Yigal
Yigal Abo, Tiberius IL
Patent application number | Description | Published |
---|---|---|
20140259855 | FIREARM AIMING DEVICE AND ATTACHMENT MECHANISM THEREFOR - A firearm aiming device and attachment mechanism is an aiming device or gun sight for firearms and an attachment mechanism therefor. The aiming device and attachment mechanism are particularly useful for aiming/using hand-held guns, such as pistols and revolvers or short range rifles. In accordance with embodiments of one aspect of the present invention there is provided an aiming device to aid a shooter of a firearm having a barrel, an aiming device attachment member receiving slot of the tapering type, and a front aiming sight. The aiming device includes an elongated housing having a tunnel therein, the tunnel configured so it is parallely arrangeable with the firearm's barrel and alignable with the front sight. The housing has at least one light admitting opening to the tunnel and an inwardly tapering groove that is generally crosswise to the longitudinal axis of the elongated housing. | 09-18-2014 |
Yigal Baher, Brooklyn, NY US
Patent application number | Description | Published |
---|---|---|
20110137748 | Systems and Methods for Virtual Credit Card Transactions - The present invention is directed to methods and devices for secure virtual credit card transactions. In one embodiment, a consumer system initiates a transaction with a merchant system. The consumer system generates a first verification code and a second verification code. The consumer system provides the merchant system with the first verification code. The merchant system transmits the first verification code to an authorizing entity, and the consumer system independently transmits the second verification code to the authorizing entity. The authorizing entity compares the verification codes received from both the consumer system and the merchant system. Based on the results of the comparison, the authorizing entity either approves or rejects the transaction. | 06-09-2011 |
Yigal Bejerano US
Patent application number | Description | Published |
---|---|---|
20090257373 | Methods and Apparatus for Coverage Verification in a Wireless Sensor Network - Methods and apparatus are provided for improved coverage verification schemes in a wireless sensor network that do not require information about the location of sensor nodes in the wireless sensor network. Coverage holes are detected by a first node in a wireless sensor network by obtaining an estimate of a distance to each of a plurality of additional nodes in a transmission radius of the first node; determining a relative location of each of the plurality of additional nodes in the coordinate system of the first node; identifying border segments of a sensing border of the first node, where each of the border segments comprises a section of a sensing border of the first node that is covered by a sensing radius of at least one of the additional nodes; and determining if a coverage hole exists for the first node by determining if a plurality of the border segments comprise a cyclic segment sequence. The coordinate system comprises r-map coordinates of the first node and the additional nodes, where r is based on a transmission radius of the first node | 10-15-2009 |
Yigal Ben Efraim, Kfar Neter IL
Patent application number | Description | Published |
---|---|---|
20130218674 | SYSTEMS AND METHODS FOR SELLING AND DISPLAYING ADVERTISEMENTS OVER A NETWORK - Systems and methods are provided for selling one or more advertisements and displaying the one or more advertisements in a fixed placement for a set duration of time on a web page within an Internet website in combination with displaying advertisements from the same advertiser in contextually relevant locations within the website. | 08-22-2013 |
Yigal Edery, Pardesia IL
Patent application number | Description | Published |
---|---|---|
20080301796 | Adjusting the Levels of Anti-Malware Protection - A client transmits requests via a gateway to a server in a network environment. The requests indicate content on a server to be transmitted as part of download process. The gateway receives into its memory the requested content and also maintains characteristics of the server and the client. The gateway adjusts the depth of scanning of the content for malware based on the retrieved server and client characteristics in order to optimize a balance between effectiveness of anti-malware scanning and a resulting user experience. | 12-04-2008 |
20090177514 | SERVICES USING GLOBALLY DISTRIBUTED INFRASTRUCTURE FOR SECURE CONTENT MANAGEMENT - Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services. | 07-09-2009 |
20090178108 | ENTERPRISE SECURITY ASSESSMENT SHARING FOR OFF-PREMISE USERS USING GLOBALLY DISTRIBUTED INFRASTRUCTURE - Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and off-premise or roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services. | 07-09-2009 |
20090178131 | GLOBALLY DISTRIBUTED INFRASTRUCTURE FOR SECURE CONTENT MANAGEMENT - Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services. | 07-09-2009 |
20090178132 | Enterprise Security Assessment Sharing For Consumers Using Globally Distributed Infrastructure - Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services. | 07-09-2009 |
20100011432 | AUTOMATICALLY DISTRIBUTED NETWORK PROTECTION - A network protection solution is provided by which security capabilities of a client machine are communicated to a network security gateway so that a variety of processes can be automatically and dynamically distributed between the gateway and the client machine in a way that achieves a target level of security for the client while consuming the least possible amount of resources on the gateway. For example, for a client that is compliant with specified health and/or corporate governance policies and which is known to have A/V capabilities that are deployed and operational, the network security gateway will not need to perform additional A/V scanning on incoming network traffic to the client which can thus save resources at the gateway and lower operating costs. | 01-14-2010 |
20110138441 | MODEL BASED SYSTEMS MANAGEMENT IN VIRTUALIZED AND NON-VIRTUALIZED ENVIRONMENTS - Architecture that provides model-based systems management in virtualized and non-virtualized environments. A security component provides security models which define security requirements for services. A management component applies one or more of the security models during the lifecycle of virtual machines and services. The lifecycle can include initial deployment, expansion, moving servers, monitoring, and reporting. The architecture creates a formal description model of how a virtual machine or a service (composition of multiple virtual machines) is secured. The security requirements information can also be fed back to the general management system which uses this information in its own activities such as to guide the placement of workloads on servers can be security related. | 06-09-2011 |
20110276621 | OPERATING SYSTEM AND APPLICATION VIRTUALIZATION FOR APPLICATION EXECUTION - A system for executing a virtual application may use a virtualized operating system to execute an application. The application may be delivered to a host device through streaming, either to a streaming client in the virtual operating system or as a package that may include the virtualized operating system. The virtualized operating system may have a user interface connection to a host operating system to make the virtual application appear as a native application in the host operating system. | 11-10-2011 |
20130332988 | Aggregating The Knowledge Base Of Computer Systems To Proactively Protect A Computer From Malware - Techniques for aggregating a knowledge base of a plurality of security services or other event collection systems to protect a computer from malware are provided. In embodiments, a computer is protected from malware by using anti-malware services or other event collection systems to observe suspicious events that are potentially indicative of malware. A determination is made as to whether a combination of the suspicious events is indicative of malware. If the combination of suspicious events is indicative of malware, a restrictive security policy designed to prevent the spread of malware is implemented. | 12-12-2013 |
Yigal Edery, Parsedia IL
Patent application number | Description | Published |
---|---|---|
20100162346 | SELECTING SECURITY OFFERINGS - Methods, systems, and computer-readable media are disclosed for selecting a set of security offerings. A particular method includes receiving a security need profile associated with a computing environment and receiving security offering information related to a plurality of security offerings. The security offerings of the plurality of security offerings are evaluated with respect to the security need profile. A set of security offerings from the plurality of security offerings are automatically selected. | 06-24-2010 |
Yigal Eisinger, D.n. Drom Ramat Hagolan IL
Patent application number | Description | Published |
---|---|---|
20080243952 | Group Stamping Style Asynchronous Replication Utilizing A Loosely-Accurate Global Clock - A group stamping style asynchronous replication service utilizes a loosely-accurate global clock in a data backup and recovery storage environment. The storage environment includes a set of source storage systems illustratively embodied as source replication nodes that cooperate to maintain a consistency group that may span multiple geographical sites. The storage environment also includes one or more target storage systems illustratively embodied as target replication nodes configured to service the consistency group. The group stamping style service utilizes the loosely-accurate global clock to provide consistent replication of a storage space, e.g., a target storage space, of the consistency group. | 10-02-2008 |
Yigal Malyanker, Lod IL
Patent application number | Description | Published |
---|---|---|
20100208470 | OVERLAPPING ILLUMINATION SURFACES WITH REDUCED LINEAR ARTIFACTS - Illumination surfaces according to the present invention eliminate or at least reduce linear “stitch” artifacts at edges between tiled illumination devices. As a result, light of substantially uniform intensity is emitted across the entire illumination system. This is achieved, in various embodiments, overlapping the illumination surfaces of adjacent light-guide elements. | 08-19-2010 |
Yigal Offir, Hopkinton, MA US
Patent application number | Description | Published |
---|---|---|
20090188997 | Reconfigurable airflow wand - A wand, such as for a surface cleaning apparatus, comprises at least an upstream rigid tube and a downstream rigid tube releasably pivotally connected to the upstream rigid tube. A flexible fluid flow conduit connects the downstream, tube in fluid flow communication with the upstream tube. | 07-30-2009 |
Yigal Rozval, Rehovot IL
Patent application number | Description | Published |
---|---|---|
20120081455 | Method And Device For Printing On Heated Substrates - A printing device for dispending material on a heated substrate is provided. The device may include a printing head having one or more nozzles and a heat shield that partially masks a side of the printing head that faces the heated substrate when printing so as to reduce heat transfer from the substrate to the printing head. The shield includes a slot aligned with the one or more nozzles to enable passage of material from the one or more nozzles to the heated substrate. | 04-05-2012 |
Yigal Staroselsky, Roshmaain IL
Patent application number | Description | Published |
---|---|---|
20120285441 | METHOD, SYSTEM AND APPARATUS FOR USAGE WITH A COMMON WATER HEATING SYSTEM - The present invention describes a method, system and apparatus for optimizing a flow of thermal fluid through one in a multitude of local reservoirs (e.g. water tank) which may have local heating capability and which shares a common water heating source (e.g. solar panels). Keeping a minimal flow from the inlet to the outlet allows a continuous temperature difference monitoring, which is then used to vary the local flow through an automated system, while also taking in consideration the effect of an optional local heating source. The said above may be applied in reverse for cooling systems. | 11-15-2012 |
Yigal Ultchin, Rehovot IL
Patent application number | Description | Published |
---|---|---|
20150057652 | ADAPTIVE ELECTRODE FOR BI-POLAR ABLATION - Cardiac ablation is carried out by placing two ablation electrodes on opposite sides of a wall of the heart to generally oppose one another. The effective current transmission area of one of the electrodes is then varied according to the distance between the two electrodes or the thickness of the wall. Sufficient electrical current is transmitted between the two electrodes to achieve transmural ablation. | 02-26-2015 |