Patents by Inventor Moriel Lechtman
Moriel Lechtman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10606754Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that include receiving a storage command from a host computer to retrieve first data from a specific physical region of a storage device, and responsively retrieving second data from one or more additional physical regions of the storage device based on a logical mapping managed by the host computer. The second data is conveyed to a cache. In some embodiments, the logical mapping is received from the host computer prior to receiving the storage command. In alternative embodiments, the logical mapping is retrieved from the storage device prior to receiving the storage command.Type: GrantFiled: April 16, 2012Date of Patent: March 31, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Itzhack Goldberg, Stephen Alfred Haley, Moriel Lechtman
-
Patent number: 9727626Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that include conveying first data from local regions of a local volume of a local storage system to a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions. While conveying the first data, a request is received to update a given local region, and the given local region is marked.Type: GrantFiled: July 15, 2015Date of Patent: August 8, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Itzhack Goldberg, Michael Keller, Moriel Lechtman, Orit Nissan-Messing, Eliyahu Weissbrem
-
Patent number: 9582383Abstract: For efficient handing of semi-asynchronous RAID write failures using a processor device in a computing environment, a write operation is committed on a primary copy of data on a primary entity while sending the data to a secondary entity while awaiting an acknowledgment by the secondary entity. The acknowledgment indicates to the primary entity that metadata for the write operation has arrived at the secondary entity without necessarily indicating the data has arrived at the secondary entity.Type: GrantFiled: February 24, 2016Date of Patent: February 28, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christophe Fagiano, Itzhack Goldberg, Carl E. Jones, Moriel Lechtman, Neil Sondhi
-
Publication number: 20160170852Abstract: For efficient handing of semi-asynchronous RAID write failures using a processor device in a computing environment, a write operation is committed on a primary copy of data on a primary entity while sending the data to a secondary entity while awaiting an acknowledgment by the secondary entity. The acknowledgment indicates to the primary entity that metadata for the write operation has arrived at the secondary entity without necessarily indicating the data has arrived at the secondary entity.Type: ApplicationFiled: February 24, 2016Publication date: June 16, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christophe FAGIANO, Itzhack GOLDBERG, Carl E. JONES, Moriel LECHTMAN, Neil SONDHI
-
Patent number: 9304865Abstract: For efficient handing of semi-asynchronous RAID write failures using a processor device in a computing environment, a write operation is committed on a primary copy of data on a primary entity while sending the data to a secondary entity while awaiting an acknowledgment by the secondary entity. The acknowledgment indicates to the primary entity that metadata for the write operation has arrived at the secondary entity without necessarily indicating the data has arrived at the secondary entity. The acknowledgment is sent from the secondary entity regardless of a write failure and allowing the secondary entity to perform a recovery operation if a write failure occurs.Type: GrantFiled: March 26, 2014Date of Patent: April 5, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christophe Fagiano, Itzhack Goldberg, Carl E. Jones, Moriel Lechtman, Neil Sondhi
-
Patent number: 9223510Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that include arranging a first multiple of storage slices to store a second multiple of logical volumes, and assigning a respective offset to each of the logical volumes. Each of the logical volumes are then configured to start storing data at a first of the storage slices indicated by the assigned respective offset. In operation, data can be stored to a slice indicated by the assigned offset and an internal volume offset. Subsequent to configuring each of the logical volumes, one the storage slices having a highest storage utilization is identified, and one of the logical volumes having a highest number of physical regions in the identified storage slice is reconfigured to start storing the data at a second of the storage slices.Type: GrantFiled: June 26, 2013Date of Patent: December 29, 2015Assignee: GLOBALFOUNDRIES INC.Inventors: Ofer Aharon, Itzhack Goldberg, Shai Harony, Moriel Lechtman
-
Publication number: 20150317373Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that include conveying first data from local regions of a local volume of a local storage system to a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions. While conveying the first data, a request is received to update a given local region, and the given local region is marked.Type: ApplicationFiled: July 15, 2015Publication date: November 5, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Itzhack GOLDBERG, Michael KELLER, Moriel LECHTMAN, Orit NISSAN-MESSING, Eliyahu WEISSBREM
-
Publication number: 20150278019Abstract: For efficient handing of semi-asynchronous RAID write failures using a processor device in a computing environment, a write operation is committed on a primary copy of data on a primary entity while sending the data to a secondary entity while awaiting an acknowledgment by the secondary entity. The acknowledgment indicates to the primary entity that metadata for the write operation has arrived at the secondary entity without necessarily indicating the data has arrived at the secondary entity. The acknowledgment is sent from the secondary entity regardless of a write failure and allowing the secondary entity to perform a recovery operation if a write failure occurs.Type: ApplicationFiled: March 26, 2014Publication date: October 1, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christophe FAGIANO, Itzhack GOLDBERG, Carl E. JONES, Moriel LECHTMAN, Neil SONDHI
-
Patent number: 9146685Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that include conveying first data from local regions of a local volume of a local storage system to a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions. While conveying the first data, a request is received to update a given local region, and the given local region is marked. Subsequent to conveying the first data, a local snapshot referencing the local regions is created, and second data is conveyed from the marked local region to the remote storage system.Type: GrantFiled: February 11, 2013Date of Patent: September 29, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Itzhack Goldberg, Michael Keller, Moriel Lechtman, Orit Nissan-Messing, Eliyahu Weissbrem
-
Publication number: 20150006833Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that include arranging a first multiple of storage slices to store a second multiple of logical volumes, and assigning a respective offset to each of the logical volumes. Each of the logical volumes are then configured to start storing data at a first of the storage slices indicated by the assigned respective offset. In operation, data can be stored to a slice indicated by the assigned offset and an internal volume offset. Subsequent to configuring each of the logical volumes, one the storage slices having a highest storage utilization is identified, and one of the logical volumes having a highest number of physical regions in the identified storage slice is reconfigured to start storing the data at a second of the storage slices.Type: ApplicationFiled: June 26, 2013Publication date: January 1, 2015Inventors: Ofer AHARON, Itzhack GOLDBERG, Shai HARONY, Moriel LECHTMAN
-
Publication number: 20130275679Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that include receiving a storage command from a host computer to retrieve first data from a specific physical region of a storage device, and responsively retrieving second data from one or more additional physical regions of the storage device based on a logical mapping managed by the host computer. The second data is conveyed to a cache. In some embodiments, the logical mapping is received from the host computer prior to receiving the storage command. In alternative embodiments, the logical mapping is retrieved from the storage device prior to receiving the storage command.Type: ApplicationFiled: April 16, 2012Publication date: October 17, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Itzhack GOLDBERG, Stephen Alfred HALEY, Moriel LECHTMAN
-
Patent number: 8370925Abstract: Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period.Type: GrantFiled: July 29, 2008Date of Patent: February 5, 2013Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Itzhack Goldberg, Moriel Lechtman, Yotam Medini
-
Patent number: 8365245Abstract: Illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for previous password based authentication. In one illustrative embodiment, the computer implemented method comprises obtaining a combination of an identifier and a password and determining whether the password is current and correct. The computer implemented method responsive to determining the password is other than current and correct, prompting for an old password and determining whether the old password matches a previous password. Responsive to the old password matching a previous password, thereby creating a password match, permitting access to a resource.Type: GrantFiled: February 19, 2008Date of Patent: January 29, 2013Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Itzhack Goldberg, David Bruce Kumhyr, Moriel Lechtman
-
Publication number: 20100031343Abstract: Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period.Type: ApplicationFiled: July 29, 2008Publication date: February 4, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rhonda L. Childress, Itzhack Goldberg, Moriel Lechtman, Yotam Medini
-
Publication number: 20090210938Abstract: Illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for previous password based authentication. In one illustrative embodiment, the computer implemented method comprises obtaining a combination of an identifier and a password and determining whether the password is current and correct. The computer implemented method responsive to determining the password is other than current and correct, prompting for an old password and determining whether the old password matches a previous password. Responsive to the old password matching a previous password, thereby creating a password match, permitting access to a resource.Type: ApplicationFiled: February 19, 2008Publication date: August 20, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rhonda L. Childress, Itzhack Goldberg, David Bruce Kumhyr, Moriel Lechtman