Patents by Inventor Tomer Schwartz
Tomer Schwartz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240160910Abstract: In an example, an apparatus comprises a plurality of execution units comprising at least a first type of execution unit and a second type of execution unit and logic, at least partially including hardware logic, to expose embedded cast operations in at least one of a load instruction or a store instruction; determine a target precision level for the cast operations; and load the cast operations at the target precision level. Other embodiments are also disclosed and claimed.Type: ApplicationFiled: December 4, 2023Publication date: May 16, 2024Applicant: Intel CorporationInventors: Uzi Sarel, Ehud Cohen, Tomer Schwartz, Amitai Armon, Yahav Shadmiy, Amit Bleiweiss, Gal Leibovich, Jeremie Dreyfuss, Lev Faivishevsky, Tomer Bar-On, Yaniv Fais, Jacob Subag
-
Publication number: 20240154995Abstract: A method and system for detecting vulnerable wireless networks coexisting in a wireless environment of an organization are provided. The method includes receiving intercepted traffic, wherein the intercepted traffic is transmitted by at least one wireless device operable in an airspace of the wireless environment, wherein the intercepted traffic is transported using at least one type of wireless protocol; analyzing the received traffic to detect at least one active connection between a legitimate wireless device of the at least one wireless device and at least one unknown wireless device, wherein the legitimate wireless device is at least legitimately authorized to access a protected computing resource of the organization; and determining if the at least one detected active connection forms a vulnerable wireless network.Type: ApplicationFiled: November 18, 2023Publication date: May 9, 2024Inventors: Tomer SCHWARTZ, Nadir IZRAEL
-
Publication number: 20240134967Abstract: A system and method for securing deployment of computing infrastructure resources. A method includes determining, based on a unique identifier of a computing infrastructure resource indicated in an alert, a source identifier of a resource component including the computing infrastructure resource, wherein the resource component includes at least one source file, wherein the source identifier of the resource component is a combination of characteristics of the resource component which collectively uniquely identify the resource component with respect to the directory in which the at least one source file of the resource component reside; contextually enriching the alert by adding the source identifier of the resource component including the computing infrastructure resource to the alert; and performing at least one remediation action with respect to the contextually enriching alert.Type: ApplicationFiled: October 20, 2022Publication date: April 25, 2024Applicant: Dazz, Inc.Inventors: Eshel YARON, Tomer SCHWARTZ, Rom GENDLER
-
Publication number: 20240112033Abstract: In an example, an apparatus comprises at least one execution platform; and logic, at least partially including hardware logic, to receive a trained neural network model in a model optimizer and convert the trained neural network model to an optimized model comprising parameters that are fit to the at least one execution platform. Other embodiments are also disclosed and claimed.Type: ApplicationFiled: November 20, 2023Publication date: April 4, 2024Applicant: Intel CorporationInventors: Amit Bleiweiss, Itamar Ben-Ari, Michael Behar, Guy Jacob, Gal Leibovich, Jacob Subag, Lev Faivishevsky, Yaniv Fais, Tomer Schwartz
-
Patent number: 11935071Abstract: A computing system that determines employee and organizational compliance includes one or more databases that store organizational data and one or more processors to execute instructions to perform various operations.Type: GrantFiled: July 8, 2022Date of Patent: March 19, 2024Assignee: PEOPLE CENTER, INC.Inventors: Sachin Aralasurali Suryanarayana, Tomer Schwartz, Parthasarathy Jeyaram, Prateek Agarwal, Shubham Choudhary, Sanket Singhal, Sanjay Lal Bhavnani
-
Publication number: 20240037227Abstract: A system and method for securing deployment of computing infrastructure resources.Type: ApplicationFiled: July 27, 2022Publication date: February 1, 2024Applicant: Dazz, Inc.Inventors: Omer DEUTSCHER, Tomer SCHWARTZ, Eshel YARON, Barak BERCOVITZ
-
Patent number: 11886984Abstract: In an example, an apparatus comprises a plurality of execution units comprising at least a first type of execution unit and a second type of execution unit and logic, at least partially including hardware logic, to expose embedded cast operations in at least one of a load instruction or a store instruction; determine a target precision level for the cast operations; and load the cast operations at the target precision level. Other embodiments are also disclosed and claimed.Type: GrantFiled: August 10, 2021Date of Patent: January 30, 2024Assignee: INTEL CORPORATIONInventors: Uzi Sarel, Ehud Cohen, Tomer Schwartz, Amitai Armon, Yahav Shadmiy, Amit Bleiweiss, Gal Leibovich, Jeremie Dreyfuss, Lev Faivishevsky, Tomer Bar-On, Yaniv Fais, Jacob Subag
-
Publication number: 20240028883Abstract: A mechanism is described for facilitating memory handling and data management in machine learning at autonomous machines. A method of embodiments, as described herein, includes detecting multiple tables associated with multiple neural networks at multiple autonomous machines, where each of the multiple tables include an index. The method may further include combining the multiple tables and multiple indexes associated with the multiple tables into a single table and a single index, respectively, where the single table is communicated to the multiple autonomous machines to allow simultaneous processing of one or more portions of the single table using one or more memory devices and one or more processors of one or more of the multiple autonomous machines.Type: ApplicationFiled: July 26, 2023Publication date: January 25, 2024Applicant: Intel CorporationInventors: Tomer Schwartz, Ehud Cohen, Uzi Sarel, Amitai Armon, Yaniv Fais, Lev Faivishevsky, Amit Bleiweiss, Yahav Shadmiy, Jacob Subag
-
Publication number: 20230394305Abstract: In an example, an apparatus comprises a plurality of execution units comprising and logic, at least partially including hardware logic, to receive a plurality of data inputs for training a neural network, wherein the data inputs comprise training data and weights inputs; represent the data inputs in a first form; and represent the weight inputs in a second form. Other embodiments are also disclosed and claimed.Type: ApplicationFiled: May 30, 2023Publication date: December 7, 2023Applicant: Intel CorporationInventors: Lev Faivishevsky, Tomer Bar-On, Yaniv Fais, Jacob Subag, Jeremie Dreyfuss, Amit Bleiweiss, Tomer Schwartz, Raanan Yonatan Yehezkel Rohekar, Michael Behar, Amitai Armon, Uzi Sarel
-
Publication number: 20230376603Abstract: Systems and methods for identifying security control steps in software development pipelines. A method includes enumerating a plurality of steps in a software development infrastructure by analyzing software development pipeline data of the software development infrastructure, wherein each step includes a set of computer instructions for performing at least one task; identifying a plurality of step properties for each of the plurality of steps in step data of the step; and classifying at least one of the plurality of steps as a security control step based on the plurality of step properties identified for each of the plurality of steps, wherein each step classified as a security control step includes instructions for at least analyzing code in order to determine whether at least one security requirement is met.Type: ApplicationFiled: May 20, 2022Publication date: November 23, 2023Applicant: Dazz, Inc.Inventors: Eshel YARON, Tomer SCHWARTZ, Barak BERCOVITZ
-
Patent number: 11824880Abstract: A method and system for detecting vulnerable wireless networks coexisting in a wireless environment of an organization are provided. The method includes receiving intercepted traffic, wherein the intercepted traffic is transmitted by at least one wireless device operable in an airspace of the wireless environment, wherein the intercepted traffic is transported using at least one type of wireless protocol; analyzing the received traffic to detect at least one active connection between a legitimate wireless device of the at least one wireless device and at least one unknown wireless device, wherein the legitimate wireless device is at least legitimately authorized to access a protected computing resource of the organization; and determining if the at least one detected active connection forms a vulnerable wireless network.Type: GrantFiled: October 31, 2016Date of Patent: November 21, 2023Assignee: ARMIS SECURITY LTD.Inventors: Tomer Schwartz, Nadir Izrael
-
Publication number: 20230368214Abstract: A computing system that determines employee and organizational compliance includes one or more databases that store organizational data and one or more processors to execute instructions to perform various operations.Type: ApplicationFiled: July 8, 2022Publication date: November 16, 2023Inventors: Sachin Aralasurali Suryanarayana, Tomer Schwartz, Parthasarathy Jeyaram, Prateek Agarwal, Shubham Choudhary, Sanket Singhal, Sanjay Lal Bhavnani
-
Publication number: 20230315860Abstract: A system and method for software containers attribution are provided. The method includes de-compiling a configuration file of a container image of a software container; identifying at least one candidate build file in the de-complied configuration file, wherein the at least one candidate build potentially formed the container image; determining if at least one matching condition is satisfied between each of the at least one candidate build file and the de-complied configuration file; associating the configuration file with each candidate build file satisfying the matching condition; and updating an inventory with the associated configuration file and the respective candidate build, wherein such association provides a direct mapping between the container image and the build files formed the container image.Type: ApplicationFiled: March 29, 2022Publication date: October 5, 2023Applicant: Dazz, Inc.Inventors: Eshel Yaron, Tomer Schwartz, Pavel Resnianski
-
Publication number: 20230315843Abstract: Systems and methods for alert management. A method includes analyzing alerts with respect to cybersecurity issues indicated in the alerts to identify at least one group of matching alerts. Each group of matching alerts includes alerts generated by multiple cybersecurity detection tools. A software component associations database is queried based on software components indicated in each of the groups of alerts. The software component associations database stores associations between configuration files of software containers and build files used to build the software containers. At least one group of duplicate alerts is identified among the groups of matching alerts based on associations returned by the software component associations database. The software component indicated by a first alert of each group of duplicate alerts is associated with the software component indicated by a second alert of the group of duplicate alerts. The alerts are managed based on the groups of duplicate alerts.Type: ApplicationFiled: July 29, 2022Publication date: October 5, 2023Applicant: Dazz, Inc.Inventors: Oren YONA, Eyal GOLOMBEK, Tomer SCHWARTZ, Eshel YARON, Pavel RESNIANSKI
-
Publication number: 20230316589Abstract: In an example, an apparatus comprises logic, at least partially including hardware logic, to implement a lossy compression algorithm which utilizes a data transform and quantization process to compress data in a convolutional neural network (CNN) layer. Other embodiments are also disclosed and claimed.Type: ApplicationFiled: March 28, 2023Publication date: October 5, 2023Applicant: Intel CorporationInventors: Tomer Bar-On, Jacob Subag, Yaniv Fais, Jeremie Dreyfuss, Gal Novik, Gal Leibovich, Tomer Schwartz, Ehud Cohen, Lev Faivishevsky, Uzi Sarel, Amitai Armon, Yahav Shadmiy
-
Patent number: 11763140Abstract: A mechanism is described for facilitating memory handling and data management in machine learning at autonomous machines. A method of embodiments, as described herein, includes detecting multiple tables associated with multiple neural networks at multiple autonomous machines, where each of the multiple tables include an index. The method may further include combining the multiple tables and multiple indexes associated with the multiple tables into a single table and a single index, respectively, where the single table is communicated to the multiple autonomous machines to allow simultaneous processing of one or more portions of the single table using one or more memory devices and one or more processors of one or more of the multiple autonomous machines.Type: GrantFiled: August 5, 2021Date of Patent: September 19, 2023Assignee: INTEL CORPORATIONInventors: Tomer Schwartz, Ehud Cohen, Uzi Sarel, Amitai Armon, Yaniv Fais, Lev Faivishevsky, Amit Bleiweiss, Yahav Shadmiy, Jacob Subag
-
Patent number: 11704564Abstract: In an example, an apparatus comprises a plurality of execution units comprising and logic, at least partially including hardware logic, to receive a plurality of data inputs for training a neural network, wherein the data inputs comprise training data and weights inputs; represent the data inputs in a first form; and represent the weight inputs in a second form. Other embodiments are also disclosed and claimed.Type: GrantFiled: August 17, 2021Date of Patent: July 18, 2023Assignee: INTEL CORPORATIONInventors: Lev Faivishevsky, Tomer Bar-On, Yaniv Fais, Jacob Subag, Jeremie Dreyfuss, Amit Bleiweiss, Tomer Schwartz, Raanan Yonatan Yehezkel Rohekar, Michael Behar, Amitai Armon, Uzi Sarel
-
Patent number: 11669719Abstract: In an example, an apparatus comprises logic, at least partially including hardware logic, to save one or more outputs of a deep learning neural network in a storage system of an autonomous vehicle and upload the one or more outputs to a remote server. Other embodiments are also disclosed and claimed.Type: GrantFiled: February 12, 2021Date of Patent: June 6, 2023Assignee: INTEL CORPORATIONInventors: Jeremie Dreyfuss, Amit Bleiweiss, Lev Faivishevsky, Tomer Bar-On, Yaniv Fais, Jacob Subag, Eran Ben-Avi, Neta Zmora, Tomer Schwartz
-
Publication number: 20230169170Abstract: Systems and methods for automating alert remediation. A method includes extracting entity-identifying values from cybersecurity event data included in alerts generated for a software infrastructure. Queries are generated based on the entity-identifying values. An entity graph is queried. The entity graph has nodes representing respective entities. The entities include software components of the software infrastructure and event logic components of cybersecurity event logic deployed with respect to the software infrastructure. Paths are identified in the entity graph based on the query results. Each identified path is between one of the software components and one of the event logic components. One or more root cause entities are identified based on the identified paths. A fix action plan is generated for the alerts based on the root cause entities.Type: ApplicationFiled: February 1, 2023Publication date: June 1, 2023Applicant: Dazz, Inc.Inventors: Eshel YARON, Tomer SCHWARTZ, Barak BERCOVITZ, Omer DEUTSCHER, Oren YONA, Eyal GOLOMBEK, Pavel RESNIANSKI, Guy BIRAN, Yuval OFIR
-
Publication number: 20230130649Abstract: A system and method for remediating cybersecurity events. A method includes querying a knowledge base using a query generated based on semantic concepts and entity-identifying values extracted from cybersecurity event data, wherein the knowledge base includes an entity graph having nodes representing respective entities, wherein the entities include software components of software infrastructure and event logic components of cybersecurity event logic deployed with respect to the software infrastructure; identifying at least one path in the entity graph based on results of the query, wherein each identified path is between one of the software components and one of the event logic components; identifying at least one root cause entity based on the identified at least one path; and performing at least one remedial action based on the identified at least one root cause entity.Type: ApplicationFiled: October 21, 2021Publication date: April 27, 2023Applicant: Dazz, Inc.Inventors: Tomer SCHWARTZ, Eshel YARON, Barak BERCOVITZ