Amherst, New Hampshire, United States
Contact Info
5K followers
500+ connections
About
Articles by Jason R...
-
Be their Last Editor, not their First Critic
Be their Last Editor, not their First Critic
By Jason R... Weiss
Activity
-
Pretty stoked to drop this. Got the one and only Shyam Sankar to swing by #AQ2F and drop some knowledge. Explored the critical role that #software…
Pretty stoked to drop this. Got the one and only Shyam Sankar to swing by #AQ2F and drop some knowledge. Explored the critical role that #software…
Liked by Jason R... Weiss
-
Just finished my first month at EF Go Ahead Tours Tours as a sales intern, and it has been an incredible experience! In that time, after over two…
Just finished my first month at EF Go Ahead Tours Tours as a sales intern, and it has been an incredible experience! In that time, after over two…
Liked by Jason R... Weiss
-
Proud dad moment: This is my Colorado-based prosecutor son and Virginia-based social worker daughter looking at the great view from the Denver DA…
Proud dad moment: This is my Colorado-based prosecutor son and Virginia-based social worker daughter looking at the great view from the Denver DA…
Liked by Jason R... Weiss
Experience & Education
Licenses & Certifications
-
-
-
-
-
-
-
-
Emergency Medical Technician, Basic
National Registry of Emergency Medical Technicians
Issued Expires -
-
-
-
Volunteer Experience
-
NFC Cluster Circle Committee Member (Volunteer)
MIT Enterprise Forum of Cambridge
- 10 months
Education
The NFC Cluster Circle is a group of companies and individuals that support development, adoption and commercial success of Near Field Communication (NFC). The Circle hosts educational programs, workshops, and exhibits. The goal is to stimulate innovation through development of NFC technology in smartphones and other devices. The NFC Cluster Circle is part of the Auto ID & Sensing Solutions (RFID) Circle.
-
Treasurer
Deering Fire Rescue Association
- 1 year 11 months
Disaster and Humanitarian Relief
Treasurer of a very small 501(c)(3) non-profit that supports the call firefighters of Deering Fire & Rescue, Deering, New Hampshire, USA.
-
Government Liaison
NDIA New England
- 6 months
Science and Technology
Member of the Outreach Committee, creating lines of communication between the Chapter and the Office of the Secretary of Defense. Supporting the Chapter's forthcoming Cyber event in April, 2022, by helping to identify relevant speakers.
-
Government Liaison, Cyber Committee
AFCEA International
- 6 months
Science and Technology
Member of the Zero Trust Subcommittee, representing the ongoing Zero Trust activities within the Office of the Secretary of Defense, Office of the Chief Information Officer.
-
Cyber Committee
AFCEA International
- Present 2 years 4 months
Science and Technology
The Cyber Committee’s role is to coordinate and enhance AFCEA’s outreach to the cyber security community; and to cultivate a spirit of partnership among the government, public and private sectors that serve it. The Committee also serves as a forum to develop new ideas regarding cyber challenges and capabilities that impact government (federal, state, local and international), industry and academia.
Publications
-
Software Defines Tactics
War on the Rocks
The Department of Defense’s acquisition community has been thrown into a turbulent sea of software buzzwords and technological change that does not conform to current bureaucratic processes, industrial base momentum, and external pressures. Indeed, there are important efforts to recognize the need for acquisition authorities to reprioritize how money is spent before the annual budget is passed, new software acquisition frameworks, and even an experimental color of money designed to accommodate…
The Department of Defense’s acquisition community has been thrown into a turbulent sea of software buzzwords and technological change that does not conform to current bureaucratic processes, industrial base momentum, and external pressures. Indeed, there are important efforts to recognize the need for acquisition authorities to reprioritize how money is spent before the annual budget is passed, new software acquisition frameworks, and even an experimental color of money designed to accommodate the fact that code can shuffle between development and operations several times in a day.
-
Software Defines Tactics: Structuring Military Software Acquisitions for Adaptability and Advantage in a Competitive Era
Hudson Institute
This report features a narrower focus and more technical depth than typical policy analysis. We believe this detail is necessary to achieve our objectives and reach our target audience. We intend this to be a useful handbook for the DoD acquisition community and, in particular, the program executive officers (PEOs)1 and program managers as they navigate a complex landscape under great pressure to deliver capability in an environment of strategic competition.
-
Exploring the Ingredients of a cATO
Crosstalk, Journal of Defense Software Engineering
-
Zero Trust for Software Architects
Crosstalk, Journal of Defense Software Engineering
-
Hallways and Doors: Deception in Cyberspace
American Intelligence Journal
Vol. 28, No. 2, 2010, pp. 31-37
-
Java Cryptography Extensions: Practical Guide for Programmers
Morgan-Kauffman
In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn’t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the…
In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn’t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.
-
A Little Security in an Insecure World (Part 2)
PowerBuilder Developer’s Journal
-
A Little Security in an Insecure World (Part 1)
PowerBuilder Developer’s Journal
-
Is Complexity Hurting Java?
Java Developer’s Journal
Guest Editorial
-
XML Primer
Sybase Magazine
-
Taming Jaguar
Manning Publications
An application server is the heart of your enterprise computing architecture, centralizing your web content, business logic, and access to your data and legacy applications. This publication provided valuable insight into the Sybase middleware stack, including deployment of various J2EE components.
Other authors -
Patents
-
Systems and Methods for a Cloud Connected Transponder
Filed US 14/964480
A system comprising a server configured to store a plurality of storage formats associated with one or more auto-identification technologies transponders; and a mobile device comprising: a plurality of application configured to handle auto-identification data, a communication interface, a reader circuit configured to implement at least one auto-identification protocol, a processor configured to implement operating system instructions, the operating system instructions configured to cause the…
A system comprising a server configured to store a plurality of storage formats associated with one or more auto-identification technologies transponders; and a mobile device comprising: a plurality of application configured to handle auto-identification data, a communication interface, a reader circuit configured to implement at least one auto-identification protocol, a processor configured to implement operating system instructions, the operating system instructions configured to cause the processor to: receive context data, receive auto-identification data from the reader circuit, send at least some of the auto-identification data and the context data to the server via the communication link, receive one of the plurality of storage formats via the communication link that was selected based on the auto-identification data and the context data, and identify and launch one of the plurality of applications based on the received storage format.
Other inventorsSee patent -
Volume Mount Authentication
Issued US 7,480,931
There is a variety of media that may be inserted into a reading or writing device, such as CD's, USB drives, floppy disks, memory sticks, and many other devices. Media is inserted into a media reading or writing device that is in communication with a computer or network device. Upon insertion of the media, a number of metadata regarding that media is available to the computer. The trustworthy calculator is typically a plug-in software module that processes each piece of volume metadata and…
There is a variety of media that may be inserted into a reading or writing device, such as CD's, USB drives, floppy disks, memory sticks, and many other devices. Media is inserted into a media reading or writing device that is in communication with a computer or network device. Upon insertion of the media, a number of metadata regarding that media is available to the computer. The trustworthy calculator is typically a plug-in software module that processes each piece of volume metadata and applies a weighed score, resulting in a Trustworthy Factor. A scoring matrix denotes ranges of values of the Trustworthy Factor into a Level of Trust Zone. Based on the Level of Trust Zone, appropriate action handlers may direct the computer to disallow the mounting of the media, may require specific authentication action to take place prior to allowing a mount of the media, or may indicate that the media may be mounted without further authentication. Upon completion of the execution of the action..
-
RFID Tag Method and Apparatus Encoded with Protective Equipment Information
US 13/694,753
The present invention relates generally to RFID tag devices, and, more particularly, to RFID tag devices especially adapted for informing a worker with information about the personal protective equipment required to ensure the safety and health of the worker in potentially hazardous workplace environments.
Honors & Awards
-
Naval ROTC Scholarship (4-Year)
United States Navy
-
Navy Achievement Medal
US Navy
Recommendations received
-
LinkedIn User
6 people have recommended Jason R...
Join now to viewMore activity by Jason R...
-
I don’t understand why more Services don’t take a page from the DoD Platform One book and have a set of approved and accredited tools, scripts, and…
I don’t understand why more Services don’t take a page from the DoD Platform One book and have a set of approved and accredited tools, scripts, and…
Liked by Jason R... Weiss
-
I'm thrilled to announce a game-changing strategic partnership with Madison Dearborn Partners, LLC (MDP) to further supercharge Omni Federal…
I'm thrilled to announce a game-changing strategic partnership with Madison Dearborn Partners, LLC (MDP) to further supercharge Omni Federal…
Liked by Jason R... Weiss
-
Had a blast at my first AFCEA International #TechNetCyber this morning. It was a bit of a last minute addition, but I had a great conversation this…
Had a blast at my first AFCEA International #TechNetCyber this morning. It was a bit of a last minute addition, but I had a great conversation this…
Liked by Jason R... Weiss
-
"Insecure by design" does not mean you intended for it to be insecure. It means you prioritized other factors in your design and those engineering…
"Insecure by design" does not mean you intended for it to be insecure. It means you prioritized other factors in your design and those engineering…
Liked by Jason R... Weiss
-
Defense Unicorns Zarf has officially been accepted for donation as sandbox project within OpenSSF!!! It is amazing seeing the DoD not only be a…
Defense Unicorns Zarf has officially been accepted for donation as sandbox project within OpenSSF!!! It is amazing seeing the DoD not only be a…
Liked by Jason R... Weiss
-
🚨Software Community🚨- It’s that time again! We are seeking abstracts (tracks/topics listed below) for the third annual DoD Weapon Systems Software…
🚨Software Community🚨- It’s that time again! We are seeking abstracts (tracks/topics listed below) for the third annual DoD Weapon Systems Software…
Liked by Jason R... Weiss
-
There you have it! In case you didn't know, Ask Sage, Inc. has completed its FedRAMP SAR assessment with no moderate or high or critical finding…
There you have it! In case you didn't know, Ask Sage, Inc. has completed its FedRAMP SAR assessment with no moderate or high or critical finding…
Liked by Jason R... Weiss
-
Meet our team in person this week at three exciting events! Catch Jason, Tanner, Cole and Matt at #TechNetCyber in Baltimore. Meanwhile, John, Tom,…
Meet our team in person this week at three exciting events! Catch Jason, Tanner, Cole and Matt at #TechNetCyber in Baltimore. Meanwhile, John, Tom,…
Liked by Jason R... Weiss
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More