Patents by Inventor Eyal Kenigsberg
Eyal Kenigsberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10938917Abstract: Examples disclosed herein relate to triggering a high availability feature in response to detecting impairment of client experience. Examples include detecting, based on content of interactions between at least one application component and a client, a threshold impairment of an experience of the client in relation to the at least one application component. Examples also include triggering a high availability feature for the at least one application component in response to detecting the threshold impairment.Type: GrantFiled: December 19, 2012Date of Patent: March 2, 2021Assignee: MICRO FOCUS LLCInventors: Rotem Steuer, Michael Gopshtein, Eyal Kenigsberg
-
Patent number: 10740119Abstract: A common action flow for an application is identified by processing session data maintained for a plurality of users to identify a plurality of action flows. Each action flow represents a series of actions taken by one of the users navigating the application's user interface during a session. A data structure is generated from the plurality of action flows. That data structure is indicative of a plurality of candidate sub-flows. The data structure is analyzed to identify a selected one of the candidate sub-flows repeated in multiple ones of the plurality of action flows. That identified sub-flow is the common action flow. Data representative of the identified common action flow can then be communicated.Type: GrantFiled: July 20, 2017Date of Patent: August 11, 2020Assignee: MICRO FOCUS LLCInventors: Igor Nor, Eyal Kenigsberg, Ola Galkin
-
Patent number: 10346631Abstract: In one implementation, a system can include a tenant engine to maintain a plurality of tenant profiles with access to a first set of metrics of a plurality of metrics based on authorization via a certificate, a metrics engine to maintain a plurality of metrics derived from instrumentation of a plurality of applications, and a report engine to provide the first set of metrics in response to a report request when the report request is from a user associated with a first tenant profile of the plurality of tenant profiles and the first tenant profile is authorized to access the first set of metrics based on the certificate associated with a private key used to sign a first application of the plurality of applications.Type: GrantFiled: September 30, 2014Date of Patent: July 9, 2019Assignee: ENTIT SOFTWARE LLCInventors: Michael Gopshtein, Eyal Kenigsberg
-
Patent number: 10313459Abstract: Example embodiments relate to monitoring application flow of an application responsive to receiving a monitoring mode upon launch of a session of the application. In this manner, the embodiments disclosed herein enable monitoring an application on a first computing device based on a first received monitoring mode and monitoring the same application on a second computing device based on a second received monitoring mode.Type: GrantFiled: April 29, 2014Date of Patent: June 4, 2019Assignee: ENTIT SOFTWARE LLCInventors: Amichai Nitsan, Eyal Kenigsberg, Michael Gopshtein
-
Patent number: 10305760Abstract: A non-transitory machine-readable storage medium encoded with instructions executable by a processing resource of a computing device to access network traffic exchanged with a web server application. The storage medium also identifies, in the accessed network traffic, an analysis reporting message of a client system and extracts, from the analysis reporting message, information representing a client system analysis of at least one prior transaction between the client system and a proxy server associated with the web server application. The information representing the client system analysis can comprise information describing an experience of the client system, including an indication of an amount of time to perform at least one prior transaction between the client system and the proxy server.Type: GrantFiled: January 3, 2013Date of Patent: May 28, 2019Assignee: ENTIT SOFTWARE LLCInventors: Guy Offer, Michael Gopshtein, Eyal Kenigsberg
-
Patent number: 10153981Abstract: Packets from a first network entity to a second network entity are received. A maximal size of packets from the second network entity to the first network entity is determined based on information in the received packets.Type: GrantFiled: April 14, 2017Date of Patent: December 11, 2018Assignee: ENTIT SOFTWARE LLCInventors: Michael Gopshtein, Eyal Kenigsberg, Rotem Steuer
-
Patent number: 10073918Abstract: According to an example, a Trie is formed from URLs and nodes of the Trie are assigned a weight. A node is selected based on its weight and child nodes of the selected node merged together. A URL classification is output based on a path in the Trie.Type: GrantFiled: August 12, 2014Date of Patent: September 11, 2018Assignee: ENTIT SOFTWARE LLCInventors: Adi Lipin, Alon Berkoviz, Boaz Shor, Eyal Kenigsberg
-
Patent number: 9866466Abstract: Methods, systems, and computer-readable and executable instructions are provided for simulating real user issues in support environments. Simulating real user issues in support environments can include providing stored data related to a real user issue associated with an application to a support device having the ability to modify the application, the stored data can include network traffic associated with a user device in a live environment and inputs provided via the user device. Simulating real user issues in support environments can include causing the support device to simulate the real user issue using the stored data.Type: GrantFiled: January 21, 2013Date of Patent: January 9, 2018Assignee: ENTIT SOFTWARE LLCInventors: Michael Gopshtein, Amichai Nitsan, Eyal Kenigsberg
-
Publication number: 20170315822Abstract: A common action flow for an application is identified by processing session data maintained for a plurality of users to identify a plurality of action flows. Each action flow represents a series of actions taken by one of the users navigating the application's user interface during a session. A data structure is generated from the plurality of action flows. That data structure is indicative of a plurality of candidate sub-flows. The data structure is analyzed to identify a selected one of the candidate sub-flows repeated in multiple ones of the plurality of action flows. That identified sub-flow is the common action flow. Data representative of the identified common action flow can then be communicated.Type: ApplicationFiled: July 20, 2017Publication date: November 2, 2017Applicant: EntIT Software LLCInventors: Igor NOR, Eyal KENIGSBERG, Ola GALKIN
-
Publication number: 20170300708Abstract: In one implementation, a system can include a tenant engine to maintain a plurality of tenant profiles with access to a first set of metrics of a plurality of metrics based on authorization via a certificate, a metrics engine to maintain a plurality of metrics derived from instrumentation of a plurality of applications, and a report engine to provide the first set of metrics in response to a report request when the report request is from a user associated with a first tenant profile of the plurality of tenant profiles and the first tenant profile is authorized to access the first set of metrics based on the certificate associated with a private key used to sign a first application of the plurality of applications.Type: ApplicationFiled: September 30, 2014Publication date: October 19, 2017Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Michael Gopshtein, Eyal Kenigsberg
-
Patent number: 9753743Abstract: A common action flow for an application is identified by processing session data maintained for a plurality of users to identify a plurality of action flows. Each action flow represents a series of actions taken by one of the users navigating the application's user interface during a session. A data structure is generated from the plurality of action flows. That data structure is indicative of a plurality of candidate sub-flows. The data structure is analyzed to identify a selected one of the candidate sub-flows repeated in multiple ones of the plurality of action flows. That identified sub-flow is the common action flow. Data representative of the identified common action flow can then be communicated.Type: GrantFiled: December 5, 2013Date of Patent: September 5, 2017Assignee: ENTIT SOFTWARE LLCInventors: Igor Nor, Eyal Kenigsberg, Ola Galkin
-
Publication number: 20170222938Abstract: Packets from a first network entity to a second network entity are received. A maximal size of packets from the second network entity to the first network entity is determined based on information in the received packets.Type: ApplicationFiled: April 14, 2017Publication date: August 3, 2017Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Michael GOPSHTEIN, Eyal KENIGSBERG, Rotem STEUER
-
Patent number: 9660924Abstract: Packets from a first network entity to a second network entity are received. A maximal size of packets from the second network entity to the first network entity is determined based on information in the received packets.Type: GrantFiled: April 16, 2012Date of Patent: May 23, 2017Assignee: Hewlett Packard Enterprise Development LPInventors: Michael Gopshtein, Eyal Kenigsberg, Rotem Steuer
-
Publication number: 20170093995Abstract: Example embodiments relate to monitoring application flow of an application responsive to receiving a monitoring mode upon launch of a session of the application. In this manner, the embodiments disclosed herein enable monitoring an application on a first computing device based on a first received monitoring mode and monitoring the same application on a second computing device based on a second received monitoring mode.Type: ApplicationFiled: April 29, 2014Publication date: March 30, 2017Inventors: Amichai Nitsan, Eyal Kenigsberg, Michael Gopshtein
-
Patent number: 9444701Abstract: A method for discovering an operating system of a remote machine includes monitoring network communications to detect a plurality of data packets that were generated by the remote machine. The contents of each detected data packet are read so as to extract a packet signature of each detected data packet. Each packet signature is compared with at least one signature of a database of signatures in order to determine a similarity between each packet signature and the signature from the database. A confidence level for at least one candidate operating system is calculated based on the determined similarities. A candidate operating system is selected based on the confidence level for that operating system. Relating computer program product and data processing system are also disclosed.Type: GrantFiled: January 27, 2011Date of Patent: September 13, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Nick Ioffe, Eyal Kenigsberg, Michael Gopshtein, Rotem Steuer
-
Publication number: 20160048586Abstract: According to an example, a Trie is formed from URLs and nodes of the Trie are assigned a weight. A node is selected based on its weight and child nodes of the selected node merged together. A URL classification is output based on a path in the Trie.Type: ApplicationFiled: August 12, 2014Publication date: February 18, 2016Inventors: Adi LIPIN, Alon BERKOVIZ, Boaz SHOR, Eyal KENIGSBERG
-
Publication number: 20150333985Abstract: Examples disclosed herein relate to identifying an analysis reporting message in network traffic. Examples include accessing network traffic exchanged with a web server application and identifying, in the network traffic, an analysis reporting message. In examples described herein, the analysis reporting message may include information representing a client system analysis of at least one prior transaction of the client system.Type: ApplicationFiled: January 3, 2013Publication date: November 19, 2015Inventors: Guy Offer, Michael Gopshtein, Eyal Kenigsberg
-
Patent number: 9178771Abstract: Examples disclosed herein relate to determining the type of a network tier. Examples include determining that a target network tier is a forwarding type network tier if a protocol of communications between the target network tier and a source network resource is the same as a protocol of communications between the target network tier and a backend network tier. Examples further include comparing select content of communications between the target and backend network tiers to select content of communications between the target network tier and the source networking resource, if the protocols are the same.Type: GrantFiled: August 23, 2012Date of Patent: November 3, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Efrat Ben David, Eyal Kenigsberg, Michael Gopshtein
-
Publication number: 20150304409Abstract: A technique includes using a network sniffer to acquire at least one measurement of network activity associated with an application component, where the application component is a candidate to be migrated to a cloud. The technique further includes, based at least in part on the measurement(s), determining at least one cost factor associated with the application component being provided by the cloud.Type: ApplicationFiled: November 28, 2012Publication date: October 22, 2015Applicant: Hewelett-Packard Development Company, L.P.Inventors: Rotem Steuer, Eyal Kenigsberg, Michael Gopshtein
-
Publication number: 20150160831Abstract: A common action flow for an application is identified by processing session data maintained for a plurality of users to identify a plurality of action flows. Each action flow represents a series of actions taken by one of the users navigating the application's user interface during a session. A data structure is generated from the plurality of action flows. That data structure is indicative of a plurality of candidate sub-flows. The data structure is analyzed to identify a selected one of the candidate sub-flows repeated in multiple ones of the plurality of action flows. That identified sub-flow is the common action flow. Data representative of the identified common action flow can then be communicated.Type: ApplicationFiled: December 5, 2013Publication date: June 11, 2015Inventors: Igor Nor, Eyal Kenigsberg, Ola Galkin