Johnny Sandaire, PhD, CISSP, PMP, MCAD, CC, OpenFAIR

Johnny Sandaire, PhD, CISSP, PMP, MCAD, CC, OpenFAIR

Cranford, New Jersey, United States
1K followers 500+ connections

About

As the owner of my own IT Cybersecurity and Commercial Photography business, I have over…

Activity

Join now to see all activity

Experience

  • WebZest LLC Graphic

    WebZest LLC

    United States

  • -

    Cranford, NJ

  • -

    New Jersey, Remote Office

  • -

    New Jersey - Remote Office

  • -

Education

  •  Graphic

    4.0

    -

    Activities and Societies: ACM International Editorial Review Board Member at the International Journal of Strategic Information Technology and Applications

    Dissertation - Usage Intention Framework Model: A Fuzzy Logic Interpretation of the Classical UTAUT Model.

  • -

    -

    Activities and Societies: Data Science: Statistics and Machine Learning Specialization

    Elaborate Machine Learning and Data Science, utilizing the R language platform

  • 3.5

    -

    Activities and Societies: Focused and studied the effect of color on behavior as the central point of my thesis. Master of Science, Mass Communication Thesis - Psycho-physiological Analysis of the Influence of Psychological Primary Colors: Applications to Product Response. Project - Alzheimer's disease: Coping with the mystery. An informational multimedia CD ROM.

    During this period, the Internet was at its infancy. Lead the way and introduced the Master's degree program of the College Of Communication to the online application process, which boosted enrollment by 20% in the first year. The program became so successful that the school decided to expand it to the rest of the University after my graduation.
    Worked closely with the Dean of the College and edit and published his daily blurb (communication news blog), which at the time was unknown to the…

    During this period, the Internet was at its infancy. Lead the way and introduced the Master's degree program of the College Of Communication to the online application process, which boosted enrollment by 20% in the first year. The program became so successful that the school decided to expand it to the rest of the University after my graduation.
    Worked closely with the Dean of the College and edit and published his daily blurb (communication news blog), which at the time was unknown to the online community. Developed and published the College of Communication Alumni Association Web site with an active Alumni Association recruitment database. Following my graduation, continued to provide support to the Boston University Medical Center Medical Research Group. Co-published on several papers on Alzheimer’s disease.

  • 3.54

    -

    Activities and Societies: Cum Laude

    University Scholar

Volunteer Experience

Licenses & Certifications

Publications

  • Usage Intention Framework

    LAP LAMBERT Academic Publishing

    The research reported in this book is based on a strong foundation of Technology Acceptance research, such as the Technology Acceptance Model, which resulted in the development of the Unified Theory of Acceptance and Use of Technology (UTAUT) model. A fuzzy conjoint analysis model for enhancing management decision in the technology adoption domain was implemented as an extension to the UTAUT model. Additionally, a UTAUT-based Usage Intention Framework Model (UIFM) introduced a closed-loop…

    The research reported in this book is based on a strong foundation of Technology Acceptance research, such as the Technology Acceptance Model, which resulted in the development of the Unified Theory of Acceptance and Use of Technology (UTAUT) model. A fuzzy conjoint analysis model for enhancing management decision in the technology adoption domain was implemented as an extension to the UTAUT model. Additionally, a UTAUT-based Usage Intention Framework Model (UIFM) introduced a closed-loop feedback system, facilitating the decision making process during technology deployments.

    See publication
  • Haiti: A Photo Essay

    Lulu.com

    A Collection of Photographs that depict Haiti prior to the earthquake

    See publication

Patents

  • Remotely identifying software on remote network nodes by discovering attributes of software files and comparing software file attributes to a unique signature from an audit table

    Issued United States 20050278395

    Techniques are described for remotely identifying software and software that has been updated due to service patches using maintained audit tables. A system management tool (SMT) identifies software installed on each network node by comparing at a the name and size of installed files to a software audit table. The file name and file size are used as identification markers, and a cyclic redundancy check (CRC) value for a software file, translation key, and version number are used as refined…

    Techniques are described for remotely identifying software and software that has been updated due to service patches using maintained audit tables. A system management tool (SMT) identifies software installed on each network node by comparing at a the name and size of installed files to a software audit table. The file name and file size are used as identification markers, and a cyclic redundancy check (CRC) value for a software file, translation key, and version number are used as refined identification markers. A system management tool (SMT) performs an inventory scan of the software on each network node and obtains a list of each file and the corresponding file size. The software audit file provides identifying information, such as the file name and corresponding size, for each known file. Known files can be quickly identified using a match criteria based, for example, on the file name and size. An inventory scan refinement process is also used to further identify software files, including those files that may have been modified due to software patches and may not be discovered by the first level of identifying information.

    See patent
  • Cleaning and removing duplicated unique identifiers from remote network nodes

    Issued United States 20050278438

    A centralized network managed distributed computing system includes a number of network nodes, such as workstations, a network connection medium, such as the Internet, and a server for managing the network of nodes. Unique identifiers are assigned to each network node during a first scanning operation to uniquely identify each network node and each node's installed software and hardware configurations. If a new machine is prepared for operation in the network by installing a software…

    A centralized network managed distributed computing system includes a number of network nodes, such as workstations, a network connection medium, such as the Internet, and a server for managing the network of nodes. Unique identifiers are assigned to each network node during a first scanning operation to uniquely identify each network node and each node's installed software and hardware configurations. If a new machine is prepared for operation in the network by installing a software configuration that is a duplicate of an already scanned machine, a duplicate of a supposedly unique identifier can be introduced into the distributed computing system. Techniques of resolving duplicate network node identification in a centralized server managed distributed computing system are also described. Network nodes are scanned to obtain a network node information record including a unique identification (UID) from each network node. A new UID is generated to be installed on the network node, if the network node's UID is found on a duplicate UID listing. The network node information records including the UIDs are then processed through a series of business rule filters to determine if there are duplicate UIDs. A duplicate UID listing is created for the distributed computing system and email messages are sent to network nodes with duplicate UIDs indicating the nature of the problem found.

    See patent

Courses

  • Business Alignment

    -

  • Business Intelligence

    -

  • EIS Architecture Planning

    -

  • EIS Governance

    -

  • Foundations of EIS

    -

  • Futuring and Innovation

    -

  • Information Assurance

    -

  • Qualitative Analysis

    -

  • Quantitative Analysis

    -

  • Systems Analysis and Design

    -

  • Usability and Interaction

    -

  • Usage Design/Analysis

    -

  • Photoshop Essentials, Lightroom, Adobe Premiere

    -

Projects

  • Fashion Photographer

    - Present

    Fashion Photographers work to capture photos of models or sets on demand, depending on the needs of the clients.
    Fashion photographers not only work to capture the photos at that moment of the shoot, but also do a lot of preparation and post-production work. For example, fashion photographers are always looking for good sites for their shoots, or the right props to use in the setting that they rely on. They need to mix things up depending on the nature of the photo shoot, and are therefore…

    Fashion Photographers work to capture photos of models or sets on demand, depending on the needs of the clients.
    Fashion photographers not only work to capture the photos at that moment of the shoot, but also do a lot of preparation and post-production work. For example, fashion photographers are always looking for good sites for their shoots, or the right props to use in the setting that they rely on. They need to mix things up depending on the nature of the photo shoot, and are therefore responsible for the full set up and the take down of the shoot itself. They work to ensure that the lighting is just right and that all of the elements are well prepared ahead of time.
    Most fashion photographers work for themselves, so they are also responsible for handling all aspects of running their own business as well. They must use marketing to find new business or try to land consistent clients. They must work to keep their clients happy, and manage all aspects of financials. It’s imperative that they keep up with all of these business and administrative responsibilities as it is what will set them apart from others in their field.
    They work with a variety of clients, subject matters, and settings to get the right photo. They handle the development of the photos and do whatever is necessary to ensure that the creative direction is handled appropriately. They are considered to be the subject matter expert and are therefore who people go to with questions. They are held responsible for capturing the correct photos , even when it may be challenging at times.

    Other creators
    • Katarzyna Haberko-Sandaire
    • David
    • Danny
    See project

Honors & Awards

  • Lucent Technologies Employee Extra Ordinaire

    Alcatel Lucent

    For Outstanding work and Software Development, solving Data Duplication Issue.

Languages

  • French

    -

  • English

    Native or bilingual proficiency

  • Spanish

    Elementary proficiency

  • Haitian Creole

    Native or bilingual proficiency

Organizations

  • Information Technology Service Management

    ITIL V3 Foundations

    - Present

    ITIL V3 Foundations Certification

Recommendations received

7 people have recommended Johnny Join now to view

View Johnny’s full profile

  • See who you know in common
  • Get introduced
  • Contact Johnny directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses