Patents by Inventor Chen Burshan

Chen Burshan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150019911
    Abstract: A disaster recovery system, including a target datastore for replicating data written to source datastores, and a checkpoint engine (i) for transmitting, at multiple times, quiesce commands to a plurality of host computers, each quiesce command including a timeout period that is adjusted at each of the multiple times, (ii) for determining, at each of the multiple times, whether acknowledgements indicating that a host has successfully stopped writing enterprise data to the source datastores, have been received from each of the host computers within the timeout period, (iii) for marking, at each of the multiple times, a cross-host checkpoint in the target datastore and reducing the timeout period for the quiesce commands at the next time, if the determining is affirmative, and (iv) for increasing, at each of the multiple times, the timeout period for the quiesce commands transmitted at the next time, if the determining is not affirmative.
    Type: Application
    Filed: September 5, 2014
    Publication date: January 15, 2015
    Inventors: Amir Boldo, Ori Mamluk, Chen Burshan
  • Patent number: 8868513
    Abstract: A disaster recovery system, including a target datastore for replicating data written to source datastores, and a checkpoint engine (i) for transmitting, at multiple times, quiesce commands to a plurality of host computers, each quiesce command including a timeout period that is adjusted at each of the multiple times, (ii) for determining, at each of the multiple times, whether acknowledgements indicating that a host has successfully stopped writing enterprise data to the source datastores, have been received from each of the host computers within the timeout period, (iii) for marking, at each of the multiple times, a cross-host checkpoint in the target datastore and reducing the timeout period for the quiesce commands at the next time, if the determining is affirmative, and (iv) for increasing, at each of the multiple times, the timeout period for the quiesce commands transmitted at the next time, if the determining is not affirmative.
    Type: Grant
    Filed: June 17, 2014
    Date of Patent: October 21, 2014
    Assignee: Zerto Ltd.
    Inventors: Amir Boldo, Ori Mamluk, Chen Burshan
  • Publication number: 20140298092
    Abstract: A disaster recovery system, including a target datastore for replicating data written to source datastores, and a checkpoint engine (i) for transmitting, at multiple times, quiesce commands to a plurality of host computers, each quiesce command including a timeout period that is adjusted at each of the multiple times, (ii) for determining, at each of the multiple times, whether acknowledgements indicating that a host has successfully stopped writing enterprise data to the source datastores, have been received from each of the host computers within the timeout period, (iii) for marking, at each of the multiple times, a cross-host checkpoint in the target datastore and reducing the timeout period for the quiesce commands at the next time, if the determining is affirmative, and (iv) for increasing, at each of the multiple times, the timeout period for the quiesce commands transmitted at the next time, if the determining is not affirmative.
    Type: Application
    Filed: June 17, 2014
    Publication date: October 2, 2014
    Inventors: Amir Boldo, Ori Mamluk, Chen Burshan
  • Patent number: 8832037
    Abstract: A disaster recovery system, including a target datastore for replicating data written to source datastores, and a checkpoint engine (i) for transmitting, at multiple times, quiesce commands to a plurality of host computers, each quiesce command including a timeout period that is adjusted at each of the multiple times, (ii) for determining, at each of the multiple times, whether acknowledgements indicating that a host has successfully stopped writing enterprise data to the source datastores, have been received from each of the host computers within the timeout period, (iii) for marking, at each of the multiple times, a cross-host checkpoint in the target datastore and reducing the timeout period for the quiesce commands at the next time, if the determining is affirmative, and (iv) for increasing, at each of the multiple times, the timeout period for the quiesce commands transmitted at the next time, if the determining is not affirmative.
    Type: Grant
    Filed: February 7, 2012
    Date of Patent: September 9, 2014
    Assignee: Zerto Ltd.
    Inventors: Amir Boldo, Ori Mamluk, Chen Burshan
  • Patent number: 8775384
    Abstract: A disaster recovery system, including a target datastore for replicating data written to source datastores, and a checkpoint engine (i) for transmitting, at multiple times, quiesce commands to a plurality of host computers, each quiesce command including a timeout period that is adjusted at each of the multiple times, (ii) for determining, at each of the multiple times, whether acknowledgements indicating that a host has successfully stopped writing enterprise data to the source datastores, have been received from each of the host computers within the timeout period, (iii) for marking, at each of the multiple times, a cross-host checkpoint in the target datastore and reducing the timeout period for the quiesce commands at the next time, if the determining is affirmative, and (iv) for increasing, at each of the multiple times, the timeout period for the quiesce commands transmitted at the next time, if the determining is not affirmative.
    Type: Grant
    Filed: February 7, 2012
    Date of Patent: July 8, 2014
    Assignee: Zerto Ltd.
    Inventors: Amir Boldo, Ori Mamluk, Chen Burshan
  • Publication number: 20130204843
    Abstract: A disaster recovery system, including a target datastore for replicating data written to source datastores, and a checkpoint engine (i) for transmitting, at multiple times, quiesce commands to a plurality of host computers, each quiesce command including a timeout period that is adjusted at each of the multiple times, (ii) for determining, at each of the multiple times, whether acknowledgements indicating that a host has successfully stopped writing enterprise data to the source datastores, have been received from each of the host computers within the timeout period, (iii) for marking, at each of the multiple times, a cross-host checkpoint in the target datastore and reducing the timeout period for the quiesce commands at the next time, if the determining is affirmative, and (iv) for increasing, at each of the multiple times, the timeout period for the quiesce commands transmitted at the next time, if the determining is not affirmative.
    Type: Application
    Filed: February 7, 2012
    Publication date: August 8, 2013
    Applicant: ZERTO LTD.
    Inventors: Amir Boldo, Ori Mamluk, Chen Burshan
  • Publication number: 20130013564
    Abstract: A data center for data backup and replication, including a pool of multiple storage units for storing a journal of I/O write commands issued at respective times, wherein the journal spans a history window of a pre-specified time length, and a journal manager for dynamically allocating more storage units for storing the journal as the journal size increases, and for dynamically releasing storage units as the journal size decreases.
    Type: Application
    Filed: July 4, 2011
    Publication date: January 10, 2013
    Applicant: ZERTO LTD.
    Inventors: Tomer Ben-Or, Gil Barash, Chen Burshan, Yair Kuszpet
  • Publication number: 20120151273
    Abstract: An enterprise disaster recovery system, including a processor for running at least one data application that reads data from at least one data disk and writes data to the at least one data disk over a period of time, a recovery test engine that (i) generates in parallel a plurality of processing stacks corresponding to a respective plurality of previous points in time, each stack operative to process a command to read data at a designated address from a designated data disk and return data at the designated address in an image of the designated data disk at the previous point in time corresponding to the stack, and (ii) that generates in parallel a plurality of logs of commands issued by the at least one data application to write data into designated addresses of designated data disks, each log corresponding to a respective previous point in time.
    Type: Application
    Filed: February 7, 2012
    Publication date: June 14, 2012
    Applicant: ZERTO LTD.
    Inventors: Tomer Ben Or, Gil Barash, Chen Burshan
  • Publication number: 20120137173
    Abstract: A system for disaster recovery including a controller (i) for controlling bandwidth usage of a disaster recovery system in accordance with a plurality of recovery point objectives (RPOs), each RPO designating a maximal time loss constraint for data recovery for an enterprise production system, and a corresponding bandwidth allocation for the disaster recovery system to use in replicating data for the enterprise production system, wherein the RPOs are applied in accordance with a calendar-based schedule of dates and times, and (ii) for issuing an RPO alert when the RPO maximal time loss constraint for a current date and time is not satisfied.
    Type: Application
    Filed: February 7, 2012
    Publication date: May 31, 2012
    Applicant: ZERTO LTD.
    Inventors: Chen Burshan, Omri Shefi, Yair Kuszpet
  • Publication number: 20110264786
    Abstract: A system for cloud-based data services for multiple enterprises, including a plurality of cloud hypervisors that cooperatively provide cloud-based services to multiple enterprises, each hypervisor including a plurality of cloud virtual servers, each cloud virtual server being associated with an enterprise, at least one cloud virtual disk that is read from and written to by the at least one virtual server, each cloud virtual disk being associated with an enterprise, and a virtual data services appliance, which provides cloud-based data services, and multiple data services managers, one data services manager per respective enterprise, each of which coordinates the respective virtual data services appliances for those cloud hypervisors that service its corresponding enterprise.
    Type: Application
    Filed: July 4, 2011
    Publication date: October 27, 2011
    Applicant: ZERTO LTD.
    Inventors: Ziv Kedem, Gil Levonai, Yair Kuszpet, Chen Burshan
  • Publication number: 20110265085
    Abstract: A cross-host multi-hypervisor system, including a plurality of host sites, each site including at least one hypervisor, each of which includes at least one virtual server, at least one virtual disk that is read from and written to by the at least one virtual server, a tapping driver in communication with the at least one virtual server, which intercepts write requests made by any one of the at least one virtual server to any one of the at least one virtual disk, and a virtual data services appliance, in communication with the tapping driver, which receives the intercepted write requests from the tapping driver, and which provides data services based thereon, and a data services manager for coordinating the virtual data services appliances at the site, and a network for communicatively coupling the plurality of sites, wherein the data services managers coordinate data transfer across the plurality of sites via the network.
    Type: Application
    Filed: July 4, 2011
    Publication date: October 27, 2011
    Applicant: ZERTO LTD.
    Inventors: Ziv Kedem, Chen Burshan, Yair Kuszpet, Gil Levonai
  • Publication number: 20060236378
    Abstract: A method for connecting a user computer to a first computer network includes transmitting a connection request by the user computer, via a second computer network, requesting a connection to the first computer network. The second computer network is automatically solicited to authorize the user computer, responsively to a failure of the connection request. Upon authorization by the second computer network, a connection is established between the user computer and the first computer network via the second computer network.
    Type: Application
    Filed: April 19, 2005
    Publication date: October 19, 2006
    Inventor: Chen Burshan
  • Publication number: 20060069782
    Abstract: A method is disclosed for determining whether access to a host requested by a client session connection is permitted. After determining attributes of the client session connection, a list of hosts is selected based on the determined attributes of the client session connection. The list of hosts is then used to determine whether access to the requested host is permitted. The disclosed method can be used to allow for location-specific white lists of free URLs for a user at a wireless network hotspot that the user can access before being authenticated.
    Type: Application
    Filed: September 16, 2004
    Publication date: March 30, 2006
    Inventors: Michael Manning, Chen Burshan, Nathan Sowatskey, Ritesh Kumar, Gregory Wilkins
  • Publication number: 20060056317
    Abstract: A method is disclosed for determining a location of a client session in a telecommunications network by comparing attributes of the client session connection to location definition information stored in a configuration file. A method of handling requests from proxy and non-proxy client connections in a telecommunications network by redirecting requests from unauthenticated proxy clients to a transparent proxy port on a captive portal such that the captive portal proxies the requests is also disclosed. The request may be directed to a service, such as a destination IP address and optional port number. A method for a proxy server to identify an edge session through an out-of-band request containing proxy metadata to a web portal for secure (HTTPS) requests is also disclosed. The edge session is identified for the web portal through a hostkey determined by the proxy server.
    Type: Application
    Filed: April 19, 2005
    Publication date: March 16, 2006
    Inventors: Michael Manning, Chen Burshan, Nathan Sowatskey, Ritesh Kumar, Gregory Wilkins
  • Publication number: 20060059092
    Abstract: A method is disclosed for determining a whether access to host requested by a user is permitted. User identifying information is obtained using any of a variety of techniques. The method includes determining a user domain, which indicates an identity of the user's home service provider. A list of hosts is determined based on the home provider. If the requested host is in the list of hosts, then the user is allowed access to the requested host though the user is not authorized. The list of hosts may be determined by one or more attributes from an actual or implied user profile, such as a domain name.
    Type: Application
    Filed: August 16, 2005
    Publication date: March 16, 2006
    Inventors: Chen Burshan, Michael Manning, Elad Goldberg