201 results on '"Desktop virtualization"'
Search Results
2. Towards a GPU-Accelerated Open Source VDI for OpenStack
- Author
-
Bentele, Manuel, von Suchodoletz, Dirk, Messner, Manuel, Rettberg, Simon, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Khosravi, Mohammad R., editor, He, Qiang, editor, and Dai, Haipeng, editor
- Published
- 2022
- Full Text
- View/download PDF
3. Computer Distributed Mirror Storage Algorithm for Desktop Virtualization
- Author
-
Song, Huining, Xhafa, Fatos, Series Editor, Xu, Zheng, editor, Alrabaee, Saed, editor, Loyola-González, Octavio, editor, Zhang, Xiaolu, editor, Cahyani, Niken Dwi Wahyu, editor, and Ab Rahman, Nurul Hidayah, editor
- Published
- 2022
- Full Text
- View/download PDF
4. 멀티코어 기반 어플리케이션 운용을 위한 데스크탑 가상화 구성 및 성능 분석.
- Author
-
박준용
- Subjects
VIRTUAL machine systems ,OFFICE environment ,SCHEDULING ,MULTICORE processors - Abstract
Recently, as Virtual Desktop Infrastructure(VDI) is widely used not only in office work environments but also in workloads that use high-spec multi-core-based applications, the requirements for real-time and stability of VDI are increasing. Accordingly, the display protocol used for remote access in VDI and performance optimization of virtual machines have also become more important. In this paper, we propose two ways to configure desktop virtualization for multi-core-based application operation. First, we propose a codec configuration of a display protocol with optimal performance in a high load situation due to multi-processing. Second, we propose a virtual CPU scheduling optimization method to reduce scheduling delay in case of CPU contention between virtual machines. As a result of the test, it was confirmed that the H.264 codec of Blast Extreme showed the best and stable frame, and the scheduling performance of the virtual CPU was improved through scheduling optimization. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
5. Agile Elastic Desktop Corporate Architecture for Big Data
- Author
-
Kisimov Valentin, Kabakchieva Dorina, Naydenov Aleksandar, and Stefanova Kamelia
- Subjects
agile elastic desktop corporate architecture ,desktop virtualization ,big data ,digital transformation ,Cybernetics ,Q300-390 - Abstract
New challenges in the dynamically changing business environment require companies to experience digital transformation and more effective use of Big Data generated in their expanding online business activities. A possible solution for solving real business problems concerning Big Data resources is proposed in this paper. The defined Agile Elastic Desktop Corporate Architecture for Big Data is based on virtualizing the unused desktop resources and organizing them in order to serve the needs of Big Data processing, thus saving resources needed for additional infrastructure in an organization. The specific corporate business needs are analyzed within the developed R&D environment and, based on that, the unused desktop resources are customized and configured into required Big Data tools. The R&D environment of the proposed Agile Elastic Desktop Corporate Architecture for Big Data could be implemented on the available unused resources of hundreds desktops.
- Published
- 2020
- Full Text
- View/download PDF
6. Desktop Virtualization—Desktop as a Service and Formulation of TCO with Return on Investment
- Author
-
Chawla, Nitin, Kumar, Deepak, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Hoda, M. N., editor, Chauhan, Naresh, editor, Quadri, S. M. K., editor, and Srivastava, Praveen Ranjan, editor
- Published
- 2019
- Full Text
- View/download PDF
7. Scheme of Cloud Desktop Based on Citrix
- Author
-
Liu, Xia, Huo, Xu-lun, Qiu, Zhao, Chen, Ming-rui, Barbosa, Simone Diniz Junqueira, Series Editor, Filipe, Joaquim, Series Editor, Kotenko, Igor, Series Editor, Sivalingam, Krishna M., Series Editor, Washio, Takashi, Series Editor, Yuan, Junsong, Series Editor, Zhou, Lizhu, Series Editor, Zhou, Qinglei, editor, Gan, Yong, editor, Jing, Weipeng, editor, Song, Xianhua, editor, Wang, Yan, editor, and Lu, Zeguang, editor
- Published
- 2018
- Full Text
- View/download PDF
8. NComputing Adoption: Issues and Challenges
- Author
-
Esmael V. Maliberan
- Subjects
ncomputing technology ,adoption ,qualitative analysis ,desktop virtualization ,issues and challenges ,Computer software ,QA76.75-76.765 - Abstract
NComputing Technology is becoming increasingly important and is being used both in academe and business industry because of its capability of saving energy and maintenance costs. However, the adoption of this technology faces with concerns particularly in end users experiences. The paper aimed to examine the collection of some of the issues and challenges facing the NComputing technology adoption in academe particularly in Surigao del Sur State University and offered an initial roadmap to view the challenges and problems for further research. Findings revealed that most of the students were not satisfied with the performance of this technology. But, for technical support, they found it easy to maintain and troubleshoot.
- Published
- 2018
- Full Text
- View/download PDF
9. On the Security of Practical Mail User Agents against Cache Side-Channel Attacks †.
- Author
-
Kim, Hodong, Yoon, Hyundo, Shin, Youngjoo, and Hur, Junbeom
- Subjects
RSA algorithm ,COMPUTER software security ,ENCRYPTION protocols - Abstract
Mail user agent (MUA) programs provide an integrated interface for email services. Many MUAs support email encryption functionality to ensure the confidentiality of emails. In practice, they encrypt the content of an email using email encryption standards such as OpenPGP or S/MIME, mostly implemented using GnuPG. Despite their widespread deployment, there has been insufficient research on their software structure and the security dependencies among the software components of MUA programs. In order to understand the security implications of the structures and analyze any possible vulnerabilities of MUA programs, we investigated a number of MUAs that support email encryption. As a result, we found severe vulnerabilities in a number of MUAs that allow cache side-channel attacks in virtualized desktop environments. Our analysis reveals that the root cause originates from the lack of verification and control over the third-party cryptographic libraries that they adopt. In order to demonstrate this, we implemented a cache side-channel attack on RSA in GnuPG and then conducted an evaluation of the vulnerability of 13 MUAs that support email encryption in Ubuntu 14.04, 16.04 and 18.04. Based on our experiment, we found that 10 of these MUA programs (representing approximately 77% of existing MUA programs) allow the installation of a vulnerable version of GnuPG, even when the latest version of GnuPG, which is secure against most cache side-channel attacks, is in use. In order to substantiate the importance of the vulnerability we discovered, we conducted a FLUSH+RELOAD attack on these MUA programs and demonstrated that the attack restored 92% of the bits of the 2048-bit RSA private key when the recipients read a single encrypted email. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
10. Masaüstü Sanallaştırma Teknolojilerindeki Bağlantı Protokollerinin Karşılaştırılması
- Author
-
Emin Şeşen
- Subjects
masaüstü sanallaştırma ,pcoip ,blast extreme ,rdp ,bant genişliği ,desktop virtualization ,bandwidth ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Science ,Science (General) ,Q1-390 - Abstract
Teknolojinin insan hayatındaki yeri her geçen gün geliştirilen yeniliklerle artarak devam etmektedir. İnsanlar her an,m her yerde masaüstü kaynaklarına erişerek ihtiyaç duyduğu işleri gerçekleştirilebilir. İnterneti olan dizüstü bilgisayar, tablet gibi herhangi bir istemciden kaynağa erişerek masaüstü sanallaştırma sistemini kullanabilir. Yüzlerce, binlerce istemcinin olduğu bir veri merkezindeki ağ cihazlarının trafiğinin yükü oldukça fazla olacaktır. Ayrıca istemcilerin hücresel ağ kullanarak bağlantı sağladıklarında da veri trafiği kendilerine maliyet oluşturacaktır. Bu çalışmada, masaüstü sanallaştırma teknolojilerinde kullanılan PCOIP, Blast Extreme ve RDP protokolleri ile veri merkezine bağlantı sağlanarak, iki farklı çözünürlükte bir video dosyası oynatılarak bir saatlik süre içerisinde kullandığı bant genişlikleri karşılaştırılmıştır. Oluşturulan sonuçlarda düşük çözünürlükte bant genişliği kullanımının RDP ve Blast Extreme protokollerinin yakın olduğu görülmüştür. PCOIP’nin ise yüksek bant genişliği kullandığı gözlenmiştir.
- Published
- 2018
- Full Text
- View/download PDF
11. Economic Aspects of Green ICT
- Author
-
Fernández, Héctor, Procaccianti, Giuseppe, Lago, Patricia, Calero, Coral, editor, and Piattini, Mario, editor
- Published
- 2015
- Full Text
- View/download PDF
12. Research and practice of desktop virtualization platform for university public computer room based on IDV technology.
- Author
-
MIAO Guijun, YOU Feng, LIU Jinhua, ZHANG Jing, and ZHOU Xiaolin
- Abstract
This paper compares the performance and usage scenarios of virtualization products of four main architectures in detail, and analyses the advantages and characteristics of desktop virtualization solutions based on IDV architecture. According to the requirement of experiment teaching in public computer room and the actual use of software and hardware, a desktop virtualization computer experiment teaching management platform based on IDV architecture is constructed and successfully implemented. The related technologies and methods of environment construction are described in detail, and the problems encountered in the use of virtualization platform and the experience gained are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
13. A QoE-perceived screen updates transmission scheme in desktop virtualization environment.
- Author
-
Zheng, Hongdi, Liu, Dong, Wang, Junfeng, and Liang, Jie
- Subjects
DELIVERY of goods ,CLOUD computing ,ECOLOGY - Abstract
As a solution for cloud computing, desktop virtualization realizes the remote execution of applications and feeds back execution results in the form of "screen updates" through network, aiming to offer users the same experience as operating in local systems. It is challenging to achieve this goal since timeliness and reliability should be both guaranteed during the process of screen updates transmission, but the two requirements tend to be difficult to be satisfied simultaneously. Reliable transmission will induce more latency to perform reliable mechanisms, which can influence the timely delivery of screen updates. Timely transmission just provides a best-effort data delivery service, failing to react well to unfavorable network conditions. In order to cope with this problem, we propose a Partially Reliable Transmission Scheme (PRTS) for screen updates transmission in desktop virtualization environment. It tries to make trade-offs between timeliness and reliability and employs a QoE-perceived model to sense the visual quality experienced by users. Distinguished with existing transmission schemes, PRTS adjusts its sending strategy not only according to current network conditions, but also according to users' QoE. The experimental results show that PRTS can improve the transmission efficiency of screen updates and also the visual quality in desktop virtualization environment under different network conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
14. On the Security of Practical Mail User Agents against Cache Side-Channel Attacks
- Author
-
Hodong Kim, Hyundo Yoon, Youngjoo Shin, and Junbeom Hur
- Subjects
cache side-channel attack ,encrypted email ,mail user agent ,GnuPG ,desktop virtualization ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Mail user agent (MUA) programs provide an integrated interface for email services. Many MUAs support email encryption functionality to ensure the confidentiality of emails. In practice, they encrypt the content of an email using email encryption standards such as OpenPGP or S/MIME, mostly implemented using GnuPG. Despite their widespread deployment, there has been insufficient research on their software structure and the security dependencies among the software components of MUA programs. In order to understand the security implications of the structures and analyze any possible vulnerabilities of MUA programs, we investigated a number of MUAs that support email encryption. As a result, we found severe vulnerabilities in a number of MUAs that allow cache side-channel attacks in virtualized desktop environments. Our analysis reveals that the root cause originates from the lack of verification and control over the third-party cryptographic libraries that they adopt. In order to demonstrate this, we implemented a cache side-channel attack on RSA in GnuPG and then conducted an evaluation of the vulnerability of 13 MUAs that support email encryption in Ubuntu 14.04, 16.04 and 18.04. Based on our experiment, we found that 10 of these MUA programs (representing approximately 77% of existing MUA programs) allow the installation of a vulnerable version of GnuPG, even when the latest version of GnuPG, which is secure against most cache side-channel attacks, is in use. In order to substantiate the importance of the vulnerability we discovered, we conducted a FLUSH+RELOAD attack on these MUA programs and demonstrated that the attack restored 92% of the bits of the 2048-bit RSA private key when the recipients read a single encrypted email.
- Published
- 2020
- Full Text
- View/download PDF
15. Open Computer Laboratories Based on Desktop Virtualization Technology
- Author
-
Gao, Guozhu, Wang, Yuefeng, Yang, Jianhong, and Du, Wenjiang, editor
- Published
- 2013
- Full Text
- View/download PDF
16. Towards a Framework and Platform for Mobile, Distributed Workflow Enactment Services on a Possible Future of ERP Infrastructure
- Author
-
Auer, Dagmar, Draheim, Dirk, Geist, Verena, Kopetzky, Theodorich, Küng, Josef, Natschläger, Christine, Piazolo, Felix, editor, and Felderer, Michael, editor
- Published
- 2013
- Full Text
- View/download PDF
17. LVD: A Lightweight Virtual Desktop Management Architecture
- Author
-
Liao, Xiaofei, Xiong, Xianjie, Jin, Hai, Hu, Liting, Boursas, Latifa, editor, Carlson, Mark, editor, Hommel, Wolfgang, editor, Sibilla, Michelle, editor, and Wold, Kes, editor
- Published
- 2008
- Full Text
- View/download PDF
18. An analysis of Approaches for Desktop Virtualization and Challenges
- Author
-
Arun Kumar Yadav, H N Verma, and Rupesh Kumar
- Subjects
Computer science ,Desktop virtualization ,Operating system ,computer.software_genre ,computer - Abstract
In the Information Technology world, cloud computing technology offering unlimited amount of IT resources and services to end users over the internet on pay-per-use basis. End users are accessing the cloud services on their mobile or personal computers. Service providers are upgrading their services very frequently to enhance the services, and to use their upgraded services, end users are also required to update the specification of their devices. But it will be very costly for the end users to upgrade their devices for high specification to use the enhanced services. Desktop Virtualization is an extensive technology of cloud services. It is the new concept, in which users can access the virtual desktop of required specifications, software and operating system on their old devices anytime and anywhere. With the help of desktop virtualization, users will be benefited by avoiding the cost of frequent upgradation of mobile or personal computer system. Desktop virtualization technology is proving to be a boon for large and small organizations who have to upgrade their computer system with new technology, which is a very costly and challenging process. Desktop virtualization avoids upgrading the hardware of the client machine repeatedly. It allows us to access all applications and data at a low cost on our old machine. This paper presents the comparative analysis of various approaches for desktop virtualization and various challenges which required the solution. Analysis presented in paper has been done based on various performance parameters which will provide the end users low-cost cloud services and best performance on their mobile or personal computers.
- Published
- 2021
- Full Text
- View/download PDF
19. 基于"S:计算的语苜实验室的设计及应用.
- Author
-
吴旭, 陈仁安, and 魏德志
- Abstract
The traditional language lab has many shortcomings, for example, teaching function is simple, teaching resource is not sufficient, management model is not uniform, system upgrade is not convenient and so on. Combined with the characteristics of college language lab in teaching and management and the advantages of cloud computing, a new speech lab was designed based on cloud computing and application scenarios. The speech lab has the characteristics of strong function, low cost, easy management and high security. Using cloud computing environment of language laboratory can greatly enrich the teachers^teaching methods, change traditional classroom teacher oriented teaching,also make teachers and students form one-to-one teaching, asynchronous teaching mode is possible. It greatly improves students^learning enthusiasm and initiative and teaching efficiency, can effectively reduce the equipment maintenance and management, and realizes the efficient management. [ABSTRACT FROM AUTHOR]
- Published
- 2017
20. Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems
- Author
-
Jiwu Jing, Jingqiang Lin, Bingyu Li, Qiongxiao Wang, and Ze Wang
- Subjects
021110 strategic, defence & security studies ,Revocation list ,Computer Networks and Communications ,Desktop virtualization ,business.industry ,Computer science ,0211 other engineering and technologies ,02 engineering and technology ,computer.software_genre ,Virtualization ,Certificate ,Virtual machine ,Server ,Certificate authority ,The Internet ,Safety, Risk, Reliability and Quality ,business ,computer ,Computer network - Abstract
To validate a certificate, a user needs to install the certificate of the root certification authority (CA) and download the certificate revocation information (CRI). Although operating systems and browsers manage the certificate trust list (CTL) of publicly-trusted root CAs for global users, locally-trusted root CAs still play an important role and it is difficult for a user to manage its CTL properly by itself. Meanwhile, the CRI access is inefficient, sometimes even unavailable, and causes privacy leakage. We revisit these problems by analyzing the TLS sessions within an organization. To the best of our knowledge, we are the first to analyze CTL management and CRI access on the scale of medium-sized organizations. Based on the analysis, a locally-centralized design is proposed to manage the CTLs of all users by IT administrators and access the CRI services for all users, within an organization. We apply this design to desktop virtualization systems to demonstrate its applicability, and build vCertGuard with oVirt and KVM-QEMU. In vCertGuard, the CTLs of all virtual machines (VMs) are managed in the VM monitors (VMMs). In the CTL, the self-signed certificates of publicly-trusted root CAs are properly configured, while each locally-trusted certificate chain is specified one by one. vCertGuard accesses the CRI services for all VMs, and the downloaded CRI is cached and shared among VMs. Because most TLS servers are visited by multiple users of an organization, it reduces the cost of CRI access. Experimental results of the prototype system show that vCertGuard maintains the CTLs with a negligible overhead, and significantly improves the performance of CRI access.
- Published
- 2021
- Full Text
- View/download PDF
21. Windows überall
- Author
-
Knermann, Christian and Publica
- Subjects
Windows ,Microsoft ,AVD ,Virtualisierung ,Virtual Desktop ,WVD ,WVDAdmin ,Desktop virtualization ,Azure ,Cloud ,Desktopvirtualisierung - Abstract
Microsofts Azure Virtual Desktop, der aus Windows Virtual Desktop hervorging, stellt virtualisierte Desktops und Anwendungen als Clouddienst bereit. Auf Basis der Terminaldienste können Anwender so mit jedem Gerät auf ihre gewohnte Arbeitsumgebung zugreifen. Dabei reicht ein Windows-Image für mehrere parallele Anwendersitzungen.
- Published
- 2022
22. Störungsfreie Übertragung
- Author
-
Knermann, Christian and Publica
- Subjects
Windows ,Microsoft ,AVD ,Virtualisierung ,Hydra ,Virtual Desktop ,Microsoft 365 ,WVDAdmin ,Desktopvirtualisierung ,WVD ,Desktop virtualization ,Azure ,Cloud ,Cloud-PC ,Windows 365 - Abstract
Während Windows 365 unkompliziert zu managen ist, sich aber gleichzeitig nur für kleine Nutzerzahlen an- bietet, steckt hinter Azure Virtual Desktop eine komplexe Remote-Desktop-Umgebung für das Multi-Session-Windows. Doch diese lässt sich nicht an allen Stellen so komfortabel verwalten wie ihr lokales Pendant. Ein Reihe teilweise kostenfreier Tools und Dienste hilft weiter.
- Published
- 2022
23. Vzorčni primeri konfiguriranja virtualiziranih sistemov v poslovnih okoljih
- Author
-
PIRNAT, MATIC and Mraz, Miha
- Subjects
virtualizacija strežnikov ,virtualizacija ,desktop virtualization ,računalniško omrežje ,virtualizacija namizja ,server virtualization ,virtualization ,computer network - Abstract
V diplomski nalogi smo predstavili virtualizacijo v računalniških omrežjih. Najprej smo predstavili glavne vrste virtualizacije, ki se uporabljajo v računalniških omrežjih in opisali nekaj njihovih glavnih prednosti. Vpeljavo virtualizacije v računalniška omrežja smo podkrepili s primeri iz prakse. V primerih smo analizirali stanje pred virtualizacijo, postopek virtualizacije posameznih komponent omrežja in stanje po virtualizaciji, kjer smo predvsem opazovali pridobitve, ki jih je virtualizacija prinesla. Z diplomsko nalogo smo prikazali metode, ki se uporabljajo pri migraciji fizičnih komponent omrežja na virtualne, kot tudi metode za nove implementacije virtualnih instanc v omrežju. Prikazane so tudi prednosti virtualizacije v primerjavi z računalniškimi omrežji, kjer se virtualizacija ne uporablja. In this thesis we presented virtualization in computer networks. Firstly, we exhibited the main types of virtualization used in computer networks and described some of their main advantages. The incorporation of virtualization in computer networks was supported by practical examples. In each case we analyzed the state before virtualization, the process of virtualization of individual network components and the state after virtualization, where we mainly observed the gains that virtualization has brought. With the thesis we portrayed the methods used in the physical-to-virtual migration of network components, as well as methods for new implementations of virtual instances in the network. We have also displayed the advantages of virtualization, compared to computer networks where virtualization is not used.
- Published
- 2022
24. The optimization of Transparent-Desktop service mechanism based on SPICE.
- Author
-
Li, Weimin, Wang, Bin, Yu, Jiaqi, Zhu, Chong, Xiao, Sinuo, and Sheng, Jinfang
- Subjects
DESKTOP environments (Computer interfaces) ,VIRTUAL machine systems ,COMPUTER systems ,DIGITAL computer simulation - Abstract
Desktop virtualization, which is to make the desktop virtual so that users can access any application through the network with any devices at any time and any place, is being widely used now as an emerging trend. However, it is important to further improve this approach while maintaining good user experience. Though the simple protocol for independent computing environments as a virtual desktop solution can achieve a user experience similar to an interaction with a local machine, there are still many deficiencies in it. For instance, it cannot apply to environment of high controllability of user, and the quality of graphic interactive experience is to be improved. In this paper, to meet QoE requirements of user, we build a feasible file transfer and sharing mechanism and propose a graphics subsystem optimization strategy based on simple protocol for independent computing environments (SPICE), namely Transparent Desktop. We also verify that the Transparent Desktop can provide users with ubiquitous desktop services of higher efficiency, stronger user-controllability and better QoE through the experimental. Copyright © 2016 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
25. vMobiDesk: Desktop Virtualization for Mobile Operating Systems
- Author
-
Liang Gu, Wenzhi Chen, Kui Su, Peiyu Liu, Kai Hwang, and Zhibin Yu
- Subjects
General Computer Science ,BYOD ,Desktop virtualization ,Computer science ,mobile device ,Cloud computing ,02 engineering and technology ,computer.software_genre ,virtual desktop ,020204 information systems ,Server ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Android (operating system) ,020203 distributed computing ,Mobile operating system ,business.industry ,General Engineering ,Virtualization ,Mobile cloud computing ,Operating system ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,android ,business ,lcsh:TK1-9971 ,Mobile device ,computer - Abstract
Smart mobile devices have significantly increased the popularity of Bring-Your-Own-Device (BYOD) at work, as they benefit people's daily lives. However, BYOD comes with several challenging issues such as limited hardware capacity, frequent upgrades of applications, and security and privacy concerns. Virtual Mobile Infrastructure (VMI), a general framework that provides more reliable and secure solution for BYOD, has therefore been proposed. The key of VMI is to host a mobile Operating System (OS) on a remote cloud data center, and run mobile applications on it. However, VMI faces performance challenge as it needs to display the entire virtualized desktop on a mobile device while the real content of the desktop is on a remote server. To address the performance challenge, we design and implement a VMI named vMobiDesk on top of Android with optimized network transfer mechanisms and display virtualization. In particular, vMobiDesk focuses on virtualizing the display of Android desktops, redirecting users' input events, providing audio support and remote camera. The experimental results show that vMobiDesk has low virtualization overhead, as well as enables mobile users to obtain good experiences with BYOD applications.
- Published
- 2020
- Full Text
- View/download PDF
26. Fast Access to Remote Objects 2.0 a renewed gateway to ENEAGRID distributed computing resources
- Author
-
Giulio D'Amato, G. Aprea, Fiorenzo Ambrosino, Agostino Funel, Giovanni Bracco, Francesco Buonocore, Silvio Migliori, Angelo Mariano, Filippo Palombi, Simone Giusepponi, Samuele Pierattini, Massimo Celino, Antonio Colavincenzo, Marco Fina, Guido Guarnieri, Giovanni Ponti, and Giuseppe Santomauro
- Subjects
Focus (computing) ,HTML5 ,Computer Networks and Communications ,business.industry ,Desktop virtualization ,Computer science ,Distributed computing ,02 engineering and technology ,Gateway (computer program) ,JavaScript ,Remote Desktop Protocol ,User experience design ,Hardware and Architecture ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,Software ,computer.programming_language ,Graphical user interface - Abstract
This paper introduces a renewed gateway to ENEAGRID distributed computing resources named Fast Access to Remote Objects 2.0 (FARO 2.0). FARO 2.0 is a tool for application and desktop virtualization with a focus towards user experience (UX), providing trained as well as untrained users with a collection of centralized services that can be seamlessly used on their client through a remote desktop protocol. FARO 2.0 is a JavaFX application whose graphical user interface (GUI) and whose main logics have been implemented through the well-known Web technologies (HTML5, CSS3, Javascript) for easier maintainability and customizability, taking full advantage of the WebView component. The FARO 2.0 framework has been deployed both as a general purpose GUI for remote user access to ENEAGRID resources and as a specialized application or workflow-oriented GUI. They are applied in a set of applicative domains, ranging from materials science to technologies for energy and industry, environmental modeling, and nuclear fusion. Some examples and results are also presented.
- Published
- 2019
- Full Text
- View/download PDF
27. Performance Analysis of Different Operating System for Desktop Virtualization in Vmware Using Rdp Protocol
- Author
-
Nishi Yadav, Pragya Ram Nanwani, and Mehnaz Nazneen Baig
- Subjects
Desktop virtualization ,Computer science ,Operating system ,computer.software_genre ,Protocol (object-oriented programming) ,computer - Published
- 2019
- Full Text
- View/download PDF
28. A behavioral anomaly detection strategy based on time series process portraits for desktop virtualization systems.
- Author
-
Liu, Yanbing, Yuan, Zhong, Xing, Congcong, Gong, Bo, Xiao, Yunpeng, and Liu, Hong
- Subjects
- *
ANOMALY detection (Computer security) , *TIME Series Processor (Computer program language) , *VIRTUAL machine systems , *CLIENT/SERVER computing , *MOTHERBOARDS , *MARKOV processes - Abstract
As the application of desktop virtualization systems (DVSs) continues to gain momentums, the security issue of DVSs becomes increasingly critical and is extensively studied. Unfortunately, the majority of current researches on DVSs only focuses on the virtual machines (VMs) on the servers, and overlooks to a large extent the security issue of the clients. In addition, traditional security techniques are not completely suitable for the DVSs' particularly thin client environment. Towards finding a solution to these problems, we propose a novel behavioral anomaly detection method for DVS clients by creating and using process portraits. Based on the correlations between users, virtualized desktop processes (VDPs), and VMs in DVSs, this proposed method describes the process behaviors of clients by the CPU utilization rates of VMs located on the server, constructs process portraits for VDPs by hidden Markov models and by considering the user profiles, and detects anomalies of VDPs by contrasting VDPs' behaviors against the constructed process portraits. Our experimental results show that the proposed method is effective and successful. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
29. Energy-Oriented Partial Desktop Virtual Machine Migration.
- Author
-
BILA, NILTON, WRIGHT, ERIC J., LARA, EYAL DE, JOSHI, KAUSTUBH, ANDRÉS LAGAR-CAVILLA, H., PARK, EUNBYUNG, GOEL, ASHVIN, HILTUNEN, MATTI, and SATYANARAYANAN, MAHADEV
- Subjects
- *
VIRTUAL machine systems , *PERSONAL computers , *COMPUTERS , *APPLICATION software , *METADATA , *COMPUTER storage devices - Abstract
Modern offices are crowded with personal computers. While studies have shown these to be idle most of the time, they remain powered, consuming up to 60% of their peak power. Hardware-based solutions engendered by PC vendors (e.g., low-power states, Wake-on-LAN) have proved unsuccessful because, in spite of user inactivity, these machines often need to remain network active in support of background applications that maintain network presence. Recent proposals have advocated the use of consolidation of idle desktop Virtual Machines (VMs). However, desktop VMs are often large, requiring gigabytes of memory. Consolidating such VMs creates large network transfers lasting in the order of minutes and utilizes server memory inefficiently. When multiple VMsmigrate concurrently, networks become congested, and the resulting migration latencies are prohibitive.We present partial VM migration, an approach that transparently migrates only the working set of an idle VM. It creates a partial replica of the desktop VMon the consolidation server by copying onlyVM metadata, and it transfers pages to the server on-demand, as the VM accesses them. This approach places desktop PCs in low-power mode when inactive and switches them to running mode when pages are needed by the VM running on the consolidation server. To ensure that desktops save energy, we have developed sleep scheduling and prefetching algorithms, as well as the context-aware selective resume framework, a novel approach to reduce the latency of power mode transition operations in commodity PCs. Jettison, our software prototype of partial VM migration for off-the-shelf PCs, can deliver 44-91% energy savings during idle periods of at least 10 minutes, while providing low migration latencies of about 4 seconds and migrating minimal state that is under an order of magnitude of the VM's memory footprint. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
30. A Keystroke-based Continuous User Authentication in Virtual Desktop Infrastructure
- Author
-
Bibo Tu, Lulu Yang, Ruibang You, and Chen Li
- Subjects
Password ,Authentication ,business.product_category ,Desktop virtualization ,Computer science ,Login ,Keystroke logging ,computer.software_genre ,Virtual machine ,Internet access ,Operating system ,business ,Virtual desktop ,computer - Abstract
Demand for remote work has surged as the COVID-19 epidemic has spread around the world. As one of the main implementations of desktop virtualization, Virtual Desktop Infrastructure (VDI) is popular and widely used in corporate remote work. A VDI user can connect to and use a virtual machine in a remote data center by logging in with a username and password using any device anywhere with Internet access. VDI has mobile convenience but is at risk of password leakage and insider threat. Traditional authentication methods, such as password and PIN, cannot withstand these threats. This work presents a keystroke-based continuous user authentication based on the Bidirectional Long Short-Term Memory (Bi-LSTM) network and embedding mechanism in deep learning to defend against such risks. It verifies the current user's identity based on the user's typing behavior continuously and non-invasively. We implement it on SPICE VDI and evaluate its performance and deployment feasibility on a public keystroke dataset - the Clarkson II dataset, which collected in uncontrolled and natural settings. The results show that it achieves state-of-art performance. It detects intruders with 8.28% of EER when only using 30 keystrokes and 0.85% of EER when using 990 keystrokes.
- Published
- 2021
- Full Text
- View/download PDF
31. Adaptive dynamic priority scheduling for virtual desktop infrastructures.
- Author
-
Hwang, Jinho and Wood, Timothy
- Abstract
Virtual Desktop Infrastructures (VDIs) are gaining popularity in cloud computing by allowing companies to deploy their office environments in a virtualized setting instead of relying on physical desktop machines. Consolidating many users into a VDI environment can significantly lower IT management expenses and enables new features such as “available-anywhere” desktops. However, barriers to broad adoption include the slow performance of virtualized I/O, CPU scheduling interference problems, and shared-cache contention. In this paper, we propose a new soft real-time scheduling algorithm that employs flexible priority designations (via utility functions) and automated scheduler class detection (via hypervisor monitoring of user behavior) to provide a higher quality user experience. We have implemented our scheduler within the Xen virtualization platform, and demonstrate that the overheads incurred from co-locating large numbers of virtual machines can be reduced from 66% with existing schedulers to under 2% in our system. We evaluate the benefits and overheads of using a smaller scheduling time quantum in a VDI setting, and show that the average overhead time per scheduler call is on the same order as the existing SEDF and Credit schedulers. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
32. Introduction to VMware Workstation
- Author
-
Brendan Choi
- Subjects
Software_OPERATINGSYSTEMS ,business.product_category ,Workstation ,Computer science ,Desktop virtualization ,Hypervisor ,Python (programming language) ,computer.software_genre ,Virtualization ,Networking hardware ,law.invention ,law ,Virtual machine ,Laptop ,Operating system ,business ,computer ,computer.programming_language - Abstract
VMware Workstation Pro is one of the most popular end-user desktop virtualization solutions used by enterprise IT personnel. It allows IT engineers to build and test real-world-like virtual machines and network devices from their own PC/laptop. Learning to build a fully functioning and integrated virtual lab on a single computer and master Python network automation basics on a single PC is this book’s underlying goal. This chapter is designed to teach you the basics of the most popular and versatile VMware product, VMware Workstation 15 Pro, and basic virtualization concepts. After reading this chapter, you will gain the following knowledge: you’ll understand the difference between Type-1 and Type-2 hypervisors, understand various IT vendors offering different desktop virtualization solutions, learn how to install VMware Workstation, learn how to perform general administration on VMware Workstation, and understand how VMware Workstation’s network adapters operate.
- Published
- 2021
- Full Text
- View/download PDF
33. An original-stream based solution for smoothly replaying high-definition videos in desktop virtualization systems.
- Author
-
Su, Kui, Wang, Zonghui, Lu, Xuequan, and Chen, Wenzhi
- Subjects
- *
HIGH definition video recording , *VIRTUAL reality , *MOTHERBOARDS , *BANDWIDTHS , *COMPUTER systems , *DECODING algorithms - Abstract
Existing desktop virtualization systems suffer from a very limited performance in replaying high-definition videos remotely: intolerable CPU and bandwidth consumption, high response delay and poor video quality. In this paper, we propose an original-stream based solution to provide good user experience for replaying high-definition videos in desktop virtualization systems without any modification on applications and support most of prevalent high-definition video formats. In our solution, server׳s video content is not decoded on server but intercepted and delivered to client in its originally encoded state, so that the video content can be easily stored and transported in computer systems with high quality and low bandwidth. The encoded video content is intercepted in server׳s display driver, which enables HDR to work seamlessly with existing applications. The extremely CPU-intensive video decoding tasks are executed on client by using GPU-accelerated video decoding technology so that CPU can concentrate on other tasks. The experimental results validate our method and show that this proposed approach measurably outperforms state-of-the-art solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
34. Information System Design and Implementation Based on Security Desktop Virtualization Technology.
- Author
-
LEI Jing
- Subjects
COMPUTER network security ,SECURITY systems industry ,COMPUTER architecture ,SYSTEMS design ,PERSONAL computers ,SYSTEM analysis - Abstract
Through analyzing the design requirement of security desktop virtualization information system, this paper presents safety virtualization technology of "white list" security mechanism, virtualization layer security technology of optimization design, and virtual machine security technology of resources and network layer isolation. On the basis, the overall architecture of security desktop virtualization information system is built, and also the system realization and typical application scenario are given. Research in this paper provides a safe, easy management, low cost solution of desktop cloud architecture for enterprise, improves the level of core technology on cloud computing security, and promotes the development of independent controllable high security cloud computing products. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
35. Construction of Computer Laboratory and Multimedia Classroom Management System Supported by Technology of Desktop Virtualization.
- Author
-
YU Chong-chong and HUANG Li-ping
- Subjects
- *
LABORATORIES , *COMPUTATION laboratories , *CLASSROOM management , *TECHNOLOGY , *UNIVERSITIES & colleges - Abstract
In order to solve the complexity and difficulties in laboratory management and maintenance, an overall and m-depth construction was made for the computer laboratory and multimedia classroom management supported by technology of desktop virtualization, and a comprehensive service system was proposed. Its design not only takes into consideration the requirements of management and maintenance staff as well as management department, but also takes full account of the various requirements of computer laboratory and multimedia classroom users. The system implemented can provide complete support and efficient comprehensive service to those requirements, hence, it gives a fine solution to the problems existing nowadays in the management, maintenance and the use of computer laboratories and multi-media classrooms in colleges and universities. [ABSTRACT FROM AUTHOR]
- Published
- 2014
36. Design and Implementation of Operating System in Distributed Computer System Based on Virtual Machine
- Author
-
Xing Rong
- Subjects
Computer science ,Desktop virtualization ,business.industry ,Process (computing) ,Cloud computing ,Transparency (human–computer interaction) ,computer.software_genre ,Virtualization ,Memory management ,Virtual machine ,Operating system ,business ,Host (network) ,computer - Abstract
Distributed computer network system is a network system with high cohesion, transparency and autonomy. Users of a distributed system see a single, high-performance and high-reliability data computing and processing system with a large number of resources. With the long-term development of virtualization technology, the performance of virtual machine can meet many application requirements, especially for the virtualization of processor and memory, which has reached the performance similar to that of physical host. With the popularity of desktop virtualization technology, many enterprises begin to deploy desktop virtualization system. Nowadays, the virtual machine with certain characteristics and performance advantages has gradually matured after a long time of development, and has been widely used in computer related industries. Based on the connotation and characteristics of virtual machine, this paper analyzes and studies the design and implementation process of operating system in distributed computer system.
- Published
- 2020
- Full Text
- View/download PDF
37. Design Ideas of Mobile Internet Desktop System Based on Virtualization Technology in Cloud Computing
- Author
-
Fang Wan, Jiaoli Zhou, and Na Chang
- Subjects
Workstation ,business.industry ,Computer science ,Desktop virtualization ,Cloud computing ,Information security ,Virtualization ,computer.software_genre ,Rendering (computer graphics) ,law.invention ,Software ,law ,Operating system ,Graphics ,business ,computer - Abstract
Virtualization technology is rapidly spreading to all IT fields. For different application scenarios, server-based computing has different advantages. Cloud computing is a hot research topic at home and abroad recently. Software and hardware resources are shared through virtualization technology, and then provided to corresponding cloud computing services according to user needs. This paper mainly studies a mobile Internet desktop delivery method and system based on virtualization infrastructure. It consists of VDI system, diskless workstation system and unified storage system. In this scheme, by modifying the virtual graphics driver of desktop cloud server, the video player starts GPU video acceleration by default to process HD video, and at the same time, the original stream of undecoded HD video and processing instructions are sent to the client for decoding and rendering in real time in the virtual graphics driver layer. It provides a reference for future large-scale construction of desktop cloud system, comprehensive replacement of traditional PC, reduction of operation and management costs, and improvement of enterprise information security.
- Published
- 2020
- Full Text
- View/download PDF
38. Despliegue de una plataforma de VDI en una universidad
- Author
-
Losada Dans, Alén and Castillo Pedrosa, José Manuel
- Subjects
xarxes locals ,Operating systems (Computers) -- TFG ,local networks ,redes locales ,desktop virtualization ,Sistemas operativos (Ordenadores) -- TFG ,arquitectura hiperconvergente ,virtualización de escritorio ,virtualització d'escriptori ,virtualización redes ,hyperconverged architecture ,Sistemes operatius (Ordinadors) -- TFG ,arquitectura hiperconvergent - Abstract
El propósito de este proyecto es explicar el proceso de diseño e implementación de una infraestructura virtual que pueda dotar a una universidad de escritorios virtuales (VDI), aunque también puede encajar en otras organizaciones de ámbito público y privado. Esta tecnología proporciona acceso al puesto de trabajo desde las redes locales y desde cualquier lugar con acceso a internet, dotando a los usuarios de total movilidad e integración multidispositivo (portátil, tablet, smartphone, thin client ...). Además, facilita el desarrollo del teletrabajo y promueve la eficiencia del usuario en su desempeño diario. En este trabajo se analizan las ventajas que puede proporcionar VDI, con el fin de demostrar porque es provechoso su implementación para una organización. También se realiza una comparativa entre las soluciones líderes del mercado y se justifica la elegida. El diseño de la infraestructura se realiza con el fin de garantizar un servicio robusto, seguro, eficiente y con alta disponibilidad. Para ello se opta por una arquitectura hiperconvergente, en la que el dato, la red y el cómputo se encuentran virtualizados. La implementación se realiza siguiendo las buenas prácticas recomendadas por los fabricantes elegidos y el producto final es una plataforma virtual que provee a los usuarios de la universidad de escritorios virtuales para facilitar y mejorar sus condiciones de trabajo diario. El propòsit d'aquest projecte és explicar el procés de disseny i implementació d'una infraestructura virtual que pugui dotar a una universitat d'escriptoris virtuals (VDI), encara que també pot encaixar en altres organitzacions d'àmbit públic i privat. Aquesta tecnologia proporciona accés al lloc de treball des de les xarxes locals i des de qualsevol lloc amb accés a internet, dotant als usuaris de total mobilitat i integració multidispositiu (portàtil, tauleta, telèfon intel·ligent, thin client ...). A més, facilita el desenvolupament del teletreball i promou l'eficiència de l'usuari en el seu acompliment diari. En aquest treball s'analitzen els avantatges que pot proporcionar VDI, amb la finalitat de demostrar perquè és profitós la seva implementació per a una organització. També es realitza una comparativa entre les solucions líders del mercat i es justifica la triada. El disseny de la infraestructura es realitza amb la finalitat de garantir un servei robust, segur, eficient i amb alta disponibilitat. Per a això s'opta per una arquitectura hiperconvergent, en la qual la dada, la xarxa i el còmput es troben virtualitzats. La implementació es realitza seguint les bones pràctiques recomanades pels fabricants triats i el producte final és una plataforma virtual que proveeix als usuaris de la universitat d'escriptoris virtuals per a facilitar i millorar les seves condicions de treball diari. The main purpose of this project is to explain the design and implementation process of a virtual infrastructure that can provide a university with virtual desktops, although it can be also useful to other public and private organizations. This technology provides access to the workplace from local networks and from any place that has Internet access, and it allows a total mobility and multi-device integration (laptop, tablet, smartphone, thin client...). Furthermore, it contributes to housework development and promotes the efficiency of the user's daily performance. The advantages of the VDI are analysed in this work in order to prove that its implementation can be helpful in an organization. In addition, it is shown a comparison of the main market leading solutions and it is justified the chosen one. The infraestructure design is carried out to ensure a robust, safe and efficient service with high availability. For that purpose, it is preferred a hyperconverged architecture in which the data, the network and the computation are virtualized. The implementation is made following the good practices recommended by the chosen manufacturers and the result is a virtual platform that provides users of the university with virtual desktops to facilitate and improve their daily working conditions.
- Published
- 2020
39. Enterprise Virtual Desktop Infrastructure Architecture on OpenStack Cloud with Lightweight Directory Access Protocol
- Author
-
Crs Kumar and Subhash Nehra
- Subjects
Computer science ,business.industry ,Desktop virtualization ,020207 software engineering ,Hypervisor ,Provisioning ,Cloud computing ,02 engineering and technology ,computer.software_genre ,Lightweight Directory Access Protocol ,Virtual machine ,Connection broker ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,020201 artificial intelligence & image processing ,business ,Virtual desktop ,computer - Abstract
Virtual Desktop Infrastructure (VDI) is a Virtualized Technology that hosts the user’s desktop at Datacenter Server. OpenStack is the most successful opensource enterprise cloud platform. Cloud-based VDI, also known as “Desktop as a Service” or DaaS, increases utilization of Datacenter infrastructure, provides high elasticity, increases service diversity, and improves scalability. It also allows for prioritizing delivering value, give the choices to use a wide range of hypervisor/storage/network. In this paper, an architecture proposed that comprises three major components that are, hypervisor, connection broker, and display protocol for enterprise-level VDI on OpenStack. The hypervisor used to host many virtual machines on a single hardware. Connection broker used for configuring, inventorying, provisioning, and centralized management of desktops and display protocol allows users to view the desktop that hosted at Datacenter. Lightweight Directory Access Protocol (LDAP) used for user authentication and authorization for desktops. In the paper, we explore the architecture design and implementation of the VDI system on OpenStack and verifies the experiment results.
- Published
- 2020
- Full Text
- View/download PDF
40. On the Security of Practical Mail User Agents against Cache Side-Channel Attacks
- Author
-
Youngjoo Shin, Hyundo Yoon, Junbeom Hur, and Hodong Kim
- Subjects
Desktop virtualization ,Computer science ,Cryptography ,cache side-channel attack ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,lcsh:Technology ,Public-key cryptography ,lcsh:Chemistry ,User agent ,Email encryption ,GnuPG ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Side channel attack ,Instrumentation ,lcsh:QH301-705.5 ,Fluid Flow and Transfer Processes ,encrypted email ,business.industry ,lcsh:T ,Process Chemistry and Technology ,General Engineering ,mail user agent ,021001 nanoscience & nanotechnology ,lcsh:QC1-999 ,Computer Science Applications ,lcsh:Biology (General) ,lcsh:QD1-999 ,lcsh:TA1-2040 ,desktop virtualization ,020201 artificial intelligence & image processing ,Cache ,0210 nano-technology ,business ,lcsh:Engineering (General). Civil engineering (General) ,computer ,lcsh:Physics - Abstract
Mail user agent (MUA) programs provide an integrated interface for email services. Many MUAs support email encryption functionality to ensure the confidentiality of emails. In practice, they encrypt the content of an email using email encryption standards such as OpenPGP or S/MIME, mostly implemented using GnuPG. Despite their widespread deployment, there has been insufficient research on their software structure and the security dependencies among the software components of MUA programs. In order to understand the security implications of the structures and analyze any possible vulnerabilities of MUA programs, we investigated a number of MUAs that support email encryption. As a result, we found severe vulnerabilities in a number of MUAs that allow cache side-channel attacks in virtualized desktop environments. Our analysis reveals that the root cause originates from the lack of verification and control over the third-party cryptographic libraries that they adopt. In order to demonstrate this, we implemented a cache side-channel attack on RSA in GnuPG and then conducted an evaluation of the vulnerability of 13 MUAs that support email encryption in Ubuntu 14.04, 16.04 and 18.04. Based on our experiment, we found that 10 of these MUA programs (representing approximately 77% of existing MUA programs) allow the installation of a vulnerable version of GnuPG, even when the latest version of GnuPG, which is secure against most cache side-channel attacks, is in use. In order to substantiate the importance of the vulnerability we discovered, we conducted a FLUSH+RELOAD attack on these MUA programs and demonstrated that the attack restored 92% of the bits of the 2048-bit RSA private key when the recipients read a single encrypted email.
- Published
- 2020
41. Research on development and application of remote control system for multimedia classroom based on cloud computing
- Author
-
Tianwen Huang and Fei Jiao
- Subjects
Classroom management ,Multimedia ,Computer science ,Desktop virtualization ,business.industry ,05 social sciences ,Educational technology ,050301 education ,Serial port ,Cloud computing ,Library and Information Sciences ,computer.software_genre ,Education ,law.invention ,Campus network ,Virtual machine ,law ,0502 economics and business ,ComputingMilieux_COMPUTERSANDEDUCATION ,050211 marketing ,business ,0503 education ,computer ,Remote control - Abstract
Aiming at many problems of school multimedia classroom management, a remote control system for multimedia classroom based on cloud computing is developed. The system includes cloud computing management platform, network switch, single-chip microcomputer and equipment in the multimedia classrooms. It uses VMware desktop virtualization technology to deploy virtual machine templates of different courses in each classroom through the campus network. It controls all multimedia equipment in each classroom by single-chip microcomputer remote control. In terms of software and hardware, key problems such as multithreading, socket communication and remote control are solved and a single-chip microcomputer is developed to control the classroom equipment through the serial ports automatically. Compared with the traditional system, the system based on cloud computing has the advantages of rapid deployment and unified management. It improves the teaching effects of multimedia course and it reduces the construction and maintenance of multimedia classrooms.
- Published
- 2018
- Full Text
- View/download PDF
42. A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization.
- Author
-
Yuezhi Zhou, Yaoxue Zhang, Hao Liu, Naixue Xiong, and Vasilakos, Athanasios V.
- Abstract
Advancements in cloud computing enable the easy deployment of numerous services. However, the analysis of cloud service access platforms from a client perspective shows that maintaining and managing clients remain a challenge for end users. In this paper, we present the design, implementation, and evaluation of an asymmetric virtual machine monitor (AVMM), which is an asymmetric partitioning-based bare-metal approach that achieves near-native performance while supporting a new out-of-operating system mechanism for value-added services. To achieve these goals, AVMM divides underlying platforms into two asymmetric partitions: a user partition and a service partition. The user partition runs a commodity user OS, which is assigned to most of the underlying resources, maintaining end-user experience. The service partition runs a specialized OS, which consumes only the needed resources for its tasks and provides enhanced features to the user OS. AVMM considerably reduces virtualization overhead through two approaches: 1) Peripheral devices, such as graphics equipment, are assigned to be monopolized by a single user OS. 2) Efficient resource management mechanisms are leveraged to alleviate complicated resource sharing in existing virtualization technologies. We implement a prototype that supports Windows and Linux systems. Experimental results show that AVMM is a feasible and efficient approach to client virtualization. [ABSTRACT FROM PUBLISHER]
- Published
- 2014
- Full Text
- View/download PDF
43. Research on desktop virtualization technology based on SPICE protocol and its Improvement solutions.
- Author
-
XU Hao and LAN Yu-qing
- Abstract
With the continuous development of cloud computing, the virtual desktop solution becomes increasingly mature and the desktop virtualization becomes a typical cloud computing application. Virtual desktop technology can effectively solve those problems when using traditional personal computers and also reduce maintenance costs, which draws industries' attentions. As an open source desktop delivery protocol, SPICE has its own unique architecture and characteristics. Using SPICE protocol, virtual desktops can be deployed between servers and remote terminal clients with good quality of user experiences. However, SPICE protocol has its own drawbacks, and it is not suitable for low-bandwidth networks. Virtual desktop technology is introduced and the theories of virtual desktop delivery protocols as well as factors that affect virtual desktop performances are analyzed. Based on the analysis, the architecture of SPICE virtual desktop solution and its core technology are further analyzed. Finally the drawbacks of SPICE protocol are pointed out and some improvements methods without affecting QoE are proposed, which will play a guide role for the development of virtual desktop technology. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
44. Client Rendering Method for Desktop Virtualization Services.
- Author
-
Su Min Jang, Won Hyuk Choi, and Won Young Kim
- Subjects
CLOUD computing ,SOFTWARE as a service ,COMPUTER software ,PERSONAL computers ,INFORMATION technology ,PERFORMANCE evaluation - Abstract
Cloud computing has recently become a significant technology trend in the IT field. Among the related technologies, desktop virtualization has been applied to various commercial applications since it provides many advantages, such as lower maintenance and operation costs and higher utilization. However, the existing solutions offer a very limited performance for 3D graphics applications. Therefore, we propose a novel method in which rendering commands are not executed at the host server but rather are delivered to the client through the network and are executed by the client's graphics device. This method prominently reduces server overhead and makes it possible to provide a stable service at low cost. The results of various experiments prove that the proposed method outperforms all existing solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
45. Serviços em Cloud na Ótica de Utilização Empresarial.
- Author
-
Marchão, Joaquina and Reis, Leonilde
- Abstract
Copyright of Revista de Ciências da Computação is the property of Universidade Aberta and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2013
46. Economic analysis of cloud-based desktop virtualization implementation at a hospital.
- Author
-
Sooyoung Yoo, Seok Kim, TaeKi Kim, Rong-Min Baek, Chang Suk Suh, Chin Youb Chung, and Hee Hwang
- Subjects
- *
HOSPITALS , *CLOUD computing , *VIRTUAL reality , *DECISION making - Abstract
Background: Cloud-based desktop virtualization infrastructure (VDI) is known as providing simplified management of application and desktop, efficient management of physical resources, and rapid service deployment, as well as connection to the computer environment at anytime, anywhere with anydevice. However, the economic validity of investing in the adoption of the system at a hospital has not been established. Methods: This study computed the actual investment cost of the hospital-wide VDI implementation at the 910-bed Seoul National University Bundang Hospital in Korea and the resulting effects (i.e., reductions in PC errors and difficulties, application and operating system update time, and account management time). Return on investment (ROI), net present value (NPV), and internal rate of return (IRR) indexes used for corporate investment decision-making were used for the economic analysis of VDI implementation. Results: The results of five-year cost-benefit analysis given for 400 Virtual Machines (VMs; i.e., 1,100 users in the case of SNUBH) showed that the break-even point was reached in the fourth year of the investment. At that point, the ROI was 122.6%, the NPV was approximately US$192,000, and the IRR showed an investment validity of 10.8%. From our sensitivity analysis to changing the number of VMs (in terms of number of users), the greater the number of adopted VMs was the more investable the system was. Conclusions: This study confirms that the emerging VDI can have an economic impact on hospital information system (HIS) operation and utilization in a tertiary hospital setting. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
47. Comparing RDP and PCoIP Protocols for Desktop Virtualization in VMware Environment
- Author
-
Edy Kristianto, Louis Casanova, and Marcel
- Subjects
General Energy ,Health (social science) ,General Computer Science ,Desktop virtualization ,Computer science ,General Mathematics ,General Engineering ,Operating system ,computer.software_genre ,computer ,General Environmental Science ,Education - Published
- 2018
- Full Text
- View/download PDF
48. Virtualization Environment for Computer Labs to Maintain Security, Stability and Availability
- Author
-
Abdalla Alameen
- Subjects
Workstation ,Desktop virtualization ,Computer science ,Operational availability ,Control (management) ,Stability (learning theory) ,Virtualization ,computer.software_genre ,law.invention ,Engineering management ,law ,Human–computer interaction ,Sandbox (computer security) ,ComputingMilieux_COMPUTERSANDEDUCATION ,computer - Abstract
Academic organizations are supposed to seek certain balance between the concerns of security, stability and availability of shared computer labs to achieve the course learning objectives. Some academic activities in computer science courses require students to control and configure some laboratory devices. Students in advanced courses may use some risky applications for some learning activities. It may affect the stability, availability and security of the working nature in the shared lab and networks. Virtualization Platform has the ability to overcome these concerns to achieve learning objectives. Virtualization technologies allow students to access and control the computer settings as well as the working environment in advanced applications without affecting the operational availability of computer labs throughout the college day. Virtualization enables computer security teachers to train their students on many hands-on activities without exposing or causing damages to computer labs. This paper presents the usage of virtualization technology in such environment, the opportunities and benefits of using this technology in computer security oriented courses. The paper also discusses the use of the VMware workstation pro as a sandbox for risky lab activities in computer security courses. Here the Desktop Virtualization offers great opportunities to teach advanced skills in computer security courses. Also, this paper outlines the challenges and limitations of virtualization along with some recommendations to address these limitations.
- Published
- 2017
- Full Text
- View/download PDF
49. Desktop Virtualization with Cloud Computing
- Author
-
Mamta Fasge, Charul Jagtap, Santosh Waghmode, Ritesh Mahajan, and Shweta Patange
- Subjects
Desktop virtualization ,business.industry ,Computer science ,Operating system ,Cloud computing ,computer.software_genre ,business ,computer - Published
- 2020
- Full Text
- View/download PDF
50. Design and Implementation of GPS Data Inspection System Based on Desktop Virtualization Technology
- Author
-
Xuchao Chai, Shaokai Lei, Wenqing Wang, Ying Wang, and Wen-Sheng Chen
- Subjects
Software ,Quality management ,business.industry ,Desktop virtualization ,Computer science ,Data quality ,Data management ,Management system ,Global Positioning System ,Data security ,Software engineering ,business - Abstract
In view of the shortcomings of the traditional manual means of GPS field mapping data in the earthquake field, the data quality management is inefficient. This paper develops the GPS original platform based on the desktop virtual observation data management, reporting, quality management and archiving. Based on the research content of this paper, a set of seismic field data management system software based on desktop virtualization platform was designed and developed to solve the inconvenience caused by the complex operation process of GPS data service. The results in this paper will effectively improve the efficiency of GPS measurement data management and quality inspection.
- Published
- 2019
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.