Method and systems are disclosed for enabling a computer system to generate a request that includes an instruction identifying the authentication method or methods to be used when authenticating a subset of the client computer systems or users network connected to a server computer system. The subset of client computer systems or users may include as little a single computer system or user. The request is then transmitted to the server computer system. When receiving subsequent requests for service from any of the subset of client computer systems or users, the server computer system will refer to the information in the instruction to determine which authentication methods are acceptable in authenticating the client computer system or user.
Keyboardio
Cofounder and Chief Technology Officer
Prime Radiant Oct 2011 - Dec 2012
Founder and Chief Executive Officer
Best Practical Solutions, Llc Oct 2011 - Dec 2012
Founder and Chief Executive Officer
Into Networks 1999 - 2000
Systems Lead
Microsoft Jun 1998 - May 1999
Program Manager, Real-Time Collaboration Group
Education:
Wesleyan University 1994 - 1998
Bachelors, Bachelor of Arts, Russian Studies
Skills:
Perl Open Source Linux Git Ruby Web Development Mysql Python Software Development Postgresql Apache Unix Software Engineering Databases Rest Information Retrieval Oop Javascript Web Applications Shell Scripting Css Android Development Android Lamp Business Advising