Patents by Inventor Steven Grobman

Steven Grobman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20050289648
    Abstract: A method, apparatus and system for virtualized proxy services are disclosed herein. Specifically, on one embodiment, a virtual proxy may be implemented in a virtual machine host. The virtual proxy may reside within a dedicated or shared virtual partition and may include a set of access restrictions. In one embodiment, a network including virtual machine hosts having virtual proxies may also provide additional peer-to-peer services. More specifically, a virtual proxy on a virtual host may be configured to broadcast/multicast content requests to other virtual hosts on the network prior to accessing the content from a remote location. If the content has previously been downloaded by another virtual host on the network, the virtual proxy on the requesting host may copy the content from the peer virtual host, instead of downloading the content from the remote location again. A variety of security measures may be implemented in one embodiment to ensure data integrity.
    Type: Application
    Filed: June 23, 2004
    Publication date: December 29, 2005
    Inventors: Steven Grobman, Carl Jones
  • Publication number: 20050273636
    Abstract: A processor-based system accessing a performance profile for a program executing on a predetermined data set, executing the program on the predetermined data set, and governing processor speed in a predictive manner based at least in part on the performance profile.
    Type: Application
    Filed: June 7, 2004
    Publication date: December 8, 2005
    Inventor: Steven Grobman
  • Publication number: 20050254435
    Abstract: A method and system for selecting network connections in a multi-network environment is described.
    Type: Application
    Filed: April 25, 2005
    Publication date: November 17, 2005
    Inventors: George Moakley, Steven Grobman
  • Publication number: 20050203993
    Abstract: A system and method for optimizing data store selection for write operations are described herein. In one embodiment the method includes receiving a first request to perform a write operation on one of a plurality of multi-master data stores, wherein the one of the plurality of multi-master data stores is undetermined, and wherein the first request includes an optimization technique identifier. The method also includes creating a second request, wherein the second request requests performance of the write operation. The method further includes determining the one of the plurality of multi-master data stores to which the second request will be transmitted, and wherein the determining includes using an optimization technique associated with the optimization technique identifier. The method further includes transmitting the second request to the one of the plurality of multi-master data stores.
    Type: Application
    Filed: December 31, 2003
    Publication date: September 15, 2005
    Inventors: Steven Grobman, Craig Owen
  • Publication number: 20050135265
    Abstract: A method and system for enabling applications to optimize communications in a network environment is described. The method includes determining a set of application parameters for an application on a user device, determining one or more communications pathways coupled to the user device, determining a plurality of pathway parameters associated with each communications pathway, and selecting the communications pathway with pathway parameters that best match the application parameters of the application.
    Type: Application
    Filed: December 23, 2003
    Publication date: June 23, 2005
    Inventors: George Moakley, Steven Grobman
  • Publication number: 20050091171
    Abstract: The present disclosure relates to the authenticating a client against a pool of servers utilizing a secure authentication protocol, and, more specifically, to the authenticating a client against a pool of servers providing a common service, utilizing the Kerberos secure authentication protocol.
    Type: Application
    Filed: October 28, 2003
    Publication date: April 28, 2005
    Inventor: Steven Grobman
  • Publication number: 20040010543
    Abstract: A document may be received over a network that contains a link to a resource. Various contexts, including Internet browsers, can operate more effectively, and make better use of available bandwidth, by caching network resources so that repeated requests for cached resources can be satisfied from a local cache and avoid a duplicative transfer from a server. Instead of utilizing typical cache operations, such as taught in Request For Comments (RFC) 2616, where the server hosting the resource is queried to resolve cache correctness, instead a link to a resource is constructed so that it contains all information necessary to make a cache correctness decision without having to query the server hosting the linked resource. In addition, the link may be constructed so that the cache determination is made with respect to the contents of the linked resource, rather than with respect to metadata about the resource, e.g., name, creation date, location, etc.
    Type: Application
    Filed: July 15, 2002
    Publication date: January 15, 2004
    Inventor: Steven Grobman