Andrew J Pyles, Age 512808 Mockingbird Dr, Williamsburg, VA 23185

Andrew Pyles Phones & Addresses

2808 Mockingbird Dr, Williamsburg, VA 23185

Columbus, OH

Sunnyvale, CA

Mountain View, CA

Boise, ID

San Jose, CA

Newark, CA

Fremont, CA

Show more

Social networks

Andrew J Pyles

Linkedin

Skills

Network Architecture • Architecture • Sip • Voip • Linux • Cloud Computing • Ip • Telecommunications • Virtualization • Java • Network Security • Distributed Systems • Unix • Linux Kernel • Wireless Networking • Android • Android Development • Architectures • Networking • Integration • Eclipse • Wireless • Software Engineering • C++

Industries

Computer Networking

Mentions for Andrew J Pyles

Andrew Pyles resumes & CV records

Resumes

Andrew Pyles Photo 9

Andrew J Pyles

Location:
Williamsburg, VA
Industry:
Computer Networking
Skills:
Network Architecture, Architecture, Sip, Voip, Linux, Cloud Computing, Ip, Telecommunications, Virtualization, Java, Network Security, Distributed Systems, Unix, Linux Kernel, Wireless Networking, Android, Android Development, Architectures, Networking, Integration, Eclipse, Wireless, Software Engineering, C++

Publications & IP owners

Us Patents

Method/System For Conserving Resources During Conversation Over Wireless Network Transport Media

US Patent:
2012019, Aug 2, 2012
Filed:
Feb 2, 2011
Appl. No.:
13/019793
Inventors:
Andrew J. Pyles - Williamsburg VA, US
Gang Zhou - Williamsburg VA, US
Zhen Ren - Williamsburg VA, US
Assignee:
COLLEGE OF WILLIAM AND MARY - Williamsburg VA
International Classification:
H04W 52/02
H04W 72/04
US Classification:
370311, 370329
Abstract:
A method and system are provided for conserving network resources such as battery power of a battery-powered communication device used to support a conversation over a wireless network transport media. Periods of silence are detected during conversation taking place on a network having controllable resources such as battery power. Using the periods of silence so-detected, future silence periods occurring on the network are then predicted. Allocation of at least a portion of the controllable resources is controlled based on the future silence periods so-predicted.

Method For Conserving Power On Battery-Powered Communication Devices

US Patent:
2014006, Mar 6, 2014
Filed:
Sep 3, 2013
Appl. No.:
14/016635
Inventors:
Andrew J. Pyles - Williamsburg VA, US
Xin Qi - Williamsburg VA, US
Assignee:
College of William and Mary - Willamsburg VA
International Classification:
H04W 52/02
US Classification:
370311
Abstract:
A method limits power usage by a battery-powered communication device having high and low power states of operation. The device's WiFi driver running on a kernel level of the operating system includes a counter-based routine for placing the device in one of its low power state and high power state. A high or low priority level is established for applications maintained on the device. An identifier for each application and its priority level is stored within a module maintained at the operating system's kernel level. Network traffic passing through the kernel level is monitored to determine whether the network traffic is associated with one of the identified applications and whether the priority level associated therewith is high priority. The counter-based routine of the WiFi driver is accessed when the network traffic is associated with one of the applications and its priority level is high priority.

System And Method For Vetting Mobile Phone Software Applications

US Patent:
2020012, Apr 23, 2020
Filed:
Dec 19, 2019
Appl. No.:
16/720811
Inventors:
- McLean VA, US
Ivan LOZANO - Arlington VA, US
Joseph PORTNER - Hampton VA, US
Andrew PYLES - Williamsburg VA, US
Christina L. JOHNS - Arlington VA, US
David BRYSON - Montgomery AL, US
Assignee:
The MITRE Corporation - McLean VA
International Classification:
G06F 21/56
G06F 21/55
H04L 29/06
G06F 21/57
Abstract:
A system and method for implementing a software emulation environment is provided. In one example, a mobile application can interface with an emulation environment that can be used to test whether the mobile application includes malware that can compromise the security and integrity of an enterprise's computing infrastructure. When the mobile application issues a call for data, a device mimic module can intercept the call and determine if the call includes a call for one or more checkable artifacts that can reveal the existence of the emulation environment. If such a call for data occurs, the device mimic module can provide one or more spoofed checkable artifacts that have been recorded from a real-world mobile device. In this way, the existence of the emulation environment can be concealed so as to allow for a more thorough analysis of a mobile application for potential hidden malware.

System And Method For Vetting Mobile Phone Software Applications

US Patent:
2017027, Sep 28, 2017
Filed:
Mar 25, 2016
Appl. No.:
15/081280
Inventors:
- McLean VA, US
Ivan LOZANO - Arlington VA, US
Joseph PORTNER - Hampton VA, US
Andrew PYLES - Williamsburg VA, US
Christina L. JOHNS - Arlington VA, US
David BRYSON - Montgomery AL, US
Assignee:
The MITRE Corporation - McLean VA
International Classification:
G06F 21/56
Abstract:
A system and method for implementing a software emulation environment is provided. In one example, a mobile application can interface with an emulation environment that can be used to test whether the mobile application includes malware that can compromise the security and integrity of an enterprise's computing infrastructure. When the mobile application issues a call for data, a device mimic module can intercept the call and determine if the call includes a call for one or more checkable artifacts that can reveal the existence of the emulation environment. If such a call for data occurs, the device mimic module can provide one or more spoofed checkable artifacts that have been recorded from a real-world mobile device. In this way, the existence of the emulation environment can be concealed so as to allow for a more thorough analysis of a mobile application for potential hidden malware.

NOTICE: You may not use PeopleBackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. PeopleBackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.