Jason R... Weiss

Amherst, New Hampshire, United States Contact Info
5K followers 500+ connections

Join to view profile

About

My passion around software engineering and cybersecurity can be traced back to my time as…

Articles by Jason R...

Activity

Join now to see all activity

Experience & Education

  • TestifySec

View Jason R...’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • MIT Enterprise Forum of Cambridge Graphic

    NFC Cluster Circle Committee Member (Volunteer)

    MIT Enterprise Forum of Cambridge

    - 10 months

    Education

    The NFC Cluster Circle is a group of companies and individuals that support development, adoption and commercial success of Near Field Communication (NFC). The Circle hosts educational programs, workshops, and exhibits. The goal is to stimulate innovation through development of NFC technology in smartphones and other devices. The NFC Cluster Circle is part of the Auto ID & Sensing Solutions (RFID) Circle.

  • Treasurer

    Deering Fire Rescue Association

    - 1 year 11 months

    Disaster and Humanitarian Relief

    Treasurer of a very small 501(c)(3) non-profit that supports the call firefighters of Deering Fire & Rescue, Deering, New Hampshire, USA.

  • NDIA New England Graphic

    Government Liaison

    NDIA New England

    - 6 months

    Science and Technology

    Member of the Outreach Committee, creating lines of communication between the Chapter and the Office of the Secretary of Defense. Supporting the Chapter's forthcoming Cyber event in April, 2022, by helping to identify relevant speakers.

  • AFCEA International Graphic

    Government Liaison, Cyber Committee

    AFCEA International

    - 6 months

    Science and Technology

    Member of the Zero Trust Subcommittee, representing the ongoing Zero Trust activities within the Office of the Secretary of Defense, Office of the Chief Information Officer.

  • AFCEA International Graphic

    Cyber Committee

    AFCEA International

    - Present 2 years 4 months

    Science and Technology

    The Cyber Committee’s role is to coordinate and enhance AFCEA’s outreach to the cyber security community; and to cultivate a spirit of partnership among the government, public and private sectors that serve it. The Committee also serves as a forum to develop new ideas regarding cyber challenges and capabilities that impact government (federal, state, local and international), industry and academia.

Publications

  • Software Defines Tactics

    War on the Rocks

    The Department of Defense’s acquisition community has been thrown into a turbulent sea of software buzzwords and technological change that does not conform to current bureaucratic processes, industrial base momentum, and external pressures. Indeed, there are important efforts to recognize the need for acquisition authorities to reprioritize how money is spent before the annual budget is passed, new software acquisition frameworks, and even an experimental color of money designed to accommodate…

    The Department of Defense’s acquisition community has been thrown into a turbulent sea of software buzzwords and technological change that does not conform to current bureaucratic processes, industrial base momentum, and external pressures. Indeed, there are important efforts to recognize the need for acquisition authorities to reprioritize how money is spent before the annual budget is passed, new software acquisition frameworks, and even an experimental color of money designed to accommodate the fact that code can shuffle between development and operations several times in a day.

    See publication
  • Software Defines Tactics: Structuring Military Software Acquisitions for Adaptability and Advantage in a Competitive Era

    Hudson Institute

    This report features a narrower focus and more technical depth than typical policy analysis. We believe this detail is necessary to achieve our objectives and reach our target audience. We intend this to be a useful handbook for the DoD acquisition community and, in particular, the program executive officers (PEOs)1 and program managers as they navigate a complex landscape under great pressure to deliver capability in an environment of strategic competition.

    See publication
  • Exploring the Ingredients of a cATO

    Crosstalk, Journal of Defense Software Engineering

  • Zero Trust for Software Architects

    Crosstalk, Journal of Defense Software Engineering

  • Hallways and Doors: Deception in Cyberspace

    American Intelligence Journal

    Vol. 28, No. 2, 2010, pp. 31-37

    See publication
  • Java Cryptography Extensions: Practical Guide for Programmers

    Morgan-Kauffman

    In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn’t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the…

    In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn’t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.

    See publication
  • A Little Security in an Insecure World (Part 2)

    PowerBuilder Developer’s Journal

  • A Little Security in an Insecure World (Part 1)

    PowerBuilder Developer’s Journal

  • Is Complexity Hurting Java?

    Java Developer’s Journal

    Guest Editorial

  • The Ultimate Web Developer's Sourcebook

    AMACOM

    Contributed Chapters: 43 and 44

    Other authors
    • Jessica Keyes
    See publication
  • XML Primer

    Sybase Magazine

  • Taming Jaguar

    Manning Publications

    An application server is the heart of your enterprise computing architecture, centralizing your web content, business logic, and access to your data and legacy applications. This publication provided valuable insight into the Sybase middleware stack, including deployment of various J2EE components.

    Other authors
    • Michael Barlotta
    See publication

Patents

  • Systems and Methods for a Cloud Connected Transponder

    Filed US 14/964480

    A system comprising a server configured to store a plurality of storage formats associated with one or more auto-identification technologies transponders; and a mobile device comprising: a plurality of application configured to handle auto-identification data, a communication interface, a reader circuit configured to implement at least one auto-identification protocol, a processor configured to implement operating system instructions, the operating system instructions configured to cause the…

    A system comprising a server configured to store a plurality of storage formats associated with one or more auto-identification technologies transponders; and a mobile device comprising: a plurality of application configured to handle auto-identification data, a communication interface, a reader circuit configured to implement at least one auto-identification protocol, a processor configured to implement operating system instructions, the operating system instructions configured to cause the processor to: receive context data, receive auto-identification data from the reader circuit, send at least some of the auto-identification data and the context data to the server via the communication link, receive one of the plurality of storage formats via the communication link that was selected based on the auto-identification data and the context data, and identify and launch one of the plurality of applications based on the received storage format.

    Other inventors
    See patent
  • Volume Mount Authentication

    Issued US 7,480,931

    There is a variety of media that may be inserted into a reading or writing device, such as CD's, USB drives, floppy disks, memory sticks, and many other devices. Media is inserted into a media reading or writing device that is in communication with a computer or network device. Upon insertion of the media, a number of metadata regarding that media is available to the computer. The trustworthy calculator is typically a plug-in software module that processes each piece of volume metadata and…

    There is a variety of media that may be inserted into a reading or writing device, such as CD's, USB drives, floppy disks, memory sticks, and many other devices. Media is inserted into a media reading or writing device that is in communication with a computer or network device. Upon insertion of the media, a number of metadata regarding that media is available to the computer. The trustworthy calculator is typically a plug-in software module that processes each piece of volume metadata and applies a weighed score, resulting in a Trustworthy Factor. A scoring matrix denotes ranges of values of the Trustworthy Factor into a Level of Trust Zone. Based on the Level of Trust Zone, appropriate action handlers may direct the computer to disallow the mounting of the media, may require specific authentication action to take place prior to allowing a mount of the media, or may indicate that the media may be mounted without further authentication. Upon completion of the execution of the action..

    See patent
  • RFID Tag Method and Apparatus Encoded with Protective Equipment Information

    US 13/694,753

    The present invention relates generally to RFID tag devices, and, more particularly, to RFID tag devices especially adapted for informing a worker with information about the personal protective equipment required to ensure the safety and health of the worker in potentially hazardous workplace environments.

Honors & Awards

  • Naval ROTC Scholarship (4-Year)

    United States Navy

  • Navy Achievement Medal

    US Navy

Recommendations received

6 people have recommended Jason R...

Join now to view

More activity by Jason R...

View Jason R...’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jason R... directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses