“Pavel is a tremendous technical leader and it was an absolute pleasure working for him. In his time at Red Canary, he was able to dramatically reduce our runtime cloud costs by focusing the engineering teams tactically on specific high cost areas, while guiding a larger strategic effort to reduce our cloud spend. He was also instrumental in improving our software quality through process changes, problem visibility, and consistent leadership of the team to focus on reducing bugs and operational incidents. Pavel demonstrates a rare ability to see the big picture from a leadership perspective, but also drill down into the technical depths to really understand what's going on behind the scenes. This skill allows him to more effectively manage a team of engineers as he can readily speak their language without any translation required; often as well as the engineers that are building the product. He demonstrated this ability countless times, digging into inefficient SQL queries, Ruby on Rails issues, Kubernetes configuration issues, AWS and Azure problems, all while still leading the team strategically towards our corporate objectives.”
About
* Experienced…
Activity
-
Congratulations to Belle Scott for their first blog post! Please join us, along with Belle, as she walks us through her journey as an engineer at Red…
Congratulations to Belle Scott for their first blog post! Please join us, along with Belle, as she walks us through her journey as an engineer at Red…
Liked by Pavel Zeman
-
Eleven years at Carbon Black has come to an end for me. In November 2012 I joined a motley collection of eight, scattered over the US, with barely…
Eleven years at Carbon Black has come to an end for me. In November 2012 I joined a motley collection of eight, scattered over the US, with barely…
Liked by Pavel Zeman
-
A powerful way to onboard in a remote environment is via shadowing. Shadowing is offering someone the opportunity to join 100% of someone's remote…
A powerful way to onboard in a remote environment is via shadowing. Shadowing is offering someone the opportunity to join 100% of someone's remote…
Liked by Pavel Zeman
Experience & Education
Patents
-
Method and system for limiting the use of user-specific software features
Issued US US7861306
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. An activation site provides an activation certificate and a secure repository…
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. An activation site provides an activation certificate and a secure repository executable to consumer content-rendering devices which enables those content rendering devices to render content having an enhanced level of copy-resistance. The activation site “activates” client-reading devices in a way that binds them to a persona, and limits the number of devices that may be activated for a particular persona, or the rate at which such devices may be activated for a particular persona.
Other inventorsSee patent -
System and method for obfuscating code using instruction replacement scheme
Issued US System and method for obfuscating code using instruction rep
A technique for obfuscating code. A list of one-byte instructions for a particular processor is created. Bytes in a function to be obfuscated are randomly selected, and these bytes are replaced with one-byte instructions from the list. A table that identifies the replaced bytes and their original values is inserted into the executable that contains the function. When the function is called, the function is deobfuscated by consulting the table to restore the replaced bytes to their original…
A technique for obfuscating code. A list of one-byte instructions for a particular processor is created. Bytes in a function to be obfuscated are randomly selected, and these bytes are replaced with one-byte instructions from the list. A table that identifies the replaced bytes and their original values is inserted into the executable that contains the function. When the function is called, the function is deobfuscated by consulting the table to restore the replaced bytes to their original values.
Other inventorsSee patent -
Initiating and debugging a process in a high assurance execution environment
Issued US US7293251
Bifurcated processes, in which a shadow process in a first environment is controlling thread scheduling for a trusted agent in a second, high assurance environment, can be debugged via a two-phase initialization of the debugger. In the first phase, initial set up is accomplished for the trusted agent, but no shadow process will schedule execution for any thread of the trusted agent. The debugger will then be attached. In a second phase, the shadow process will begin scheduling threads for the…
Bifurcated processes, in which a shadow process in a first environment is controlling thread scheduling for a trusted agent in a second, high assurance environment, can be debugged via a two-phase initialization of the debugger. In the first phase, initial set up is accomplished for the trusted agent, but no shadow process will schedule execution for any thread of the trusted agent. The debugger will then be attached. In a second phase, the shadow process will begin scheduling threads for the trusted agent. In order to allow the debugger access to the process memory of the trusted agent or to set or get information regarding a particular thread of the trusted agent, a thread which is either a thread belonging to the trusted agent or belonging to the second execution environment and matched with the trusted agent is used.
Other inventors -
-
Techniques for invoking system commands from within a mark-up language document
Issued US US7225400
A method and apparatus for invoking system resources directly from within a mark-up language document. Links referencing a pre-defined system command to be invoked may be embedded within the document. The specific system command may be identified in the link by an alias, such as, for example, a numeric code. By clicking on the link, the system will analyze the contents of the link. If the link calls for invoking a system command, the system will extract the alias, determine the appropriate…
A method and apparatus for invoking system resources directly from within a mark-up language document. Links referencing a pre-defined system command to be invoked may be embedded within the document. The specific system command may be identified in the link by an alias, such as, for example, a numeric code. By clicking on the link, the system will analyze the contents of the link. If the link calls for invoking a system command, the system will extract the alias, determine the appropriate pre-defined system command referred to by the alias, and execute the system command.
Other inventors -
-
Asynchronous communication within a server arrangement
Issued US US7171692
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site. The fulfillment site includes an asynchronous fulfillment pipeline which logs information about processed transactions using a store-and-forward messaging service. The fulfillment site may be implemented as…
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site. The fulfillment site includes an asynchronous fulfillment pipeline which logs information about processed transactions using a store-and-forward messaging service. The fulfillment site may be implemented as several server devices, each having a cache which stores frequently downloaded content items, in which case the asynchronous fulfillment pipeline may also be used to invalidate the cache if a change is made at one server that affects the cached content items.
Other inventorsSee patent -
Method and system for limiting the use of user-specific software features
Issued US US7158953
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. An activation site provides an activation certificate and a secure repository…
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. An activation site provides an activation certificate and a secure repository executable to consumer content-rendering devices which enables those content rendering devices to render content having an enhanced level of copy-resistance. The activation site “activates” client-reading devices in a way that binds them to a persona, and limits the number of devices that may be activated for a particular persona, or the rate at which such devices may be activated for a particular persona.
Other inventorsSee patent -
Server for an electronic distribution system and method of operating same
Issued US US7047411
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. Each retail site is equipped with a URL encryption object, which encrypts, according…
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. Each retail site is equipped with a URL encryption object, which encrypts, according to a secret symmetric key shared between the retail site and the fulfillment site, information that is needed by the fulfillment site to process an order for content sold by the retail site. Upon selling a content items, the retail site transmits to the purchase a web page having a link to a URL comprising the address of the fulfillment site and a parameter having the encrypted information.
Other inventorsSee patent -
System and method for activating a rendering device in a multi-level rights management architecture
Issued US US7017189
A digital rights management system for the distribution, protection and use of electronic content. The system includes a client architecture which receives content, where the content is preferably protected by encryption and may include a license and individualization features. Content is protected at several levels, including: no protection; source-sealed; individually-sealed (or “inscribed”); source-signed; and filly-individualized (or “owner exclusive”). The client also includes and/or…
A digital rights management system for the distribution, protection and use of electronic content. The system includes a client architecture which receives content, where the content is preferably protected by encryption and may include a license and individualization features. Content is protected at several levels, including: no protection; source-sealed; individually-sealed (or “inscribed”); source-signed; and filly-individualized (or “owner exclusive”). The client also includes and/or receives components which permit the access and protection of the encrypted content, as well as components that allow content to be provided to the client in a form that is individualized for the client. In some cases, access to the content will be governed by a rights construct defined in the license bound to the content.
Other inventorsSee patent -
Inter-server communication using request with encrypted parameter
Issued US US6970849
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. Each retail site is equipped with a URL encryption object, which encrypts, according…
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. Each retail site is equipped with a URL encryption object, which encrypts, according to a secret symmetric key shared between the retail site and the fulfillment site, information that is needed by the fulfillment site to process an order for content sold by the retail site. Upon selling a content item, the retail site transmits to the purchaser a web page having a link to a URL comprising the address of the fulfillment site and a parameter having the encrypted information.
Other inventorsSee patent
Languages
-
Czech
Native or bilingual proficiency
-
English
Native or bilingual proficiency
Recommendations received
2 people have recommended Pavel
Join now to viewMore activity by Pavel
-
Salesforce / Slack recently announced that they'll use your messages to train LLMs. To protect our IP, Shakudo's team has transitioned to using…
Salesforce / Slack recently announced that they'll use your messages to train LLMs. To protect our IP, Shakudo's team has transitioned to using…
Liked by Pavel Zeman
-
Working in IT is tough. The business relies on you to keep systems and devices operational and secure as organizations become more distributed and…
Working in IT is tough. The business relies on you to keep systems and devices operational and secure as organizations become more distributed and…
Liked by Pavel Zeman
-
For far too long, defense, government, and critical infrastructure organizations have had to rely on incompatible, legacy communications systems that…
For far too long, defense, government, and critical infrastructure organizations have had to rely on incompatible, legacy communications systems that…
Liked by Pavel Zeman
-
After 10+ years on YouTube, it happened. Your laziest favorite YouTuber just hit 100k Thanks for support ❤️
After 10+ years on YouTube, it happened. Your laziest favorite YouTuber just hit 100k Thanks for support ❤️
Liked by Pavel Zeman
-
𝗚𝗼𝗼𝗱 𝗕𝘆𝗲 𝗘𝗻𝘁𝗲𝗿𝗽𝗿𝗶𝘀𝗲 𝗠𝗼𝗯𝗶𝗹𝗶𝘁𝘆 𝗪𝗼𝗿𝗹𝗱 🙋♂️ After approximately 20 years in Enterprise Mobility, I have decided to leave…
𝗚𝗼𝗼𝗱 𝗕𝘆𝗲 𝗘𝗻𝘁𝗲𝗿𝗽𝗿𝗶𝘀𝗲 𝗠𝗼𝗯𝗶𝗹𝗶𝘁𝘆 𝗪𝗼𝗿𝗹𝗱 🙋♂️ After approximately 20 years in Enterprise Mobility, I have decided to leave…
Liked by Pavel Zeman
-
I would like to express my deepest gratitude to our extended team, our customers and partners that went on this journey with us. While we didn't…
I would like to express my deepest gratitude to our extended team, our customers and partners that went on this journey with us. While we didn't…
Liked by Pavel Zeman
-
Alejandro García Montoro earning Top-10 on Reddit/programming with his well explained analysis of #Postgres query optimization and enhancing the…
Alejandro García Montoro earning Top-10 on Reddit/programming with his well explained analysis of #Postgres query optimization and enhancing the…
Shared by Pavel Zeman
-
We're so proud of our Senior Director of Intelligence Operations Katie Nickels, who was just appointed to CISA's Cyber Safety Review Board (CSRB)!…
We're so proud of our Senior Director of Intelligence Operations Katie Nickels, who was just appointed to CISA's Cyber Safety Review Board (CSRB)!…
Liked by Pavel Zeman
-
In San Francisco at #RSAC 2024, announcing Mattermost Playbooks for cyber teams: Collaborative workflow and automation for incident response on…
In San Francisco at #RSAC 2024, announcing Mattermost Playbooks for cyber teams: Collaborative workflow and automation for incident response on…
Liked by Pavel Zeman
-
Software is adopted, not sold. https://lnkd.in/gawEQFUb
Software is adopted, not sold. https://lnkd.in/gawEQFUb
Liked by Pavel Zeman
-
It’s a wrap! As of March 31st, I bid farewell to my role within the VMW TA Team after an incredible 9-year journey. Saying goodbye to such an…
It’s a wrap! As of March 31st, I bid farewell to my role within the VMW TA Team after an incredible 9-year journey. Saying goodbye to such an…
Liked by Pavel Zeman
-
🚀 Mission Accomplished & New Horizons Ahead! 🚀 Hey LinkedIn, After 2 years at Allegro Mall Group as the head of Mall engineering and later the…
🚀 Mission Accomplished & New Horizons Ahead! 🚀 Hey LinkedIn, After 2 years at Allegro Mall Group as the head of Mall engineering and later the…
Liked by Pavel Zeman
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Pavel Zeman
-
Pavel Zeman
-
Pavel Zeman
Material Enterprise Leader
-
Pavel Zeman
Product Owner at 4finance
-
Pavel Zeman
Head of R&D department at Automotive Lighting
81 others named Pavel Zeman are on LinkedIn
See others named Pavel Zeman