Patent application number | Description | Published |
20100258061 | MODULAR LEASH SYSTEM - A modular leash system including a flexible lead having a first and second rigid end portion. A first end cap is removably attachable to the first rigid end portion via set screw configured to be received through cooperating holes in the first end cap and the first rigid end portion. The first end cap includes a loop for coupling the first end cap to a collar connector. A second end cap is removably attachable to the second rigid end portion via a set screw configured to be received through cooperating holes in the second end cap and the second rigid end portion. The second end cap configured to be coupled to a handle portion. | 10-14-2010 |
20110032713 | LIGHTING ASSEMBLY - A lighting assembly including a body assembly configured to allow for the passage of visible light, the body assembly including a socket assembly configured to removable receive a cap assembly of a bulb assembly. A bulb recess is configured to receive at least a portion of the bulb assembly, such that the bulb recess is configured to form a shroud that visually obscures at least a portion of a light emitting portion of the bulb assembly. A conductor assembly is configured to provide electrical energy to the socket assembly. | 02-10-2011 |
20130017011 | DETANGLING DEVICE, METHOD OF MAKING AND USING THE SAMEAANM MIRON; Nicholas Peter OkunAACI GreenwichAAST CTAACO USAAGP MIRON; Nicholas Peter Okun Greenwich CT US - Described herein are axially and radially swivelable detangling connector devices that are suitable for preventing entanglement, or detangling, of a device or means that is used to secure one or more mobile objects or subjects to one or more objects or subjects. Methods of making and using the disclosed devices are also provided herein. | 01-17-2013 |
20150033542 | MANUFACTURE OF MODULAR LEASHES - Methods for manufacturing modular leashes are disclosed. The modular leashes may comprise a flexible portion including a lead end and a handle portion. Manufacturing the flexible portion may comprise heating a pin and securing the pin to a lead end, so as to melt the lead to the pin using ambient heat from the pin. In some embodiments, heating the pin uses induction heating. Manufacturing the flexible portion may further comprise inserting the lead end into a sleeve, and securing the lead to the sleeve by crimping the sleeve onto the lead. Manufacturing the handle portion may comprise inserting handle ends into a first end of a sleeve and inserting a fastener into the handle ends. Manufacturing the handle portion may further comprise inserting a fitting into a second end of the sleeve so that a space between the sleeve and the fitting may receive the handle ends. | 02-05-2015 |
20150047157 | DETANGLING DEVICE, METHOD OF MAKING AND USING THE SAME - Described herein are axially and radially swivelable detangling connector devices that are suitable for preventing entanglement, or detangling, of a device or means that is used to secure one or more mobile objects or subjects to one or more objects or subjects. Methods of making and using the disclosed devices are also provided herein. | 02-19-2015 |
Patent application number | Description | Published |
20080301299 | Automatically targeting and filtering shared network resources - Embodiments are provided to automatically target shared resources in a computer network which are pertinent to a query for information from a client and/or a server through the use of a shared resources portal. In one embodiment, a query is received in the shared resources portal from a requestor. The portal may then identify a target resource server to which to route the query by filtering the information provided by a number of shared resource servers in the network against information regarding an organizational role performed by the requester. The identified target resource server may be one which provides information pertinent to the organizational role performed by the requester. The query is then processed in the identified target resource server. | 12-04-2008 |
20090006884 | AUTOMATICALLY MANAGING SYSTEM DOWNTIME IN A COMPUTER NETWORK - Embodiments are provided to automatically managing system downtime in a computer network. In one embodiment, an event is created in an application server to schedule a system downtime period for a web server. When the scheduled downtime occurs, the web server is automatically removed from the network and a downtime notification message is automatically communicated indicating that the web server is offline. In another embodiment, events may be created to schedule downtime for web-based applications, including websites. Prior to the scheduled downtime, requests to a web-based application may be automatically stopped and redirected to a specified location. In another embodiment, the operation of web servers is automatically monitored to detect the presence of a fault condition and, if a fault condition is present, then a determination may be made that the affected web servers are down and requests to the down web servers are automatically redirected to an alternate server. | 01-01-2009 |
20090007152 | MANAGEMENT OF EXTERNAL HARDWARE APPLIANCES IN A DISTRIBUTED OPERATING SYSTEM - Embodiments are provided to manage external hardware appliances from a distributed operating system interface in a computer network using a driver model to communicate with device drivers associated with the external hardware appliances. In one embodiment, a request to manage an external hardware appliance in the computer network may be received in a distributed web-based operating system interface. A driver model may be selected which is configured to interface with a device driver for managing configuration settings for the external hardware appliance. The driver model may be utilized to manage the external hardware appliance configuration settings from the interface. The settings may include managing domain name changes, firewall settings, proxy settings, and the like. In another embodiment, the driver model may be utilized to manage external hardware appliance settings during a network configuration operation initiated from the distributed operating system interface. | 01-01-2009 |
20110022582 | Indexing of Partitioned External Data Sources - A computing system hosts a plurality of websites, a plurality of external data sources, and a search service. External resources in each of the external data sources are partitioned among a plurality of external partitions. The search service automatically generates an index comprising index entries. The index entries are partitioned among a plurality of index partitions, each associated with one or more of the websites. For each given index partition, the index entries in the given index partition map terms to resources in the given set of resources that contain the terms. The given set of resources includes web pages in a given set of websites associated with the given index partition and external resources in external partitions used by the given set of websites. The search service uses the index entries in given index partition to identify resources in the given set of resources containing query terms. | 01-27-2011 |
20120042010 | MANAGEMENT OF COLLECTIONS OF WEBSITES - This disclosure describes techniques that enable a subscriber of a data center to manage a site collection group hosted by the data center. A site collection group is a set of site collections that belong to a single subscriber. A site collection is a collection of websites. A website is a collection of related resources. Each of the site collections is associated with an “owner”. As described herein, the data center presents management interfaces that enable owners of site collections to manage the site collections. In addition, the data center presents management interfaces that enable subscribers to manage architectural aspects of their site collection groups. | 02-16-2012 |
20140373101 | SENDING SESSION TOKENS THROUGH PASSIVE CLIENTS - A session token can be requested to be sent to a first computing service from a second computing service, and a first computing service can receive the requested session token from the second computing service. The first computing service can send a message that includes the session token through a passive client to the second computing service. The second computing service can receive the message that includes the session token from the passive client, and the second computing service can verify that the message is valid. This verification of the validity of the message can include verifying that the session token received back from the passive client matches the session token the second computing service sent to the first computing service. | 12-18-2014 |
Patent application number | Description | Published |
20130145427 | AUTHORIZING APPLICATION ACCESS TO SECURE RESOURCES - An application submits a permission request to a resource server. In response to receiving the request, the resource server generates a user interface that asks the user to grant or deny the requested permissions. If the permissions are granted, data is stored indicating that the application has the requested permissions. When a runtime request for a resource is received, the resource server determines whether the request has been made by a user, by an application, or by an application on behalf of a user. If the request is made by an application only, the request is granted only if the application has permission to access the resource by way of a direct call not on behalf of a user. If the request is made by an application on behalf of a user, the request is granted only if both the user and the application have sufficient permission. | 06-06-2013 |
20130332606 | Gate Keeper Cookie - A method for sign-on and sign-out for a computer system includes: receiving a first sign-on request for the computer system; obtaining, from the first sign-on request, a first user identifier, the first user identifier corresponding to a first user for the computer system; obtaining, from the first sign-on request, a first uniform resource locator (URL); determining whether the first URL includes a first root name for the computer system; when a determination is made that the first URL includes the first root name for the computer system: issuing a first cookie; associating the first cookie with the first user; obtaining a first sub-domain name from the first URL; issuing a second cookie, the second cookie being different from the first cookie; associating the second cookie with the first sub-domain name; and when the first cookie and the second cookie are issued, signing-on the first user to the computer system. | 12-12-2013 |
20160044011 | REVOKING SESSIONS USING SIGNALING - Embodiments are directed to revoking user sessions using signaling. In one scenario, an identity platform operating on a computer system receives an indication indicating that a user's login account has been compromised, where the user's login account has an associated login session and corresponding session artifact that is valid for a specified amount of time. The identity platform generates a signal indicating that the login session is no longer trusted and that the user is to be re-directed to the identity platform to re-authenticate and renew the session artifact and provides the generated signal to various relying parties including at least one relying party that is hosting the login session for the user. | 02-11-2016 |