| 10990840 |
Configuring data pipelines with image understanding |
Andrew Augustine Wajs, Munehiro Shimomura, Hironori Miyoshi |
2021-04-27 |
| 10558641 |
Trigger system for databases using proxy |
Liran Moysi, Noam Liran |
2020-02-11 |
| 10389528 |
On-demand generation and distribution of cryptographic certificates |
Liran Moysi, Noam Liran |
2019-08-20 |
| 10091169 |
Method and system for protecting cloud-based applications executed in a cloud computing platform |
Liran Moysi, Ami Luttwak, Roy REZNIK, Greg Vishnepolsky |
2018-10-02 |
| 10015205 |
Techniques for traffic capture and reconstruction |
Ami Luttwak, Roy REZNIK, Gregory Vishnepolsky |
2018-07-03 |
| 9438565 |
Cloud service security broker and proxy |
Liran Moysi, Ami Luttwak, Roy REZNIK, Greg Vishnepolsky |
2016-09-06 |
| 8719936 |
VMM-based intrusion detection system |
Micha Moffie, David Kaeli, Javed Aslam, Malak Alshawabkeh, Jennifer Dy +1 more |
2014-05-06 |
| 6901480 |
Method and apparatus for reconfiguring striped logical devices in a disk array storage |
Arieh Don, Mathieu Gagne, Kenneth A. Halligan, Ishay Kedem, Hana Moreshet +2 more |
2005-05-31 |
| 6718437 |
Method and apparatus for reconfiguring striped logical devices in a disk array storage |
Arieh Don, Mathieu Gagne, Kenneth A. Halligan, Ishay Kedem, Hana Moreshet +2 more |
2004-04-06 |
| 6701451 |
Selective correction of data errors |
Ishai Kedem |
2004-03-02 |
| 6658592 |
Error detection in disk storage systems |
Ishai Kedem |
2003-12-02 |
| 6574703 |
Initializing selected extents of a storage device |
Arieh Don, Haim Kopylovitz, Hana Moreshet, Alexandr Veprinsky, Philip E. Tamer |
2003-06-03 |
| 6546457 |
Method and apparatus for reconfiguring striped logical devices in a disk array storage |
Arieh Don, Mathieu Gagne, Kenneth A. Halligan, Ishay Kedem, Hana Moreshet +2 more |
2003-04-08 |
| 6487635 |
Management of orphan tracks |
Ishai Kedem |
2002-11-26 |