Patents by Inventor Eyal OZ

Eyal OZ has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11894976
    Abstract: A method of evaluating change risk in an IT environment, including collecting environment state snapshots of configuration parameters in the IT environment, invoking a manifest of a change on the environment state snapshots to form simulated environment state snapshots, analyzing the simulated environment state snapshots relative to the environment state snapshots, deriving a risk score based on the analysis and selectively perform the change responsive to the risk score.
    Type: Grant
    Filed: November 23, 2022
    Date of Patent: February 6, 2024
    Assignee: E.S.I. SOFTWARE LTD.
    Inventors: Bostjan Kaluza, Eyal Oz, Michael Noam, Alexander Sasha Gilenson
  • Publication number: 20230273811
    Abstract: In one embodiment, an apparatus includes: an instruction fetch circuit to fetch instructions; a decode circuit coupled to the instruction fetch circuit to decode the fetched instructions into micro-operations (pops); a scheduler coupled to the decode circuit to schedule the pops for execution; and an execution circuit coupled to the scheduler, the execution circuit comprising a plurality of execution ports to execute the pops. The scheduler may be configured to: schedule at least some pops of a first type for redundant execution on symmetric execution ports of the plurality of execution ports; and schedule pops of a second type for non-redundant execution on a single execution port of the plurality of execution ports. Other embodiments are described and claimed.
    Type: Application
    Filed: February 28, 2022
    Publication date: August 31, 2023
    Inventors: Michael Mishaeli, Eyal Oz-Sinay, Gavri Berger, Gal Ofir, Tomer Weiner, Arkady Bramnik
  • Patent number: 11455167
    Abstract: Disclosed embodiments relate to efficient complex vector multiplication. In one example, an apparatus includes execution circuitry, responsive to an instruction having fields to specify multiplier, multiplicand, and summand complex vectors, to perform two operations: first, to generate a double-even multiplicand by duplicating even elements of the specified multiplicand, and to generate a temporary vector using a fused multiply-add (FMA) circuit having A, B, and C inputs set to the specified multiplier, the double-even multiplicand, and the specified summand, respectively, and second, to generate a double-odd multiplicand by duplicating odd elements of the specified multiplicand, to generate a swapped multiplier by swapping even and odd elements of the specified multiplier, and to generate a result using a second FMA circuit having its even product negated, and having A, B, and C inputs set to the swapped multiplier, the double-odd multiplicand, and the temporary vector, respectively.
    Type: Grant
    Filed: December 2, 2019
    Date of Patent: September 27, 2022
    Assignee: Intel Coporation
    Inventors: Raanan Sade, Thierry Pons, Amit Gradstein, Zeev Sperber, Mark J. Charney, Robert Valentine, Eyal Oz-Sinay
  • Patent number: 11290325
    Abstract: A method of change reconciliation, including: detecting changes in configuration parameters collected from stations of a system and collecting or generating change request records for the detected changes, identifying unauthorized changes and authorized changes based on given rules, for a potentially authorized change that is not clearly authorized or unauthorized, identifying a context for the change request records, including: a) identifying authorized change implementers; b) identifying a scope of the content that is to be changed; c) identifying a time window when the change is allowed to be performed; identifying a context for the actual change, including: a) identifying a change implementer; b) identifying a scope of the content that was changed; c) identifying a time window when the change was performed; comparing the context of the change request with the context of the actual change; determining an authorization score responsive to said comparing; outputting the change authorization score.
    Type: Grant
    Filed: December 8, 2020
    Date of Patent: March 29, 2022
    Assignee: E.S.I. SOFTWARE LTD
    Inventors: Bostjan Kaluza, Eyal Oz, Michael Noam, Alexander Sasha Gilenson
  • Publication number: 20200201628
    Abstract: Disclosed embodiments relate to efficient complex vector multiplication. In one example, an apparatus includes execution circuitry, responsive to an instruction having fields to specify multiplier, multiplicand, and summand complex vectors, to perform two operations: first, to generate a double-even multiplicand by duplicating even elements of the specified multiplicand, and to generate a temporary vector using a fused multiply-add (FMA) circuit having A, B, and C inputs set to the specified multiplier, the double-even multiplicand, and the specified summand, respectively, and second, to generate a double-odd multiplicand by duplicating odd elements of the specified multiplicand, to generate a swapped multiplier by swapping even and odd elements of the specified multiplier, and to generate a result using a second FMA circuit having its even product negated, and having A, B, and C inputs set to the swapped multiplier, the double-odd multiplicand, and the temporary vector, respectively.
    Type: Application
    Filed: December 2, 2019
    Publication date: June 25, 2020
    Inventors: Raanan SADE, Thierry PONS, Amit GRADSTEIN, Zeev SPERBER, Mark J. CHARNEY, Robert VALENTINE, Eyal Oz-Sinay
  • Patent number: 10691522
    Abstract: A method of incident root cause analysis in an information technology (IT) system, wherein upon occurrence of an incident collecting changes to configuration items and/or system parameters on computer stations during a predetermined time prior to the incident, calculating a change lifetime for each of the collected changes, comparing the change lifetime to the time of occurrence of the incident to determine if the lifetime of the change is still valid, marking a probability value of zero for occurrence of the incident as a result of the change for changes with an expired lifetime value at the time of the incident, otherwise estimating a risk profile and calculating from it a probability value for occurrence of the incident as a result of the change, sorting the changes according to the probability value, and selecting a predetermined number of changes having the highest probability values for root cause analysis.
    Type: Grant
    Filed: January 24, 2016
    Date of Patent: June 23, 2020
    Assignee: E.S.I. SOFTWARE LTD
    Inventors: Bostjan Kaluza, Eyal Oz, Alexander Gilenson
  • Patent number: 10635557
    Abstract: A method for analyzing and prioritizing configuration parameters in an information technology system, including collecting configuration parameters from computer stations connected in a network implementing the information technology system, storing the collected configuration parameters in a database, analyzing the configuration parameters by a set of anomaly routines, wherein each anomaly routine checks for a specific type of anomaly and provides a score representing a level of conformity of the value of the configuration parameters to the anomaly, aggregating the anomaly scores; and outputting a list of configuration parameters with an aggregated anomaly score.
    Type: Grant
    Filed: February 21, 2017
    Date of Patent: April 28, 2020
    Assignee: E.S.I. SOFTWARE LTD
    Inventors: Bostjan Kaluza, Eyal Oz, Alexander Sasha Gilenson
  • Patent number: 10521226
    Abstract: Disclosed embodiments relate to efficient complex vector multiplication. In one example, an apparatus includes execution circuitry, responsive to an instruction having fields to specify multiplier, multiplicand, and summand complex vectors, to perform two operations: first, to generate a double-even multiplicand by duplicating even elements of the specified multiplicand, and to generate a temporary vector using a fused multiply-add (FMA) circuit having A, B, and C inputs set to the specified multiplier, the double-even multiplicand, and the specified summand, respectively, and second, to generate a double-odd multiplicand by duplicating odd elements of the specified multiplicand, to generate a swapped multiplier by swapping even and odd elements of the specified multiplier, and to generate a result using a second FMA circuit having its even product negated, and having A, B, and C inputs set to the swapped multiplier, the double-odd multiplicand, and the temporary vector, respectively.
    Type: Grant
    Filed: March 30, 2018
    Date of Patent: December 31, 2019
    Assignee: Intel Corporation
    Inventors: Raanan Sade, Thierry Pons, Amit Gradstein, Zeev Sperber, Mark J. Charney, Robert Valentine, Eyal Oz-Sinay
  • Patent number: 10439876
    Abstract: A method of determining component dependencies in an enterprise application architecture implemented over an enterprise network, including identifying structures of hosts connected to the network; wherein the structures includes applications executed by the host, obtaining configuration parameters from said hosts, determining dependencies between applications of hosts based on the configuration parameters, receiving a template for identifying dependencies between components in the enterprise network, identify candidate mappings of hosts based on the template, further identifying candidate mappings of host pairs based on the determined dependencies between hosts and the template, analyzing the candidate mappings to calculate a probability score for the candidate mappings, output the candidate mappings having the highest score.
    Type: Grant
    Filed: September 14, 2017
    Date of Patent: October 8, 2019
    Assignee: E.S.I. SOFTWARE LTD
    Inventors: Bostjan Kaluza, Mojca Komavec, Eyal Oz, Alexander Sasha Gilenson
  • Publication number: 20190303142
    Abstract: Disclosed embodiments relate to efficient complex vector multiplication. In one example, an apparatus includes execution circuitry, responsive to an instruction having fields to specify multiplier, multiplicand, and summand complex vectors, to perform two operations: first, to generate a double-even multiplicand by duplicating even elements of the specified multiplicand, and to generate a temporary vector using a fused multiply-add (FMA) circuit having A, B, and C inputs set to the specified multiplier, the double-even multiplicand, and the specified summand, respectively, and second, to generate a double-odd multiplicand by duplicating odd elements of the specified multiplicand, to generate a swapped multiplier by swapping even and odd elements of the specified multiplier, and to generate a result using a second FMA circuit having its even product negated, and having A, B, and C inputs set to the swapped multiplier, the double-odd multiplicand, and the temporary vector, respectively.
    Type: Application
    Filed: March 30, 2018
    Publication date: October 3, 2019
    Inventors: Raanan SADE, Thierry PONS, Amit GRADSTEIN, Zeev SPERBER, Mark J. CHARNEY, Robert VALENTINE, Eyal Oz-Sinay
  • Patent number: 10305738
    Abstract: A method of clustering changes to configuration items in an information technology (IT) system, including collecting changed configuration items executed on computer stations connected in a network implementing the information technology system, storing the collected configuration items in a database, analyzing contextual information related to the configuration items to identify clusters having similar characteristics, clustering the configuration items based on the identified clusters having similar characteristics, and assigning a descriptor to each cluster to identify it as an IT action.
    Type: Grant
    Filed: January 6, 2016
    Date of Patent: May 28, 2019
    Assignee: ESI SOFTWARE LTD.
    Inventors: Bostjan Kaluza, Eyal Oz, Alexander Gilenson
  • Publication number: 20190081861
    Abstract: A method of determining component dependencies in an enterprise application architecture implemented over an enterprise network, including identifying structures of hosts connected to the network; wherein the structures includes applications executed by the host, obtaining configuration parameters from said hosts, determining dependencies between applications of hosts based on the configuration parameters, receiving a template for identifying dependencies between components in the enterprise network, identify candidate mappings of hosts based on the template, further identifying candidate mappings of host pairs based on the determined dependencies between hosts and the template, analyzing the candidate mappings to calculate a probability score for the candidate mappings, output the candidate mappings having the highest score.
    Type: Application
    Filed: September 14, 2017
    Publication date: March 14, 2019
    Inventors: Bostjan KALUZA, Mojca KOMAVEC, Eyal OZ, Alexander Sasha GILENSON
  • Publication number: 20180239682
    Abstract: A method for analyzing and prioritizing configuration parameters in an information technology system, including collecting configuration parameters from computer stations connected in a network implementing the information technology system, storing the collected configuration parameters in a database, analyzing the configuration parameters by a set of anomaly routines, wherein each anomaly routine checks for a specific type of anomaly and provides a score representing a level of conformity of the value of the configuration parameters to the anomaly, aggregating the anomaly scores; and outputting a list of configuration parameters with an aggregated anomaly score.
    Type: Application
    Filed: February 21, 2017
    Publication date: August 23, 2018
    Inventors: Bostjan KALUZA, Eyal Oz, Alexander Sasha Gilenson
  • Publication number: 20170213142
    Abstract: A method of incident root cause analysis in an information technology (IT) system, wherein upon occurrence of an incident collecting changes to configuration items and/or system parameters on computer stations during a predetermined time prior to the incident, calculating a change lifetime for each of the collected changes, comparing the change lifetime to the time of occurrence of the incident to determine if the lifetime of the change is still valid, marking a probability value of zero for occurrence of the incident as a result of the change for changes with an expired lifetime value at the time of the incident, otherwise estimating a risk profile and calculating from it a probability value for occurrence of the incident as a result of the change, sorting the changes according to the probability value, and selecting a predetermined number of changes having the highest probability values for root cause analysis.
    Type: Application
    Filed: January 24, 2016
    Publication date: July 27, 2017
    Inventors: Bostjan KALUZA, Eyal OZ, Alexander GILENSON
  • Publication number: 20170195178
    Abstract: A method of clustering changes to configuration items in an information technology (IT) system, including collecting changed configuration items executed on computer stations connected in a network implementing the information technology system, storing the collected configuration items in a database, analyzing contextual information related to the configuration items to identify clusters having similar characteristics, clustering the configuration items based on the identified clusters having similar characteristics, and assigning a descriptor to each cluster to identify it as an IT action.
    Type: Application
    Filed: January 6, 2016
    Publication date: July 6, 2017
    Inventors: Bostjan KALUZA, Eyal OZ, Alexander GILENSON
  • Patent number: 9524465
    Abstract: A method for analyzing and prioritizing changes to configuration parameters of applications in an information technology system, including collecting configuration parameters of applications executed on computer stations in a network, storing the collected configuration parameters in a database, comparing the configuration parameters of an application from a specific station with configuration parameters of the application at different stations, determining differences in the configuration parameters by the comparing, analyzing the determined differences according to a set of analysis dimensions that represent rules for evaluating the differences, assigning a score representing the level of conformity of the differences to each of the analysis dimensions, defining a context for reviewing the differences, assigning a weight to each analysis dimension representing the importance of the analysis dimension, adjusting the weights assigned to the analysis dimension based on the context, calculating a total risk for
    Type: Grant
    Filed: August 5, 2014
    Date of Patent: December 20, 2016
    Assignee: E.S.I. SOFTWARE LTD
    Inventors: Alexander Gilenson, Eyal Oz, Michael Noam
  • Publication number: 20160042285
    Abstract: A method for analyzing and prioritizing changes to configuration parameters of applications in an information technology system, including collecting configuration parameters of applications executed on computer stations in a network, storing the collected configuration parameters in a database, comparing the configuration parameters of an application from a specific station with configuration parameters of the application at different stations, determining differences in the configuration parameters by the comparing, analyzing the determined differences according to a set of analysis dimensions that represent rules for evaluating the differences, assigning a score representing the level of conformity of the differences to each of the analysis dimensions, defining a context for reviewing the differences, assigning a weight to each analysis dimension representing the importance of the analysis dimension, adjusting the weights assigned to the analysis dimension based on the context, calculating a total risk for
    Type: Application
    Filed: August 5, 2014
    Publication date: February 11, 2016
    Inventors: Alexander GILENSON, Eyal OZ, Michael NOAM