Pollock - Seattle WA, US Ravishankar Shanmugam - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/30
US Classification:
707001000
Abstract:
Systems and methods for changing items of a computer file can include a storage medium, and an application programmed to create a file including a first item and a second item, the application storing the file on the storage medium, and the first item including padding. The system can also include an input/output module associated with the application, the input/output module being programmed to use at least a portion of the padding of the first item to accommodate a change in a size of the first item. A method can include providing a file including at least a first item and a second item, the first item including padding, changing the first item, and using at least a portion of the padding of the first item to accommodate a change in a size of the first item.
Vikas Malhotra - Redmond WA, US Benjamin E. Canning - Seattle WA, US Daniel B. Jump - Redmond WA, US David C. LeBlanc - Monroe WA, US Benjamen E. Ross - Seattle WA, US James Campbell - Seattle WA, US Brian Carver - Kirkland WA, US Joshua Pollock - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/00 G06F 3/00 G06F 15/16
US Classification:
726 4, 715700, 709203, 726 26
Abstract:
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.
Techniques To Store Secret Information For Global Data Centers
Jonathan Birch - Redmond WA, US Amit Date - Redmond WA, US Daniel Jump - Redmond WA, US Vikas Malhotra - Kirkland WA, US Bradley Albrecht - Snohomish WA, US Ali Deniz Demircioglu - Bellevue WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
H04L 9/32 G06F 12/14
US Classification:
726 4, 726 27, 726 29, 726 7
Abstract:
Techniques to store secret information for global data centers securely are described. Various embodiments may provide a front end service for a back end data store. The front end service may be responsible for deployment, upgrade, and disaster recovery aspects, and so forth, of data center maintenance. Data centers may access data and data-related services from the back end data store through the front end service. Secrets that are needed to access secure data may be stored on behalf of the data centers without providing the secrets to the data centers. Other embodiments are described and claimed.
Venkataramann Renganathan - Sammamish WA, US Brian Thomas Carver - Kirkland WA, US Daniel Browne Jump - Redmond WA, US David Charles LeBlanc - Monroe WA, US Samuel Ira Weiss - Sacramento CA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
H04L 9/30
US Classification:
713168
Abstract:
A secure hash, such as a Hash-based Message Authentication Code (“HMAC”), is generated using a piece of secret information (e.g., a secret key) and a piece of public information specific to each escrow key (e.g., a certificate hash or public key). Using the secret key ensures that escrow key validation data can only be generated by knowing the secret key, which prevents an attacker from generating the appropriate escrow key validation data. Using the certificate hash as the public data ties each escrow key validation data to a particular certificate, thereby preventing the attacker from simply copying the validation data from another escrow key. Any escrow key that is found to be invalid may be removed from the file container and a system audit log may be generated so that a company, individual, or other entity can be aware of the possible attempt at a security breach.
Daniel B. Jump - Redmond WA, US Brian T. Carver - Kirkland, WA, US David C. LeBlanc - Monroe, WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 21/00 G06F 9/46
US Classification:
726 16, 718100
Abstract:
A candidate identifier for a process is generated and an attempt is made to have a named object created that has a name that is the candidate identifier. In response to the attempt succeeding and the named object being created, the candidate identifier is used as an identifier for the process. In response to the attempt not succeeding and the named object not being created, the generating and attempting are repeated.
- Redmond WA, US Benjamin E. CANNING - Seattle WA, US Daniel B. JUMP - Redmond WA, US David C. LeBLANC - Monroe WA, US Benjamen E. ROSS - Seattle WA, US James CAMPBELL - Seattle WA, US Brian CARVER - Kirkland WA, US Joshua POLLOCK - Seattle WA, US
International Classification:
G06F 21/53 G06F 21/62 G06F 21/60
Abstract:
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.
Youtube
Daniel Jump
Broertje JumpT????
Category:
People & Blogs
Uploaded:
02 Aug, 2007
Duration:
52s
Madonna Confessions Tour: Daniel Cloud Campos...
The fabulous Cloud does his thang during Jump.
Category:
Music
Uploaded:
18 Nov, 2007
Duration:
27s
Daniel Day-Lewis - 'Movies 101' Part 4
Part 4 of 5. This is Daniel Day-Lewis's 2005 appearance on the AMC int...
Category:
Entertainment
Uploaded:
08 May, 2008
Duration:
9m 40s
Daniel Johnston - God
From 1983's 'Yip/Jump Music'.
Category:
Music
Uploaded:
17 Jun, 2009
Duration:
2m 31s
Cologne Arm Jump - Daniel Ilabaca Parkour Tour
www.facebook.com Sneak peak of the movement Daniel did when we visited...
Category:
Film & Animation
Uploaded:
25 Oct, 2010
Duration:
31s
"Star Trek: The Beginning" Teaser Trailer - B...
"Star Trek: The Beginning" Teaser Trailer - By Daniel Broadway Visual ...
Category:
Film & Animation
Uploaded:
26 Apr, 2009
Duration:
1m 32s
Daniel Johnston - The Beatles(1983)
Title- The Beatles Artist- Daniel Johnston Album- Yip Jump Music Year-...
Michael Loofe, Cal Brummund, Arie Jones, Gayus Mccauley, Carol Culbertson, Randall Sailors, Alice Means, John Mahaney, Terry Gaer, Jeanne Kunzie, Beverly Archer