Patents by Inventor Itzhack Goldberg

Itzhack Goldberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090055481
    Abstract: The present invention discloses an email application that includes a subject evaluation engine, which is able to automatically generate a subject heading suggestion for an email message based upon content contained in the email message. The subject evaluation engine can also compare a pre-existing subject heading of the email message against content contained in the email message. User selectable interface elements can be included in the email application for invoking the suggestion and comparison functions of the subject evaluation engine. Further, the subject evaluation can automatically be initiated before an email message is sent, can be used to notify a user when the message's subject is inconsistent with the message's content, and can suggest one or more replacement subject headings for the current heading.
    Type: Application
    Filed: August 20, 2007
    Publication date: February 26, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: DAVID CARMEL, SHAI ERERA, ITZHACK GOLDBERG, BOAZ MIZRACHI
  • Publication number: 20080320574
    Abstract: System, method and program for managing a production server. An authentication server sends to the production server via a network a group password for a GroupID to access a file in the production server. A user at a workstation sends via a network to the authentication server an individual UserID and corresponding individual password for the user and a request for the group password for the GroupID to access a file in the production server protected by the group password. In response, the authentication server authenticates the individual UserID with the corresponding individual password and returns to the workstation the group password for the GroupID. After receiving the group password from the authentication server, the user at the workstation sends via a network to the production server the group password and GroupID and a request to access the file in the production server protected by the group password.
    Type: Application
    Filed: June 19, 2007
    Publication date: December 25, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Stephen James Watt
  • Publication number: 20080310605
    Abstract: A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device.
    Type: Application
    Filed: June 12, 2007
    Publication date: December 18, 2008
    Inventors: Itzhack Goldberg, Samuel Kallner, Yotam Medini, Kenneth Nagin
  • Publication number: 20080276306
    Abstract: A method for implicit authorization to a computer resource includes defining a behavioral signature including a plurality of defined computer actions known to an authorized user of the computer resource. A first performed computer action of a user is registered. The first performed computer action is compared with a first defined computer action of the plurality of defined computer actions, wherein, if the first performed computer action and the first defined computer action match, an authentication state is changed from a first authentication state to a second authentication state.
    Type: Application
    Filed: May 2, 2007
    Publication date: November 6, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nicholas D. Fifer, Itzhack Goldberg, Julianne F. Haugh
  • Publication number: 20080250114
    Abstract: A computer-implemented method for mitigating address book weaknesses that permit sending of e-mail to wrong addresses includes determining prior to sending an e-mail message whether one of a plurality of recipients of an e-mail message should receive the e-mail message, the determining prior to sending the e-mail message including analyzing history information of a sender of the e-mail message to determine whether the one of the plurality of recipients is ordinarily connected with the plurality of recipients and whether the one of the plurality of recipients is ordinarily connected with a subject of the e-mail message, the analyzing history information including comparing the plurality of recipients to a database indicative of recipients that received e-mail from the sender, and, responsive to the history information, determining whether the one of the plurality of recipients is one of a new recipient and an ordinary recipient, and presenting the determining to the sender.
    Type: Application
    Filed: June 30, 2008
    Publication date: October 9, 2008
    Applicant: International Business Machines Corporation
    Inventors: Oded DUBOVSKY, Itzhack GOLDBERG, Boaz MIZRACHI
  • Publication number: 20080235024
    Abstract: A method and system are provided for text-to-speech synthesis with personalized voice. The method includes receiving an incidental audio input (403) of speech in the form of an audio communication from an input speaker (401) and generating a voice dataset (404) for the input speaker (401). The method includes receiving a text input (411) at the same device as the audio input (403) and synthesizing (312) the text from the text input (411) to synthesized speech including using the voice dataset (404) to personalize the synthesized speech to sound like the input speaker (401). In addition, the method includes analyzing (316) the text for expression and adding the expression (315) to the synthesized speech. The audio communication may be part of a video communication (453) and the audio input (403) may have an associated visual input (455) of an image of the input speaker.
    Type: Application
    Filed: March 20, 2007
    Publication date: September 25, 2008
    Inventors: Itzhack Goldberg, Ron Hoory, Boaz Mizrachi, Zvi Kons
  • Publication number: 20080235302
    Abstract: The invention is directed to the transparent allocation of a unique per user /tmp file system. A method in accordance with an embodiment of the present invention includes: manipulating an operating system to provide each user with a private temporary file system; and constraining a process of the user to the user's private temporary file system.
    Type: Application
    Filed: March 19, 2007
    Publication date: September 25, 2008
    Inventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Stephen J. Watt
  • Publication number: 20080222700
    Abstract: a secure challenge-response virtualization system including a computer having a memory divided into at least a first and a second logical partition, where the first partition is operative to receive a challenge from an entity, and a challenge/response manager configured with the second partition, where the first partition is configured to provide the challenge to the challenge/response manager configured with the second partition, and where the challenge/response manager is configured to generate a response to the challenge and provide the response to the first partition.
    Type: Application
    Filed: March 7, 2007
    Publication date: September 11, 2008
    Inventors: Itzhack Goldberg, Ilan Shimony
  • Publication number: 20080208983
    Abstract: Systems and methods for providing information regarding mailing list aliases to recipients of email messages that are sent using mailing list aliases are provided in the present invention. A method for providing information regarding mailing list aliases in an email message is provided. The method includes displaying an email message including at least one mailing list alias, and displaying a scope indicator in association with the mailing list alias, wherein the scope indicator provides a visual indication that a plurality of email addresses are mapped to the mailing list alias.
    Type: Application
    Filed: February 28, 2007
    Publication date: August 28, 2008
    Inventors: Boaz Mizrachi, Itzhack Goldberg
  • Publication number: 20080208981
    Abstract: A method for providing information regarding mailing list aliases, the method including displaying an email message including at least one mailing list alias, and displaying an email address of a recipient of the email message in association with the mailing list alias.
    Type: Application
    Filed: February 28, 2007
    Publication date: August 28, 2008
    Inventors: Itzhack Goldberg, Yotam Medini, Boaz Mizrachi, Kenneth Nagin
  • Publication number: 20080201694
    Abstract: A system and method for restoring a computing system to a first operating state associated with a first system software code installed on the computing system is provided. The method comprises installing a second system software code on the computing system, while the system is operating in the first operating state. The second system software code is activated and the first system software code is deactivated to cause the computing system to operate in a second operating state. The first system software code is activated and the second system software code is deactivated to cause the system to return to the first operating state, if activation of the second system software code causes the system to operate in an undesirable manner.
    Type: Application
    Filed: February 21, 2007
    Publication date: August 21, 2008
    Inventors: Itzhack Goldberg, Yotam Medini, Kenneth Nagin, Shmuel Vashdi
  • Publication number: 20080201435
    Abstract: A method and system for ordering addressees in address fields (141-143) is provided. The method includes entering a plurality of addresses in an address field (141-143) of a message; selecting an ordering policy (134); and ordering (132) the addresses in the address field (141-143) in accordance with the selected ordering policy. The ordering policy (134) may include general ordering policies such as alphabetical ordering, or flattering ordering in which the recipient's address is at the head of the address field. Weightings for individual addressees may be defined. Weightings may be absolute and/or relative to other addressees. An ordering policy (134) may be selected for each of the address fields “To:”, “Cc:”, and “Bcc:”.
    Type: Application
    Filed: February 20, 2007
    Publication date: August 21, 2008
    Inventors: Oded Dubovsky, Itzhack Goldberg, Ido Levy, Maya Shiran
  • Publication number: 20080189694
    Abstract: A defective self-sustained code-upgrade code is recovered. A relevant unset variable is set to avoid an un-initialized command failure. A relevant set variable is unset to render a second invocation of the set variable to appear as a first invocation A fix-named file is retrieved containing a plurality of code entries organized in a stanza style. The fixed-named file is executed. The plurality of stanza-organized entries are sourced by the defective code-upgrade code to change a variable which has been previously set, thereby overriding an existing process.
    Type: Application
    Filed: February 6, 2007
    Publication date: August 7, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nicholas D. Fifer, Ilan Gayda, Itzhack Goldberg, Kenneth Nagin
  • Publication number: 20080155333
    Abstract: A method, apparatus and program storage device for providing automatic recovery from premature reboot of a system during a concurrent upgrade is disclosed. A concurrent code-load to a plurality of storage controllers of a storage system is initiated. A code-load failure is detected. The stage of the code-load failure is identified. A code-load recovery process based upon the identification of the stage that the code-load failure occurred is initiated.
    Type: Application
    Filed: December 21, 2006
    Publication date: June 26, 2008
    Applicant: International Business Machines Corporation
    Inventors: Jimmie Lee Brundidge, Chiahong Chen, Itzhack Goldberg, Yotam Medini
  • Publication number: 20080155322
    Abstract: A method, apparatus and program storage device for performing fault tolerant code upgrade on a fault tolerant system by determining when functional code reaches a desired state before resuming an upgrade. A concurrent code-load to a plurality of storage controllers of a storage system is initiated. A role transition is detected. The storage system determines when the storage system returns to a desired state. The code-load is resumed when the storage system returns to the desired state.
    Type: Application
    Filed: December 20, 2006
    Publication date: June 26, 2008
    Inventors: Jimmie Lee Brundidge, Chiahong Chen, Itzhack Goldberg, Daniel Anson Heffley
  • Publication number: 20080126787
    Abstract: Managing default values. A determination is automatically made that the first program is operating in the batch mode in which user interaction is not intended to affirm or change default values. In response, first current default values for input to the first program are determined, and a determination is made whether a user previously entered or affirmed the first current default values in an interactive mode. If so, the first program is allowed to proceed with operation using the first current default values. If not, the first program is not allowed to proceed with operation using the first current default values. A determination is automatically made that the second program is operating in the interactive mode in which user interaction is intended to affirm or change default values.
    Type: Application
    Filed: June 5, 2006
    Publication date: May 29, 2008
    Applicant: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ziv Rafalovich, Martin J. Tross
  • Publication number: 20080072295
    Abstract: A method and system for authentication are provided for verifying a service provider and providing a secure session. The method carried out at the service provider (402) includes: starting (403) a session with a client (401); receiving a challenge (405) from the client (401); responding to the challenge with a response (408); and sending a key (408) to the client (401) in non-OCR format, wherein the key is used for the session between the client (401) and the service provider (402). The response to the challenge is known only to the client (401) and the service provider (402). The key is used by the client (401) to encrypt (412) all the communications with the service provider (402) in the session. The response and the key may be sent to an alternative channel previously supplied by the client (401).
    Type: Application
    Filed: September 20, 2006
    Publication date: March 20, 2008
    Inventors: Nathaniel Solomon Borenstein, Michael Factor, Itzhack Goldberg, Yotam Medini, Kenneth Nagin
  • Patent number: 7318168
    Abstract: A method for maintaining a bit map of data writes, the method including associating each of a plurality of bit groups in a bit map with a different one of a plurality of segments of a data storage device, where each of the bit groups includes a plurality of bits, and setting any of the bits in any of the bit groups to indicate that any portion of the segment corresponding to the bit group has been written to, where the write order of any two of the plurality of segments that have been written to is preserved by their corresponding set bit groups.
    Type: Grant
    Filed: July 28, 2004
    Date of Patent: January 8, 2008
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Orit Nissan-Messing
  • Publication number: 20070282985
    Abstract: A computer implemented method, data processing system, and computer program product for automatically aggregating entities via a profile-driven management. A profile is created, wherein the profile includes a set of search criteria comprising one or more server attributes. A list of attributes of each server in the data processing system is obtained. Servers in the plurality of servers whose attributes meet the set of search criteria specified in the profile are then grouped to form a profile group. Once the servers are grouped into a profile, an administrative action may be performed on all of the servers in the profile group simultaneously.
    Type: Application
    Filed: June 5, 2006
    Publication date: December 6, 2007
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Lorraine M. Herger, Ziv Rafalovich, Ramakrishnan Rajamony, Eric Van Hensbergen, Martin J. Tross
  • Publication number: 20070282982
    Abstract: A system for policy-based management in a computer environment, the system including at least one rule configured to be applied to an element of a computer environment, at least one policy including at least one of the rules, at least one profile including at least one element of the computer environment, at least one association defining a relationship between one of the policies and one of the profiles, and a computer configured to instaniate any of the associations, thereby invoking any of the rules included in the related policy for application to any of the elements in the related profile.
    Type: Application
    Filed: June 5, 2006
    Publication date: December 6, 2007
    Inventors: Rhonda Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ziv Rafalovich, Ramakrishnan Rajamony, Eric Van Hensbergen, Martin Tross