California Institute of Technology Jan 2012 - Jun 2012
Cooking Teaching Assistant
California Institute of Technology Jan 2012 - Jun 2012
Thermodynamics Teaching Assistant
California Institute of Technology Jun 2011 - Jun 2012
Computational Fluid Mechanics Researcher
Avery House, California Institute of Technology Jun 2010 - Jun 2012
Lead Information Management Systems & Services Representative
Jet Propulsion Laboratory Jun 2010 - Aug 2010
ISS EarthKAM Programmer Intern
Education:
Stanford University 2012 - 2014
Master of Science (MS), Mechanical Engineering
California Institute of Technology 2008 - 2012
B.S., Mechanical Engineering
Kamehameha School 2004 - 2008
Skills:
Lathe Mill Drill Press Band Saw Laser Cutting Rapid Prototyping Java C C++ PHP MySQL HTML Python Perl Fortran Solidworks Matlab Mathematica Autodesk Inventor Microsoft Office
Honor & Awards:
Stanford Graduate Engineering Fellowship, September 2012 - March 2014
Caltech President's Scholarship Recipient, September 2008 - June 2012
Caltech William Hassenzahl Family Summer Undergraduate Research Fellow, June 2011 - August 2011
Caltech Summer Undergraduate Research Fellowship, June 2010 - August 2010
National Merit Finalist, May 2008
Rookie Team of the Year, Hawaii Regional, FIRST Robotics, May 2008
Apr 2009 to 2000 Target Team Member/BakerStarbucks Coffee Company Walnut Creek, CA Apr 2009 to Jun 2009 Shift Supervisor and baristaSweet Tomatoes Vancouver, WA Nov 2007 to Apr 2009 Assistant Manager & Crew LeaderEXPO Vancouver, WA Feb 2004 to Nov 2007 Salad Bar AttendantEXPO Ridgefield, WA Sep 2005 to Dec 2005 Cashier / Runner / CookOrchards Soccer Club Vancouver, WA Sep 1998 to Nov 2003Revolution Soccer Portland, OR Aug 2003 to Aug 2003 Cashier / Runner
Education:
Clark Community College Vancouver, WA Jan 2002 to Feb 2004 Information Systems & Network AdministrationEdmonds Community College Lynnwood, WA 2001 to 2001 General EducationMountain View High School Vancouver, WA 1998 to 2001 High School Diploma
Skills:
Strong keyboarding skills - 50+ WPM Experienced Microsoft Office XP, 2003, 2007, as well as Microsoft Windows XP & Vista Demonstrated ability to learn new applications/systems Skilled in email and web technology
Us Patents
System And Method For Inheriting Access Control Rules
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1730
US Classification:
707 9, 707 4, 707 10, 707102, 707104
Abstract:
A system and method are provided for an information management system (IMS) having an underlying relational database system (RDBMS) that allows an item to be associated with plural containers, and one of the containers is designated as the items primary container. Inheritance of the primary containers access control rules can be activated, and when it is, the containers access control rules are automatically used to access the item. Otherwise, the items access control rules are used. The containers rules can be propagated through many levels of containers/items.
Version-Enabled, Multi-Typed, Multi-Targeting Referential Integrity Relational Database System And Methodology
Andy I-Shin Wang - Palo Alto CA, US David M. Choy - Los Altos CA, US Lily L. Liang - San Jose CA, US James J. Lin - Cupertino CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F017/30
US Classification:
707102
Abstract:
A relational database is disclosed which includes a number of target tables each exhibiting a different type, such as a general contact table, a personal contact table and a department contact table. The relational database includes a super-column which is divided into a number of columns corresponding to the number of types of target tables. A respective column is allocated in the super-column for each of the types of the target tables. Valuable system memory space is consequently conserved. Multiple-typed tables and multi-targeted tables are supported, and multi-version data storage capabilities are provided.
System And Method For Managing Application Specific Privileges In A Content Management System
An Feng-I Chen - Fremont CA, US David Mun-Hien Choy - Los Altos CA, US Tawei Hu - San Jose CA, US Kenneth Carlin Nelson - Hollister CA, US Yuping Wang - San Jose CA, US Alan Tsu-I Yaung - San Jose CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F017/30
US Classification:
707 9
Abstract:
Access to system and user defined entities (objects, data items, or the like) is managed by a content manager. A privilege grants a user an ability to access system such controlled entities. An item is an atomic user data entity stored in the CM library server. A privileges table is used to store system and user defined privileges. A privilege is represented by a row in the table. Each privilege has a unique privilege code, with codes 0 to 999 reserved to store system-defined privileges and codes beyond 999 open for user-defined privileges thus allowing application specific privileges to be added without limit.
Content Management System And Methodology For Implementing A Complex Object Using Nested/Recursive Structures
Lily L. Liang - San Jose CA, US Tawei Hu - San Jose CA, US Kenneth C. Nelson - Hollister CA, US David M. Choy - Los Altos CA, US Khanh M. Le - Austin TX, US Edward J. Perry - Cary NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/00
US Classification:
707100, 707101, 715514
Abstract:
A content management system is provided including a plurality of tables forming a tree-based storage hierarchy. The system includes a library server having a stored procedure which creates a hierarchical tree-based storage structure having any number of child components horizontally and any number of component types vertically thus specifying a tree topology. Advantageously, a single invocation of the stored procedure will create the specified tree-based data storage structure which is stored in the library server.
Method, System, And Program Product To Support Multiple Content-Management Data Models
David M. Choy - Los Altos CA, US Tawei Hu - San Jose CA, US Lily Liang - San Jose CA, US Kenneth C. Nelson - Hollister CA, US Randal J. Richardt - San Jose CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30 G06F 7/00
US Classification:
707101, 707102, 7071041, 707 10
Abstract:
Methods, systems, and program products for managing multimedia content. These are built upon a combination of a high level content model for specific multimedia content types and a low level physical for mapping to a data engine. The method, system, and program product include representing multimedia content management objects and managing the objects in a relational database. The relational database is adapted for representing data in a plurality of relational database tables, where each of the relational database tables has at least one row with a plurality of columns. Content is managed by associating the object as an item to a row in a first relational database table; and associating additional components, if any, of the object to additional relational database tables.
System And Method For Ensuring Referential Integrity For Heterogeneously Scoped References In An Information Management System
David Mun-Hien Choy - Los Altos CA, US Sriram Raghavan - San Jose CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/00
US Classification:
707101, 707102, 707103 R, 707201
Abstract:
A system and method are provided for an information management system (IMS) to manage heterogenous references in the system, to ensure “referential integrity”, without changing the underlying relational database management system (RDBMS) of the IMS. One or more system tables are kept that are not visible to system users. In one embodiment, the RDBMS' mechanisms to ensure referential integrity for homogenous references is used in conjunction with the system table to extend referential integrity to heterogenous references. In another embodiment, the triggers of the RDBMS, in conjunction with the system table, are used to ensure referential integrity of heterogenous references.
System And Method For Item Versioning In A Content Mangement System
David Mun-Hien Choy - Los Altos CA, US Sudipta Deb Deb - Palo Alto CA, US Tawei Hu - San Jose CA, US Lily Liang - San Jose CA, US Kenneth Carlin Nelson - Hollister CA, US Edward Joseph Perry - Cary NC, US Mayank Vipin Shah - San Jose CA, US I-Shin Andy Wang - Palo Alto CA, US Howard Hao Zhang - San Jose CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30
US Classification:
707203, 707200, 707201
Abstract:
A content management system provides versioning capability that can either be controlled by the client application or be transparent thereto. Control of document versions depends on the root and child component attributes that are defined by the hierarchical structure of the document. When a document is updated, the present system performs any or all of the following scenarios as desired by the user: replace the existing attribute values stored in the root component instance for a specified document; replace the existing attribute values stored in a specified child component instance for the specified document; add a new child component instance into the hierarchical structure for the specified document; or delete an existing child component instance from the hierarchical structure for the specified document.
System And Method For Rdbms To Protect Records In Accordance With Non-Rdbms Access Control Rules
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30
US Classification:
707 9, 707 10, 707103
Abstract:
A system and method are provided for an information management system (IMS) having an underlying relational database management system (RDBMS) that allows applications to access the RDBMS directly for improved performance without going through the IMS, while maintaining access control. An access control list (ACL) is generated, with tables in the RDBMS being bound using codes in the ACL. At run time or, more preferably, pre-run time, user-defined functions (UDF) evaluate access control attributes and generate an access authorization table, which is joined with the appropriate information table(s) in response to a query against a view on the table. The view is presented to the querying user. Thus, access control rules are encapsulated in the view that is presented to the user.