MICHAEL ROBERT THOMPSON, R.PH.
Pharmacy at 41 St, Austin, TX

License number
Texas 21091
Category
Pharmacy
Type
Pharmacist
Address
Address
1000 E 41St St, Austin, TX 78751
Phone
(512) 459-8308
(512) 453-6526 (Fax)

Professional information

Michael Thompson Photo 1

Family Counselor/Single Parent Counselor/Consultant

Position:
Family Counselor/Single Parent Counselor/Owner at GoDads
Location:
Austin, Texas Area
Industry:
Information Services
Work:
GoDads - Godads.net since May 2012 - Family Counselor/Single Parent Counselor/Owner State of Texas Oct 2008 - May 2011 - Program Specialist V Lifesteps - Round Rock, Texas Apr 2006 - Aug 2008 - Family Counselor Austin Recovery - Austin,Tx Sep 2004 - Aug 2005 - Family Therapist
Education:
Abilene Christian University 1985 - 1988
Master, Marriage and Family Therapy
University of Texas at Arlington 1978 - 1984
Bachelor of Arts, Speech
Interests:
Family Counseling, Single Parent Counseling, Consulting


Michael Thompson Photo 2

Michael Thompson - Austin, TX

Work:
Whitehat Virtual Technologies
Support Engineer
National Air & Space Intelligence Center
Helpdesk Manager
Office of Military Cooperation-Egypt, American Embassy - Cairo
IT Services Manager
Defense Courier Station - Yokota - Tokyo, Japan
Operations Supervisor
390th Intelligence Squadron - Kadena Air Base, Japan
IT Project Manager
100th Communications Squadron - Mildenhall
IT Security Analyst
100th Communications Squadron - Mildenhall
Customer Support Technician
Education:
American Military University Charles Town - Charles Town, WV
B.S. in Information Systems Security
Community College of the Air Force - Maxwell AFB, AL
A.A.S. in Information Systems Management
Military:
Rank: Master SeargeantL.i.location.original
Skills:
System Administration / Network & System Security / System Monitoring / Technical Support / Systems Installation / Configuration & Upgrading / Project Management / User Training & Support / Inventory Management / Procurement


Michael Thompson Photo 3

Supervising Land Appraiser At Wcad

Position:
Supervising Land Appraiser at Williamson Central Appraisal District
Location:
Austin, Texas Area
Industry:
Government Administration
Work:
Williamson Central Appraisal District - 625 FM 1460 Georgetown, TX 78626-8050 since Apr 2008 - Supervising Land Appraiser Fairfax County Government Feb 2007 - Nov 2007 - Appraiser Wayne Township Assessor's Office Feb 1995 - Aug 2006 - Administrative Manager
Education:
Indiana University-Purdue University at Indianapolis 1996 - 2003
BS, History
Santa Barbara City College 1992 - 1994


Michael Thompson, Jr. Photo 4

Michael Thompson, Jr., Austin TX - Lawyer

Office:
Wright & Greenhill, P.C.
221 West 6Th St SUITE 1800, Austin, TX 78768
Specialties:
Personal Injury, Premises Liability, Litigation, Governmental Defense
Memberships:
Travis County Bar Association (Member, Publications Committee), State Bar of Texas, Texas Association of Defense Counsel, Austin Young Lawyers Association, Defense Research Institute.
ISLN:
903166308
Admitted:
1989, Texas, U.S. District Court, Northern District of Texas, U.S. Court of Appeals, 5th Circuit
University:
University of Texas at Austin, B.A., 1986
Law School:
Texas Tech University, J.D., 1989
Links:
Site
Biography:
Briefing Attorney, Eighth Judicial District Court of Appeals, 1989-1990. Assistant Attorney General, 1990-1994. (Board Certified, Civil Appellate Law, Texas Board of Legal Specialization)


Michael Thompson Photo 5

Dynamic Switching Of Security Configurations

US Patent:
2011004, Feb 24, 2011
Filed:
Aug 20, 2009
Appl. No.:
12/544745
Inventors:
Paul W. Bennett - Austin TX, US
Elisa A. Ferracane - Austin TX, US
Daniel E. Morris - Austin TX, US
Michael C. Thompson - Austin TX, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 21/00, G06F 9/00
US Classification:
726 1, 726 2, 713100
Abstract:
Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first security configuration via a thread of execution, wherein a security configuration comprises at least one security parameter. The thread receives an incoming request. The thread switches to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request. The thread stores the second security configuration or a reference to the second security configuration to a stack. The thread authenticates the incoming request based on the second security configuration. The thread grants or denies access to the resource. The thread executes a method referenced in the incoming request. The thread restores to a first security configuration, responsive to completing the method.


Michael Thompson Photo 6

Refreshing Group Membership Information For A User Identifier Associated With A Security Context

US Patent:
2013017, Jul 11, 2013
Filed:
Jan 11, 2012
Appl. No.:
13/348466
Inventors:
William J. O'Donnell - Fichburg WI, US
Paul William Bennett - Austin TX, US
Elisa Ferracane - Austin TX, US
Michael Craig Thompson - Austin TX, US
Christopher Michael Dettlaff - Apex NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 21/00
US Classification:
726 6
Abstract:
A method for selectively refreshing group membership for an identifier associated with an authenticated user. The identifier represents an application server security context, and it is generated to enable a user credential associated with the authenticated user to be persisted. Following such authentication, the client is provided with a time-bounded, renewable security token. The method begins by configuring an option whether group membership information is refreshed during renewal of an expired security token. During renewal of an expired security token, the method determines whether the option is set. If so, an attempt is made to refresh information. This attempt performs a set of checks to verify certain conditions. If these checks are valid, the identifier is refreshed and the security token renewed with updated group membership information. If any check is not valid, the identifier is refreshed and the security token renewed with existing information.


Michael Thompson Photo 7

Flexibly Assigning Security Configurations To Applications

US Patent:
8230478, Jul 24, 2012
Filed:
Aug 27, 2009
Appl. No.:
12/548767
Inventors:
Paul W. Bennett - Austin TX, US
Elisa Ferracane - Austin TX, US
Daniel E. Morris - Austin TX, US
Michael C. Thompson - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/00, H04L 9/32
US Classification:
726 1, 726 4, 726 26, 726 27
Abstract:
A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.


Michael Thompson Photo 8

Security Role Testing Using An Embeddable Container And Properties Object

US Patent:
2012022, Aug 30, 2012
Filed:
Feb 25, 2011
Appl. No.:
13/034907
Inventors:
Paul W. Bennett - Round Rock TX, US
Elisa Ferracane - Austin TX, US
William J. O'Donnell - Fichburg WI, US
Michael C. Thompson - Austin TX, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 9/44
US Classification:
717127
Abstract:
Mechanisms are provided for performing security role definition testing. An application is received in a container of a runtime environment of the data processing system. The application has methods and security role definitions associated with the methods. A properties object, which specifies a user identifier to security role mapping, is received in the container. A test application is executed, in the container, by the processor, on an execution of the methods of the application based on the user identifier to security role mapping and the security role definitions. The test application tests an operation of the application with regard to the security role definitions. A result of the execution of the test application on the execution of the methods of the application is then output.


Michael Thompson Photo 9

Energy Services Sr Electrician At Lower Colorado River Authority

Position:
Energy Services Sr electrician at Lower Colorado River Authority
Location:
Austin, Texas Area
Industry:
Utilities
Work:
Lower Colorado River Authority - Energy Services Sr electrician


Michael Thompson Photo 10

Michael Thompson - Austin, TX

Work:
The Home Depot
Retail Merchandiser