Guy Levy-Yurista

Guy Levy-Yurista

Washington DC-Baltimore Area
8K followers 500+ connections

About

Transformational CEO and technology leader with a proven track record of scaling…

Articles by Guy

Activity

Experience

  • XOLTAR Graphic

    XOLTAR

    Tel Aviv-Yafo, Tel Aviv District, Israel

  • -

    New York, New York, United States

  • -

    Washington DC-Baltimore Area

  • -

    London UK, Boston, Washington DC, San Francisco

  • -

    New York, New York

  • -

    Greater New York City Area

  • -

    Washington D.C. Metro Area

  • -

  • -

  • -

  • -

Education

  • The Wharton School Graphic

    The Wharton School

    Activities and Societies: President of the Wine Club

  • Magna cum laude

  • Activities and Societies: Talpiot Program

Publications

  • Acquisitions on the Horizon in BI and Data Analytics Industry?

    Sisense Blog

    As the BI and Analytics market is undergoing multiple mergers and acquisitions, a deeper look at the strategies driving this flurry of activity is outlined and explained.
    Plenty of M&A occurred in recent years. Much more is coming.

    See publication
  • How Smarter AI is Enabling the Human-Led Renaissance of Business Intelligence

    DZone

    As AI innovation powers the BI Renaissance to allow meaningful data and insights to flow freely, the possibilities for innovation and creativity are boundless.

    See publication
  • Data Nirvana – How To Develop A Data-driven Culture

    Dataconomy

    As the creation and consumption of data continues to grow among businesses of all sizes, so does the challenge of analyzing and turning that data into actionable insights. According to IBM, 90 percent of the data in the world today has been created in the last two years, at 2.5 quintillion bytes of data per day When these mounds of data go unused or underused, businesses could be sitting on a goldmine of potential opportunities and solutions that are typically answered through data. But how do…

    As the creation and consumption of data continues to grow among businesses of all sizes, so does the challenge of analyzing and turning that data into actionable insights. According to IBM, 90 percent of the data in the world today has been created in the last two years, at 2.5 quintillion bytes of data per day When these mounds of data go unused or underused, businesses could be sitting on a goldmine of potential opportunities and solutions that are typically answered through data. But how do companies enable employees to use the data being created and uncover these hidden insights?

    See publication
  • Drive online security forward and make It fast

    SecureID News

    The role of online security can be compared to that of the brakes in a car. The brakes aren’t there to stop the car; they exist to allow us to go faster while still remaining safe.

    See publication
  • Web 3.0 and Tomorrow's IoT: Human Identity Delivers the 'Internet of Me' Read more: http://insights.wired.com/profiles/blogs/human-identity-and-the-internet-of-me-powering-and-empowering-a#ixzz3MS1epiXz

    Wired Magazine

    Here comes the next generation web – Web 3.0 – the fully personalized and contextualized web. This is the web that binds itself to the user in a seamless manner, changing its shape, means and goals according to one’s needs. It is the web that knows who and where I am, how I got here and where I am headed next. It knows and anticipates my needs, wants, desires intents and wishes, and it serves them all to me in a zero-click fashion, automagically. This is no longer the IoT we have been talking…

    Here comes the next generation web – Web 3.0 – the fully personalized and contextualized web. This is the web that binds itself to the user in a seamless manner, changing its shape, means and goals according to one’s needs. It is the web that knows who and where I am, how I got here and where I am headed next. It knows and anticipates my needs, wants, desires intents and wishes, and it serves them all to me in a zero-click fashion, automagically. This is no longer the IoT we have been talking about but rather the IoM – the Internet of Me!

    See publication

Patents

  • System and method for efficiently generating responses to queries

    Issued US US 10,621,172

    A system and method for efficiently responding to a query. The method comprises generating a lowest level data layer, wherein the lowest level data layer is a common dataset that can be served by a plurality of higher level data layers; generating, based on the lowest level data layer, at least one dataset, wherein each generated dataset is one of the plurality of higher level data layers, wherein each higher level data layer is accessed more rapidly than all lower level data layers; searching,…

    A system and method for efficiently responding to a query. The method comprises generating a lowest level data layer, wherein the lowest level data layer is a common dataset that can be served by a plurality of higher level data layers; generating, based on the lowest level data layer, at least one dataset, wherein each generated dataset is one of the plurality of higher level data layers, wherein each higher level data layer is accessed more rapidly than all lower level data layers; searching, in at least one of the generated data layers, for data needed to generate a response to the query; determining, based on the search, at least one data layer from which the response can be generated, wherein the determined at least one data layer includes the highest level data layer from which the response can be generated; and generating, based on data of the determined at least one data layer, a response to the query.

    Other inventors
    See patent
  • Method and apparatus for pulse generation and adaptive pulse generation for optical communications

    Issued US 7,512,338

    One embodiment of the invention relates to producing optical pulses for use on a transmission link. A light source is configured to produce an optical signal. A pulse generator is coupled to the light source. The pulse generator is configured to receive, for a first channel, the optical signal and a clock signal. The pulse generator is also configured to modify the optical signal based on the clock signal to produce an optical pulse having a predetermined pulse shape. The clock signal is…

    One embodiment of the invention relates to producing optical pulses for use on a transmission link. A light source is configured to produce an optical signal. A pulse generator is coupled to the light source. The pulse generator is configured to receive, for a first channel, the optical signal and a clock signal. The pulse generator is also configured to modify the optical signal based on the clock signal to produce an optical pulse having a predetermined pulse shape. The clock signal is associated with the predetermined pulse shape. The predetermined pulse shape being based on a transmission characteristic of the transmission link.

    Other inventors
    • Isaac Shpantzer
    • Israel Smilanski
    • Jacob Khurgin
    • Vladimir Grigoryan
    • Pak Shing Cho
    • Guoliang Li
    See patent
  • System and method for multi-dimensional encoding

    Issued US 7418209

    The invention provides, according to its various embodiments, a method for secure communication that involves encoding and transmitting an optical communications signal that is encoded based on a multi-dimensional encoding technique. The multi-dimensional encoding technique includes multiple security layers and varies multiple physical characteristics of a communications signal. The multi-dimensional encoding technique may include at least one or more of encoding a phase of an optical…

    The invention provides, according to its various embodiments, a method for secure communication that involves encoding and transmitting an optical communications signal that is encoded based on a multi-dimensional encoding technique. The multi-dimensional encoding technique includes multiple security layers and varies multiple physical characteristics of a communications signal. The multi-dimensional encoding technique may include at least one or more of encoding a phase of an optical communications signal, encoding a polarization of an optical communications signal, and encoding a frequency of an optical communications signal, or any combination thereof.

    Other inventors
    See patent
  • Detecting and remedying unauthorized computer programs

    Filed US 2006/0161987

    Spyware may be detected by using a detection agent in a communications network to monitor one or more communication streams from one or more clients. An indication of spyware residing on a suspect device may be detected in one or more of the communication streams. As a result, a host may be determine whether the suspect device has established a relationship with a service provider. If the suspect device has established a relationship with the service provider, a message about the spyware is…

    Spyware may be detected by using a detection agent in a communications network to monitor one or more communication streams from one or more clients. An indication of spyware residing on a suspect device may be detected in one or more of the communication streams. As a result, a host may be determine whether the suspect device has established a relationship with a service provider. If the suspect device has established a relationship with the service provider, a message about the spyware is transmitted to the suspect device.

    See patent
  • Detecting and remedying unauthorized computer programs

    Filed US US2006/0101277

    To protect a client system from unauthorized programs, a scanner application for detecting particular unauthorized programs is maintained on a host system and periodically provided to a client system that executes the scanner application. Targeted solutions to particular types of unauthorized programs also are maintained on the host system and provided to the client system. If the scanner application detects an unauthorized program on the client system, a remedy that is targeted only to the…

    To protect a client system from unauthorized programs, a scanner application for detecting particular unauthorized programs is maintained on a host system and periodically provided to a client system that executes the scanner application. Targeted solutions to particular types of unauthorized programs also are maintained on the host system and provided to the client system. If the scanner application detects an unauthorized program on the client system, a remedy that is targeted only to the detected unauthorized program is programmatically initiated to remedy the problem of the detected unauthorized program.

    Other inventors
    See patent
  • SYSTEM AND METHOD FOR PROVIDING AN ENRICHED SENSORY RESPONSE TO ANALYTICS QUERIES

    US 20180011930

    Other inventors
  • SYSTEM AND METHOD FOR APPROXIMATING QUERY RESULTS USING LOCAL AND REMOTE NEURAL NETWORKS

    US 20190050725

    Other inventors
  • SYSTEM AND METHOD FOR APPROXIMATING QUERY RESULTS USING NEURAL NETWORKS

    US 20190050726

    Other inventors
  • SYSTEM AND METHOD FOR EFFICIENTLY GENERATING RESPONSES TO QUERIES

    US 20180011911

    Other inventors
  • SYSTEM AND METHOD FOR GENERATING TRAINING SETS FOR NEURAL NETWORKS

    US 20190050724

    Other inventors
  • SYSTEM AND METHOD FOR INCREASING ACCURACY OF APPROXIMATING QUERY RESULTS USING NEURAL NETWORKS

    US 20190050454

    Other inventors

Honors & Awards

  • CIO/CTO Excellence Award

    SmartCEO Magazine

Organizations

  • The Tech Forum of the Wharton Club of DC

    Co-Chair

    -

    The Tech Forum of the Wharton Club of DC seeks to enhance business executives and professionals understanding of the technologies and innovations powering the fast-growing companies in the DC area and beyond. Our goal is to learn from - and be stimulated by - visionary leaders who not only have the vision to propel their companies and organizations, but also the ability to implement their visions with impact.

Recommendations received

6 people have recommended Guy

Join now to view

View Guy’s full profile

  • See who you know in common
  • Get introduced
  • Contact Guy directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses