Journal articles on the topic 'Computer virtualization'

To see the other types of publications on this topic, follow the link: Computer virtualization.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer virtualization.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Soni, Soni, Abdurrahman Abdurrahman, and Afdhil Hafid. "OPTIMALISASI SUMBER DAYA KOMPUTER DENGAN VIRTUALISASI SERVER MENGGUNAKAN PROXMOX VE." JURNAL FASILKOM 9, no. 2 (August 11, 2019): 369–76. http://dx.doi.org/10.37859/jf.v9i2.1394.

Full text
Abstract:
Virtualization technology is a topic that began to be scrutinized by researchers. This is inseparable from the technology's ability to reduce the cost of providing infrastructure and operations independently for each service to be served. With server virtualization, we can make several computers into one, which used to be possible for server computers to have three physical computers that can be used as one for the three server computers which in fact the resources on a single physical server computer will not use all the resources in one single physical computer. The existence of proxmox, then all servers can be connected in a network together so that they are able to streamline time. In addition, Proxmox has a web console that can be used for various purposes in server virtualization and maintenance. In this study, the performance of server virtualization using ProxmoxVE will be examined. This study is intended to determine the load of memory usage, load the CPU when running all the servers in Proxmox, and examine the Throughput, PacketLoss, Delay and Jitter on the server. Keyword: Proxmox, Virtualization, Resources, Server, Operating System
APA, Harvard, Vancouver, ISO, and other styles
2

Kotsovinos, Evangelos. "Virtualization." Communications of the ACM 54, no. 1 (January 2011): 61–65. http://dx.doi.org/10.1145/1866739.1866754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Douglis, Fred, and Orran Krieger. "Virtualization." IEEE Internet Computing 17, no. 2 (March 2013): 6–9. http://dx.doi.org/10.1109/mic.2013.42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sudyana, Didik, Reza Tanujiwa Putra, and Soni Soni. "Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037:2014." Sinkron 3, no. 2 (March 9, 2019): 67–72. http://dx.doi.org/10.33395/sinkron.v3i2.10029.

Full text
Abstract:
Server virtualization technology has experienced significant development so that more and more industries are adopting this technology. By using server virtualization, the industry can make savings in purchasing new servers and maintenance because virtualization allows one server to run with multiple operating systems at once. The high level of use of virtualization raises a gap for the occurrence of computer crimes involving virtualization. When computer crimes occur on virtualization, it is necessary to conduct digital forensic investigations to find useful clues in solving crime cases. Therefore, in this study a digital forensic investigation was conducted on Proxmox server virtualization by acquiring the entire storage virtualization media and carrying out checks on the results of the acquisition. Based on the investigation carried out, the acquisition technique by acquiring the entire storage media on Proxmox cannot be used because the structure of the evidence files and folders cannot be read perfectly
APA, Harvard, Vancouver, ISO, and other styles
5

Burcea, Ioana, Stephen Somogyi, Andreas Moshovos, and Babak Falsafi. "Predictor virtualization." ACM SIGPLAN Notices 43, no. 3 (March 25, 2008): 157–67. http://dx.doi.org/10.1145/1353536.1346301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lv, Hui, Yaozu Dong, Jiangang Duan, and Kevin Tian. "Virtualization challenges." ACM SIGPLAN Notices 47, no. 7 (September 5, 2012): 15–26. http://dx.doi.org/10.1145/2365864.2151030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Duport, Francois, Anteo Smerieri, Akram Akrout, Marc Haelterman, and Serge Massar. "Virtualization of a Photonic Reservoir Computer." Journal of Lightwave Technology 34, no. 9 (May 1, 2016): 2085–91. http://dx.doi.org/10.1109/jlt.2016.2524559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Spirin, Oleg M., and Olena S. Holovnia. "ЗАСТОСУВАННЯ ТЕХНОЛОГІЙ ВІРТУАЛІЗАЦІЇ UNIX-ПОДІБНИХ ОПЕРАЦІЙНИХ СИСТЕМ У ПІДГОТОВЦІ БАКАЛАВРІВ ІНФОРМАТИКИ." Information Technologies and Learning Tools 65, no. 3 (July 1, 2018): 201. http://dx.doi.org/10.33407/itlt.v65i3.2055.

Full text
Abstract:
Despite the widespread use of virtualization technologies in education the problem of individual selection of virtualization tools for teaching certain courses, including teaching operating systems to Bachelors of Computer Science, remains scarcely studied. Research of operating systems teaching process to Bachelors of Computer Science found a range of issues in using virtualization technologies. These are as listed: hardware and software failures; low performance of virtualized operating systems; lack of adapted instructions; dependence on specific computer laboratories; unequal conditions of independent work with virtualized operating systems. Comparison of Bachelors of Computer Science scores in Operating Systems course which included studying Linux and Windows operating systems and also Fundamentals of Operating Systems Theory, resulted in general lower level of learning outcomes in Linux compared to the ones of the entire academic subject. A survey of Ukrainian teachers of Operating Systems course shows a number of differences in teaching process. It includes differences in teachers’ experience of using virtualization technologies, variety of virtualization technologies applied during the course, factors estimation for selecting virtualization tools. The article proposes the methodology of using unix-like operating systems virtualization technologies in professional training of Bachelors of Computer Science based on the variable approach to using mentioned technologies. The approach involves combining several virtualization tools in the frames of one course of Operating Systems to meet specific features of teaching the course as well as individual students’ needs and ensures hardware and software fault tolerance. Didactic model underlying the proposed methodology is described in the article. Experimental results on methodology effectiveness are provided.
APA, Harvard, Vancouver, ISO, and other styles
9

Song, Meng Hua. "Analysis of Risks for Virtualization Technology." Applied Mechanics and Materials 539 (July 2014): 374–77. http://dx.doi.org/10.4028/www.scientific.net/amm.539.374.

Full text
Abstract:
In IT field, the application of the virtualization technology has expanded the capacity of computer hardware, simplified the software configuration process, and simulated the parallel operation of multiple CPUs. Such technology can achieve multiple operating systems running one platform at the same time, and improve the work efficiency of the computer. In the application of the virtualization technology, there are various conditions to cause risks, such as security, high resource utilization, disunited virtualization technology standards, expectation for cost reduction, changes in management mode and application migration, etc. For the risk existing in the application of the technology, the author puts forward the specific countermeasures, benefiting the abatement or elimination of risk of virtualization technology application, thus to ensure the purpose of applying such technology. This paper mainly analyzes the target the risk of virtualization technology application and puts forward the specific measures for reducing the risk of the virtualization technology application, in order to facilitate the practical application and development of the virtualization technology.
APA, Harvard, Vancouver, ISO, and other styles
10

V. Anbazhagu, U., P. Maheshwaran, K. S. Archana, and Sheela Gowr. "A study on competence and enrichment of virtualization in cloud computing." International Journal of Engineering & Technology 7, no. 2.21 (April 20, 2018): 345. http://dx.doi.org/10.14419/ijet.v7i2.21.12401.

Full text
Abstract:
The aim of this research is to study and enhance the applications of most profitable technology in cloud computing ever "Virtualization". Back then, a 15 years before, nobody knows about the technology named cloud computing exists. But now, every technology such as personal computer, mobile phone, tablet PC, even televisions rely on cloud computing. Cloud computing helps greatly in reducing costs, scalability and flexibility in computer services. Virtualization is the technology that helps cloud computing to emerge in a large profitable level. Using virtualization (such as server, network and storage virtualization technologies), the resource cost is reduced in great level.
APA, Harvard, Vancouver, ISO, and other styles
11

Rasian, Rio, and Petrus Mursanto. "PERBANDINGAN KINERJA PENDEKATAN VIRTUALISASI." Jurnal Sistem Informasi 5, no. 2 (July 13, 2012): 90. http://dx.doi.org/10.21609/jsi.v5i2.267.

Full text
Abstract:
Kajian terhadap beberapa pendekatan virtualisasi telah dilakukan dan dilaporkan dalam paper ini. Pendekatan virtualisasi yang dikaji adalah full virtualization, hardware-assisted virtualization, paravirtualization, dan operating system-level virtualization. Evaluasi dilakukan melalui pengukuran kinerja masing-masing pendekatan dengan beban kerja tertentu saat dijalankan menggunakan virtualisasi dan saat virtualisasi tidak digunakan. Hasil eksperimen menunjukkan bahwa operating system-level virtualization lebih efisien dalam hal penggunaan sumber daya komputer dibanding pendekatan lainnya. Hasil evaluasi menunjukkan bahwa pendekatan virtualisasi seharusnya ikut menjadi pertimbangan dalam memilih solusi virtualisasi. Study of some of the virtualization approach has been carried out and reported in this paper. Virtualization approaches that were examined are full virtualization, hardware-assisted virtualization, paravirtualization, and operating system-level virtualization. Evaluation is done by measuring the performance of each approach with a particular work load when run using virtualization and virtualization when not in use. The experimental results show that the operating system-level virtualization is more efficient in the use of computer resources than other approaches. Evaluation results show that the virtualization approach should help to be a consideration in choosing a virtualization solution.
APA, Harvard, Vancouver, ISO, and other styles
12

Merzlykin, Oleksandr V. "ХМАРО ОРІЄНТОВАНІ ЕЛЕКТРОННІ ОСВІТНІ РЕСУРСИ ПІДТРИМКИ НАВЧАЛЬНИХ ФІЗИЧНИХ ДОСЛІДЖЕНЬ." Information Technologies and Learning Tools 49, no. 5 (October 31, 2015): 106. http://dx.doi.org/10.33407/itlt.v49i5.1269.

Full text
Abstract:
The definition of cloud educational resource is given in paper. Its program and information components are characterized. The virtualization as the technological ground of transforming from traditional electronic educational resources to cloud ones is reviewed. Such levels of virtualization are described: data storage device virtualization (Data as Service), hardware virtualization (Hardware as Service), computer virtualization (Infrastructure as Service), software system virtualization (Platform as Service), «desktop» virtualization (Desktop as Service), software user interface virtualization (Software as Service). Possibilities of designing the cloud educational resources system for physics learning researches support taking into account standards of learning objects metadata (accessing via OAI-PMH protocol) and standards of learning tools interoperability (LTI) are shown. The example of integration cloud educational resources into Moodle learning management system with use of OAI-PMH and LTI is given.
APA, Harvard, Vancouver, ISO, and other styles
13

Huang, Albert. "Teaching, Learning, and Assessment With Virtualization Technology." Journal of Educational Technology Systems 47, no. 4 (November 21, 2018): 523–38. http://dx.doi.org/10.1177/0047239518812707.

Full text
Abstract:
This article describes how virtualization technology can provide a solution to the difficulties in teaching, learning, and assessing students’ performance in computer networking subjects. The focus of this article is to show how virtualization technology can provide students with hands-on practice, can largely reduce the need for physical resources, can improve teaching effectiveness, and can provide unique assessment opportunities that would not be available with physical computers in a laboratory. Several techniques used to provide in-depth assessment of learning outcomes are described. A sample assignment is also included.
APA, Harvard, Vancouver, ISO, and other styles
14

Crosby, Simon, and David Brown. "The Virtualization Reality." Queue 4, no. 10 (December 2006): 34–41. http://dx.doi.org/10.1145/1189276.1189289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Rosenblum, Mendel, and Carl Waldspurger. "I/O Virtualization." Queue 9, no. 11 (November 2011): 30–39. http://dx.doi.org/10.1145/2063166.2071256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Waldspurger, Carl, and Mendel Rosenblum. "I/O virtualization." Communications of the ACM 55, no. 1 (January 2012): 66–73. http://dx.doi.org/10.1145/2063176.2063194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Uhlig, R., G. Neiger, D. Rodgers, A. L. Santoni, F. C. M. Martins, A. V. Anderson, S. M. Bennett, A. Kagi, F. H. Leung, and L. Smith. "Intel virtualization technology." Computer 38, no. 5 (May 2005): 48–56. http://dx.doi.org/10.1109/mc.2005.163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Gong, Song Chun, Song Yin Fu, and Zheng Chen. "Core Characteristics of Server Virtualization and Functional Upgrading Issues." Advanced Materials Research 490-495 (March 2012): 272–76. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.272.

Full text
Abstract:
Server refers to computer software that manages resources and offers services to users. It is usually divided into a file server, database server and application program server. Server virtualization is an important trend of the server development. This paper makes relevant research on such aspects as the followings: the server virtualization technology; the characteristics of the server virtualization; and the difficult points of functional upgrading of the server virtualization and that optimization of the server performance is the fundamental aspect of upgrading. It hopes to play a promotion role for knowing the server virtualization in a better way.
APA, Harvard, Vancouver, ISO, and other styles
19

Ariyanto, Yuri, Budi Harijanto, Yan Watequlis S., Awan Setiawan, and Erfan Rohadi. "Use of Virtualization Technology for Linux Firewall Implementation in Teaching Computer Network." International Journal of Engineering & Technology 7, no. 4.44 (December 1, 2018): 237. http://dx.doi.org/10.14419/ijet.v7i4.44.26998.

Full text
Abstract:
This paper describes the use of virtualization technology in the linux network teaching process in linux firewall implementation. The problem that is often faced by teacher and student is the limitation of computer devices in implementing network topology design. The use of virtualization technology can be used as a device to create a virtual network laboratory, which is an implementation of real laboratories and network simulation software that is useful to explain the concept of computer network management. With this in mind, it can provide an overview of project characteristics, especially the implementation of linux networks in the area of virtualization technology. Linux network virtualization implementation to help the teaching process used netkit. Netkit can be used as a linux network simulation, where each virtual machine host has a linux operating system, and can implement a computer network based on the design of a real network topology. The method used to implement the Linux firewall by creating a virtual laboratory, where virtual laboratories are built based on the real network topology design. Testing is done on a virtual laboratory by implementing a network topology design and running based on a test scenario.
APA, Harvard, Vancouver, ISO, and other styles
20

Correia, Eduardo. "Virtualization in Practice." International Journal of Information and Communication Technology Education 8, no. 4 (October 2012): 90–104. http://dx.doi.org/10.4018/jicte.2012100108.

Full text
Abstract:
Virtualization has the potential to revolutionise the way networking is taught in higher learning institutions. This article outlines, through the use of a case study, the way in which VMware Workstation and VMware ESX Server are used so that each student in the class runs his or her own set of seven virtual servers, including a Linux router. The Linux router connects virtual networks within the context of student physical machines to one another as well as a lecturer virtual server, which runs on an ESX server. In this way, a class of twenty two students can together run an enterprise-like network comprising of some 177 servers and implement Microsoft Active Directory sites and associated services in order to optimize a specific scenario-based replication topology.
APA, Harvard, Vancouver, ISO, and other styles
21

Kishikawa, Yoshihiko. "Network Virtualization." Journal of the Institute of Image Information and Television Engineers 68, no. 2 (2014): 149–52. http://dx.doi.org/10.3169/itej.68.149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Carbone, Martim, Diego Zamboni, and Wenke Lee. "Taming Virtualization." IEEE Security & Privacy Magazine 6, no. 1 (2008): 65–67. http://dx.doi.org/10.1109/msp.2008.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Gercek, Gokhan, Naveed Saleem, and Douglas Steel. "Implementing Cloud Based Virtual Computer Network Labs for Online Education: Experiences from a Phased Approach." International Journal of Online Engineering (iJOE) 12, no. 03 (March 31, 2016): 70. http://dx.doi.org/10.3991/ijoe.v12i03.5564.

Full text
Abstract:
On-line instruction rather easily accommodates courses in some fields such as history, sociology, business administration and political sciences. However, it poses significant challenges for courses in technical fields that require hands-on experimentation. Courses in computer networking area constitute such an example. Given the demand for on-line courses and the trend for migration to online mode, there is a need to devise strategies that would allow students to conduct computing experiments remotely. Virtualization is a rapidly evolving technology that provides opportunities for online computer education. Through virtualization tools, it is possible to convert brick-and-mortar labs into virtual network labs. Using online virtual network lab tools, students may build, troubleshoot and test networks using their personal computers and, thereby, eliminate the commute to the labs. Cloud technology, another rapidly growing field, can help an organization achieve significant savings in IT services and infrastructure costs, as well as enhance IT support for organizational operations. Confluence of cloud and virtualization technologies present new opportunities for online education. However, there are significant issues to surmount in order to apply these technologies to computing-related courses and in particular to online computer networking courses. This paper presents experiences gained from transforming a traditional computer lab into an online virtual domain at the authors' university. The network lab described in this paper is utilized mostly for graduate computer networking, network security and wireless networking courses. The phased approach depicted in this paper should help academic institutions gain insights into technical and operational challenges in building and operating an online virtual lab.
APA, Harvard, Vancouver, ISO, and other styles
24

Ju, Hanji, Jie Wang, Enguo Zhu, Xiaoli Zhang, and Feng Zheng. "Design Scheme of a Docker Container File Isolation against Computer Virus Spreading." Mathematical Problems in Engineering 2022 (March 28, 2022): 1–6. http://dx.doi.org/10.1155/2022/5348370.

Full text
Abstract:
With the spread of computers and Internet of Things, the destructive power of viruses gradually becomes stronger, which threaten the daily life of people. In order to effectively restrain the virus spreading and reduce economic losses, humans need to hold the law and control of the virus distribution. Docker has obtained significant attention as a lightweight virtualization container technology. Compared to traditional virtualization technologies, docker possesses the advantages of fast deployment, low resource consumption, and high migration capability. Given that the differences between various virtualization technologies and combining the characteristics in electric power systems, this paper designs a scheme of the file isolation system based on docker containers. The isolation scheme could reduce the highly dependence on the underlying operating system in the current application deployment of electric power systems and facilitate the security access to the file system between containers.
APA, Harvard, Vancouver, ISO, and other styles
25

POTTER, SHAYA, OREN LAADAN, RICARDO BARATTO, LEONARD KIM, and JASON NIEH. "MEDIAPOD: A POCKET-SIZED AND PERSONALIZED MULTIMEDIA DESKTOP." International Journal of Semantic Computing 04, no. 02 (June 2010): 181–202. http://dx.doi.org/10.1142/s1793351x10001000.

Full text
Abstract:
We present MediaPod, a portable system that allows mobile users to maintain the same persistent, personalized multimedia desktop environment on any available computer. Regardless of which computer is being used, MediaPod provides a consistent multimedia desktop session, maintaining all of a user's applications, documents and configuration settings. This is achieved by leveraging rapid improvements in capacity, cost, and size of portable storage devices. MediaPod provides a virtualization and checkpoint-restart mechanism that decouples a desktop environment and its applications from the host, enabling multimedia desktop sessions to be suspended to portable storage, carried around, and resumed from the storage device on another computer. MediaPod virtualization also isolates desktop sessions from the host, protecting the privacy of the user and preventing malicious applications from damaging the host. We have implemented a Linux MediaPod prototype and demonstrate its ability to quickly suspend and resume multimedia desktop sessions, enabling a seamless computing experience for mobile users as they move among computers.
APA, Harvard, Vancouver, ISO, and other styles
26

Reeser, Jon, Thomas Jankowski, and Greg M. Kemper. "Maintaining HMI and SCADA Systems Through Computer Virtualization." IEEE Transactions on Industry Applications 51, no. 3 (May 2015): 2558–64. http://dx.doi.org/10.1109/tia.2014.2384132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Han, Bo, and Rongli Zhang. "Virtual Machine Allocation Strategy Based on Statistical Machine Learning." Mathematical Problems in Engineering 2022 (July 5, 2022): 1–6. http://dx.doi.org/10.1155/2022/8190296.

Full text
Abstract:
At present, big data cloud computing has been widely used in many enterprises, and it serves tens of millions of users. One of the core technologies of big data cloud service is computer virtualization technology. The reasonable allocation of virtual machines on available hosts is of great significance to the performance optimization of cloud computing. We know that with the continuous development of information technology and the increasing number of computer users, different virtualization technologies and the increasing number of virtual machines in the network make the effective allocation of virtualization resources more and more difficult. In order to solve and optimize this problem, we propose a virtual machine allocation algorithm based on statistical machine learning. According to the resource requirements of each virtual machine in cloud service, the corresponding comprehensive performance analysis model is established, and the reasonable virtual machine allocation algorithm description of the host in the resource pool is realized according to the virtualization technology type or mode provided by the model. Experiments show that this method has the advantages of overall performance, load balancing, and supporting different types of virtualization.
APA, Harvard, Vancouver, ISO, and other styles
28

Roussos, Kostadis. "Storage Virtualization Gets Smart." Queue 5, no. 6 (September 2007): 38–44. http://dx.doi.org/10.1145/1317394.1317404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Drepper, Ulrich. "The Cost of Virtualization." Queue 6, no. 1 (January 2008): 28–35. http://dx.doi.org/10.1145/1348583.1348591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kotsovinos, Evangelos. "Virtualization: Blessing or Curse?" Queue 8, no. 11 (November 2010): 40–46. http://dx.doi.org/10.1145/1874534.1889916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Vaughan-Nichols, Steven J. "Virtualization Sparks Security Concerns." Computer 41, no. 8 (August 2008): 13–15. http://dx.doi.org/10.1109/mc.2008.276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kroeker, Kirk L. "The evolution of virtualization." Communications of the ACM 52, no. 3 (March 2009): 18–20. http://dx.doi.org/10.1145/1467247.1467253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Darabont, Örs, Konrád József Kiss, and József Domokos. "Evaluation of Different Thin-Client Based Virtual Classroom Architectures." Acta Universitatis Sapientiae Electrical and Mechanical Engineering 8, no. 1 (December 1, 2016): 42–61. http://dx.doi.org/10.1515/auseme-2017-0004.

Full text
Abstract:
AbstractThis paper presents an evaluation of different methods used to deliver virtual machines capable of being accessed remotely by thin-clients. The objective of the research was to provide a recommendation for building a cost-effective computer infrastructure for use in two scenarios: as a programming lab, and as an office infrastructure.We have found that different thin-client solutions based on single board computers are reliable solutions for commercially available thin client replacement, because they can run free Linux-based operating systems, can handle Remote Desktop Protocol, have lower acquisition costs, lower power consumption and offer almost the same computing performance.For providing remote desktops, there are several methods and virtualization platforms available. We benchmarked some of these platforms in order to choose the one best-suited for implementation. Our conclusion is that Microsoft Remote Desktop Services outperforms the virtualization based solutions, but it entails high license fees. Of the virtualization solutions tested, the VMW are ESXi based one is the most reliable choice.
APA, Harvard, Vancouver, ISO, and other styles
34

Simchenko, Natalia A., Natalia V. Apatova, and Oleg L. Korolev. "System analysis of digital economy virtualization processes." Perspectives of Science and Education 50, no. 2 (May 1, 2021): 23–39. http://dx.doi.org/10.32744/pse.2021.2.2.

Full text
Abstract:
The virtualization of socio-economic processes is expressed in the development of various types of economic activities in the Internet computer network, acting as the infrastructure of the modern economic system, a catalyst for globalization processes, and the main means of communication between computers, information systems of various purposes and complexity, and people. The study of the theoretical and methodological problem of digital economy virtualization processes is due to the importance of determining the structure of virtualization as a set of interconnected industries, consumption, markets, and finance on the Internet. The elements of the system combine the types of economic activities, which include entrepreneurship on the Internet, as well as information and intellectual activities. The study of this problem was carried out using empirical methods of cognition of the structure of the system analysis of digital economy virtualization processes, along with the use of scientometric methods for reviewing the methodology of the educational process for training digital economy personnel and improving their qualifications as a precursor to the design of production processes, consumption, market and financial processes occurring in a digital environment. The conducted studies make it possible to obtain scientific results in the field of structuring the socio-economic processes of virtualization, namely: a dichotomy of virtualization processes in the digital economy is proposed, taking into account the factor of education; the positive and negative consequences of virtualization for the economy and society as a whole are identified. It was concluded in the course of the study that the system analysis of digital economy virtualization processes should be based on the development of the educational component and reflect the environment of virtualization processes, including digital platforms, which, first, form the global infrastructure of the world economy; second, they contribute to the development of entrepreneurship; third, they provide production, consumer, market and financial functions and corporate governance; fourth, they are a source of network externalities that create new social and economic problems. The prospect for further research is the development of a model for assessing the impact of the structure of virtualization processes on economic growth in the digital economy.
APA, Harvard, Vancouver, ISO, and other styles
35

Gao, Wu Shi. "Research on Virtualization Technology and Cloud Computing Application." Applied Mechanics and Materials 543-547 (March 2014): 3598–601. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3598.

Full text
Abstract:
This article analyzes the problems of traditional public computer room building hardware life and use efficiency and maintenance management and so on, according to the present situation of construction of university public computer room. Propose a public computer room construction scheme to improve computer efficiency with virtualization technology in cloud computing environment. Through the example, we prove the superiority of the construction cost of public computer room, efficiency in the use, energy consumption, management and maintenance by cloud computing model.
APA, Harvard, Vancouver, ISO, and other styles
36

Kocoloski, Brian, and John Lange. "Improving compute node performance using virtualization." International Journal of High Performance Computing Applications 27, no. 2 (February 28, 2013): 124–35. http://dx.doi.org/10.1177/1094342013476313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Guan, Xueming, and Yaozhi Ma. "Wireless Network Virtualization Resource Sharing considering Dynamic Resource Allocation Algorithm." Advances in Multimedia 2022 (August 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/7338309.

Full text
Abstract:
In order to improve the efficiency of wireless network virtualization resource processing, this paper combines the dynamic resource allocation algorithm to construct a wireless network virtualization resource sharing model. This paper proposes a task-oriented resource management model and uses the task-oriented TRS model to describe resources and service processes, reducing the complexity of formulating resource allocation strategies. Moreover, this paper comprehensively considers factors such as centralized coordination control cost and limited domain topology visibility to improve the dynamic resource allocation algorithm. Through comparative research, it can be seen that the wireless network virtualization resource sharing method proposed in this paper considering the dynamic resource allocation algorithm can effectively improve the processing efficiency of wireless network virtualization resources.
APA, Harvard, Vancouver, ISO, and other styles
38

Hoesing, Michael T. "Virtualization Security Assessment." Information Security Journal: A Global Perspective 18, no. 3 (May 28, 2009): 124–30. http://dx.doi.org/10.1080/19393550902791440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ramegowda, Ashalatha. "An Optimal Virtual Machine Placement Method in Cloud Computing Environment." International journal of electrical and computer engineering systems 13, no. 7 (September 30, 2022): 577–86. http://dx.doi.org/10.32985/ijeces.13.7.10.

Full text
Abstract:
Cloud computing is formally known as an Internet-centered computing technique used for computing purposes in the cloud network. It must compute on a system where an application may simultaneously run on many connected computers. Cloud computing uses computing resources to achieve the efficiency of data centres using the virtualization concept in the cloud. The load balancers consistently allocate the workloads to all the virtual machines in the cloud to avoid an overload situation. The virtualization process implements the instances from the physical state machines to fully utilize servers. Then the dynamic data centres encompass a stochastic modelling approach for resource optimization for high performance in a cloud computing environment. This paper defines the virtualization process for obtaining energy productivity in cloud data centres. The algorithm proposed involves a stochastic modelling approach in cloud data centres for resource optimization. The load balancing method is applied in the cloud data centres to obtain the appropriate efficiency.
APA, Harvard, Vancouver, ISO, and other styles
40

Darabont, Örs, Konrád József Kiss, and József Domokos. "Performance Analysis of Remote Desktop Virtualization based on Hyper-V versus Remote Desktop Services." MACRo 2015 1, no. 1 (March 1, 2015): 125–34. http://dx.doi.org/10.1515/macro-2015-0012.

Full text
Abstract:
AbstractThe fast spread of computer networks and broadband Internet access, and also the development of different operating systems, makes possible to use different virtualization techniques and virtual machines. The release and spread of virtualization platforms makes possible the development of cost-effective information systems that can provide in addition dynamic resource management and simplified system administration. In this paper we present a comparative performance analysis of Remote Desktop Virtualization based on Hyper-V versus Remote Desktop Services. We introduce system architecture for the two tested scenario and test environment including detailed hardware description. The main conclusions of the paper are that despite the higher acquisition and maintenance costs, the Remote Desktop Services outperforms the Hyper-V based Remote Desktop Virtualization in memory, CPU and also storage management.
APA, Harvard, Vancouver, ISO, and other styles
41

Cohen, Fred. "The Virtualization Solution." IEEE Security & Privacy Magazine 8, no. 3 (May 2010): 60–63. http://dx.doi.org/10.1109/msp.2010.108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Lota, Stanislaw, and Marcin Markowski. "Performance Analysis of Virtual Computer Network Based on Cisco Cloud Services Router 1000V in a Private Cloud Environment." Journal of Applied Computer Science Methods 7, no. 2 (November 1, 2015): 117–32. http://dx.doi.org/10.1515/jacsm-2015-0013.

Full text
Abstract:
Abstract Virtualization of physical network devices is a relatively new technology, that allows to improve the network organization and gives new possibilities for Software Defined Networking (SDN). Network virtualization is also commonly used for testing and debugging environments, before implementing new designs in production networks. Important aspect of network virtualization is selecting virtual platform and technology, that offer maximal performance with minimal physical resource utilization. This article presents a comparative analysis of performance of the virtual network created by the virtual CSR1000v and virtual machines running Windows 8.1 on two different virtual private cloud platforms: VMware vSphere 5.5 and Microsoft Hyper-V Server 2012 R2. In such prepared testbed we study the response time (delay) and throughput of virtual network devices.
APA, Harvard, Vancouver, ISO, and other styles
43

Hodgman, Matthew R. "Desktop Virtualization: Applications And Considerations." Contemporary Issues in Education Research (CIER) 6, no. 1 (January 2, 2013): 123. http://dx.doi.org/10.19030/cier.v6i1.7611.

Full text
Abstract:
As educational technology continues to rapidly become a vital part of a school districts infrastructure, desktop virtualization promises to provide cost-effective and education-enhancing solutions to school-based computer technology problems in school systems locally and abroad. This article outlines the history of and basic concepts behind desktop virtualization and discusses obstacles to implementation and benefits that result from its use in educational settings. A large school district in Maryland was used as an entry point to illustrate the potential gains of utilizing desktop virtualization technology. Through use of Bolman and Deals (2008) approach to reframing organizations for change, this article aims to explain what implementation of virtualization technology would require in an applied setting and clarify how all parties in the school-based educational arena will benefit from this technology over time. It was concluded that those entrusted with executive decision-making power in Americas school systems would be wise to consider employing virtualization technology in their classrooms.
APA, Harvard, Vancouver, ISO, and other styles
44

Fan, Li Xian, Yong Zhao Xu, and Hong Tao Li. "Design and Realization of Virtual Computer Cluster System." Advanced Materials Research 271-273 (July 2011): 1313–17. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.1313.

Full text
Abstract:
Virtualization technology has revolted the computer technology. In the paper, we present our virtual computer cluster. The components of computer cluster have been improved by virtualization technology from the actual computer server to virtual server instance. Virtual computer cluster includes front-end machine and the cluster nodes. The front-end machine can be physical machines or virtual machines; the cluster node can also be virtual or physical machine node. The front-end machine of the cluster communicates with the cluster nodes through physical or virtual network adapter. The front-end machine connects with the cluster management software in each node so as to monitor and control every physical or virtual node within the cluster. A single virtual computer cluster extends its resources with adding physical or virtual resources including computing resources, storage resources and etc. within secure and stabile occasions with special needs. The technology can be widely applied to cluster and parallel computing demand but with lower-cost system design scenarios.
APA, Harvard, Vancouver, ISO, and other styles
45

Wahanani, Henni Endah, Mohammad Idhom, and Kiki Yuniar Kristiawan. "Implementation Of Docker Container On Local Network By Applying Reverse Proxy." IJCONSIST JOURNALS 3, no. 1 (December 28, 2021): 34–39. http://dx.doi.org/10.33005/ijconsist.v3i1.59.

Full text
Abstract:
Virtualization is an implementation of a software. Virtualization technology has changed the direction of the computer industrial revolution by reducing capital costs and operating costs. The availability of a virtualization will also increase the availability of higher services and data protection mechanisms. Docker is configured to create multiple containers on a network, each container containing one image. The three containers will be created in one compose where each container is connected to each other for WordPress configuration and two composers will be created. Furthermore, from each compose a reverse proxy configuration is carried out which aims to set a different domain address. Lighten computer performance and can reduce the required storage so as to make hosting more effective and efficient. Containers also provide a security advantage over complete control over management running on separate, isolated containers.
APA, Harvard, Vancouver, ISO, and other styles
46

Wang, Xiaolin, Jiarui Zang, Zhenlin Wang, Yingwei Luo, and Xiaoming Li. "Selective hardware/software memory virtualization." ACM SIGPLAN Notices 46, no. 7 (July 15, 2011): 217–26. http://dx.doi.org/10.1145/2007477.1952710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Chung, JaeWoong, Chi Cao Minh, Austen McDonald, Travis Skare, Hassan Chafi, Brian D. Carlstrom, Christos Kozyrakis, and Kunle Olukotun. "Tradeoffs in transactional memory virtualization." ACM SIGPLAN Notices 41, no. 11 (November 2006): 371–81. http://dx.doi.org/10.1145/1168918.1168903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Cherkaoui, Omar, and Elbiaze Halima. "Network virtualization under user control." International Journal of Network Management 18, no. 2 (March 2008): 147–58. http://dx.doi.org/10.1002/nem.675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Shi, Lei, Hui Ran Zhao, and Kun Zhang. "Research of Computer Virtual Laboratory Model Based on Cloud Computing." Applied Mechanics and Materials 687-691 (November 2014): 3027–31. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3027.

Full text
Abstract:
According to the problems that the current computer lab resource utilization is low, large maintenance workload, update the cost is high Etc. In this paper, the application of cloud computing and virtualization technology, a model of computer laboratory construction based on cloud computing and virtual machine technology are given, good results are obtained through practical application.In recent years, the construction of computer laboratory in our country has achieved great development, Nearly all colleges and Universities have built many computer labs. However, in these completed labs, the computer equipment is single, lack of effective resource integration between devices, resulting in laboratory and the work efficiency is low, professional collaboration is poor, and the lack of stability, security. The emergence of cloud computing and virtualization technologies offers a new way for the construction of computer lab, It can be further standardized computer laboratory work flow from the point of view of technology, improving the operation efficiency of laboratory [1].
APA, Harvard, Vancouver, ISO, and other styles
50

Martyshkin, Alexey I., Dmitry V. Pashchenko, Dmitry A. Trokoz, Mihail P. Sinev, and Boris L. Svistunov. "Using queuing theory to describe adaptive mathematical models of computing systems with resource virtualization and its verification using a virtual server with a configuration similar to the configuration of a given model." Bulletin of Electrical Engineering and Informatics 9, no. 3 (June 1, 2020): 1106–20. http://dx.doi.org/10.11591/eei.v9i3.1714.

Full text
Abstract:
The article describes the issues of preparation and verification of mathematical models of computing systems with resource virtualization. The object of this study is to verify of mathematical models of computer systems with virtualization experimentally by creating a virtual server on the host platform and monitoring its characteristics under load. Known models cannot be applied to the aircraft with virtualization, because they do not allow a comprehensive analysis to determine the most effective option for the implementation of the initial allocation of resources and its optimization for a specific sphere and task of use. The article for the study used a closed queueing network. Simple models for the analysis of various structures of computer systems are experimentally obtained. To implement the properties of adaptability in the models, triggers are used that monitor and adjust the power of the processing channel in individual Queuing systems, depending on the specified conditions. Experiments prove the obtained results reliable and usable as a flexible tool for studying the virtualization properties when structuring computing systems. This knowledge could be of use for businesses interested in optimizing the server configuration for their IT infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography