2305 Falkirk Cv, Round Rock, TX 78681 • (512)2463817
Plano, TX
Temple, TX
Austin, TX
Montgomery, AL
Name / Title
Company / Classification
Phones & Addresses
James Jay Dailey Managing
DAILEY SOLUTIONS LLC
2714 Pasadena Pl, Flower Mound, TX 75022
James Ronald Dailey Managing
MAG CONSTRUCTION SERVICES, LLC Single-Family House Construction
320 Little School Rd, Kennedale, TX 76060 10900 Stonelake Blvd, Austin, TX 78759 (817)5612080
James W. Dailey
West Virginia University Educational Services · Benefits · State University · College/University Administrative Educational Programs · Data Processing/Preparation College/University Administrative Social/Manpower Programs · College/University · Telecommunications Department · Motion Pict/Video Prodtn Radio/Television Repair College/University Television Station
CTO & Director at Micro Energy Credits Corp, Board of Directors at Climate Solutions
Location:
Seattle, Washington
Industry:
Information Technology and Services
Work:
Micro Energy Credits Corp since Jul 2007
CTO & Director
Climate Solutions - Greater Seattle Area since 2001
Board of Directors
VillageReach - Greater Seattle Area Dec 2008 - Jun 2011
CTO
Sevak Solutions Apr 2007 - Mar 2009
Senior Technical Consultant
Grameen Foundation USA Oct 2001 - Jan 2007
Technical Project Manager
Education:
University of Washington 1996 - 1997
University of Notre Dame 1986 - 1990
University of Notre Dame - Mendoza College of Business 1986 - 1990
Social Venture Institute 2011
Skills:
Software Design Business Strategy Entrepreneur Business Development SaaS Climate Change Carbon Markets Program Management International Development Sustainability Social Entrepreneurship Strategic Planning Start-ups Project Management Non-profits Entrepreneurship Nonprofits Corporate Social Responsibility Strategic Partnerships
Dr. Dailey graduated from the A.T. Still University of Health Sciences/ Kirksville College of Osteopathic Medicine in 1981. He works in Joplin, MO and 1 other location and specializes in Family Medicine. Dr. Dailey is affiliated with Mercy Hospital Joplin.
Spectrum Medical 800 Memorial Dr STE D, Danville, VA 24541 (434)7914445 (phone), (434)7914244 (fax)
Education:
Medical School East Carolina University Brody School Medicine Graduated: 2010
Languages:
English Spanish
Description:
Dr. Dailey graduated from the East Carolina University Brody School Medicine in 2010. He works in Danville, VA and specializes in Pain Management. Dr. Dailey is affiliated with Danville Regional Medical Center.
A stolen computer detection and protection method and system. The method and system detect a communication to at least a first data processing system from at least a second data processing system. In response to detection of the communication from the at least a second data processing system, determination is made as to whether the at least a second data processing system is stolen. If it is determined that the at least a second data processing system is stolen, the at least a second data processing system is disabled.
Larry G. Edington - Austin TX, US James E. Dailey - Round Rock TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
H01M010/44 H01M010/46
US Classification:
320106, 713166
Abstract:
In a method and system for authenticating a smart battery for charging, the smart battery receives an encrypted random string. The smart battery is operable to provide power to a device. The encrypted random string is generated by a controller of the device by generating a random string and encrypting the random string with an encryption key. The smart battery decrypts the encrypted random string with the encryption key to recover the random string and transfer the random string to the device. The device verifies that the random string is unchanged to authenticate the smart battery for the charging. If the random string has been modified then the smart battery is disabled from the charging.
A method to distribute periodic task workload in an information handling system includes distributing processing tasks using a tick interval. A first execution trigger in a service variable may be set at a first multiple of a predetermined tick interval. A second execution trigger may be set at a second multiple of the predetermined tick interval. The second multiple may be greater than and staggered from the first multiple, such that the first and second execution triggers may not both be set during the same tick interval. The service variable may be interrogated at the predetermined tick interval. A first processing task associated with the first execution trigger may be executed in response to detecting that the first execution trigger has been set. A second processing task associated with the second execution trigger may be executed in response to detecting that the second execution trigger has been set.
Information Handling System Wherein Display Movement From An Open Position To A Closed Position Triggers An Undocking Request
Charles L. Haley - Belton TX, US James E. Dailey - Round Rock TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F 13/00
US Classification:
710303
Abstract:
A method and apparatus are provided for sensing when a display of a portable information handling system (IHS) is moved from an open position to a closed position. The closing of the display is employed as a trigger for the generation of an undocking request to the operating system of the IHS. Undocking the IHS from the docking device is made easier because the user does not need to locate and then push a docking request button on the docking station.
Portable Computer System With Hierarchical And Token-Based Security Policies
A computer system including a processor, an access token communicator capable of being coupled to the processor and adapted to read an access token, an input device coupled to the processor that is able to receive verification data that confirms authorized access of the access token, and software executable on the processor that includes instructions to control access to the processor and including code to access the access token and the verification data, code to verify the validity of the access token using the verification data, code to set security policies in the processor, and code to control access to resources in the processor based on the security policies. In addition, a method for reading an access token, verifying the validity of the access token, setting security policies in a computer system, and unlocking a computer system and a nonvolatile storage device attached to the computer system.
System And Method For Ambient Light Sensor Testing For An Information Handling System Display
An ambient light sensor testing module running on an information handling system verifies that an ambient light sensor managing brightness of an information handling system display is active and responding correctly. The testing module sets the display at first and second manually-selectable brightness levels and compares the brightness set from the first and second manually-selectable brightness levels when the ambient light sensor is engaged to set display brightness. An excessive difference between the brightness set by the ambient light sensor from the first and second manually-selectable brightness levels indicates a faulty ambient light sensor.
System And Method For Providing A Secure Firmware Update To A Device In A Computer System
James E. Dailey - Round Rock TX, US Anthony L. Overfield - Austin TX, US James L. Walker - Cedar Park TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F 15/177
US Classification:
713 2
Abstract:
A system and method is disclosed for providing a firmware update to a device of a computer system in which a firmware update application and a firmware image are provided to a computer system. Verification steps are performed to insure that both the firmware update application and the user are authorized to perform the firmware update process. If the verification steps indicate that both the firmware update application and the user are authorized, the computer system is reset. During the boot process, the presence of the firmware update is recognized and the firmware update application is initiated, resulting in an update of the firmware of the device.
System And Method For Access To A Password Protected Information Handling System
John Hawk - Austin TX, US James Dailey - Round Rock TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F 21/00 G06F 7/04 G06F 12/14
US Classification:
713182, 713183, 726 16, 726 17
Abstract:
Information handling system security is simplified and enhanced with user passwords configurable to restrict access to the overall system and separately to the hard disk drive. An administrative password overrides the BIOS password to allow administrative access to the information handling system. Upon creation of a hard disk drive password on a system having an administrative password, the hard disk drive password is saved to the hard disk drive and to the BIOS with access from the BIOS restricted by the administrative password. Upon entry of the administrative password at the BIOS, the hard disk drive password is automatically provided from the BIOS to the hard disk drive to allow access to the hard disk drive.
Sources said Lyons met with West Virginia officials, including Gee and James Dailey, chairman of WVU's Board of Governors, Saturday in Morgantown, West Virginia, and school officials the week before in Parkersburg, West Virginia.
"Even though the default wasn't terribly unexpected, it creates a concern of systemic risk," said James Dailey, portfolio manager of TEAM Asset Strategy Fund in Harrisburg, Pennsylvania. "On top of that, we havent had any real downside for a while, and anyone who tries to argue that the market isn
Date: Jul 31, 2014
Category: Business
Source: Google
E Gordon Gee Hired As West Virginia's Interim President Five Months After ...
"He is a seasoned and respected higher education leader who has served five major universities over 33 years, and I am confident he will continue the great work going on here and the momentum this University is enjoying," WVU board chairman James Dailey said in a statement.
market. The decline that we have seen in the past four weeks in the bond market would be equivalent to a 30-35 percent decline in the stock market, considering bonds are traditionally not volatile," said James Dailey, senior portfolio manager at Team Asset Strategy Fund in Harrisburg, Pennsylvania.
Date: Jun 24, 2013
Category: Business
Source: Google
Will iPhone maker Apple get crushed in earnings frenzy? - The Star Online
It's not the US$700 stock anymore, but Apple still has huge weighting on indexes, and it's still the window into the state of consumers, a sort of reality check, said James Dailey, portfolio manager of Harrisburg, Pennsylvania-based TEAM Financial Asset Management.
Date: Apr 21, 2013
Category: Business
Source: Google
Gold Heads for Longest Slump Since 2011 Amid Improving Economy
The gold bugs have been obliterated, and the perceptionabout the global economy has changed and people are moving tomore riskier assets, James Dailey, who manages $215 million atTEAM Financial Asset Management LLC in Harrisburg, Pennsylvania,said in a telephone interview. Also, leading up to
James Dailey, portfolio manager at TEAM Asset Strategy Fund in Harrisburg, Pennsylvania, told Reuters: "We seem to be in this manic buying period, and people are reluctant to give up the optimism that the market is going to move higher."
There is an emotional part in buying on the small dips here, said James Dailey, portfolio manager at TEAM Asset Strategy Fund in Harrisburg, Pa. Investors are more worried about missing the rally than losing money as they believe that the fiscal cliff will be solved eventually.