throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`In re Patent of: Nanja
`U.S. Patent No.: 7,065,637
`Issue Date:
`
`June 20, 2006
`Serial No.:
`
`09/662,990
`
`Filing Date:
` September 15, 2000
`Title:
`System for Configuration of Dynamic Computing
`Environments Using a Visual Interface
`
`
`
`DECLARATION OF DR. BENJAMIN B. BEDERSON, Ph.D.
`
`
`I, Dr. Benjamin B. Bederson, Ph.D., declare as follows:
`
`
`
`(1.)
`
`I am currently a Professor in the Computer Science Department and
`
`the Institute of Advanced Computer Studies at the University of Maryland. I am
`
`also the Co-Founder and Chief Scientist for Zumobi, Inc., a venture capital funded
`
`startup created to commercialize mobile media for cell phones, as well as the Co-
`
`Founder and Technical Director for the International Children’s Digital Library
`
`Foundation, which provides free online children’s books to its members.
`
`(2.)
`
`For more than 25 years, I have studied, designed, and worked in the
`
`field of computer science and human-computer interaction. My experience
`
`includes 25 years of teaching and research, with research interests in human-
`
`computer interaction and the software and technology underlying today’s mobile
`
`computing world; web browsing and mobile computing, including the use of
`

`
`- 1 -
`
`Oracle Exhibit 1011
`
`

`

`proxies to enhance the functionality of the web; mobile media for cell phones; and
`
`user interface development, just to name a few.
`
`(3.)
`
`I received a Bachelor of Science degree in Computer Science from
`
`Rensselaer Polytechnic Institute in 1986, a Master of Science Degree in Computer
`
`Science from New York University in 1989, and a Doctor of Philosophy degree in
`
`Computer Science from New York University in 1992.
`
`(4.)
`
`I have designed and implemented over a dozen software platforms,
`
`including Pad++ (my original toolkit for building zoomable user interfaces,
`
`including web support); PadPrints (a proxy-based web browser offering a graphical
`
`web history) which is discussed in more detail below; the International Children’s
`
`Digital Library (a website of children’s books); and StoryKit (a mobile children’s
`
`story authoring tool).
`
`(5.)
`
`I am the co-inventor of 7 U.S. patents, listed below. The patents are
`
`generally directed to user interfaces/experience.
`
` Pahud, M., Murillo, O. E., Karlson, A. K., & Bederson, B. B. Monitoring
`Pointer Trajectory and Modifying Display Interface. US Patent # 8,261,211.
`
` Good, L. E., Bederson, B. B., & Stefik, M. J. Methods and Systems for
`Supporting Presentation Tools Using Zoomable User Interfaces. US Patent
`# 7,707,503.
`
` 
`
` Bederson, B. B., Good, L. E., & Stefik, M. J. Methods and Systems for
`Incrementally Changing Text Representation. US Patent # 7,650,562.
`
` Bederson, B. B., Good, L. E., & Stefik, M. J. Methods and Systems for
`Incrementally Changing Text Representation. US Patent # 7,549,114.
`
`- 2 -
`
`
`
`
`

`
`Oracle Exhibit 1011
`
`

`

`
`
`
`
`
`
`
`
` Wallace, R. S., Bederson, B. B., & Schwartz, E. L. TV Picture
`Compression and Expansion. US Patent # 5,642,167.
`
` Bederson, B. B., Wallace, R. S., & Schwartz, E. L. Two-Dimensional
`Pointing Motor. US Patent # 5,204,573.
`
` Wallace, R. S., Bederson, B. B., & Schwartz, E. L. Telephone Line
`PictureTransmission. US Patent # 5,175,617.
`
`(6.)
`
`I currently serve on the editorial board for the Association of
`
`Computing Machinery (ACM) publication Transactions on Computer-Human
`
`Interaction; Now Publishers’ Foundations and Trends in Human-Computer
`
`Interaction, for which I am the Editor-in-Chief; and Palgrave Press’ Information
`
`Visualization publication. I have also served on the review board for over 15
`
`conference or symposium proceedings, including conferences sponsored by ACM,
`
`the Institute of Electrical and Electronics Engineers (IEEE), and the National
`
`Science Foundation (NSF).
`
`(7.)
`
`In 2011 I was elected to the Computer Human Interaction (CHI)
`
`Academy, which is an honorary group of individuals who have made substantial
`
`contributions to the field of human-computer interaction. Members of the CHI
`
`Academy are the principal leaders of the field, whose efforts have shaped the
`
`discipline and/or industry, and lead the research and/or innovation in human-
`
`computer interaction. In 2011 I was also recognized as an ACM Distinguished
`
`Scientists, which recognizes those ACM members with at least 15 years of
`

`
`- 3 -
`
`Oracle Exhibit 1011
`
`

`

`professional experience and 5 years of continuous professional membership who
`
`have achieved significant accomplishments or have made a significant impact on
`
`the computing field.
`
`(8.)
`
`I have presented in over 85 conferences throughout the United States
`
`and across the globe regarding human-computer interaction, web browsing, user
`
`interfaces, and user experience, to name a few relevant topics. I have also been
`
`honored to present as a keynote speaker at 6 conferences, largely for my work
`
`regarding zoomable user interfaces.
`
`(9.)
`
`I am the author or co-author of 10 book chapters and over 100
`
`technical articles directed to web browsing, mobile computing, user interfaces, user
`
`experience, and the software and technology underlying this technology. Many of
`
`these publications address various aspects of software visualization techniques
`
`implemented on a variety of hardware platforms. These publications highlight my
`
`familiarity with graphical user interfaces operating on a variety of platforms.
`
`Below is a list of my publications that are particularly relevant to the above topics:
`
` Bederson, B. B., Grosjean, J., Meyer, J. (2004). Toolkit Design for
`Interactive Structured Graphics, Transactions on Software
`Engineering, New York: IEEE, 30 (8), 535-546.
` Bederson, B. B., Shneiderman, B. (Eds.) (2003). The Craft of
`Information Visualization: Readings and Reflections. San Francisco:
`Morgan Kaufmann.
` Hourcade, J.P., Bederson, B.B., Druin, A., Rose, A., Farber, A.,
`Takayama, Y. (2003). The International Children's Digital Library:
`

`
`- 4 -
`
`Oracle Exhibit 1011
`
`

`

`Viewing Digital Books Online. Interacting with Computers, Elsevier
`Press, 15 (3), 151-167.
` Hourcade, J., Bederson, B. (May 1999). Architecture and
`Implementation of a Java Package for Multiple Input Devices (MID)
`HCIL-99-08, CS-TR-4018, UMIACS-TR-99-26.
` Hollan, J. D., Bederson, B. B., & Helfman, J. (1998). Information
`Visualization. Helander, M., Landauer, T. K., & Prabhu, P. V. (eds.),
`The Handbook of Human Computer Interaction (Chap. 2, 33-48).
`Amsterdam: Elsevier Press.
` Bederson, B. B., & Druin, A. (1995). Computer Augmented
`Environments: Physical Spaces to Enrich Our Lives. Jakob Nielsen
`(eds.), Advances in Human-Computer Interaction (Vol. 5, Chap.
`2, 37-66). New Jersey: Ablex Press.
` Bederson, B. B., & Hollan, J. D. (1994). Pad++: A Zooming
`Graphical Interface for Exploring Alternate Interface Physics. In Proc.
`of User Interface and Software Technology (UIST 94) ACM
`Press, 17-26.
`
`
`(10.)
`
`A copy of my curriculum vitae, which describes in further detail my
`
`qualifications, responsibilities, employment history, honors, awards, professional
`
`associations, invited presentations, and publications is attached to this declaration
`
`as Appendix A-1.
`
`(11.)
`
`I have reviewed United States Patent No. 7,065,6371 (“the ‘637
`
`patent”) to Sekaran Nanja as well as the patents and applications referenced in the
`
`section of the ‘637 patent entitled “Related U.S. Application Data.” I have also
`
`                                                       
`1 Sekaran Nanja, “System for Configuration of Dynamic Computing Environments Using a
`Visual Interface.” U.S. Patent No. 7,065,637, filed September 15, 2000, claiming priority to a
`Provisional Application (U.S. Ser. No. 60/228,105) filed August 24, 2000. (Ex. 1001)
`

`
`- 5 -
`
`Oracle Exhibit 1011
`
`

`

`reviewed the publications cited in the footnotes of this declaration and referenced
`
`in the inter partes review petition submitted herewith.
`
`
`STATE OF THE ART AS OF 2000
`
`(12.)
`
`In the late 1990’s, the World Wide Web (WWW) was achieving its
`
`first peak. Known as the “dot-com” era, there was a tremendous amount of
`
`innovation around e-commerce and web-based companies in general. Essentially
`
`every one of these companies ran web servers which provided users with web
`
`pages, typically backed by databases. These web servers were regular computers
`
`running special “server” software, and the computers ran an operating system such
`
`as Windows or Linux. While it was possible to simply plug one of these
`
`computers into an office network, and provide a website to the world, that was
`
`uncommon as that would not offer a reliable or scalable solution.
`
`(13.)
`
`Instead, it was common to put these server computers in “data
`
`centers” or “server rooms” that were special facilities with “racks” of many
`
`computers. As there could be, and often was, an abundance of users, it was not
`
`sufficient to simply have a single computer running a web server due to reliability
`
`and speed issues. Instead, clusters of computers were configured to collectively
`
`provide a faster or reliable service even when being used by many users. The
`
`computers could be structured in different ways, but one typical organization was
`
`to have a number of web servers that would connect to a separate set of computers
`

`
`- 6 -
`
`Oracle Exhibit 1011
`
`

`

`that provided access to a database. To decide which web server would respond to
`
`a specific request, a “load balancer” was typically put up front, and it would direct
`
`requests to balance the load across numerous web servers.2
`
`(14.)
`
`The basic architecture described above captures the essence of how
`
`web server systems were set up in the late 1990’s, but there is another basic issue
`
`when managing computer systems: adaptability. It was (and is) common for
`
`websites to get more (or less) popular over time, and so the systems manager must
`
`be able to increase or decrease the number of computers in the system to respond
`
`to varying loads. Doing this manually by physically going to the server room or
`
`data center and plugging cables between machines was an extremely time
`
`consuming task. And so it was not surprising that a number of solutions were
`
`made to provide software based configuration of these systems to avoid having to
`
`physically visit the servers.
`
`(15.)
`
`The Dell Computer Company was a significant seller of computers
`
`designed to be used for web servers in the late 1990’s. For example, in 1999, Dell
`
`sold a specialized piece of hardware called a “Dell OpenManage Remote Assistant
`
`Card” (DRAC).3 These DRAC cards, which I used in the ICDL server
`
`                                                       
`2 Anderson, P., et al. “Performance Soars, Features Vary,” Network World (June 14, 1999)
`viewed at http://www.networkworld.com/reviews/0614rev.html (Last visited December 21,
`2012). (Appendix A-2).
`3 “Dell OpenManage™ Remote Assistant Card II (DRAC II),” Dell OpenManage Documents
`(14 Dec 1999) viewed at http://support.dell.com/support/edocs/software/smdrac/index.htm. (Last
`visited December 21, 2012). (Appendix A-3).
`

`
`- 7 -
`
`Oracle Exhibit 1011
`
`

`

`configuration, enabled remote management of individual servers to, for example,
`
`reboot a machine when it became unresponsive. This was important because it
`
`allowed remote management of a computer without having to physically touch it.
`
`It was part of the ecosystem of devices that enabled the software based
`
`configuration of computer systems. 
`
`(16.)
`
`Additionally, companies were offering full service solutions allowing
`
`a customer to configure and order web servers entirely over the web as early as
`
`1998. For example, Rackspace allowed clients to custom configure servers via the
`
`Rackspace website.4 The following screenshots of their website in February of
`
`1998 shows the ability to pick amongst a plurality of configurations of web servers
`
`as well as to specify which operating system should be used on a server and what
`
`resources should be made available on that server:5
`
`                                                       
`4 “About Rackspace.” (“We got started in 1998 and since have grown to serve more than 197,000
`customers.”) viewed at http://www.rackspace.com/information/aboutus/ (Last visited December
`21, 2012). (Appendix A-4).
`5See Feb. 8, 1999 Rackspace.com website capture:
`http://web.archive.org/web/19990208005938/http://rackspace.com/ (Last visited December 21,
`2012) (Appendix A-5) and March 2, 2000 Rackspace.com website Capture:
`http://web.archive.org/web/19990125091600/http://rackspace.com/http://web.archive.org/web/20
`000302000851/http://www.rackspace.com/goconfigure/pricing.php3 (Last visited December 21,
`2012). (Appendix A-6).
`

`
`- 8 -
`
`Oracle Exhibit 1011
`
`

`

`I'L'rlll‘ull
`
`r
`
`lfll'1llh'!
`
`llfllllllflfllflllfllfliflfl
`
`Carr Now 322%. user
`
`ort
`Emer enc Su
`
`EBM Mo' YourAecount
`
`Bfllm
`uestions
`
`Sales
`ue stions
`
`CHETDH CDNFEELIHE I\"fllJH SERVER I0"!
`
`The entry huild-to-order
`custom server and
`colocation service on
`the Net
`
`1
`
`“-113; “Fruit?
`and order
`mo '
`Don't wait days for a quote from the other guys —— de si
`your dedicated server along with 1:3 chnieel support plans, data transfer
`’— eJlowanees, IP blocks, and dozens of' other options...instent1y!
`
`
`
`
`
`
`hnvauwwrackspace.comrgocomigurer-Uricing mm
`|[ Go I
`“W "WI-l
`”—BM
`lllflllllflflllfllfllllifll!
`|II|
`lMarDU-4 May 05
`
`Configure a Server
`How to Order
`LanX Servers
`
`WINDOWS NT OPTIONS
`
`Windows NT Servers
`W
`Co‘ocated Servers
`
`Instant Setug
`FAQ.
`(Frequently asked questrons)
`
`350 Mhz (Add $35.00)
`E4MB RAM [Add $25 DD)
`
`V
`V
`
`8GB EIDE [Add $45 DD]
`
`1|||||
`
`V
`
`<<<<
`
`<
`
`<
`
`2GBrMomh (Add $5.50)
`1 IP [Add $0.00)
`
`v
`
`<
`
`|||
`
`<
`

`
`- 9 -
`
`
`
`Oracle Exhibit 1011
`
`Oracle Exhibit 1011
`
`

`

`(17.)
`
`Another basic and well-known characteristic of data centers was the
`
`increasing need for storage. In 2000, storage was taking about 40% of system cost6
`
`and was predicted to account for over 75% of all computer hardware in the ensuing
`
`5 years.7 At the same time, there was growing demand to share that storage.8
`
`Fortunately, by this time, there had been significant development of mechanisms to
`
`deploy significant volumes of reliable storage. Going back at least to the early
`
`1990’s, the concept of “network-attached storage” (NAS) had become a popular
`
`way to address some of these challenges. Instead of connecting storage devices
`
`(such as hard disks) directly to computers, they were instead connected to a local
`
`area network, and then any computer on the network could access the storage.9 A
`
`variant called “storage area network” (SAN) used the same strategy, and by 2000,
`
`both techniques were in common commercial use as indicated by both a tutorial
`
`given by an HP employee in 2000 (Alvarez), as well as a commercial web page
`
`providing a guide to these services.10,11
`
`                                                       
`6 Alvarez, G., et al. “Storage Systems Management.” Sigmetrics 00 Tutorial, Hewlett-Packard
`Labs, 4 (17 June 2000) viewed at http://www.hpl.hp.com/research/ssp/papers/Tutorial00.pdf.
`(Last visited May 7, 2013). (Appendix A-7).
`7 AUSPEX, “Selecting the right storage solution for an optimized e-Business network
`infrastructure.” Auspex Systems, Inc. (May 29, 2000) viewed at
`http://www.auspex.com/storage_guide2k/guide1.htm. (Last visited April 7, 2013). (Appendix A-
`8).
`8 Alvarez, 15.
`9 Coyne, R. A., et al. “Storage systems for national information assets.” IEEE (1992). (Appendix
`A-9).
`10 AUSPEX, “Determining the right storage architecture for a specific application.” Auspex
`Systems, Inc. (Aug. 17, 2000) viewed at http://www.auspex.com/storage_guide2k/guide3_3.htm.
`(Last visited April 7, 2013). (Appendix A-10).
`

`
`- 10 -
`
`Oracle Exhibit 1011
`
`

`

`(18.) With storage hardware essentially a commodity, there was a need for
`
`a simple and consistent mechanism to provide software access to that storage.
`
`Fortunately, a standard mechanism had been developed and used widely on most
`
`operating systems. For example, all variations of Unix going back to the 1970’s
`
`have had a simple and consistent mechanism for managing who gets access to
`
`which files. Files are organized in a hierarchy of directories. The hierarchical
`
`Unix file system starts with the root directory (/), which is available to the root user
`
`when a system boots and is needed to run a system.12 Each file and directory is
`
`owned by a “user” and is associated with a “group.” Access to files is governed by
`
`these user and group attributes in that each file can be made read-only, writable or
`
`executable to the specific user that owns a file, to the group members associated
`
`with a file’s group, or to everyone. The details of how these permissions can be
`
`changed are described under the description of the “chmod” command in the 1994
`
`SunOS Reference Manual.13
`
`                                                                                                                                                                               
`11 AUSPEX, “Determining the right storage architecture for a specific application. Storage
`Attached Network.” Auspex Systems, Inc. (Aug. 17, 2000) viewed at
`http://www.auspex.com/storage_guide2k/guide3_4.htm. (Last visited April 7, 2013). (Appendix
`A-11).
`12 SunSoft File System Administration, Sun Microsystems, Inc., 13-14, 21 (1994) viewed at
`http://docs.oracle.com/cd/E19457-01/801-6631/801-6631.pdf. (Last visited May 7, 2013).
`(Appendix A-12).
`13 SunSoft SunOS Reference Manual, Sun Microsystems, Inc., 1-83 – 1-86 (1994) viewed at
`http://docs.oracle.com/cd/E19457-01/801-6680-01/801-6680-01.pdf. (Last visited May 7, 2013).
`(Appendix A-13).
`

`
`- 11 -
`
`Oracle Exhibit 1011
`
`

`

`(19.)
`
`In addition to user and group access permission in Unix, there is a
`
`concept of a “root” super user that is the primary administrator and who has full
`
`access to every file, no matter how a file’s permissions are set. Unix computer
`
`systems are booted (i.e., started up) running as this “root” super user, and only
`
`change to a specific user when a user logs in. Root access is crucial to security and
`
`access to files as root is typically logged.14
`
`(20.)
`
`The ‘637 patent alleges a novel interactive system for allowing
`
`allocation of resources such as digital processors, networks and software to create a
`
`software configured, networked arrangement of processors and processes.15
`
`However, as shown by the discussion of relevant patents and articles below, the
`
`methods and systems proposed by the patentee represent nothing more than
`
`standard resource allocation and system configuration utilizing standard user
`
`interfaces, which was pursued and accomplished by many before the Patent
`
`Owner.
`
`
`THE ‘637 PATENT
`
`(21.)
`
`The ‘637 is generally directed to a system for providing “such fast
`
`allocation and configuration of resources that environments can be created from a
`
`                                                       
`14 SunSoft Security, Performance, and Accounting Administration, Sun Microsystems, Inc., 4, 14
`(1994) viewed at http://docs.oracle.com/cd/E19457-01/801-6629/801-6629.pdf. (Last visited
`May 7, 2013). (Appendix A-14).
`15 ‘637 Patent, 1:18-24.
`

`
`- 12 -
`
`Oracle Exhibit 1011
`
`

`

`pool of resources within minutes, or even seconds, (virtually) destroyed, and
`
`reallocated for creating different environments from the same pool of resources.”16
`
`This “provides an efficient system for provisioning ‘crash and burn’ systems which
`
`can be used in different software development life-cycle scenarios including
`
`testing, rapid beta deployment, etc.”17 A preferred embodiment allows customers
`
`to create a computing environment from a remotely accessible user interface such
`
`as a web page on the Internet.18
`
`(22.)
`
`Once a user logs in, a configuration page is displayed as illustrated in
`
`the web page of Fig. 5:
`
`
`
`                                                       
`16 Id. at 4:42-48.
`17 Id. at 4:52-56.
`18 Id. at 4:58-60.
`

`
`- 13 -
`
`Oracle Exhibit 1011
`
`

`

`Based on a selection made by the user, a configuration server allocates a computer
`
`with the requested operating system and other application software.19 Accordingly,
`
`if a user wishes to configure a server for the computing environment, the user
`
`clicks on “select a configuration or the user may open a window on one of the
`
`machines which were previously configured and the access server provides the
`
`user with access to the specific machine.20 Once allocated, the user can open a
`
`terminal to access the specific computing device and when the user tries to access,
`
`the configuration/access server activates the machine from the inventory.21
`
`
`PREVIOUSLY FILED PETITION FOR INTER PARTES REVIEW
`
`(23.)
`
`Independent claim 1 was previously addressed in a petition for inter
`
`partes review against claims 1-4 and 6 of the ‘637 patent on December 21, 2012.22
`
`The claim charts duplicated below demonstrate how claim 1 of the ‘637 patent is
`
`anticipated and/or rendered obvious under 35 U.S.C. § 102(e) / § 103(a) by several
`
`different references.
`
`(24.)
`
`The following claim chart demonstrates, on a limitation-by-limitation
`
`basis, how claim 1 of the ‘637 patent is anticipated under 35 U.S.C. § 102(e) by
`
`Patterson.23
`
`                                                       
`19 Id. at 6:57-60.
`20 Id. at 6:15-22.
`21 Id. at 7:1-13.
`22 See IPR 2013-00099. (Ex. 1012).
`23 Id. at 21-29.
`

`
`- 14 -
`
`Oracle Exhibit 1011
`
`

`

`U.S. Patent No.
`7,065,637 Claim
`Language
`1. A system for
`providing configurable
`resources to create a
`computing
`environment, the
`system comprising:
`
`a configurable
`communication link;
`
`plurality of hardware
`devices coupled to the
`communication link;
`
`Correspondence to
`U.S. Patent No. 7,093,005 to Patterson
`Patterson discloses methods to “visually create a logical
`description of a virtual server farm and instantiate a
`corresponding tangible, operable computing system
`relatively instantly . . .” (Ex. 1003 at 2:14-16). (See also
`Ex. 1004 at 3).
`
`Patterson describes a dynamically configurable network
`that allows creation of an “instant data center.”
`In this document, the terms "virtual server
`farm," "VSF," "farm," "instant data center," and
`"IDC" are used interchangeably to refer to a
`networked computer system that comprises the
`combination of more than one processor, one or
`more storage devices, and one or more
`protective elements or management elements
`such as a firewall or load balancer. Such a
`system is created on demand from a large grid
`of generic computing elements and storage
`elements of the type described in Aziz, et al.
`(Ex. 1003 at 6:43-51). (See also Ex. 1004 at 2-
`3, 59, 62, 69, 73, 111-113, 119).
`Patterson also describes receiving a graphical
`representation of a logical configuration of the networked
`system. (Id. at 3:4-6).
`Aziz, which is incorporated by reference into Patterson,
`describes a plurality of VLANs, such as VLAN1 and
`VLAN2, configurable based on the creation of the VSF
`and the computing elements contained therein. (See Ex.
`1005 at 10:25-28, Fig. 6).
`As noted above, the instant data centers of Patterson are
`comprised of networked computer systems such as storage
`devices, processors and load balancers. (See Ex. 1003 at
`6:43-51). (See also Ex. 1004 at 2-3, 59, 62, 69, 73, 111-
`113, 119).
`

`
`- 15 -
`
`Oracle Exhibit 1011
`
`

`

`U.S. Patent No.
`7,065,637 Claim
`Language
`a plurality of software
`programs executable by
`the hardware devices,
`the software programs
`comprising at least one
`of operating system
`software and
`application software,
`wherein the computing
`environment comprises
`the communication
`link, at least one of the
`hardware devices and
`at least one of the
`software programs; and
`
`Correspondence to
`U.S. Patent No. 7,093,005 to Patterson
`Patterson discloses that instant data center may include, for
`example, a user-specified Web server running Windows
`NT and Internet Information Server version 3.0 :
`As described in detail in Aziz, et al., a data
`center may be defined in terms of a number of
`basic building blocks. By selecting one or more
`of the basic building blocks and specifying
`interconnections among the building blocks, a
`data center of any desired logical structure may
`be defined. The resulting logical structure may
`be saved as a named server image, and treated
`as a blueprint ("DNA") for creating any number
`of other IDCs that have the same logical
`structure. Thus, creating a DNA for a data
`center facilitates
`the automation of many
`manual tasks involved in constructing server
`farms using prior technologies.
`As defined herein, a data center DNA may
`specify roles of servers in a data center, and the
`relationship of the various servers in the roles.
`A role may be defined once and then re-used
`within a data center definition. For example, a
`Web Server role may be defined in terms of
`the hardware, operating
`system, and
`associated applications of the server, e.g.,
`dual Pentium of a specified minimum clock
`rate and memory size, NT version 4.0,
`Internet Information Server version 3.0 with
`specified plug-in components. This Web
`Server role then can be cloned many times to
`create an entire Web server tier or server group.
`The role definition also specifies whether a role
`is for a machine that is statically assigned, or
`dynamically added and removed from a data
` (Ex. 1003 at 9:42-67) (emphasis
`center.
`added).
`

`
`- 16 -
`
`Oracle Exhibit 1011
`
`

`

`U.S. Patent No.
`7,065,637 Claim
`Language
`
`a visual construction of
`the computing
`environment via a user
`interface, the user
`interface coupled to a
`display screen and to
`an input device for
`generating signals in
`response to interactions
`of a user,
`
`Correspondence to
`U.S. Patent No. 7,093,005 to Patterson
`(See also Ex. 1004 at 111-114, 118).
`Patterson discloses a graphical drag-and-drop interface for
`designing the instant data center via a visual editor (Ex.
`1003 at Fig. 2B) (See also Ex. 1004 at 28) operating on a
`computer system having a display and input device (Ex.
`1003 at 40:54 – 41:24, Fig. 9) (See also Ex. 1004 at 4,
`15):
`
`Design and creation of Instant Data Centers
`generally involves providing a drag-and-drop
`graphical editor with which a user may draw
`server farm designs. In a preferred embodiment,
`the editor includes a palette that features icons
`representing standard server farm elements. For
`example,
`icons may
`represent hardware
`elements such as firewalls, load-balancers;
`application servers or database servers having
`various processor and RAM configurations,
`generic or general purpose servers having
`various processor and RAM configurations, and
`Internet or network connectivity (e.g., icons
`may represent the Internet, sub networks,
`backhaul connections, etc.). (Ex. 1003 at
`19:51-62).
`(See also Ex. 1004 at 3, 14, 29-30, 62, 73, 118-119).
`The editor may be implemented, for example,
`in the form of a software plug-in for Microsoft
`Visio such that a Visio drawing may be saved
`in FML format. Alternatively, the editor may
`be
`implemented as a standalone software
`application program that can accept Visio
`format drawings as input. Such an application
`may be implemented in the form of one or
`more client-side software elements, such as
`browser applets or scripts, and server-side
`software elements, such as CGI scripts, Perl
`

`
`- 17 -
`
`Oracle Exhibit 1011
`
`

`

`U.S. Patent No.
`7,065,637 Claim
`Language
`
`wherein the user
`interface is configured
`to accept a signal
`which enables the user
`to request a copy a
`device configuration,
`the system is
`configured to make the
`copy of the device
`configuration and save
`the copy of the device
`configuration in
`storage,
`
`Correspondence to
`U.S. Patent No. 7,093,005 to Patterson
`scripts, Java applications, etc. These software
`elements cooperate over a network
`that
`connects a client executing a browser to a
`server that executes the server-side software
`elements, and thereby carry out the functions
`described herein. In the example of FIG. 3A,
`graphical editor
`functions are shown as
`integrated with a customer control center
`application; however, this structure is not
`required, and a graphical editor may be
`provided as a standalone application. (Ex. 1003
`at 20:3-20).
`(See also Ex. 1004 at 3, 29, 62, 73, 112, 114-122).
`Patterson teaches creating and storing a textual
`representation of the logical and configuration of the
`networked system. (Ex. 1003 at 3:11-16). In the textual
`representation, a copied server definition is created and
`stored. (Id. at 4:1-4) (See also Ex. 1004 at 8, 9).
`Patterson teaches that the user can make copies or images
`of the configuration of the servers with the instant data
`center:
`4.5.1 Creating Server Images
`To create one or more server images, one or
`more operating systems, applications, data and
`support files that comprise the image are
`initially loaded onto a disk that forms a part of
`an IDC or farm. Thereafter,
`information
`identifying the image is associated with the
`image in the CCC database and a copy of the
`image is saved for future re-use. (Ex. 1003 at
`30:39-46). (See also Ex. 1004 at 61-64, 73-75,
`115).
`. . .
`FIG. 6B is a diagram of an example `Snapshot:
`

`
`- 18 -
`
`Oracle Exhibit 1011
`
`

`

`U.S. Patent No.
`7,065,637 Claim
`Language
`
`Correspondence to
`U.S. Patent No. 7,093,005 to Patterson
`Image` window that opens in response to the
`selection from the context menu of FIG. 6A. In
`one embodiment, defining a server image
`involves entering data values in the fields of
`Snapshot Image window 610. For example, a
`unique name value is entered in Name field
`612. Description field 614 receives a brief
`description
`of
`the
`image. Hardware
`Compatibility radio buttons 616 are used to
`identify the hardware architecture required for
`the image in terms of whether the current
`architecture should be `tied` to the image or
`whether any architecture is allowed at time of
`deployment. Server field 618 receives a value
`indicating which specific server in the current
`server group is the source of the disk image.
`Disk field 620 is used to indicate which disk
`volume of the server identified using Server
`field 618 is to be used for image creation. (Ex.
`1003 at 30:55 – 31:3). (See also Ex. 1004 at
`62-64, 73-76, 97-102).
`. . .
`4.5.3 Load Balancer and Firewall Snapshot
`In one embodiment, a user can
`store
`information
`that
`identifies
`a
`current
`configuration of a firewall or load balancer, so
`that
`the configuration
`information can be
`applied to other firewalls or load balancers of
`other IDCs or farms in the user's account. This
`process is called taking a "snapshot" of the
`configuration of the firewall or load balancer.
`To store a snapshot, a user may right-click on a
`firewall or a load balancer in the Farm Builder
`page (Editor) and select a "Snapshot . . . "
`option from the context menu that is displayed
`in response. In response to selection of the
`

`
`- 19 -
`
`Oracle Exhibit 1011
`
`

`

`U.S. Patent No.
`7,065,637 Claim
`Language
`
`the user interface is
`further configured to
`accept a signal which
`enables the user to
`instantiate a device
`from a stored
`configuration, and the
`system is further
`configured to
`instantiate the device
`from the stored
`configuration.
`
`Correspondence to
`U.S. Patent No. 7,093,005 to Patterson
`Snapshot option, a Snapshot Configuration
`window is displayed. The window provides a
`message to the user that confirms that the
`system is about to store a snapshot of the
`configuration of the current firewall or load
`balancer node. If the user selects `Snapshot
`Now,` the system sends a request to the server
`to snapshot the current firewall/load balancer
`and stores configuration information as the
`snapshot. (Ex. 1003 at 31:42-58). (See also
`Ex. 1004 at 62-64, 73-76, 97-102).
`Patterson teaches that each node may be configured by
`selecting a stored configuration or image:
`The image value is selected from a pull-down
`menu and identifies one of a plurality of pre-
`defined disk images to apply to the disk. A disk
`image can contain boot
`information, an
`operating system, applications, and associated
`configuration data. (Ex. 1003 at 27:9-13). (See
`also Ex. 1004 at 3, 62, 73, 80-96, 97-102).
`Patterson teaches that the instant data center is instantiated
`based on the configuration specified by the user through
`the graphi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket