Equifax - Alpharetta, GA since Oct 2011
Vice President -Technology
Equifax Mar 2009 - Oct 2011
Technology Leader
Equifax Jan 2007 - Mar 2009
Enterprise Architect
Equifax Jun 2005 - Dec 2006
Chief Architect - Marketing Services Division
Equifax Apr 2002 - Jun 2005
Infrastructure Architect - Strategic Development
Education:
The University of Georgia 2009 - 2011
MS, Management Information Systems
Virginia Polytechnic Institute and State University 1987 - 1991
BS, Accounting Information Systems
Skills:
Enterprise Architecture Big Data Enterprise Software Software Development Agile Methodologies Software Engineering Analytics Cloud Computing Application Architecture Sdlc Data Warehousing Distributed Systems It Strategy Architecture Integration Solution Architecture Data Mining Databases High Performance Computing Unix Grid Computing Agile Project Management Soa Leading Development Teams Platform Architecture Software Development Life Cycle Machine Learning Java Big Data Analytics R Natural Language Processing Apache Spark Scala Python Apache Storm Apache Kafka
Interests:
Education
Certifications:
License Certificate #10547 License 1452356 Certified Scrum Master (Csm) Safe Practictioner Safe Agilist Association of Enterprise Architects, Hong Kong Chapter, License Certificate #10547 Project Management Institute, License 1452356 Scrum Alliance Scaled Agile, Inc. Togaf 8 Certified Enterprise Architect Project Management Professional (Pmp) Deep Learning (Deeplearning.ai)
Equifax - Alpharetta, GA since Oct 2011
Vice President -Technology
Equifax Mar 2009 - Oct 2011
Technology Leader
Equifax Jan 2007 - Mar 2009
Enterprise Architect
Equifax Jun 2005 - Dec 2006
Chief Architect - Marketing Services Division
Equifax Apr 2002 - Jun 2005
Infrastructure Architect - Strategic Development
Education:
The University of Georgia 2009 - 2011
MS, Management Information Systems
Virginia Polytechnic Institute and State University 1987 - 1991
BS, Accounting Information Systems
Skills:
Big Data Data Warehousing Master Data Management Agile Project Management Enterprise Architecture Application Architecture High Performance Computing Platform Architecture Grid Computing Identity Resolution Leading Development Teams Software Engineering
Certifications:
TOGAF 8 Certified Enterprise Architect, The Open Group Architectural Framework Project Management Professional (PMP), Project Management Institute (PMI) Certified SCRUM Master (CSM), Scrum Alliance
Us Patents
Systems And Processes For Automated Criteria And Attribute Generation, Searching, Auditing And Reporting Of Data
Stephen Leitner - Alpharetta GA, US Fred Hughes - Marietta GA, US Keith Manthey - Alpharetta GA, US David Ferber - Cumming GA, US John Dickson - Flowery Branch GA, US Reuben Kennedy - Atlanta GA, US Kevin Franklin - Marietta GA, US Mark Nailor - Woodstock GA, US
International Classification:
G06F015/00
US Classification:
715500000
Abstract:
The present invention relates to methods and systems for automated criteria and attribute generation, searching, auditing and reporting of data. One aspect of an embodiment of the invention includes a method for translating a request for filtering data in a plurality of credit data sources. The method includes receiving a request based on at least one attribute and on at least one modeling criteria, wherein the at least one attribute and the at least one modeling criteria are each associated with a portion of data in a plurality of credit data sources, automatically generating executable computer code associated with the at least one attribute and at least one modeling criteria, wherein the executable computer code is adapted to filter the portion of data in the plurality of credit data sources based at least in part on the at least one attribute and at least one modeling criteria, and storing at least a portion of the executable computer code for use with another request based in part on the at least one attribute and based in part on the at least one modeling criteria.
- Atlanta GA, US Mark BURGESS - Alpharetta GA, US Keith MANTHEY - Alpharetta GA, US Steven HICKLIN - York, GB
International Classification:
G06F 21/55 H04W 4/021
Abstract:
Examples are disclosed for detecting synthetic online entities that may be used for fraudulent purposes or other purposes. In some aspects, a computing system can generate a data structure that includes nodes and links between the nodes. The nodes can represent online entities and the links can represent geographic associations or transactional associations between pairs of online entities. These associations can be identified from electronic transactions involving the online entities. The computing system can determine, from the links between the nodes, that a degree of connectivity among a subset of the nodes exceeds a threshold connectivity. The degree of connectivity indicates electronic communications involving online entities represented by the subset of the nodes. The computing system can transmit, based on the degree of connectivity exceeding the threshold connectivity, an alert indicating a potential synthetic entity (e.g., potentially fraudulent activity) within the subset of the nodes.
- Atlanta GA, US Mark BURGESS - Alpharetta GA, US Keith MANTHEY - Alpharetta GA, US Steve HICKLIN - York, GB
International Classification:
G06F 21/55
Abstract:
Examples are disclosed for detecting synthetic online entities that may be used for fraudulent purposes or other purposes. In some aspects, a computing system can generate a data structure that includes nodes and links between the nodes. The nodes can represent online entities and the links can represent geographic associations or transactional associations between pairs of online entities. These associations can be identified from electronic transactions involving the online entities. The computing system can determine, from the links between the nodes, that a degree of connectivity among a subset of the nodes exceeds a threshold connectivity. The degree of connectivity indicates electronic communications involving online entities represented by the subset of the nodes. The computing system can transmit, based on the degree of connectivity exceeding the threshold connectivity, an alert indicating a potential synthetic entity (e.g., potentially fraudulent activity) within the subset of the nodes.
Youtube
Scott Andress & Keith Manthey | EMC World 2016
by R. Danes | May 3, 2016 Data scientists are aggregating information ...
Duration:
15m 28s
#Ep181: The Bogcast | Keith Obit & Bryan McCl...
2 best friends and former Heroin addicts, Keith Obit and Bryan McClay,...
Survivor: Australian Outback - Jerri and Keit...
On the second season of Survivor, Jerri Manthey and Keith Famie argue ...
Duration:
2m 39s
Keith Harkin - The Dutchman
Duration:
3m 53s
Toby Keith - Don't Let the Old Man In
Music video by Toby Keith performing Don't Let the Old Man In. (C) 201...
Duration:
2m 53s
Keith Richards - Cocaine Blues
This is Keith's cover of the classic blues-song originally written and...
Duration:
2m 18s
Keith Burley Arraigned After Stabbing 8-Year-...
Keith Burley faces a preliminary hearing next week after killing 8-yea...
Duration:
2m
Keith Eats Everything At Wendy's
BEES : available anywhere nature exists Get your official Try Guys col...