Search

Yiwei Wang Phones & Addresses

  • 21484 Mary Alice Way, Los Gatos, CA 95033
  • 601 Almarida Dr APT Q9, Campbell, CA 95008
  • San Diego, CA
  • 3103 Atherton Dr, Santa Clara, CA 95051
  • Ithaca, NY
  • Hopland, CA
  • Livermore, CA
  • Mountain View, CA
  • Palo Alto, CA

Work

Company: Biolog, inc. Address: 21124 Cabot Blvd, Hayward, CA 94545 Phones: (510) 785-2564 Position: Accounting manager Industries: In Vitro and In Vivo Diagnostic Substances

Resumes

Resumes

Yiwei Wang Photo 1

Executive Director

View page
Location:
San Francisco, CA
Industry:
Research
Work:
Santa Clara University Jan 2016 - Mar 2016
Quarterly Adjunct Lecturer

University of New Mexico Nov 1, 2014 - Aug 2015
Postdoctoral Scholar

San Francisco Bay Bird Observatory, Inc. Nov 1, 2014 - Aug 2015
Executive Director

Save the Elephants Apr 2014 - Oct 2014
Postdoctoral Researcher

Uc Santa Cruz Sep 2007 - Mar 2014
Phd Candidate
Education:
University of California, Santa Cruz 2014 - 2014
Doctorates, Doctor of Philosophy, Environmental Studies
Cornell University 2000 - 2004
Bachelors, Bachelor of Arts, Biology, Psychology
Skills:
Ecology
Environmental Science
Research
Science
Environmental Education
Biology
Field Work
Environmental Policy
Statistics
Scientific Writing
Data Collection
Grant Writing
Conservation Issues
Environmental Awareness
Data Analysis
Community Outreach
Climate Change
Arcgis
Sustainability
Biodiversity
Higher Education
Public Speaking
Scientific Illustration
Research Design
Environmental Issues
Teaching
Art
Laboratory
R
Microsoft Office
Gis
Interests:
Ecology
Environmental Education
Behavior
Environment
Citizen Science Policy
Open Science
Science and Technology
Science Outreach
Biodiversity
Conservation
Languages:
Mandarin
English
Yiwei Wang Photo 2

Yiwei Wang

View page
Yiwei Wang Photo 3

Yiwei Wang

View page

Business Records

Name / Title
Company / Classification
Phones & Addresses
Yiwei Wang
Accounting Manager
Biolog, Inc.
In Vitro and In Vivo Diagnostic Substances
21124 Cabot Blvd, Hayward, CA 94545
Yiwei Wang
Accounting Manager
Biolog, Inc.
Biotechnology · Mfg Diagnostic Substances · In-Vitro Diagnostic Substance Manufacturing
21124 Cabot Blvd, Hayward, CA 94545
(510) 785-2564, (510) 785-2585, (510) 782-4639
Yiwei Wang
Accounting Manager
Biolog, Inc.
In Vitro and In Vivo Diagnostic Substances
21124 Cabot Blvd, Hayward, CA 94545

Publications

Us Patents

Adaptive Median Filters For De-Interlacing

View page
US Patent:
20030160895, Aug 28, 2003
Filed:
Feb 25, 2003
Appl. No.:
10/374198
Inventors:
Yiwei Wang - San Jose CA, US
Siyun Li - San Jose CA, US
International Classification:
H04N007/01
US Classification:
348/448000, 348/450000
Abstract:
An adaptive intra-field algorithm to de-interlace video data uses two line memories to implement a median filter that can use multiple data points on adjacent lines of display. In a median-mode, the filter outputs the median of the input data to create the value for a location on the intermediate line and can decrease image blurring. But if examination of the two adjacent pixels on two adjacent scan lines is small, as in the case of a vertical image line, the filter operates as a line average filter, to avoid creating image artifacts.

Locating Shadow Vulnerable Datastores For Cloud Data Table/Api/Data Lake Stores

View page
US Patent:
20220407883, Dec 22, 2022
Filed:
Apr 1, 2022
Appl. No.:
17/711031
Inventors:
SUPREETH HOSUR NAGESH RAO - CUPERTINO CA, US
NAVINDRA YADAV - CUPERTINO CA, US
RAVI SANKURATRI - CUPERTINO CA, US
ALOK LALIT WADHWA - milipitas CA, US
ARIA RAHADIAN - SAN JOSE CA, US
BRADY SCHULMAN - MILFORN NH, US
RAVI SHANKER PRASAD - san jose CA, US
VASIL DOCHKOV YORDANOV - san jose CA, US
YIWEI WANG - san jose CA, US
ZHIWEN ZHANG - san jose CA, US
UDAYAN JOSHI - san diego CA, US
SOUMYADEEP CHOUDHURY - san jose CA, US
MUHAMMADA FURQAN - lowell MA, US
DANESH IRANI - san jose CA, US
International Classification:
H04L 9/40
Abstract:
In one aspect, a computerized method for locating one or more shadow vulnerable datastores for cloud-platform datastores includes the step of identifying a cloned data store of an original datastore in a cloud database instance. It includes the step of determining that the cloned datastore comprises a shadow vulnerable datastore. It includes the step of defining a security posture of the cloned datastore. It includes the step of publishing a digitized data clone security differential report comprising the security posture and one or more remediations to fix security posture issues.

Implementing A Multi-Dimensional Unified Security And Privacy Policy With Summarized Access Graphs

View page
US Patent:
20220269792, Aug 25, 2022
Filed:
Mar 18, 2021
Appl. No.:
17/205966
Inventors:
SUPREETH HOSUR NAGESH RAO - Cupertino CA, US
NAVINDRA YADAV - Cupertino CA, US
RAVI SANKURATRI - Cupertino CA, US
ALOK LALIT WADHWA - Milipitas CA, US
ARIA RAHADIAN - San Jose CA, US
BHARATHWAJ SANKARA VISWANATHAN - Mountain View CA, US
BRADY SCHULMAN - Milford NH, US
MATTHEW FINN - Lebanon GA, US
PAUL JOHN LESIAK - West George NJ, US
RAVI SHANKER PRASAD - Fremont CA, US
VASIL DOCHKOV YORDANOV - San Jose CA, US
YIWEI WANG - San Jose CA, US
ZHIWEN ZHANG - San Jose CA, US
International Classification:
G06F 21/57
G06F 21/60
Abstract:
A computerized method for implementing risk discovery with a set of unified security and privacy policies, includes the step of discovering a set of data and a set of data accesses within an enterprise computing system. The method includes the step of classifying the set of discovered data and the set of data accesses with an identification that shows which of the data assets are important or critical for the enterprise. The method includes the step of determining which of the set of discovered data and the set of data accesses have or are associated with sensitive information. The method includes the step of placing the set of discovered data and the set of data accesses that are associated with sensitive information into a set of discovered information about the infrastructure. The method includes the step of determining which of the set of discovered data and the set of data accesses are relevant in the context of a specified governmental data privacy regulation. The method includes the step of placing the set of discovered data and the set of data accesses that are relevant in the context of a specified governmental data privacy regulation into a set of discovered information about the infrastructure. The method includes the step of, with the set of discovered information about the infrastructure, mapping the set of discovered information about the infrastructure to a set of deterministic dimensions.

Methods And Systems For Prevention Of Vendor Data Abuse

View page
US Patent:
20220269815, Aug 25, 2022
Filed:
Jun 1, 2021
Appl. No.:
17/335932
Inventors:
SUPREETH HOSUR NAGESH RAO - Cupertino CA, US
Navindra Yadav - Cupertino CA, US
Ravi Sankuratri - Cupertino CA, US
Alok Lalit Wadhwa - Milipitas CA, US
Aria Rahadian - San Jose CA, US
Bharathwaj Sankara Viswanathan - Mountain View CA, US
Brady Schulman - Milford NH, US
Matthew Finn - Lebanon GA, US
Ravi Shanker Prasad - Fremont CA, US
Vasil Dochkov Yordanov - San Jose CA, US
Yiwei Wang - San Jose CA, US
Zhiwen Zhang - San Jose CA, US
International Classification:
G06F 21/62
G06F 9/54
G06F 16/23
H04L 29/06
Abstract:
In one aspect, a computerized method for automatically identifying and solving for vendor data abuse in an enterprise network, includes the step of implementing a vendor detection at one or more gateways of the enterprise network. The method includes the step of mapping a set of data along with any associated data attributes of the set of data that are being shared with a vendor via the one or more gateways. The method includes the step of detecting and identifying an access anomaly with respect to the set of data associated with a vendor access. The method includes the step of implementing a specified data minimization process to the access anomaly.

Cloud-Platform Push For Known Data Breaches

View page
US Patent:
20220272111, Aug 25, 2022
Filed:
Nov 16, 2021
Appl. No.:
17/527466
Inventors:
SUPREETH HOSUR NAGESH RAO - Cupertino CA, US
NAVINDRA YADAV - Cupertino CA, US
RAVI SANKURATRI - Cupertino CA, US
ALOK LALIT WADHWA - Milipitas CA, US
ARIA RAHADIAN - San Jose CA, US
BHARATHWAJ SANKARA VISWANATHAN - MOUNTAIN VIEW CA, US
BRADY SCHULMAN - Milford CA, US
MATTHEW FINN - Lebanon GA, US
PAUL JOHN LESIAK - West Orange NJ, US
RAVI SHANKER PRASAD - Fremont CA, US
VASIL DOCHKOV YORDANOV - San Jose CA, US
YIWEI WANG - San Jose CA, US
ZHIWEN ZHANG - San Jose CA, US
UDAYAN JOSHI - San Diego CA, US
SOUMYADEEP CHOUDHURY - San Jose CA, US
MUHAMMADA FURQAN - Lowell MA, US
MANISH ARIGALA - San Jose CA, US
International Classification:
H04L 9/40
Abstract:
In one aspect, a method for implementing a cloud-platform push for one or more known data breaches includes the step of, for each data breach of the one or more known data breaches, providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability in the data breach. A step includes generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network. A step includes determining that the data breach can occur within the enterprise's cloud-based network.

Methods And Systems For Locating Anomalous Query Activity On Data Stores

View page
US Patent:
20230018068, Jan 19, 2023
Filed:
Jun 1, 2022
Appl. No.:
17/829361
Inventors:
SUPREETH HOSUR NAGESH RAO - CUPERTINO CA, US
NAVINDRA YADAV - CUPERTINO CA, US
RAVI SANKURATRI - CUPERTINO CA, US
ALOK LALIT WADHWA - milipitas CA, US
ARIA RAHADIAN - SAN JOSE CA, US
BRADY SCHULMAN - MILFORD NH, US
RAVI SHANKER PRASAD - FREMONT CA, US
VASIL DOCHKOV YORDANOV - SAN JOSE CA, US
YIWEI WANG - SAN JOSE CA, US
ZHIWEN ZHANG - SAN JOSE CA, US
UDAYAN JOSHI - SAN DIEGO CA, US
SOUMYADEEP CHOUDHURY - SAN JOSE CA, US
MUHAMMADA FURQAN - LOWELL MA, US
DANESH IRANI - SAN CARLOS CA, US
International Classification:
H04L 9/40
Abstract:
In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.
Yiwei E Wang from Los Gatos, CA, age ~43 Get Report