Patents by Inventor Assaf Dagan
Assaf Dagan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10177984Abstract: Problem isolation in a virtual environment is described. In one example, a method (300) is provided for isolating problems in a virtual environment. The method includes maintaining (310) a topology of network devices in the virtual environment. The virtual environment can be monitored (320) using a performance module for network device operation irregularities exceeding a threshold. A network device operation irregularity can be identified (330) as well as a portion of the topology associated with the network device operation irregularity. Topology portions associated with network device operation irregularities can be grouped (340) together using a snapshot module to form a snapshot of a problem topology.Type: GrantFiled: July 31, 2015Date of Patent: January 8, 2019Assignee: ENTIT SOFTWARE LLCInventor: Assaf Dagan
-
Publication number: 20180026848Abstract: Problem isolation in a virtual environment is described. In one example, a method (300) is provided for isolating problems in a virtual environment. The method includes maintaining (310) a topology of network devices in the virtual environment. The virtual environment can be monitored (320) using a performance module for network device operation irregularities exceeding a threshold. A network device operation irregularity can be identified (330) as well as a portion of the topology associated with the network device operation irregularity. Topology portions associated with network device operation irregularities can be grouped (340) together using a snapshot module to form a snapshot of a problem topology.Type: ApplicationFiled: July 31, 2015Publication date: January 25, 2018Inventor: Assaf Dagan
-
Publication number: 20170034001Abstract: Problem isolation in a virtual environment is described. In one example, a method (300) is provided for isolating problems in a virtual environment. The method includes maintaining (310) a topology of network devices in the virtual environment. The virtual environment can be monitored (320) using a performance module for network device operation irregularities exceeding a threshold. A network device operation irregularity can be identified (330) as well as a portion of the topology associated with the network device operation irregularity. Topology portions associated with network device operation irregularities can be grouped (340) together using a snapshot module to form a snapshot of a problem topology.Type: ApplicationFiled: July 31, 2015Publication date: February 2, 2017Inventor: Assaf Dagan
-
Patent number: 9459942Abstract: Correlation of metrics monitored from a virtual environment is described herein. A method for detecting correlations between metrics monitored from a virtual environment includes monitoring network operation metrics of network devices in the virtual environment. Network operation metric irregularities exceeding a threshold are detected. A first network operation metric irregularity is selected from the detected network operation metric irregularities. A time frame of the first network operation metric irregularity is identified for analysis. A second network operation metric irregularity is selected from the detected network operation metric irregularities. The first network operation metric irregularity and the second network operation metric irregularity can be compared to determine a correspondence between the first network operation metric irregularity and the second network operation metric irregularity using a comparison engine and based on a predetermined analysis method.Type: GrantFiled: August 27, 2010Date of Patent: October 4, 2016Assignee: Hewlett Packard Enterprise Development LPInventor: Assaf Dagan
-
Publication number: 20160217382Abstract: An assisted method to identify an application component. User interaction with a component of an interactive software component is monitored, locator associated with each aspect of the component is identified, and a reconstructed version of the interactive software application is provided based on pieces of information derived from the response of the user on presented questions. The method is then determining the likelihood of the identification of a candidate component.Type: ApplicationFiled: January 26, 2015Publication date: July 28, 2016Applicant: Capriza Inc.Inventors: Dror Schwartz, Ido Ish-Hurwitz, Sagi Monza, Roie Uziel, Assaf Dagan
-
Patent number: 9122784Abstract: Problem isolation in a virtual environment is described. In one example, a method (300) is provided for isolating problems in a virtual environment. The method includes maintaining (310) a topology of network devices in the virtual environment. The virtual environment can be monitored (320) using a performance module for network device operation irregularities exceeding a threshold. A network device operation irregularity can be identified (330) as well as a portion of the topology associated with the network device operation irregularity. Topology portions associated with network device operation irregularities can be grouped (340) together using a snapshot module to form a snapshot of a problem topology.Type: GrantFiled: August 26, 2010Date of Patent: September 1, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventor: Assaf Dagan
-
Patent number: 8667334Abstract: Problem isolation in a virtual environment is described. In one example, a method is disclosed which includes maintaining a topology of network devices in a virtual environment in a performance management database hosted on a problem isolation server. The network devices can be monitored for metrics breaching a baseline. A snapshot of portions of the topology associated with the metrics breaching the baseline can be captured using a snapshot module. The snapshot captured can include a partial topology. Time stamps associated with the metrics can be maintained. The time stamps can include time stamps for when the metrics breach the baseline. The time stamps can be correlated with the snapshot to form a problem isolation timeline.Type: GrantFiled: August 27, 2010Date of Patent: March 4, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventor: Assaf Dagan
-
Publication number: 20130132778Abstract: Problem isolation in a virtual environment is described. In one example, a method (300) is provided for isolating problems in a virtual environment. The method includes maintaining (310) a topology of network devices in the virtual environment. The virtual environment can be monitored (320) using a performance module for network device operation irregularities exceeding a threshold. A network device operation irregularity can be identified (330) as well as a portion of the topology associated with the network device operation irregularity. Topology portions associated with network device operation irregularities can be grouped (340) together using a snapshot module to form a snapshot of a problem topology.Type: ApplicationFiled: August 26, 2010Publication date: May 23, 2013Inventor: Assaf Dagan
-
Publication number: 20120054331Abstract: Correlation of metrics monitored from a virtual environment is described herein. A method for detecting correlations between metrics monitored from a virtual environment includes monitoring network operation metrics of network devices in the virtual environment. Network operation metric irregularities exceeding a threshold are detected. A first network operation metric irregularity is selected from the detected network operation metric irregularities. A time frame of the first network operation metric irregularity is identified for analysis. A second network operation metric irregularity is selected from the detected network operation metric irregularities. The first network operation metric irregularity and the second network operation metric irregularity can be compared to determine a correspondence between the first network operation metric irregularity and the second network operation metric irregularity using a comparison engine and based on a predetermined analysis method.Type: ApplicationFiled: August 27, 2010Publication date: March 1, 2012Inventor: Assaf Dagan
-
Publication number: 20120054554Abstract: Problem isolation in a virtual environment is described. In one example, a method is disclosed which includes maintaining a topology of network devices in a virtual environment in a performance management database hosted on a problem isolation server. The network devices can be monitored for metrics breaching a baseline. A snapshot of portions of the topology associated with the metrics breaching the baseline can be captured using a snapshot module. The snapshot captured can include a partial topology. Time stamps associated with the metrics can be maintained. The time stamps can include time stamps for when the metrics breach the baseline. The time stamps can be correlated with the snapshot to form a problem isolation timeline.Type: ApplicationFiled: August 27, 2010Publication date: March 1, 2012Inventor: Assaf Dagan