Sam Hartman work email
- Valid
- Valid
- Valid
Sam Hartman personal email
Sam Hartman phone numbers
Over 25 years experience in Internet, cloud and security systems. Currently bringing that experience to AI and machine learning, combining a depth of software engineering experience with increasing knowledge of the latest AI tools. Focus on designing for extensibility, growth and usability. Specific projects include security systems such as Kerberos, operating systems development, banking, database, web application platforms, Infrastructure as Code platforms, and entitlement management. Experience developing product requirements, design, extensive experience implementing, deploying and debugging projects in a variety of languages and technologies.Specialties: cloud, AI, security, internet protocol design, Kerberos, GSS-API, database driven software, software engineering process design, release engineering and build system design, design of complex systems, building cohesive teams
Freelance
-
Machine Learning EngineerFreelance Feb 2023 - Present• Research how AI can help people understand intimacy and connection better. • Consider novel approaches to AI safety when traditional principles of AI safety don’t meet the needs of the project. • Build familiarity with industry standard tools like Transformers, Huggingface ecosystem, SFT, Pytorch, OpenAI, CUDA, and AI cloud offerings to utilize in projects. • Explore applicability of FSDP, DeepSpeed, and RL for use in scaling autonomous systems.
-
Software EngineerHadron Industries May 2016 - PresentHadron Industries's flagship product Photon democratizes the pixle space of an organization. Media suchs as desktop VMs, video feeds, or documents can be displayed (and made available for interaction) on any display surface: desktops, videowalls, laptops, or mobile devices. Staff can start a project alone, share their work with collaborators, and then later brief the whole team.At Hadron I've worked across the product line. One of my key responsibilities has been to work on our security approach. Photon allows combining content from sources from different security domains potentially with vastly different security policies while respecting the security policy of each domain.At Hadron, I authored Entanglement, a state synchronization protocol designed to respect security boundaries and work in a low bandwidth environment. Unlike other database synchronization approaches that focus on quickly synchronizing all content, Entanglement provides policy control points so that receivers only gain access to the content they need. Also, in many cases, only the final state is required, so incremental transitions are not required.I'm one of the key authors of Carthage, a continuous integration and devops platform. Originally Carthage was written to provide continuous testing of our products. However Carthage also grew to simulate build-outs of media rooms prior to shipping to customers. Carthage supports a mix of virtual and real components balanced for different stages in the process.Carthage has grown to support cyber defense and training missions, providing some of the same security isolation benefits of PHoton. For example, initially, Carthage can model a defended network for training. Later when a problem is discovered, a clone of the network can be used to explore the situation, connecting real components only when necessary. Carthage isolation can keep security team equipment isolated from potentially compromised systems.
-
Debian Project LeaderDebian Apr 2019 - Apr 2020Debian is one of the foremost Linux distributions. The Debian Project Leader guides a project of thousands of volunteers in producing one of the world's best operating systems. The project leader is not responsible for setting technical direction. Instead the project leader facilitates discussion, represents the organization, streamlines delegated responsibility, and works to produce a high quality community. During my term I worked to train the project on consensus-based decision making, while faciliting discussions that resolved several long-standing issues. -
Senior Security/Technology ConsultantPainless Security May 2008 - Apr 2016Founder of IT consulting and product development work. Projects included work with a major routing manufacturer to improve their presence in international standards bodies; implementation of extensions to Kerberos tested and standardized with Microsoft Windows; and a variety of consulting projects Most of the last six years has been focused on Project Moonshot.3Project Moonshot is a new approach to cross-organization authentication and identity management currently in production in the UK academic community and being piloted throughout Europe. Painless Security is responsible for support, maintenance and much of the ongoing development for Project Moonshot. As architect, coordinated the software engineering efforts of developers on three continents, working to produce a consistent, unified set of technologies. Took lead role in all aspects of the engineering work including standardizing the technology within the IETF, design, understanding customer requirements, implementation, debugging, and developing infrastructure to manage and test a complex distributed system. Lead the effort to integrate Moonshot technology into the Debian and Ubuntu operating systems.
-
Chief TechnologistMit Kerberos Consortium Jul 2002 - Apr 2008Responsible for the technical direction of the MIT Kerberos Consortium. The consortium produces a reference implementation of the Kerberos Authentication Protocol which is used by many operating systems such as Apple's OS X, Redhat, Sun Solaris , Novell SUSe Linux and others. Kerberos is the dominant enterprise authentication protocol. The consortium staff are heavily involved in establishing Internet standards for security protocols and in working with vendors and users to develop best practices for computer security and authentication. -
Security Area DirectorInternet Engineering Task Force Nov 2004 - Mar 2008The IETF is one of the primary standards bodies behind the Internet, responsible for standards including the IP proptocol itself, HTTP, email, TLS, and various routing protocols. As securityArea Director, I was responsible for second-level management of half of the security area working groups, including reviewing their proposed standards, managing the standards process, negotiating the charter and scope of work, and helping coordinatewithin the IETF and across standards organizations. I was also responsible for reviewing RFCs proposed for approval, for security andother architectural issues. The position required a deep understanding of the Internet and the security of the standards that make it possible. Responsibilities were both technical and managerial.
-
Consulting Software EngineerPermabit 2000 - 2001At that time, Permabit was a new startup designing very secure network attached storage solutions for use over a wide area network or the internet. I worked to design the network protocol and file system layer that Permabit used. I also helped to set up the internal infrastructure for Permabit. Since then, the business model and functional requirements of Permabit's technology have changed significantly.
-
System ArchitectFundsxpress Financial Network Jan 1998 - Jun 2000As architect, I had overall responsibility for the design and future direction of the Fundsxpress system. Fundsxpress provides hosted online banking service to over 100 small and medium sized banks. I worked with product managers to develop requirements and worked with engineering staff to design solutions to these requirements. I evaluated potential technology partners and worked with them to integrate our technologies. I was responsible for operational security for the system. I worked on the design of a framework similar in concept to JSP for database-driven websites. I was heavily involved in the design of our central account switch, a technology that combined banking information from a variety of real-time and batch sources and dispatched transactions to the appropriatehandler. I was the principle designer of our entitlement/authorization management system and work flow management system. I was heavily involved in building the software engineering and software release process.
Sam Hartman Skills
Frequently Asked Questions about Sam Hartman
What company does Sam Hartman work for?
Sam Hartman works for Freelance
What is Sam Hartman's role at the current company?
Sam Hartman's current role is AI, Cloud and Security Engineer.
What is Sam Hartman's email address?
Sam Hartman's email address is ha****@****ity.com
What is Sam Hartman's direct phone number?
Sam Hartman's direct phone number is +120159*****
What schools did Sam Hartman attend?
Sam Hartman attended Mit.
What skills is Sam Hartman known for?
Sam Hartman has skills like Unix, Linux, Software Engineering, Security, Network Security, Computer Security, Integration, Tcp/ip, Perl, Databases, System Architecture, Kerberos.
Not the Sam Hartman you were looking for?
-
-
Sam Hartman
Denver, Co1dish.com2 (913) 9XXXXXXX
-
-
Sam Hartman
Digital Strategy | Data Science Consultant & Educator | Occasional Stand-Up ComedianNew York, Ny -
Sam Hartman
New York, Ny5gmail.com, vektorassociates.co.uk, meredith.com, gmail.com, meredith.com1 (515) 2XXXXXXX
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial