Patents by Inventor Amalia Avraham

Amalia Avraham has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11354044
    Abstract: A method according to one embodiment includes sending, from a first system to a second system, a request for a clock value associated with a third system; receiving, from the second system, a clock value associated with the third system and a query clock value determined at the second system; comparing, at the first system, the clock value associated with the third system to the query clock value determined at the second system; determining an amount of time since the third system contacted the second system, in response to determining that the query clock value is greater than the clock value associated with the third system; comparing the difference to a threshold time; determining that the third system is unavailable when the difference exceeds the predetermined threshold time value; and performing one or more predetermined actions at the first system in response to determining that the third system is unavailable.
    Type: Grant
    Filed: January 2, 2020
    Date of Patent: June 7, 2022
    Assignee: International Business Machines Corporation
    Inventors: Ariel Kass, Amalia Avraham, Erez A. Theodorou, Lior Tamary
  • Patent number: 11283630
    Abstract: Embodiments herein describe providing a certificate signed by a local CA to an unauthenticated server rather than obtaining a certificated signed by a third-party CA. A server that already has a certificate that was signed by a third-party CA may want to establish secure connection with an unauthenticated server which does not have a signed certificate. The unauthenticated server needs a certificate signed by a CA trusted by the server that already has a signed certificate (referred to herein as the authenticated server). To do so, the unauthenticated server sends login credentials to the authenticated server so that this server knows it can trust the unauthenticated server. In turn, the authenticated server can send its signed certificate to the unauthenticated server so it can verify the authenticated server. Once verified, the authenticated server generates a signed certificate for the unauthenticated server using a local CA.
    Type: Grant
    Filed: November 5, 2019
    Date of Patent: March 22, 2022
    Assignee: International Business Machines Corporation
    Inventors: Erez Alexander Theodorou, Amalia Avraham, Eran Tzabari
  • Patent number: 11023393
    Abstract: Connectivity type detection for a data storage system in accordance with the present description includes, in one aspect of the present description, automated host-target discovery logic which is configured to automatically discover the connectivity type for a connection path between a host and a storage system, and select and initiate target discovery procedures which are appropriate for the discovered connectivity type. As a result, mapping a target volume of the target storage system which is connected to the host, may be facilitated, reducing or eliminating delays which may have otherwise resulted from the change in connectivity type. In this manner, efficiency of the computing system may be improved. Other aspects and advantages may be realized, depending upon the particular application.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: June 1, 2021
    Assignee: International Business Machines Corporation
    Inventors: Olga Shtivelman, Alon Marx, Amalia Avraham, Shay Berman
  • Publication number: 20210135884
    Abstract: Embodiments herein describe providing a certificate signed by a local CA to an unauthenticated server rather than obtaining a certificated signed by a third-party CA. A server that already has a certificate that was signed by a third-party CA may want to establish secure connection with an unauthenticated server which does not have a signed certificate. The unauthenticated server needs a certificate signed by a CA trusted by the server that already has a signed certificate (referred to herein as the authenticated server). To do so, the unauthenticated server sends login credentials to the authenticated server so that this server knows it can trust the unauthenticated server. In turn, the authenticated server can send its signed certificate to the unauthenticated server so it can verify the authenticated server. Once verified, the authenticated server generates a signed certificate for the unauthenticated server using a local CA.
    Type: Application
    Filed: November 5, 2019
    Publication date: May 6, 2021
    Inventors: Erez Alexander THEODOROU, Amalia AVRAHAM, Eran TZABARI
  • Patent number: 10983822
    Abstract: Embodiments for volume management in a data storage environment. A network sniffing operation between virtual machines is performed to detect relationships between the virtual machines and thereby identify candidates for subsequent storage volume affiliation operations. The network sniffing operation detects the relationships based on network traffic or alternative similarity attributes of an existing placement of the virtual machines thereby deducing affiliations of storage volumes between the virtual machines such that, during the storage volume affiliation operations, the existing placement of the virtual machines is not modified. The identified candidates to be added to a new or existing storage volume affiliation operation are recommended to a user via a prompt.
    Type: Grant
    Filed: October 14, 2019
    Date of Patent: April 20, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ohad Atia, Amalia Avraham, Ran Harel, Rivka M. Matosevich
  • Patent number: 10956037
    Abstract: Embodiments of the present invention provide methods and systems for calculating capacity allocation in storage systems. Embodiments of the present invention can be used to calculate a capabilities score for all storage systems, resulting in a list of storage systems, prioritized, so that a storage administrator may select automatically or manually, the best system to provision for the requesting application, based on the calculated capabilities score of each storage system.
    Type: Grant
    Filed: January 15, 2016
    Date of Patent: March 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Ohad Atia, Amalia Avraham, Ran Harel, Alon Marx
  • Publication number: 20200356498
    Abstract: Connectivity type detection for a data storage system in accordance with the present description includes, in one aspect of the present description, automated host-target discovery logic which is configured to automatically discover the connectivity type for a connection path between a host and a storage system, and select and initiate target discovery procedures which are appropriate for the discovered connectivity type. As a result, mapping a target volume of the target storage system which is connected to the host, may be facilitated, reducing or eliminating delays which may have otherwise resulted from the change in connectivity type. In this manner, efficiency of the computing system may be improved. Other aspects and advantages may be realized, depending upon the particular application.
    Type: Application
    Filed: May 6, 2019
    Publication date: November 12, 2020
    Inventors: Olga SHTIVELMAN, Alon MARX, Amalia Avraham, Shay BERMAN
  • Patent number: 10834192
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include defining multiple capabilities for a set of resources, the resources comprising storage space. A plurality of services are defined, each of the services including one or more of the capabilities for a subset of the resources, and a software defined storage (SDS) system is configured including the defined services. Upon the SDS system receiving a request to forecast an amount of the storage space including one or more of the capabilities that will be available at a specified future time, one or more of the services including the one or more capabilities are identified, and a predicted amount of the storage space for the identified one or more services is computed for specified future time. In some embodiments, a given identified given service includes one or more additional capabilities not required by the request.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: November 10, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ohad Atia, Amalia Avraham, Shay Berman, Ran Harel
  • Patent number: 10705763
    Abstract: A computer-implemented method according to one embodiment includes identifying a host within a container environment, and mapping a volume of a container to the host within the container environment, utilizing small computer system interface (SCSI) second level addressing.
    Type: Grant
    Filed: February 10, 2017
    Date of Patent: July 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Amalia Avraham, Shay Berman, Ran Harel, Rivka M. Matosevich
  • Patent number: 10698622
    Abstract: A computer-implemented method according to one embodiment includes receiving, at a storage system, a request to allocate persistent data storage for use by a container within an orchestration system, where the request includes an orchestration system identifier, selecting a storage volume within the storage system for use by the container within the orchestration system, determining a storage identifier for the storage volume within the storage system, and storing, within the storage system, an association between the orchestration system identifier and the storage identifier.
    Type: Grant
    Filed: May 22, 2018
    Date of Patent: June 30, 2020
    Assignee: International Business Machines Corporation
    Inventors: Amalia Avraham, Alon Marx, Isaac Beckman, Lior Tamary
  • Patent number: 10691568
    Abstract: Embodiments for managing volume replication and disaster recovery in a containerized storage environment. A mapping is established between a PersistentVolumeClaim (PVC) having a correlated Persistent Volume (PV), and a source storage World Wide Name (WWN) and a target storage WWN. The mapping is replicated as part of a replication operation between the source storage and the target storage thereby maintaining consistency of the PV associated with one or more application containers among the source storage and the target storage.
    Type: Grant
    Filed: July 26, 2018
    Date of Patent: June 23, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Amalia Avraham, Alon Marx, Isaac Beckman, Ran Harel, Samuel Krikler, Shay Berman
  • Publication number: 20200133515
    Abstract: A method according to one embodiment includes sending, from a first system to a second system, a request for a clock value associated with a third system; receiving, from the second system, a clock value associated with the third system and a query clock value determined at the second system; comparing, at the first system, the clock value associated with the third system to the query clock value determined at the second system; determining an amount of time since the third system contacted the second system, in response to determining that the query clock value is greater than the clock value associated with the third system; comparing the difference to a threshold time; determining that the third system is unavailable when the difference exceeds the predetermined threshold time value; and performing one or more predetermined actions at the first system in response to determining that the third system is unavailable.
    Type: Application
    Filed: January 2, 2020
    Publication date: April 30, 2020
    Inventors: Ariel Kass, Amalia Avraham, Erez A. Theodorou, Lior Tamary
  • Patent number: 10564863
    Abstract: A computer-implemented method according to one embodiment includes sending, from a first system to a second system, a request for a clock value associated with a third system, receiving, from the second system, a clock value associated with the third system and a query clock value determined at the second system, comparing, at the first system, the clock value associated with the third system to the query clock value determined at the second system to determine whether the third system is unavailable, and performing one or more predetermined actions at the first system in response to determining that the third system is unavailable.
    Type: Grant
    Filed: April 24, 2018
    Date of Patent: February 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ariel Kass, Amalia Avraham, Erez A. Theodorou, Lior Tamary
  • Publication number: 20200042345
    Abstract: Embodiments for volume management in a data storage environment. A network sniffing operation between virtual machines is performed to detect relationships between the virtual machines and thereby identify candidates for subsequent storage volume affiliation operations. The network sniffing operation detects the relationships based on network traffic or alternative similarity attributes of an existing placement of the virtual machines thereby deducing affiliations of storage volumes between the virtual machines such that, during the storage volume affiliation operations, the existing placement of the virtual machines is not modified. The identified candidates to be added to a new or existing storage volume affiliation operation are recommended to a user via a prompt.
    Type: Application
    Filed: October 14, 2019
    Publication date: February 6, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ohad ATIA, Amalia AVRAHAM, Ran HAREL, Rivka M. MATOSEVICH
  • Publication number: 20200034258
    Abstract: Embodiments for managing volume replication and disaster recovery in a containerized storage environment. A mapping is established between a PersistentVolumeClaim (PVC) having a correlated Persistent Volume (PV), and a source storage World Wide Name (WWN) and a target storage WWN. The mapping is replicated as part of a replication operation between the source storage and the target storage thereby maintaining consistency of the PV associated with one or more application containers among the source storage and the target storage.
    Type: Application
    Filed: July 26, 2018
    Publication date: January 30, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Amalia AVRAHAM, Alon MARX, Isaac BECKMAN, Ran HAREL, Samuel KRIKLER, Shay BERMAN
  • Patent number: 10541940
    Abstract: Embodiments for performance management in a computing storage environment. At least one of a plurality of performance characteristics associated with a quality of service (QoS) between a storage system and a host is dynamically controlled by uploading code of a QoS logic, from the host to the storage system, for determining and specifying the at least one of the plurality of performance characteristics, thereby reducing overhead of QoS management data required to be stored within or communicated to the storage system.
    Type: Grant
    Filed: May 3, 2017
    Date of Patent: January 21, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Amalia Avraham, Alon Marx, Rivka M. Matosevich
  • Patent number: 10528374
    Abstract: Embodiments for volume management in a data storage environment. A network sniffing operation between virtual machines is performed to detect relationships between the virtual machines and thereby identify candidates for subsequent storage volume affiliation operations.
    Type: Grant
    Filed: August 25, 2016
    Date of Patent: January 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ohad Atia, Amalia Avraham, Ran Harel, Rivka M. Matosevich
  • Publication number: 20190361618
    Abstract: A computer-implemented method according to one embodiment includes receiving, at a storage system, a request to allocate persistent data storage for use by a container within an orchestration system, where the request includes an orchestration system identifier, selecting a storage volume within the storage system for use by the container within the orchestration system, determining a storage identifier for the storage volume within the storage system, and storing, within the storage system, an association between the orchestration system identifier and the storage identifier.
    Type: Application
    Filed: May 22, 2018
    Publication date: November 28, 2019
    Inventors: Amalia Avraham, Alon Marx, Isaac Beckman, Lior Tamary
  • Publication number: 20190324663
    Abstract: A computer-implemented method according to one embodiment includes sending, from a first system to a second system, a request for a clock value associated with a third system, receiving, from the second system, a clock value associated with the third system and a query clock value determined at the second system, comparing, at the first system, the clock value associated with the third system to the query clock value determined at the second system to determine whether the third system is unavailable, and performing one or more predetermined actions at the first system in response to determining that the third system is unavailable.
    Type: Application
    Filed: April 24, 2018
    Publication date: October 24, 2019
    Inventors: Ariel Kass, Amalia Avraham, Erez A. Theodorou, Lior Tamary
  • Patent number: 10331371
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include receiving a request including a specified number of logical volumes, and identifying, in a storage system including multiple storage pools having storage space, respective first amounts of the storage space that are available in the multiple storage pools. Based on the specified number of logical volumes and the first amounts of the storage space, a set of volume sizes indicating second amounts of the storage space are defined, and a given volume size indicating a maximum size for the specified number of logical volumes is identified. Upon conveying the maximum size to a user, and receiving, from the user, a specified size less than or equal to the maximum size, the specified number of the volumes having the specified size can be provisioned, wherein each of the volumes is stored in a given storage pool.
    Type: Grant
    Filed: February 23, 2016
    Date of Patent: June 25, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ohad Atia, Amalia Avraham, Ran Harel, Alon Marx