Patents by Inventor Muli Ben-Yehuda

Muli Ben-Yehuda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10061725
    Abstract: A method for storage includes storing multiple memory pages in a memory of a first compute node. Using a second compute node that communicates with the first compute node over a communication network, duplicate memory pages are identified among the memory pages stored in the memory of the first compute node by directly accessing the memory of the first compute node. One or more of the identified duplicate memory pages are evicted from the first compute node. The identification of duplicate pages is performed by a node selected responsive to available processing or bandwidth resources.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: August 28, 2018
    Assignee: Strato Scale Ltd.
    Inventors: Abel Gordon, Muli Ben-Yehuda, Benoit Guillaume Charles Hudzia, Etay Bogner
  • Publication number: 20170147518
    Abstract: A method for storage includes storing multiple memory pages in a memory of a first compute node. Using a second compute node that communicates with the first compute node over a communication network, duplicate memory pages are identified among the memory pages stored in the memory of the first compute node by directly accessing the memory of the first compute node. One or more of the identified duplicate memory pages are evicted from the first compute node. The identification of duplicate pages is performed by a node selected responsive to available processing or bandwidth resources.
    Type: Application
    Filed: February 6, 2017
    Publication date: May 25, 2017
    Inventors: Abel Gordon, Muli Ben-Yehuda, Benoit Guillaume Charles Hudzia, Etay Bogner
  • Publication number: 20170147460
    Abstract: A storage apparatus includes an interface and a processor. The interface is configured to communicate with a plurality of storage devices. The processor is configured to estimate likelihood metrics that are indicative of likelihoods that respective subsets of the storage devices will fail concurrently, to select from among the plurality of the storage devices, based on the likelihood metrics, a group of the storage devices on which to store given data and redundancy information associated with the given data, and to store the given data and the redundancy information on the storage devices in the selected group.
    Type: Application
    Filed: November 14, 2016
    Publication date: May 25, 2017
    Inventors: Avishay Traeger, Muli Ben-Yehuda
  • Patent number: 9390028
    Abstract: A method includes running in a computer a hypervisor that allocates physical memory pages of the computer to a Virtual Machine (VM). A guest Operating System (OS), a virtual memory and a virtual storage device run in the VM. The guest OS maps the allocated physical memory pages to respective virtual memory pages, retains virtual memory pages that are frequently-accessed by the VM in the virtual memory, and swaps-out virtual memory pages that are rarely-accessed by the VM to the virtual storage. In the hypervisor, one or more of the physical memory pages allocated to the VM are selected, and the corresponding virtual memory pages preventing from being swapped-out by the guest OS, by marking the corresponding virtual memory pages in the guest OS as accessed thus causing the guest OS to regard the corresponding virtual memory pages as frequently-accessed.
    Type: Grant
    Filed: July 13, 2015
    Date of Patent: July 12, 2016
    Assignee: STRATO SCALE LTD.
    Inventors: Abel Gordon, Muli Ben-Yehuda
  • Publication number: 20160162302
    Abstract: A method includes, in a computing system including one or more compute nodes that run workloads, booting a workload of a given type, and creating a post-boot snapshot of the workload at a point at which the workload completed booting but did not yet begin running user applications. In response to a request to initiate a new workload of the given type, the new workload is initiated starting from the post-boot snapshot.
    Type: Application
    Filed: November 3, 2015
    Publication date: June 9, 2016
    Inventors: Eduardo Warszawski, Muli Ben-Yehuda
  • Patent number: 9342346
    Abstract: A method includes running a Virtual Machine (VM) on a first compute node in a plurality of compute nodes that communicate with one another over a communication network. The VM is migrated from the first compute node to a second compute node in the plurality by generating, for memory pages accessed by the VM, page transfer state of one or more local memory pages that are accessed locally on the first compute node, and of one or more externalized memory pages whose access is not confined to the first node. Based on the page transfer state, the migrated VM is provided with access to the memory pages, including both the local and the externalized memory pages, on the second compute node.
    Type: Grant
    Filed: July 27, 2014
    Date of Patent: May 17, 2016
    Assignee: STRATO SCALE LTD.
    Inventors: Ariel Maislos, Etay Bogner, Muli Ben-Yehuda, Shlomo Matichin, Benoit Guillaume Charles Hudzia, Rom Freiman
  • Publication number: 20160110291
    Abstract: A method includes running in a computer a hypervisor that allocates physical memory pages of the computer to a Virtual Machine (VM). A guest Operating System (OS), a virtual memory and a virtual storage device run in the VM. The guest OS maps the allocated physical memory pages to respective virtual memory pages, retains virtual memory pages that are frequently-accessed by the VM in the virtual memory, and swaps-out virtual memory pages that are rarely-accessed by the VM to the virtual storage. In the hypervisor, one or more of the physical memory pages allocated to the VM are selected, and the corresponding virtual memory pages preventing from being swapped-out by the guest OS, by marking the corresponding virtual memory pages in the guest OS as accessed thus causing the guest OS to regard the corresponding virtual memory pages as frequently-accessed.
    Type: Application
    Filed: July 13, 2015
    Publication date: April 21, 2016
    Inventors: Abel Gordon, Muli Ben-Yehuda
  • Publication number: 20160098302
    Abstract: A method includes, in a computing system that includes at least first and second compute nodes, running on the first compute node a workload that uses memory pages. The memory pages used by the workload are classified into at least active pages and inactive pages, and the inactive memory pages are evicted to shared storage that is accessible at least to the first and second compute nodes. In response to migration of the workload from the first compute node to the second compute node, the active pages are transferred from the first compute node to the second compute node for use by the migrated workload, and the migrated workload is provided with access to the inactive pages on the shared storage.
    Type: Application
    Filed: January 1, 2015
    Publication date: April 7, 2016
    Inventors: Muli Ben-Yehuda, Rom Frieman, Abel Gordon, Benoit Hudzia, Maor Vanmak
  • Publication number: 20160026489
    Abstract: A method includes running a Virtual Machine (VM) on a first compute node in a plurality of compute nodes that communicate with one another over a communication network. The VM is migrated from the first compute node to a second compute node in the plurality by generating, for memory pages accessed by the VM, page transfer state of one or more local memory pages that are accessed locally on the first compute node, and of one or more externalized memory pages whose access is not confined to the first node. Based on the page transfer state, the migrated VM is provided with access to the memory pages, including both the local and the externalized memory pages, on the second compute node.
    Type: Application
    Filed: July 27, 2014
    Publication date: January 28, 2016
    Inventors: Ariel Maislos, Etay Bogner, Muli Ben-Yehuda, Shlomo Matichin, Benoit Guillaume Charles Hudzia, Rom Freiman
  • Publication number: 20150312366
    Abstract: A method includes, in a plurality of compute nodes that communicate with one another over a communication network, running one or more Virtual Machines (VMs) that access storage blocks stored on non-volatile storage devices coupled to at least some of the compute nodes. One or more of the storage blocks accessed by a given VM, which runs on a first compute node, are cached in a volatile memory of a second compute node that is different from the first compute node. The cached storage blocks are served to the given VM.
    Type: Application
    Filed: April 24, 2014
    Publication date: October 29, 2015
    Applicant: Strato Scale Ltd.
    Inventors: Muli Ben-Yehuda, Shlomo Matichin, Ariel Maislos, Etay Bogner
  • Publication number: 20150286414
    Abstract: A method for storage includes storing multiple memory pages in a memory of a first compute node. Using a second compute node that communicates with the first compute node over a communication network, duplicate memory pages are identified among the memory pages stored in the memory of the first compute node by directly accessing the memory of the first compute node. One or more of the identified duplicate memory pages are evicted from the first compute node.
    Type: Application
    Filed: November 18, 2014
    Publication date: October 8, 2015
    Inventors: Abel Gordon, Muli Ben-Yehuda, Benoit Guillaume Charles Hudzia, Etay Bogner
  • Publication number: 20150234669
    Abstract: A method includes running on multiple compute nodes respective memory sharing agents that communicate with one another over a communication network. One or more local Virtual Machines (VMs), which access memory pages, run on a given compute node. Using the memory sharing agents, the memory pages that are accessed by the local VMs are stored on at least two of the compute nodes, and the stored memory pages are served to the local VMs.
    Type: Application
    Filed: February 17, 2014
    Publication date: August 20, 2015
    Applicant: Strato Scale Ltd.
    Inventors: Muli Ben-Yehuda, Etay Bogner, Ariel Maislos, Shlomo Matichin
  • Patent number: 8458698
    Abstract: Methods and systems for improving performance in a virtualization environment. The method comprising: detecting, by a first software, a first set of features supported by a hardware device, wherein the first software runs on the hardware device; detecting a second set of features with which to run a second software, wherein the second software is launched by the first software with the second set of features; exposing one or more features in the second set of features to the second software, wherein the second software detects and enables the exposed features for a third software launched by the second software; and emulating a first feature without causing a trap such that control is transferred to the second software, in response to determining that the first feature is an exposed feature not included in the first set of features, wherein one or more sensitive events are associated with the first feature.
    Type: Grant
    Filed: November 18, 2010
    Date of Patent: June 4, 2013
    Assignee: International Business Machines Corporation
    Inventors: Muli Ben-Yehuda, Abel Gordon, Aviad Zlotnick, Nadav Y. Har'El
  • Publication number: 20130013666
    Abstract: A data transmission optimization method and system. The method comprises analyzing program code to identify data access calls in the program code, using one or more processor; determining whether a first data access call is for retrieving target data stored in a data structure with a plurality of fields, wherein the target data is stored in one or more target fields of the data structure; determining whether servicing the first data access call will result in transfer of non-target data stored in one or more non-target fields in the data structure; and replacing the first data access call with a second data access call, wherein servicing the second data access call will result in transfer of the target data and minimizes the transfer of non-target data.
    Type: Application
    Filed: July 7, 2011
    Publication date: January 10, 2013
    Applicant: International Business Machines Corporation
    Inventors: Muli Ben-Yehuda, Daniel Citron, Itzhack Goldberg, Nadav Har'El, Dorit Nuzman, Ayal Zaks
  • Patent number: 8290994
    Abstract: A computer implemented method is disclosed for obtaining file-level information from block level information of files stored on a storage medium. The method includes accessing the storage medium to obtain metadata available in block level on the storage medium and building an inverse block-to-file map of the files stored on the storage medium. The method also includes listening online to incoming block-level commands communicated from a host to the storage medium, parsing the incoming block-level commands, inferring file-level information from the parsed block level commands; and updating the inverse file-level map. Also disclosed are corresponding computer program product and processing system.
    Type: Grant
    Filed: May 5, 2010
    Date of Patent: October 16, 2012
    Assignee: International Business Machines Corporation
    Inventors: Miriam Allalouf, Muli Ben-Yehuda, Julian Satran, Itai Segall
  • Publication number: 20120131571
    Abstract: Methods and systems for improving performance in a virtualization environment. The method comprising: detecting, by a first software, a first set of features supported by a hardware device, wherein the first software runs on the hardware device; detecting a second set of features with which to run a second software, wherein the second software is launched by the first software with the second set of features; exposing one or more features in the second set of features to the second software, wherein the second software detects and enables the exposed features for a third software launched by the second software; and emulating a first feature without causing a trap such that control is transferred to the second software, in response to determining that the first feature is an exposed feature not included in the first set of features, wherein one or more sensitive events are associated with the first feature.
    Type: Application
    Filed: November 18, 2010
    Publication date: May 24, 2012
    Applicant: International Business Machines Corporation
    Inventors: Muli Ben-Yehuda, Abel Gordon, Nadav Y. Har'El, Ben-Ami Yassour
  • Publication number: 20110276578
    Abstract: A computer implemented method is disclosed for obtaining file-level information from block level information of files stored on a storage medium. The method includes accessing the storage medium to obtain metadata available in block level on the storage medium and building an inverse block-to-file map of the files stored on the storage medium. The method also includes listening online to incoming block-level commands communicated from a host to the storage medium, parsing the incoming block-level commands, inferring file-level information from the parsed block level commands; and updating the inverse file-level map. Also disclosed are corresponding computer program product and processing system.
    Type: Application
    Filed: May 5, 2010
    Publication date: November 10, 2011
    Applicant: International Business Machines Corporation
    Inventors: Miriam Allalouf, Muli Ben-Yehuda, Julian Satran, Itai Segall