About
Transformational CEO and technology leader with a proven track record of scaling…
Articles by Guy
Activity
-
Looking to empower internal teams and customers with analytics and insights, Automatiq turned to Caylent for a data infrastructure overhaul! A…
Looking to empower internal teams and customers with analytics and insights, Automatiq turned to Caylent for a data infrastructure overhaul! A…
Liked by Guy Levy-Yurista
Experience
Education
Publications
-
Acquisitions on the Horizon in BI and Data Analytics Industry?
Sisense Blog
As the BI and Analytics market is undergoing multiple mergers and acquisitions, a deeper look at the strategies driving this flurry of activity is outlined and explained.
Plenty of M&A occurred in recent years. Much more is coming. -
How Smarter AI is Enabling the Human-Led Renaissance of Business Intelligence
DZone
As AI innovation powers the BI Renaissance to allow meaningful data and insights to flow freely, the possibilities for innovation and creativity are boundless.
-
Data Nirvana – How To Develop A Data-driven Culture
Dataconomy
As the creation and consumption of data continues to grow among businesses of all sizes, so does the challenge of analyzing and turning that data into actionable insights. According to IBM, 90 percent of the data in the world today has been created in the last two years, at 2.5 quintillion bytes of data per day When these mounds of data go unused or underused, businesses could be sitting on a goldmine of potential opportunities and solutions that are typically answered through data. But how do…
As the creation and consumption of data continues to grow among businesses of all sizes, so does the challenge of analyzing and turning that data into actionable insights. According to IBM, 90 percent of the data in the world today has been created in the last two years, at 2.5 quintillion bytes of data per day When these mounds of data go unused or underused, businesses could be sitting on a goldmine of potential opportunities and solutions that are typically answered through data. But how do companies enable employees to use the data being created and uncover these hidden insights?
-
Drive online security forward and make It fast
SecureID News
The role of online security can be compared to that of the brakes in a car. The brakes aren’t there to stop the car; they exist to allow us to go faster while still remaining safe.
-
Web 3.0 and Tomorrow's IoT: Human Identity Delivers the 'Internet of Me' Read more: http://insights.wired.com/profiles/blogs/human-identity-and-the-internet-of-me-powering-and-empowering-a#ixzz3MS1epiXz
Wired Magazine
Here comes the next generation web – Web 3.0 – the fully personalized and contextualized web. This is the web that binds itself to the user in a seamless manner, changing its shape, means and goals according to one’s needs. It is the web that knows who and where I am, how I got here and where I am headed next. It knows and anticipates my needs, wants, desires intents and wishes, and it serves them all to me in a zero-click fashion, automagically. This is no longer the IoT we have been talking…
Here comes the next generation web – Web 3.0 – the fully personalized and contextualized web. This is the web that binds itself to the user in a seamless manner, changing its shape, means and goals according to one’s needs. It is the web that knows who and where I am, how I got here and where I am headed next. It knows and anticipates my needs, wants, desires intents and wishes, and it serves them all to me in a zero-click fashion, automagically. This is no longer the IoT we have been talking about but rather the IoM – the Internet of Me!
Patents
-
System and method for efficiently generating responses to queries
Issued US US 10,621,172
A system and method for efficiently responding to a query. The method comprises generating a lowest level data layer, wherein the lowest level data layer is a common dataset that can be served by a plurality of higher level data layers; generating, based on the lowest level data layer, at least one dataset, wherein each generated dataset is one of the plurality of higher level data layers, wherein each higher level data layer is accessed more rapidly than all lower level data layers; searching,…
A system and method for efficiently responding to a query. The method comprises generating a lowest level data layer, wherein the lowest level data layer is a common dataset that can be served by a plurality of higher level data layers; generating, based on the lowest level data layer, at least one dataset, wherein each generated dataset is one of the plurality of higher level data layers, wherein each higher level data layer is accessed more rapidly than all lower level data layers; searching, in at least one of the generated data layers, for data needed to generate a response to the query; determining, based on the search, at least one data layer from which the response can be generated, wherein the determined at least one data layer includes the highest level data layer from which the response can be generated; and generating, based on data of the determined at least one data layer, a response to the query.
Other inventorsSee patent -
Method and apparatus for pulse generation and adaptive pulse generation for optical communications
Issued US 7,512,338
One embodiment of the invention relates to producing optical pulses for use on a transmission link. A light source is configured to produce an optical signal. A pulse generator is coupled to the light source. The pulse generator is configured to receive, for a first channel, the optical signal and a clock signal. The pulse generator is also configured to modify the optical signal based on the clock signal to produce an optical pulse having a predetermined pulse shape. The clock signal is…
One embodiment of the invention relates to producing optical pulses for use on a transmission link. A light source is configured to produce an optical signal. A pulse generator is coupled to the light source. The pulse generator is configured to receive, for a first channel, the optical signal and a clock signal. The pulse generator is also configured to modify the optical signal based on the clock signal to produce an optical pulse having a predetermined pulse shape. The clock signal is associated with the predetermined pulse shape. The predetermined pulse shape being based on a transmission characteristic of the transmission link.
Other inventors -
-
System and method for multi-dimensional encoding
Issued US 7418209
The invention provides, according to its various embodiments, a method for secure communication that involves encoding and transmitting an optical communications signal that is encoded based on a multi-dimensional encoding technique. The multi-dimensional encoding technique includes multiple security layers and varies multiple physical characteristics of a communications signal. The multi-dimensional encoding technique may include at least one or more of encoding a phase of an optical…
The invention provides, according to its various embodiments, a method for secure communication that involves encoding and transmitting an optical communications signal that is encoded based on a multi-dimensional encoding technique. The multi-dimensional encoding technique includes multiple security layers and varies multiple physical characteristics of a communications signal. The multi-dimensional encoding technique may include at least one or more of encoding a phase of an optical communications signal, encoding a polarization of an optical communications signal, and encoding a frequency of an optical communications signal, or any combination thereof.
Other inventorsSee patent -
Detecting and remedying unauthorized computer programs
Filed US 2006/0161987
Spyware may be detected by using a detection agent in a communications network to monitor one or more communication streams from one or more clients. An indication of spyware residing on a suspect device may be detected in one or more of the communication streams. As a result, a host may be determine whether the suspect device has established a relationship with a service provider. If the suspect device has established a relationship with the service provider, a message about the spyware is…
Spyware may be detected by using a detection agent in a communications network to monitor one or more communication streams from one or more clients. An indication of spyware residing on a suspect device may be detected in one or more of the communication streams. As a result, a host may be determine whether the suspect device has established a relationship with a service provider. If the suspect device has established a relationship with the service provider, a message about the spyware is transmitted to the suspect device.
-
Detecting and remedying unauthorized computer programs
Filed US US2006/0101277
To protect a client system from unauthorized programs, a scanner application for detecting particular unauthorized programs is maintained on a host system and periodically provided to a client system that executes the scanner application. Targeted solutions to particular types of unauthorized programs also are maintained on the host system and provided to the client system. If the scanner application detects an unauthorized program on the client system, a remedy that is targeted only to the…
To protect a client system from unauthorized programs, a scanner application for detecting particular unauthorized programs is maintained on a host system and periodically provided to a client system that executes the scanner application. Targeted solutions to particular types of unauthorized programs also are maintained on the host system and provided to the client system. If the scanner application detects an unauthorized program on the client system, a remedy that is targeted only to the detected unauthorized program is programmatically initiated to remedy the problem of the detected unauthorized program.
Other inventorsSee patent
Honors & Awards
-
CIO/CTO Excellence Award
SmartCEO Magazine
Organizations
-
The Tech Forum of the Wharton Club of DC
Co-Chair
-The Tech Forum of the Wharton Club of DC seeks to enhance business executives and professionals understanding of the technologies and innovations powering the fast-growing companies in the DC area and beyond. Our goal is to learn from - and be stimulated by - visionary leaders who not only have the vision to propel their companies and organizations, but also the ability to implement their visions with impact.
Recommendations received
6 people have recommended Guy
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More