“Cullen is definitely one of the best engineers and managers I have had the good fortune to work with. Not only does he have an outstanding grasp of VoIP, Software Engineering, and computing in general, but he has a remarkable knack for building outstanding teams and keeping them motivated.”
Cullen Jennings
San Jose, California, United States
5K followers
500+ connections
Activity
-
1st Day at Adobe ! Excited to share that I'm starting as Divisional CIO for Adobe's Digital Media group. The Digital Media group includes some of…
1st Day at Adobe ! Excited to share that I'm starting as Divisional CIO for Adobe's Digital Media group. The Digital Media group includes some of…
Liked by Cullen Jennings
-
I am honored to be presenting at the IEEE International Conference on Communications in Denver. #Broadband #IEEE https://lnkd.in/dD5Z5cSB
I am honored to be presenting at the IEEE International Conference on Communications in Denver. #Broadband #IEEE https://lnkd.in/dD5Z5cSB
Liked by Cullen Jennings
-
Today Vlad Magdalin and I shared with the Webflow team that I will step into the role of CEO and Vlad will become our Chief Innovation Officer as we…
Today Vlad Magdalin and I shared with the Webflow team that I will step into the role of CEO and Vlad will become our Chief Innovation Officer as we…
Liked by Cullen Jennings
Experience
Publications
-
Differentiated Services Code Point (DSCP) Packet Markings for WebRTC QoS
RFC 8837
-
Encrypted Key Transport for DTLS and Secure RTP
RFC 8870
-
JavaScript Session Establishment Protocol (JSEP)
RFC 8829
-
Negotiating Media Multiplexing Using the Session Description Protocol (SDP)
RFC 8843
-
Double Encryption Procedures for the Secure Real-Time Transport Protocol (SRTP)
RFC 8723
-
Sensor Measurement Lists (SenML)
RFC 8428
-
Authenticated Identity Management in the Session Initiation Protocol (SIP)
RFC 8224
-
A SIP Usage for REsource LOcation And Discovery (RELOAD)
RFC 7904
-
Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement
RFC 7624
-
Resource Location And Discovery (RELOAD) Base Protocol
RFC 6940
-
Example Call Flows Using Session Initiation Protocol (SIP) Security Mechanisms
RFC 6216
-
Certificate Management Service for the Session Initiation Protocol (SIP)
RFC 6072
-
Change Process for the Session Initiation Protocol (SIP) and the Real-time Applications and Infrastructure Area
RFC 5727 part of BCP 67
-
Managing Client-Initiated Connections in the Session Initiation Protocol (SIP)
RFC 5626
-
The Internet Assigned Number Authority (IANA) tel Uniform Resource Identifier (URI) Parameter Registry
RFC 5341
-
The Session Initiation Protocol (SIP) and Spam
RFC 5039
-
Relay Extensions for the Message Sessions Relay Protocol (MSRP)
RFC 4976
-
The Message Session Relay Protocol (MSRP)
RFC 4975
-
Representing Trunk Groups in tel/sip Uniform Resource Identifiers (URIs)
RFC 4904
-
Network Address Translation (NAT) Behavioral Requirements for Unicast UDP
RFC 4787 part of BCP 127
-
RFC 4770: vCard Extensions for Instant Messaging (IM)
IETF
This document describes an extension to vCard to support Instant Messaging (IM) and Presence Protocol (PP) applications. IM and PP are becoming increasingly common ways of communicating, and users want to save this contact information in their address books. It allows a URI that is associated with IM or PP to be specified inside a vCard.
Other authorsSee publication -
vCard Extensions for Instant Messaging (IM)
RFC 4770
-
Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP)
RFC 4474
-
Session Initiation Protocol (SIP) URIs for Applications such as Voicemail and Interactive Voice Response (IVR)
RFC 4458
-
SIP Security for Voice, Video and Instant Messaging Networks
RSA Conference
-
Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks
RFC 3325
-
Robust finger tracking with multiple cameras
. IEEE workshop on Recognition, Analysis and Tracking of Faces and Gestures in Real-Time Systems at ICCV'99
-
Cooperative Robot Localization with Vision-Based Mapping
IEEE Conference on Robotics and Automation
-
Video Switch
The Computer Applications Journal
-
Spinoza: Visually Guided Mobile Robot
Mobile Robot demonstration. IEEE conference on Computer Vision and Pattern Recognition
-
Stereo vision based mapping and navigation for mobile robots
IEEE International Conference on Robotics and Automation
-
Spinoza: A Stereoscopic Visually Guided Mobile Robot
In Proceedings of 30th Hawaii International Conference on System Sciences (HICSS-30), 1997 Volume 5
-
A Distributed Thinning Algorithm on a Workstation Network
In Proc. ZEUS'95 Workshop on Parallel Programming and Computation (Linkoping, Sweden, 17-18 May 1995)
-
A Distributed Thinning Algorithm on a Workstation Network
In Parallel Programming and Applications, ed. P. Fritzon and L. Finmo (IOS Press, 1995)
-
A Force Based Thinning Strategy with Sub-Pixel Precision
In Proceeding of Vision Interface 94 (Banff, AB, 18-20 May 1994)
-
A Force-Based Thinning Strategy with Sub-Pixel Precision
Technical Report 93/504/09, University of Calgary, February 1993
-
A Methodology for Writing Multiprocessor Programs on a Network of UNIX Workstations
In Proceedings of SS 93, High Performance Computing: New Horizons (Calgary, AB, 6-9 March 1993)
-
Automatic GIS Data Capture and Conversion
In Innovations in GIS ed. M.F. Worboys (1994)
-
Automatic GIS Data Capture and Conversion
In Proceedings of GIS Research - UK 1993 (Keele, England, 18-20 March 1993)
-
Character Recognition Using the Hough Transform
Technical Report 93/51/ 22, University of Calgary, March 1993
-
Comparative Performances of HPC Systems for Signal Processing
In Proceeding of SS 93, High Performance Computing: New Horizons (Calgary, AB, 6-9 March 1993)
-
Defining the Digital Skeleton
In Proceedings of SPIE Vision Geometry, vol. 1832 (Boston, Mass., 15-16 Nov. 1992)
-
Distributed Force-Based Thinning and a General Distribution Method
Technical Report 93/505/10, University of Calgary, February 1993
-
Thresholding Using an Illumination Model
In Proceedings of ICDAR 93: International Conference on Document Analysis and Recognition (Tsukuba Science City, Japan, 20-22 October 1993)
-
Vision Knowledge Vectorization: Converting Raster Images into Vector Form
In Proceedings of 12th International Conference on Pattern Recognition (Jerusalem, Israel, 9-13 October 1994)
Patents
-
Method for protecting against denial of service attacks
Issued EU 1943802
-
Method for protecting against denial of service attacks
Issued FR 1943802
-
Method for protecting against denial of service attacks
Issued GB 1943802
-
Method for protecting against denial of service attacks
Issued DK 1943802
-
Transferring State Information in a Network
Issued FR 1856896
-
Transferring State Information in a Network
Issued EU 1856896
-
Transferring State Information in a Network
Issued DK 1856896
-
Transferring State Information in a Network
Issued GB 1856896
-
Beacon spoofing prevention
Issued US 10,171,496
-
Technique for Displaying Information Ancillary to a Location of an Entity in a Communication Network
Issued GB 1911302
-
Technique for Displaying Information Ancillary to a Location of an Entity in a Communication Network
Issued DK 1911302
-
Technique for Displaying Information Ancillary to a Location of an Entity in a Communication Network
Issued EU 1911302
-
Technique for Displaying Information Ancillary to a Location of an Entity in a Communication Network
Issued FR 1911302
-
Node reputation based on knowledge of pstn calls
Issued DK 2494762
-
Node reputation based on knowledge of pstn calls
Issued EU 2494762
-
Node reputation based on knowledge of pstn calls
Issued GB 2494762
-
Node reputation based on knowledge of pstn calls
Issued FR 2494762
-
Using authentication tokens to authorize a firewall to open a pinhole
Issued IN 290219
-
Management networks access for network users
Issued EU 1882341
-
Management networks access for network users
Issued GB 1882341
-
Management networks access for network users
Issued DK 1882341
-
RESTRICTION OF COMMUNICATION IN VOIP ADDRESS DISCOVERY SYSTEM
Issued DK 2449744
-
Restriction of communication in VoIP address discovery system
Issued EU 2449744
-
RESTRICTION OF COMMUNICATION IN VOIP ADDRESS DISCOVERY SYSTEM
Issued FR 2449744
-
RESTRICTION OF COMMUNICATION IN VOIP ADDRESS DISCOVERY SYSTEM
Issued GB 2449744
-
Method and apparatus for discovering security devices located on a call path and for extending bindings at those discovered security devices
Issued EU 2074522
-
Method and apparatus for discovering security devices located on a call path and for extending bindings at those discovered security devices
Issued GB 2074522
-
Method and apparatus for discovering security devices located on a call path and for extending bindings at those discovered security devices
Issued DK 2074522
-
Method and apparatus for discovering security devices located on a call path and for extending bindings at those discovered security devices
Issued FR 2074522
-
System and Method for Establishing a Communication Session Between Two Endpoints That Do Not Both Support Secure Media
Issued DK 2044730
-
System and Method for Establishing a Communication Session Between Two Endpoints That Do Not Both Support Secure Media
Issued EU 2044730
-
System and Method for Establishing a Communication Session Between Two Endpoints That Do Not Both Support Secure Media
Issued GB 2044730
-
RESTRICTION OF COMMUNICATION IN VOIP ADDRESS DISCOVERY SYSTEM
Issued CA 102077550
-
Discovering security devices located on a call path and extending bindings at those discovered security devices
Issued US 9,054,922
-
Node reputation based on knowledge of PSTN calls
Issued CA 102160361
-
Using authentication tokens to authorize a firewall to open a pinhole
Issued CA 102217270
-
Prevention of voice over IP spam
Issued US 8,923,279
-
Using PSTN reachability in anonymous verification of VoIP call routing information
Issued CA 102239676
-
Categorization of Telephone calls
Issued CA 101543023
-
Presence-based management in a communication network
Issued FR 1730895
-
presence-based management in a communication network
Issued EU 1730895
-
Presence-based management in a communication network
Issued GB 1730895
-
Presence-based management in a communication network
Issued DK 1730895
-
Method and system for securing access to information in an automatic call distributor system
Issued US 8,731,175
-
Active tags
Issued US 8,713,053
-
Using PSTN reachability to verify VoIP call routing information
Issued US 8,675,642
-
Using PSTN reachability in anonymous verification of VoIP call routing information
Issued DK 2494761
-
Using PSTN reachability in anonymous verification of VoIP call routing information
Issued FR 2494761
-
Using PSTN reachability in anonymous verification of VoIP call routing information
Issued GB 2494761
-
Using PSTN reachability in anonymous verification of VoIP call routing information
Issued EU 2494761
-
Management of Missing Conference Invitees
Issued FR 1872617
-
Management of Missing Conference Invitees
Issued EU 1872617
-
Management of Missing Conference Invitees
Issued GB 1872617
-
Management of Missing Conference Invitees
Issued DK 1872617
-
Discovering security devices located on a call path and extending bindings at those discovered security devices
Issued US 8,533,339
-
Verifying cryptographic identity during media session initialization
Issued US 8,533,462
-
Using authentication tokens to authorize a firewall to open a pinhole
Issued DK 2380325
-
Using authentication tokens to authorize a firewall to open a pinhole
Issued EU 2380325
-
Using authentication tokens to authorize a firewall to open a pinhole
Issued FR 2380325
-
Using authentication tokens to authorize a firewall to open a pinhole
Issued GB 2380325
-
Techniques for integrating instant messaging with telephonic communication
Issued US 8,438,235
-
Using PSTN Reachability to Verify VoIP Call Routing Information
Issued CA 101755445
-
Using authentication tokens to authorize a firewall to open a pinhole
Issued US 8,363,836
-
Flash pairing between bluetooth devices
Issued CA 101809955
-
Categorization of telephone calls
Issued DK 1935165
-
Categorization of telephone calls
Issued GB 1935165
-
Categorization of telephone calls
Issued FR 1935165
-
Categorization of Telephone calls
Issued EU 1935165
-
Authenticating an endpoint using a STUN server
Issued DK 1861946
-
Authenticating an Endpoint Using a Stun Server
Issued EU 1861946
-
Authenticating an endpoint using a STUN server
Issued FR 1861946
-
Authenticating an endpoint using a STUN server
Issued GB 1861946
-
Using PSTN reachability to verify VoIP call routing information
Issued DK 2181545
-
Using PSTN reachability to verify VoIP call routing information
Issued FR 2181545
-
Using PSTN Reachability to Verify VoIP Call Routing Information
Issued EU 2181545
-
Using PSTN reachability to verify VoIP call routing information
Issued GB 2181545
-
Rounding for security
Issued US 8,311,218
-
Certificate enrollment with purchase to limit sybil attacks in peer-to-peer network
Issued US 8,301,880
-
Restriction of communication in VoIP address discovery system
Issued US 8,274,968
-
Separation of validation services in VoIP address discovery system
Issued US 8,228,902
-
Using PSTN reachability in anonymous verification of VoIP call routing information
Issued US 8,228,904
-
Integration of VoIP address discovery with PBXs
Issued US 8,228,903
-
Node reputation based on knowledge of PSTN calls
Issued US 8,223,755
-
Using PSTN reachability to verify caller ID information in received VoIP calls
Issued US 8,204,047
-
Verifying cryptographic identity during media session initialization
Issued US 8,200,959
-
Using PSTN reachability to verify VoIP call routing information
Issued US 8,199,746
-
Technique for displaying information ancillary to a location of an entity in a communication network
Issued US 8,190,134
-
Method for protecting against denial of service attacks
Issued US 8,191,119
-
Monitoring traffic to provide enhanced network security
Issued US 8,161,547
-
Method and system using quality of service information for influencing a user's presence state
Issued US 8,155,014
-
System and method for establishing a communication session between two endpoints that do not both support secure media
Issued US 8,139,566
-
Prevention of voice over IP spam
Issued US 8,121,114
-
Management Network Access for Network Users
Issued CA 101151859
-
Method and system using presence information to manage network access
Issued US 8,079,062
-
Sharing of presence-based time-zone information
Issued US 8,078,578
-
VoIP call routing information registry including hash access mechanism
Issued US 8,072,967
-
Configurable downloading of content pointed to in electronic messages
Issued US 8,069,215
-
Method and system indicating a level of security for VoIP calls through presence
Issued US 8,015,403
-
Load balancing across multiple network address translation (NAT) instances and/or processors
Issued US 8,005,098
-
Method and system for blocking communication within a conference service
Issued US 7,940,705
-
Method and system to protect the privacy of presence information for network users
Issued US 7,920,847
-
Authenticating an endpoint using a STUN server
Issued US 7,908,480
-
Categorization of telephone calls
Issued US 7,894,597
-
Flash pairing between bluetooth devices
Issued US 7,831,207
-
Method and system for providing a conference service using speaker selection
Issued US 7,778,206
-
Method and system using shared configuration information to manage network access for network users
Issued US 7,764,699
-
Method and apparatus for token distribution in session for future polling or subscription
Issued US 7,764,945
-
Method and apparatus for identifying a media path in a network
Issued US 7,733,769
-
User interface for call history
Issued US 7,724,887
-
Efficiently Bounding the Location of a Mobile Communications Device
Issued EU 1905264
-
Efficiently bounding the location of a mobile communications device
Issued DK 1905264
-
Efficiently bounding the location of a mobile communications device
Issued FR 1905264
-
System and method for displaying sticky notes on a phone
Issued US 7,698,644
-
Transferring state information in a network
Issued US 7,680,060
-
System and method for routing information packets
Issued US 7,680,065
-
Network presence status from network activity
Issued US 7,573,833
-
Authentication of SIP and RTP traffic
Issued US 7,568,224
-
Efficiently bounding the location of a mobile communications device
Issued US 7,561,888
-
System and method for distributed debugging in a communication system
Issued AU 2003279138
-
System and method for securing transactions in a contact center environment
Issued US 7,523,859
-
System and method for distributed debugging in a communication system
Issued CA 100446478
-
Connecting an endpoint to a conference call
Issued US 7,466,812
-
Signal detection using probabilistic techniques
Filed US 7,457,597
-
System and method for distributed debugging in a communication system
Issued EU 1550263
-
System and method for distributed debugging in a communication system
Issued DK 1550263
-
System and method for distributed debugging in a communication system
Issued GB 1550263
-
Combining signals at a conference bridge
Issued US 7,369,652
-
Method and system for managing communication in emergency communication system
Issued US 7,324,802
-
Method and apparatus for media stream monitoring
Issued US 7,310,334
-
System and method for securing transactions in a contact center environment
Issued US 7,287,692
-
System and method for securing transactions in a contact center environment
Issued US 7,287,692
-
Presence-based management in a communication network
Issued DK 202005021208.3
-
Presence-based management in a communication network
Issued US 7,260,632
Honors & Awards
-
Outstanding Young Alumni Award
University of British Columbia
-
National Sciences and Engineering Research Council (NSERC) doctoral fellowship
-
Organizations
-
ISRG
Board Member
- -
A100 Group
Member
-
ACM
-
-
IEEE
-
-
The Internet Protocol Journal
Editorial Advisory Board
https://ipj.dreamhosters.com/internet-protocol-journal/about/about-the-ipj/
Recommendations received
2 people have recommended Cullen
Join now to viewMore activity by Cullen
-
When the CTO team started this project several years ago, I never thought it would receive an Auggie award. Webex Hologram came together thanks to an…
When the CTO team started this project several years ago, I never thought it would receive an Auggie award. Webex Hologram came together thanks to an…
Shared by Cullen Jennings
-
When the #Cisco CTO team started this project several years ago, I never thought it would receive an #Auggie award. #Webex #Hologram came together…
When the #Cisco CTO team started this project several years ago, I never thought it would receive an #Auggie award. #Webex #Hologram came together…
Shared by Cullen Jennings
-
Why do some founders and investors repeatedly make great decisions under a lot of uncertainty? They have an intuitive understanding of "startup…
Why do some founders and investors repeatedly make great decisions under a lot of uncertainty? They have an intuitive understanding of "startup…
Liked by Cullen Jennings
-
Back in January, I started working on a proof of concept to validate the idea of running automatically generated tests from a formal specification on…
Back in January, I started working on a proof of concept to validate the idea of running automatically generated tests from a formal specification on…
Liked by Cullen Jennings
-
Someone asked me last week who manages my social media posts? My answer was pretty simple. I do. Here’s why! I feel like over time as…
Someone asked me last week who manages my social media posts? My answer was pretty simple. I do. Here’s why! I feel like over time as…
Liked by Cullen Jennings
-
It has been an exciting few days here in Yokohama, Japan at the major international robotics conference #ICRA the IEEE International Conference on…
It has been an exciting few days here in Yokohama, Japan at the major international robotics conference #ICRA the IEEE International Conference on…
Liked by Cullen Jennings
-
🌟 Inspiring all future tech superstars! 🌟 Last week, the Women of Cisco hosted our annual Girls in IT event! 🎉 Schools bring in bright young…
🌟 Inspiring all future tech superstars! 🌟 Last week, the Women of Cisco hosted our annual Girls in IT event! 🎉 Schools bring in bright young…
Liked by Cullen Jennings
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Cullen Jennings
3 others named Cullen Jennings are on LinkedIn
See others named Cullen Jennings