Modeling Virtual Machine Packing Factor using a Third Party Tool and other Strategies

نویسنده

  • Carl J. De Pasquale
چکیده

Restrain datacenter growth, reduce physical server deployment, decrease power/cooling requirements, go green and do more with less, clichés I’ll admit, but familiar to be sure. Organizations struggling with increasing IT expenses are seeking ways to reduce operating costs while improving service levels. For many organizations virtualization is strategic. Virtualization helps reduce costs by consolidating lightly utilized servers onto high performance, power efficient multi socket/multi core platform. Great, but how many lightly utilized physical servers (or applications residing on lightly utilized physical servers) can be or consolidated onto a hypervisor based hardware? This paper presents an approach to estimate maximum number of VM that should be packed onto a host (hypervisor) system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

An artificial intelligence model based on LS-SVM for third-party logistics provider ‎selection

The use of third-party logistics (3PL) providers is regarded as new strategy in logistics management. The relationships by considering 3PL are sometimes more complicated than any classical logistics supplier relationships. These relationships have taken into account as a well-known way to highlight organizations' flexibilities to regard rapidly uncertain market conditions, follow core competenc...

متن کامل

Analytical evaluation of an innovative decision-making algorithm for VM live migration

In order to achieve the virtual machines live migration, the two "pre-copy" and "post-copy" strategies are presented. Each of these strategies, depending on the operating conditions of the machine, may perform better than the other. In this article, a new algorithm is presented that automatically decides how the virtual machine live migration takes place. In this approach, the virtual machine m...

متن کامل

Protecting patients’ electronic health records using enhanced active bundles

We propose a solution that provides protection for patients' electronic health/medical records disseminated among different authorized healthcare information systems. The solution is known as Active Bundles using a Trusted Third Party (ABTTP). It is based on the use of trusted third parties, and the construct named active bundles. The latter keep electronic health/medical records as sensitive d...

متن کامل

Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking

Though web tracking and its privacy implications have received much attention in recent years, that attention has come relatively recently in the history of the web and lacks full historical context. In this paper, we present longitudinal measurements of third-party web tracking behaviors from 1996 to present (2016). Our tool, TrackingExcavator, leverages a key insight: that the Internet Archiv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011