Patents by Inventor Onn Shehory
Onn Shehory has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10333950Abstract: Defending against malicious electronic messages by analyzing electronic messages sent via a computer network to identify predefined risk elements found within the electronic messages, detecting attempts to perform computer-mediated actions that are associated with the electronic messages, identifying a potential security risk associated with the electronic messages and the computer-mediated actions, and performing a predefined preventive security action responsive to identifying the potential security risk.Type: GrantFiled: May 1, 2016Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventor: Onn Shehory
-
Publication number: 20170318038Abstract: Defending against malicious electronic messages by analyzing electronic messages sent via a computer network to identify predefined risk elements found within the electronic messages, detecting attempts to perform computer-mediated actions that are associated with the electronic messages, identifying a potential security risk associated with the electronic messages and the computer-mediated actions, and performing a predefined preventive security action responsive to identifying the potential security risk.Type: ApplicationFiled: May 1, 2016Publication date: November 2, 2017Inventor: Onn Shehory
-
Patent number: 9606815Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include receiving, by a computer, application code including a set of software elements, and identifying dependencies between the software elements. Based on the dependencies, a respective ranking score can be calculated for each of the software elements, the respective ranking score for a given software element indicating a likelihood that the given software element is configured as an application programming interface (API).Type: GrantFiled: February 26, 2015Date of Patent: March 28, 2017Assignee: International Business Machines CorporationInventors: Maayan Goldstein, Eitan Daniel Farchi, Onn Shehory
-
Publication number: 20160253185Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include receiving, by a computer, application code including a set of software elements, and identifying dependencies between the software elements. Based on the dependencies, a respective ranking score can be calculated for each of the software elements, the respective ranking score for a given software element indicating a likelihood that the given software element is configured as an application programming interface (API).Type: ApplicationFiled: February 26, 2015Publication date: September 1, 2016Inventors: Maayan Goldstein, Eitan Daniel Farchi, Onn Shehory
-
Publication number: 20130024804Abstract: Systems and methods for monitoring user actions, while a user is viewing first content displayed on a display screen, wherein the user views a first portion of the first content within a first context that defines scope of view for the first content; determining whether the user's actions resulted in second content being displayed on the display screen; associating the first portion of the first content with the second content; and maintaining a record of the association between the first portion of the first content and the second content.Type: ApplicationFiled: July 20, 2011Publication date: January 24, 2013Applicant: International Business Machines CorporationInventors: Eitan Farchi, Onn Shehory, Moran Shochat, Aviad Zlotnick
-
Patent number: 8086708Abstract: A method for managing a computer system includes monitoring first violations of a service level objective (SLO) of a service running on the computer system so as to determine a first statistical behavior of the first violations. Second violations of a component performance threshold of a component of the computer system are monitored so as to determine a second statistical behavior of the second violations. A model that predicts the second statistical behavior based on the first statistical behavior is produced. The component performance threshold is automatically adjusted responsively to the model, so as to improve a prediction of the first violations by the second violations.Type: GrantFiled: September 28, 2005Date of Patent: December 27, 2011Assignee: International Business Machines CorporationInventors: David Breitgand, Ealan Henis, Onn Shehory
-
Patent number: 8037365Abstract: Managing a computer system including automatically adjusting two separate component thresholds (a component threshold pair) based on a statistical model. Specifically, a first component threshold is modeled to predict violations of an SLO based on a violation of the first component threshold and a second, separate component threshold is modeled to predict a non-violation (compliance) of an SLO based on a non-violation of the second component threshold. Over time, the values of the component thresholds may change and one component threshold may be greater than the other component threshold at one time, and vice versa at another time. A component metric reading between the first and second component thresholds indicates that a prediction of an SLO violation or compliance is less certain, and a warning may be issued rather than an alert.Type: GrantFiled: November 3, 2009Date of Patent: October 11, 2011Assignee: International Busniss Machines coporationInventors: Maayan Goldstein, David Breitgand, John Michael Lake, Ealan Abraham Henis, Onn Shehory
-
Publication number: 20110107154Abstract: Managing a computer system including automatically adjusting two separate component thresholds (a component threshold pair) based on a statistical model. Specifically, a first component threshold is modeled to predict violations of an SLO based on a violation of the first component threshold and a second, separate component threshold is modeled to predict a non-violation (compliance) of an SLO based on a non-violation of the second component threshold. Over time, the values of the component thresholds may change and one component threshold may be greater than the other component threshold at one time, and vice versa at another time. A component metric reading between the first and second component thresholds indicates that a prediction of an SLO violation or compliance is less certain, and a warning may be issued rather than an alert.Type: ApplicationFiled: November 3, 2009Publication date: May 5, 2011Inventors: David Breitgand, Maayan Goldstein, Ealan Abraham Henis, John Michael Lake, Onn Shehory
-
Patent number: 7489639Abstract: A method for diagnosing network performance problems includes providing a graph representing a topology of a network including first nodes that are classified as providers of a resource, second nodes that are classified as consumers of the resource, and third nodes that are classified as mediators intervening between the providers and the consumers. Responsively to a report of a performance problem encountered by a given consumer in the network, at least one input/output (I/O) path is traced through the graph connecting the given consumer to one or more of the providers. One or more problematic nodes are identified along the at least one I/O path as possible causes of the performance problem.Type: GrantFiled: March 23, 2005Date of Patent: February 10, 2009Assignee: International Business Machines CorporationInventors: David Breitgand, Ealan Henis, Edya Ladan-Mozes, Onn Shehory, Elena Yerushalmi
-
Publication number: 20090018723Abstract: A vehicle control system including a vehicle and a vehicle controller for receiving information regarding the vehicle and its environment and vehicle control input via a vehicle control, applying control logic predefined for the vehicle control input and the information to determine an aspect of the vehicle to control and how to control the aspect, and sending a control directive to at least one vehicle subsystem to carry out the determined control of the aspect, where when the vehicle is in a first operational state the controller allows the vehicle control input to control the vehicle subsystem directly related to the vehicle control input without modification by the controller, and where when the vehicle is in a second operational state the controller uses the vehicle control input to determine a vehicle objective and sends the control directive to any of the vehicle subsystems in order to achieve the vehicle objective.Type: ApplicationFiled: July 12, 2007Publication date: January 15, 2009Inventors: Dan Chevion, Tal Drory, Oleg Goldshmidt, Ron Sivan, Onn Shehory
-
Publication number: 20060293777Abstract: A method for managing a computer system includes monitoring first violations of a service level objective (SLO) of a service running on the computer system so as to determine a first statistical behavior of the first violations. Second violations of a component performance threshold of a component of the computer system are monitored so as to determine a second statistical behavior of the second violations. A model that predicts the second statistical behavior based on the first statistical behavior is produced. The component performance threshold is automatically adjusted responsively to the model, so as to improve a prediction of the first violations by the second violations.Type: ApplicationFiled: June 7, 2005Publication date: December 28, 2006Applicant: International Business Machines CorporationInventors: David Breitgand, Ealan Henis, Onn Shehory
-
Publication number: 20060276995Abstract: A method for managing a computer system includes monitoring first violations of a service level objective (SLO) of a service running on the computer system so as to determine a first statistical behavior of the first violations. Second violations of a component performance threshold of a component of the computer system are monitored so as to determine a second statistical behavior of the second violations. A model that predicts the second statistical behavior based on the first statistical behavior is produced. The component performance threshold is automatically adjusted responsively to the model, so as to improve a prediction of the first violations by the second violations.Type: ApplicationFiled: September 28, 2005Publication date: December 7, 2006Applicant: International Business Machines CorporationInventors: David Breitgand, Ealan Henis, Onn Shehory
-
Publication number: 20060215564Abstract: A method for diagnosing network performance problems includes providing a graph representing a topology of a network including first nodes that are classified as providers of a resource, second nodes that are classified as consumers of the resource, and third nodes that are classified as mediators intervening between the providers and the consumers. Responsively to a report of a performance problem encountered by a given consumer in the network, at least one input/output (I/O) path is traced through the graph connecting the given consumer to one or more of the providers. One or more problematic nodes are identified along the at least one I/O path as possible causes of the performance problem.Type: ApplicationFiled: March 23, 2005Publication date: September 28, 2006Applicant: International Business Machines CorporationInventors: David Breitgand, Ealan Henis, Edya Ladan-Mozes, Onn Shehory, Elena Yerushalmi
-
Publication number: 20020029201Abstract: A method for controlling an exchange of information between a first party and a second party includes receiving from the first party a set of one or more privacy preferences, indicating restrictions to be placed on use of specified items of the information to be disclosed by the first party, and receiving from the second party a description of a privacy policy, indicating undertakings by the second party with regard to restricting the use of the specified items of the information. The compatibility of the privacy preferences with the privacy policy is assessed. If the privacy preferences and the privacy policy are found to be incompatible, a negotiation is brokered with at least one of the first and the second parties so as to bring the privacy preferences and the privacy policy into mutual compatibility. The information is provided from the first party to the second party only when the privacy preferences and the privacy policy are found to be compatible.Type: ApplicationFiled: November 30, 2000Publication date: March 7, 2002Inventors: Zeev Barzilai, Sergei Shmulyian, Onn Shehory