Patents by Inventor Haim Helman
Haim Helman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12259969Abstract: Techniques for detecting anomalies in a distributed application based on process data are provided. This process data can include, e.g., the hierarchy (i.e., tree) of processes created and run by the application, the file system operations performed by each process, the network access operations performed by each process.Type: GrantFiled: September 19, 2022Date of Patent: March 25, 2025Assignee: VMWare LLCInventors: Edo Yacov Dekel, Haim Helman, Yuval Rado
-
Publication number: 20250069349Abstract: Systems and methods for integrating a sequence of 2D-images of an object into a synthetic 3D-scene. A sequence of 2D-images of a target object is captured using a smart device such as a smartphone. The object is extracted from the image sequence, and converted into a corresponding sequence of flat-surfaced 3D-renderable objects that are placed in a synthetic 3D-scene. Movement and orientation of the smart device are captured and translated into corresponding viewing points in the 3D-scene, in which the viewing points are then used to 3D render the 3D-scene, together with the flat-surfaced 3D-renderable objects now embedded therewith, into a video sequence showing the target object as an integral part of the 3D-scene. Other effects such as lighting, shadowing and reflections are rendered in conjunction with the flat-surfaced 3D-renderable objects so as to further enhance an illusion that the target object is an integral part of the 3D-scene.Type: ApplicationFiled: August 15, 2024Publication date: February 27, 2025Applicant: Voia Inc.Inventors: Avner Braverman, Haim Helman, Noam Malali, Mitch Singer, Bryan Barber, Ryan Fleischer
-
Publication number: 20240176888Abstract: A method of detecting at runtime, vulnerabilities of container images used by a plurality of containers, includes the steps of: transmitting a request, to an interface to one or more container runtimes, for a list of container images; in response to receiving the list of container images from the interface, generating a list of software packages of a container image that is listed; and transmitting, via a gateway, the list of software packages to a vulnerability detection service for the vulnerability detection service to detect a vulnerability of at least one of the software packages.Type: ApplicationFiled: November 25, 2022Publication date: May 30, 2024Inventors: Shani SAHAR-KANETI, Yonatan SHURANY, Haim HELMAN, Edo Yacov DEKEL
-
Publication number: 20240095347Abstract: Techniques for detecting anomalies in a distributed application based on process data are provided. This process data can include, e.g., the hierarchy (i.e., tree) of processes created and run by the application, the file system operations performed by each process, the network access operations performed by each process.Type: ApplicationFiled: September 19, 2022Publication date: March 21, 2024Inventors: Edo Yacov Dekel, Haim Helman, Yuval Rado
-
Publication number: 20240048611Abstract: Anomalies are detected in a distributed application that runs on a plurality of nodes to execute at least first and second workloads. The method of detecting anomalies includes collecting first network traffic data of the first workload and second network traffic data of the second workload during a first period of execution of the first and second workloads, collecting third network traffic data of the first workload and fourth network traffic data of the second workload during a second period of execution of the first and second workloads, and detecting an anomaly in the distributed application based on a comparison of the third network traffic data against the first network traffic data or a comparison of the fourth network traffic data against the second network traffic data. Anomalies may also be detected by comparing network traffic data of two groups of containers executing the same workload.Type: ApplicationFiled: October 17, 2023Publication date: February 8, 2024Inventors: Edo Yacov DEKEL, Haim HELMAN
-
Patent number: 11895183Abstract: Anomalies are detected in a distributed application that runs on a plurality of nodes to execute at least first and second workloads. The method of detecting anomalies includes collecting first network traffic data of the first workload and second network traffic data of the second workload during a first period of execution of the first and second workloads, collecting third network traffic data of the first workload and fourth network traffic data of the second workload during a second period of execution of the first and second workloads, and detecting an anomaly in the distributed application based on a comparison of the third network traffic data against the first network traffic data or a comparison of the fourth network traffic data against the second network traffic data. Anomalies may also be detected by comparing network traffic data of two groups of containers executing the same workload.Type: GrantFiled: April 19, 2022Date of Patent: February 6, 2024Assignee: VMware, Inc.Inventors: Edo Yacov Dekel, Haim Helman
-
Patent number: 11770443Abstract: Anomalies are detected in a distributed application that runs on a plurality of nodes to execute at least first and second workloads. The method of detecting anomalies includes collecting first network traffic data of the first workload and second network traffic data of the second workload during a first period of execution of the first and second workloads, collecting third network traffic data of the first workload and fourth network traffic data of the second workload during a second period of execution of the first and second workloads, and detecting an anomaly in the distributed application based on a comparison of the third network traffic data against the first network traffic data or a comparison of the fourth network traffic data against the second network traffic data. Anomalies may also be detected by comparing network traffic data of two groups of containers executing the same workload.Type: GrantFiled: May 4, 2022Date of Patent: September 26, 2023Assignee: VMware, Inc.Inventors: Edo Yacov Dekel, Haim Helman
-
Publication number: 20220263894Abstract: Anomalies are detected in a distributed application that runs on a plurality of nodes to execute at least first and second workloads. The method of detecting anomalies includes collecting first network traffic data of the first workload and second network traffic data of the second workload during a first period of execution of the first and second workloads, collecting third network traffic data of the first workload and fourth network traffic data of the second workload during a second period of execution of the first and second workloads, and detecting an anomaly in the distributed application based on a comparison of the third network traffic data against the first network traffic data or a comparison of the fourth network traffic data against the second network traffic data. Anomalies may also be detected by comparing network traffic data of two groups of containers executing the same workload.Type: ApplicationFiled: May 4, 2022Publication date: August 18, 2022Inventors: Edo Yacov DEKEL, Haim HELMAN
-
Publication number: 20220239730Abstract: Anomalies are detected in a distributed application that runs on a plurality of nodes to execute at least first and second workloads. The method of detecting anomalies includes collecting first network traffic data of the first workload and second network traffic data of the second workload during a first period of execution of the first and second workloads, collecting third network traffic data of the first workload and fourth network traffic data of the second workload during a second period of execution of the first and second workloads, and detecting an anomaly in the distributed application based on a comparison of the third network traffic data against the first network traffic data or a comparison of the fourth network traffic data against the second network traffic data. Anomalies may also be detected by comparing network traffic data of two groups of containers executing the same workload.Type: ApplicationFiled: April 19, 2022Publication date: July 28, 2022Inventors: Edo Yacov DEKEL, Haim HELMAN
-
Patent number: 11343310Abstract: Anomalies are detected in a distributed application that runs on a plurality of nodes to execute at least first and second workloads. The method of detecting anomalies includes collecting first network traffic data of the first workload and second network traffic data of the second workload during a first period of execution of the first and second workloads, collecting third network traffic data of the first workload and fourth network traffic data of the second workload during a second period of execution of the first and second workloads, and detecting an anomaly in the distributed application based on a comparison of the third network traffic data against the first network traffic data or a comparison of the fourth network traffic data against the second network traffic data. Anomalies may also be detected by comparing network traffic data of two groups of containers executing the same workload.Type: GrantFiled: September 25, 2020Date of Patent: May 24, 2022Assignee: VMware, Inc.Inventors: Edo Yacov Dekel, Haim Helman
-
Patent number: 11328057Abstract: A system which includes at least one host, wherein the host is configured to implement at least one container group including a first container, a data communication module, an interface, and a malicious detection module, wherein the data communication module is configured to collect data based on data communication of the container group, and transmit collected data, or data representative thereof, to the interface, the interface being configured to transmit collected data, or data representative thereof, to the malicious detection module, for detecting malicious data.Type: GrantFiled: January 23, 2020Date of Patent: May 10, 2022Assignee: VMware, Inc.Inventors: Haim Helman, Meori Oransky, Julien Sobrier
-
Publication number: 20220103619Abstract: Anomalies are detected in a distributed application that runs on a plurality of nodes to execute at least first and second workloads. The method of detecting anomalies includes collecting first network traffic data of the first workload and second network traffic data of the second workload during a first period of execution of the first and second workloads, collecting third network traffic data of the first workload and fourth network traffic data of the second workload during a second period of execution of the first and second workloads, and detecting an anomaly in the distributed application based on a comparison of the third network traffic data against the first network traffic data or a comparison of the fourth network traffic data against the second network traffic data. Anomalies may also be detected by comparing network traffic data of two groups of containers executing the same workload.Type: ApplicationFiled: September 25, 2020Publication date: March 31, 2022Inventors: Edo Yacov DEKEL, Haim HELMAN
-
Publication number: 20210232678Abstract: A system which includes at least one host, wherein the host is configured to implement at least one container group including a first container, a data communication module, an interface, and a malicious detection module, wherein the data communication module is configured to collect data based on data communication of the container group, and transmit collected data, or data representative thereof, to the interface, the interface being configured to transmit collected data, or data representative thereof, to the malicious detection module, for detecting malicious data.Type: ApplicationFiled: January 23, 2020Publication date: July 29, 2021Inventors: Haim HELMAN, Meori ORANSKY, Julien SOBRIER
-
Patent number: 10698619Abstract: A method for service level agreement allocation of permanent storage layer resources of a storage system, the method may include monitoring, by a control layer of the storage system, actual performances of the storage system that are related to multiple logical volumes; calculating actual-to-required relationships between the actual performances and service level agreement defined performances of the multiple logical volumes; allocating, for different logical volumes of the multiple logical volumes, allowable amounts of pending access requests; wherein the allocating is based on, at least, the actual-to-required relationships; receiving, by the control layer, received access requests aimed to one or more logical volumes of the logical volumes; and sending to the permanent storage layer requests to serve at least some of the received access requests, based on the allowable amounts of pending access requests.Type: GrantFiled: August 29, 2016Date of Patent: June 30, 2020Assignee: INFINIDAT LTD.Inventors: Haim Helman, Qun Fan, Venu Nayar
-
Patent number: 10534712Abstract: A method for service level agreement (SLA) allocation of resources of a cache memory of a storage system, the method may include monitoring, by a control layer of the storage system, actual performances of the storage system that are related to multiple logical volumes; calculating actual-to-required relationships between the actual performances and SLA defined performances of the multiple logical volumes; assigning caching priorities, to different logical volumes of the multiple logical volumes; wherein the assigning is based on, at least, the actual-to-required relationships; and managing, based on at least the caching priorities, a pre-cache memory module that is upstream to the cache module and is configured to store write requests that (i) are associated with one or more logical volumes of the different logical volumes and (ii) are received by the pre-cache memory module at points in time when the cache memory is full; wherein the managing comprises transferring one or more write requests from the pre-caType: GrantFiled: August 29, 2016Date of Patent: January 14, 2020Assignee: INFINIDAT LTD.Inventors: Qun Fan, Venu Nayar, Haim Helman
-
Patent number: 10289515Abstract: Embodiments of the invention relate to storage systems, and for recording event records into a log. Different statistics may be tallied from the log, with the different statistics generating different statistical measurements. The aspect of processing of I/O and preparation of statistical measurements are separated, thereby enabling data structures and algorithms which would not be considered feasible for use as part of I/O processing, because they may compromise the performance or other essential characteristic of I/O processing, to be employed.Type: GrantFiled: July 2, 2014Date of Patent: May 14, 2019Assignee: International Business Machines CorporationInventors: David D. Chambliss, Haim Helman, Ohad Rodeh
-
Patent number: 10241679Abstract: A method for data storage includes defining a host cluster within a group of host computers, which access a storage system that includes multiple logical volumes. The host cluster includes two or more of the host computers. Responsively to a single mapping instruction, each of the host computers in the host cluster is mapped to access the logical volumes in the set. In another disclosed method, a single control instruction, which specifies the host cluster and a configuration operation to be applied to the host computers in the host cluster, is accepted. Responsively to the single control instruction, the configuration operation is applied to each of the host computers in the host cluster. The configuration operation may comprise assigning a specified level of service to each host computer in one of the first subset of the host computers and the second subset of the host computers.Type: GrantFiled: January 23, 2018Date of Patent: March 26, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Haim Helman, Omri Palmon
-
Patent number: 10031692Abstract: A method includes computing, in a local storage system having a local volume with a plurality of local regions, respective local checksum signatures over the local regions, and computing, in a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions, respective remote checksum signatures over the remote regions. A given remote region is identified, the given remote region having a given remote signature and a corresponding local region with a given local signature that does not match the given remote signature. The data in the given remote region is then replaced with data from the corresponding local region.Type: GrantFiled: April 8, 2016Date of Patent: July 24, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ram Elron, Ehood Garmiza, Haim Helman, Assaf Nitzan
-
Publication number: 20180150227Abstract: A method for data storage includes defining a host cluster within a group of host computers, which access a storage system that includes multiple logical volumes. The host cluster includes two or more of the host computers. Responsively to a single mapping instruction, each of the host computers in the host cluster is mapped to access the logical volumes in the set. In another disclosed method, a single control instruction, which specifies the host cluster and a configuration operation to be applied to the host computers in the host cluster, is accepted. Responsively to the single control instruction, the configuration operation is applied to each of the host computers in the host cluster. The configuration operation may comprise assigning a specified level of service to each host computer in one of the first subset of the host computers and the second subset of the host computers.Type: ApplicationFiled: January 23, 2018Publication date: May 31, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Haim HELMAN, Omri PALMON
-
Publication number: 20180074714Abstract: Disclosed is a data processing and/or storage system. The data processing and/or storage system includes at least two interfaces, wherein each of the at least two interfaces includes a non-dedicated communication port for communicating data to and form external data systems or clients based on a rule base.Type: ApplicationFiled: September 26, 2014Publication date: March 15, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ofir ZOHAR, Haim HELMAN, Dror COHEN, Shemer SCHWARZ, Yaron REVAH, Efri ZEIDNER