Patents by Inventor David Matalon
David Matalon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11687644Abstract: A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.Type: GrantFiled: August 18, 2022Date of Patent: June 27, 2023Assignee: Venn Technology CorporationInventors: Aleksandr Osipov, Jacob Kazakevich, David Matalon, Alexander Chermyanin, Aleksandr Sedunov
-
Publication number: 20230059726Abstract: A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.Type: ApplicationFiled: August 19, 2022Publication date: February 23, 2023Applicant: Venn Technology CorporationInventors: Aleksandr Osipov, Jacob Kazakevich, David Matalon, Alexander Chermyanin, Aleksandr Sedunov
-
Publication number: 20230058346Abstract: A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.Type: ApplicationFiled: August 19, 2022Publication date: February 23, 2023Applicant: Venn Technology CorporationInventors: Aleksandr Osipov, Jacob Kazakevich, David Matalon, Alexander Chermyanin, Aleksandr Sedunov
-
Publication number: 20230057286Abstract: A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.Type: ApplicationFiled: August 19, 2022Publication date: February 23, 2023Applicant: Venn Technology CorporationInventors: Aleksandr Osipov, Jacob Kazakevich, David Matalon, Alexander Chermyanin, Aleksandr Sedunov
-
Publication number: 20230058203Abstract: A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.Type: ApplicationFiled: August 19, 2022Publication date: February 23, 2023Applicant: Venn Technology CorporationInventors: Aleksandr Osipov, Jacob Kazakevich, David Matalon, Alexander Chermyanin, Aleksandr Sedunov
-
Publication number: 20230053983Abstract: A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.Type: ApplicationFiled: August 18, 2022Publication date: February 23, 2023Applicant: Venn Technology CorporationInventors: Aleksandr Osipov, Jacob Kazakevich, David Matalon, Alexander Chermyanin, Aleksandr Sedunov
-
Publication number: 20230057378Abstract: A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.Type: ApplicationFiled: August 19, 2022Publication date: February 23, 2023Applicant: Venn Technology CorporationInventors: Aleksandr Osipov, Jacob Kazakevich, David Matalon, Alexander Chermyanin, Aleksandr Sedunov
-
Publication number: 20230056056Abstract: A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.Type: ApplicationFiled: August 18, 2022Publication date: February 23, 2023Applicant: Venn Technology CorporationInventors: Aleksandr Osipov, Jacob Kazakevich, David Matalon, Alexander Chermyanin, Aleksandr Sedunov
-
Publication number: 20230054350Abstract: A computer stores, within a single user account, multiple supervised computing resources and multiple additional computing resources. The multiple supervised computing resources are associated with a security policy. The computer executes a first instance of a specified application that lacks read access and lacks write access to any and all of the multiple supervised computing resources. The computer executes, simultaneously with the first instance, a second instance of the specified application that accesses at least a portion of the multiple supervised computing resources. The computer applies rules from the security policy to the second instance of the specified application while foregoing applying the rules from the security policy to the first instance of the specified application.Type: ApplicationFiled: August 18, 2022Publication date: February 23, 2023Applicant: Venn Technology CorporationInventors: Aleksandr Osipov, Jacob Kazakevich, David Matalon, Alexander Chermyanin, Aleksandr Sedunov
-
Publication number: 20130291926Abstract: A solar tracking apparatus is provided having pivoting struts located proximate the north and south sides of the collector surface. The crossed struts permit the inclination angle of the collector surface to be varied throughout the day without heavy supports. The support frame can be adapted for quick assembly, disassembly and transportation.Type: ApplicationFiled: May 1, 2012Publication date: November 7, 2013Applicant: MATALON ENERGY, LLCInventor: David Matalon
-
Publication number: 20130213455Abstract: A hybrid solar collector is disclosed having a passive solar collector unit and active photovoltaic panels. The inclination angle of the photovoltaic panels is optimized by linking the panels to the passive unit and its associated tracking controls.Type: ApplicationFiled: February 22, 2012Publication date: August 22, 2013Applicant: MATALON ENERGY, LLCInventor: David Matalon
-
Publication number: 20120060831Abstract: A passive solar collector utilizes a support constructed of precisely machined foam to simplify the construction and calibration of the reflective surface. Further improvements include sensor-based positioning, and a receiver having inflow and outflow conduits adapted to improve thermal efficiency.Type: ApplicationFiled: November 14, 2011Publication date: March 15, 2012Applicant: MATALON ENERGY, LLCInventor: David Matalon
-
Patent number: 8069849Abstract: A passive solar collector utilizes a support constructed of precisely machined foam to simplify the construction and calibration of the reflective surface. Further improvements include sensor-based positioning, and a receiver having inflow and outflow conduits adapted to improve thermal efficiency.Type: GrantFiled: February 13, 2009Date of Patent: December 6, 2011Assignee: Matalon Energy, LLCInventor: David Matalon
-
Publication number: 20100206296Abstract: A passive solar collector utilizes a support constructed of precisely machined foam to simplify the construction and calibration of the reflective surface. Further improvements include sensor-based positioning, and a receiver having inflow and outflow conduits adapted to improve thermal efficiency.Type: ApplicationFiled: February 13, 2009Publication date: August 19, 2010Applicant: MATALON ENERGY, LLCInventor: David Matalon