Patents by Inventor Roee Alon
Roee Alon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9740421Abstract: A just-in-time storage allocation is initiated for storage at a remote storage device having flash storage. Each of multiple containers comprises a grouping of one or more of the flash storage. The just-in-time storage allocation includes an application profile that includes a priority criteria for the storage of either a priority of performance over efficiency or a priority of efficiency over performance. A determination is made of whether at least one container of the multiple containers satisfies the priority criteria based on at least one attribute of the at least one container. The storage is allocated in the at least one container, in response to the at least one container satisfying the priority criteria.Type: GrantFiled: October 25, 2016Date of Patent: August 22, 2017Assignee: NetApp, Inc.Inventors: Assaf B. Levy, Vered Rosen, Roee Alon, Dekel Sharabi, Michael Yakobi
-
Publication number: 20170038992Abstract: A just-in-time storage allocation is initiated for storage at a remote storage device having flash storage. Each of multiple containers comprises a grouping of one or more of the flash storage. The just-in-time storage allocation includes an application profile that includes a priority criteria for the storage of either a priority of performance over efficiency or a priority of efficiency over performance. A determination is made of whether at least one container of the multiple containers satisfies the priority criteria based on at least one attribute of the at least one container. The storage is allocated in the at least one container, in response to the at least one container satisfying the priority criteria.Type: ApplicationFiled: October 25, 2016Publication date: February 9, 2017Inventors: Assaf B. Levy, Vered Rosen, Roee Alon, Dekel Sharabi, Michael Yakobi
-
Patent number: 9507526Abstract: A just-in-time storage allocation is initiated for storage at a remote storage device having storage disks. Each of multiple containers comprises a grouping of one or more of the storage disks. The just-in-time storage allocation includes an application profile that includes a priority criteria for the storage of either a priority of performance over efficiency or a priority of efficiency over performance A determination is made of whether at least one container of the multiple containers satisfies the priority criteria based on at least one attribute of the at least one container. The storage is allocated in the at least one container, in response to the at least one container satisfying the priority criteria.Type: GrantFiled: January 12, 2015Date of Patent: November 29, 2016Assignee: NetApp, Inc.Inventors: Assaf B. Levy, Vered Rosen, Roee Alon, Dekel Sharabi, Michael Yakobi
-
Patent number: 9501322Abstract: Systems and methods for analyzing the service and performance levels associated with virtual machines in a storage network environment for compliance with a resource capacity policy are provided. Component configuration and connectivity information from components in the network environment is collected without using host agents on the virtual machines. Access paths defining end-to-end access relationships between an application on a virtual machine and storage data objects associated with the virtual machine in the network environment are derived. Access paths comprise sequences of components configured to enable information flow between an application residing on a virtual machine and a data object on a respective storage device. Access path resource consumption is computed and virtual machines with resource consumptions that violate the resource capacity policy are identified.Type: GrantFiled: September 13, 2013Date of Patent: November 22, 2016Assignee: NetApp, Inc.Inventors: Raphael Yahalom, Assaf Levy, Omri Kessel, Roee Alon, Michael Yakobi
-
Publication number: 20160139815Abstract: A just-in-time storage allocation is initiated for storage at a remote storage device having storage disks. Each of multiple containers comprises a grouping of one or more of the storage disks. The just-in-time storage allocation includes an application profile that includes a priority criteria for the storage of either a priority of performance over efficiency or a priority of efficiency over performance A determination is made of whether at least one container of the multiple containers satisfies the priority criteria based on at least one attribute of the at least one container. The storage is allocated in the at least one container, in response to the at least one container satisfying the priority criteria.Type: ApplicationFiled: January 12, 2015Publication date: May 19, 2016Inventors: Assaf B. Levy, Vered Rosen, Roee Alon, Dekel Sharabi, Michael Yakobi
-
Patent number: 8775387Abstract: Systems and processes for determining and validating accessibility and currency, i.e., the actual status, of data replicated in a networked environment are disclosed. According to the disclosed process, a replicated-data policy for replicating data is defined, and access paths between network devices or between applications running on the network devices are monitored, for example, by a replicated-data monitor. Also monitored are the data replication activities in the network. The currency, i.e., timeliness, and accessibility of a replica by a network device is then compared with the requirements in the replicated-data policy and discrepancies with the replicated-data policy are identified, optionally accompanied by a notification.Type: GrantFiled: February 24, 2010Date of Patent: July 8, 2014Assignee: NetApp, Inc.Inventors: Raphael Yahalom, Roee Alon, Assaf Levy, Omri Kessel
-
Publication number: 20140019972Abstract: Systems and methods for analyzing the service and performance levels associated with virtual machines in a storage network environment for compliance with a resource capacity policy are provided. Component configuration and connectivity information from components in the network environment is collected without using host agents on the virtual machines. Access paths defining end-to-end access relationships between an application on a virtual machine and storage data objects associated with the virtual machine in the network environment are derived. Access paths comprise sequences of components configured to enable information flow between an application residing on a virtual machine and a data object on a respective storage device. Access path resource consumption is computed and virtual machines with resource consumptions that violate the resource capacity policy are identified.Type: ApplicationFiled: September 13, 2013Publication date: January 16, 2014Applicant: NetApp, Inc.Inventors: Raphael Yahalom, Assaf Levy, Omri Kessel, Roee Alon, Michael Yaakobi
-
Patent number: 8560671Abstract: Systems and methods for analyzing the service and performance levels associated with virtual machines in a storage network environment for compliance with a resource capacity policy are provided. Component configuration and connectivity information from components in the network environment is collected without using host agents on the virtual machines. Access paths defining end-to-end access relationships between an application on a virtual machine and storage data objects associated with the virtual machine in the network environment are derived. Access paths comprise sequences of components configured to enable information flow between an application residing on a virtual machine and a data object on a respective storage device. Access path resource consumption is computed and virtual machines with resource consumptions that violate the resource capacity policy are identified.Type: GrantFiled: September 9, 2008Date of Patent: October 15, 2013Assignee: NetApp, Inc.Inventors: Raphael Yahalom, Assaf Levy, Omri Kessel, Roee Alon, Michael Yaakobi
-
Patent number: 8112510Abstract: Methods and systems for predictive change management in a network are provided. A configuration change can be specified and pre-validated according to the access path policy, before the actual changes are implemented. The conformance of the implemented configuration change with the access path policy is validated after implementation, because of possible consequential effects of the configuration change. If a change in one or more access paths is specified, then associated component events can be simulated before implementation, so that root causes for resulting access path violations can be detected and remedied before the changes are made.Type: GrantFiled: May 22, 2009Date of Patent: February 7, 2012Assignee: NetApp, Inc.Inventors: Roee Alon, Assaf Levy, Shai Scharf, Raphael Yahalom
-
Patent number: 7961594Abstract: A method and system for constructing and analyzing an access path event history in a network is provided. Inconsistencies in the physical and logical access paths when making changes in the network are detected and analyzed. Component events associated with network appliances are recorded and an event sequence is constructed. Root causes for the inconsistencies are identified and the access paths are repaired in conformance with the network access path policy. The method and systems can be applied to networks in general, and more particularly to storage area networks (SAN).Type: GrantFiled: April 22, 2005Date of Patent: June 14, 2011Assignee: Onaro, Inc.Inventors: Roee Alon, Assaf Levy, Shai Scharf, Raphael Yahalom
-
Publication number: 20100153350Abstract: Systems and processes for determining and validating accessibility and currency, i.e., the actual status, of data replicated in a networked environment are disclosed. According to the disclosed process, a replicated-data policy for replicating data is defined, and access paths between network devices or between applications running on the network devices are monitored, for example, by a replicated-data monitor. Also monitored are the data replication activities in the network. The currency, i.e., timeliness, and accessibility of a replica by a network device is then compared with the requirements in the replicated-data policy and discrepancies with the replicated-data policy are identified, optionally accompanied by a notification.Type: ApplicationFiled: February 24, 2010Publication date: June 17, 2010Applicant: NetApp, Inc.Inventors: Raphael Yahalom, Roee Alon, Assaf Levy, Omri Kessel
-
Patent number: 7702667Abstract: Systems and processes for determining and validating accessibility and currency, i.e., the actual status, of data replicated in a networked environment are disclosed. According to the disclosed process, a replicated-data policy for replicating data is defined, and access paths between network devices or between applications running on the network devices are monitored, for example, by a replicated-data monitor. Also monitored are the data replication activities in the network. The currency, i.e., timeliness, and accessibility of a replica by a network device is then compared with the requirements in the replicated-data policy and discrepancies with the replicated-data policy are identified, optionally accompanied by a notification.Type: GrantFiled: September 27, 2006Date of Patent: April 20, 2010Assignee: NetApp, Inc.Inventors: Raphael Yahalom, Roee Alon, Assaf Levy, Omri Kessel
-
Publication number: 20090313367Abstract: Methods and systems for predictive change management in a network are provided. A configuration change can be specified and pre-validated according to the access path policy, before the actual changes are implemented. The conformance of the implemented configuration change with the access path policy is validated after implementation, because of possible consequential effects of the configuration change. If a change in one or more access paths is specified, then associated component events can be simulated before implementation, so that root causes for resulting access path violations can be detected and remedied before the changes are made.Type: ApplicationFiled: May 22, 2009Publication date: December 17, 2009Applicant: NetApp, Inc.Inventors: Roee Alon, Assaf Levy, Shai Scharf, Raphael Yahalom
-
Patent number: 7617320Abstract: A method and system for validating logical access path in a storage area network is provided. It supports definition of a SAN access path policy that represent which application to data LUN logical access paths should not exist, which should exist, and what should be the end-to-end attributes of each. It performs the SAN-customized graph-based validation algorithm based on information it collects automatically from devices distributed across the SAN using a variety of non-intrusive mechanisms. It enables to identify violations of actual logical access paths relative to the required access paths as determined by the policy. It enables notification about violations, with all their relevant context information, to the appropriate target recipient using a variety of means.Type: GrantFiled: October 23, 2003Date of Patent: November 10, 2009Assignee: NetApp, Inc.Inventors: Roee Alon, Assaf Levy, Shai Scharf, Raphael Yahalom
-
Patent number: 7546333Abstract: Methods and systems for predictive change management in a network are provided. A configuration change can be specified and pre-validated according to the access path policy, before the actual changes are implemented. The conformance of the implemented configuration change with the access path policy is validated after implementation, because of possible consequential effects of the configuration change. If a change in one or more access paths is specified, then associated component events can be simulated before implementation, so that root causes for resulting access path violations can be detected and remedied before the changes are made.Type: GrantFiled: April 22, 2005Date of Patent: June 9, 2009Assignee: NetApp, Inc.Inventors: Roee Alon, Assaf Levy, Shai Scharf, Raphael Yahalom
-
Publication number: 20070088763Abstract: Systems and processes for determining and validating accessibility and currency, i.e., the actual status, of data replicated in a networked environment are disclosed. According to the disclosed process, a replicated-data policy for replicating data is defined, and access paths between network devices or between applications running on the network devices are monitored, for example, by a replicated-data monitor. Also monitored are the data replication activities in the network. The currency, i.e., timeliness, and accessibility of a replica by a network device is then compared with the requirements in the replicated-data policy and discrepancies with the replicated-data policy are identified, optionally accompanied by a notification.Type: ApplicationFiled: September 27, 2006Publication date: April 19, 2007Inventors: Raphael Yahalom, Roee Alon, Assaf Levy, Omri Kessel
-
Publication number: 20050262233Abstract: A method and system for constructing and analyzing an access path event history in a network is provided. Inconsistencies in the physical and logical access paths when making changes in the network are detected and analyzed. Component events associated with network appliances are recorded and an event sequence is constructed. Root causes for the inconsistencies are identified and the access paths are repaired in conformance with the network access path policy. The method and systems can be applied to networks in general, and more particularly to storage area networks (SAN).Type: ApplicationFiled: April 22, 2005Publication date: November 24, 2005Inventors: Roee Alon, Assaf Levy, Shai Scharf, Raphael Yahalom
-
Publication number: 20050256961Abstract: Methods and systems for predictive change management in a network are provided. A configuration change can be specified and pre-validated according to the access path policy, before the actual changes are implemented. The conformance of the implemented configuration change with the access path policy is validated after implementation, because of possible consequential effects of the configuration change. If a change in one or more access paths is specified, then associated component events can be simulated before implementation, so that root causes for resulting access path violations can be detected and remedied before the changes are made.Type: ApplicationFiled: April 22, 2005Publication date: November 17, 2005Inventors: Roee Alon, Assaf Levy, Shai Scharf, Raphael Yahalom
-
Publication number: 20040205089Abstract: A method and system for validating logical access path in a storage area network is provided. It supports definition of a SAN access path policy that represent which application to data LUN logical access paths should not exist, which should exist, and what should be the end-to-end attributes of each. It performs the SAN-customized graph-based validation algorithm based on information it collects automatically from devices distributed across the SAN using a variety of non-intrusive mechanisms. It enables to identify violations of actual logical access paths relative to the required access paths as determined by the policy. It enables notification about violations, with all their relevant context information, to the appropriate target recipient using a variety of means.Type: ApplicationFiled: October 23, 2003Publication date: October 14, 2004Applicant: ONAROInventors: Roee Alon, Assaf Levy, Shai Scharf, Raphael Yahalom