Patents by Inventor Ido Levy
Ido Levy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10885239Abstract: An example system includes a processor to receive temperature data from a plurality of sensors disposed at locations more sensitive to temperature change in a plurality of server racks. The processor is to also generate a statistical model comprising a continuous spatial statistical distribution of temperature values based on the temperature data. The processor is to further generate a pseudo heat map based on the statistical model.Type: GrantFiled: August 7, 2016Date of Patent: January 5, 2021Assignee: International Business Machines CorporationInventors: Peter Bak, Jonathan Bnayahu, Ido Levy, Amir Malki
-
Publication number: 20180039717Abstract: An example system includes a processor to receive temperature data from a plurality of sensors disposed at locations more sensitive to temperature change in a plurality of server racks. The processor is to also generate a statistical model comprising a continuous spatial statistical distribution of temperature values based on the temperature data. The processor is to further generate a pseudo heat map based on the statistical model.Type: ApplicationFiled: August 7, 2016Publication date: February 8, 2018Inventors: Peter Bak, Jonathan Bnayahu, Ido Levy, Amir Malki
-
Patent number: 8934315Abstract: A memory device to sense a content of a memory cell includes: a pair of bit-lines; a memory cell coupled between the bit-lines; and a sensing circuit. The sensing circuit has at least two inputs for receiving respective currents from a current conveyor, and senses, when operating in a sensing mode, a difference between output currents. The difference between the output currents represents a content of the memory cell. The sensing circuit includes an output for outputting an output signal that represents the content of the memory cell. The current conveyor isolates the sensing circuit from the bit-lines, when the current conveyor is operated in an isolation mode, and has at least two outputs for providing, to the sensing circuit, output currents representing bit-lines currents; and equalizing the output currents before the current conveyor starts to operate in a current conveying mode.Type: GrantFiled: November 12, 2009Date of Patent: January 13, 2015Assignee: Freescale Semiconductor, Inc.Inventors: Ido Levy, Lior Aviv, Eyal Hartmann
-
Publication number: 20150001309Abstract: A communicable drip irrigator including a housing formed with a fluid inlet for receiving irrigation fluid and a fluid outlet for emitting irrigation fluid, and a flow meter associated with the fluid inlet and/or the fluid outlet, configured for obtaining flow data. The irrigator also includes a communication unit associated with the flow meter and configured for providing to a controller, data regarding operation of the drip irrigator, the data including at least the flow data.Type: ApplicationFiled: June 25, 2014Publication date: January 1, 2015Inventors: IDO LEVY, OFER LEVY
-
Patent number: 8752164Abstract: The present invention prevents illegitimate access to a user computing machine. A method in accordance with an embodiment includes: setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access.Type: GrantFiled: May 25, 2008Date of Patent: June 10, 2014Assignee: International Business Machines CorporationInventors: Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ilan Shimony, Grant D. Williamson
-
Publication number: 20120213026Abstract: A memory device and a method for sensing a content of a memory cell.Type: ApplicationFiled: November 12, 2009Publication date: August 23, 2012Applicant: FREESCALE SEMICONDUCTOR, INC.Inventors: Ido Levy, Lior Aviv, Eyal Hartmann
-
Patent number: 7877791Abstract: System, method and program for managing a production server. An authentication server sends to the production server via a network a group password for a GroupID to access a file in the production server. A user at a workstation sends via a network to the authentication server an individual UserID and corresponding individual password for the user and a request for the group password for the GroupID to access a file in the production server protected by the group password. In response, the authentication server authenticates the individual UserID with the corresponding individual password and returns to the workstation the group password for the GroupID. After receiving the group password from the authentication server, the user at the workstation sends via a network to the production server the group password and GroupID and a request to access the file in the production server protected by the group password.Type: GrantFiled: June 19, 2007Date of Patent: January 25, 2011Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Stephen James Watt
-
Publication number: 20090178135Abstract: The present invention prevents illegitimate access to a user computing machine. A method in accordance with an embodiment includes: setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access.Type: ApplicationFiled: May 25, 2008Publication date: July 9, 2009Inventors: Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ilan Shimony, Grant D. Williamson
-
Publication number: 20080320574Abstract: System, method and program for managing a production server. An authentication server sends to the production server via a network a group password for a GroupID to access a file in the production server. A user at a workstation sends via a network to the authentication server an individual UserID and corresponding individual password for the user and a request for the group password for the GroupID to access a file in the production server protected by the group password. In response, the authentication server authenticates the individual UserID with the corresponding individual password and returns to the workstation the group password for the GroupID. After receiving the group password from the authentication server, the user at the workstation sends via a network to the production server the group password and GroupID and a request to access the file in the production server protected by the group password.Type: ApplicationFiled: June 19, 2007Publication date: December 25, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Stephen James Watt
-
Publication number: 20080235302Abstract: The invention is directed to the transparent allocation of a unique per user /tmp file system. A method in accordance with an embodiment of the present invention includes: manipulating an operating system to provide each user with a private temporary file system; and constraining a process of the user to the user's private temporary file system.Type: ApplicationFiled: March 19, 2007Publication date: September 25, 2008Inventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Stephen J. Watt
-
Publication number: 20080201435Abstract: A method and system for ordering addressees in address fields (141-143) is provided. The method includes entering a plurality of addresses in an address field (141-143) of a message; selecting an ordering policy (134); and ordering (132) the addresses in the address field (141-143) in accordance with the selected ordering policy. The ordering policy (134) may include general ordering policies such as alphabetical ordering, or flattering ordering in which the recipient's address is at the head of the address field. Weightings for individual addressees may be defined. Weightings may be absolute and/or relative to other addressees. An ordering policy (134) may be selected for each of the address fields “To:”, “Cc:”, and “Bcc:”.Type: ApplicationFiled: February 20, 2007Publication date: August 21, 2008Inventors: Oded Dubovsky, Itzhack Goldberg, Ido Levy, Maya Shiran
-
Publication number: 20080126787Abstract: Managing default values. A determination is automatically made that the first program is operating in the batch mode in which user interaction is not intended to affirm or change default values. In response, first current default values for input to the first program are determined, and a determination is made whether a user previously entered or affirmed the first current default values in an interactive mode. If so, the first program is allowed to proceed with operation using the first current default values. If not, the first program is not allowed to proceed with operation using the first current default values. A determination is automatically made that the second program is operating in the interactive mode in which user interaction is intended to affirm or change default values.Type: ApplicationFiled: June 5, 2006Publication date: May 29, 2008Applicant: International Business Machines CorporationInventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ziv Rafalovich, Martin J. Tross
-
Publication number: 20070282982Abstract: A system for policy-based management in a computer environment, the system including at least one rule configured to be applied to an element of a computer environment, at least one policy including at least one of the rules, at least one profile including at least one element of the computer environment, at least one association defining a relationship between one of the policies and one of the profiles, and a computer configured to instaniate any of the associations, thereby invoking any of the rules included in the related policy for application to any of the elements in the related profile.Type: ApplicationFiled: June 5, 2006Publication date: December 6, 2007Inventors: Rhonda Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ziv Rafalovich, Ramakrishnan Rajamony, Eric Van Hensbergen, Martin Tross