“Johnny Sandaire worked on my team as a Technical Researcher, responsible for the evaluation of new technologies, as well as the subject matter expert (SME) of his own Asset Management Tool, which he developed and received two US patent for the database algorithm and cleaning software architecture. Johnny possesses a strong and reliable investigative and problem-solving skills; he takes ownership when necessary and follows issues through to completion, without added stress and friction. Johnny also has excellent interpersonal skills, with the ability to acquire new skills quickly that facilitates to thrive in a team environment that was as complex as our IT department at Alcatel-Lucent. Johnny Sandaire was a valuable and essential member of our team. I highly recommend Johnny for an IT leadership position and I am sure he would be an essential asset to any IT organization.”
Johnny Sandaire, PhD, CISSP, PMP, MCAD, CC, OpenFAIR
Cranford, New Jersey, United States
1K followers
500+ connections
About
As the owner of my own IT Cybersecurity and Commercial Photography business, I have over…
Activity
-
Cybersecurity is at the forefront of Information Technology. It is one of the most significant areas of IT that can either make or break a…
Cybersecurity is at the forefront of Information Technology. It is one of the most significant areas of IT that can either make or break a…
Shared by Johnny Sandaire, PhD, CISSP, PMP, MCAD, CC, OpenFAIR
-
Certified Information Systems Security Professional (CISSP) was issued by ISC2 to Johnny Sandaire.
Certified Information Systems Security Professional (CISSP) was issued by ISC2 to Johnny Sandaire.
Shared by Johnny Sandaire, PhD, CISSP, PMP, MCAD, CC, OpenFAIR
-
Congrats on your success and welcome to the club, Cynthia! 👏 We love reading posts like this, and really appreciate you trusting Rob Witcher, John…
Congrats on your success and welcome to the club, Cynthia! 👏 We love reading posts like this, and really appreciate you trusting Rob Witcher, John…
Liked by Johnny Sandaire, PhD, CISSP, PMP, MCAD, CC, OpenFAIR
Experience
Education
Volunteer Experience
-
Photography Teacher for Young Adults
Photography Teacher for Young Adults
University of Hartford School of Art
Licenses & Certifications
-
Machine Learning Accelerator
Elite Data Science
-
ITIL V3 Foundations
The Cabinet Office (ITIL)
-
Nikon Professional Services (NPS)
Nikon
-
Phase One Certified Professional (POCP)
Phase One
-
Project Management Professional (PMP)
Project Management Institute (PMI)
-
Microsoft Certified Application Developer (MCAD) in .NET
Microsoft Corporation
Publications
-
Usage Intention Framework
LAP LAMBERT Academic Publishing
The research reported in this book is based on a strong foundation of Technology Acceptance research, such as the Technology Acceptance Model, which resulted in the development of the Unified Theory of Acceptance and Use of Technology (UTAUT) model. A fuzzy conjoint analysis model for enhancing management decision in the technology adoption domain was implemented as an extension to the UTAUT model. Additionally, a UTAUT-based Usage Intention Framework Model (UIFM) introduced a closed-loop…
The research reported in this book is based on a strong foundation of Technology Acceptance research, such as the Technology Acceptance Model, which resulted in the development of the Unified Theory of Acceptance and Use of Technology (UTAUT) model. A fuzzy conjoint analysis model for enhancing management decision in the technology adoption domain was implemented as an extension to the UTAUT model. Additionally, a UTAUT-based Usage Intention Framework Model (UIFM) introduced a closed-loop feedback system, facilitating the decision making process during technology deployments.
-
Haiti: A Photo Essay
Lulu.com
A Collection of Photographs that depict Haiti prior to the earthquake
Patents
-
Remotely identifying software on remote network nodes by discovering attributes of software files and comparing software file attributes to a unique signature from an audit table
Issued United States 20050278395
Techniques are described for remotely identifying software and software that has been updated due to service patches using maintained audit tables. A system management tool (SMT) identifies software installed on each network node by comparing at a the name and size of installed files to a software audit table. The file name and file size are used as identification markers, and a cyclic redundancy check (CRC) value for a software file, translation key, and version number are used as refined…
Techniques are described for remotely identifying software and software that has been updated due to service patches using maintained audit tables. A system management tool (SMT) identifies software installed on each network node by comparing at a the name and size of installed files to a software audit table. The file name and file size are used as identification markers, and a cyclic redundancy check (CRC) value for a software file, translation key, and version number are used as refined identification markers. A system management tool (SMT) performs an inventory scan of the software on each network node and obtains a list of each file and the corresponding file size. The software audit file provides identifying information, such as the file name and corresponding size, for each known file. Known files can be quickly identified using a match criteria based, for example, on the file name and size. An inventory scan refinement process is also used to further identify software files, including those files that may have been modified due to software patches and may not be discovered by the first level of identifying information.
-
Cleaning and removing duplicated unique identifiers from remote network nodes
Issued United States 20050278438
A centralized network managed distributed computing system includes a number of network nodes, such as workstations, a network connection medium, such as the Internet, and a server for managing the network of nodes. Unique identifiers are assigned to each network node during a first scanning operation to uniquely identify each network node and each node's installed software and hardware configurations. If a new machine is prepared for operation in the network by installing a software…
A centralized network managed distributed computing system includes a number of network nodes, such as workstations, a network connection medium, such as the Internet, and a server for managing the network of nodes. Unique identifiers are assigned to each network node during a first scanning operation to uniquely identify each network node and each node's installed software and hardware configurations. If a new machine is prepared for operation in the network by installing a software configuration that is a duplicate of an already scanned machine, a duplicate of a supposedly unique identifier can be introduced into the distributed computing system. Techniques of resolving duplicate network node identification in a centralized server managed distributed computing system are also described. Network nodes are scanned to obtain a network node information record including a unique identification (UID) from each network node. A new UID is generated to be installed on the network node, if the network node's UID is found on a duplicate UID listing. The network node information records including the UIDs are then processed through a series of business rule filters to determine if there are duplicate UIDs. A duplicate UID listing is created for the distributed computing system and email messages are sent to network nodes with duplicate UIDs indicating the nature of the problem found.
Courses
-
Business Alignment
-
-
Business Intelligence
-
-
EIS Architecture Planning
-
-
EIS Governance
-
-
Foundations of EIS
-
-
Futuring and Innovation
-
-
Information Assurance
-
-
Qualitative Analysis
-
-
Quantitative Analysis
-
-
Systems Analysis and Design
-
-
Usability and Interaction
-
-
Usage Design/Analysis
-
-
Photoshop Essentials, Lightroom, Adobe Premiere
-
Projects
-
Fashion Photographer
- Present
Fashion Photographers work to capture photos of models or sets on demand, depending on the needs of the clients.
Fashion photographers not only work to capture the photos at that moment of the shoot, but also do a lot of preparation and post-production work. For example, fashion photographers are always looking for good sites for their shoots, or the right props to use in the setting that they rely on. They need to mix things up depending on the nature of the photo shoot, and are therefore…Fashion Photographers work to capture photos of models or sets on demand, depending on the needs of the clients.
Fashion photographers not only work to capture the photos at that moment of the shoot, but also do a lot of preparation and post-production work. For example, fashion photographers are always looking for good sites for their shoots, or the right props to use in the setting that they rely on. They need to mix things up depending on the nature of the photo shoot, and are therefore responsible for the full set up and the take down of the shoot itself. They work to ensure that the lighting is just right and that all of the elements are well prepared ahead of time.
Most fashion photographers work for themselves, so they are also responsible for handling all aspects of running their own business as well. They must use marketing to find new business or try to land consistent clients. They must work to keep their clients happy, and manage all aspects of financials. It’s imperative that they keep up with all of these business and administrative responsibilities as it is what will set them apart from others in their field.
They work with a variety of clients, subject matters, and settings to get the right photo. They handle the development of the photos and do whatever is necessary to ensure that the creative direction is handled appropriately. They are considered to be the subject matter expert and are therefore who people go to with questions. They are held responsible for capturing the correct photos , even when it may be challenging at times.Other creators
Honors & Awards
-
Lucent Technologies Employee Extra Ordinaire
Alcatel Lucent
Languages
-
French
-
-
English
Native or bilingual proficiency
-
Spanish
Elementary proficiency
-
Haitian Creole
Native or bilingual proficiency
Organizations
-
Information Technology Service Management
ITIL V3 Foundations
Recommendations received
7 people have recommended Johnny Join now to view
More activity by Johnny
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More