Patents by Inventor Itzhack Goldberg

Itzhack Goldberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100088343
    Abstract: Techniques are disclosed for customizing a context structure such as a context menu based on content associated with an object such as a computer file. For example, a computer-implemented method for customizing a context structure associated with an object comprises the following steps. A content analysis is performed on the object. The context structure associated with the object is modified based on at least a portion of results of the content analysis.
    Type: Application
    Filed: October 6, 2008
    Publication date: April 8, 2010
    Inventors: Itzhack Goldberg, Ohad Greenshpan, Jonathan Joseph Mamou, Shmuel Ben-Yehuda
  • Patent number: 7685461
    Abstract: A method, apparatus and program storage device for performing fault tolerant code upgrade on a fault tolerant system by determining when functional code reaches a desired state before resuming an upgrade. A concurrent code-load to a plurality of storage controllers of a storage system is initiated. A role transition is detected. The storage system determines when the storage system returns to a desired state. The code-load is resumed when the storage system returns to the desired state.
    Type: Grant
    Filed: December 20, 2006
    Date of Patent: March 23, 2010
    Assignee: International Business Machines Corporation
    Inventors: Jimmie Lee Brundidge, Chiahong Chen, Itzhack Goldberg, Daniel Anson Heffley
  • Publication number: 20100070587
    Abstract: A method for utilizing embedded resurfacing logic in electronic mail (email), the method includes: receiving an email with embedded resurfacing logic at a recipient's email client; determining whether the recipient has opened the email; wherein in the event the email has not been opened: determining whether a triggering event has occurred; wherein in the event a triggering event has occurred and has not exceeded a maximum number of triggering events: generating a resurfaced email entry at the top of the recipients email inbox, and wherein the triggering event is a predefined time interval in which the recipient has not opened the email.
    Type: Application
    Filed: September 15, 2008
    Publication date: March 18, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack Goldberg, Avner Levi, Uri Silbershtein, Mary Ellen Zurko
  • Publication number: 20100048182
    Abstract: A method for reaching a communications service subscriber who does not answer an incoming communications request to the subscriber's communications device, the method including detecting that an incoming communications request received at a first communications device is not answered, locating a second communications device within a predefined distance from the first communications device, and sending a message to the second communications device indicating the receipt of the incoming communications request at the first communications device.
    Type: Application
    Filed: August 25, 2008
    Publication date: February 25, 2010
    Inventors: Shay Ben-David, Itzhack Goldberg, Boaz Mizrachi
  • Publication number: 20100042412
    Abstract: Techniques for notifying at least one entity of an occurrence of an event in an audio signal are provided. At least one preference is obtained from the at least one entity. An occurrence of an event in the audio signal is determined. The event is related to at least one of at least one speaker and at least one topic. The at least one entity is notified of the occurrence of the event in the audio signal, in accordance with the at least one preference.
    Type: Application
    Filed: August 18, 2008
    Publication date: February 18, 2010
    Inventors: Hagai Aronowitz, Itzhack Goldberg, Ron Hoory
  • Publication number: 20100036916
    Abstract: A method includes steps of: receiving a prompt from a user to activate a message interface in order to begin a session; activating the message interface such that said message interface is presented to the user and is able to receipt input from the user; receiving user input from the message interface, including: a user selection of at least one target correspondent; and a first message to be sent to the at least one target correspondent; identifying the session with a unique identifier; and sending the first message to a messaging system for delivery to the target correspondent when the target correspondent is available.
    Type: Application
    Filed: August 5, 2008
    Publication date: February 11, 2010
    Applicant: International Business Machines Corporation
    Inventors: Barbara Finkelstein, Itzhack Goldberg, Boaz Mizrachi, Vladimir Soroka
  • Patent number: 7661018
    Abstract: A method, apparatus and program storage device for providing automatic recovery from premature reboot of a system during a concurrent upgrade is disclosed. A concurrent code-load to a plurality of storage controllers of a storage system is initiated. A code-load failure is detected. The stage of the code-load failure is identified. A code-load recovery process based upon the identification of the stage that the code-load failure occurred is initiated.
    Type: Grant
    Filed: December 21, 2006
    Date of Patent: February 9, 2010
    Assignee: International Business Machines Corporation
    Inventors: Jimmie Lee Brundidge, Chiahong Chen, Itzhack Goldberg, Yotam Medini
  • Publication number: 20100031146
    Abstract: A computer implemented method in a data processing system and a computer program product enable visual selection of a media signal. A set of media signals is received from a set of media providers. A subject matter and a performer of the subject matter are then identified for at least one of the set of media signals. A set of icons is then identified. Each of the set of icons corresponds to at least one of media signals. The set of icons and the set of media providers are then forwarded to a client media player.
    Type: Application
    Filed: August 1, 2008
    Publication date: February 4, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Barbara Finkelstein, Itzhack Goldberg, Ron Hoory, Boaz Mizrachi
  • Publication number: 20100031343
    Abstract: Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period.
    Type: Application
    Filed: July 29, 2008
    Publication date: February 4, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Moriel Lechtman, Yotam Medini
  • Publication number: 20090249044
    Abstract: a novel and useful apparatus for and method of associating a dedicated coverage bit to each instruction in a software system. Coverage bits are set every time the software application runs, enabling a more comprehensive and on-going code coverage analysis. The code coverage bit mechanism enables code coverage analysis for all installations of a software application, not just software in development mode or at a specific installation. Code coverage bits are implemented in either the instruction set architecture (ISA) of the central processing unit, the executable file of a software application, a companion file to the executable file or a code coverage table residing in memory of the computer system.
    Type: Application
    Filed: March 26, 2008
    Publication date: October 1, 2009
    Inventors: Daniel Citron, Itzhack Goldberg, Moshe Klausner, Marcel Zalmanovici
  • Publication number: 20090210938
    Abstract: Illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for previous password based authentication. In one illustrative embodiment, the computer implemented method comprises obtaining a combination of an identifier and a password and determining whether the password is current and correct. The computer implemented method responsive to determining the password is other than current and correct, prompting for an old password and determining whether the old password matches a previous password. Responsive to the old password matching a previous password, thereby creating a password match, permitting access to a resource.
    Type: Application
    Filed: February 19, 2008
    Publication date: August 20, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda L. Childress, Itzhack Goldberg, David Bruce Kumhyr, Moriel Lechtman
  • Publication number: 20090204946
    Abstract: A method for modifying executable logic code stored on a computing system is provided. The method comprises assessing a risk level associated with modifying a first code block and assessing an urgency level associated with modifying the first code block and then evaluating whether the first code block should be modified.
    Type: Application
    Filed: February 12, 2008
    Publication date: August 13, 2009
    Applicant: International Business Machines Corporation
    Inventors: Shachar Fienblit, Itzhack Goldberg, Aviad Zlotnick
  • Publication number: 20090174534
    Abstract: A vehicle antitheft system and method detects the starting of a vehicle and starts a first timer. If the first timer times out without the system having detected a first predetermined sequence, the system actuates a vehicle system warning signal and starts a second timer. If the second timer times out without detecting a second predetermined sequence, which may be the same as or different from the first predetermined sequence, the system disables the vehicle. The system may send vehicle location information to a monitoring service or the like. The vehicle remains disabled until the antitheft system is reset.
    Type: Application
    Filed: January 9, 2008
    Publication date: July 9, 2009
    Inventors: Nicholas Duane Fifer, Itzhack Goldberg, Julianne Frances Haugh, Boaz Mizrachi
  • Publication number: 20090178135
    Abstract: The present invention prevents illegitimate access to a user computing machine. A method in accordance with an embodiment includes: setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access.
    Type: Application
    Filed: May 25, 2008
    Publication date: July 9, 2009
    Inventors: Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ilan Shimony, Grant D. Williamson
  • Patent number: 7552185
    Abstract: A method of managing the entry of individuals or email groups into their intended recipient field within a sender's email is disclosed. A predefined, static association between an intended recipient or email group and a To, CC, or BCC recipient field may be created by a sender. A new email message graphical user interface having General, To, CC, and BCC fields contained within the header is provided. When an individual or group is entered into the General recipient field it is automatically delegated to the To, CC, or BCC field with which it is associated. Provisions for ensuring that recipients with multiple field associations do not exist, that recipients with a predefined association are not entered into an incorrect field, for creating a predefined association with two recipient fields, and for creating a predefined association when none exists are also provided.
    Type: Grant
    Filed: July 28, 2008
    Date of Patent: June 23, 2009
    Assignee: International Business Machines Corporation
    Inventors: Eli Kirzner, Itzhack Goldberg, Yotam Medini, Boaz Mizrachi
  • Publication number: 20090157858
    Abstract: Methods, apparatus, and products for managing virtual addresses of blade servers in a data center are disclosed that include storing, by a blade server management module (‘BSMM’) in non-volatile memory of a blade server, a parameter block, the parameter block including one or more virtual addresses for communications adapters of the blade server and one or more action identifiers; detecting, by a BIOS module of the blade server upon powering on the blade server, the parameter block; disabling, by the BIOS module, in dependence upon the one or more action identifiers of the parameter block, an original address of at least one communications adapter of the blade server; and setting, by the BIOS module, an address of the communications adapter to a virtual address included in the parameter block.
    Type: Application
    Filed: December 15, 2007
    Publication date: June 18, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Joseph E. Bolan, Gregory W. Dake, Scott N. Dunham, Itzhack Goldberg, Andrew B. McNeill, JR., Martin J. Tross, Theodore B. Vojnovich, Ben-Ami Yassour
  • Publication number: 20090113014
    Abstract: A method for providing an alert indication, the method includes: allowing a first user to define an alert to be generated in response to an availability of a second user to participate in an instant messaging session; and sending to the second user an alert indication indicative of the alert.
    Type: Application
    Filed: October 29, 2007
    Publication date: April 30, 2009
    Inventors: Itzhack Goldberg, Boaz Mizrachi
  • Publication number: 20090100497
    Abstract: The illustrative embodiments described herein provide a computer-implemented method, apparatus, and computer program product for preventing a set of users from accessing a message in an instant messaging system. The process determines whether a message received by a receiving computing device from a sending computing device is undetected by a set of users associated with the receiving computing device. The process notifies the sending computing device that the message is undetected by the set of users in response to determining that the message is undetected by the set of users associated with the receiving computing device. The process prevents the set of users from accessing the message in response to receiving a request to prevent the set of users from accessing the message.
    Type: Application
    Filed: October 11, 2007
    Publication date: April 16, 2009
    Inventors: Itzhack Goldberg, Ido Guy, Boaz Mizrachi, Vladimir Soroka
  • Publication number: 20090100419
    Abstract: Embodiments of the invention provide a computer implemented method and system for installing a patch on at least some of the servers of a network having multiple servers. The method comprises the steps of identifying a plurality of servers of the network that each requires installation of the patch, and assigning two or more priority values to each of the identified servers. The priority values for a given identified server are each associated with a different criterion in a set of criteria. The method further comprises selectively processing the assigned priority values for respective identified servers, in order to determine an initial priority, comprising a first sort order, for installing the patch on each identified server. The first sort order is revised in accordance with information pertaining to prior use of respective identified servers, to provide a second sort order. The patch is installed on each of the identified servers, in an order determined at least in part by the second sort order.
    Type: Application
    Filed: October 12, 2007
    Publication date: April 16, 2009
    Inventors: Rhonda L. Childress, Itzhack Goldberg, David Bruce Kumhyr, Stephen James Watt
  • Patent number: 7519164
    Abstract: A method for sending one or more telephone numbers between a first telephonic device and a second telephonic device while a telephone call is in progress comprises initiating a telephone call between a first telephonic device and a second telephonic device, entering a plurality of digits into a keypad of the first telephonic device to generate a plurality of dual-tone multi-frequency signals, measuring an elapsed time between the entry of each of the digits, comparing the elapsed time between the entry of each of the digits with a standard inter-digit time gap, determining a number of digit sequences entered based upon the comparison of the elapsed time between the entry of each of the digits and the standard inter-digit time gap, wherein the number of digit sequences entered corresponds with one or more telephone numbers, detecting the dual-tone multi-frequency signals with the digital signal processor of the second telephonic device, decoding the detected dual-tone multi-frequency signals with the digital s
    Type: Grant
    Filed: April 1, 2008
    Date of Patent: April 14, 2009
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Aviad Zlotnick