Patents by Inventor Eyal OZ
Eyal OZ has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11894976Abstract: A method of evaluating change risk in an IT environment, including collecting environment state snapshots of configuration parameters in the IT environment, invoking a manifest of a change on the environment state snapshots to form simulated environment state snapshots, analyzing the simulated environment state snapshots relative to the environment state snapshots, deriving a risk score based on the analysis and selectively perform the change responsive to the risk score.Type: GrantFiled: November 23, 2022Date of Patent: February 6, 2024Assignee: E.S.I. SOFTWARE LTD.Inventors: Bostjan Kaluza, Eyal Oz, Michael Noam, Alexander Sasha Gilenson
-
Publication number: 20230273811Abstract: In one embodiment, an apparatus includes: an instruction fetch circuit to fetch instructions; a decode circuit coupled to the instruction fetch circuit to decode the fetched instructions into micro-operations (pops); a scheduler coupled to the decode circuit to schedule the pops for execution; and an execution circuit coupled to the scheduler, the execution circuit comprising a plurality of execution ports to execute the pops. The scheduler may be configured to: schedule at least some pops of a first type for redundant execution on symmetric execution ports of the plurality of execution ports; and schedule pops of a second type for non-redundant execution on a single execution port of the plurality of execution ports. Other embodiments are described and claimed.Type: ApplicationFiled: February 28, 2022Publication date: August 31, 2023Inventors: Michael Mishaeli, Eyal Oz-Sinay, Gavri Berger, Gal Ofir, Tomer Weiner, Arkady Bramnik
-
Patent number: 11455167Abstract: Disclosed embodiments relate to efficient complex vector multiplication. In one example, an apparatus includes execution circuitry, responsive to an instruction having fields to specify multiplier, multiplicand, and summand complex vectors, to perform two operations: first, to generate a double-even multiplicand by duplicating even elements of the specified multiplicand, and to generate a temporary vector using a fused multiply-add (FMA) circuit having A, B, and C inputs set to the specified multiplier, the double-even multiplicand, and the specified summand, respectively, and second, to generate a double-odd multiplicand by duplicating odd elements of the specified multiplicand, to generate a swapped multiplier by swapping even and odd elements of the specified multiplier, and to generate a result using a second FMA circuit having its even product negated, and having A, B, and C inputs set to the swapped multiplier, the double-odd multiplicand, and the temporary vector, respectively.Type: GrantFiled: December 2, 2019Date of Patent: September 27, 2022Assignee: Intel CoporationInventors: Raanan Sade, Thierry Pons, Amit Gradstein, Zeev Sperber, Mark J. Charney, Robert Valentine, Eyal Oz-Sinay
-
Patent number: 11290325Abstract: A method of change reconciliation, including: detecting changes in configuration parameters collected from stations of a system and collecting or generating change request records for the detected changes, identifying unauthorized changes and authorized changes based on given rules, for a potentially authorized change that is not clearly authorized or unauthorized, identifying a context for the change request records, including: a) identifying authorized change implementers; b) identifying a scope of the content that is to be changed; c) identifying a time window when the change is allowed to be performed; identifying a context for the actual change, including: a) identifying a change implementer; b) identifying a scope of the content that was changed; c) identifying a time window when the change was performed; comparing the context of the change request with the context of the actual change; determining an authorization score responsive to said comparing; outputting the change authorization score.Type: GrantFiled: December 8, 2020Date of Patent: March 29, 2022Assignee: E.S.I. SOFTWARE LTDInventors: Bostjan Kaluza, Eyal Oz, Michael Noam, Alexander Sasha Gilenson
-
Publication number: 20200201628Abstract: Disclosed embodiments relate to efficient complex vector multiplication. In one example, an apparatus includes execution circuitry, responsive to an instruction having fields to specify multiplier, multiplicand, and summand complex vectors, to perform two operations: first, to generate a double-even multiplicand by duplicating even elements of the specified multiplicand, and to generate a temporary vector using a fused multiply-add (FMA) circuit having A, B, and C inputs set to the specified multiplier, the double-even multiplicand, and the specified summand, respectively, and second, to generate a double-odd multiplicand by duplicating odd elements of the specified multiplicand, to generate a swapped multiplier by swapping even and odd elements of the specified multiplier, and to generate a result using a second FMA circuit having its even product negated, and having A, B, and C inputs set to the swapped multiplier, the double-odd multiplicand, and the temporary vector, respectively.Type: ApplicationFiled: December 2, 2019Publication date: June 25, 2020Inventors: Raanan SADE, Thierry PONS, Amit GRADSTEIN, Zeev SPERBER, Mark J. CHARNEY, Robert VALENTINE, Eyal Oz-Sinay
-
Patent number: 10691522Abstract: A method of incident root cause analysis in an information technology (IT) system, wherein upon occurrence of an incident collecting changes to configuration items and/or system parameters on computer stations during a predetermined time prior to the incident, calculating a change lifetime for each of the collected changes, comparing the change lifetime to the time of occurrence of the incident to determine if the lifetime of the change is still valid, marking a probability value of zero for occurrence of the incident as a result of the change for changes with an expired lifetime value at the time of the incident, otherwise estimating a risk profile and calculating from it a probability value for occurrence of the incident as a result of the change, sorting the changes according to the probability value, and selecting a predetermined number of changes having the highest probability values for root cause analysis.Type: GrantFiled: January 24, 2016Date of Patent: June 23, 2020Assignee: E.S.I. SOFTWARE LTDInventors: Bostjan Kaluza, Eyal Oz, Alexander Gilenson
-
Patent number: 10635557Abstract: A method for analyzing and prioritizing configuration parameters in an information technology system, including collecting configuration parameters from computer stations connected in a network implementing the information technology system, storing the collected configuration parameters in a database, analyzing the configuration parameters by a set of anomaly routines, wherein each anomaly routine checks for a specific type of anomaly and provides a score representing a level of conformity of the value of the configuration parameters to the anomaly, aggregating the anomaly scores; and outputting a list of configuration parameters with an aggregated anomaly score.Type: GrantFiled: February 21, 2017Date of Patent: April 28, 2020Assignee: E.S.I. SOFTWARE LTDInventors: Bostjan Kaluza, Eyal Oz, Alexander Sasha Gilenson
-
Patent number: 10521226Abstract: Disclosed embodiments relate to efficient complex vector multiplication. In one example, an apparatus includes execution circuitry, responsive to an instruction having fields to specify multiplier, multiplicand, and summand complex vectors, to perform two operations: first, to generate a double-even multiplicand by duplicating even elements of the specified multiplicand, and to generate a temporary vector using a fused multiply-add (FMA) circuit having A, B, and C inputs set to the specified multiplier, the double-even multiplicand, and the specified summand, respectively, and second, to generate a double-odd multiplicand by duplicating odd elements of the specified multiplicand, to generate a swapped multiplier by swapping even and odd elements of the specified multiplier, and to generate a result using a second FMA circuit having its even product negated, and having A, B, and C inputs set to the swapped multiplier, the double-odd multiplicand, and the temporary vector, respectively.Type: GrantFiled: March 30, 2018Date of Patent: December 31, 2019Assignee: Intel CorporationInventors: Raanan Sade, Thierry Pons, Amit Gradstein, Zeev Sperber, Mark J. Charney, Robert Valentine, Eyal Oz-Sinay
-
Patent number: 10439876Abstract: A method of determining component dependencies in an enterprise application architecture implemented over an enterprise network, including identifying structures of hosts connected to the network; wherein the structures includes applications executed by the host, obtaining configuration parameters from said hosts, determining dependencies between applications of hosts based on the configuration parameters, receiving a template for identifying dependencies between components in the enterprise network, identify candidate mappings of hosts based on the template, further identifying candidate mappings of host pairs based on the determined dependencies between hosts and the template, analyzing the candidate mappings to calculate a probability score for the candidate mappings, output the candidate mappings having the highest score.Type: GrantFiled: September 14, 2017Date of Patent: October 8, 2019Assignee: E.S.I. SOFTWARE LTDInventors: Bostjan Kaluza, Mojca Komavec, Eyal Oz, Alexander Sasha Gilenson
-
Publication number: 20190303142Abstract: Disclosed embodiments relate to efficient complex vector multiplication. In one example, an apparatus includes execution circuitry, responsive to an instruction having fields to specify multiplier, multiplicand, and summand complex vectors, to perform two operations: first, to generate a double-even multiplicand by duplicating even elements of the specified multiplicand, and to generate a temporary vector using a fused multiply-add (FMA) circuit having A, B, and C inputs set to the specified multiplier, the double-even multiplicand, and the specified summand, respectively, and second, to generate a double-odd multiplicand by duplicating odd elements of the specified multiplicand, to generate a swapped multiplier by swapping even and odd elements of the specified multiplier, and to generate a result using a second FMA circuit having its even product negated, and having A, B, and C inputs set to the swapped multiplier, the double-odd multiplicand, and the temporary vector, respectively.Type: ApplicationFiled: March 30, 2018Publication date: October 3, 2019Inventors: Raanan SADE, Thierry PONS, Amit GRADSTEIN, Zeev SPERBER, Mark J. CHARNEY, Robert VALENTINE, Eyal Oz-Sinay
-
Patent number: 10305738Abstract: A method of clustering changes to configuration items in an information technology (IT) system, including collecting changed configuration items executed on computer stations connected in a network implementing the information technology system, storing the collected configuration items in a database, analyzing contextual information related to the configuration items to identify clusters having similar characteristics, clustering the configuration items based on the identified clusters having similar characteristics, and assigning a descriptor to each cluster to identify it as an IT action.Type: GrantFiled: January 6, 2016Date of Patent: May 28, 2019Assignee: ESI SOFTWARE LTD.Inventors: Bostjan Kaluza, Eyal Oz, Alexander Gilenson
-
Publication number: 20190081861Abstract: A method of determining component dependencies in an enterprise application architecture implemented over an enterprise network, including identifying structures of hosts connected to the network; wherein the structures includes applications executed by the host, obtaining configuration parameters from said hosts, determining dependencies between applications of hosts based on the configuration parameters, receiving a template for identifying dependencies between components in the enterprise network, identify candidate mappings of hosts based on the template, further identifying candidate mappings of host pairs based on the determined dependencies between hosts and the template, analyzing the candidate mappings to calculate a probability score for the candidate mappings, output the candidate mappings having the highest score.Type: ApplicationFiled: September 14, 2017Publication date: March 14, 2019Inventors: Bostjan KALUZA, Mojca KOMAVEC, Eyal OZ, Alexander Sasha GILENSON
-
Publication number: 20180239682Abstract: A method for analyzing and prioritizing configuration parameters in an information technology system, including collecting configuration parameters from computer stations connected in a network implementing the information technology system, storing the collected configuration parameters in a database, analyzing the configuration parameters by a set of anomaly routines, wherein each anomaly routine checks for a specific type of anomaly and provides a score representing a level of conformity of the value of the configuration parameters to the anomaly, aggregating the anomaly scores; and outputting a list of configuration parameters with an aggregated anomaly score.Type: ApplicationFiled: February 21, 2017Publication date: August 23, 2018Inventors: Bostjan KALUZA, Eyal Oz, Alexander Sasha Gilenson
-
Publication number: 20170213142Abstract: A method of incident root cause analysis in an information technology (IT) system, wherein upon occurrence of an incident collecting changes to configuration items and/or system parameters on computer stations during a predetermined time prior to the incident, calculating a change lifetime for each of the collected changes, comparing the change lifetime to the time of occurrence of the incident to determine if the lifetime of the change is still valid, marking a probability value of zero for occurrence of the incident as a result of the change for changes with an expired lifetime value at the time of the incident, otherwise estimating a risk profile and calculating from it a probability value for occurrence of the incident as a result of the change, sorting the changes according to the probability value, and selecting a predetermined number of changes having the highest probability values for root cause analysis.Type: ApplicationFiled: January 24, 2016Publication date: July 27, 2017Inventors: Bostjan KALUZA, Eyal OZ, Alexander GILENSON
-
Publication number: 20170195178Abstract: A method of clustering changes to configuration items in an information technology (IT) system, including collecting changed configuration items executed on computer stations connected in a network implementing the information technology system, storing the collected configuration items in a database, analyzing contextual information related to the configuration items to identify clusters having similar characteristics, clustering the configuration items based on the identified clusters having similar characteristics, and assigning a descriptor to each cluster to identify it as an IT action.Type: ApplicationFiled: January 6, 2016Publication date: July 6, 2017Inventors: Bostjan KALUZA, Eyal OZ, Alexander GILENSON
-
Patent number: 9524465Abstract: A method for analyzing and prioritizing changes to configuration parameters of applications in an information technology system, including collecting configuration parameters of applications executed on computer stations in a network, storing the collected configuration parameters in a database, comparing the configuration parameters of an application from a specific station with configuration parameters of the application at different stations, determining differences in the configuration parameters by the comparing, analyzing the determined differences according to a set of analysis dimensions that represent rules for evaluating the differences, assigning a score representing the level of conformity of the differences to each of the analysis dimensions, defining a context for reviewing the differences, assigning a weight to each analysis dimension representing the importance of the analysis dimension, adjusting the weights assigned to the analysis dimension based on the context, calculating a total risk forType: GrantFiled: August 5, 2014Date of Patent: December 20, 2016Assignee: E.S.I. SOFTWARE LTDInventors: Alexander Gilenson, Eyal Oz, Michael Noam
-
Publication number: 20160042285Abstract: A method for analyzing and prioritizing changes to configuration parameters of applications in an information technology system, including collecting configuration parameters of applications executed on computer stations in a network, storing the collected configuration parameters in a database, comparing the configuration parameters of an application from a specific station with configuration parameters of the application at different stations, determining differences in the configuration parameters by the comparing, analyzing the determined differences according to a set of analysis dimensions that represent rules for evaluating the differences, assigning a score representing the level of conformity of the differences to each of the analysis dimensions, defining a context for reviewing the differences, assigning a weight to each analysis dimension representing the importance of the analysis dimension, adjusting the weights assigned to the analysis dimension based on the context, calculating a total risk forType: ApplicationFiled: August 5, 2014Publication date: February 11, 2016Inventors: Alexander GILENSON, Eyal OZ, Michael NOAM