Patent application number | Description | Published |
20120085790 | SEALABLE POURER - A sealable pourer for mounting on a bottle. The sealable pourer includes a cap to ensure that the pouring nozzle and air tube outlet are sealed, or otherwise closed, when in a first position of the cap and allow free flow of the liquid content of the bottle when in a second position. In one embodiment, the cap is rotated about a symmetry axis of the nozzle to achieve sealing of both the air passage and the pouring nozzle. | 04-12-2012 |
20150122839 | SEALABLE POURER - A sealable pourer for mounting on a bottle is provided. The sealable pourer includes a cap to ensure that the pouring nozzle and air tube outlet are sealed, or otherwise closed, when in a first position of the cap and allow free flow of the liquid content of the bottle when in a second position. In one embodiment, the cap is rotated about a symmetry axis of the nozzle to achieve sealing of both the air passage and the pouring nozzle. | 05-07-2015 |
20150225142 | DISPENSING CLOSURE - A dispensing closure for covering an opening of a container including a liquid is presented. The dispensing closure includes an engagement element that fits over the opening of the container and defines a pouring orifice for allowing pouring of the liquid. The pouring orifice having a side defining an air channel for allowing air to flow into the container when liquid during the pouring. The engagement element also includes outer walls and a cap having a hollow including inner walls tightly conforming to the outer walls, a first orifice generally conforming in shape to the pouring orifice, and a second orifice generally conforming in shape to the air channel. | 08-13-2015 |
Patent application number | Description | Published |
20150203697 | PHOTO-CURABLE INK COMPOSITION - A photo-curable ink composition including UV curable polyurethane dispersions, water, photo-initiator, colorant and hydrophobic radiation-curable monomers. Also disclosed herein is a method for forming a printed article and an inkjet printing system using said photo-curable ink composition. | 07-23-2015 |
20150247044 | PHOTO-CURABLE INK COMPOSITION - A photo-curable ink composition including colorant, water, photo-initiator, UV curable polyurethane dispersions, hydrophobic radiation-curable monomers and water-soluble or water-miscible radiation curable monomers. Also disclosed herein is a method for forming a printed article and an inkjet printing system using said photo-curable ink composition. | 09-03-2015 |
20160053124 | PHOTO-CURABLE INK COMPOSITION - A photo-curable ink composition obtained upon mixing a first printing liquid with a second printing liquid. The first printing liquid includes, at least, UV curable polyurethane dispersions and colorant; the second printing liquid includes, at least, hydrophobic radiation-curable monomers, water-soluble or water-miscible radiation curable monomers and photo -initiators. Also disclosed herein is a set of printing liquids including said first and second printing liquid; an inkjet printing system and a method for forming a printed article. | 02-25-2016 |
Patent application number | Description | Published |
20080225063 | Photo-curable ink-jet ink compositions, systems, and methods - The present invention is drawn to photo-curable ink-jet ink compositions, systems, and methods. One exemplary ink-jet ink composition includes a liquid vehicle, a milled pigment which has been milled in a milling solvent having minimal to no gas solvency for the milled pigment, and a photo initiator. In this embodiment, the composition can be ink-jettable at frequencies of at least 29 KHz without requiring degassing during printing. | 09-18-2008 |
20080225099 | Photo-curable Ink-jet Ink Compositions, Systems, And Methods - The present invention is drawn to photo-curable ink-jet ink compositions, systems, and methods. One exemplary ink-jet ink composition includes a liquid vehicle, a milled pigment which has been milled in a milling solvent having minimal to no gas solvency for the milled pigment, and a photo initiator. In this embodiment, the composition can be ink-jettable at frequencies of at least 29 KHz without requiring degassing during printing. | 09-18-2008 |
20140024737 | MILL BASE COMPOSITION AND UV CURABLE INK COMPOSITION COMPRISING SAME - A mill base composition includes a compound comprising a divinyl ester of a dicarboxylic acid, a dispersing agent, and a pigment. The divinyl ester of the carboxylic acid includes from 2 to about 8 carbon atoms. The mill base composition is subjected to milling with milling beads to produce a milled mill base composition that functions as a pigment concentrate that may be added to an ink vehicle to form an ink composition suitable for use in inkjet ink devices. The milled mill base composition is particularly suited for UV curable ink compositions. A UV curable ink composition includes the pigment concentrate, one or more UV curable monomers, and one or more UV initiators. | 01-23-2014 |
Patent application number | Description | Published |
20090062197 | Sp1 Polypeptides, Modified Sp1 Polypeptides and Uses Thereof - SP1 and modified SP1 variant polypeptides capable of forming reversible molecular associations with substances, compositions-of-matter comprising same, and uses thereof are provided. | 03-05-2009 |
20110269667 | METHODS OF GENERATING AND USING PROCOLLAGEN - A method of promoting wound healing, treating fibrosis and/or promoting angiogenesis is provided. The method comprises administering to a subject in need thereof a therapeutically effective amount of a procollagen, thereby promoting wound healing, treating fibrosis and/or promoting angiogenesis in the subject. | 11-03-2011 |
20120065376 | METHODS OF PROCESSING RECOMBINANT PROCOLLAGEN - A method of generating atelocollagen is disclosed. The method comprises contacting a human telopeptide-comprising collagen with a protease selected from the group consisting of neutrase, subtilisin, ficin recombinant human trypsin and recombinant human pepsin, wherein said human telopeptide-comprising collagen is expressed in a non-animal cell, thereby generating the atelocollagen. Compositions comprising the atelocollagen generated thereby are also disclosed. | 03-15-2012 |
20140178483 | SP1 POLYPEPTIDES, MODIFIED SP1 POLYPEPTIDES AND USES THEREOF - SP1 and modified SP1 variant polypeptides capable of forming reversible molecular associations with substances, compositions-of-matter comprising same, and uses thereof are provided. | 06-26-2014 |
20150273076 | SP1 POLYPEPTIDES, MODIFIED SP1 POLYPEPTIDES AND USES THEREOF - SP1 and modified SP1 variant polypeptides capable of forming reversible molecular associations with substances, compositions-of-matter comprising same, and uses thereof are provided. | 10-01-2015 |
20150328288 | METHODS OF GENERATING AND USING PROCOLLAGEN - A method of promoting wound healing, treating fibrosis and/or promoting angiogenesis is provided. The method comprises administering to a subject in need thereof a therapeutically effective amount of a procollagen, thereby promoting wound healing, treating fibrosis and/or promoting angiogenesis in the subject. | 11-19-2015 |
Patent application number | Description | Published |
20150347616 | BROWSER STORE ADMINISTERING METHOD AND SYSTEM - Methods and systems for administering a browser store for computing device web browser applications, particularly browsers featuring tabbed viewing of web pages. A qualifying trigger event, such as a change in the current active tab of the browser, or a navigation to a URL in the active tab, is detected by an exemplary system. The system, having been monitoring user interaction with the browser's tabs, regulates the browser store such that, upon detecting a trigger event, only data (e.g., cookies) pertaining to the web site whose web page is presently displayed in the browser's active tab is retained. Any other data unrelated to the web site is copied to a virtual memory for future reference and purged from the browser store. Additionally, any data pertaining to the web site that may have been previously transferred to the virtual memory is retrieved therefrom and relocated to the browser store. Moreover, any such data retrieved from the virtual memory that require updating, e.g., upon request or instruction by the site's web server, is updated or replaced as appropriate. | 12-03-2015 |
20160100217 | SYSTEM AND METHOD FOR OPTIMIZING DELIVERY OF VIDEO CONTENT IN NATIVE MOBILE APPLICATIONS - A system and method for optimizing content delivery via native applications. The method comprises: intercepting a request for a content item existing in a web source over a network, wherein the request is intercepted from a user device; analyzing the intercepted request to extract a pointer to the web source; analyzing the web source to identify at least one content node communicatively connected to the network, wherein each of the at least one identified content node provides a more efficient delivery of the content item than the web source; causing the user device to select a content node of the at least one identified content node; and causing the user device to retrieve the content item via the selected content node. | 04-07-2016 |
20160100221 | SYSTEM AND METHOD FOR PREVENTING ABANDONMENT OF WEB-BASED VIDEO CONTENT - A system and method for generating abandonment profiles for web-based video content. The method comprises: monitoring user interactions with a video content item; generating at least one abandonment metric based on the monitored user interactions, wherein each abandonment metric represents a feature associated with abandonment of the video content item; and generating an abandonment profile including the at least one abandonment metric. | 04-07-2016 |
Patent application number | Description | Published |
20100023925 | System and method for transforming hierarchical objects - A method and system for transforming a first object into a second object, comprising: receiving the source and second objects; subject to the objects being of attribute type, copying, the value of the source object to the second object; subject to the objects being of node type which comprises, for each member of the second object: locating a corresponding member having a corresponding name in the source object; and invoking the method for the member and the corresponding member; subject to the objects being of list type, the source object adapted to contain elements of a first type and the second object adapted to contain elements of a second type, for each element of the source object: creating a corresponding default element of the second type; and invoking the method for the element and the corresponding default element; and invoking a user-implemented transformation routine. | 01-28-2010 |
20120089664 | Optimizing Distributed Computer Networks - In one general embodiment, a computer-implemented method for managing a distributed computer network performed by one or more processors includes the steps of: receiving a request from a client in the distributed computer network for a network service; optimizing a delivery of the requested network service to the client from a server in the distributed computer network; and monitoring an execution of the delivery of the network service. | 04-12-2012 |
20130347124 | Accessing Restricted Resources In Computer Programming - A computerized method for providing a computer code an access to a restricted resource of a computer program, comprising modifying an at least one duplicate of an at least one declaration file of the computer program by removing a restriction definition of an at least one resource of the computer program that is referred to by the computer code, thereby generating an at least one modified declaration file, and building a computer application comprising the computer code and also the computer program as being dependent on the at least one modified declaration file, thereby providing access to the at least one resource originally defined as restricted, and an apparatus for performing the same. | 12-26-2013 |
20140359074 | PRE-FETCHING RESOURCES BY PREDICTING USER ACTIONS - Pre-fetching resources by predicting user actions. Features of multiple users and of multiple client computer systems associated with the multiple users are obtained. From these features, multiple segments are generated, each including a proper subset of the multiple users. Users in the proper subset share a common feature. For a segment, resources that have at least a threshold level of likelihood of being requested by a user included in the segment are pre-fetched, i.e., obtained before the resources have been requested. A client computer system associated with the user in the included segment is identified, and the obtained resources are stored for providing to the user. | 12-04-2014 |
20140372504 | PERFORMING OPERATIONS ON NODES OF DISTRIBUTED COMPUTER NETWORKS - Performing operations on nodes of distributed computer networks. A request to upgrade a first acceleration node in a computer network is identified. A second acceleration node that is linked to the first acceleration node is identified. A bypass link to the second acceleration node from the first acceleration node is established. The bypass link is configured to transmit new connections received for handling by the first acceleration node to the second acceleration node for handling by the second acceleration node during upgrading of the first acceleration node. Upon establishing the bypass link, the first acceleration node is upgraded in response to identifying the request. | 12-18-2014 |
20140373136 | PROACTIVE SECURITY SYSTEM FOR DISTRIBUTED COMPUTER NETWORKS - According to some embodiments, a method and apparatus are provided to receive, at a central security manager located on a computer network, first network information from a first network resource associated with a first network perspective and receive, at the central security manager, second network information from a second network resource associated with a first network perspective. The first network information and the second network information are aggregated. A potential attack to the network is determined and a defensive measure is implemented in response to the potential attack to the network. | 12-18-2014 |
20150029865 | NETWORK TRAFFIC ROUTING OPTIMIZATION - The present disclosure describes methods, systems, and computer program products for providing network traffic routing optimizations. One computer-implemented method includes calculating a direct connection cost for network traffic between two points in a network, the network including one or more nodes of an accelerated application delivery (AccAD) network, calculating an AccAD connection cost for the network traffic between the two points in the network using at least one node of the AccAD network, comparing the calculated direct connection cost and the AccAD connection cost, and determining whether the direct connection cost is greater than the sum of the AccAD connection cost and a minimum cost threshold value. | 01-29-2015 |
20150032802 | SHARED DATA DE-DUPLICATION METHOD AND SYSTEM - This disclosure relates to synchronizing dictionaries of acceleration nodes in a computer network. For example, dictionaries of a plurality of acceleration nodes of a client-server network can be synchronized to each include one or more identical data items and data identifier pairs. Synchronization can include transmitting a particular data item, or a combination of a data item and an associated data identifier, to another acceleration node which includes it in its dictionary. A particular acceleration node can, instead of transmitting a data item, transmit an associated data identifier to another acceleration node. As all (or a subset) of the acceleration nodes can have an identical dictionary when employing the methods described herein, the particular acceleration node can use the same dictionary to communicate with all (or the subset of) other acceleration nodes of the computer network. | 01-29-2015 |
20150358230 | NETWORK TRAFFIC ROUTING OPTIMIZATION - The present disclosure describes methods, systems, and computer program products for providing network traffic routing optimizations. One computer-implemented method includes calculating a direct connection cost for network traffic between two points in a network, the network including one or more nodes of an accelerated application delivery (AccAD) network, calculating an AccAD connection cost for the network traffic between the two points in the network using at least one node of the AccAD network, comparing the calculated direct connection cost and the AccAD connection cost, and determining whether the direct connection cost is greater than the sum of the AccAD connection cost and a minimum cost threshold value. | 12-10-2015 |
Patent application number | Description | Published |
20100165689 | REJUVENATION OF ANALOG MEMORY CELLS - A method for data storage in a memory that includes multiple analog memory cells fabricated using respective physical media, includes identifying a group of the memory cells whose physical media have deteriorated over time below a given storage quality level. A rejuvenation process, which causes the physical media of the memory cells in the group to meet the given storage quality level, is applied to the identified group. Data is stored in the rejuvenated group of the memory cells. | 07-01-2010 |
20120044762 | REJUVENATION OF ANALOG MEMORY CELLS - A method for data storage in a memory that includes multiple analog memory cells fabricated using respective physical media, includes identifying a group of the memory cells whose physical media have deteriorated over time below a given storage quality level. A rejuvenation process, which causes the physical media of the memory cells in the group to meet the given storage quality level, is applied to the identified group. Data is stored in the rejuvenated group of the memory cells. | 02-23-2012 |
20120300828 | TRANSMISSION SYSTEM WITH ISI CHANNEL AND METHOD OF OPERATING THEREOF - There is provided a transmission system and method of operating thereof. The method comprises: dividing a data sequence to be transmitted into a plurality of data blocks; encoding one or more data blocks with one or more linear systematic cyclic codes thus giving rise to encoded data blocks; transmitting said encoded data blocks over an ISI transmission channel; upon receiving, applying a linear integer-forcing (IF) equalization to the received data blocks; processing the output of the IF equalization thereby detecting for each encoded data block a valid codeword with maximal likelihood of decoding; and reconstructing the data blocks using the respective detected valid codewords. | 11-29-2012 |
20130283122 | Error Correction Coding Over Multiple Memory Pages - A method for data storage includes encoding each of multiple data items individually using a first Error Correction Code (ECC) to produce respective encoded data items. The encoded data items are stored in a memory. The multiple data items are encoded jointly using a second ECC, so as to produce a code word of the second ECC, and only a part of the code word is stored in the memory. The stored encoded data items are recalled from the memory and the first ECC is decoded in order to reconstruct the data items. Upon a failure to reconstruct a given data item from a respective given encoded data item by decoding the first ECC, the given data item is reconstructed based on the part of the code word of the second ECC and on the encoded data items other than the given encoded data item. | 10-24-2013 |