Search

David A Pensak

age ~76

from Wilmington, DE

Also known as:
  • David W Pensak
  • Stephen D Pensak
Phone and address:
2207 Grant Ave, Wilmington, DE 19806
302-426-0120

David Pensak Phones & Addresses

  • 2207 Grant Ave, Wilmington, DE 19806 • 302-426-0120
  • Highland Park, NJ
  • 1304 Birmingham Rd, West Chester, PA 19382 • 610-793-4468 • 610-793-4602
  • Peachtree City, GA
  • 162 Mather Mail Ctr, Cambridge, MA 02138 • 617-498-4638
  • Chester, PA

Work

  • Company:
    Emc corporation
  • Address:
    176 South St, Hopkinton, MA 01748
  • Phones:
    508-435-1000
  • Position:
    Founder
  • Industries:
    Computer Storage Devices
Name / Title
Company / Classification
Phones & Addresses
David Pensak
Founder
EMC Corporation
Computer Storage Devices
176 South St, Hopkinton, MA 01748
David Pensak
Chief Executive
David A. Pensak
Ophthalmic Goods
1304 Bermingham Rd., West Chester, PA 19382
David Pensak
Director
V.i. Laboratories, Inc.
Computer Software · Testing Laboratory
130 Turner St BLDG 3, Waltham, MA 02453
2207 N Grant Ave, Wilmington, DE 19806
David Pensak
Pensak Innovation Institute LLC
Management Consulting Services
2207 N Grant Ave, Wilmington, DE 19806
David Pensak
Founder
EMC
Information Technology and Services · 380 · Computer-General · Sale Of Storage Related Hardware, Software And Service Products For Mainframe, Open Systems And Network Attached Storage Systems - Authorized Shares: 6,000,000,000 Comm 0.01 Par Value - 2,019,970,805 Issued · The Design, Manufacture And Support Of Hardware And Software Products · Mfg Computer Storage Devices · Prepackaged Software Services · Business Services
176 S St, Hopkinton, MA 01748
171 S St, Hopkinton, MA 01748
1 Tower Ctr Blvd, East Brunswick, NJ 08816
171 S St, Hopkinton, MA 01748
508-435-1000, 508-898-5000, 508-480-7419, 925-600-6800
David Pensak
Director
AUTHENTICA, INC
Custom Computer Programing
91 Hartwell Ave, Lexington, MA 02421
C/O Authentica, Lexington, MA 02421
781-487-2600
David Pensak
VI LABORATORIES, LLC
Software Development
2207 N Grant Ave, Wilmington, DE 19806

Resumes

David Pensak Photo 1

Adjunct Professor Of Anesthesiology And Perioperative Medicine

view source
Location:
Princeton, NJ
Industry:
Computer Software
Work:
Drexel University College of Medicine
Adjunct Professor of Anesthesiology and Perioperative Medicine

George Washington University Mar 2007 - Dec 2011
Research Fellow

Authentica 2002 - 2008
Chief Technology Officer

The Wharton School 2005 - 2007
Adjunct Facuilty

Dupont Jun 1974 - Aug 2004
Chief Computer Scientist
Education:
Harvard University 1969 - 1974
Doctorates, Doctor of Philosophy, Computer Science, Chemistry
Princeton University 1965 - 1969
Bachelors, Bachelor of Arts, Chemistry
Princeton High School
Skills:
Start Ups
R&D
Chemistry
Strategy
Cloud Computing
Product Development
Entrepreneurship
Strategic Partnerships
Product Management
Software Development
Enterprise Software
Software Engineering
Commercialization
Business Intelligence
Venture Capital
Technology Transfer
Integration
Saas
Software Design
Computer Security
Biotechnology
Technical Leadership
Organic Chemistry
Materials Science
Patents
Intellectual Property
System Architecture
Nanotechnology
Materials
Innovation Management
Distributed Systems
Medical Devices
Life Sciences
Lifesciences
Research and Development
David Pensak Photo 2

David Pensak

view source

Us Patents

  • Method Of Encrypting Information For Remote Access While Maintaining Access Control

    view source
  • US Patent:
    6339825, Jan 15, 2002
  • Filed:
    Jul 18, 2001
  • Appl. No.:
    09/906811
  • Inventors:
    David A. Pensak - West Chester PA
    John J. Cristy - Landenberg PA
    Steven J. Singles - Newark DE
  • Assignee:
    Authentica, Inc. - Waltham MA
  • International Classification:
    G06F 1130
  • US Classification:
    713158, 713161, 713165, 713168, 713170
  • Abstract:
    The invention provides for encrypting electronic information such as a document so that only users with permission may access the document in decrypted form. The process of encrypting the information includes selecting a set of policies as to who may access the information and under what conditions. A remote server stores a unique identifier for the information and associates an encryption/decryption key pair and access policies with the information. Software components residing on the authors computer retrieve the encryption key from the remote server, encrypt the information, and store the encrypted information at a location chosen by the author. A user wishing to access the information acquires the encrypted information electronically. Software components residing on the viewing users computer retrieve the associated decryption key and policies, decrypt the information to the extent authorized by the policies, and immediately delete the decryption key from the viewing users computer upon decrypting the information and rendering the clear text to the viewing users computer screen. The software components are also capable of prohibiting functional operations by the viewing users computer while the clear text is being viewed.
  • Method Of Encrypting Information For Remote Access While Maintaining Access Control

    view source
  • US Patent:
    6449721, Sep 10, 2002
  • Filed:
    Nov 1, 2001
  • Appl. No.:
    09/985096
  • Inventors:
    David A. Pensak - West Chester PA
    John J. Cristy - Landenberg PA
    Steven J. Singles - Newark DE
  • Assignee:
    Authentica Security Technologies, Inc. - Waltham MA
  • International Classification:
    G06F 0124
  • US Classification:
    713171, 713172, 713200, 713201
  • Abstract:
    The invention provides for encrypting electronic information such as a document so that only users with permission may access the document in decrypted form. The process of encrypting the information includes selecting a set of policies as to who may access the information and under what conditions. A remote server stores a unique identifier for the information and associates an encryption/decryption key pair and access policies with the information. Software components residing on the authors computer retrieve the encryption key from the remote server, encrypt the information, and store the encrypted information at a location chosen by the author. A user wishing to access the information acquires the encrypted information electronically. Software components residing on the viewing users computer retrieve the associated decryption key and policies, decrypt the information to the extent authorized by the policies, and immediately delete the decryption key from the viewing users computer upon decrypting the information and rendering the clear text to the viewing users computer screen. The software components are also capable of prohibiting functional operations by the viewing users computer while the clear text is being viewed.
  • Method Of Encrypting Information For Remote Access While Maintaining Access Control

    view source
  • US Patent:
    RE41186, Mar 30, 2010
  • Filed:
    Sep 9, 2004
  • Appl. No.:
    10/936829
  • Inventors:
    David A. Pensak - Wilmington DE, US
    John J. Cristy - Landenberg PA, US
    Steven J. Singles - Landenberg PA, US
  • Assignee:
    EMC Corporation - Hopkinton MA
  • International Classification:
    H04L 9/32
  • US Classification:
    713171, 713172
  • Abstract:
    The invention provides for encrypting electronic information such as a document so that only users with permission may access the document in decrypted form. The process of encrypting the information includes selecting a set of policies as to who may access the information and under what conditions. A remote server stores a unique identifier for the information and associates an encryption/decryption key pair and access policies with the information. Software components residing on the author's computer retrieve the encryption key from the remote server, encrypt the information, and store the encrypted information at a location chosen by the author. A user wishing to access the information acquires the encrypted information electronically. Software components residing on the viewing user's computer retrieve the associated decryption key and policies, decrypt the information to the extent authorized by the policies, and immediately delete the decryption key from the viewing user's computer upon decrypting the information and rendering the clear text to the viewing user's computer screen. The software components are also capable of prohibiting functional operations by the viewing user's computer while the clear text is being viewed.
  • Systems And Methods For Regulating Execution Of Computer Software

    view source
  • US Patent:
    8225290, Jul 17, 2012
  • Filed:
    Apr 17, 2008
  • Appl. No.:
    12/104589
  • Inventors:
    David A. Pensak - Wilmington DE, US
    Douglas C. Merrell - San Jose CA, US
  • Assignee:
    V. i. Laboratories, Inc. - Waltham MA
  • International Classification:
    G06F 9/44
  • US Classification:
    717124, 717126, 717127, 717129, 717139, 713189, 712227, 712244
  • Abstract:
    A method for regulating execution of an application program includes a process for preparing the application and a process for executing the application. The preparation process divides the application program into related segments and encrypts instructions of at least one segment, positions encrypted instructions in at least two discontiguous regions within an executable file, and associates header information with at least one discontiguous region. The execution process initiates execution of the protected application when at least a portion of the application instructions are available to the computer only in encrypted form. Also provided are systems and methods to allow debugging of code extensions to protected applications without sacrificing protection of the application. A Secure Debugger allows extension developers to examine memory and set breakpoints in their own extensions, without permitting them to view information in the rest of the protected application.
  • Method Of Encrypting Information For Remote Access While Maintaining Access Control

    view source
  • US Patent:
    RE44364, Jul 9, 2013
  • Filed:
    May 16, 2005
  • Appl. No.:
    11/129746
  • Inventors:
    John J. Cristy - Landenberg PA, US
    David A. Pensak - Wilmington DE, US
    Steven J. Singles - Newark DE, US
  • Assignee:
    EMC Corporation - Pleasanton CA
  • International Classification:
    H04L 29/06
    G06F 7/04
  • US Classification:
    713150, 726 27
  • Abstract:
    The invention provides for encrypting electronic information such as a document so that only users with permission may access the document in decrypted form. The process of encrypting the information includes selecting a set of policies as to who may access the information and under what conditions. A remote server stores a unique identifier for the information and associates an encryption/decryption key pair and access policies with the information. Software components residing on the author's computer retrieve the encryption key from the remote server, encrypt the information, and store the encrypted information at a location chosen by the author. A user wishing to access the information acquires the encrypted information electronically. Software components residing on the viewing user's computer retrieve the associated decryption key and policies, decrypt the information to the extent authorized by the policies, and immediately delete the decryption key from the viewing user's computer upon decrypting the information and rendering the clear text to the viewing user's computer screen. The software components are also capable of prohibiting functional operations by the viewing user's computer while the clear text is being viewed.
  • Vapor Flow Lid

    view source
  • US Patent:
    20120199584, Aug 9, 2012
  • Filed:
    Feb 1, 2012
  • Appl. No.:
    13/363907
  • Inventors:
    David PENSAK - Wilmington DE, US
  • International Classification:
    B65D 51/16
    B65D 51/18
  • US Classification:
    2202541, 220713
  • Abstract:
    A container lid for preventing spills or leaks, which enhances the flow and direction of aromatic vapors of beverages within the container to the consumer's nostrils, is disclosed. The lid comprises vapor ports that provide for aerodynamic redirection of aromatic vapors toward the drinker's nostrils, and one or more spill-preventing mechanisms to keep beverages within the container in case of overfilling or tipping, and an optional manual closure to contain heat and aroma within the container when it is not in use.
  • Machine-Assisted Legal Assessments

    view source
  • US Patent:
    20130246290, Sep 19, 2013
  • Filed:
    Mar 14, 2013
  • Appl. No.:
    13/829207
  • Inventors:
    David Pensak - Wilmington DE, US
  • Assignee:
    Precision Litigation, LLC - Atlanta GA
  • International Classification:
    G06Q 50/18
    G06Q 10/10
  • US Classification:
    705311
  • Abstract:
    Disclosed are various embodiments for determining and/or providing machine-assisted legal assessments. User input may be provided by a user to an input mechanism through an ingestion process. An assessment engine may compare user input provided at a state of the ingestion process to one or more decision frameworks in order to determine probabilities, estimated expenditures, recommendations, and/or suggestions. An output control may export the decision frameworks and/or any stored or generated data according to predefined agreement constraints.
  • Fabrics Comprising Inorganic Fibers And Uses In Garments And Coverings

    view source
  • US Patent:
    20130288553, Oct 31, 2013
  • Filed:
    Apr 24, 2013
  • Appl. No.:
    13/869757
  • Inventors:
    David PENSAK - Wilmington DE, US
  • International Classification:
    D03D 1/00
    D04H 13/00
  • US Classification:
    442187, 442331, 2 69, 206223, 29592
  • Abstract:
    Fabrics comprising inorganic fibers, or threads composed of such fibers, coated with a polymer composition sufficient to contain fiber particles within the fabric, are disclosed. Such fabric is suitable for use in garments and coverings for valuable objects, among many other utilities. Methods of making such fabric are also disclosed, as are garments and other articles made from such fabrics, and methods for their use.

Googleplus

David Pensak Photo 3

David Pensak

Work:
VI Laboratories - Chief Technology Officer & Founder (2004)
Drexel University College of Medicine - Adjunct Professor of Anesthesiology and Perioperative Medicine (2012)
George Washington University - Research Fellow (2007-2011)
Authentica - Chief Technology Officer & Founder (2002-2007)
The Wharton School - Adjunct Facuilty (2005-2007)
DuPont - Chief Computer Scientist (1974-2004)
Raptor Systems - CEO then CTO, Founder (1989-2001)
Education:
Harvard University - Ph.D., Chemistry, Princeton University - AB, Chemistry
Tagline:
Innovation, Computer Security, Organic Chemistry, Agricultural Science
David Pensak Photo 4

David Pensak

David Pensak Photo 5

David Pensak

David Pensak Photo 6

David Pensak

Facebook

David Pensak Photo 7

David Pensak

view source

Youtube

Dr. David Pensak - Innovation for Underdogs

Solutionz Live! presents Dr. David Pensak, author of Innovation for Un...

  • Category:
    People & Blogs
  • Uploaded:
    16 Mar, 2009
  • Duration:
    1m 17s

Get Report for David A Pensak from Wilmington, DE, age ~76
Control profile