2009 to 2000 Customer Support AssociateComtrak Technologies, L.L.C
2005 to 2009 Associate Software EngineerComtrak Technologies, L.L.C
2004 to 2005 Customer Support AssociateFirst Data Resources Maryland Heights, MO 1997 to 2003 Senior Programmer Analyst/Systems Application DeveloperACF Industries Saint Charles, MO 1995 to 1997 Programmer/AnalystNational Tea Company Hazelwood, MO 1993 to 1995 Programmer/AnalystBlue Cross and Blue Shield of Missouri St. Louis, MO 1990 to 1992 Senior Programmer/AnalystREJIS St. Louis, MO 1982 to 1990 REgional, Justice Information Service
Education:
University of Phoenix 2006 Bachelor's of Science in Information Technology / Software EngineerSt. Louis Community College Associate'sCenter of the Study of Data Processing Washington, DC Systems Design
Skills:
COBOL, COBOL II, Easytrieve Plus, JCL, SQL
Us Patents
Systems And Methods For Providing Enhanced Security In Edge Computing Environments
- Bloomfield CO, US Michael Benjamin - Broomfield CO, US Peter Brecl - Highlands Ranch CO, US
Assignee:
Level 3 Communications, LLC - Broomfield CO
International Classification:
H04L 9/40
Abstract:
Examples of the present disclosure describe systems and methods for providing enhanced security in edge computing environments. A first aspect describes a method for moving security features dynamically applied to an application at a first deployment location to an application at a second deployment location. A second aspect describes a method for locally expanding/contracting an instance of a deployed application. A third aspect describes a method for redirected network traffic associated with detected malicious conduct from a first application deployment environment to a secured second application deployment environment. A fourth aspect describes a method for performing multi-stage network traffic filtering.
Dynamic Filter Generation And Distribution Within Computer Networks
Systems and methods for implementing filters within computer networks include obtaining blocklist data that includes blocklist entries for a network. Each of the blocklist entries includes one or more network traffic attributes for identifying traffic to be blocked. In response to receiving the blocklist data, a filter based on a common network traffic attribute shared between at least two of the plurality of blocklist entries is generated. The filter is then deployed to a network device within the network such that the filter may be implemented at the network device to block corresponding traffic.
- Broomfield CO, US Jamie LIN - St. Louis MO, US Michael BENJAMIN - Broomfield CO, US John KNIES - Evansville IN, US
Assignee:
Level 3 Communications, LLC - Broomfield CO
International Classification:
H04L 9/40
Abstract:
Authorization for a user may be dynamically tailored per application or per application function, rather than globally managed by an administrator. For example, in some embodiments, an identity access management system may generate a suitable authorization token (or authorization token information) to enable a user to login to an application or perform a particular function. The authorization token may be dynamically generated and tailored based on filtering various identity information otherwise available from an identity system, access boundaries of applicable application functions, or other factors.
Collecting Endpoint Data And Network Data To Detect An Anomaly
- Broomfield CO, US Michael Benjamin - Broomfield CO, US
Assignee:
Level 3 Communications, LLC - Broomfield CO
International Classification:
H04L 9/40
Abstract:
The present application describes a system that uses endpoint data and network data to detect an anomaly. Once an anomaly is detected, the system may determine a severity of the anomaly by comparing the anomaly to a global database of known anomalies. The system may then initiate preventative measures to address the anomaly.
Mitigation Of Route Hijacking Techniques In A Network
- Broomfield CO, US Michael Benjamin - Broomfield CO, US
International Classification:
H04L 29/06 H04L 9/32
Abstract:
Aspects of the present disclosure involve systems and methods for utilizing verified autonomous system (AS) network interconnections received via a cryptographically certified Recognized Operating Agency (ROA) object to generate an interconnect network model which may be used as a reference model to mitigate hijacking of network communications in downstream route announcements. In particular, AS networks may announce or share a cryptographically certified ROA object that includes a list of other AS networks to which the announcing network is connected. A router, server, or other networking device may receive ROA objects from multiple AS networks and generate a model or graph of the interconnectedness of the AS networks. Further, because each ROA object may be cryptographically certified or signed, the networking device may trust the information provided in the received ROA objects. The networking device may further verify announced routing information against the generated network model.
System And Method For Utilization Of Threat Data For Network Security
- Broomfield CO, US Michael BENJAMIN - Broomfield CO, US Mark DEHUS - Thornton CO, US Peter BRECL - Highlands Ranch CO, US
International Classification:
H04L 29/06 G08B 21/18
Abstract:
Aspects of the present disclosure involve utilizing network threat information to manage one or more security devices or policies of a communication network. The security system may receive threat intelligence data or information associated with potential threats to a communications network and process the threat intelligence data to determine one or more configurations to apply to security devices of a network. The system may then generate a rule or action to respond to the identified attack, such as a firewall rule for a firewall device to block traffic from the source of the attack. The threat intelligence information may include a confidence score indicating a calculated confidence in the identification of the malicious communications, which may be utilized by the system to determine the type of action taken on the security devices of the network in response to the information or data.
Systems And Methods For Network Device Management Using Device Clustering
- Broomfield CO, US Michael Benjamin - Broomfield CO, US
International Classification:
H04L 12/24 H04L 29/06 H04L 29/08 H04L 12/733
Abstract:
Systems and methods for managing network devices include performing clustering operations for network devices based on attributes of the network devices. By comparing the results of subsequent clustering operations, changes in network device attributes can be readily identified and any network devices for which attributes have changed may be subject to further investigation or remedial action (e.g., blocking traffic to/from the network device). Clustering may also be used to conduct an inventory of network devices by identifying groups of network devices that have similar attributes.
Dynamic Filter Generation And Distribution Within Computer Networks
Systems and methods for implementing filters within computer networks include obtaining blocklist data that includes blocklist entries for a network. Each of the blocklist entries includes one or more network traffic attributes for identifying traffic to be blocked. In response to receiving the blocklist data, a filter based on a common network traffic attribute shared between at least two of the plurality of blocklist entries is generated. The filter is then deployed to a network device within the network such that the filter may be implemented at the network device to block corresponding traffic.
Michael J Benjamin MD 7777 N University Dr STE 102, Fort Lauderdale, FL 33321 (954)7267770 (phone), (954)7262896 (fax)
Education:
Medical School SUNY Downstate Medical Center College of Medicine Graduated: 1967
Procedures:
Colposcopy D & C Dilation and Curettage Destruction of Benign/Premalignant Skin Lesions Destruction of Lesions on the Anus Hysterectomy Myomectomy Tubal Surgery Vaccine Administration
Conditions:
Abnormal Vaginal Bleeding Candidiasis of Vulva and Vagina Ectopic Pregnancy Hemorrhoids Breast Disorders
Languages:
English Spanish
Description:
Dr. Benjamin graduated from the SUNY Downstate Medical Center College of Medicine in 1967. He works in Tamarac, FL and specializes in Obstetrics & Gynecology. Dr. Benjamin is affiliated with Broward Health Coral Springs and Northwest Medical Center.
Michael Benjamin MD 7325 Medical Ctr Dr STE 201, West Hills, CA 91307 (818)5702134 (phone), (818)8350485 (fax)
Michael Benjamin MD Inc 2950 Sycamore Dr STE 303, Simi Valley, CA 93065 (805)5174804 (phone), (805)5226463 (fax)
Education:
Medical School Tulane University School of Medicine Graduated: 1998
Procedures:
Chemotherapy
Conditions:
Anemia Iron Deficiency Anemia Malignant Neoplasm of Female Breast Non-Hodgkin's Lymphoma Breast Neoplasm, Malignant
Languages:
English Spanish
Description:
Dr. Benjamin graduated from the Tulane University School of Medicine in 1998. He works in West Hills, CA and 1 other location and specializes in Hematology/Oncology. Dr. Benjamin is affiliated with Simi Valley Hospital and West Hills Hospital & Medical Center.
We really are trying to pull out all the stops, Michael Benjamin, the chief of CARBs air-quality planning and science division, said. Practically, he added: We and the air districts in California will continue to take advantage of the exceptional events provisions in the Clean Air Act to try to
Date: Oct 16, 2023
Category: U.S.
Source: Google
Drug firm executive helps organize cash-for-access fundraiser featuring Bill Morneau
The exclusive event is being held at the Toronto condominium of philanthropist Nancy Pencer and funeral home executive Michael Benjamin. Helping to sell tickets are Barry Sherman, the chairman of generic drug manufacturer Apotex Inc., and Joel Reitman, who runs global venture investment firm Jillcy
onservative MP Blaine Calkins also went after the government over a $500-a-ticket special-access fundraiser planned for Nov. 7 in the upscale condominium of Toronto philanthropist Nancy Pencer and funeral home executive Michael Benjamin, at which Finance Minister Bill Morneau is the star attraction.
Still, the disclosure suddenly puts Weiner's indiscretions, judgment and candor back in the forefront of his campaign, and political analysts say it could be damaging: "It makes it tougher to believe this is behind him," said Democratic former state Assemblyman Michael Benjamin, now a political con
Date: Jul 24, 2013
Source: Google
Justin Garza leads Cal State Fullerton past Arizona State, 1-0
Garza at one point retired 10 consecutive batters until Dalton DiNatales leadoff single in the eighth inning. When DiNatale reached third with two outs, Garza struck out third baseman Michael Benjamin, the team leader in batting average, on three pitches to preserve the 1-0 lead.
"His issue becomes the issue it will begin to overshadow aspects of this race," said Democratic former state Assemblyman Michael Benjamin, now a political consultant. "And it brings up the quality of Democrats who are running for public office" to an electorate already cynical about politicians, h
Michael Benjamin, a former Democratic assemblyman from New York City and now a political commentator, notes the 54-year-old Cuomo also has family concerns. Right now, Cuomo's live-in girlfriend, Food Network star Sandra Lee, and his teenage daughters are a 45-minute flight away from Albany and he sp
Date: Sep 15, 2012
Source: Google
Sheldon Silver keeps role at convention despite Vito Lopez scandal
"Shelly weathers this storm," said former Democratic Assemblyman Michael Benjamin from the Bronx. He said he has no problem having Silver lead the delegation at the convention and the conference in Albany, even winning the pay raise Assembly members and senators seek after the fall elections.