Search

Leigh Allen Williamson

age ~69

from Austin, TX

Also known as:
  • Leigh A Williamson
  • Leigh Leigh Williamson
  • Leigha Williamson
  • Leigh A Willamson
  • Leigh A Williams
  • Leig Williamson
Phone and address:
12400 Audane Dr, Austin, TX 78727
5123359767

Leigh Williamson Phones & Addresses

  • 12400 Audane Dr, Austin, TX 78727 • 5123359767
  • 2207 Pasadena Dr APT 14, Austin, TX 78757 • 5126557893
  • s
  • 300 Bear Creek Ln, Georgetown, TX 78633
  • Bar Harbor, ME
  • Columbia, SC
  • Arlington, TN
  • Belfast, ME
  • Naples, ME
  • North Amity, ME
  • Ellsworth, ME

Resumes

Leigh Williamson Photo 1

Watson And Cloud Platform

view source
Location:
Washington, DC
Industry:
Computer Software
Work:
Ibm
Watson and Cloud Platform
Education:
The University of Texas at Austin 1991 - 1997
Master of Science, Masters, Computer Engineering
Nova Southeastern University 1983 - 1986
Bachelors, Bachelor of Science In Computer Science, Computer Science
Skills:
Soa
Agile Methodologies
Software Development
Websphere
Enterprise Architecture
Software Engineering
Java
Eclipse
Architecture
Java Enterprise Edition
Websphere Application Server
Cloud Computing
Rest
Middleware
Solution Architecture
Software Design
Distributed Systems
Mobile Applications
Mobile Product Development
Unix
Software Project Management
Enterprise Software
Xml
Scrum
Application Architecture
Object Oriented Design
Junit
Jms
Design Patterns
Maven
Web Applications
Architectures
Jdbc
Ibm Watson
Python
Paas
Kubernetes
Faas
Microservices
Docker
Integration
Google Cloud Platform
Rational Team Concert
Web Services
Mobile Technology
Mobile Design
Build Forge
Aix
Uml
Perl
Ant
System Architecture
Mobile Devices
Tomcat
Esb
Soap
Ejb
Jsp
Eai
Object Oriented Programming
Certifications:
Ibm Certified Solution Advisor - Cloud Computing Architecture V4
Ibm Certified Application Developer - Cloud Platform V1
Ibm Cloud Advisor - Elite Level
Ibm Certified Solution Advisor - Cloud Computing Architecture V5
Blockchain Essentials For Developers
Member - Ibm Academy of Technology
Ibm Certified Advanced Application Developer - Cloud Platform V1
Ibm Design Thinking Practitioner
Gcp Essentials
Bluemix Essentials
Build Chatbots With Watson Conversation
Ibm Certification Exam Developer 2016 - Level I
Data Science Foundations - Level 1
Python For Data Science
Big Data Foundations - Level 1
Hadoop Foundations - Level 1
Spark - Level 1
Big Data Foundations - Level 2
Machine Learning Apis
Docker Essentials
Ibm Cloudant Developer Essentials
Ibm Cloud Private Infrastructure and Architecture
Learning Java 9 Modularity
Developing Aws Lambda Functions With Kotlin
Java Se 8 New Features
Invention Plateau
Patent Issuance
Duolingo Spanish Fluency: Intermediate (Estimated)
Ibm
Duolingo
Leigh Williamson Photo 2

Leigh Williamson

view source
Leigh Williamson Photo 3

Leigh Williamson

view source
Leigh Williamson Photo 4

Leigh Williamson

view source
Leigh Williamson Photo 5

Leigh Annn Williamson

view source
Leigh Williamson Photo 6

Leigh Williamson

view source
Leigh Williamson Photo 7

Leigh Williamson

view source

Wikipedia

William Leigh Williams Eyre

view source

William Leigh Williamson Eyre (17 March 184125 October 1914) was an English mycologist and naturalist. Contents. 1 Background and education; 2 Natural ...

Us Patents

  • Pluggable Jms Providers In A J2Ee Server

    view source
  • US Patent:
    6915519, Jul 5, 2005
  • Filed:
    Jul 12, 2001
  • Appl. No.:
    09/902890
  • Inventors:
    Leigh Allen Williamson - Austin TX, US
    Thomas Edward Musta - Rochester MN, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F009/46
  • US Classification:
    719313, 719311, 719315
  • Abstract:
    A method for allowing an enterprise application server to integrate and make use of any messaging product or products that support a standard messaging service interfaces. In a first phase of the method, an administrator creates and installs a new messaging provider on an application server, creates new messaging resource objects such as connection factories and destinations, and then binds these into the original namespace of the default messaging provider. An application which references the new messaging provider is then deployed onto the application server. Then, when the application program is executing, it may perform a lookup for the new messaging service, which the application server performs through the default context factory to obtain a new messaging object, which is then handed to the requesting application for use as needed. This method of indirection allows the application server to integrated and use any messaging service, not just the default messaging server originally integrated by the application server vendor.
  • Fine Grained Role-Based Access To System Resources

    view source
  • US Patent:
    6950825, Sep 27, 2005
  • Filed:
    May 30, 2002
  • Appl. No.:
    10/159482
  • Inventors:
    David Yu Chang - Austin TX, US
    Ching-Yun Chao - Austin TX, US
    Hyen Vui Chung - Round Rock TX, US
    Carlton Keith Mason - Austin TX, US
    Vishwanath Venkataramappa - Austin TX, US
    Leigh Allen Williamson - Austin TX, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F017/30
  • US Classification:
    707100, 707 10, 707103, 707 9, 709203, 709225
  • Abstract:
    A security policy process which provides role-based permissions for hierarchically organized system resources such as domains, clusters, application servers, and resources, as well as topic structures for messaging services. Groups of permissions are assigned to roles, and each user is assigned a role and a level of access within the hierarchy of system resources or topics. Forward or reverse inheritance is applied to each user level-role assignment such that each user is allowed all permissions for ancestors to the assigned level or descendants to the assigned level. This allows simplified security policy definition and maintenance of user permissions as each user's permission list must only be configured and managed at one hierarchical level with one role.
  • System And Method For Distributing Management Events To External Processes

    view source
  • US Patent:
    7051105, May 23, 2006
  • Filed:
    Aug 8, 2002
  • Appl. No.:
    10/216494
  • Inventors:
    Shawn William Lauzon - Austin TX, US
    Qinhua Wang - Austin TX, US
    Leigh Allen Williamson - Austin TX, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 15/16
  • US Classification:
    709227, 709203
  • Abstract:
    A system and method for distributing management events to external process is presented. A notification listener registers with a client notification service that resides locally with the notification listener. The registration includes one or more notification types in which the notification listener wishes to be notified. The client notification service configures a remote proxy located on a server to provide notification events to the client notification service that have one of the notification types. The remote proxy receives notification events from a server notification service, and provides the notification events to the client notification service. In turn, the client notification service provides the notification events to the notification listener. The remote proxy may be configured for push processing or pull processing. When the remote proxy is configured for push processing, the remote proxy sends notification events to the client notification service without receiving a request from the client notification service.
  • Method, System And Program Product For Routing Requests In A Distributed System

    view source
  • US Patent:
    7124414, Oct 17, 2006
  • Filed:
    Oct 31, 2002
  • Appl. No.:
    10/286585
  • Inventors:
    Ping Wang - Austin TX, US
    Leigh A. Williamson - Austin TX, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 3/00
    G06F 9/44
    G06F 9/46
    G06F 13/00
  • US Classification:
    719313, 709238
  • Abstract:
    The present invention routes object requests in a distributed system using address information identified in object headers that accompany the request. Specifically, when an object is created under the present invention, address information is inserted into a corresponding object header. When a request related to the object is later issued, the object header accompanies the request. The address information is used to ensure that the request is efficiently and accurately routed to a target process within a target node of a target cell.
  • Fine-Grained Authorization Using Mbeans

    view source
  • US Patent:
    7203697, Apr 10, 2007
  • Filed:
    Dec 10, 2003
  • Appl. No.:
    10/732756
  • Inventors:
    David Yu Chang - Austin TX, US
    Vishwanath Venkataramappa - Austin TX, US
    Leigh Allen Williamson - Austin TX, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 17/30
  • US Classification:
    707102
  • Abstract:
    Methods, systems, and media are disclosed for managing a resource managed by a mbean server having an mbean. One embodiment includes receiving a request by the application, wherein the request constitutes an action a user seeks to perform on the resource, and adding a number of instance identifier fields to an mbean descriptor file associated with the mbean. Further, the embodiment includes populating the number of instance identifier fields with an equivalent number of properties from an objectname of the resource, thereby producing a populated mbean descriptor file that identifies the resource among resources. Further still, the embodiment includes reading the mbean descriptor file after the populating, and determining, based on the reading, whether the user has an authority to perform the request. If authority exists, then an mbean method performs the action on the resource, and filters the obtained results to coincide with the user's authority.
  • Method And System For Application Installation And Management Using An Application-Based Naming System Including Aliases

    view source
  • US Patent:
    7210125, Apr 24, 2007
  • Filed:
    Jul 17, 2003
  • Appl. No.:
    10/621885
  • Inventors:
    David Yu Chang - Austin TX, US
    William Mitchell Edwards - Pflugerville TX, US
    Ajay Arvind Apte - Austin TX, US
    Leigh Allen Williamson - Austin TX, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 9/45
  • US Classification:
    717120, 717174, 707103 R
  • Abstract:
    A method is presented for managing applications using application-based names. A naming service registers an alias name; the alias name represents a first compound name that includes an application name that is associated with an application and a deployment name that is associated with a deployment attribute that characterizes a deployment of an instance of the application. The naming service is also able to generate an application-based name associated with an application; the application-based name represents a context within a naming system, and the application-based name is a second compound name that includes the alias name. Applications are managed within a data processing system using application-based names. The first compound name can be associated with a first topology-based name that represents a first context for organizing files that are related to the instance of the application.
  • Enabling High Availability And Load Balancing For Jmx Mbeans

    view source
  • US Patent:
    7295952, Nov 13, 2007
  • Filed:
    May 24, 2006
  • Appl. No.:
    11/420019
  • Inventors:
    Michael Cheng - Austin TX, US
    Leigh Allen Williamson - Austin TX, US
    Tom Zhongyu Zhou - Austin TX, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 19/00
  • US Classification:
    702185, 340 31
  • Abstract:
    Provided is a method for programming module load balancing and failover in a distributed computing environment. The Java Management extensions (JMX) specification is enhanced to support load balancing and provide a high-availability of JMX management beans (Mbeans). Also provided are enhancements to the programming model and infrastructure to support the enhanced programming model. Two exemplary approaches for load balancing and failover are provided, one based both upon clustered Mbeans and one based upon unclustered Mbeans. In the unclustered approach, client affinity is supported in that a request from a particular client can be routed to a particular Mbean. In the clustered approach, a specific Mbean can be invoked by providing a special parameter in the Mbean invocation or by adding a special property to the specific Mbean's ObjectName to indicate that during runtime automatic routing should not be employed.
  • Method And Apparatus For Maintaining Compatibility Within A Distributed Systems Management Environment With A Plurality Of Configuration Versions

    view source
  • US Patent:
    7318070, Jan 8, 2008
  • Filed:
    Mar 11, 2004
  • Appl. No.:
    10/799301
  • Inventors:
    Jason Robert McGee - Apex NC, US
    Christopher C. Mitchell - Raleigh NC, US
    Leigh Allen Williamson - Austin TX, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 7/00
    G06F 17/30
    G06F 9/44
  • US Classification:
    7071041, 707 10, 707203, 717168
  • Abstract:
    A method, apparatus and computer instructions are disclosed for maintaining the compatibility of a multiple nodes in a distributed systems management environment with multiple configuration settings, by transforming the configuration data stored in the master repository (one possible realization is where XML documents contain the configuration data) from one version of the product to a previous version of the product. For multiple versions of the systems management environment, a transformation pipeline process (one possible realization of such a process may utilize XSLT) can be used by a “master” node to transform the configuration data multiple times for each version of the environment, until the configuration data has the format of the intended recipient “slave” node. Also, by performing the transformation process on the “master” side of the computing environment, “slave” nodes with older version configuration settings can continue to operate without having to upgrade their software applications in this regard.
Name / Title
Company / Classification
Phones & Addresses
Leigh Williamson
Manager
Allegiance Telecom
Telegraph Communications Information Retrieval Services · Cell Phone Service · Telegraph and Other Communications
11400 Burnet Rd, Austin, TX 78758
5127195018

Googleplus

Leigh Williamson Photo 8

Leigh Williamson

Lived:
Austin, TX
Work:
IBM - Computer Software
Education:
UT Austin
Leigh Williamson Photo 9

Leigh Williamson

Leigh Williamson Photo 10

Leigh Williamson

Leigh Williamson Photo 11

Leigh Williamson

Leigh Williamson Photo 12

Leigh Williamson

Leigh Williamson Photo 13

Leigh Williamson

Leigh Williamson Photo 14

Leigh Williamson

Myspace

Leigh Williamson Photo 15

LEIGH williamson

view source
Locality:
BOX SPRINGS, GEORGIA
Gender:
Female
Birthday:
1927
Leigh Williamson Photo 16

leigh williamson

view source
Locality:
crystal brook, Australian Capital Territory
Gender:
Male
Birthday:
1941
Leigh Williamson Photo 17

Leigh Williamson

view source
Locality:
Mustang, Oklahoma
Gender:
Female
Birthday:
1931
Leigh Williamson Photo 18

leigh williamson

view source
Locality:
London and South East, United Kingdom
Gender:
Female
Birthday:
1927

Youtube

Oh The Cross - Faith Choir Orchestra featurin...

If someone were to ever ask me to name one of my 5 favorites female vo...

  • Category:
    Music
  • Uploaded:
    13 May, 2010
  • Duration:
    4m 22s

leigh williamson cover velvet fall to pieces

I dont own this song, props to Velvet revolver

  • Category:
    Music
  • Uploaded:
    17 Aug, 2012
  • Duration:
    4m 43s

Leigh Williamson: Mobile Software Development

IBM Distinguished Engineer Leigh Williamson walks "Turbo" Todd Watson ...

  • Category:
    Science & Technology
  • Uploaded:
    11 Oct, 2012
  • Duration:
    14m 5s

Mobile Development & Lifecycle Management Ses...

Live from Impact 2012... Leigh Williamson, Distinguished Engineer, Rat...

  • Category:
    Science & Technology
  • Uploaded:
    30 Apr, 2012
  • Duration:
    1m 46s

He's God - Featuring Leigh Williamson

Faith Celebration Choir and Orchestra feature soloist Leigh Williamson...

  • Category:
    Music
  • Uploaded:
    21 Jun, 2010
  • Duration:
    5m 47s

Challenges for Mobile Application Developers ...

Leigh Williamson (Distinguished Engineer, Rational CTO Software Team, ...

  • Category:
    Science & Technology
  • Uploaded:
    01 May, 2012
  • Duration:
    2m 21s

4 QUESTIONS FOR: MATTHEW WILLIAMSON AND LEIGH...

So it may have been fate that directly following that post about how t...

  • Category:
    Howto & Style
  • Uploaded:
    08 Apr, 2011
  • Duration:
    2m 21s

Mobile development challenges, Part 2: Device...

IBM Distinguished Engineer Leigh Williamson discusses why fragmentatio...

  • Category:
    Science & Technology
  • Uploaded:
    04 Jun, 2012
  • Duration:
    2m 17s

Get Report for Leigh Allen Williamson from Austin, TX, age ~69
Control profile