Patent application number | Description | Published |
20140178847 | Connected Multi Functional System and Method of Use - The present invention relates to dynamic connected multifunctional system adapted to provide a user at least one of a learning experience, an entertaining experience, a social experience, and combinations thereof, the system comprising: a multi elements base comprising at least a base structure, at least one sensor, and a plurality of detachable elements, a communication manager, and an external supporting subsystem comprising at least a smart device and a server, wherein an action performed by the user on said multi element base via a specific detachable element or a sensor, or both, creates at least one signal containing at least information related to identification of the specific detachable element involved in the action and the relative position over said multi elements base that the action was performed, and at least one signal indicating the sensor in use, said signals are delivered through the communication manager to the external supporting system and activates at least one response to be perform by the external supporting system. The signals produced or consequent signals may further be delivered to a server to allow processing of the signals by dedicated software for creating either one of a learning experience, an entertainment experience, a social experience, and combinations thereof, to the user. | 06-26-2014 |
20150151212 | TOY CONNECTIVE RECOGNITION ARRANGEMENT - The present invention provides a novel recognition arrangement configured to allow identification of a detachable toy element and its relative position on a play structure so as to enable a further display of a virtual character of said toy element in its relative position on the play structure on a smart device screen displaying an image of said play structure. The recognition arrangement provided herein comprising a TAG component affixed to the detachable toy element and an environmental recognition component (ERC) affixed to the play structure. The identification of a specific detachable toy element and its position on the play structure are obtained upon attachment of the TAG component and the ERC. Attachment of the TAG component and the ERC is detected by periodic scanning of a control unit connected to the play structure for changes of voltage or current values. Upon detection of such a change, the sampled value is delivered to the smart device for further interpretation and display. | 06-04-2015 |
20150321089 | A NOVEL TOY CONSOLE AND METHODS OF USE - The invention is directed to a novel detachable toy console usable as a control unit for multiple connected toy systems, said toy console is configured and operable to connect interchangeably with at least one smart device and to be attached to a console ready toy and detached from it, to thereby allow a user to use the toy console with another console ready toy, said toy console comprising: a MCU; a communication module for establishing connection with at least one smart device; an external connector for attaching and detaching the toy console to the console ready toy; and a power source. The toy console may further comprise a motion sensor and be used as a wearable toy console. The invention is also directed to A wearable toy console usable as a control unit for multiple connected toy systems, configured and operable to connect interchangeably with at least one smart device and to be carried by a toy and/or by a wearable accessory on the hand of a user, wherein the wearable toy console is configured to be passed by the user from one toy to another or to the hand wearable accessory to thereby allow the usage of the toy console with multiple toys. | 11-12-2015 |
Patent application number | Description | Published |
20150135302 | CLOUD SERVICE SECURITY BROKER AND PROXY - This application relates generally to a system operating on network traffic between a network-based software as a service (SaaS) provider and a client. The system can be configured as a managed communications network proxy and take action on the network traffic based on predefined policies and rules. The system can include a suffix proxy configured for captive page processing by processing SaaS server responses so that subsequent requests are handled by the suffix proxy dependent on file type and response type | 05-14-2015 |
20160077824 | CLOUD SUFFIX PROXY AND A METHOD THEREOF - A method and system for modifying network addresses of at least one cloud application. The method comprises receiving a webpage sent to a client device from the at least one cloud application, wherein a webpage designates at least one script loaded to the client device during runtime; injecting a piece of code to the webpage; receiving, by the injected piece of code, an attempt to load each of the at least one script; modifying the at least one script by suffixing each network address designated in the at least one script with a predefined network address; and sending the modified at least one script to the client device, wherein runtime execution of the modified at least one script on the client device causes redirection of future requests from the client device to the cloud application to the suffixed network address. | 03-17-2016 |
20160112375 | METHOD AND SYSTEM FOR PROTECTING CLOUD-BASED APPLICATIONS EXECUTED IN A CLOUD COMPUTING PLATFORM - A method and system for protecting cloud-based applications executed in a cloud computing platform are presented. The method includes intercepting traffic flows from a plurality of client devices to the cloud computing platform, wherein each of the plurality of client devices is associated with a user attempting to access a cloud-based application; extracting at least one parameter from the intercepted traffic related to at least each client device and a respective user attempting to access the cloud-based application; determining based on, the at least one parameter and at least a set of parameters combining cloud-based application risk factors for a provider of the cloud computing platform, a risk indicator for the user attempting to access the cloud-based application; and performing an action to mitigate a potential risk to the cloud computing platform based on the determined risk indicator. | 04-21-2016 |
Patent application number | Description | Published |
20100318780 | HIERARCHICAL SERVICES STARTUP SEQUENCING - Exemplary methods, system, and computer program product embodiments for managing services within a data storage subsystem using a processor in communication with a memory device during a startup sequence are provided. At least one service facilitated by a provider is provided. At least one requirement is linked to the at least one service. The at least one service and the at least one requirement are incorporated into a specification file. A directed acyclic graph, interrelating the at least one service and an additional service based on the at least one requirement, is constructed. The directed acyclic graph is traversed using an initialization process to generate a determination which of an available plurality of services to provide. The determination further includes an analysis of the which of the available plurality of services to provide in view of at least one hardware resource in the data storage subsystem. | 12-16-2010 |
20100318887 | DATA VERIFICATION USING CHECKSUM SIDEFILE - Exemplary method, system, and computer program product embodiments for data verification in a storage system are provided. A read of data is asynchronously submitted to nonvolatile storage media. A read of a first checksum signature is submitted to a solid state, sidefile memory location of a storage controller in the storage subsystem. The first checksum signature is representative of the data previously written to the nonvolatile storage media. A second checksum signature is calculated from the read of the data. The first and second checksum signatures are compared. If a match is not determined, a critical event is reported. | 12-16-2010 |
20110231816 | REFLECTION CAPABILITY IN STATIC PROGRAMMING LANGUAGES - Methods and computer program products for enabling reflection capability in the C programming language are provided. One method includes generating a database for a program written in the C programming language when compiling the program, wherein the database is based on structures included within the program. The method further includes storing the database in memory and utilizing the database during run-time to enable the program to observe and modify its own structure and behavior. One computer program product includes executable portions for performing the above method. Another method includes creating a database for a program written in the C programming language, wherein the type database is based on structures included within the program and is created prior to the program being compiled. This method further comprises storing the database in memory and utilizing the database during run-time to enable the program to observe and modify its own structure and behavior. | 09-22-2011 |
20120096250 | PORT THROTTLING ACROSS AN OPERATING SYSTEM RESTART DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the volatile memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter. | 04-19-2012 |
20120096252 | PREPARING AND PRESERVING A SYSTEM CONFIGURATION DURING A HOT UPGRADE - A method includes storing, to a volatile memory coupled to a processor executing a first operating system kernel, a planned system configuration, and tagging the planned system configuration. A boot of a second operating system kernel is initiated while preserving in the volatile memory contents stored therein, and following the boot of the second operating system kernel, a set of parameters referencing the tagged planned system configuration is retrieved from the volatile memory. The planned system configuration is then used, based on the retrieved set of parameters. | 04-19-2012 |
20120239922 | PREPARING AND PRESERVING A SYSTEM CONFIGURATION DURING A HOT UPGRADE - A planned system configuration is stored to a volatile memory coupled to a processor executing a first operating system kernel. The planned system configuration is tagged. A boot of a second operating system kernel is initiated while preserving in the volatile memory contents stored therein, and following the boot of the second operating system kernel, a set of parameters referencing the tagged planned system configuration is retrieved from the volatile memory. The planned system configuration is then used, based on the retrieved set of parameters. | 09-20-2012 |
20120246455 | PORT THROTTLING ACROSS AN OPERATING SYSTEM RESTART DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the volatile memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter. | 09-27-2012 |
20120265859 | Synchronized Video System - A method for media processing includes providing a source media clip, which includes at least source audio data, via a network to a client device. A media recording, including client video and client audio data recorded by a user of the client device while playing the source audio data, is received via the network from the client device. The received media recording is synchronized with the source media clip and is mixed with the source media clip to generate a mixed media clip. The mixed media clip is transmitted to client devices over the network for playback by users of the client devices. | 10-18-2012 |
20130060741 | DATA VERIFICATION USING CHECKSUM SIDEFILE - For facilitating data verification using a checksum in conjunction with a sidefile by a processor device in a computing environment, first block signatures having a first size are calculated for first blocks of a first volume stored on a storage device. The first block signatures are stored to a sidefile. Second block signatures having a second size different from the first size are calculated for second blocks of a second volume stored on the storage device. The second block signatures are stored to the sidefile. | 03-07-2013 |
20130061110 | DATA VERIFICATION USING CHECKSUM SIDEFILE - For facilitating data verification using a checksum in conjunction with a sidefile by a processor device in a computing environment, first block signatures having a first size are calculated for first blocks of a first volume stored on a storage device. The first block signatures are stored to a sidefile. Second block signatures having a second size different from the first size are calculated for second blocks of a second volume stored on the storage device. The second block signatures are stored to the sidefile. | 03-07-2013 |
20140372746 | PORT THROTTLING ACROSS AN OPERATING SYSTEM RESTART DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter. | 12-18-2014 |