Login about (844) 217-0978

Andy Trotter

In the United States, there are 41 individuals named Andy Trotter spread across 34 states, with the largest populations residing in Michigan, Virginia, California. These Andy Trotter range in age from 32 to 78 years old. Some potential relatives include Andreana Trotter, Lovia Trotter, Andy Trotter. You can reach Andy Trotter through various email addresses, including jtrotter***@bellsouth.net, aknbitrot***@msn.com, andt***@aol.com. The associated phone number is 704-489-9539, along with 6 other potential numbers in the area codes corresponding to 309, 757, 954. For a comprehensive view, you can access contact details, phone numbers, addresses, emails, social media profiles, arrest records, photos, videos, public records, business records, resumes, CVs, work history, and related names to ensure you have all the information you need.

Public information about Andy Trotter

Resumes

Resumes

Andy Trotter

Andy Trotter Photo 1
Location:
Palo Alto, CA
Industry:
Financial Services

Chief Investment Officer

Andy Trotter Photo 2
Location:
Atlanta, GA
Industry:
Real Estate
Work:
Centennial Holding Company
Chief Investment Officer

Regional Sales Manager Retail Brands

Andy Trotter Photo 3
Location:
Minneapolis, MN
Industry:
Food Production
Work:
Dakota Growers Pasta Company
Regional Sales Manager Retail Brands Federated Insurance Dec 2013 - Aug 2015
Marketing Representative Wimmer's Meats Jul 2008 - Dec 2013
Director of Sales and Area Manager John Morrell Food Group Jun 2002 - Jul 2008
Sales Representative
Education:
Iowa State University 1998 - 2002
Bachelors, Bachelor of Science, Management, Business Windom Area High School
Skills:
Customer Service, Sales, Microsoft Word, Outlook, Retail, Marketing, Microsoft Excel, Sales Operations, Negotiation, Microsoft Office, Strategic Planning, Inventory Management, Powerpoint, English, Windows, Research, Public Speaking

Marketing Manager

Andy Trotter Photo 4
Location:
San Francisco, CA
Industry:
Construction
Work:
Green Build Energy Group
Marketing Manager

Andy Trotter

Andy Trotter Photo 5
Location:
2714 Hillside Ave, Norco, CA 92860
Work:
West Coast Arborists, Inc.
Vice President West Coast Arborists, Inc.
Vice President, Field Operations Manager
Languages:
English

Director, After School Programs-Prime Time For Kids

Andy Trotter Photo 6
Location:
Statesville, NC
Industry:
Primary/Secondary Education
Work:
Iredell Statesvile Schools Jul 2008 - Mar 2012
Principal Iredell Statesvile Schools Jul 2008 - Mar 2012
Director, After School Programs-Prime Time For Kids
Education:
Kent State University 1995 - 1997
Masters, Leadership

Andy Trotter

Andy Trotter Photo 7

Andy Trotter

Andy Trotter Photo 8

Phones & Addresses

Name
Addresses
Phones
Andy Trotter
704-522-4936
Andy A Trotter
309-697-6448
Andy Trotter
865-908-0406
Andy Trotter
865-908-0406
Andy A Trotter
757-787-4350
Andy Trotter
865-908-0406

Publications

Us Patents

Extending An Allowable Transmission Distance Between A Wireless Device And An Access Point By Communication With Intermediate Wireless Devices

US Patent:
7146433, Dec 5, 2006
Filed:
Feb 1, 2002
Appl. No.:
10/061479
Inventors:
Daryl Carvis Cromer - Apex NC, US
Howard Jeffrey Locker - Cary NC, US
Andy Lloyd Trotter - Raleigh NC, US
James Peter Ward - Raleigh NC, US
Assignee:
Lenovo Singapore Pte. Ltd - Singapore
International Classification:
G06F 15/173
H04B 7/15
US Classification:
709239, 709217, 709238, 709241, 370235, 370236, 370237, 370238, 455 111, 455464
Abstract:
A remote mobile unit (MU) including a radio device is provided with an ability to communicate through a LAN by remote association with an access point (AP) that is out of range for communication with the radio device of the remote MU. The remote MU transmits a quest frames that is received and retransmitted by one or more intermediate MUs until a connection is made with the AP. Each of the intermediate MUs adds an identifying address to the request, forming a path that is used in both directions to transmit a response from the AP to the remote MU and to transmit data between the AP and the MU.

Data Processing System And Method For Maintaining Secure Data Blocks

US Patent:
7155605, Dec 26, 2006
Filed:
Mar 31, 1999
Appl. No.:
09/281852
Inventors:
Daryl Carvis Cromer - Cary NC, US
Howard Locker - Cary NC, US
Andy Lloyd Trotter - Raleigh NC, US
James Peter Ward - Raleigh NC, US
Assignee:
Lenovo (Singapore) Pte. Ltd. - Singapore
International Classification:
H04K 9/00
US Classification:
713151, 713165, 707 9
Abstract:
A data processing system and method are disclosed for maintaining a secure data block within the system. A block of data is established within the system. The block of data is associated with a particular user and a particular application. A hardware master key pair is established for the system. The hardware master key pair includes a master private key and a master public key. The hardware master key pair is associated with the system for which it was established so that the master private key is known to only that system. The block of data is encrypted utilizing the master public key. The master private key is required to decrypt the encrypted block of data. This data processing system is the only system capable of decrypting the encrypted block of data.

Data Processing System And Method For Permitting Only Preregistered Hardware To Access A Remote Service

US Patent:
6654886, Nov 25, 2003
Filed:
Jul 16, 1999
Appl. No.:
09/356189
Inventors:
David Carroll Challener - Raleigh NC
Daryl Carvis Cromer - Apex NC
Dhruv Manmohandas Desai - Cary NC
Howard Jeffrey Locker - Cary NC
Andy Lloyd Trotter - Raleigh NC
James Peter Ward - Raleigh NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1130
US Classification:
713172, 713168, 709228, 709275
Abstract:
A data processing system and method are disclosed for permitting only preregistered client computer hardware to access a service executing on a remote server computer system. A log-in token is established including a unique identifier which identifies a particular client computer hardware. The client computer hardware logs-on to the server computer system. Subsequent to the client computer hardware logging-on to the server computer system, the client computer hardware attempts to access the service. During the attempt, the client computer hardware transmits the log-in token to the server computer system. The server computer system utilizes the unique identifier included within the log-in token to determine if the client computer hardware is registered to access the service. In response to a determination that the client computer hardware is registered to access the service, the server computer system permits the client computer hardware to access the service. In response to a determination that the client computer hardware is not registered to access the service, the server computer system prohibits the client computer hardware from accessing the service.

Method And System For Key Usage Control In An Embedded Security System

US Patent:
2003005, Mar 20, 2003
Filed:
Sep 20, 2001
Appl. No.:
09/957415
Inventors:
Scott Elliott - Raleigh NC, US
James Hoff - Raleigh NC, US
Christopher Long - Chapel Hill NC, US
David Rivera - Durham NC, US
Andy Trotter - Raleigh NC, US
James Ward - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04K001/00
US Classification:
380/277000
Abstract:
A method and system for control of key pair usage in a computer system is disclosed. The method and system comprise creating key pair material for utilization with an embedded security chip of the computer system. The key pair material includes tag data. The method and system further includes determining whether the key pair material is bound to the embedded security chip based on the tag data. Through the present invention, more flexibility for control over which keys are bound to an embedded security system is achieved. These and other advantages of the aspects of the present invention will be more fully understood in conjunction with the following detailed description and accompanying drawings.

Data Processing System And Method For Authentication Of Devices External To A Secure Network Utilizing Client Identifier

US Patent:
6567920, May 20, 2003
Filed:
Mar 31, 1999
Appl. No.:
09/282892
Inventors:
Daryl Carvis Cromer - Cary NC
Dhruv M. Desai - Cary NC
Brandon Jon Ellison - Raleigh NC
Eric Richard Kern - Durham NC
Howard Locker - Cary NC
Andy Lloyd Trotter - Raleigh NC
James Peter Ward - Raleigh NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1130
US Classification:
713201, 713176
Abstract:
A data processing system and method are disclosed for authenticating a client computer system to a secure network prior to permitting the client computer system to attempt to log-on to the network. The secure network is controlled by a server computer system. A unique identifier is established which identifies the client computer system. The unique identifier is encrypted. Prior to permitting the client computer system to attempt to log-on to the secure network, the client computer system transmits the encrypted identifier to the server computer system. Also prior to permitting the client computer system to attempt to log-on to the network, the server computer system utilizes the unique identifier to determine whether to permit the client computer system to attempt to log-on to the network. The client computer system is authenticated prior to permitting the client computer system to attempt to log-on to the network.

Data Processing System And Method For Prohibiting Unauthorized Modification Of Transmission Priority Levels

US Patent:
6701349, Mar 2, 2004
Filed:
Jul 16, 1999
Appl. No.:
09/356190
Inventors:
Daryl Carvis Cromer - Apex NC
Brandon Jon Ellison - Raleigh NC
Eric Richard Kern - Durham NC
Howard Jeffery Locker - Cary NC
Andy Lloyd Trotter - Raleigh NC
James Peter Ward - Raleigh NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1300
US Classification:
709207, 709218, 709219, 709235, 709238, 709240, 370231, 370389, 370394, 370400, 713201
Abstract:
A data processing system and method are disclosed for prohibiting an unauthorized user from modifying a priority level associated with a client computer system. The priority level is utilized by a client computer system during transmission of the clients data over a network. One of a plurality of priority levels is associated with the client computer system. The plurality of priority levels includes a higher priority level and a lower priority level. The client computer system associates the priority level with the data transmitted by the client computer system over the network. The data associated with the higher priority level is typically transmitted prior to data associated with the lower priority level. In response to an attempt to modify the associated priority level, the client determines whether the attempt is being made by an approved user. In response to a determination that the attempt is not being made by an approved user, the attempted modification of the priority level is prohibited.

System And Method For Multiple Users To Securely Access Encrypted Data On Computer System

US Patent:
2005011, May 26, 2005
Filed:
Nov 21, 2003
Appl. No.:
10/718786
Inventors:
Charles Ball - Raleigh NC, US
Ryan Catherman - Raleigh NC, US
Philip Childs - Raleigh NC, US
James Hoff - Raleigh NC, US
Andy Trotter - Lincolnton NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L009/32
US Classification:
713193000
Abstract:
A method and system for encrypting non-volatile storage regions, such as volumes, accessible by multiple users. A plurality of non-volatile storage regions is encrypted each with a different encryption key. A subset of the encryption keys is made available to each user thereby granting the user access to a corresponding subset of non-volatile storage regions. To protect a user's encryption keys, a private-public encryption key pair is generated, the private key being made available only to that user. The subset of the user's encryption keys is encrypted using the user's public encryption key. The users' private keys can be stored in a secure encryption module and can be protected with a password. Upon authenticating a user, the corresponding encryption keys may be provided to the user after decrypting the encryption keys using the user's private key. The contents of the non-volatile storage regions are then decrypted using the encryption keys.

System And Method For Satellite Broadcasting And Receiving Encrypted Television Data Signals

US Patent:
2005006, Mar 24, 2005
Filed:
Sep 19, 2003
Appl. No.:
10/666160
Inventors:
Daryl Cromer - Apex NC, US
Joshua Jankowsky - Raleigh NC, US
Howard Locker - Cary NC, US
Andy Trotter - Raleigh NC, US
James Ward - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04N007/167
H04L009/00
H04K001/00
H04N007/16
US Classification:
725031000, 725025000, 380282000, 380285000, 380287000
Abstract:
A system for broadcasting television signals transmits both encrypted program content and access control data over a satellite system to be received by a number of individual receivers, each of which has registered with the program provider by providing a public cryptographic key and hash codes representing the serial numbers of critical components within the receiver. The access control data, which is addressed to an individual receiver, includes data encrypted with the public key of the receiver, indicating the program content to be decrypted by the receiver using its private key. Whenever the receiver is powered on, the hash codes are generated and stored to ensure the components have not been changed. Each transmission from the receiver to the program provider is validated by checking the hash codes.

FAQ: Learn more about Andy Trotter

Where does Andy Trotter live?

Sacramento, CA is the place where Andy Trotter currently lives.

How old is Andy Trotter?

Andy Trotter is 78 years old.

What is Andy Trotter date of birth?

Andy Trotter was born on 1946.

What is Andy Trotter's email?

Andy Trotter has such email addresses: jtrotter***@bellsouth.net, aknbitrot***@msn.com, andt***@aol.com, andy.trot***@msn.com. Note that the accuracy of these emails may vary and they are subject to privacy laws and restrictions.

What is Andy Trotter's telephone number?

Andy Trotter's known telephone numbers are: 704-489-9539, 309-697-6448, 757-787-4350, 757-789-5395, 954-463-1494, 423-821-0011. However, these numbers are subject to change and privacy restrictions.

How is Andy Trotter also known?

Andy Trotter is also known as: Andy O'Trotter. This name can be alias, nickname, or other name they have used.

Who is Andy Trotter related to?

Known relatives of Andy Trotter are: Lovia Trotter, Otis Trotter, Andreana Trotter, Jocylynn Richardson, Larry Richardson. This information is based on available public records.

What are Andy Trotter's alternative names?

Known alternative names for Andy Trotter are: Lovia Trotter, Otis Trotter, Andreana Trotter, Jocylynn Richardson, Larry Richardson. These can be aliases, maiden names, or nicknames.

What is Andy Trotter's current residential address?

Andy Trotter's current known residential address is: 3902 Annadale Ln, Sacramento, CA 95821. Please note this is subject to privacy laws and may not be current.

What are the previous addresses of Andy Trotter?

Previous addresses associated with Andy Trotter include: 4918 Siesta Ct, Bartonville, IL 61607; 25051 Custis Neck, Accomac, VA 23301; 9 Holly St, Onancock, VA 23417; 2000 Ocean Ln, Fort Lauderdale, FL 33316; 100 Scenic Hwy, Lookout Mtn, TN 37350. Remember that this information might not be complete or up-to-date.

Andy Trotter from other States

People Directory:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z