Kas Thomas

Kas Thomas

Location
Jacksonville, Florida Area
Industry
Computer Software

As a LinkedIn member, you'll join 300 million other professionals who are sharing connections, ideas, and opportunities.

  • See who you and Kas Thomas know in common
  • Get introduced to Kas Thomas
  • Contact Kas Thomas directly

View Kas's full profile

Kas Thomas's Overview

Past
  • Security Consultant at [confidential; well-known public company]
  • Founder and Operator at Acroforms.com
  • Editor and Publisher at TBO Advisor
Connections

500+ connections

Websites

Kas Thomas' Experience

Technical Writer

Adobe Systems

Public Company; 10,001+ employees; ADBE; Computer Software industry

June 2010July 2013 (3 years 2 months)

Creating user doc, developer doc, marketing white papers, and collateral in support of a standards-based approach to Web Content Management, using JCR, CMIS, and other technologies.

Privately Held; 11-50 employees; Information Technology and Services industry

July 2007May 2010 (2 years 11 months)

Analyst, author, blogger, specializing in Web Content Management Systems, Search, and Digital Asset Management.

Documentation Manager

Novell

Privately Held; 1001-5000 employees; NOVL; Information Technology and Services industry

September 2000April 2007 (6 years 8 months)

In addition to managing technical writers in Shelton, CT and Waltham, MA (and doing a huge amount of technical writing myself), I served on Novell's Inventions Committee and contributed patentable work in security, encryption, workflow, and other areas.

Security Consultant

[confidential; well-known public company]

January 2000August 2000 (8 months)

Founder and Operator

Acroforms.com

June 1997May 2000 (3 years)

Website devoted to PDF Forms technology. Sold to PlanetPDF.com. See press release at http://www.planetpdf.com/mainpage.asp?webpageid=905 .

Editor and Publisher

TBO Advisor

February 1993July 1999 (6 years 6 months) Wilton, CT

Edited and published a specialty newsletter for aircraft owner-operators.

Kas Thomas' Patents

  • Distributed workflow techniques

    • United States Patent 7792693
    • Issued September 7, 2010
    Inventors: Kas Thomas, Jon Bultmeyer, Stephen R Carter, Howard Melman, Bjarne Rasmussen

    Techniques for distributed workflow processing are presented. The workflow is coordinated through one or more identity services. The identity services also establish trusted and secure communications between the first and second workflow systems.

  • Managing supplied data

    • United States Patent 8606834
    • Issued December 10, 2013
    Inventors: Kas Thomas

    In a computing system environment, a data recipient manages entropy data supplied from an external data source despite not knowing or being certain about their trustworthiness or if such varies over time. Features relate to scoring the data and determining whether it meets or exceeds a predetermined policy score. One or more initial or updated reputation values of the data source are contemplated and used for scoring. Logging of the scoring, reputation values or other matters is provided for historical purposes and to identify possible future corrective actions. Other embodiments contemplate enhancing the score of the entropy data. In some instances, use of less than all the data by the recipient occurs to increase attack-resistance. Whether such occurs or how much occurs remains substantially unbeknownst to all parties other than the data recipient. Still other embodiments contemplate computer-readable media.

  • Adaptive data compression system

    • United States Patent 5220768
    • Issued July 20, 1993
    Inventors: Kas Thomas

    A system for data compression and decompression is disclosed. A series of fixed length overlapping segments, called hash strings, are formed from an input data sequence. A retrieved character is the next character in the input data sequence after a particular hash string. A hash function relates a particular hash string to a unique address in a look-up table (LUT). An associated character for the particular hash string is stored in the LUT at the address. When a particular hash string is considered, the content of the LUT address associated with the hash string is checked to determine whether the associated character matches the retrieved character following the hash string. If there is a match, a Boolean TRUE is output; if there is no match, a Boolean FALSE along with the retrieved character is output. Furthermore, if there is no match, then the LUT is updated by replacing the associated character in the LUT with the retrieved character. The process continues for each hash string until the entire input data sequence is processed. The method of decompression includes the steps of initializing a decompression LUT to mirror the initial compression LUT and receiving a representational form output from the compressor. The representational form is generally analyzed one character at a time. If the character is a Boolean TRUE, then the content of the LUT addressed by the most recently decoded hash string is output. Otherwise, if the character is a Boolean FALSE, the next character (exception character) in the representational form is output and the content of the LUT addressed by the most recently decoded hash string is output.

  • Cooperative encoding of data by pluralities of parties

    • United States Patent 7940926
    • Issued May 10, 2011
    Inventors: Kas Thomas

    Methods and apparatus include cooperatively encoding digital data between collaborating parties. By prior agreement, the parties take turns encoding portions of a given payload (e.g., document), until all portions have been encoded, thereby transforming the payload from a native encoding to a new, composite encoding. Choreography rules facilitate the process. Each party is free to use its own processing scheme. The use of a lookback or chaining step enables each party to impart a quality of informational entanglement to the output during its construction. By virtue of these features and attendant synergies, the resultant jointly encoded digital data enjoys certain novel cryptographic properties in addition to serving as a record of interaction between parties. To decode the data, the process is reversed. Third parties are optionally employed to mediate aspects of the process. Noise and padding, such as watermarks or copyrights, may be added variously to the encoded digital data. Encoding schemes include encryption or compression algorithms.

  • Adaptive method and system for encoding digital images for the internet

    • United States Patent 7826616
    • Issued November 10, 2010
    Inventors: Kas Thomas

    A system and method comprise defining a current rectangular region of the image bitmap, quantifying spectral characteristics of the current rectangular region, dividing the current rectangular region into four rectangular sub-regions in response to the spectral characteristics being greater than a predetermined threshold value, tagging the current rectangular sub-region as a terminal rectangular region in response to the spectral characteristics being less than or equal to the predetermined threshold value, tagging each rectangular sub-region as a terminal rectangular region in response to a size of the rectangular sub-region being less than or equal to a predetermined threshold size, defining one of the non-terminal rectangular sub-regions as the current rectangular region and repeating the above until all rectangular regions are tagged terminal, and determining color characteristics for each of the terminal rectangular regions.

  • Adaptive method and system for encoding digital images for the internet

    • United States Patent 7602984
    • Issued October 13, 2009
    Inventors: Kas Thomas

    A system and method comprise defining a current rectangular region of the image bitmap, quantifying spectral characteristics of the current rectangular region, dividing the current rectangular region into four rectangular sub-regions in response to the spectral characteristics being greater than a predetermined threshold value, tagging the current rectangular sub-region as a terminal rectangular region in response to the spectral characteristics being less than or equal to the predetermined threshold value, tagging each rectangular sub-region as a terminal rectangular region in response to a size of the rectangular sub-region being less than or equal to a predetermined threshold size, defining one of the non-terminal rectangular sub-regions as the current rectangular region and repeating the above until all rectangular regions are tagged terminal, and determining color characteristics for each of the terminal rectangular regions.

  • Visual indication of user role in an address bar

    • United States Patent 7594193
    • Issued September 22, 2009
    Inventors: Kas Thomas

    Apparatus, methods and computer program products relate to icons in an address bar of a browser indicative of roles of users as they visit web sites. In this manner, users (with many roles, such as in the context of an employer's business) are visually cued to remind them of their role at the web sites, often because web sites have different functionality according to different roles. Various features include icon forms suggesting roles as employees, managers, administrators, anonymous users, etc. Upon mousing-over icons, tool tips are obtainable regarding a status of the role of the user. Menus of multiple icons are also available for the many roles of the user. Upon selection of one the icons of the menu, the selected icon appears in the address bar upon the user visiting the website in their new role. Altering the display of the icon exists to show different role status.

  • Network content in dictionary-based (de)compression

    • United States Patent 7554467
    • Issued June 30, 2009
    Inventors: Kas Thomas

    Apparatus and methods are described for network content in dictionary-based (de)compression. Content for compression is parsed into discrete constructions, such as phrases, words, etc. The discrete constructions are passed to a searching engine to locate network information at one or more network locator identities, such as URI's (URL's, URNs) that correspond to the discrete constructions. Upon locating the network information, a dictionary of entries corresponding to the content is created. The content is encoded from the dictionary by indicating raw or relative offsets into the network information per each of the network locator identities. Decoding occurs anti-symmetrically to the encoding. In this manner, the vastness of network content, e.g., the world wide web, is leveraged to provide relevant dictionaries for de-/encoding. Searching for candidate dictionaries, scoring same and safeguarding against volatile dictionary content are other noteworthy features. Computer program products and computing network interaction are also defined.

  • Identity-aware scheduler service

    • United States Patent Application 20080301685
    • Filed December 4, 2008

    In a computing environment, clients and scheduling services are arranged to coordinate time-based services. Representatively, the client and scheduler engage in an http session whereby the client creates an account (if the first usage) indicating various identities and rights of the client for use with a scheduling job. Thereafter, one or more scheduling jobs are registered including an indication of what payloads are needed, where needed and when needed. Upon appropriate timing, the payloads are delivered to the proper locations, but the scheduling of events is no longer entwined with underlying applications in need of scheduled events. Monitoring of jobs is also possible as is establishment of appropriate communication channels between the parties. Noticing, encryption, and authentication are still other aspects as are launching third party services before payload delivery. Still other embodiments contemplate publishing an API or other particulars so the service can be used in mash-up applications.

  • Stealth entropy collection

    • United States Patent Application 20080189356
    • Filed August 7, 2008
    Inventors: Kas Thomas, Stephen R Carter

    In a computing system environment, methods and apparatus include tapping a plurality of connected computing devices and distilling small amounts of entropy from each, concentrating the entropy so collected, and performing all in a stealth or surreptitious fashion relative to the providers of the entropy. In this manner: the potential supply of entropy on a networked computing device is greatly expanded; the potential for entropy-related denial-of-service attacks in Linux systems is reduced; no significant extra processing burden on participating computing devices is required; and enlisting entropy-providing computing devices (including or not naive applications) in entropy exchanges occurs unobtrusively. Representative particular environments include web servers, including servlet filters, and clients engaged in http sessions; Java virtual machines; network interface cards in promiscuous mode analyzing packets; and other. Computer program products for devices to realize the foregoing are also intended.

  • Foreign language translator in a document editor

    • United States Patent Application 20080172219
    • Filed July 17, 2008
    Inventors: Kas Thomas

    Apparatus and methods allow users of document editors to real-time translate language of text from a first to a second language. During use, users indicate a selection for translation in a typing area of the document editor. The document editor seeks translation from a remote language translation service, especially by way of internet http requests. Processing of returned translations also occurs to present users with a useable form of the translation. Other aspects include seeking translations from multiple language translation services and selecting a best translation for display, according to a predetermined criteria. Users can also select preferred languages for translation. Retrofitting existing document editors contemplates inserting executable code, in the form of plug-ins or macros, and executing them to obtain translations. Executable code is available as a computer program product in the form of a download or on a computer-readable medium.

  • Provisioning software with policy-appropriate capabilities

    • United States Patent Application 20080141335
    • Filed June 12, 2008
    Inventors: Kas Thomas

    Apparatus and methods are described for enabling distribution of user-tailored pieces of a larger software program in a way that facilitates compliance with organizational policies around security, access control, and the like. The pieces, representing new or missing functionality in an existing instance of pre-installed software, are supplied as supplemental software fragments (known as "aspects") that provide the new or missing logic to a target application with the target application having to know of the fragment's existence. The number and quality of aspects provisioned to the user are tailored to the user's identity and/or organizational role in accordance with explicit policy governing such provisioning. In this manner, the user of the software gains functionality appropriate to his security level, title, or other qualifications, and the events surrounding the provisioning become loggable, traceable, and verifiable.

  • Cooperative encoding of data by pluralities of parties

    • United States Patent 8750496
    • Issued June 10, 2014
    Inventors: Kas Thomas

    Methods and apparatus include cooperatively encoding digital data between collaborating parties. By prior agreement, the parties take turns encoding portions of a given payload (e.g., document), until all portions have been encoded, thereby transforming the payload from a native encoding to a new, composite encoding. Choreography rules facilitate the process. Each party is free to use its own processing scheme. The use of a lookback or chaining step enables each party to impart a quality of informational entanglement to the output during its construction. By virtue of these features and attendant synergies, the resultant jointly encoded digital data enjoys certain novel cryptographic properties in addition to serving as a record of interaction between parties. To decode the data, the process is reversed. Third parties are optionally employed to mediate aspects of the process. Noise and padding, such as watermarks or copyrights, may be added variously to the encoded digital data. Encoding schemes include encryption or compression algorithms.

Kas Thomas' Skills & Expertise

  1. Web Content Management
  2. Content Management
  3. Web 2.0
  4. JavaScript
  5. Java
  6. Technical Writing
  7. Publishing
  8. Social Media
  9. Web Development
  10. Killing Sacred Cows
  11. Bullshit eradication
  12. Patents
  13. Blogging
  14. Usability
  15. User Experience
  16. CMS
  17. User Interface Design
  18. HTML 5
  19. Web Applications
  20. Start-ups
  21. Software Documentation
  22. Agile Project Management
  23. User Interface
  24. Technical Communication
  25. Not Killing Myself
  26. Changing Toilet Paper Rolls
  27. FrameMaker
  28. Content Strategy
  29. Web Analytics
  30. Information Architecture

View All (30) Skills View Fewer Skills

Kas Thomas' Languages

  • English

    (Native or bilingual proficiency)
  • German

    (Elementary proficiency)

Kas Thomas' Additional Information

Websites:
Honors and Awards:

Regents Fellow, Univ. of Calif., Davis

Contact Kas for:

  • career opportunities
  • new ventures
  • expertise requests
  • reference requests
  • getting back in touch

View Kas Thomas’ full profile to...

  • See who you and Kas Thomas know in common
  • Get introduced to Kas Thomas
  • Contact Kas Thomas directly

View Kas's full profile

Viewers of this profile also viewed...