Patents by Inventor Ezekiel Kruglick

Ezekiel Kruglick has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160085791
    Abstract: Technologies are generally provided for progressive key value store switchover by evaluating a maturity of a migrated data store and allowing piecewise switching of substructure area query servicing from an origin data store to a destination data store. In some examples, abstractions of origin and destination tree structures may be compared to each other in order to generate an evaluation metric at substantially reduced performance evaluation load. The evaluation metric may target performance sampling while assuring a desired performance level with localized query servicing switchover. Piecewise data transfer may also be optionally enabled such that overall storage can be similar to the storage of a single data store copy while reducing an impact on existing data store services.
    Type: Application
    Filed: July 10, 2015
    Publication date: March 24, 2016
    Inventor: Ezekiel Kruglick
  • Publication number: 20160080515
    Abstract: Technologies are generally described to redirect local storage for embedded applications. In some examples, a computing device such as a redirection router, coupled to network-attached storage, may detect a request for an application being delivered from a server to a destination device such as a ubicomp device and intercept the requested application. The redirection router may determine whether the destination device has sufficient local storage. In response to determination that the destination device does not have sufficient local storage or a predefined configuration such as requesting device being configured for local storage, a reference to the client-side storage associated with the application may be replaced with a link, to the network-attached storage prior to delivery of the application. Subsequent retrievals of the application or portions thereof may be from the network-attached storage directly or via the redirection router.
    Type: Application
    Filed: November 20, 2013
    Publication date: March 17, 2016
    Inventor: Ezekiel Kruglick
  • Patent number: 9288206
    Abstract: Technologies and implementations for secure access to online services are generally disclosed.
    Type: Grant
    Filed: July 9, 2013
    Date of Patent: March 15, 2016
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Ezekiel Kruglick
  • Publication number: 20160072297
    Abstract: Systems and methods to wirelessly transmit power are provided. A coil assembly is provided. In some examples, the coil assembly is configured to generate a signal in response to an ambient field, and to magnetically couple with a device to deliver power to the device.
    Type: Application
    Filed: September 8, 2014
    Publication date: March 10, 2016
    Inventors: Kevin S. FINE, Ezekiel KRUGLICK
  • Publication number: 20160072791
    Abstract: Technologies and implementations for providing a data center access and management settings transfer service are generally disclosed.
    Type: Application
    Filed: November 17, 2015
    Publication date: March 10, 2016
    Applicant: Empire Technology Development LLC
    Inventor: Ezekiel Kruglick
  • Publication number: 20160071128
    Abstract: Technologies are generally described for gathering survey response data from consumers by recovering taggants at disposal. Taggants may be incorporated into an on-product survey response label or into a portion of an item by a manufacturer. Prior to disposal, a consumer may remove one or more taggant incorporated survey response labels to indicate a survey response selection. Removal of the labels may also remove the associated taggants. Upon arrival at a disposal entity, the remaining taggants may be separated from the survey response label or item, machine-read, and/or quantified to generate survey response data. The quantified data may then be sent to another entity, such as the manufacturer, a seller, a marketing company, or similar entity.
    Type: Application
    Filed: May 30, 2013
    Publication date: March 10, 2016
    Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Ezekiel Kruglick
  • Publication number: 20160070599
    Abstract: Technologies are generally described for systems, devices and methods effective to execute a first computing task by a processor of a data center. In some examples, the first computing task may be executed using an instruction set extension. Execution of the first computing task using the instruction set extension may require a first number of clock cycles. In other examples, execution of the first computing task without using the instruction set extension may require a second number of clock cycles. In some examples, a savings value may be determined. The savings value may represent a difference between the first number of clock cycles and the second number of clock cycles. An amount of processing time may be allocated on the processor to a second computing task. The amount of processing time may be based on the savings value. The second computing task may be different from the first computing task.
    Type: Application
    Filed: September 8, 2014
    Publication date: March 10, 2016
    Inventor: EZEKIEL KRUGLICK
  • Patent number: 9282153
    Abstract: Technologies are presented for providing a suggestion list presenting options for posting information related to viewed content on a communication network. In some examples, a user may desire to contribute to posted content by adding comments and other relevant information. A system may identify one or more key terms included in the viewed content, and may compare the key terms with content, such as files, emails, websites, images and media content, on computing devices and web browser histories associated with the user to identify information that may be related to the viewed content. If the system identifies information related to the key terms of the viewed content, the system may present the identified information associated with key terms to the user, and may enable selection from a posting suggestion list for automatically posting.
    Type: Grant
    Filed: July 19, 2012
    Date of Patent: March 8, 2016
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Ezekiel Kruglick
  • Publication number: 20160065452
    Abstract: Technologies are described herein to manage the replacement of routing rules. Some example technologies may receive a request to replace one or more active rules in a routing device with one or more stored rules. Each of the active rules and the stored rules may specify a routing rule that specifies how to route packets within a network. The active rules may be routing rules that are actively being used by the routing device. The stored rules may be routing rules that are not currently in use by the routing device. A determination may be made as to whether a number of active rule replacements for the routing device exceeds a threshold. In response to determining that the number of the active rule replacements exceeds the threshold, the request to replace the one or more active rules in the routing device may be denied.
    Type: Application
    Filed: November 6, 2015
    Publication date: March 3, 2016
    Inventor: Ezekiel KRUGLICK
  • Patent number: 9274822
    Abstract: Technologies are generally provided for reactive loop sensing in multi-datacenter deployments. In some examples, tagged metrics from deployment elements on different datacenter or platform providers may be used by a stability module to generate a synthetic generalized deployment model that aliases multiple system elements into general state vectors. The state vectors may include a transfer vector on the border between each datacenter or platform, and the feedback from the metrics may cause the states of the datacenters/platforms to match the deployment's unobserved variables allowing stability analysis before failure. For example, the metrics may be associated with a portion of the deployment on one of the multiple datacenters. The stability analysis module may compare the received metrics with model metrics derived from a model of the multi-datacenter deployment to determine the stability of the deployment and/or adjust the model for increased stability.
    Type: Grant
    Filed: April 30, 2013
    Date of Patent: March 1, 2016
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Ezekiel Kruglick
  • Publication number: 20160055041
    Abstract: Technologies are generally described to implement loopback simulation of inter-core messages in multicore processors. In some examples, a multicore processor may execute one or more processes, where each process communicates with other processes on or off the processor. Messages originating from processes on the multicore processor and destined for other processes on the multicore processor may be intercepted by a loopback simulator executing on the multicore processor. The loopback simulator may then redirect the intercepted messages to the destination processes on the multicore processor without the messages leaving the multicore processor.
    Type: Application
    Filed: August 25, 2014
    Publication date: February 25, 2016
    Inventor: Ezekiel Kruglick
  • Patent number: 9266020
    Abstract: Technologies are generally described for providing full-motion animation-as-a-service. In some examples, short motion-capture segments may be captured from user motion user interface devices and stored in a database. When a full-motion animation is desired, a start pose and a target pose may be provided, and a multiple-path, multiple-iteration search through the database may be used to assemble the full-motion animation. Motion retargeting may be used to further refine the assembled full-motion animation.
    Type: Grant
    Filed: September 27, 2012
    Date of Patent: February 23, 2016
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Ezekiel Kruglick
  • Patent number: 9268587
    Abstract: Technologies and implementations for testing cloud systems to determine destination cloud system requirements are generally disclosed.
    Type: Grant
    Filed: April 13, 2012
    Date of Patent: February 23, 2016
    Assignee: Empire Technology Development LLC
    Inventor: Ezekiel Kruglick
  • Patent number: 9266201
    Abstract: Technologies are generally described for providing inductively removable assembly bonding. Inductive elements may be placed strategically at bonding locations between two or more coupled components. At disassembly time, the elements may be heated through Radio Frequency (RF) energy causing the bonds to break and components to separate. For example, inductive elements placed near plastic stake bonds between dissimilar materials in an electronic device may be employed to separate the dissimilar materials during a recycling process. According to some examples, the elements may also be heated through a directly applied electric current via a network of connections designed into the assembly.
    Type: Grant
    Filed: October 1, 2013
    Date of Patent: February 23, 2016
    Assignee: Empire Technology Development LLC
    Inventors: Ezekiel Kruglick, Mark Meloni
  • Publication number: 20160048964
    Abstract: Technologies related to scene analysis for improved eye tracking are generally described. In some examples, detected gaze targets may be derived from gaze direction information from an eye-facing sensor. Detected gaze target positions and/or motion may be improved by capturing and analyzing digital scene information from a scene visible by the eye. Digital scene information captured by a digital camera may be analyzed to identify potential gaze targets, such as stationary gaze targets, moving gaze targets, and/or accelerating gaze targets. Detected gaze targets may be modified to positions of selected gaze targets.
    Type: Application
    Filed: August 13, 2014
    Publication date: February 18, 2016
    Inventor: EZEKIEL KRUGLICK
  • Publication number: 20160041836
    Abstract: Technologies are generally described for systems, devices and methods effective to schedule access to a core. In some examples, a first differential voltage frequency scaling (DVFS) value of a first virtual machine may be received by a virtual machine manager. A second DVFS value of a second virtual machine may be received by the virtual machine manager. A third DVFS value of a third virtual machine may be received by the virtual machine manager. The third DVFS value may be substantially the same as the first DVFS value and different from the second DVFS value. A dispatch cycle may be generated to execute the first, second and third virtual machines on the core. After execution of the first virtual machine, the dispatch cycle may require execution of the third virtual machine before execution of the second virtual machine.
    Type: Application
    Filed: October 20, 2015
    Publication date: February 11, 2016
    Inventor: EZEKIEL KRUGLICK
  • Publication number: 20160042181
    Abstract: Technologies are generally described for systems, devices and methods effective to generate an alert in a computing system. In some examples, a read request may be identified to read from a memory location in a memory. The memory location may include first data accessible by a virtual machine and an instance manager module. The first data may be allowed to be read from the memory location. A write request may be identified to write second data to the memory location. A flag may be identified in response to the identification of the write request. The flag may be associated with the memory location. An alert may be generated, based on the identification of the flag and the identification of the write request.
    Type: Application
    Filed: August 7, 2014
    Publication date: February 11, 2016
    Inventor: EZEKIEL KRUGLICK
  • Publication number: 20160035182
    Abstract: Technologies are generally provided for a hybrid architecture of an enhanced networked environment implementing a centralized management of peer-to-peer (P2P) code exchange for secure real-time content distribution. In some examples, central game servers in a massively multiplayer online game (MMOG) service may prepare both P2P admission and eviction planning and P2P element integration packages, instructing a game client whom to send data to while also removing exploitable data from the P2P channel. Thus, large amounts of data may be offloaded from a datacenter hosting an MMOG or similar service involving high numbers of users to P2P connections.
    Type: Application
    Filed: December 19, 2013
    Publication date: February 4, 2016
    Inventor: Ezekiel Kruglick
  • Publication number: 20160034591
    Abstract: Technologies related to observer filtered activity recommendations are generally described. In some examples, a computing device may collect activity and observer information for a device user, may identify limited observer activities, and may generate observer filtered activity recommendations for the device user, the observer filtered activity recommendations corresponding to the identified limited observer activities. Observer filtered activity recommendations may optionally be restricted in the presence of current observers outside a limited observer group. In some examples, the computing device may provide automated access to observer information and/or to observer filtered activity information to enable observer filtered activity recommendations by applications accessing the observer information and/or the observer filtered activity information.
    Type: Application
    Filed: October 2, 2015
    Publication date: February 4, 2016
    Inventor: Ezekiel KRUGLICK
  • Publication number: 20160028757
    Abstract: Technologies are generally described for time-correlating administrative events within virtual machines of a datacenter across many users and/or deployments. In some examples, the correlation of administrative events enables the detection of confluences of repeated unusual events that may indicate a mass hacking attack, thereby allowing attacks kicking network signatures to be detected. Detection of the attack may also allow the repair of affected systems and the prevention of further hacking, before the vulnerability has been analyzed or repaired.
    Type: Application
    Filed: October 1, 2015
    Publication date: January 28, 2016
    Inventor: Ezekiel Kruglick