| 12189779 |
Detection of cyber threats embedded in cloud applications |
Roy REZNIK, Ami Luttwak, Yarin Miran |
2025-01-07 |
| 9372631 |
Managing volume updates received during an execution of a volume migration process |
Tal Yalon |
2016-06-21 |
| 9087201 |
System and methods for host enabled management in a storage system |
Kariel Sandler, Jacob Broido |
2015-07-21 |
| 8806157 |
Online volume migration using multi-path input / output masquerading |
Yakov Broido, Daniel Goodman, Haim Helman, Leonid Kull, Orit Nissan-Messing |
2014-08-12 |
| 8799594 |
Online volume migration using multi-path input/output masquerading |
Yakov Broido, Daniel Goodman, Haim Helman, Leonid Kull, Orit Nissan-Messing |
2014-08-05 |
| 8782358 |
Transparent input / output switching between synchronously mirrored storage volumes |
Yakov Broido, Daniel Goodman, Haim Helman, Leonid Kull, Orit Nissan-Messing |
2014-07-15 |
| 8762663 |
Transparent input / output switching between synchronously mirrored storage volumes |
Yakov Broido, Daniel Goodman, Haim Helman, Leonid Kull, Orit Nissan-Messing |
2014-06-24 |