throbber
Application No: 16/687 ,966
`Amendment Dated: July 2, 2020
`
`Docket No: 59612/00099
`
`IN THE UNITED STATES PATENT & TRADEMARKOFFICE
`
`Appin. No:
`
`16/687,966
`
`Applicant:
`
`CirbaIP Inc.
`
`Filed:
`
`Title:
`
`November19, 2019
`
`Method and System for Determining Compatibility of Computer Systems
`
`Art Unit:
`
`NOT YET ASSIGNED
`
`Examiner:
`
`NOT YET ASSIGNED
`
`Docket No:
`
`59612/00099
`
`Mail Stop Amendment
`U.S. Patent & Trademark Office
`Commissioner for Patents
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`Sir:
`
`PRELIMINARY AMENDMENT
`
`Prior to consideration by an Examiner, Applicant wishes to amend the above-identified
`
`application as follows:
`
`Amendmentsto the Claims: are reflected in thelisting of claims that begins on page2 of this
`
`paper.
`
`Amendmentsto the Drawings: begin on page 10 of this paper and includes eighteen (18)
`
`attached replacementsheets.
`
`Remarks: begin on page 11 of this paper.
`
`CPST Doc: 274385.1
`
`VMware, Inc.
`
`Exhibit 1003
`
`Page 1
`
`VMware, Inc. Exhibit 1003 Page 1
`
`

`

`Application No: 16/687 ,966
`Amendment Dated: July 2, 2020
`
`Docket No: 59612/00099
`
`Amendments to the Claims
`
`This listing of claims will replace all prior versions and listings of claims in the application:
`
`Listing of claims:
`
`1. (Cancel)
`
`2. (New) A system for determining placement of a source system on a target system, the
`
`system configured to execute operations causing the system to:
`
`collect data for a collection of systems, the collection of systems comprising a plurality of
`
`source systems anda plurality of target systems;
`
`evaluate compatibility between any one ofthe plurality of source systems and any one of
`
`the plurality of target systems by evaluating one or more rules that operate againstattributes or
`
`data relating to the source and target systems being evaluated;
`
`evaluate compatibility between any two or moreof the plurality of source systems by
`
`evaluating one or more rules that operate against attributes or data relating to the two or more
`
`source systems;
`
`evaluate compatibility between any one ofthe plurality of source systems and any one of
`
`the plurality of target systems by evaluating the impact on resource utilization of the target
`
`system of placing that source system on that target system, in combination with any other
`
`source systems, either already placed on that target system, or being evaluated for placement
`
`onto that target system;
`
`determine a placementof at least one source system of the collection of systems on at
`
`least one target system of the collection of systems by employing the evaluating operations on
`
`any one or moreof the systems of the collection of systems; and
`
`issue instructions to place the at least one source system on the at least one target
`
`system in accordance with the determining.
`
`3. (New) The system of claim 2, wherein the source system being placed onthe target system is
`
`a new system that is not yet running on a target system in the collection of systems.
`
`CPST Doc: 274385.1
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 2
`
`VMware, Inc. Exhibit 1003 Page 2
`
`

`

`Application No: 16/687 ,966
`Amendment Dated: July 2, 2020
`
`Docket No: 59612/00099
`
`4. (New) The system of claim 3, wherein the new system is forward consolidated onto an
`
`existing target system in the collection of systems.
`
`5. (New) The system of claim 3, wherein the rules relating to the source and target systems or
`
`the rules relating to the two source systems are user-defined.
`
`6. (New) The system of claim 5, further configured to factor in user-enteredattributes of any of
`
`the systems in the collection of systems.
`
`7. (New) The system of claim 3, wherein the rule-based compatibility analysis evaluates
`
`technical considerations.
`
`8. (New) The system of claim 7, wherein the technical considerations comprise an evaluation of
`
`operating system, OS version, patches, application settings, or hardware devices.
`
`9. (New) The system of claim 3 wherein the rule-based compatibility analysis evaluates
`
`business considerations.
`
`10. (New) The system of claim 9, wherein the business considerations comprise an evaluation
`
`of physical location, organization department, data segregation requirements, owner, service
`
`level agreements, maintenance windows, hardware lease agreements, or software licensing
`
`agreements.
`
`11. (New) The system of claim 3, wherein the rule-based compatibility analysis evaluates both
`
`technical and business considerations.
`
`12. (New) The system of claim 2, wherein the rules relating to the source and target systems or
`
`the rules relating to the two source systems are user-defined.
`
`13. (New) The system of claim 12, further configured to factor in user-entered attributes of any
`
`of the systems in the collection of systems.
`
`CPST Doc: 274385.1
`
`VMware, Inc.
`
`Exhibit1003
`
`Page3
`
`VMware, Inc. Exhibit 1003 Page 3
`
`

`

`Application No: 16/687 ,966
`Amendment Dated: July 2, 2020
`
`Docket No: 59612/00099
`
`14. (New) The system of claim 12, wherein the rule-based compatibility analysis evaluates
`
`technical considerations.
`
`15. (New) The system of claim 14, wherein the technical considerations comprise an evaluation
`
`of operating system, OS version, patches, application settings, or hardware devices.
`
`16. (New) The system of claim 12 wherein the rule-based compatibility analysis evaluates
`
`business considerations.
`
`17. (New) The system of claim 16, wherein the business considerations comprise an evaluation
`
`of physical location, organization department, data segregation requirements, owner, service
`
`level agreements, maintenance windows, hardware lease agreements, or software licensing
`
`agreements.
`
`18. (New) The system of claim 12, wherein the rule-based compatibility analysis evaluates both
`
`technical and business considerations.
`
`19. (New) The system of claim 18, wherein the source system being placed on the target
`
`system is a new system that is not yet running on a target system in the collection of systems
`
`20. (New) The system of claim 2, wherein the rule-based compatibility analysis evaluates
`
`technical considerations.
`
`21. (New) The system of claim 20, wherein the technical considerations comprise an evaluation
`
`of operating system, OS version, patches, application settings, or hardware devices.
`
`22. (New) The system of claim 2, wherein the rule-based compatibility analysis evaluates
`
`business considerations.
`
`23. (New) The system ofclaim 22, wherein the business considerations comprise an evaluation
`
`CPSTDoc: 274385.1
`
`4
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 4
`
`VMware, Inc. Exhibit 1003 Page 4
`
`

`

`Application No: 16/687 ,966
`Amendment Dated: July 2, 2020
`
`Docket No: 59612/00099
`
`of physical location, organization department, data segregation requirements, owner, service
`
`level agreements, maintenance windows, hardware lease agreements, or software licensing
`
`agreements.
`
`24. (New) The system of claim 2, wherein the rule-based compatibility analysis evaluates both
`
`technical and business considerations.
`
`25. (New) The system of claim 2, wherein resourceutilization data used in evaluating the impact
`
`on the resourceutilization of the target system of placing that source on that target comprises
`
`CPU utilization, memory usage, disk space used, disk I/O throughput or network I/O throughput.
`
`26. (New) The system of claim 25, wherein benchmarks are used to normalize CPU utilization
`
`data between source and target systems in order to accountfor differing CPU performancefor
`
`different systems.
`
`27. (New) The system of claim 2, wherein the system is located remotely from the collection of
`
`systems.
`
`28. (New) The system of claim 2, wherein the placement takes into account a pre-existing
`
`source-target transfer set, and any placements are incremental to the transfer set.
`
`29. (New) The system of claim 2, wherein the target system onto which the source system is
`
`placed is a new system.
`
`30. (New) A computer implemented method for placing a source system on a target system, the
`
`method comprising:
`
`collecting data for a collection of systems, the collection of systems comprising a
`
`plurality of source systems anda plurality of target systems;
`
`evaluating compatibility between any oneof the plurality of source systems and any one
`
`of the plurality of target systems by evaluating one or morerules that operate against attributes
`
`or data relating to the source and target systems being evaluated:
`
`CPSTDoc: 274385.1
`
`5
`
`VMware, Inc.
`
`Exhibit1003
`
`Page5
`
`VMware, Inc. Exhibit 1003 Page 5
`
`

`

`Application No: 16/687 ,966
`Amendment Dated: July 2, 2020
`
`Docket No: 59612/00099
`
`evaluating compatibility between any two or more of the plurality of source systems by
`
`evaluating one or more rules that operate against attributes or data relating to the two or more
`
`source systems;
`
`evaluating compatibility between any oneof the plurality of source systems and any one
`
`of the plurality of target systems by evaluating the impact on resource utilization of the target
`
`system of placing that source system on that target system, in combination with any other
`
`source systems, either already placed on that target system, or being evaluated for placement
`
`onto that target system;
`
`determining a placementof at least one source system of the collection of systems on at
`
`least one target system of the collection of systems by employing the evaluating operations on
`
`any one or moreof the systems of the collection of systems; and
`
`issuing instructions to place the at least one source system on the at least one target
`
`system in accordance with the determining.
`
`31. (New) The methodof claim 30, wherein the source system being placed onthe target
`
`system is a new system that is not yet running on a target system in the collection of systems.
`
`32. (New) The methodof claim 31, wherein the new system is forward consolidated onto an
`
`existing target system in the collection of systems.
`
`33. (New) The methodof claim 31, wherein the rules relating to the source and target systems
`
`or the rules relating to the two source systems are user-defined.
`
`34. (New) The methodof claim 33, further comprising factoring in user-entered attributes of any
`
`of the systems in the collection of systems.
`
`35. (New) The methodof claim 31, wherein the rule-based compatibility analysis evaluates
`
`technical considerations.
`
`36. (New) The methodof claim 35, wherein the technical considerations comprise an evaluation
`
`of operating system, OS version, patches, application settings, or hardware devices.
`
`CPSTDoc: 274385.1
`
`6
`
`VMware, Inc.
`
`Exhibit1003
`
`Page6é
`
`VMware, Inc. Exhibit 1003 Page 6
`
`

`

`Application No: 16/687 ,966
`Amendment Dated: July 2, 2020
`
`Docket No: 59612/00099
`
`37. (New) The methodof claim 31 wherein the rule-based compatibility analysis evaluates
`
`business considerations.
`
`38. (New) The methodof claim 37, wherein the business considerations comprise an evaluation
`
`of physical location, organization department, data segregation requirements, owner, service
`
`level agreements, maintenance windows, hardware lease agreements, or software licensing
`
`agreements.
`
`39. (New) The methodof claim 31, wherein the rule-based compatibility analysis evaluates both
`
`technical and business considerations.
`
`40. (New) The methodof claim 30, wherein the rules relating to the source and target systems
`
`or the rules relating to the two source systems are user-defined.
`
`41. (New) The methodof claim 40, further comprising factoring in user-entered attributes of any
`
`of the systems in the collection of systems.
`
`42. (New) The methodof claim 40, wherein the rule-based compatibility analysis evaluates
`
`technical considerations.
`
`43. (New) The method of claim 42, wherein the technical considerations comprise an evaluation
`
`of operating system, OS version, patches, application settings, or hardware devices.
`
`44. (New) The methodof claim 40 wherein the rule-based compatibility analysis evaluates
`
`business considerations.
`
`45. (New) The methodof claim 44, wherein the business considerations comprise an evaluation
`
`of physical location, organization department, data segregation requirements, owner, service
`
`level agreements, maintenance windows, hardware lease agreements, or software licensing
`
`agreements.
`
`CPST Doc: 274385.1
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 7
`
`VMware, Inc. Exhibit 1003 Page 7
`
`

`

`Application No: 16/687 ,966
`Amendment Dated: July 2, 2020
`
`Docket No: 59612/00099
`
`46. (New) The methodof claim 40, wherein the rule-based compatibility analysis evaluates both
`
`technical and business considerations.
`
`47. (New) The methodof claim 46, wherein the source system being placed onthe target
`
`system is a new system that is not yet running on a target system in the collection of systems
`
`48. (New) The methodof claim 30, wherein the rule-based compatibility analysis evaluates
`
`technical considerations.
`
`49. (New) The methodof claim 48, wherein the technical considerations comprise an evaluation
`
`of operating system, OS version, patches, application settings, or hardware devices.
`
`50. (New) The methodof claim 30, wherein the rule-based compatibility analysis evaluates
`
`business considerations.
`
`51. (New) The methodof claim 50, wherein the business considerations comprise an evaluation
`
`of physical location, organization department, data segregation requirements, owner, service
`
`level agreements, maintenance windows, hardware lease agreements, or software licensing
`
`agreements.
`
`52. (New) The methodof claim 30, wherein the rule-based compatibility analysis evaluates both
`
`technical and business considerations.
`
`53. (New) The methodof claim 30, wherein resource utilization data used in evaluating the
`
`impact on the resourceutilization of the target system of placing that source on that target
`
`comprises CPU utilization, memory usage, disk space used, disk I/O throughput or network I/O
`
`throughput.
`
`54. (New) The method of claim 53, wherein benchmarks are used to normalize CPU utilization
`
`data between source and target systems in order to accountfor differing CPU performancefor
`
`different systems.
`
`CPST Doc: 274385.1
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 8
`
`VMware, Inc. Exhibit 1003 Page 8
`
`

`

`Application No: 16/687 ,966
`Amendment Dated: July 2, 2020
`
`Docket No: 59612/00099
`
`55. (New) The methodof claim 30, wherein the method is implemented remotely from the
`
`collection of systems.
`
`56. (New) The methodof claim 30, wherein the placement takes into account a pre-existing
`
`source-target transfer set, and any placements are incremental to the transfer set.
`
`57. (New) The methodof claim 30, wherein the target system onto which the source system is
`
`placed is a new system.
`
`58. (New) A non-transitory computer readable medium comprising computer-executable
`
`instructions for placing a source system on a target system, comprising instructions for:
`
`collecting data for a collection of systems, the collection of systems comprising a
`
`plurality of source systems anda plurality of target systems;
`
`evaluating compatibility between any oneof the plurality of source systems and any one
`
`of the plurality of target systems by evaluating one or morerules that operate against attributes
`
`or data relating to the source and target systems being evaluated:
`
`evaluating compatibility between any two or more of the plurality of source systems by
`
`evaluating one or more rules that operate against attributes or data relating to the two or more
`
`source systems;
`
`evaluating compatibility between any oneof the plurality of source systems and any one
`
`of the plurality of target systems by evaluating the impact on resource utilization of the target
`
`system of placing that source system on that target system, in combination with any other
`
`source systems, either already placed on that target system, or being evaluated for placement
`
`onto that target system;
`
`determining a placementof at least one source system of the collection of systems on at
`
`least one target system of the collection of systems by employing the evaluating operations on
`
`any one or moreof the systems of the collection of systems; and
`
`issuing instructions to place the at least one source system on the at least one target
`
`system in accordance with the determining.
`
`CPST Doc: 274385.1
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 9
`
`VMware, Inc. Exhibit 1003 Page 9
`
`

`

`Application No: 16/687 ,966
`Amendment Dated: July 2, 2020
`
`Amendments to the Drawings
`
`Docket No: 59612/00099
`
`Please replace the drawing sheets containing FIGS. 1, 2, 9-12, 14, 15, 17, 18, 20, 21,
`
`23-25, 29, and 30 with the eighteen (18) replacement drawing sheets submitted herewith.
`
`CPSTDoc: 274385.1
`
`10
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 10
`
`VMware, Inc. Exhibit 1003 Page 10
`
`

`

`Application No: 16/687 ,966
`Amendment Dated: July 2, 2020
`
`Docket No: 59612/00099
`
`REMARKS
`
`Applicant thanks the Examiner for reviewing the present application.
`
`Claim 1 has been cancelled and new claims 2-58 have been addedto clarify the
`
`protection being sought. Support for these amendments can be found throughout the
`
`application asfiled.
`
`Replacement drawingsfor FIGS. 1, 2, 9-12, 14, 15, 17, 18, 20, 21, 23-25, 29, and 30 are
`
`hereby submitted, which are of improved quality.
`
`Applicant requests early consideration and allowance of the present application.
`
`Respectfully submitted,
`
`/Brett J. Slaney/
`
`Brett J. Slaney
`Agentfor Applicant
`Registration No. 58,772
`
`Date: July 2, 2020
`
`CPST INTELLECTUAL PROPERTY
`Brookfield Place
`181 Bay Street, Suite 2425
`Toronto, Ontario, M5J 2T3
`Canada
`
`Tel: 647-478-2428
`BSL/
`
`CPSTDoc: 274385.1
`
`11
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 11
`
`VMware, Inc. Exhibit 1003 Page 11
`
`

`

`GATHERED SYSTEM
`DATA
`Technical Business and
`workioad related data
`
` ANALYSIS PROGRAM
`Systems compatibility and
`consolidation analysis
`
`~ 18
`
`10
`
`
`
`
`
`
`
`
`
`ANALYSIS RESULTS
`Systems compatibility
`assessment and
`consolidation roadmap
`
`
`
`
`20]
`
`
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 12
`
`VMware, Inc. Exhibit 1003 Page 12
`
`

`

`
`
`Technical
`| Workload
`
`
`Business
`
`
`configuration
`
`
`
`data
`related data
`data
`
` Configuration || Business
`
`compatibility
`
`—_—___— ‘
`|
`Analysis =)
`
`Input
`
`4
`
`{-to-1
`Compatibility
`analysis
`
`|
`|
`
`Muiti-dimensional
`(transfer set)
`compatibility analysis
`
`Overall
`|
`| Workload
`|} compatibility ||
`compatibility || compatibility
`|
`I
`|
`
`|
`
`)
`if
`|
`| Consolidation |
`|
`analysis
`
`ANALYSIS RESULTS
`
`90777
`
`OS
`
`1-to-1
`Compatibility
`scoresand
`details
`
`/j/ Transfersets
`/
`compatibility
`scores and
`details
`
`/
`/ |
`|
`
`|
`
`[|
`| Consolidation
`roadmap
`
`|
`
`/
`
`i
`|
`
`
`
`
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 13
`
`VMware, Inc. Exhibit 1003 Page 13
`
`

`

`62
`
`
`
`Metadata
`
`Z
`
`“) Extraction
`
`Data
`Repository
`/
`{and Caches _/
`
`
` SYSTEM DATA
`
`PREPARATION
`
`System Data 7
`
` | Data Load and /
`
`
`
`
`
` COMPATABILITY AND
`
`
`
`
`Common
`1-to-1
`
`
`
`Analysis
`y
`ry
`Compatibility
`
`
`Inout /|L Analysis| aa Analysis Results __/
`
`
`
`—_
`/
`;
`;
`if
`|,
`/ Multi-dimensional
`
`— ane | / Compatibility
`Consolidation
`
`
`cOompauonity
`|
`| /
`Solution,
`Analysis Results
`
`
`/
`Analysis
`[=
`"
`
`
`
`Input Analysis
`
`Consolidation
`Auto Fit
`
`
`Solution
`
`
`
`
`CONSOLIDATION
`ANALYSIS
`
`
`
`
`
`84
`
`
`
`
`
`rigure 9
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 14
`
`VMware, Inc. Exhibit 1003 Page 14
`
`

`

`ystem Data
`
`for import
`
`Configuration and
`workload data added
`via WMI, SNMP, etc.
`
`[ /
`//
`|
`
`/
`
`Configuration and
`workload datafiles
`
`User
`input of
`system
`attributes /
`
`Metadata
`
`
`
`
`
`7
`
`
`
`
`
`Technical
`and Business
`
`rule sets
`Data Load and Extraction
`
`|
`/
`Workioad
`/
`
`/ Process
`[|
`ff Rule ro ane
`type
`f
`j
`Bata
`
`
`
`specifications ff==Workload| yy) fj Processing jj system
`
`and
`[if
`data
`loading
`//
`extraction
`attributes /
`
`Workload
`/ ee...
`
`benchmark
`[|
`
`specifications
`/
`
`repository //
`
`
`
`Data alias
`specifications
`
`Data Repository and Caches
`
`Audit data
`
`Rule
`item and
`workload
`data
`caches
`
`//
`//
`[|
`//|
`
`System
`attribute
`table
`
`Figure 10
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 15
`
`VMware, Inc. Exhibit 1003 Page 15
`
`

`

` Compatibility
`
`/
`
`|
`
`/
`
`i
`
`/
`
`|
`
`/
`
`attributes
`
`|
`
`\
`
`/
`/ AuditData
`Repository /
`/
`
`Data Repository and Caches, /
`;
`{
`Rule item
`and
`workload
` datacaches /
`
`|
`Analysis Input
`
`
`Systems to
`analyze &
`source/target
`
`
`designation /
`
`eena |
`
`
`Selected
`
` Compatibility Analysis Rule sets / | | Get
`
`
`
`"and weights
`/ b+!
`system |
`|
`Rule-
`|
`|
`|
`fo]
`|
`data for
`|
`|) Rue | Workload | Overall
`analysis
`
`
`Selected
`workloads,
`
`limits, data
`spec, etc.
`
`importance
`factors
`
`55
`
`{-to-1 Compatibility Analysis
`
`|
`
`1-to-1 Compatibility Analysis Results
`
`
`
`Analysis
`Data
`Snapshot
`
`// Compatibility
`jf
` Scoresand
`//
`Maps
`
`// Compatibility
`jf
`Analysis
`if
`details
`
`88
`
`
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 16
`
`VMware, Inc. Exhibit 1003 Page 16
`
`

`

`SASSERESSERNSNNNssc
` ‘ ee
`;
`
`
`i Deka
`‘hs
`
`ji}33Zg4
`
`i Salary NameSenosee Defatted aesofSatesNama SokeS eanage
` LakhLohtdthed
`
`SSSA
`SOHN
`
`nseee
`Satan AVRAN Sallings
`} Detaled Aakash of Saas ECPRASatings
`—
`Metisa
`
`Rulated anglers ates for Oodouad ginckng of SNHK is atie Bas
` SAARENSNSWASNSERNWEEN
`£ OF Hay SYR
`SAARRSE
`UNOFanartConsatidation
`BeiaiedantesruleBeieeecansaWationofONIXageeions
`|
`
`
`
`_
`| WebLogeJREAgsSeating
`4 WeslogicJGEEtogioatonNaokiRueset
`
`Wikies Comnpattly| ASSNeresRaRiy LasananWines eysigrts
`
`
`
`
`
`AcquistionOats ~~TBroupsacvusoesonSRsNGorUs ; . sos
`
`
`"reneeBraverconamtoeningSereneaconagoFars,
`ReaioasSoest Thy
`
`|Avaitabtity Faget { Peaveni CAASNNGSRVETSwathaiedag2AgaeaanRly tenia} tagela _ ig
`
`
`Pravanl Gahiig SENOS WA eifedagbeebacker winesSASSRAAA
`
`
`SSASANOTNS
`
`
`ding
`| Posvant conanideting sens helena bulge
`
`Sushiaes Servioe PQHHH OTS ting BROS SS REHAES Se:
`
`
`i QernbinedConstants
`fankna ASRSTAMUasset
`
`SAN
`ANANSIANA
`
` ARRANARES:
`Seavant SoreTERN: AOHANS SHOWS Hoganyvs
`
`§ Geeertesord
`
`
`~ot SAENEe
`ON
`| Provant sombinksy ganemh with inonsishedd OR strategies
`} OF Sintegy
`
`
`Lows Remnant Dats:
`: SARead Seas Hosaor ages At aia
`
` SARSANSSSSASAASSAARAAanne
`ASASSSISERSASSSANSA
`ss ahahaTAAAAANANATEDANEESPN
`i Prevent consid: aonears aoe Baal nnalions
`XENI
`=:
`
`
`Manlenneisda
`is POUCRIBarraswily Sonfartignsmairganencea
`
`
`“Operationat Enviormient
`i Prevadt conuadidatingserversBahveedSENSORS
`=
`
`
`“Cpeeatonat — P PeQVe’ raeushgSHESTIE naveabn FURRBASS. |
`
`
`
`Seracstin aear=Severs(Hsecane@eeDAES
`
`
`
`
`PRO CNA StatingBROaE Dial heeyahhhBREsen pias
`
`
`PENI Oe
`
`
`Breswenk coming SeRWers se PAAving LPS eeuareantsSARI
`SOASION
`
`
`
`Gracie Miacking Anulyais Bats
`i Salenming date covenage fur a0 stacking sakes
` SOE
`Mattar
`
`
`soenevoernurerioenonneen
`
`Dalannine dale orvamige Joe gag slashing aaglgsd
`paeeneeeaenennnnnenninnenninnnninnnntinnnntinnnninnnneinnAniteshWAARANLAASAASANASAMMAAAAANASANAVIERSSSTNARSO
`et
`seo toy sinlessakasking andvlusizaiies
`;
`
`
`‘ Detcning date ooascteetoy« ee aon ¥ ‘ i
`
`
`
`
`aaah
`‘
`
`
`>
`:
`sessiontannin
`
`
`* Oracle Hate Naching
`Agseug dite consoddialinny gotenio! hahetan Chucks intense
`SeanaeeERANN
`SRSA RSNASRSSSAAAA SATAN ESTEERNEESREREADNI
`i Saeteiestamne Stacking
`s{Assess RHPRykyMEBRERoW SUTRA
`
`
`
`. Ty) Gaauto lanel
`aoeeuliation
`aepotonitice m ME SOL NNO
`te
`x
`&
`) Nop cul
`datirigny conseitiion agporian!

`V8Ra. Sewer2OVA
`| anekoasadts
`
`SRSSSSEACASSESSSCSneecedeeaane Raaeaneacaacne OAanCA
`
`ry
`i
`sags
`fe
`|Consctat
`[ Aas 3comedyof
`&
`ss
`Nenloas Fle and Print
`x
`ponl casos
`£23 COMIN
`
`
`
`2 Murcia: Nodes
`* Step auleenFTES aNd AGRE
`
` AAWEEDVSPRNRENOIONAMIN
`we
`
`}
`OS
`Nes
`horeaaosateCarsonane?Kemetsatchknesks
`‘sie seennrVASASR
` ARANASSAN
`
`
`
`
`: :
`
`
`
`
`
`SORAiltttghtis =Wivgiavs
`
`
`
`~ ttheananneBindnsitnsnenidriadintbetes
`
`
`
`
`
`apehAREAS
`
`ie wind
`
`SERRAAMAASANSAAND
`
`JAYSSAAVAANYASSURAT
`
`
`
`VMware, Inc.
`
`Exhibit 1003
`
`Page 17
`
`VMware, Inc. Exhibit 1003 Page 17
`
`

`

`
`
`Rule and
`
`
`
`
`System
`Audit Data
`
`
`
`
`workload data
`
`
`Repository
`Attributes
`
`
`cache
`
`
`
`range Systems to
`analyze
`
`
`
`Workload
`types, date
`
`Rule and Workload Data
`Extraction
`
`
`
`
`Rule and Workload Analysis
`Rule sets and
`Data Snapshot
`
`
`
`weights
`
`
`Workioad
`
`Rule-based
`Workload
`limits
`
`
`
`Compatibility
`Compatibility
`stacking and
`
`
`scorina
`Analysis
`Analysis
`
`
`
`
`
`
`
`Rule-based
`Workioad
`
`
`
`Compatibility
`Compatibility
`Results
`Results
`
`
` importance
`
`factors
`
`
`Overall
`Compatibility
`
`
`Results
`
`Figure 14
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 18
`
`VMware, Inc. Exhibit 1003 Page 18
`
`

`

`Data item y
`
`
`
`For each source in transfer set
`For each rule set
`:
`\
`For each rule
`
`
`Rule Set 2
`/
`Vv
`Evaluate and compile matched rules
`Rule item C
`|
`Compute compatibility score
`
`Rule item D
`
` Rule Set 3
`Rules
`
`
`Rule Sets
`
`Rule Set1
`Rule item A
`Rule item B
`
`)
`
`Rule item &
`Rule item F
`
`Analysis Rule Data Snapshot
`
`System 1
`DataitemX
`Dataiteemy
`
`/
`
`/
`
`|
`
`/
`
`/
`
`|
`
`System 2
`Data item x
`
`Rule Engine
`
`Rule-based Compatibility Results
`
`Compatibility
`Scores
`
`/
`
`/
`ff
`
`Matched
`
`Figure 15
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 19
`
`VMware, Inc. Exhibit 1003 Page 19
`
`

`

`Differential
`Rule Set
`
`
`Analysis
`Rule Data
`
`
`
`Snapshot
`
`
`
`
`
`No _ More target systems? ———
` y No
`
`
`For each source system in list (S = 1 to N)
`
`| Set score to 100
`a ( no more
`Source == target? !
`analysis
`a |
`required for this
`pair)
`
`Evaluate rule set for source-target pair Compute 1-
`{o-1 compatibility score, remediation costs
`Compile matched rules
`
`___ More source systems?
`
`a ~~ More Rule Sets?_ ——
`
`No
`
`Compile NxN scorecard map for each rule set. Each map
`contains every source-target combination
`
`
`
`
`
`{-to-1 Rule-based Compatibility Analysis Results
`NxN scorecard maps for each rule set . Details on
`score, remediation costs and matchedrules for each
`source —target pair.
`
`
`Figure 17
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 20
`
`VMware, Inc. Exhibit 1003 Page 20
`
`

`

`
`Soumerets ff Target Rule
`
`fo
`
`f DaleSaget / / HateSaapshst / / Rule‘et
`
`/
`
`Pee,
`
`
`Ciinadial
`
`
`
`28
`
`ood
`
`feinnse set
`PSEA
`DNERODNI .
`
`ARAND
`
`‘ iSvorenernerereereonrenneetreteeteNieteN *
`
`aes Ustale Due?
`
`Ageiegrigrmediots fitafmaighed rifts
`
`Sate ndas ih act?
`
`
`SarSetsnalseanondoyenilealSOUSSetfangs
`
`
`
`
`EvaluateratebycomparingSOWAsandtargetGata
`
`
`
`
`
`
`Exsudesopomeusd nibs antries fron Est of matches ates
`
`
`
`Calnulete canpasy seers and remmciation ooaks foy
`Qurhendahuncetargat pal Hesad an nde wetghts, couls ary
`sue sekings
`
`
`
`Fase} Campadiityacon,
`;
`asmudiniion cosisacd applosbie
` ure 18
`alo distails fir soeetianget pals
`/
`androlssat
`/
` _Ssesssessesssiwoavnnnnoonnnninaoonient
`
`f

`;
`
`?
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 21
`
`VMware, Inc. Exhibit 1003 Page 21
`
`

`

`.
`
`Syhent ian
`
`7
`
`f
`f
`
`2
`
`Se
` Wevkinag
`FRHAS ara
`
`“
`f
`:
`
`=
`
`sestoten
`
`—
`
`Fer aseh syatun i
`
`LPLPOLLSPIPLOLEDIIDSPLPIIIAMLOttdDELADLDISLePiettgpidbipttbpDptpASCOEEPAEBAADSSARAARANRRRRRRRRRRRRRRARAARARNRRANTEOEOEES anSYSSe;
`
` Anais Rats
`
`Figure 20
`
`sehpot
`
`Dane
`
`se
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 22
`
`/ «
`
`,
`|
` warkeadDae. {
`ee ce
`eth a
`
`fB
`
`/
`

` AANANANNNANNWNAAAIANNANENEMASRENNINNR
`
`
`APLPLEREPLEDERERELLELESLELESLLESD
`
`VMware, Inc. Exhibit 1003 Page 22
`
`

`

`

`3
`
`z

`i
`f
`;
`Workload
`g4 ~
`an. £
`ye
`Lists /
`

`
`,
`‘
` Workwad Anstisls
`RatsSaagstat
`

`

`
`f
`/
`
`/
`
`f
`aysion
`ysien
`Wkochind
`:
`Sancivnacks SA
`a6
`
`
`Por qgeh workdaad tyme
`
`
`analyse GeorkluadHOSETTA
`
`SEDDONRENANMERRRNA
`
`
`
`sence ie
`
`
`
`Fax cat opadact by en e aed dsls seapahal source = 1 asN} _
`
`
`
`trampaate arnkiinad maegeniily sane
`
`
`%
`
`
`
`sorneoinoinnieoToresNYREersten
`
`wnenes
`
`
`
`
`eo
`WoeldandCampathiy Anayels Reaaits
`iz

`Natt WeekiondSameAasforgachsarkoadfang,
`i
`i
`Woskions coos caine and Mackedwarkisad chads


`Sormacksystpals andhearkinadpa
`f

`
`
`Yes
`
`Re
`
`Figure 217
`
`_ Stone warklogd past Pee
`
`Nie
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 23
`
`VMware, Inc. Exhibit 1003 Page 23
`
`

`

`Overall Compatibility Report
`
`Summary
`
`System Configuration Compatibility
`
`98
`
`CPU Utilization Workload
`
`Workload Stacking Compatibility
`
`Wrorkloads Scorecard
`
`Figure 23
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 24
`
`VMware, Inc. Exhibit 1003 Page 24
`
`

`

`|
`
`/
`
`|
`
`i
`
`|
`
`/
`
`|
`
`/
`
`/
`
`attributes
`
`
`
`
` Multi-dimensional (Transfer Set) Compatibility Analysis
`
` Selected
`Get
`
`workloads,
`i
`| J system |
`|
`Rule-
`limits, data
`/
`|
`|
`datafor
`|
`||
`based
`Workload
`|| Overall
`
`spec, etc.
`|
`|
`analysis
`
`factors
` 1-to-1 Compatibility Analysis Results
`
`
`
`
`
`Data Repository and Caches, /
`;
`{
`Rule item
`and
`workload
` datacaches /
`
`\
`
`/
`/ AuditData
`Repository /
`/
`
`
`
`Compatibility
`Analysis Input
`
`Systems to
`analyze &
`source/target
`/
`designation
`/
`
`L______j
`|
`
` Selected
`
`Rule sets
`and weights
`
`/
`
`/
`
`5
`
`Compatibility Analysis
`
`importance
`
`
`Additional
`Analysis Input
`
`Consolidation
`Solution
`
`Analysis
`Data
`Snapshot
`
`/| Compatibility
`jf
` Scoresand
`//
`Maps
`
`// Compatibility
`jf
`Analysis
`if
`details
`
`Figure 24(a)
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 25
`
`VMware, Inc. Exhibit 1003 Page 25
`
`

`

`f
`fi
`fF Bie
`of
`HaleSets }
`
`ei
`
`;
`

`
`
`
`}
`
`
`
`
`f Asaysurele
`/ Quests f
`
`
`"Sareachndecat SepalsBe tM)
`
`
`
`ponent
`.

`i oooonncceeoeon
`
`
`
`
`
`Sadorm Niget Analyates
`
`
`CARRENGG cay acre,
`“ongOPNWRN eaaAST OS
`
`
`uaatigkoncnsks
`CEs suvchae sea
`
`
`
` CameNeW acoregant mag te sand nls gal: Seed gas
`
`
`
`sonitins averyimeacier sal marion,
`
`;
`
`i
`;
`

`
`CemgathiyAnselResults
`NN aueverand mage Av gach18sel
`ThAger nea, FEMAcents are!
`matched reiseforaaahanstiy Sat
`
`*
`
`™
`
`Renni
`
`/
`
`;
`;
`

`
`*
`
`*
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 26
`
`
`
`
`
` Parfon Nort Anatyety
`eats Bes Sey Aaa, FANS CHR
`
`Caenls mathe aves RRR SOR
`
`VMware, Inc. Exhibit 1003 Page 26
`
`

`

`
`
`
`
`
`Workload Data
`Snapshot
`
`' Workload
`Limits
`
`For each workload type
`
`For each transfer set
`
`
`
`
`System
`Benchmarks
`
`
`
`_ More source systems?>>
`
`Use Benchmarks to normalize workload of source
`relative to target
`
`Stack normalized source workload on target
`
`
`
`
`No tT7
`
`
`
`
`
`Muiti-dimensiona!
`Compute compatibility
`
`
`Workload
`
`score for transfer set and
`
`Compatibility Results
`compile workload details
`
`| - More transfersets? -—_
`
`_ “More Workload types? —=—
`— —
`
`[Done|
`
`Figure 25
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 27
`
`VMware, Inc. Exhibit 1003 Page 27
`
`

`

`Anyang
`
`
`
`
`
`gehioustinaetnceywamay)unomy
`
` pahinnyba,
`EELOWELY
`SDsHea
`
`a.|ahhLWytakKaaWheyeeeA
`
`sa
`
`
`
`WELLESCAROUSECG
`
`Urawierd
`
`seit
`
`wurtgure@wissen8seeabiewg
`
`mensesoe
`
`GARIBIELEbiafmiteyf?pttaisARNO
`specjfwypalates
`
`
`
`
`
`
`
`
`ORDranatetig
`
`VERE,
`
`"ORES
`
`
`
`Risiig"Series
`
`ith"Rh
`
`poumpy
`
`
`
`youssyebyestg
`
`SOBGCEE
`
`LOCH,WEE
`ee
`
`{onWR
`
`VMware, Inc.
`
`Exhibit 1003
`
`Page 28
`
`VMware, Inc. Exhibit 1003 Page 28
`
`
`

`

`SaviadsHakadcalled goweaerget
`sermons
`
`
`
`:
`
`:
`
`
`
`TSARRS RR BRNSATRBAIANS,
` en RAS ANNI
`
`
`
`x
`
`Cunniie detof sevelar sateens
`
`
`
`SPERAPOPIOEL Cosas beat Parles set fam carliiss
`
` QRWN
`
`| AddshogunSatateraalisivory |
`'
`3
`

`
`+ Raeteies souatewn arad cangat refemmnendt by |
`shagan Saaater get fant the wealfahts
`sours snd lager het
`
`SPOLAERLLOLED
`
`Ray FARES
`Sas oflegate?
`
`,
`
`Caagnis iat afcanadian soe
`gareizigios
`
`na
`
`
`
`EISHENG— .
`
`ee
`
`:
` SNOT
`
`hous bast aamelaiign sokakes fram
`ganitiaies
`
`_
`
`Figure 30
`
`#—Gonvaiatoe Soutien fF
`
`
`Jcnancemnnanmnnmennnnnanennnnnnnn
`
`VMware, Inc.
`
`Exhibit1003
`
`Page 29
`
`VMware, Inc. Exhibit 1003 Page 29
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket