$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Mechanism for restoring, porting, replicating and checkpointing computer systems using state extraction 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-009/455
출원번호 US-0497978 (2000-02-04)
발명자 / 주소
  • Lim, Beng-Hong
  • Bugnion, Edouard
  • Devine, Scott W.
출원인 / 주소
  • VMWare, Inc.
대리인 / 주소
    Pearce Jeffrey
인용정보 피인용 횟수 : 349  인용 특허 : 6

초록

A computer system is interrupted, and its entire state information is extracted as one or more checkpoints at one or more respective points during operation of the system. The checkpoint may be restored into the system at any later time, even multiple times, and it may also even be loaded into one o

대표청구항

1. A computer system comprising:a hardware processor;physical system storage;a virtual machine monitor functionally connected to the hardware processor and physical system storage;a virtual machine functionally connected to the virtual machine monitor and including:a virtual processor that has a plu

이 특허에 인용된 특허 (6)

  1. Crump Dwayne Thomas ; Pancoast Steven Taylor ; Steelman Herbert Stanley, Computer system having a plurality of stored system capability states from which to resume.
  2. Crump Dwayne Thomas ; Pancoast Steven Taylor, Computer system having suspend once resume many sessions.
  3. Matsuura Hidekazu (Kawasaki JPX) Saito Masaru (Kawasaki JPX), Global communication interrupt control system for communication between real and virtual machine systems using global co.
  4. Klaiber Alex ; Bedichek Robert ; Keppel David, Method and apparatus for correcting errors in computer systems.
  5. Garney John I. (Aloha OR), Preservation of a computer system processing state in a mass storage device.
  6. Baylor Sandra J. (Ossining NY) Corbett Peter F. (Scarsdale NY) Fitch Blake G. (New Rochelle NY) Giampapa Mark E. (Irvington NY), Using virtual disks for disk system checkpointing.

이 특허를 인용한 특허 (349)

  1. Chow, James; Garfinkel, Tal; Chen, Peter M., Accelerating replayed program execution to support decoupled program analysis.
  2. Czezatke, Christian; Le, Bich Cau; Yadappanavar, Krishna; Chuang, Shaw C., Accessing virtual data storage units to offload operations from a computer system hosting a virtual machine to an offload server.
  3. Abraham, Vineet M.; Chin, Bill Ying; Mahoney, William R.; Saxena, Aditya; Liang, Xupei; Zhou, Bill Jianqiang, Achieving ultra-high availability using a single CPU.
  4. Abraham, Vineet M.; Chin, Bill Ying; Mahoney, William R.; Saxena, Aditya; Liang, Xupei; Zhou, Bill Jianqiang, Achieving ultra-high availability using a single CPU.
  5. Fitzgerald, Joseph; Barenboim, Oleg, Adapt a virtual machine to comply with system enforced policies and derive an optimized variant of the adapted virtual machine.
  6. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  7. Bonwick, Jeffrey S.; Moore, William H.; Ahrens, Matthew A., Adaptive resilvering I/O scheduling.
  8. Brown, Derrick; Blair, Roger; Finch, Steven; Wolbers, Igor; Taylor, Gerald; Cherkasov, Aleksey, Agency management system and content management system integration.
  9. CP, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  10. Cp, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  11. Abali, Bulent; Hines, Michael R.; Kandiraju, Gokul B.; Kouloheris, Jack L., Agile VM load balancing through micro-checkpointing and multi-architecture emulation.
  12. Baraz,Leonid, Apparatus and method for reproduction of a source ISA application state corresponding to a target ISA application state at an execution stop point.
  13. Sharma, Rosen; Bhargava, Rishi; Vittal, Chiradeep; Eranky, Shyam, Application change control.
  14. Hartz, George; Nale, Chad; Fusari, David, Augmenting a virtual machine hosting environment from within a virtual machine.
  15. Garrison, Sara; Sinyagin, Aleksey, Automated customized web portal template generation systems and methods.
  16. Yueh, Jedidiah; McVey, Clint L; Bolt, Thomas B; Auchmoody, Scott; Olsen, Eric; Crosby, William; Ogata, Scott; Starling, Jennifer; Ramos, Robert, Automated priority restores.
  17. Fitzgerald, Joseph; Barenboim, Oleg, Automatic optimization for virtual systems.
  18. Fitzgerald, Joseph; Barenboim, Oleg, Automatic optimization for virtual systems.
  19. Fitzgerald, Joseph; Barenboim, Oleg, Automatic optimization for virtual systems.
  20. Westenberg, Guido, Backup system and method.
  21. Zhou, Bill Jianqiang; Mahoney, William R., Biasing active-standby determination.
  22. Bugnion, Edouard, Binary translator with precise exception synchronization mechanism.
  23. Bugnion, Edouard, Binary translator with precise exception synchronization mechanism.
  24. Dalton, Chris I.; Gebhardt, Carl, Booting a computer device.
  25. Lam,Monica Sin Ling; Sapuntzakis,Constantine Paul; Chandra,Ramesh U. V.; Zeldovich,Nickolai Borisovich; Rosenblum,Mendel; Chow,James Eugene; Brumley,David James, Cache-based system management architecture with virtual appliances, network repositories, and virtual appliance transceivers.
  26. van Rietschote, Hans F.; Saptarshi, Mahesh P; Hobbs, Craig W., Central administration and maintenance of workstations using virtual machines, network filesystems, and replication.
  27. Yueh, Jedidiah, Centralized content addressed storage.
  28. Starks, John; Bezbaruah, Angshuman, Change tracking using redundancy in logical time.
  29. North, Geraint, Check-point based high availability: network packet buffering in hardware.
  30. Tran, Cuong H., Checkpoint service.
  31. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  32. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  33. Hudzia, Benoit; Walsh, Steve; Tell, Roei; Shribman, Aidan; Izsak, Peter, Cloud-enabled, distributed and high-availability system with virtual machine checkpointing.
  34. Fitzgerald, Joseph; Barenboim, Oleg, Compliance-based adaptations in managed virtual systems.
  35. Fitzgerald, Joseph; Barenboim, Oleg, Compliance-based adaptations in managed virtual systems.
  36. Fitzgerald, Joseph; Barenboim, Oleg, Compliance-based adaptations in managed virtual systems.
  37. Fitzgerald, Joseph; Barenboim, Oleg, Compliance-based adaptations in managed virtual systems.
  38. Nicholas, Andrew Ernest; Giles, Aaron S.; Traut, Eric P.; Avraham, Idan; Fu, Xiongjian; Salem, Osama M., Concurrent virtual machine snapshots and restore.
  39. Nicholas, Andrew Ernest; Giles, Aaron S.; Traut, Eric P.; Avraham, Idan; Fu, Xiongjian; Salem, Osama M., Concurrent virtual machine snapshots and restore.
  40. Sebes, E. John; Bhargava, Rishi; Reese, David P., Connectivity-based authorization.
  41. Sebes, E. John; Shah, Bakul; Sharma, Rosen, Containment of network communication.
  42. Ghose, Kanad, Continuous run-time validation of program execution: a practical approach.
  43. Fitzgerald, Joseph; Barenboim, Oleg, Control and management of virtual systems.
  44. Yamagami, Yoshihito, Control method of system monitoring device, program, and computer system.
  45. Aswathanarayana, Tejasvi; Desai, Komal; Dirks, Patrick William Penzias; Godbole, Sujay; Pool, Jesse; Sokolinski, Ilia; Uluski, Derek, Conversion of virtual disk snapshots between redo and copy-on-write technologies.
  46. Cheung, David; Kancherla, Mani Prasad; Kothari, Deepak; Hemminger, Gary, Core-trunking across cores on physically separated processors allocated to a virtual machine based on configuration information including context information for virtual machines.
  47. Craft, David Jones; Das, Ranadip; Mishra, Rajeev; Russell, Lance Warren, Creating a checkpoint for modules on a communications stream.
  48. Potlapally, Nachiketh Rao; Brandwine, Eric Jason; Singh, Deepak, Cryptographically verified repeatable virtualized computing.
  49. Chow, James; Garfinkel, Tal; Chen, Peter M., Decoupling dynamic program analysis from execution across heterogeneous systems.
  50. Chow, James E.; Garfinkel, Tal; Chen, Peter M., Decoupling dynamic program analysis from execution in virtual environments.
  51. Chow, James; Garfinkel, Tal; Chen, Peter M., Decoupling dynamic program analysis from execution in virtual environments.
  52. Stringham, Russell R., Detecting and removing rootkits from within an infected computing system.
  53. Brumley, David; Cha, Sang Kil; Avgerinos, Thanassis; Rebert, Alexandre, Detecting exploitable bugs in binary code.
  54. Brumley, David; Cha, Sang Kil; Avgerinos, Thanassis; Rebert, Alexandre, Detecting exploitable bugs in binary code.
  55. van Rietschote, Hans F., Disaster recovery and backup using virtual machines.
  56. Plouffe, Jerry; Davis, Scott H.; Vasilevsky, Alexander D.; Thomas, III, Benjamin J.; Noyes, Steven S.; Hazel, Tom, Distributed virtual machine monitor for managing multiple virtual resources across multiple physical nodes.
  57. Bonwick, Jeffrey S.; Moore, William H.; Ahrens, Matthew A., Ditto blocks.
  58. Bezbaruah, Angshuman; Reuther, Lars; Brown, Taylor O'Neil; Starks, John Andrew, Efficiently providing virtual machine reference points.
  59. Bezbaruah, Angshuman; Reuther, Lars; Brown, Taylor O'Neil; Starks, John Andrew, Efficiently providing virtual machine reference points.
  60. Fitzgerald, Joseph; Barenboim, Oleg, Enforcement of compliance policies in managed virtual systems.
  61. Fitzgerald, Joseph; Barenboim, Oleg, Enforcement of compliance policies in managed virtual systems.
  62. Fitzgerald, Joseph; Barenboim, Oleg, Enforcement of compliance policies in managed virtual systems.
  63. Fitzgerald, Joseph; Barenboim, Oleg, Enforcement of compliance policies in managed virtual systems.
  64. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  65. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  66. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  67. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  68. Salomone, Leonardo José Silva; Mailloux, Jerry E.; Yach, David Paul, Enhanced fast reset in mobile wireless communication devices and associated methods.
  69. Daudel, Jeffrey; Cherukuri, Suman; Yeverino, Humberto; Singh, Dickey; Jakab, Arpad; Justice, Marvin; Lindo, Jonathan, Ensuring determinism during programmatic replay in a virtual machine.
  70. Daudel, Jeffrey; Cherukuri, Suman; Yeverino, Humberto; Singh, Dickey; Jakab, Arpad; Justice, Marvin; Lindo, Jonathan, Ensuring determinism during programmatic replay in a virtual machine.
  71. Daudel, Jeffrey; Cherukuri, Suman; Yeverino, Humberto; Singh, Dickey; Jakab, Arpad; Justice, Marvin; Lindo, Jonathan, Ensuring determinism during programmatic replay in a virtual machine.
  72. Daudel, Jeffrey; Cherukuri, Suman; Yeverino, Humberto; Singh, Dickey; Jakab, Arpad; Justice, Marvin; Lindo, Jonathan, Ensuring determinism during programmatic replay in a virtual machine.
  73. Daudel, Jeffrey; Cherukuri, Suman; Yeverino, Humberto; Singh, Dickey; Jakab, Arpad; Justice, Marvin; Lindo, Jonathan, Ensuring determinism during programmatic replay in a virtual machine.
  74. Smirnov, George; Fairbanks, Leon; Hu, Kenneth; Kaeli, David, Evaluating and predicting computer system performance using kneepoint analysis.
  75. Smirnov, George; Fairbanks, Leon; Hu, Kenneth; Kaeli, David, Evaluating and predicting computer system performance using kneepoint analysis.
  76. Bhargava, Rishi; Sebes, E. John, Execution environment file inventory.
  77. van Rietschote,Hans F.; Panemangalore,Sachinrao C.; Joshi,Mahesh; Srivastava,Sharad, Failing over a virtual machine.
  78. Bent, John M.; Faibish, Sorin; Combes, Patrick S.; Paegle, Eriks S.; Simons, Joshua Emerson, Fault resilient distributed computing using virtual machine continuous data protection.
  79. Parra, Ivan Omar; Williams, Douglas H., Fault tolerance for complex distributed computing operations.
  80. Parra, Ivan Omar; Williams, Douglas H., Fault tolerance for complex distributed computing operations.
  81. Parra, Ivan Omar; Williams, Douglas H., Fault tolerance for complex distributed computing operations.
  82. Cheng, Haichen; Thirumoolan, Sudhagar, File system based offline disk management.
  83. Moore,William H.; Bonwick,Jeffrey S.; Ahrens,Matthew A., Gang blocks.
  84. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  85. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  86. Qu, Hui, High availability in-service software upgrade using virtual machine instances in dual control units of a network device.
  87. Qu, Hui; Lin, Mu; Wang, Shine-Chu; Chu, Heng-Hui Debbie; Zhang, Leyi; Zhou, Zi; Obstfeld, Joel, High availability using full memory replication between virtual machine instances on a network device.
  88. Schmidt, Rene W.; Rajagopal, Sridhar, High availability virtual machine cluster.
  89. Schmidt, Rene W.; Rajagopal, Sridhar, High availability virtual machine cluster.
  90. Schmidt, Rene W.; Rajagopal, Sridhar, High availability virtual machine cluster.
  91. Yueh, Jedidiah, High efficiency portable archive and data protection using a virtualization layer.
  92. Yueh, Jedidiah, High efficiency portable archive with virtualization.
  93. Yueh, Jedidiah, High efficiency virtualized portable archive.
  94. Voccio, Paul, Hypervisor-agnostic method of configuring a virtual machine.
  95. Voccio, Paul, Hypervisor-agnostic method of configuring a virtual machine.
  96. Qu, Hui; Obstfeld, Joel; Ward, David; Lin, Mu; Kulkarni, Anjali, In-service configuration upgrade using virtual machine instances.
  97. Suzaki,Kuniyasu, Input and output control means for computer system storage and a software execution method using same.
  98. Lad, Kamlesh; Liu, Peter Chi-Hsiung, Instant data center recovery.
  99. Lad, Kamlesh; Liu, Peter Chi-Hsiung, Instant data center recovery.
  100. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  101. Filali-Adib, Khalid; Ganesh, Perinkulam I.; Mazzurana, Paul D.; Shvartsman, Edward; Yook, Sungjin, Isolation of device namespace to allow duplicate/common names in root volume group workload partitions.
  102. Yim, Keun-soo; Park, Jung-keun; Yoo, Jeong-joon; Lee, Jae-don; Im, Chae-seok; Shin, Young-sam, Kernel-aware debugging system, medium, and method.
  103. Baron, Ayal; Simoncelli, Federico, Live migration of virtual disks.
  104. Chen, Peter M.; Scales, Daniel J.; Xu, Min; Ginzton, Matthew D., Low overhead fault tolerance through hybrid checkpointing and replay.
  105. Chen, Peter M.; Scales, Daniel J.; Xu, Min; Ginzton, Matthew D., Low overhead fault tolerance through hybrid checkpointing and replay.
  106. Beveridge, Daniel James, Machine identity persistence for users of non-persistent virtual desktops.
  107. Beveridge, Daniel James, Machine identity persistence for users of non-persistent virtual desktops.
  108. Hartz, George; Fontana, Eric; Fusari, David, Maintaining synchronization of virtual machine image differences across server and host computers.
  109. Chiruvolu, Phani; Sinha, Gaurav; Singh, Devdeep; Oshins, Jacob; Eck, Christopher L., Managing replicated virtual storage at recovery sites.
  110. Mick, Jason; Bracey, Dale Lee; Lindberg, Van, Market-based virtual machine allocation.
  111. Mick, Jason; Bracey, Dale Lee; Lindberg, Van, Market-based virtual machine allocation.
  112. Traut, Eric P., Marking and utilizing portions of memory state information during a switch between virtual machines to minimize software service interruption.
  113. Lim, Beng-Hong; Bugnion, Edouard; Devine, Scott, Mechanism for providing virtual machines for use by multiple users.
  114. Lim, Beng-Hong; Bugnion, Edouard; Devine, Scott W., Mechanism for providing virtual machines for use by multiple users.
  115. James,Barry Edmund, Memory device with applications software for releasable connection to a host computer.
  116. Schmidt,Brian Keith, Method and apparatus for aggregate resource management of active computing environments.
  117. Mishra, Rajeev; Russell, Lance Warren, Method and apparatus for checkpoint and restart of pseudo terminals.
  118. Rouwet, Wim J.; Bagh, Fares, Method and apparatus for combined hardware/software VM migration.
  119. Bonwick,Jeffrey S.; Ahrens,Matthew A., Method and apparatus for compressing data in a file system.
  120. Cota Robles,Erik; Chou,Stephen; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Method and apparatus for constructing host processor soft devices independent of the host processor operating system.
  121. Ahrens,Matthew A.; Bonwick,Jeffrey S., Method and apparatus for dynamic striping.
  122. Mann,Timothy P., Method and apparatus for emulating multiple virtual timers in a virtual computer system when the virtual timers fall behind the real time of a physical computer system.
  123. Bonwick, Jeffrey S.; Moore, William H.; Ahrens, Matthew A., Method and apparatus for enabling adaptive endianness.
  124. Bonwick,Jeffrey S.; Ahrens,Matthew A., Method and apparatus for identifying tampering of data in a file system.
  125. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  126. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  127. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  128. Moore, William H.; Johnson, Darrin P.; Holtz, Tabriz I., Method and apparatus for power-managing storage devices in a storage pool.
  129. Bhargava, Rishi; Vittal, Chiradeep; Saveram, Swaroop, Method and apparatus for process enforced configuration management.
  130. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  131. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  132. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  133. Tremain,Geoffrey Donald, Method and apparatus for providing computer services.
  134. Schmidt, Brian Keith, Method and apparatus for representing and encapsulating active computing environments.
  135. Park, Seong-yeol; Jang, Min-sung; Park, Jae-min; Suh, Sang-bum; Heo, Sung-kwan; Kim, Byung-woan; Lee, Myung-jae, Method and apparatus for restoring system using virtualization.
  136. Ahrens, Matthew A.; Bonwick, Jeffrey S., Method and apparatus for self-validating checksums in a file system.
  137. Bonwick,Jeffrey S.; Ahrens,Matthew A., Method and apparatus for vectored block-level checksum for file system data integrity.
  138. Moore, William H.; Bonwick, Jeffrey S.; Ahrens, Matthew A., Method and system for adaptive metadata replication.
  139. Moore, William H.; Johnson, Darrin P.; Wilson, George R., Method and system for block allocation for hybrid drives.
  140. Bonwick, Jeffrey S.; Moore, William H.; Ahrens, Matthew A., Method and system for block reallocation.
  141. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of networked application client software by explicit human input.
  142. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  143. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  144. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  145. Schuba, Christoph L.; Levon, John B., Method and system for cross-domain data sharing.
  146. Moore, William H.; Bonwick, Jeffrey S.; Ahrens, Matthew A., Method and system for data replication.
  147. Bonwick, Jeffrey S.; Ahrens, Matthew A., Method and system for detecting and correcting data errors using checksums and replication.
  148. Moore, William H.; Johnson, Darrin P.; Saxe, Eric C., Method and system for managing wear-level aware file systems.
  149. Moore, William H.; Bonwick, Jeffrey S.; Ahrens, Matthew A., Method and system for metadata-based resilvering.
  150. Noonan, III, Donal Charles, Method and system for modularizing windows imaging format.
  151. Noonan, III, Donal Charles, Method and system for modularizing windows imaging format.
  152. Bonwick,Jeffrey S.; Moore,William H.; Ahrens,Matthew A., Method and system for object allocation using fill counts.
  153. Moore, William H.; Johnson, Darrin P.; Wilson, George R., Method and system for power aware I/O scheduling.
  154. Moore, William H.; Johnson, Darrin P.; Bonwick, Jeffrey S.; Holtz, Tabriz I., Method and system for priority-based allocation in a storage pool.
  155. Mohinder, Preet, Method and system for providing user space address protection from writable memory area in a virtual environment.
  156. Moore, William H.; Bonwick, Jeffrey S.; Ahrens, Matthew A., Method and system for pruned resilvering using a dirty time log.
  157. Moore, William H.; Johnson, Darrin P.; Bonwick, Jeffrey S.; Holtz, Tabriz I., Method and system for reallocating blocks in a storage pool.
  158. Moore, William H.; Bonwick, Jeffrey S., Method and system for repairing partially damaged blocks.
  159. Bonwick, Jeffrey S.; Moore, William H.; Ahrens, Matthew A., Method and system for storing a sparse file using fill counts.
  160. Voccio, Paul; Messerli, Antony Joel, Method and system for transferring a virtual machine.
  161. Voccio, Paul; Messerli, Antony Joel, Method and system for transferring a virtual machine.
  162. Rajan,Basant; Borate,Milind; Mathew,George, Method and system of providing a write-accessible storage checkpoint.
  163. Bonwick, Jeffrey S.; Moore, William H., Method and system supporting per-file and per-block replication.
  164. Moore, William H.; Bonwick, Jeffrey S., Method and system using checksums to repair data.
  165. Ragnunath, Mandayam Thondanur; Narayanaswami, Chandrasekhar, Method for carrying multiple suspended runtime images.
  166. Traut, Eric P.; Vega, Rene A., Method for forking or migrating a virtual machine.
  167. Garthwaite, Alexander Thomas; Baskakov, Yury; Zhang, Irene; Christopher, Kevin Scott; Pool, Jesse, Method for restoring virtual machine state from a checkpoint file.
  168. Garthwaite, Alexander Thomas; Baskakov, Yury; Zhang, Irene; Christopher, Kevin Scott; Pool, Jesse, Method for saving virtual machine state to a checkpoint file.
  169. Armstrong, William Joseph; Azagury, Alain Charles; Ben-Yehuda, Shmuel; Dekel, Eliezer; Factor, Michael E.; Hayardeny, Amiram, Method for storing and restoring persistent memory content and virtual machine state information.
  170. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for computer system denial-of-service protection.
  171. Bhargava, Rishi; Reese, Jr., David P., Method of and system for computer system state checks.
  172. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for malicious software detection using critical address space protection.
  173. Saraf, Suman; Agrawal, Sharad; Srivastava, Vivek, Method of and system for reverse mapping vnode pointers.
  174. Robinson,Gerald R., Method, system and program product for preserving a user state in an application.
  175. Fitzgerald, Joseph; Barenboim, Oleg; Oliveri, Richard, Methods and apparatus for locating an unauthorized virtual machine.
  176. Fitzgerald, Joseph; Barenboim, Oleg; McCullough, Gregory; Tanzillo, Gregg; Oliveri, Richard; Clarizio, Daniel A., Methods and apparatus for storing and transmitting historical configuration data associated with information technology assets.
  177. Fitzgerald, Joseph; Barenboim, Oleg; McCullough, Gregory; Tanzillo, Gregg; Oliveri, Richard; Clarizio, Daniel A., Methods and apparatus for storing and transmitting historical configuration data associated with information technology assets.
  178. Fitzgerald, Joseph; Barenboim, Oleg; Tanzillo, Gregg, Methods and apparatus for using tags to control and manage assets.
  179. Giampaolo, Dominic Benjamin; Mackovitch, Michael Steven, Methods and apparatuses for data protection.
  180. Giampaolo, Dominic Benjamin; Mackovitch, Michael Steven, Methods and apparatuses for data protection.
  181. Giampaolo, Dominic Benjamin; Mackovitch, Michael Steven, Methods and apparatuses for data protection.
  182. Jess, Martin; Nichols, Charles E.; Hill, Rexford A.; Logan, John G.; Snider, Timothy R., Methods and structure for near-live reprogramming of firmware in storage systems using a hypervisor.
  183. Noonan, III, Donal Charles, Methods and systems for deploying hardware files to a computer.
  184. Noonan, III, Donal Charles, Methods and systems for deploying hardware files to a computer.
  185. Dobrovolskiy, Nikolay N.; Omelyanchuk, Andrey A.; Tormasov, Alexander G.; Protassov, Stanislav S.; Beloussov, Serguei M., Methods and systems for determining potentially unsafe instructions in a virtual machine context and activating a software debugger to process the potentially unsafe instructions.
  186. Dobrovolskiy, Nikolay N.; Omelyanchuk, Andrey A.; Tormasov, Alexander G.; Protassov, Stanislav S.; Beloussov, Serguei M., Methods and systems for safe execution of guest code in virtual machine context.
  187. Dobrovolskiy, Nikolay N.; Omelyanchuk, Andrey A.; Tormasov, Alexander G.; Protassov, Stanislav S.; Beloussov, Serguei M., Methods and systems for safe execution of guest code in virtual machine context.
  188. Bennett, Steven M.; Neiger, Gilbert; Cota-Robles, Erik C.; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Uhlig, Richard A., Methods and systems to manage machine state in virtual machine operations.
  189. Laadan, Oren; Nieh, Jason; Phung, Dan, Methods, media and systems for managing a distributed application running in a plurality of digital processing devices.
  190. Stavrou, Angelos; Keromytis, Angelos D.; Nieh, Jason; Misra, Vishal; Rubenstein, Daniel, Methods, media and systems for responding to a denial of service attack.
  191. Traut, Eric P., Migrating a virtual machine to a target machine.
  192. van Rietschote, Hans F.; Hobbs, Craig W.; Saptarshi, Mahesh P., Migrating virtual machines among computer systems to balance load caused by virtual machines.
  193. van Rietschote,Hans F.; Hobbs,Craig W.; Saptarshi,Mahesh P., Migrating virtual machines among computer systems to balance load caused by virtual machines.
  194. Reumann, John; Saha, Debanjan; Sahu, Sambit; Verma, Dinesh Chandra, Moveable access control list (ACL) mechanisms for hypervisors and virtual machines and virtual port firewalls.
  195. Reumann, John; Saha, Debanjan; Sahu, Sambit; Verma, Dinesh Chandra, Moveable access control list (ACL) mechanisms for hypervisors and virtual machines and virtual port firewalls.
  196. Pudiyapura, Ajeer Salil, Multicast route cache system.
  197. Hitz, David; Edwards, John K.; Lewis, Blake H., Multiple concurrent active file systems.
  198. Hitz, David; Edwards, John; Lewis, Blake, Multiple concurrent active file systems.
  199. Moore, William H.; Bonwick, Jeffrey S., Multiple replication levels with pooled devices.
  200. Chandra, Arunesh; Dolan, IV, Terrance James; Henrickson, David; Negreanu, Calin Voicu; Robles, III, Joseph Albert; Day, Michael James, Offline migration from prior operating system installation.
  201. Archer, Charles J.; Lynam, Benjamin E., Parallel application checkpoint image compression.
  202. Chin, Bill Ying; Ratner, Ilya; Desai, Tushar; Madineni, Surendranadh; Mahoney, William R., Persisting data across warm boots.
  203. Sebes, E. John; Bhargava, Rishi; Naik, Dilip, Piracy prevention using unique module translation.
  204. Brickell,Ernie F., Platform and method for establishing trust without revealing identity.
  205. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard, Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor.
  206. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  207. van Rietschote,Hans F.; Saptarshi,Mahesh P.; Hobbs,Craig W., Provisioning and snapshotting using copy on read/write and transient virtual machine technology.
  208. Li, Hui; Beveridge, Daniel James; Chen, Oswald, Provisioning customized virtual machines without rebooting.
  209. Hunt, Peter D.; Salazar, Pablo; Ali, Valiuddin, Rapid access to data on a powered down personal computer.
  210. Hunt, Peter D.; Salazar, Pablo; Ali, Valiuddin, Rapid access to data on a powered down personal computer.
  211. Beveridge, Daniel James; Snowdon, David, Rapid suspend/resume for virtual machines via resource sharing.
  212. Beveridge, Daniel James; Snowdon, David, Rapid suspend/resume for virtual machines via resource sharing.
  213. Beveridge, Daniel James; Thirumal, Thiruvengada Govindan; Madnani, Kiran; Goyal, Neeraj, Rapid virtual machine suspend and resume.
  214. Friedman, Nathaniel; Bowen, Peter, Rebuilding a first and second image based on software components having earlier versions for one or more appliances and performing a first and second integration test for each respective image in a runtime environment.
  215. Fitzgerald, Joseph; Barenboim, Oleg, Registering and accessing virtual systems for use in a managed system.
  216. Fitzgerald, Joseph; Barenboim, Oleg, Registering and accessing virtual systems for use in a managed system.
  217. Fitzgerald, Joseph; Barenboim, Oleg, Registering and accessing virtual systems for use in a managed system.
  218. Seliger, Rob; Hartz, George; Fontana, Eric; Fusari, David, Remote network access via virtual machine.
  219. Shah, Aalop; Borate, Milind; Varadarajan, Ganesh, Repair of inconsistencies between data and metadata stored on a temporal volume using transaction log replay.
  220. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  221. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  222. Xu, Min; Grinberg, Dmitry; Malyugin, Vyacheslav; Vandrovec, Petr; Venkitachalam, Ganesh; Weissman, Boris; Biggadike, Andrew; Chow, James, Replay time only functionalities in a virtual machine.
  223. Bucher,Tim, Restoration of data corrupted by viruses using pre-infected copy of data.
  224. Hyser, Chris D.; McKee, Bret A., Retrieving data of a virtual machine based on demand to migrate the virtual machine between physical machines.
  225. Chin, Bill Ying; Retter, Dan N.; Mahajan, Mayur; Ponnavaikko, Poongovan, Role based multicast messaging infrastructure.
  226. Chin, Bill Ying; Retter, Dan N.; Mahajan, Mayur; Ponnavaikko, Poongovan, Role based multicast messaging infrastructure.
  227. Lowell, David E., Runtime virtualization and devirtualization of I/O devices by a virtual machine monitor.
  228. Grechishkin, Alexander V.; Koryakin, Alexey B.; Dobrovolskiy, Nikolay N.; Omelyanchuk, Andrey A.; Tormasov, Alexander G.; Beloussov, Serguei M., Seamless integration and installation of non-native application into native operating system.
  229. Grechishkin, Alexander A.; Kuzkin, Maxim A.; Koryakin, Alexey B.; Malykhin, Sergei; Omelyanchuk, Andrey A.; Tormasov, Alexander G., Seamless integration of non-native widgets and windows with dynamically scalable resolution into native operating system.
  230. Grechishkin, Alexander V.; Dobrovolskiy, Nikolay N.; Koryakin, Alexey B.; Malykhin, Sergei; Omelyanchuk, Andrey A.; Tormasov, Alexander G.; Beloussov, Serguei M., Seamless integration of non-native windows with dynamically scalable resolution into host operating system.
  231. Grechishkin, Alexander V.; Kuzkin, Maxim A.; Koryakin, Alexey B.; Omelyanchuk, Andrey A.; Tormasov, Alexander G.; Malykhin, Sergei, Seamless integration of non-native windows with dynamically scalable resolution into host operating system.
  232. Grechishkin, Alexander V.; Koryakin, Alexey B.; Dobrovolskiy, Nikolay N.; Omelyanchuk, Andrey A.; Tormasov, Alexander G.; Beloussov, Serguei M., Seamless migration of non-native application into a virtual machine.
  233. Alpern, Bowen L.; Auerbach, Joshua S.; Bala, Vasanth; Frauenhofer, Thomas V.; George, Jobi; Mummert, Todd W.; Pigott, Michael A., Simplifying the deployment and serviceability of commercial software environments.
  234. Sebes, E. John; Vaishnav, Jay, Software modification by group to minimize breakage.
  235. Sebes, E. John, Solidifying the executable software set of a computer.
  236. Li, Hui; Tarasuk-Levin, Gabriel; Gummaraju, Jayanth; Beveridge, Daniel James, State customization of forked virtual machines.
  237. Fuente, Carlos F.; Mulcahy, James; Scales, William J., Storage checkpointing in a mirrored virtual machine system.
  238. Fuente, Carlos F.; Mulcahy, James; Scales, William J., Storage checkpointing in a mirrored virtual machine system.
  239. Ahrens, Matthew A.; Maybee, Mark J., Storage pool scrubbing with concurrent snapshots.
  240. Umbehocker,Steven Michael; Unueco,Allen; Kemkar,Ankur; Chaudhary,Shaloo K., Storage services and systems.
  241. Ninose, Kenta; Eguchi, Yoshiaki, Storage system and recovery method thereof.
  242. Beveridge, Daniel James, Storing checkpoint file in high performance storage device for rapid virtual machine suspend and resume.
  243. Beveridge, Daniel James, Storing checkpoint file in high performance storage device for rapid virtual machine suspend and resume.
  244. Dholakia, Mehul; Yeung, Wing-Keung Adam; Pudiyapura, Ajeer S., Synchronization of multicast information using incremental updates.
  245. Dholakia, Mehul; Yeung, Wing-Keung Adam; Pudiyapura, Ajeer S., Synchronizing multicast information for linecards.
  246. Chow, Jim; Garfinkel, Tal; Chen, Peter M., Synchronous decoupled program analysis in virtual environments.
  247. Barringer, Matthew William, System and method for building virtual appliances using a repository metadata server and a dependency resolution service.
  248. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  249. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  250. Neiger, Gilbert; Bennett, Steven M.; Cota-Robles, Erik; Schoenberg, Sebastian; Hall, Clifford D.; Rodgers, Dion; Smith, Lawrence O.; Anderson, Andrew V.; Uhlig, Richard A.; Kozuch, Michael; Glew, Andy, System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time.
  251. Bhattacharjee, Rajbir; Munjal, Nitin; Singh, Balbir; Singh, Pankaj, System and method for critical address space protection in a hypervisor environment.
  252. Suzuki, Aaron T.; Johnson, Nathan Stanley; Gillette, Jonathan; Jeppesen, David Noyes, System and method for deploying a virtual machine.
  253. Parshin, Yury G.; Pintiysky, Vladislav V., System and method for detecting malware targeting the boot process of a computer using boot process emulation.
  254. Friedman, Nathaniel, System and method for efficiently building virtual appliances in a hosted environment.
  255. Friedman, Nathaniel, System and method for efficiently building virtual appliances in a hosted environment.
  256. Pintiysky, Vladislav V.; Belov, Sergey Y., System and method for emulation of files using multiple images of the emulator state.
  257. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  258. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  259. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  260. Goodson, Garth Richard; Susarla, Sai; Srinivasan, Kiran, System and method for fast restart of a guest operating system in a virtual machine environment.
  261. Himmel,Benjamin Andrew; Himmel,Maria Azua; Rodriguez,Herman, System and method for hibernating application state data on removable module.
  262. Havemose, Allan, System and method for hierarchical interception with isolated environments.
  263. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for host-initiated firewall discovery in a network environment.
  264. Friedman, Nathaniel; De Icaza, Miguel, System and method for inspecting a virtual appliance runtime environment.
  265. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  266. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  267. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  268. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  269. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  270. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  271. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  272. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  273. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  274. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  275. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  276. Friedman, Nathaniel; Schumacher, Cornelius; LeSage, Garrett; Bornkessel, Daniel, System and method for managing a virtual appliance lifecycle.
  277. Sawhney, Harvinder Singh; Saraf, Suman; Sharma, Rosen, System and method for managing virtual machine configurations.
  278. Khanna, Saurabh, System and method for managing virtual machine states by restoring previously saved states based on a virtual machine application's request active with the virtual machine.
  279. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  280. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  281. Bhargava, Rishi; Reese, Jr., David P., System and method for passive threat detection using virtual memory inspection.
  282. Agarwal, Sonali; Tarbotton, Lee Codel Lawson, System and method for preventing data loss using virtual machine wrapped applications.
  283. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  284. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  285. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  286. Karve, Alexei A.; Mohindra, Ajay; Rendahl, Randy A., System and method for restartable provisioning of software components.
  287. Himmel,Benjamin Andrew; Himmel,Maria Azua; Rodriguez,Herman, System and method for securing a portable processing module.
  288. Yang, Ping; Gopalan, Kartik, System and method for security and privacy aware virtual machine checkpointing.
  289. Yang, Ping; Gopalan, Kartik, System and method for security and privacy aware virtual machine checkpointing.
  290. Bhargava, Rishi; Reese, Jr., David P., System and method for selectively grouping and managing program files.
  291. Omelyanchuk, Andrey A.; Tormasov, Alexander G.; Dobrovolsiy, Nikolay N.; Koryakin, Alexey B.; Protassov, Stanislav S.; Beloussov, Serguei M., System and method for starting a cloud-based virtualization system with hypervisor and virtual machine monitor.
  292. Omelyanchuk, Andrey A.; Tormasov, Alexander G.; Dobrovolsiy, Nikolay N.; Koryakin, Alexey B.; Protassov, Stanislav S.; Beloussov, Serguei M., System and method for starting a cloud-based virtualization system with partially deprivileged host OS.
  293. Omelyanchuk, Andrey A.; Dobrovolskiy, Nikolay N.; Koryakin, Alexey B.; Tormasov, Alexander G.; Protassov, Stanislav S.; Beloussov, Serguei M., System and method for starting virtual machine monitor in common with already installed operating system.
  294. Ghose, Kanad, System and method for validating program execution at run-time.
  295. Liu, Peter Chi-Hsiung; Acharya, Soubir, System and method for virtualizing backup images.
  296. Liu, Peter Chi-Hsiung; Acharya, Soubir, System and method for virtualizing backup images.
  297. Hunt, Peter D.; Wang, Lan; Salazar, Pablo J.; Baerenstecher, Mark E.; Ali, Vali, System and method of switching between multiple viewing modes in multi-head computer system.
  298. Jansen, Peter Gerardius; Janssen, Bob; Van Hoeijen, Edgar Wouter Johannes, System and method of tracking and communicating computer states.
  299. Kotani, Seigo; Suzuki, Masato, System and methods for remote maintenance in an electronic network with multiple clients.
  300. Kotani, Seigo; Suzuki, Masato, System and methods for remote maintenance in an electronic network with multiple clients.
  301. Knauerhase, Robert C.; Robinson, Scott H., System for device-access policy enforcement.
  302. Rope, Julien; Auphelle, Philippe; Gattegno, Yves, System for virtual disks version control.
  303. Dalcher, Gregory William, System, method and computer program product for detecting unwanted effects utilizing a virtual machine.
  304. Ben-Yehuda, Shmuel; Harper, Richard E.; Pelleg, Dan; Spainhower, Lisa F., System, method and computer program product for evaluating a virtual machine.
  305. Nedbal, Manuel; Mayr, Johannes; Amidon, Keith Eric, System, method, and computer program product for analyzing a protocol utilizing a state machine based on a token determined utilizing another state machine.
  306. Gupta, Diwaker; Cherkasova, Ludmila; Gardner, Robert D., Systems and methods for controlling resource usage by a driver domain on behalf of a virtual machine.
  307. Smirnov, George; Hu, Kenneth; Kaeli, David, Systems and methods for determining placement of virtual machines.
  308. Cherkasova, Ludmila; Gupta, Diwaker; Gardner, Robert D., Systems and methods for flexibly controlling resource usage by a driver domain on behalf of a virtual machine.
  309. Vega, Rene Antonio; Traut, Eric P.; Neil, Mike, Systems and methods for initializing multiple virtual processors within a single virtual machine.
  310. Brown, Ryan; White, Nathan N., Systems and methods for run time migration.
  311. Brown, Ryan; White, Nathan N., Systems and methods for run time migration.
  312. Timashev, Ratmir; Gostev, Anton, Systems, methods, and computer program products for instant recovery of image level backups.
  313. Timashev, Ratmir; Gostev, Anton, Systems, methods, and computer program products for instant recovery of image level backups.
  314. Timashev, Ratmir; Gostev, Anton, Systems, methods, and computer program products for instant recovery of image level backups.
  315. Mahalingam, Mallik; Arunachalam, Ramu; Lambeth, Walter Andrew, TCP/IP offload engine virtualization system and methods.
  316. Cohen,Ernest S.; Hendel,Matthew D., Tagged translation lookaside buffers in a hypervisor computing environment.
  317. Baylis,Charles G, Technique for reaching consistent state in a multi-threaded data processing system.
  318. Nagappan, Senthil Kumar; Karampurwala, Hasnain; Sudarshan, Reshma; Dholakia, Mehul; Yeung, Wing-Keung Adam, Techniques for synchronizing application object instances.
  319. Eilam, Tamar; Hummer, Waldemar; Oliveira, Fabio A.; Rosenberg, Florian, Testing functional correctness and idempotence of software automation scripts.
  320. Eilam, Tamar; Hummer, Waldemar; Oliveira, Fabio A.; Rosenberg, Florian, Testing functional correctness and idempotence of software automation scripts.
  321. Eilam, Tamar; Hummer, Waldemar; Oliveira, Fabio A.; Rosenberg, Florian, Testing functional correctness and idempotence of software automation scripts.
  322. Eilam, Tamar; Hummer, Waldemar; Oliveira, Fabio A.; Rosenberg, Florian, Testing functional correctness and idempotence of software automation scripts.
  323. Dostert, Jan; Fleischer, Christian; Kilian, Frank; Petev, Petio; Werner, Randolf, Thread monitoring using shared memory.
  324. Cota Robles,Erik; Schoenberg,Sebastian; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor.
  325. Arndt, Richard L.; Cain, III, Harold W.; Frey, Bradly G.; May, Cathy, Transactional memory preemption mechanism.
  326. Arndt, Richard L.; Cain, III, Harold W.; Frey, Bradly G.; May, Cathy, Transactional memory preemption mechanism.
  327. Cain, III, Harold W.; Frey, Bradly G.; Herrenschmidt, Benjamin; Le, Hung Q.; May, Cathy; Michael, Maged M.; Moreira, Jose E.; Nagpurkar, Priya A.; Nayar, Naresh; Swanberg, Randal C., Transactional memory system supporting unbroken suspended execution.
  328. Venkitachalam, Ganesh; Nelson, Michael; Scales, Daniel J., Transitioning of virtual machine from replay mode to live mode.
  329. Waldspurger, Carl A.; Nelson, Michael; Govil, Kinshuk, Transparent memory address remapping.
  330. Ahrens, Matthew A.; Maybee, Mark J.; Bonwick, Jeffrey S., Unlimited file system snapshots and clones.
  331. Chandhok, Nikhil Vijay; Michael, Michael L.; Fries, Robert M., Using a data protection server to backup and restore data on virtual servers.
  332. Chandhok, Nikhil Vijay; Michael, Michael L.; Fries, Robert M., Using a data protection server to backup and restore data on virtual servers.
  333. Ogata, Scott; Starling, Jennifer; Auchmoody, Scott, View generator for managing data storage.
  334. Lam, Monica Sin-Ling; Sapuntzakis, Constantine Paul; Chandra, Ramesh U. V.; Zeldovich, Nickolai Borisovich; Rosenblum, Mendel; Chow, James Eugene; Brumley, David James, Virtual appliance management.
  335. Cheng, Yu Qing; Favor, John Gregory; Glaskowsky, Peter N.; Moll, Laurent R.; Puchol, Carlos; Rowlands, Joseph; Song, Seungyoon Peter, Virtual core management.
  336. Stewart, Michael James; Sun, Hubert Ken, Virtual database rewind.
  337. Stewart, Michael James; Sun, Hubert Ken, Virtual database rewind.
  338. Tsirkin, Michael S., Virtual device interrupt hinting in a virtualization system.
  339. Knauerhase, Robert C.; Tewari, Vijay, Virtual machine management using processor state information.
  340. Knauerhase,Robert C.; Tewari,Vijay, Virtual machine management using processor state information.
  341. Dostert, Jan; Kilian, Frank, Virtual machine monitoring.
  342. Macchiano,Angelo; Musselwhite,Dennis; Tarcza,Richard; White,W. Romney, Virtual machine operating system LAN.
  343. Nakai, Hidehiko, Virtual machine system, restarting method of virtual machine and system.
  344. van Rietschote, Hans F., Virtual machine transfer between computer systems.
  345. Kharat, Satish Narayan; Mishra, Rajeev; Russell, Lance Warren; Sabarathinam, Suresh, Virtualize, checkpoint, and restart POSIX IPC objects during checkpointing and restarting of a software partition.
  346. Kharat, Satish Narayan; Mishra, Rajeev; Russell, Lance Warren; Sabarathinam, Suresh, Virtualize, checkpoint, and restart system V IPC objects during checkpointing and restarting of a software partition.
  347. Yueh, Jedidiah, Virtualized backup solution.
  348. Voccio, Paul; Messerli, Antony Joel; Mick, Jason L.; Walsh, Alexander, Wake-on-LAN and instantiate-on-LAN in a cloud computing system.
  349. Voccio, Paul; Messerli, Antony Joel; Mick, Jason L.; Walsh, Alexander, Wake-on-LAN and instantiate-on-LAN in a cloud computing system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로