Patents by Inventor Jay Dweck

Jay Dweck has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070260729
    Abstract: A system, method, apparatus, and means for adjusting network preference information which includes detecting network activity. A characteristic of the network activity is measured. Network preference information is adjusted based on the characteristic. In some embodiments, network activity is network activity by a client device such as a computer accessing a network site.
    Type: Application
    Filed: July 18, 2007
    Publication date: November 8, 2007
    Inventor: Jay Dweck
  • Publication number: 20060070078
    Abstract: Systems and methods are provided to allocate application tasks to a pool of processing machines. According to some embodiments, a requestor generates a scope request including an indication of a number of compute units to be reserved. The requestor also provides an application request associated with the scope. A subset of available processing machines may then be allocated to the scope, and the application request is divided into a number of different tasks. Each task may then be assigned to a processing machine that has been allocated to the application request. According to some embodiments, each task is associated with a deadline. Moreover, according to some embodiments an overall cost is determined and then allocated to the requestor based on the number of compute units that were reserved for the scope.
    Type: Application
    Filed: August 22, 2005
    Publication date: March 30, 2006
    Inventors: Jay Dweck, Michael Fellows, David Richard, Mark Morrissey, Marry Byron
  • Publication number: 20050262575
    Abstract: Systems and methods are provided to secure restricted information, such as restricted financial information. According to some embodiments, a user's request to execute an application on a secure application server is verified based on a user name, a user password, a unique identifier associated with a workstation, and a request authentication procedure. Moreover, according to some embodiments a file having restricted information cannot be attached to an email message. In still other embodiments, one display unit displays non-restricted information while another display unit displays restricted information.
    Type: Application
    Filed: September 28, 2004
    Publication date: November 24, 2005
    Inventors: Jay Dweck, Mary Byron, Bhavesh Patel
  • Publication number: 20050203956
    Abstract: Systems and methods are provided to facilitate state transitions for managed business objects. For example, a managed business object may be created such that it can be in one of a number of pre-defined states. When an event notification is received, an action request is issued to a component application based on (i) the current state of the managed business object, (ii) the event notification, and (iii) a pre-defined rule. An action response is then received from the component application, and the state of the managed business object is transitioned in accordance with the action response.
    Type: Application
    Filed: March 8, 2005
    Publication date: September 15, 2005
    Inventors: Jay Dweck, Alexander Hassan
  • Publication number: 20050203820
    Abstract: Systems and methods are provided to model financial transactions. According to some embodiments, simple events, branch events, composite events, and/or contingent events associated with a financial transaction are defined. The events may then be used to automatically manage the transaction during the transaction's lifecycle.
    Type: Application
    Filed: March 8, 2005
    Publication date: September 15, 2005
    Inventors: Jay Dweck, Pantelis Tsoucas