Automated Virtual Machine Replication and Transparent Machine Switch Support for An Individual Personal Computer User by Beom Heyn Kim
نویسندگان
چکیده
Automated Virtual Machine Replication and Transparent Machine Switch Support for An Individual Personal Computer User Beom Heyn Kim Master of Science Graduate Department of Computer Science University of Toronto 2011 As the price of computing devices drops, the number of machines managed by an individual PC user has been increased. In many cases, a user with multiple computers wants to use an exact desktop environment across machines. For personal data replication, there are several tools like DropBox, Live Mesh and Tonido. However, these tools can not provide software environment replication. Without a tool to replicate software environment, users have to manage each device’s desktop environment separately which is hassling and difficult task to do manually. In this work, we explore the solution to help modern day PC users to perceive the consistent view of not only personal data but also a whole desktop environment. Our approach automatically replicates modifications made on the desktop environment of one machine to other devices using different replication policies for different network properties. Moreover, users can switch machines instantly and still see the exact environment.
منابع مشابه
Analytical evaluation of an innovative decision-making algorithm for VM live migration
In order to achieve the virtual machines live migration, the two "pre-copy" and "post-copy" strategies are presented. Each of these strategies, depending on the operating conditions of the machine, may perform better than the other. In this article, a new algorithm is presented that automatically decides how the virtual machine live migration takes place. In this approach, the virtual machine m...
متن کاملAn Application Model and Environment for Personal Information Appliances
Recent years have witnessed a rapid increase in the use of personal information devices such as Palms or smart phones, with some people carrying more than one. Moreover, these devices need to work in disconnected mode and vary widely in their features. How does one provide an information-centric experience, across devices, for the end user? The goal of the Bali project is to provide a run-time ...
متن کاملTrust Classification in Social Networks Using Combined Machine Learning Algorithms and Fuzzy Logic
Social networks have become the main infrastructure of today’s daily activities of people during the last decade. In these networks, users interact with each other, share their interests on resources and present their opinions about these resources or spread their information. Since each user has a limited knowledge of other users and most of them are anonymous, the trust factor plays an import...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملCommunication-Aware Traffic Stream Optimization for Virtual Machine Placement in Cloud Datacenters with VL2 Topology
By pervasiveness of cloud computing, a colossal amount of applications from gigantic organizations increasingly tend to rely on cloud services. These demands caused a great number of applications in form of couple of virtual machines (VMs) requests to be executed on data centers’ servers. Some of applications are as big as not possible to be processed upon a single VM. Also, there exists severa...
متن کامل