1
Bich C Le, Dilip Khandekar, Sirishkumar Raghuram: Computer image capture, customization and deployment. VMware, Jeffrey Pearce, Leonard Heyman, April 8, 2008: US07356679 (586 worldwide citation)

A source image of the hardware and software configuration of a source computer, including the state of at least one source disk, is automatically captured. The source computer may remain unprepared and requires no program for facilitating computer cloning and reconfiguration. The source image is aut ...


2
Dilip Khandekar, Dragutin Petkovic, Pratap Subrahmanyam, Bich Cau Le: Provisioning of computer systems using virtual machines. VMware, Rajeev Madnawat, August 18, 2009: US07577722 (386 worldwide citation)

A provisioning server automatically configures a virtual machine (VM) according to user specifications and then deploys the VM on a physical host. The user may either choose from a list of pre-configured, ready-to-deploy VMs, or he may select which hardware, operating system and application(s) he wo ...


3
Edouard Bugnion, Scott W Devine, Mendel Rosenblum: System and method for virtualizing computer systems. VMWare, Jeffrey Slusher, December 17, 2002: US06496847 (386 worldwide citation)

A virtual machine monitor (VMM) is included in a computer system that has a protected host operating system (HOS). A virtual machine running at least one application via a virtual operating system is connected to the VMM. Both the HOS and the VMM have separate operating contexts and disjoint address ...


4
Scott W Devine, Edouard Bugnion, Mendel Rosenblum: Virtualization system including a virtual machine monitor for a computer with a segmented architecture. VMWare, Jeffrey Slusher, May 28, 2002: US06397242 (367 worldwide citation)

In a computer that has hardware processor, and a memory, the invention provides a virtual machine monitor (VMM) and a virtual machine (VM) that has at least one virtual processor and is operatively connected to the VMM for running a sequence of VM instructions, which are either directly executable o ...


5
Beng Hong Lim, Edouard Bugnion, Scott W Devine: Mechanism for restoring, porting, replicating and checkpointing computer systems using state extraction. VMWare, Jeffrey Pearce, September 21, 2004: US06795966 (338 worldwide citation)

A computer system is interrupted, and its entire state information is extracted as one or more checkpoints at one or more respective points during operation of the system. The checkpoint may be restored into the system at any later time, even multiple times, and it may also even be loaded into one o ...


6
Carl A Waldspurger: Content-based, transparent sharing of memory units. VMWare, Jeffrey Pearce, September 7, 2004: US06789156 (213 worldwide citation)

A computer system has one or more software context that share use of a memory that is divided into units such as pages. In the preferred embodiment of the invention, the context are, or include, virtual machines running on a common hardware platform. The context, as opposed to merely the addresses o ...


7
Pratap Subrahmanyam: System and method for remote file access by computer. VMware, Jeffrey Pearce, May 11, 2004: US06735601 (182 worldwide citation)

Applications, which consist of one or more files containing executable code and/or data, are stored preferably in unmodified form in a provider system. Separately processable portions of the files contain file structure information as well as actual, processable content. A skeleton of each file, con ...


8
Michael Nelson, Scott W Devine, Beng Hong Lim: Computer configuration for resource management in systems including a virtual machine. VMware, Jeffrey Pearce, November 1, 2005: US06961941 (175 worldwide citation)

A computer architecture includes a first operating system (COS), which may be a commodity operating system, and a kernel, which acts as a second operating system. The COS is used to boot the system as a whole. After booting, the kernel is loaded and displaces the COS from the system level, meaning t ...


9
Yufeng Zhang, Xiaoxin Chen, Bich Cau Le, Jagannath Gopal Krishnan, Derek Uluski: On-access anti-virus mechanism for virtual machine architecture. VMware, August 30, 2011: US08010667 (174 worldwide citation)

A tangible medium embodying instructions usable by a computer system to protect a plurality of guest virtual machines (VMs), which execute via virtualization software on a common host platform, from malicious code is described. A scan engine is configured to scan data for malicious code and determin ...


10
Walter Andrew Lambeth: System and method for multiple virtual teams. VMware, November 15, 2011: US08060875 (169 worldwide citation)

A system and method for assigning virtual machines to network interfaces. A first virtual machine is assigned to a network interface according to a first rule and a second virtual machine is assigned to a network interface according to a second rule. The assignment rules are dependent on network con ...