Patents by Inventor MOSHIK HERSHCOVITCH
MOSHIK HERSHCOVITCH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240095186Abstract: According to an aspect, a computer-implemented method includes operating a program on a virtual machine on a first device having a local cache memory. Based on a determination that an epoch timer has not expired, aspects include writing one or more updates to the local cache memory and transmitting evicted items from the local cache memory to a shared memory device that is separate from the first device. Based on a determination that an epoch timer has expired, aspects include flushing the local cache memory to the shared memory device, transmitting a virtual CPU state of the virtual machine to the shared memory device, and resetting the epoch timer.Type: ApplicationFiled: September 15, 2022Publication date: March 21, 2024Inventors: Daniel Waddington, MOSHIK HERSHCOVITCH
-
Patent number: 11057361Abstract: A computer program product and a system comprising: a cluster of Secure Execution Platforms (SEPs) having connectivity to a data storage, each SEP of said cluster is configured to maintain, using a key, confidentiality of data while processing thereof; the key is shared among the SEPs of said cluster, the key is automatically generated by the cluster or portion thereof and is unavailable to any non-cluster entity; the data storage retains encrypted data that is encrypted using the key; a first SEP of the cluster is configured to encrypt client data using the key to obtain encrypted client data and store the encrypted client data in the data storage; and a second SEP of the cluster is configured to retrieve encrypted stored data from the data storage, decrypt the encrypted stored data using the key to obtain non-encrypted form of the encrypted stored data.Type: GrantFiled: October 17, 2019Date of Patent: July 6, 2021Assignee: International Business Machines CorporationInventors: Danny Harnik, Moshik Hershcovitch, Paula Ta-Shma, Yaron Weinsberg
-
Patent number: 10795861Abstract: A computer-implemented method, according to one embodiment, includes: determining which of a plurality of fingerprints correspond to a copy of user data stored in one or more logical volumes at a storage location, and which of the plurality of fingerprints correspond to a pointer that points to a copy of user data stored in the one or more logical volumes at the storage location. A number of unique fingerprints is determined, and a number of the copies of user data stored in the one or more logical volumes is determined. The number of the copies of user data and the number of unique fingerprints are used to calculate an actual deduplication efficiency value. The number of the copies of user data and the number of unique fingerprints are used to calculate a potential deduplication efficiency value. The actual deduplication efficiency value is compared to the potential deduplication efficiency value.Type: GrantFiled: June 20, 2018Date of Patent: October 6, 2020Assignee: International Business Machines CorporationInventors: Yosef Shatsky, Danny Harnik, Asaf Porat-Stoler, Moshik Hershcovitch
-
Patent number: 10650018Abstract: A system to reduce the amount of storage and memory used to maintain derived datasets is disclosed. The system operates by using pointers to the underlying data in persistent, byte-addressable storage media. The system additionally reduces the creation time of the views when storage class memory (SCM) is the underlying storage. Furthermore, the invention relates to a form of compression that is tailored to the use cases of big data analytics. The processes of this disclosure use random access to significantly improve performance.Type: GrantFiled: March 9, 2017Date of Patent: May 12, 2020Assignee: International Business Machines CorporationInventors: Danny Harnik, Moshik Hershcovitch, Ronen Kat, Yaron Weinsberg
-
Publication number: 20200110819Abstract: A system and method for recovering a database and restoring an index following a failure of the database is disclosed. The method receives a change to a record in the database. The change is stored in a persistent data store, the persistent data store is divided into a plurality of segments. The volatile index is updated in volatile memory with a pointer to the record in the persistent data store. A shadow index is generated in the persistent data store, where the shadow index is a persistent copy of the volatile index and is not updated at the same time as the volatile index. The shadow thread is executed on the plurality of records where the shadow thread scans each record in the persistent storage device to populate and update the shadow index, wherein the shadow thread operates as a background operation on the persistent data store.Type: ApplicationFiled: October 8, 2018Publication date: April 9, 2020Inventors: Revital Erez, Michael Factor, Moshik Hershcovitch, Ronen I. Kat, Elliot K. Kolodner, Joel K. Nider
-
Patent number: 10567359Abstract: A computer program product and a system comprising: a cluster of Secure Execution Platforms (SEPs) having connectivity to a data storage, each SEP of said cluster is configured to maintain, using a key, confidentiality of data while processing thereof; the key is shared among the SEPs of said cluster, the key is automatically generated by the cluster or portion thereof and is unavailable to any non-cluster entity; the data storage retains encrypted data that is encrypted using the key; a first SEP of the cluster is configured to encrypt client data using the key to obtain encrypted client data and store the encrypted client data in the data storage; and a second SEP of the cluster is configured to retrieve encrypted stored data from the data storage, decrypt the encrypted stored data using the key to obtain non-encrypted form of the encrypted stored data.Type: GrantFiled: July 18, 2017Date of Patent: February 18, 2020Assignee: International Business Machines CorporationInventors: Danny Harnik, Moshik Hershcovitch, Paula Ta-Shma, Yaron Weinsberg
-
Publication number: 20200053067Abstract: A computer program product and a system comprising: a cluster of Secure Execution Platforms (SEPs) having connectivity to a data storage, each SEP of said cluster is configured to maintain, using a key, confidentiality of data while processing thereof; the key is shared among the SEPs of said cluster, the key is automatically generated by the cluster or portion thereof and is unavailable to any non-cluster entity; the data storage retains encrypted data that is encrypted using the key; a first SEP of the cluster is configured to encrypt client data using the key to obtain encrypted client data and store the encrypted client data in the data storage; and a second SEP of the cluster is configured to retrieve encrypted stored data from the data storage, decrypt the encrypted stored data using the key to obtain non-encrypted form of the encrypted stored data.Type: ApplicationFiled: October 17, 2019Publication date: February 13, 2020Inventors: Danny Harnik, Moshik Hershcovitch, Paula Ta-Shma, Yaron Weinsberg
-
Publication number: 20190392048Abstract: A computer-implemented method, according to one embodiment, includes: determining which of a plurality of fingerprints correspond to a copy of user data stored in one or more logical volumes at a storage location, and which of the plurality of fingerprints correspond to a pointer that points to a copy of user data stored in the one or more logical volumes at the storage location. A number of unique fingerprints is determined, and a number of the copies of user data stored in the one or more logical volumes is determined. The number of the copies of user data and the number of unique fingerprints are used to calculate an actual deduplication efficiency value. The number of the copies of user data and the number of unique fingerprints are used to calculate a potential deduplication efficiency value. The actual deduplication efficiency value is compared to the potential deduplication efficiency value.Type: ApplicationFiled: June 20, 2018Publication date: December 26, 2019Inventors: Yosef Shatsky, Danny Harnik, Asaf Porat-Stoler, Moshik Hershcovitch
-
Publication number: 20190026234Abstract: A computer program product and a system comprising: a cluster of Secure Execution Platforms (SEPs) having connectivity to a data storage, each SEP of said cluster is configured to maintain, using a key, confidentiality of data while processing thereof; the key is shared among the SEPs of said cluster, the key is automatically generated by the cluster or portion thereof and is unavailable to any non-cluster entity; the data storage retains encrypted data that is encrypted using the key; a first SEP of the cluster is configured to encrypt client data using the key to obtain encrypted client data and store the encrypted client data in the data storage; and a second SEP of the cluster is configured to retrieve encrypted stored data from the data storage, decrypt the encrypted stored data using the key to obtain non-encrypted form of the encrypted stored data.Type: ApplicationFiled: July 18, 2017Publication date: January 24, 2019Inventors: DANNY HARNIK, Moshik Hershcovitch, Paula Ta-Shma, Yaron Weinsberg
-
Publication number: 20180260454Abstract: A system to reduce the amount of storage and memory used to maintain derived datasets is disclosed. The system operates by using pointers to the underlying data in persistent, byte-addressable storage media. The system additionally reduces the creation time of the views when storage class memory (SCM) is the underlying storage. Furthermore, the invention relates to a form of compression that is tailored to the use cases of big data analytics. The processes of this disclosure use random access to significantly improve performance.Type: ApplicationFiled: March 9, 2017Publication date: September 13, 2018Inventors: Danny Harnik, MOSHIK HERSHCOVITCH, RONEN KAT, YARON WEINSBERG