Mitchell B.
Mitchell B. Dikselis, Lemont, IL US
Patent application number | Description | Published |
---|---|---|
20100303738 | NON-CONTACT PRINTED COMESTIBLE PRODUCTS AND APPARATUS AND METHOD FOR PRODUCING SAME - The present disclosure provides an apparatus and method for packaging a non-contact printed edible substrate as well as the resultant packaged product. The packaging apparatus may include a non-contact printer, a carrier, and a package located at a discharge position. The carrier may be constructed and arranged to transport the edible substrate from the print position to the package and orient same in the package so that the printed ink indicia is visible through at least a portion of a panel of the package. At a print position, the non-contact printer is constructed and arranged to apply an edible ink indicia to an edible substrate. The packaging apparatus may form a packaged product having a plurality of compartments where at least one compartment at least partially defined by a panel. The interior of the compartment contains at least one edible substrate comprising a surface and a printed edible ink indicia on the surface so that the ink indicia is visible through at least a portion of the panel. | 12-02-2010 |
20110056865 | Product Container Including Surface with Bumps - A product container ( | 03-10-2011 |
Mitchell B. Haeri, Irvine, CA US
Patent application number | Description | Published |
---|---|---|
20090237668 | Detecting a target using an optical augmentation sensor - In one embodiment, detecting a target includes directing a laser beam towards an area and detecting the laser beam reflected from the area. Whether the received laser beam comprises an optically augmented reflection indicating retro-reflection from a target is determined. The target indicates presence of an explosive device. The target is detected if the received laser beam comprises the optically augmented reflection. | 09-24-2009 |
Mitchell B. Rivera, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20150205582 | APPLICATION DATAFLOW AWARE PROPERTY AND BINDINGS - In one embodiment, a non-transitory computer-readable medium stores instructions for implementing an application dataflow aware property and bindings system that implements two-way binding via a unidirectional directed acyclic graph and propagates data through the graph based on the connections between the graph nodes. In one embodiment, properties in a binding relationship are arranged in an upstream and downstream manner. Each property has an upstream node and a downstream node to send and receive messages from other properties. Where a first property is arranged upstream of a second property in the binding graph, the first property is more authoritative than the second property. The most upstream property is the truth for the binding. Requests to update the value of the property are propagated upstream via the upstream nodes and notifications of changes in the value of the property are propagated downstream via the downstream nodes. | 07-23-2015 |
Mitchell B. Rudominer, El Cerrito, CA US
Patent application number | Description | Published |
---|---|---|
20080289010 | Managing Secured Resources in Web Resources that are Accessed by Multiple Portals - A method, apparatus, and computer-readable media for authorizing users of network portals to access a secure resource hosted by a secure server comprises storing a plurality of user identifiers, each representing a user of an owning portal; storing for each of the user identifiers an access privilege to the secure resource; storing a proxy user identifier representing a guest portal and a guest access privilege to the secure resource for all of the users of the guest portal; receiving from the owning portal a first request for access to the secure resource, the first request comprising a first user identifier representing a user of the owning portal; granting to the user of the owning portal access to the secure resource according to the access privilege stored for the first user identifier; receiving from the guest portal a second request for access to the secure resource, the second request comprising a second user identifier representing a user of the guest portal and a portal identifier representing the guest portal; and granting to the user of the guest portal access to the secure resource according to the guest access privilege stored in the authorization table for the proxy user identifier. | 11-20-2008 |