Patents by Inventor Eyal Koren
Eyal Koren has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180195908Abstract: A visually sensible indicator of temperature including electronic temperature sensing circuitry sensing at least when a temperature exceeds at least one predetermined temperature threshold and providing at least one corresponding threshold exceedance output which is sensible as heat and a heat-responsive visually sensible display which is responsive to the at least one threshold exceedance output for providing at least one visually sensible indication indicating that the temperature has exceeded the predetermined temperature threshold.Type: ApplicationFiled: July 7, 2016Publication date: July 12, 2018Inventors: Yaron Nemet, Rafael Ben Shahar, Eyal Koren
-
Publication number: 20180103110Abstract: Systems and methods provide automatic discovery of cluster membership based on transaction processing. An example method includes, at a source node of a first tier of nodes, generating a service identifier for a transaction that requests a service hosted by a second tier, the service identifier being based on a logical identifier for the second tier. The method also includes sending the transaction, including the service identifier, from the source node to the service hosted by the second tier. The method includes, at a destination node in the second tier, obtaining the service identifier from the transaction and reporting the service identifier with a destination node identifier to a visibility server as cluster information. The method also includes, at the visibility server, receiving cluster information from a plurality of destination nodes and assigning each of the plurality of destination nodes to a cluster based on the service identifiers.Type: ApplicationFiled: October 6, 2016Publication date: April 12, 2018Inventors: Eyal KOREN, Nitsan Daniel LAVIE, Sergey KLEYMAN
-
Publication number: 20180024910Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: ApplicationFiled: September 11, 2017Publication date: January 25, 2018Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Patent number: 9767007Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: GrantFiled: October 20, 2016Date of Patent: September 19, 2017Assignee: Identify Software Ltd. (IL)Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Publication number: 20170039127Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: ApplicationFiled: October 20, 2016Publication date: February 9, 2017Inventors: Eyal KOREN, Asaf DAFNER, Shiri Semo JUDELMAN
-
Patent number: 9483391Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: GrantFiled: January 21, 2016Date of Patent: November 1, 2016Assignee: Identify Software Ltd.Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Patent number: 9436588Abstract: According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: GrantFiled: September 28, 2012Date of Patent: September 6, 2016Assignee: Identify Software Ltd. (IL)Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Publication number: 20160140029Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: ApplicationFiled: January 21, 2016Publication date: May 19, 2016Inventors: Eyal KOREN, Asaf DAFNER, Shiri Semo JUDELMAN
-
Patent number: 9250924Abstract: According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: GrantFiled: September 28, 2012Date of Patent: February 2, 2016Assignee: IDENTIFY SOFTWARE LTD.Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Publication number: 20150186644Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.Type: ApplicationFiled: March 6, 2015Publication date: July 2, 2015Inventors: Gilad Arbel KOMISSAR, Eyal KOREN, Asaf DAFNER
-
Publication number: 20150160947Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.Type: ApplicationFiled: December 8, 2014Publication date: June 11, 2015Inventors: Shiri Semo JUDELMAN, Asaf DAFNER, Eyal KOREN
-
Patent number: 9003233Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.Type: GrantFiled: December 31, 2012Date of Patent: April 7, 2015Assignee: BMC Software, Inc.Inventors: Gilad Arbel Komissar, Eyal Koren, Asaf Dafner
-
Patent number: 8910127Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.Type: GrantFiled: September 20, 2012Date of Patent: December 9, 2014Assignee: Identify Software Ltd. (IL)Inventors: Shiri Semo Judelman, Asaf Dafner, Eyal Koren
-
Publication number: 20140189438Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.Type: ApplicationFiled: December 31, 2012Publication date: July 3, 2014Applicant: BMC SOFTWARE, INC.Inventors: Gilad Arbel, Eyal Koren, Asaf Dafner
-
Patent number: 8745598Abstract: A technique provides a hook that executes prior to a software application that is invisible to the software application. In an object-oriented execution environment, an imposter main class is loaded instead of the application main class. The imposter main class then manipulates the object-oriented execution environment to load the application main class without requiring knowledge of the application main class other than its name, and without requiring a change to the command line for the application.Type: GrantFiled: December 14, 2010Date of Patent: June 3, 2014Assignee: BMC Software, Inc.Inventors: Eyal Koren, Golan Hallel, Asaf Dafner
-
Publication number: 20140096114Abstract: According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: ApplicationFiled: September 28, 2012Publication date: April 3, 2014Applicant: IDENTIFY SOFTWARE LTD. (IL)Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Publication number: 20140082596Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.Type: ApplicationFiled: September 20, 2012Publication date: March 20, 2014Applicant: IDENTIFY SOFTWARE LTD. (IL)Inventors: Shiri Semo Judelman, Asaf Dafner, Eyal Koren
-
Patent number: 8204488Abstract: The present invention is directed toward distribution of web content to personal cellular telecommunications devices. The present invention proposes compiling syndicated items compilation files containing the entire contents of one or more syndicated information files and/or status notification compilation files containing a list of one or more syndication feeds and status information regarding same. Both types of compilation files can be Point-To-MultiPoint (P2MP) pushed to all available personal cellular telecommunications devices in one or more cells selected by a cellular operator using standardized P2MP push technology. Alternatively, status notification compilation files can be P2P pulled by or P2P pushed to particular personal cellular telecommunications devices. The present invention also proposes offering accessing full stories in formats other than conventional web page formats. Such non web page formats include inter alia SMS, MMS, email, and the like.Type: GrantFiled: June 11, 2007Date of Patent: June 19, 2012Assignee: Celltick Technologies Ltd.Inventors: Amit Gil, Eyal Koren
-
Publication number: 20120151464Abstract: A technique provides a hook that executes prior to a software application that is invisible to the software application. In an object-oriented execution environment, an imposter main class is loaded instead of the application main class. The imposter main class then manipulates the object-oriented execution environment to load the application main class without requiring knowledge of the application main class other than its name, and without requiring a change to the command line for the application.Type: ApplicationFiled: December 14, 2010Publication date: June 14, 2012Applicant: BMC SOFTWARE, INC.Inventors: Eyal Koren, Golan Hallel, Asaf Dafner
-
Patent number: 8121651Abstract: Content personalization on personal cellular telecommunications devices includes determining subscriber personalization profiles each including at least one personalization parameter, determining universal Level 0 IDMs for display on all subscribers' personal cellular telecommunications devices irrespective of their location and their subscriber personalization profiles, and determining a set of at least two different personalized Level 1 IDMs for each universal Level 0 IDM for display on subscribers' personal cellular telecommunications depending on their location and subscriber personalization profiles. Personalization of Level 1 interactive display messages can take place either network side or handset side. Network side personalization requires a personalization server with subscribers' personalization profiles. Handset side personalization requires handset subscriber personalization filters.Type: GrantFiled: February 11, 2007Date of Patent: February 21, 2012Assignee: Celltick Technologies Ltd.Inventors: Eyal Koren, Uri Neria, Amit Gil