8E14 Networks
Founder and Chief Executive Officer
Exosphere
Chief Executive Officer
Watchdox Jun 2009 - Mar 2017
Chief Technology Officer
J-Ventures Jun 2009 - Mar 2017
Investor
Beinsync Aug 2003 - May 2008
Co-Founder and Chief Marketing Officer
Education:
Tel Aviv University 2006 - 2007
Doctorates, Doctor of Philosophy, Computer Science
Tel Aviv University 2000 - 2006
Master of Science, Masters, Computer Science
Tel Aviv University 1996 - 1999
Bachelors, Bachelor of Science, Mathematics, Computer Science
Skills:
Product Management Network Security Start Ups Marketing Strategy Data Security Mobile Devices Executive Management Internet Security Saas Mobile Technology Entrepreneurship New Business Development Online Marketing Business Development Enterprise Software Product Strategy Lead Generation Software As A Service Strategic Partnerships Startup Consulting Smb Cloud Computing Go To Market Strategy Virtualization Strategy Crm Software Development Strategic Thinking Online Advertising Product Development Technical Leadership Thought Leadership
Languages:
English Hebrew French
Us Patents
System And Method For Secure Synchronization Of Data Across Multiple Computing Devices
Adi Ruppin - Los Altos CA, US Doron Peri - Tel Aviv, IL Yigal Ben-Natan - Petach-tikva, IL Gil S. Shidlansik - Tel Aviv-Yafo, IL Miron Liram - Kiar Saba, IL Ori Saporta - Givatayim, IL David Potashinsky - Holon, IL Uri Yulevich - Beit Halevi, IL Timothy Choi - San Francisco CA, US
International Classification:
G06F 21/00
US Classification:
726 1
Abstract:
A computer implemented method and apparatus comprises detecting a file content update on a first client computer system, the file to be synchronized on a plurality of different types of client computer systems in a plurality of formats. The method further comprises associating a security policy with the file, wherein the security policy includes restrictions to limit one or more actions that can be performed with the file, and synchronizing the file to a second client computing system while applying the security policy to provide controls for enforcement of the restrictions at the second client computer system.
- Petah Tikva, IL Udi LAVIN - Ra'anana, IL Netzer SHLOMAI - Ra'anana, IL Adi Ruppin - Los Altos CA, US
Assignee:
WatchDox, Ltd. - Petah Tikva
International Classification:
H04L 29/08
US Classification:
709203
Abstract:
A method and system for capturing and transmitting screen content and input/output events from a server to a client device are provided. The method includes transmitting, to the client device, a screen output rendered by the server respective of a first instance of a first application; and transmitting, to the client device, the screen output rendered by the server respective of a second instance of a second application, wherein the first instance is contained in a first securable object associated with the first application and the second instance is contained in a second securable object associated with the second application, wherein the first instance and the second instance are simultaneously executed by the server under a single logon session.
- Waterloo, CA Udi LAVIN - Ra'anana, IL Netzer SHLOMAI - Ra'anana, IL Adi RUPPIN - Los Altos CA, US
Assignee:
BlackBerry Limited - Waterloo
International Classification:
H04L 29/08 G06F 9/451
Abstract:
A method and system for capturing and transmitting screen content and input/output events from a server to a client device are provided. The method includes transmitting, to the client device, a screen output rendered by the server respective of a first instance of a first application; and transmitting, to the client device, the screen output rendered by the server respective of a second instance of a second application, wherein the first instance is contained in a first securable object associated with the first application and the second instance is contained in a second securable object associated with the second application, wherein the first instance and the second instance are simultaneously executed by the server under a single logon session.
System And Method For Secure Synchronization Of Data Across Multiple Computing Devices
Adi Ruppin - Los Altos CA, US Doron Peri - Tel Aviv, IL Yigal Ben-Natan - Petach-tikva, IL Gil S. Shidlansik - Tel Aviv-Yafo, IL Miron Liram - Kfar Saba, IL Ori Saporta - Givatayim, IL David Potashinsky - Holon, IL Uri Yulevich - Beit Halevi, IL Timothy Choi - San Francisco CA, US
International Classification:
H04L 29/06 G06F 17/30
Abstract:
A computer implemented method and apparatus comprises detecting a file content update on a first client computer system, the file to be synchronized on a plurality of different types of client computer systems in a plurality of formats. The method further comprises associating a security policy with the file, wherein the security policy includes restrictions to limit one or more actions that can be performed with the file, and synchronizing the file to a second client computing system while applying the security policy to provide controls for enforcement of the restrictions at the second client computer system.
System And Method For Secure Synchronization Of Data Across Multiple Computing Devices
Adi Ruppin - Los Altos CA, US Doron Peri - Tel Aviv, IL Yigal Ben-Natan - Petach-tikva, IL Gil S. Shidlansik - Tel Aviv-Yafo, IL Miron Liram - Kfar Saba, IL Ori Saporta - Givatayim, IL David Potashinsky - Holon, IL Uri Yulevich - Beit Halevi, IL Timothy Choi - San Francisco CA, US
International Classification:
H04L 29/08 H04L 29/06
Abstract:
A computer implemented method and apparatus comprises detecting a file content update on a first client computer system, the file to be synchronized on a plurality of different types of client computer systems in a plurality of formats. The method further comprises associating a security policy with the file, wherein the security policy includes restrictions to limit one or more actions that can be performed with the file, and synchronizing the file to a second client computing system while applying the security policy to provide controls for enforcement of the restrictions at the second client computer system.