Talmor
Alon Talmor, Tel Aviv IL
Patent application number | Description | Published |
---|---|---|
20150120783 | INTER-ENTITY CONNECTION MAPS - The technology disclosed relates to identifying connection maps between entities (persons and organizations) and generating so-called connection stories between them based on the connection maps. The connection stories are graphic and visual representations of the connection paths that present to entities topological and chronological aspects of their relationships with other entities. | 04-30-2015 |
Amnon Talmor, Sun Valley, CA US
Patent application number | Description | Published |
---|---|---|
20140312137 | Traveling Water Delivery Device - A device to moving a water shooter is described. The device may contain features that allow the device to travel submerged in a reservoir with a water shooter attached. The device may travel along a fixed track, rotational boom, or be free swimming in order to move the water shooter within the reservoir so that unique water effects may be achieved. | 10-23-2014 |
20140312138 | Impingement Fan Display - An impingement fan water display that may be used in a water display is described. The device may include two nozzles that project streams of water towards each other in an intersecting trajectory and impinge upon each other. The angle of orientation of the nozzles in relation to each other may be varied to produce varying water stream fan widths and shapes. A plate may be located at or near the point of impingement. | 10-23-2014 |
20140312145 | Variable Width Fan Nozzle - A water delivery device that may be used in a water display is described. The device includes an orifice or outlet through which water is shot out. The shape and configuration of the water device may be varied to dynamically adjust the configuration of the water shot out from the device. For example, the water delivery device may shoot out water in the shape of a fan, and the width of the fan may be varied. | 10-23-2014 |
Amos Talmor, Rannana IL
Patent application number | Description | Published |
---|---|---|
20150067790 | Methods, Circuits, Devices, Systems and Associated Computer Executable Code for Discovering and Providing Digital Content - Disclosed are methods, circuits, devices, systems and computer executable code for discovering and providing digital content. Identifier of a wireless communication signal source may be associated with a specific store or collection of digital content. | 03-05-2015 |
Chen Talmor, Givat Ada IL
Patent application number | Description | Published |
---|---|---|
20130169719 | INK CARTRIDGES AND OUTPUTTING INK FROM INK CARTRIDGES - An ink cartridge has a container to contain ink and a valve member. The container has an outlet to output ink contained in the container. The valve member is moveable transverse to the outlet to open and close the outlet and carries a seal to seal the outlet when closed by the valve member. | 07-04-2013 |
20130169722 | EXTRACTING LIQUID FROM A CARTRIDGE - A drive assembly has a moveable drive head, which is able to engage a plunger in a cartridge containing a liquid. The cartridge has a plunger moveable by the drive head to extract the liquid from the cartridge. | 07-04-2013 |
20140160189 | IMAGE FORMING APPARATUS AND METHODS THEREOF - Image forming apparatus and methods are disclosed which include identifying a first ink density of ink in an ink tank by a density sensor unit disposed in the ink tank. The image forming apparatus and methods also include identifying an ink weight of ink in an intermediate reservoir by a weight sensor unit. The image forming apparatus and methods also include determining a second ink density of the ink in the intermediate reservoir based at least on the identified first ink density by the density sensor unit and the identified ink weight of the ink in the intermediate reservoir by the weight sensor unit. | 06-12-2014 |
Giora Talmor, Moshav Netaim IL
Patent application number | Description | Published |
---|---|---|
20090263437 | PESTICIDE COMPOSITIONS - The present invention provides a granular pesticide composition which is highly effective in controlling pests. In particular, the pesticide composition of the present invention is prepared by adsorbing an oil in water emulsion on inert granular particles. These compositions provide improved release of the pesticide. Methods of preparing the granular pesticide composition and methods of use thereof are disclosed. | 10-22-2009 |
Ofer Talmor, Atlit IL
Patent application number | Description | Published |
---|---|---|
20130260790 | METHOD AND SYSTEM FOR PROVIDING LOCATION IDENTIFICATION - A method and system for providing location identification, including a server and a corresponding database storing data representing the deployment of network transmitters in a specific area. The system configured to measure, over different selected locations in the specific area, the signal strength as received from one or more network transmitters deployed in the area; map a network signals power scheme for each specific area based on the measured signal strengths; store the mapped power scheme(s) in the database; receive measurements and/or calculations from devices in a previously mapped specific area; compare the local calculated/measured power scheme with one or more power schemes stored in the database; and, upon finding a power scheme that essentially corresponds to the location of the local calculated power scheme, determine the current location of the corresponding device. | 10-03-2013 |
Ron Talmor, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20090300759 | ATTACK PREVENTION TECHNIQUES - Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions. | 12-03-2009 |
20100077447 | Authentication techniques - Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner. | 03-25-2010 |
20110107399 | AUTHENTICATION TECHNIQUES - Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner. | 05-05-2011 |
20110113490 | TECHNIQUES FOR PREVENTING ATTACKS ON COMPUTER SYSTEMS AND NETWORKS - Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions. | 05-12-2011 |
20120297447 | AUTHENTICATION TECHNIQUES - Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner. | 11-22-2012 |
20130305236 | HITLESS SOFTWARE UPGRADES - Disclosed is a technique for facilitating software upgrade for a switching system comprising a first management processor and a second management processor and a set of one or more line processors, the techniques comprising receiving a signal to perform a software upgrade for a line processor from the set of line processors, and performing a software upgrade for the line processor without substantially affecting packet switching performed by the switching system. | 11-14-2013 |
Ron Talmor, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20090279549 | Hitless software upgrades - Disclosed is a technique for facilitating software upgrade for a switching system comprising a first management processor and a second management processor and a set of one or more line processors, the techniques comprising receiving a signal to perform a software upgrade for a line processor from the set of line processors, and performing a software upgrade for the line processor without substantially affecting packet switching performed by the switching system. | 11-12-2009 |
20120185937 | SYSTEM AND METHOD FOR SELECTIVELY STORING WEB OBJECTS IN A CACHE MEMORY BASED ON POLICY DECISIONS - A system and method for selectively storing one or more web objects in a memory is disclosed. A server response is received at a network traffic management device, wherein the server response is associated with a client request sent from a client device and includes at least one web object. The server response is analyzed using a security module of the network traffic management device which determines if the at least a portion of the server response contains suspicious content in relation to one or more defined policy parameters handled by the security module. An instruction is sent from the security module to a cache module of the network traffic management device upon determining that the at least a portion of the server response contains suspicious information, wherein the cache module does not store the at least one web object upon receiving the instruction. | 07-19-2012 |
20150142948 | EXTENDING POLICY RULESETS WITH SCRIPTING - Embodiments are directed towards using policy rules that may be extended by scripting operative on a traffic management device. Each policy rule may have a condition and a corresponding action. If the condition is a script, a script engine separate from the policy engine may be employed to execute the script to determine if the condition is met. Otherwise, the policy engine may determine if the condition is met based on declarative expressions that comprise the condition. If the condition is met the action corresponding to the policy rule may be executed. Scripts may be used to compute the values of operands that may be used in one or more of the expression that comprise a condition for a policy rule. Also, the action corresponding to a policy rule may be implemented using a script that is executed by a script engine. | 05-21-2015 |
Ron Talmor, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20130173779 | METHODS FOR IDENTIFYING NETWORK TRAFFIC CHARACTERISTICS TO CORRELATE AND MANAGE ONE OR MORE SUBSEQUENT FLOWS AND DEVICES THEREOF - A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent flows includes transmitting a monitoring request comprising one or more attributes extracted from an HTTP request received from a client computing device and a timestamp to a monitoring server to correlate one or more subsequent flows associated with the HTTP request. The HTTP request is transmitted to an application server after receiving an acknowledgement response to the monitoring request from the monitoring server. An HTTP response to the HTTP request is received from the application server. An operation with respect to the HTTP response is performed. | 07-04-2013 |
Shlomi Talmor, Moshav Bnei-Dror IL
Patent application number | Description | Published |
---|---|---|
20100094670 | Interfacing A Building Contractor And A User - A data processing system for and a computer implemented method of providing an interface between a contractor of a building including units and a user related to some units. The data processing system includes an interface server connected to the contractor and to the user and including a graphical user interface, an analyzing module and a physical rules implementation module. The system receives construction plans, converts them to system objects, determines the associations among the system objects, applies physical rules to the system objects, allows the user to define changes to the system objects, calculates effects of the user defined changes on other system objects in the unit, verifies their feasibility and provides the changes in the plans to the contractor. | 04-15-2010 |
Uri Talmor, Ramat-Hasharon IL
Patent application number | Description | Published |
---|---|---|
20150193085 | OBJECT TRACKING SYSTEM AND METHOD - User interface apparatus for a computer system, comprises: a touch surface having an internal face and a touch face; cameras placed about said touch face and arranged to image the touch face including the surface itself and a volume extending outwardly from the surface on the touch face; and an illumination unit that illuminates the touch side. The illumination unit illuminates separately a) a relatively thin first volume close to the touch surface for touch control—the touch volume, and b) a relatively deep second volume extending away from the first volume for three-dimensional hand or body gesture control— the depth volume, the separate illuminating providing for separate imaging by the cameras of the touch and depth volumes. | 07-09-2015 |
Yoram Talmor, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20080313030 | Category-based Advertisement - A hierarchical category system for organizing and displaying electronic advertisements is disclosed. Each electronic advertisement is assigned one or more categories from a hierarchical categorization system. Similarly, each available advertisement placement location is also provided with a category from the hierarchical categorization, system. Then, when displaying advertisements, the system attempts to locate advertisements that have matching categorizations. When no matching advertisement with an exact matching categorization can be found, the system will attempt to locate an advertisement from a more specific (child) category that is a sub category of the current category. However, the advertisement from the more specific (child) category must specify the broader category within its own allowable fall-back path. | 12-18-2008 |