Patents by Inventor Idan Zach
Idan Zach has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230418497Abstract: A memory controller is for receiving incoming data and storing and/or transmitting the incoming data utilizing deduplication. The memory controller determines a second hash corresponding to one or more first hashes. The second hash is a sparse hash and the first hashes are strong hashes. The memory controller populates a sparse index with the second hash. The sparse index associates the second hash with the corresponding first hashes. The memory controller determines the second hash based on a probability that the second hash corresponds to a plurality of first hashes using a probabilistic method.Type: ApplicationFiled: September 8, 2023Publication date: December 28, 2023Inventors: Ovad Somech, Assaf Natanzon, Idan Zach, Aviv Kuvent
-
Publication number: 20230409222Abstract: A computer-implemented method for indexing a data item in a data storage system includes: dividing the data item into one or more large blocks; dividing each large block into one or more small blocks; calculating a strong hash value for each of the small blocks and storing a list of strong hash values with a pointer to a location of the large block; from the list of strong hash values calculated for each large block, selecting one or more representative hash values for the large block; and compiling a sparse index including an entry for each large block. Each entry is based on the representative hash values and a pointer to the list of strong hash values for each large block.Type: ApplicationFiled: September 5, 2023Publication date: December 21, 2023Inventors: Ovad Somech, Assaf Natanzon, Idan Zach, Aviv Kuvent, Yair Toaff, Elizabeth Firman, David Spinadel
-
Publication number: 20230409525Abstract: A method of data management in a data storage system including a plurality of data storage units, the method includes dividing each file in the data storage system into a plurality of blocks having a common size. The method further includes generating a hash value for each block using a common hash algorithm. The method further includes identifying a plurality of similar files in different data storage units, based on a comparison of the hashes for each file. The method further includes copying one or more of the identified similar files, such that similar files are stored in a single data storage unit and for one or more of the copied files, generating a link to a new location of the file. The method provides an efficient, effective, and adequate reduction of the primary storage as well as the secondary storage space.Type: ApplicationFiled: September 6, 2023Publication date: December 21, 2023Inventors: Asaf Yeger, Assaf Natanzon, Michael Gutman, Shmoolik Yosub, Shahar Salzman, David Segal, Idan Zach
-
Patent number: 11570178Abstract: A method and a system for checking permissions compatibility between a configuration management system and an orchestration system of a computing cluster are disclosed. The method comprises: identifying a request to approve a change in at least one file of the computing cluster. Retrieving from a repository of the configuration management system an identity of a user for performing the change. Acquiring a denial response or an approval response received in response to a query provisioned to the orchestration system, the query is for rights to change the at least one file using the identity of the user. In response to the approval response, entering the approval response, into the configuration management system for confirming the checking permissions compatibility is approved. In response to the denial received, sending a message to the configuration management system, the message is indicative that the checking permissions compatibility is not approved.Type: GrantFiled: October 26, 2020Date of Patent: January 31, 2023Assignee: International Business Machines CorporationInventors: Etai Lev Ran, Alexey Roytman, Zvi Cahana, Idan Zach, Michal Malka, Vita Bortnikov
-
Publication number: 20220131865Abstract: A method and a system for checking permissions compatibility between a configuration management system and an orchestration system of a computing cluster are disclosed. The method comprises: identifying a request to approve a change in at least one file of the computing cluster. Retrieving from a repository of the configuration management system an identity of a user for performing the change. Acquiring a denial response or an approval response received in response to a query provisioned to the orchestration system, the query is for rights to change the at least one file using the identity of the user. In response to the approval response, entering the approval response, into the configuration management system for confirming the checking permissions compatibility is approved. In response to the denial received, sending a message to the configuration management system, the message is indicative that the checking permissions compatibility is not approved.Type: ApplicationFiled: October 26, 2020Publication date: April 28, 2022Inventors: Etai Lev Ran, Alexey Roytman, Zvi Cahana, Idan Zach, Michal Malka, Vita Bortnikov
-
Patent number: 10841336Abstract: Examples of techniques for selectively providing mTLS using alternative server names are described herein. An example system includes a processor to generate an alternative server name in response to detecting a legacy indicator. The processor is to also associate the alternative server name with an address of a pod. The processor is to further configure a proxy associated with the pod to selectively provide mutual transport layer security (mTLS) based on the alternative server name.Type: GrantFiled: May 21, 2018Date of Patent: November 17, 2020Assignee: International Business Machines CorporationInventors: Zvi Cahana, Etai Lev-Ran, Idan Zach, Shriram Rajagopalan
-
Patent number: 10521447Abstract: An example system and method includes a processor to receive an image ID corresponding to a container image of a container to be run. The processor is to also send the image ID to a registry. The processor is also to receive an image metadata corresponding to the image ID from the registry. The processor is to store the image metadata on a local file system. The processor is to generate a container comprising an application. The processor is to execute the application using the image metadata.Type: GrantFiled: November 14, 2016Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Zvi Cahana, Etai Lev-Ran, Idan Zach
-
Publication number: 20190354386Abstract: A system for executing one or more operating-system-level virtualization software objects (virtualization containers), comprising at least one controller hardware processor, adapted to: receive a request to connect one or more target virtualization containers, executed by at least one target hardware processor, to at least one digital storage connected to the at least one target hardware processor via at least one data communication network interface; and instruct execution of one or more management virtualization containers on the at least one target hardware processor, such that executing the one or more management virtualization containers configures the one or more target virtualization containers to direct at least one access to the at least one file system of the one or more target virtualization containers to the at least one digital storage.Type: ApplicationFiled: May 21, 2018Publication date: November 21, 2019Inventors: Zvi Cahana, Etai Lev-Ran, Or Ozeri, Idan Zach
-
Publication number: 20190356693Abstract: Examples of techniques for selectively providing mTLS using alternative server names are described herein. An example system includes a processor to generate an alternative server name in response to detecting a legacy indicator. The processor is to also associate the alternative server name with an address of a pod. The processor is to further configure a proxy associated with the pod to selectively provide mutual transport layer security (mTLS) based on the alternative server name.Type: ApplicationFiled: May 21, 2018Publication date: November 21, 2019Inventors: Zvi Cahana, Etai Lev-Ran, Idan Zach, Shriram Rajagopalan
-
Patent number: 10425475Abstract: In some examples, a system for managing distributed data can include a processor to detect an update notification from a client device to update a managing server, the update notification indicating that a remote server node is unavailable. The processor can also generate a comparison value by comparing a first time stamp to a second time stamp, wherein the first time stamp corresponds to a time at which the system receives the update notification from the client device and the second time stamp corresponds to a time the remote server node transmits a set of renewal data. Furthermore, the processor can determine that the comparison value indicates the remote server node is unavailable and remove the remote server node from the managing server.Type: GrantFiled: February 27, 2017Date of Patent: September 24, 2019Assignee: International Business Machines CorporationInventors: Zvi Cahana, Etai Lev-Ran, Idan Zach
-
Patent number: 10379880Abstract: Embodiments of the present invention may provide techniques by which missed interactions with display advertising may be reduced or recovered. For example, in an embodiment of the present invention, a computer-implemented method for processing computer input may comprise displaying on a display screen at least one background application and a foreground item frame, removing display of the foreground item frame, and after removing display of the foreground item frame, detecting user input in the location where the foreground item frame was displayed.Type: GrantFiled: September 25, 2016Date of Patent: August 13, 2019Assignee: International Business Machines CorporationInventors: Itzhack Goldberg, Etai Lev-Ran, Idan Zach
-
Patent number: 10360410Abstract: An example system includes a plurality of containers associated with a plurality of tenants. The plurality of containers are to execute code in isolation for the associated plurality of tenants. The system also include a container daemon communicatively coupled to the plurality of containers via an internal proxy. The container daemon is to provide a service to the plurality of containers. The internal proxy is to receive a daemon access policy. The internal proxy is to further intercept a daemon command from a container. The internal proxy is to detect that the container is allowed access to the container daemon based on the daemon access policy. The internal proxy is to also generate a modified daemon command and forward the modified daemon command to the container daemon.Type: GrantFiled: November 14, 2016Date of Patent: July 23, 2019Assignee: International Business Machines CorporationInventors: Zvi Cahana, Etai Lev-Ran, Idan Zach
-
Patent number: 10361995Abstract: Embodiments of the present invention provide a means for managing portable Internet Protocol (IP) addresses and virtual machine persistent storage. The invention includes defining a set of available portable IP addresses. When a request for a portable IP address is received from a first virtual machine (VM), a first portable IP address is assigned to the first VM. The assignment of the first portable IP address to the first VM extends for a predetermined amount of time and requires a lease renewal to extend the assignment.Type: GrantFiled: November 9, 2015Date of Patent: July 23, 2019Assignee: International Business Machines CorporationInventors: Vita Bortnikov, Guy Laden, Bruno Wassermann, Idan Zach
-
Publication number: 20180248940Abstract: In some examples, a system for managing distributed data can include a processor to detect an update notification from a client device to update a managing server, the update notification indicating that a remote server node is unavailable. The processor can also generate a comparison value by comparing a first time stamp to a second time stamp, wherein the first time stamp corresponds to a time at which the system receives the update notification from the client device and the second time stamp corresponds to a time the remote server node transmits a set of renewal data. Furthermore, the processor can determine that the comparison value indicates the remote server node is unavailable and remove the remote server node from the managing server.Type: ApplicationFiled: February 27, 2017Publication date: August 30, 2018Inventors: Zvi Cahana, Etai Lev-Ran, Idan Zach
-
Publication number: 20180137296Abstract: An example system includes a plurality of containers associated with a plurality of tenants. The plurality of containers are to execute code in isolation for the associated plurality of tenants. The system also include a container daemon communicatively coupled to the plurality of containers via an internal proxy. The container daemon is to provide a service to the plurality of containers. The internal proxy is to receive a daemon access policy. The internal proxy is to further intercept a daemon command from a container. The internal proxy is to detect that the container is allowed access to the container daemon based on the daemon access policy. The internal proxy is to also generate a modified daemon command and forward the modified daemon command to the container daemon.Type: ApplicationFiled: November 14, 2016Publication date: May 17, 2018Inventors: Zvi Cahana, Etai Lev-Ran, Idan Zach
-
Publication number: 20180137174Abstract: An example system and method includes a processor to receive an image ID corresponding to a container image of a container to be run. The processor is to also send the image ID to a registry. The processor is also to receive an image metadata corresponding to the image ID from the registry. The processor is to store the image metadata on a local file system. The processor is to generate a container comprising an application. The processor is to execute the application using the image metadata.Type: ApplicationFiled: November 14, 2016Publication date: May 17, 2018Inventors: Zvi Cahana, Etai Lev-Ran, Idan Zach
-
Publication number: 20180088759Abstract: Embodiments of the present invention may provide techniques by which missed interactions with display advertising may be reduced or recovered. For example, in an embodiment of the present invention, a computer-implemented method for processing computer input may comprise displaying on a display screen at least one background application and a foreground item frame, removing display of the foreground item frame, and after removing display of the foreground item frame, detecting user input in the location where the foreground item frame was displayed.Type: ApplicationFiled: September 25, 2016Publication date: March 29, 2018Inventors: Itzhack Goldberg, Etai Lev-Ran, Idan Zach
-
Publication number: 20170134339Abstract: Embodiments of the present invention provide a means for managing portable Internet Protocol (IP) addresses and virtual machine persistent storage. The invention includes defining a set of available portable IP addresses. When a request for a portable IP address is received from a first virtual machine (VM), a first portable IP address is assigned to the first VM. The assignment of the first portable IP address to the first VM extends for a predetermined amount of time and requires a lease renewal to extend the assignment.Type: ApplicationFiled: November 9, 2015Publication date: May 11, 2017Inventors: Vita Bortnikov, Guy Laden, Bruno Wassermann, Idan Zach
-
Patent number: 9547726Abstract: A method for enabling access to a data resource, which is held on a file server (25) on a first local area network (LAN) (21a), by a client (28) on a second LAN (21b). A proxy receiver (48) on the second LAN (21b) intercepts a request for the data resource submitted by the client (28) and transmits a message via a wide area network (WAN) (29) to a proxy transmitter (52) on the first LAN (21a), requesting the data resource. The proxy transmitter (52) retrieves a replica of the data resource from the file server (25) and conveys the replica of the data resource over the WAN (29) to the proxy receiver (48), which serves the replica of the data resource from the proxy receiver (48) to the client (28) over the second LAN (21b).Type: GrantFiled: March 15, 2010Date of Patent: January 17, 2017Assignee: Cisco Technology, Inc.Inventors: Etai Lev Ran, Shahar Glixman, Israel Ben Shaul, Vita Bortnikov, Daniel Kaminsky, Danit Ben Kiki, Idan Zach, Israel Cidon
-
Patent number: 9342419Abstract: A method comprising using at least one hardware processor for managing persistent messaging data in a volatile memory, writing the persistent messaging data to a first section of a Fast Persistent Memory (FPM), responsive to the first section of the FPM approaching a full state, offloading the persistent messaging data from the first section of the FPM to a hard disk device (HDD), and erasing the persistent messaging data from the first section of the FPM, recording, in a second section of the FPM, an identifier of said offloading, responsive to receiving a request to erase or modify at least some of the persistent messaging data in the HDD, updating the identifier of the offloading in the second section of the FPM while leaving the persistent messaging data in the HDD intact, and responsive to a server failure, selectively reading at least some of the persistent messaging data from the HDD to the volatile memory, wherein the selective reading is based on the identifier of the offloading in the second sectionType: GrantFiled: November 11, 2013Date of Patent: May 17, 2016Assignee: GlobalFoundries Inc.Inventors: Avraham Harpaz, Nir Naaman, Idan Zach