Patents by Inventor Itzhack Goldberg

Itzhack Goldberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8589882
    Abstract: A method that may include: monitoring over time, actions carried out by at least one programmer over a software development environment to yield development patterns; comparing the development patterns to best practice rules to yield a comparison results indicating deviations of the development patterns from the best practice rules; and analyzing the comparison results based at least partially on a likelihood of each action deviated from the respective best practice rule to result in a software bug, to yield an analysis of potential software bug prone code sections, wherein at least one of the monitoring, the comparing, and the analyzing is executed by at least one processor.
    Type: Grant
    Filed: June 22, 2010
    Date of Patent: November 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Moran Shochat, Itzhack Goldberg, Aviad Zlotnick, Shmuel Ur
  • Patent number: 8572137
    Abstract: A computer-implemented method for efficient data storage is provided. A first storage medium associates data stored on one or more data storage media with a unique identification value (ID) for the purpose of determining de-duplication status of the data. In response to receiving a request to read the data from a logical address, the first storage medium retrieves the data from a second storage medium based on the unique ID. In response to receiving a request to write the data to a logical address, the one or more data storage media store at least one copy of the data based on the de-duplication status of the data.
    Type: Grant
    Filed: September 8, 2009
    Date of Patent: October 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Shachar Fienblit, Itzhack Goldberg, Evgeny Schmeilin, Aviad Zlotnick
  • Publication number: 20130275679
    Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that include receiving a storage command from a host computer to retrieve first data from a specific physical region of a storage device, and responsively retrieving second data from one or more additional physical regions of the storage device based on a logical mapping managed by the host computer. The second data is conveyed to a cache. In some embodiments, the logical mapping is received from the host computer prior to receiving the storage command. In alternative embodiments, the logical mapping is retrieved from the storage device prior to receiving the storage command.
    Type: Application
    Filed: April 16, 2012
    Publication date: October 17, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack GOLDBERG, Stephen Alfred HALEY, Moriel LECHTMAN
  • Publication number: 20130238737
    Abstract: A method, system and computer program product for providing a collaborative status message in an instant messaging system. Instant Messaging (“IM”) users that belong to a group are identified. A collaborative status message (e.g., “In Meeting with User 2 and User 3”) is generated that specifies the IM users of the group (e.g., User 2 and User 3) that are participating in an event (e.g., meeting) with an IM user upon the event occurring. The collaborative status message is broadcasted to other IM users. In this manner, more detailed information can be provided to other IM users regarding the status of the IM user in question.
    Type: Application
    Filed: April 30, 2013
    Publication date: September 12, 2013
    Applicant: International Business Machines Corporation
    Inventors: Howard R. Davidson, Itzhack Goldberg, Boaz Mizrachi, Timothy P. Winkler
  • Publication number: 20130238716
    Abstract: A method, system and computer program product for providing a collaborative status message in an instant messaging system. Instant Messaging (“IM”) users that belong to a group are identified. A collaborative status message (e.g., “In Meeting with User 2 and User 3”) is generated that specifies the IM users of the group (e.g., User 2 and User 3) that are participating in an event (e.g., meeting) with an IM user upon the event occurring. The collaborative status message is broadcasted to other IM users. In this manner, more detailed information can be provided to other IM users regarding the status of the IM user in question.
    Type: Application
    Filed: March 7, 2012
    Publication date: September 12, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Howard R. Davidson, Itzhack Goldberg, Boaz Mizrachi, Timothy P. Winkler
  • Publication number: 20130191606
    Abstract: An initial remote region of a first remote storage device of a remote storage system not matching a corresponding local region of a local storage device of a remote local system is detected. A subsequent remote region on the remote storage system—matching the initial remote region is identified. Data in the initial remote region is replaced with data from the subsequent remote region.
    Type: Application
    Filed: January 23, 2012
    Publication date: July 25, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Itzhack GOLDBERG
  • Publication number: 20130191337
    Abstract: An initial remote region of a first remote storage device of a remote storage system not matching a corresponding local region of a local storage device of a remote local system is detected. A subsequent remote region on the remote storage system matching the initial remote region is identified. Data in the initial remote region is replaced with data from the subsequent remote region.
    Type: Application
    Filed: June 28, 2012
    Publication date: July 25, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Itzhack GOLDBERG
  • Publication number: 20130179479
    Abstract: In one example, an indication is detected that an application has performed a file operation on a file and a computing system determines whether a datastore includes an association between an application identifier that identifies the application and a file identifier that identifies the file. If not, the association between the application identifier and the file identifier is stored. A computing system also determines whether execution behavior of the application changes when the file is not accessible to the application. Responsive to a change in execution behavior of the application, a status indicator is associated with the file identifier to indicate that the execution behavior of the application changes when the file is not accessible to the application.
    Type: Application
    Filed: January 6, 2012
    Publication date: July 11, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Al Chakra, Itzhack Goldberg, John Rice
  • Patent number: 8473294
    Abstract: Techniques for notifying at least one entity of an occurrence of an event in an audio signal are provided. At least one preference is obtained from the at least one entity. An occurrence of an event in the audio signal is determined. The event is related to at least one of at least one speaker and at least one topic. The at least one entity is notified of the occurrence of the event in the audio signal, in accordance with the at least one preference.
    Type: Grant
    Filed: March 30, 2012
    Date of Patent: June 25, 2013
    Assignee: International Business Machines Corporation
    Inventors: Hagai Aronowitz, Itzhack Goldberg, Ron Hoory
  • Patent number: 8392966
    Abstract: Provided are a method, system, and article of manufacture for limiting the availability of computational resources to a device to stimulate a user of the device to apply necessary updates. Indication of the n update to the device is received and a determination is made as to whether the update has been applied to the device. The availability of computational resources at the device to use to execute processes at the device are limited in response to determining that the update has not been applied to the device. Processes are executed at the device using the limited available computational resources after the limiting of the availability of the computational resources. A determination is made as to whether the update has been applied to the device after limiting the availability of the computational resources. The limiting of the availability of the computational resources at the device is reversed in response to determining that the update to the device was applied.
    Type: Grant
    Filed: January 6, 2009
    Date of Patent: March 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Nicholas Duane Fifer, Ilan Gayda, Itzhack Goldberg, Boaz Mizrachi, Uri Silbershtein
  • Patent number: 8392516
    Abstract: An apparatus, system, and method are disclosed to display a set of email messages based on response time trends. An email identification module identifies a set of email messages for a user. A response time identification module determines one or more response time trends and each response time trend corresponds to at least one email message in the set of email messages. An email display module displays the set of email messages to the user. A response time display module displays a visual representation of each response time trend to the user such that each visual representation is visually associated with the at least one email message in the displayed set of email messages.
    Type: Grant
    Filed: October 13, 2009
    Date of Patent: March 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Lisa Seacat Deluca, Itzhack Goldberg, Ohad Greenshpan, Boaz Mizrachi
  • Publication number: 20130055370
    Abstract: A system includes a location look-up module that determines a current location for a user log-on to the network, and determines a next location of the user log-on to the network. An analyzer module analyzes at least one portion of the network for potential future location information for authenticating with the determined next location by an authorization module. The authorization module authenticates the next log-on to the network based on a comparison with the potential future location information.
    Type: Application
    Filed: August 24, 2011
    Publication date: February 28, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack Goldberg, Boaz Mizrachi
  • Patent number: 8375093
    Abstract: An apparatus, system, and method are disclosed for retaining email response time trends. A send module determines a send time, the time that a user sends an email message to a recipient. A receive module determines a receive time, the time that the user receives a response from the recipient. A response time module determines a response time that corresponds to the email message based on an elapsed time between the send time and the receive time. A content identifier module determines a content identifier for the email message. A trend module determines a response time trend that corresponds to the recipient and the content identifier based on the response time and on a plurality of previous response times of the recipient. The plurality of previous response times correspond to a plurality of previous email messages between the user and the recipient that match the content identifier.
    Type: Grant
    Filed: October 13, 2009
    Date of Patent: February 12, 2013
    Assignee: International Business Machines Corporation
    Inventors: Lisa Seacat Deluca, Itzhack Goldberg, Ohad Greenshpan, Boaz Mizrachi
  • Patent number: 8370925
    Abstract: Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period.
    Type: Grant
    Filed: July 29, 2008
    Date of Patent: February 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Moriel Lechtman, Yotam Medini
  • Patent number: 8365245
    Abstract: Illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for previous password based authentication. In one illustrative embodiment, the computer implemented method comprises obtaining a combination of an identifier and a password and determining whether the password is current and correct. The computer implemented method responsive to determining the password is other than current and correct, prompting for an old password and determining whether the old password matches a previous password. Responsive to the old password matching a previous password, thereby creating a password match, permitting access to a resource.
    Type: Grant
    Filed: February 19, 2008
    Date of Patent: January 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, David Bruce Kumhyr, Moriel Lechtman
  • Publication number: 20130013666
    Abstract: A data transmission optimization method and system. The method comprises analyzing program code to identify data access calls in the program code, using one or more processor; determining whether a first data access call is for retrieving target data stored in a data structure with a plurality of fields, wherein the target data is stored in one or more target fields of the data structure; determining whether servicing the first data access call will result in transfer of non-target data stored in one or more non-target fields in the data structure; and replacing the first data access call with a second data access call, wherein servicing the second data access call will result in transfer of the target data and minimizes the transfer of non-target data.
    Type: Application
    Filed: July 7, 2011
    Publication date: January 10, 2013
    Applicant: International Business Machines Corporation
    Inventors: Muli Ben-Yehuda, Daniel Citron, Itzhack Goldberg, Nadav Har'El, Dorit Nuzman, Ayal Zaks
  • Publication number: 20130007487
    Abstract: A trigger can relate to power usage of a computing device that a computer program to be run or running on the computing device causes. Detection of the trigger causes performance of a power-saving action. The power-saving action relates to the computer program to reduce the power usage of the computing device. The power-saving action is a strictly software-oriented action. An amount of power of the computing device used in detecting the trigger and performing the power-saving action is less than a reduction of the power usage of the computing device that results from performing the power-saving action, resulting in a net power usage reduction.
    Type: Application
    Filed: May 1, 2012
    Publication date: January 3, 2013
    Inventors: Al Chakra, Itzhack Goldberg, Liam Harpur, John Rice
  • Publication number: 20130007481
    Abstract: A trigger can relate to power usage of a computing device that a computer program to be run or running on the computing device causes. Detection of the trigger causes performance of a power-saving action. The power-saving action relates to the computer program to reduce the power usage of the computing device. The power-saving action is a strictly software-oriented action. An amount of power of the computing device used in detecting the trigger and performing the power-saving action is less than a reduction of the power usage of the computing device that results from performing the power-saving action, resulting in a net power usage reduction.
    Type: Application
    Filed: June 30, 2011
    Publication date: January 3, 2013
    Inventors: Al Chakra, Itzhack Goldberg, Liam Harpur, John Rice
  • Publication number: 20120330951
    Abstract: A method, system and computer program product for providing accurate recipients lists. Keywords (e.g., processor, monitor) in a document (e.g., electronic mail message) are identified. These keywords are tagged, where tagging refers to an index term assigned to a piece of information, such as these keywords. A list of recipients may be provided to be correlated with these tagged keywords. The list of recipients is associated with these tagged keywords thereby providing a predefined recipient list to be used when a subsequent document with these tagged keywords is identified. Furthermore, the user is provided an option to modify this recipient list when a subsequent document containing the tagged keywords associated with the recipient list is identified thereby ensuring an accurate recipient list is used.
    Type: Application
    Filed: June 23, 2011
    Publication date: December 27, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Al Chakra, Gary Denner, Itzhack Goldberg, Mette F. Hammer, George Kyriacou, Patrick J. O'Sullivan
  • Patent number: 8326999
    Abstract: An approach is provided to establish, over a network adapter, network sessions with various client computer systems. Requests for a webpage are received at the network adapter from the client computer systems. The requested webpage is retrieved from a storage area. Multiple timeout intervals are initialized and stored in a memory area, wherein each of the plurality timeout intervals corresponds to one of the client computer systems. The timeout intervals that are initialized are different for at least some of the client computer systems. The requested webpage is returned to the client computer systems. When a timeout interval elapses for any of the client computer systems, the system terminates the session that was established with the client computer system.
    Type: Grant
    Filed: June 2, 2009
    Date of Patent: December 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: Channing W. Fell, Jr., Itzhack Goldberg, Julianne Frances Haugh