Naar
Anders M. Naar, Arlington, MA US
Patent application number | Description | Published |
---|---|---|
20100273676 | HIGH THROUGHPUT SCREENS FOR SMALL-MOLECULE INHIBITORS OF THE NUCLEAR RECEPTOR-LIKE PATHWAY REGULATING MULTIDRUG RESISTANCE IN FUNGI - The present invention relates to the identification of molecular mechanisms associated with multidrug resistance (MDR) in fungal infections. More specifically, fungi harbor a nuclear receptor-like pathway controlling MDR, which represents a novel therapeutic target for the treatment of MDR in pathogenic fungi such as | 10-28-2010 |
20130245093 | METHODS TARGETING MIR-33 MICRORNAS FOR REGULATING LIPID METABOLISM - Compositions comprising nucleic acid sequences that target MiR-33a/b microRNAs are described, together with uses of the same in the treatment of certain disorders related to elevated serum triglyceride levels and obesity. | 09-19-2013 |
20140051746 | METHODS TARGETING MIR-128 FOR REGULATING CHOLESTEROL/LIPID METABOLISM - Methods for targeting microRNA 128 (miR-128) for regulating cholesterol/lipid metabolism and insulin sensitivity. | 02-20-2014 |
20150232848 | METHODS TARGETING MIR-128 FOR REGULATING CHOLESTEROL/LIPID METABOLISM - Methods for targeting microRNA 128 (miR-128) for regulating cholesterol/lipid metabolism and insulin sensitivity. | 08-20-2015 |
Daniel Naar, San Mateo, CA US
Patent application number | Description | Published |
---|---|---|
20120189158 | OPTIMIZED IMPLEMENTATION OF BACK PROJECTION FOR COMPUTED TOMOGRAPHY (CT) - The disclosure relates generally to a method of three dimensional (3D) tomographic volume reconstruction for computed tomography (CT) using vector processors and more specifically to an optimized implementation which pre-computes back projection weights and perspective geometry data associated with a given CT device as down-sampled tables. The down-sampled perspective geometry data and the weight table are interpolated dynamically as part of the volume reconstruction process for an object scanned using the given CT device. | 07-26-2012 |
Dekel Shmuel Naar, Tel Aviv IL
Patent application number | Description | Published |
---|---|---|
20160142375 | TECHNIQUES TO AUTHENTICATE A CLIENT TO A PROXY THROUGH A DOMAIN NAME SERVER INTERMEDIARY - Techniques to authenticate a client to a proxy through a domain name server intermediary are described. In one embodiment, for example, a client apparatus may comprise a data store and a network access component. The data store may be operative to store a network configuration file, the network configuration file containing a client-specific secret. The network access component may be operative to transmit a communication request from the client device to a proxy server, the communication request directed to a destination server distinct from the proxy server, and to receive a response to the communication request from the destination server based on a determination by the proxy server that the client is authorized to use the proxy server, the determination based on the client having previously sent an encoding of a client-specific secret to a domain name server embedded within a lookup domain of a domain name request. Other embodiments are described and claimed. | 05-19-2016 |
Rotem Naar, Rehovot IL
Patent application number | Description | Published |
---|---|---|
20140258294 | ON-DEMAND CONTENT CLASSIFICATION USING AN OUT-OF-BAND COMMUNICATIONS CHANNEL FOR FACILITATING FILE ACTIVITY MONITORING AND CONTROL - Communications to a server over an in-band communications channel are monitored for requests to access a file. Based on the communications, a request to access a particular file stored by the server is identified. Security and/or audit rules are identified based on the request. A determination is thereafter made that the security and/or audit rules require evaluation of classification information for contents of the requested file. Thus, a determination is made as to whether classification information for the contents of the particular file is available, such as determining whether the classification information is stored in a local classification cache. Responsive to a determination that the classification information is not available, classification information is obtained for the contents of the particular file using an out-of-band communications channel. Thereafter, processing with respect to the request to access the particular file is performed based on the obtained classification information and the one or more security and/or audit rules. | 09-11-2014 |