Patents by Inventor Maayan Goldstein
Maayan Goldstein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200210244Abstract: Various example embodiments for supporting placement of virtual resources in a resource virtualization system are presented. The resource virtualization system may include a set of hosts configured to host virtual resources based on underlying physical resources and a set of schedulers configured to receive and handle requests for virtual resources. The handling of requests for virtual resources by the schedulers may include selecting ones of the hosts to handle the requests for virtual resources and initiating instantiation of the virtual resources on the ones of the hosts selected to handle the requests for virtual resources. The selection of the ones of the hosts to handle the requests for virtual resources may be performed by the schedulers using groups of hosts that include subsets of the hosts of the resource virtualization system.Type: ApplicationFiled: December 30, 2018Publication date: July 2, 2020Inventors: Gil Einziger, Maayan Goldstein, Yaniv Sa'ar, Erez Waisbard
-
Patent number: 9720690Abstract: A method of improving software architecture by untangling undesired code level dependencies is provided herein. The method includes the following stages: generating an abstract representation of a computer code in a form of a code model; recording manipulations to the computer code applied by a user to the code model; calculating a series of refactorings in the computer code that represents the recorded manipulation; and carrying out the refactorings within the computer code. Specifically, some of the refactorings include separating low level software elements on the method level in response to the user manipulations of the model.Type: GrantFiled: November 13, 2011Date of Patent: August 1, 2017Assignee: International Business Machines CorporationInventors: Aharon Abadi, Ran Ettinger, Yishai Feldman, Maayan Goldstein
-
Patent number: 9606815Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include receiving, by a computer, application code including a set of software elements, and identifying dependencies between the software elements. Based on the dependencies, a respective ranking score can be calculated for each of the software elements, the respective ranking score for a given software element indicating a likelihood that the given software element is configured as an application programming interface (API).Type: GrantFiled: February 26, 2015Date of Patent: March 28, 2017Assignee: International Business Machines CorporationInventors: Maayan Goldstein, Eitan Daniel Farchi, Onn Shehory
-
Publication number: 20160253185Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include receiving, by a computer, application code including a set of software elements, and identifying dependencies between the software elements. Based on the dependencies, a respective ranking score can be calculated for each of the software elements, the respective ranking score for a given software element indicating a likelihood that the given software element is configured as an application programming interface (API).Type: ApplicationFiled: February 26, 2015Publication date: September 1, 2016Inventors: Maayan Goldstein, Eitan Daniel Farchi, Onn Shehory
-
Patent number: 9348583Abstract: A computerized method, system and computer product for untangling cyclic dependencies between components in software architecture is disclosed. The method includes receiving a software architecture that includes a set of components wherein the components include further elements. The method includes finding one or more cyclic dependencies between the set of components and creating a set of rearranged untangled components. The method includes outputting the rearranged components.Type: GrantFiled: January 28, 2013Date of Patent: May 24, 2016Assignee: International Business Machines CorporationInventors: Maayan Goldstein, Dany Moshkovich
-
Patent number: 9009684Abstract: A computer-implemented method and apparatus for transforming code to embedded environments, the method comprising: receiving program code not complying with a limitation of an embedded computing environment; transforming at least part of the program code to modified program code in order for the modified program code to be in compliance with the limitation; and storing the modified program code on a storage device. wherein the modified program code complies with the limitation of the embedded computing environment.Type: GrantFiled: April 18, 2012Date of Patent: April 14, 2015Assignee: International Business Machines CorporationInventors: Aharon Abadi, Moria Abadi, Yishai Feldman, Maayan Goldstein
-
Patent number: 8972938Abstract: A method that includes: running a set of functional tests over a computer code; determining, for each code element of the computer code, which functional test covered it, to yield a tests-elements coverage map; associating portions of the computer code with corresponding design portions or requirements derived from a design document or a requirements document respectively, associated with the computer code, to yield a design/requirements-code tracing map; deriving, from the tests-code coverage map and the design/requirements-code tracing map, a design/requirements-tests coverage map, exhibiting coverage of the computer code by the functional tests, in terms of the design or the requirements, wherein at least one of the running, the determining, the associating, and the deriving is executed by at least one processor.Type: GrantFiled: November 13, 2012Date of Patent: March 3, 2015Assignee: International Business Machines CorporationInventors: Jonathan Bnayahu, Maayan Goldstein, Dany Moshkovich, Moti Nisenson, Yahalomit Simionovici, Shmuel Ur
-
Patent number: 8954936Abstract: A method that may include: building a dependencies graph representing dependencies between code elements of a computer code; associating portions of the computer code with corresponding design specifications or requirements derived from a design specifications document or a requirements document respectively which is associated with the computer code, to yield a design specifications or requirements-code tracing map; and analyzing the design specifications or requirements-code tracing map based on the dependencies graph to yield an ordered list of design specifications or requirements respectively, wherein the order is selected such that functional tests written for the computer code and addressing design specifications or requirements of a higher order, will yield a higher level of functional test coverage of the computer code in terms of design specifications or requirements.Type: GrantFiled: November 11, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Jonathan Bnayahu, Maayan Goldstein, Dany Moshkovich, Mordechai Nisenson, Yahalomit Simionovici, Shmuel Or
-
Publication number: 20140215435Abstract: A computerized method, system and computer product for untangling cyclic dependencies between components in software architecture is disclosed. The method includes receiving a software architecture that includes a set of components wherein the components include further elements. The method includes finding one or more cyclic dependencies between the set of components and creating a set of rearranged untangled components. The method includes outputting the rearranged components.Type: ApplicationFiled: January 28, 2013Publication date: July 31, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Maayan Goldstein, Dany Moshkovich
-
Patent number: 8593946Abstract: A computer-implemented method is provided, including monitoring one or more parameters of a computer system that executes one or more service requester processes that issue service requests to one or more service provider processes. A congestion in the system is detected by analyzing the parameters. Upon identifying at least one of the service requester processes as contributing to the congestion, execution of the at least one of the service requester processes is slowed. Other embodiments are also described.Type: GrantFiled: August 25, 2008Date of Patent: November 26, 2013Assignee: International Business Machines CorporationInventors: Maayan Goldstein, Onn Menahem Shehory, Rachel Tzoref, Shmuel Ur
-
Publication number: 20130283248Abstract: A computer-implemented method and apparatus for transforming code to embedded environments, the method comprising: receiving program code not complying with a limitation of an embedded computing environment; transforming at least part of the program code to modified program code in order for the modified program code to be in compliance with the limitation; and storing the modified program code on a storage device. wherein the modified program code complies with the limitation of the embedded computing environment.Type: ApplicationFiled: April 18, 2012Publication date: October 24, 2013Applicant: International Business Machines CorporationInventors: Aharon Abadi, Moria Abadi, Yishai Feldman, Maayan Goldstein
-
Publication number: 20110271253Abstract: A method that may include: building a dependencies graph representing dependencies between code elements of a computer code; associating portions of the computer code with corresponding design specifications or requirements derived from a design specifications document or a requirements document respectively which is associated with the computer code, to yield a design specifications or requirements-code tracing map; and analyzing the design specifications or requirements-code tracing map based on the dependencies graph to yield an ordered list of design specifications or requirements respectively, wherein the order is selected such that functional tests written for the computer code and addressing design specifications or requirements of a higher order, will yield a higher level of functional test coverage of the computer code in terms of design specifications or requirements.Type: ApplicationFiled: April 28, 2010Publication date: November 3, 2011Applicant: International Business Machines CorporationInventors: Jonathan Bnayahu, Maayan Goldstein, Dany Moshkovich, Moti Nisenson, Yahalomit Simionovici, Shmuel Ur
-
Publication number: 20110271252Abstract: A method that includes: running a set of functional tests over a computer code; determining, for each code element of the computer code, which functional test covered it, to yield a tests-elements coverage map; associating portions of the computer code with corresponding design portions or requirements derived from a design document or a requirements document respectively, associated with the computer code, to yield a design/requirements-code tracing map; deriving, from the tests-code coverage map and the design/requirements-code tracing map, a design/requirements-tests coverage map, exhibiting coverage of the computer code by the functional tests, in terms of the design or the requirements, wherein at least one of the running, the determining, the associating, and the deriving is executed by at least one processor.Type: ApplicationFiled: April 28, 2010Publication date: November 3, 2011Applicant: International Business Machines CorporationInventors: Jonathan Bnayahu, Maayan Goldstein, Dany Moshkovich, Moti Nisenson, Yahalomit Simionovici, Shmuel Ur
-
Patent number: 8037365Abstract: Managing a computer system including automatically adjusting two separate component thresholds (a component threshold pair) based on a statistical model. Specifically, a first component threshold is modeled to predict violations of an SLO based on a violation of the first component threshold and a second, separate component threshold is modeled to predict a non-violation (compliance) of an SLO based on a non-violation of the second component threshold. Over time, the values of the component thresholds may change and one component threshold may be greater than the other component threshold at one time, and vice versa at another time. A component metric reading between the first and second component thresholds indicates that a prediction of an SLO violation or compliance is less certain, and a warning may be issued rather than an alert.Type: GrantFiled: November 3, 2009Date of Patent: October 11, 2011Assignee: International Busniss Machines coporationInventors: Maayan Goldstein, David Breitgand, John Michael Lake, Ealan Abraham Henis, Onn Shehory
-
Patent number: 8028277Abstract: Systems and methods for optimizing performance in a computing environment are provided. The system comprises means for monitoring execution of annotated logic code associated with a software component to determine whether a condition has been satisfied, wherein annotations in the logic code provide one or more details about the software component, the details being useful to a healing agent to correct a problem associated with said condition during the execution of the logic code.Type: GrantFiled: May 21, 2007Date of Patent: September 27, 2011Assignee: International Business Machines CorporationInventors: David Breitgand, Maayan Goldstein, Ealan Abraham Henis, Onn Menahem Shehory, Yaron Weinsberg
-
Publication number: 20110107154Abstract: Managing a computer system including automatically adjusting two separate component thresholds (a component threshold pair) based on a statistical model. Specifically, a first component threshold is modeled to predict violations of an SLO based on a violation of the first component threshold and a second, separate component threshold is modeled to predict a non-violation (compliance) of an SLO based on a non-violation of the second component threshold. Over time, the values of the component thresholds may change and one component threshold may be greater than the other component threshold at one time, and vice versa at another time. A component metric reading between the first and second component thresholds indicates that a prediction of an SLO violation or compliance is less certain, and a warning may be issued rather than an alert.Type: ApplicationFiled: November 3, 2009Publication date: May 5, 2011Inventors: David Breitgand, Maayan Goldstein, Ealan Abraham Henis, John Michael Lake, Onn Shehory
-
Patent number: 7865901Abstract: Systems and methods for optimizing memory management in a runtime environment are provided. The method comprises monitoring one or more objects loaded into primary memory of a computing system to determine if at least a first object can be removed from the primary memory; instantiating a proxy object to replace the first object in the primary memory; removing the first object from the primary memory; and monitoring calls to the proxy object to determine whether the first object is invoked by a process.Type: GrantFiled: May 21, 2007Date of Patent: January 4, 2011Assignee: International Business Machines CorporationInventors: David Breitgand, Maayan Goldstein, Ealan Abraham Henis, Onn Menahem Shehory, Yaron Weinsberg
-
Publication number: 20100046375Abstract: A computer-implemented method is provided, including monitoring one or more parameters of a computer system that executes one or more service requester processes that issue service requests to one or more service provider processes. A congestion in the system is detected by analyzing the parameters. Upon identifying at least one of the service requester processes as contributing to the congestion, execution of the at least one of the service requester processes is slowed. Other embodiments are also described.Type: ApplicationFiled: August 25, 2008Publication date: February 25, 2010Inventors: Maayan Goldstein, Onn Menahem Shehory, Rachel Tzoref, Shmuel Ur
-
Publication number: 20090282206Abstract: The exemplary embodiments provide a computer implemented method, apparatus, and computer usable program code for managing memory. A suspect loitering object is detected for a set of selected applications, forming a detected object. The detected object is paged to persistent storage, forming a paged object. The paged object is deallocated from system memory, forming a deallocated object.Type: ApplicationFiled: May 12, 2008Publication date: November 12, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Maayan Goldstein, Elliot Karl Kolodner, Onn Menahem Shehory, Yaron Weinsberg
-
Publication number: 20080295113Abstract: Systems and methods for optimizing memory management in a runtime environment are provided. The method comprises monitoring one or more objects loaded into primary memory of a computing system to determine if at least a first object can be removed from the primary memory; instantiating a proxy object to replace the first object in the primary memory; removing the first object from the primary memory; and monitoring calls to the proxy object to determine whether the first object is invoked by a process.Type: ApplicationFiled: May 21, 2007Publication date: November 27, 2008Inventors: David Breitgand, Maayan Goldstein, Ealan Abraham Henis, Onn Menahem Shehory, Yaron Weinsberg