摘要:
A provisioning server automatically configures a virtual machine (VM) according to user specifications and then deploys the VM on a physical host. The user may either choose from a list of pre-configured, ready-to-deploy VMs, or he may select which hardware, operating system and application(s) he would like the VM to have. The provisioning server then configures the VM accordingly, if the desired configuration is available, or it applies heuristics to configure a VM that best matches the user's request if it isn't. The invention also includes mechanisms for monitoring the status of VMs and hosts, for migrating VMs between hosts, and for creating a network of VMs.
摘要:
A method and system for offloading a software application intended to be run on a first virtual machine onto a second virtual machine. An original virtual machine is created. A periodic and/or computing resource-intensive application is supposed to be run on the original virtual machine. However, doing so may detrimentally impact the operation of the original virtual machine by consuming valuable computing resources. A replicated virtual machine which is basically a copy of the original virtual machine is created and ported over to a different host computer system. The periodic and/or computing-intensive application is now run on the replicated virtual machine instead of the original virtual machine. This leaves the original virtual machine free to continue its normal operations unaffected.
摘要:
A filter driver that is loaded during an initial part of the boot process enable operating systems that are not capable of booting from central storage to be booted from central storage. According to this technique, an initial set of operating system files is loaded into system memory from a local storage volume. The initial set of files includes a small subset of all of the operating system files and includes a boot loader, a kernel, boot time drivers, a file system driver, and a filter driver. The filter driver takes control over the loading of the remainder of the operating system files, so that these files are loaded from central storage instead of the local storage volume.
摘要:
An agent loaded in a computer's operating system (OS) simulates disconnection and reconnection of a device, with no need to actually disconnect the device logically from a computer. During simulated reconnection, when the OS requests the hardware ID of the device, the agent returns a substitute ID, which causes the OS to load a substitute driver. Substitution of the ID also allows driver substitution for a not yet logically connected device; in this cases, no simulated disconnection or reconnection is needed. Driver substitution is dynamic and reversible, with no need to restart the system or reboot the OS and substitution of a driver for one device of a type does not disturb other devices of the same type. The invention may be implemented entirely in software, with no need for hardware modifications or device customization.
摘要:
A process of providing access to data associated with a virtual machine running on a host computer system to an offload server is implemented to improve the performance of the host computer system. Once the offload computer system knows how and where to access the data associated with that of the virtual machine, operations can be offloaded from the host computer system and performed by the offload server. Backup operations can be offloaded onto the server. The server can run backup software and directly access the data associated with the virtual machine, thereby freeing the hardware resources of the host computer to handle normal applications running on the virtual machine.
摘要:
Virtual machines are managed in centralized manner. Files that are shared by multiple virtual machines are stored in a central storage unit and a management program is executed on one or more of these files on a per file basis. The management program is executed on a file if an 10 operation is issued for that file. A namespace map is used to provide a mapping of filenames used by the different virtual machines to filenames used by the central storage unit.
摘要:
In a method of updating software on a dormant disk, exposed files are accessed. The exposed files are exposed by mounting the dormant disk. The exposed files are scanned to determine the status of software residing on the dormant disk. The scanning is achieved without requiring booting of the dormant disk. It is determined whether an update is available for the software residing on the dormant disk.
摘要:
Virtual machines are managed in centralized manner. Files that are shared by multiple virtual machines are stored in a central storage unit and a management program is executed on one or more of these files on a per file basis. The management program is executed on a file if an IO operation is issued for that file. A namespace map is used to provide a mapping of filenames used by the different virtual machines to filenames used by the central storage unit.
摘要:
A file management system includes a host computer having one or more virtual machines, a switching layer computer configured to manage a namespace map for the virtual machines in the host computer, and a central storage unit. The host computer is connected indirectly to the central storage unit through an in-band IO path that includes the switching layer computer and directly to the central storage unit through an out-of-band IO path. When a virtual machines issues a file operation, a file operation including a data operation is routed to the central storage unit along an out-of-band IO path and a file operation including a metadata operation is routed to the central storage unit along an in-band IO path that includes the switching layer computer.
摘要:
A tangible medium embodying instructions usable by a computer system to protect a plurality of guest virtual machines (VMs), which execute via virtualization software on a common host platform, from malicious code is described. A scan engine is configured to scan data for malicious code and determine a result of the scanning, wherein the result indicates whether malicious code is present in the data. A driver portion is configured for installation in an operating system of a target VM, which is one of the guest VMs. The driver portion intercepts an access request to a file, that originates within the target VM. The driver portion communicates information identifying a location of the data to be scanned by the scan engine without sending a copy of the data to the scan engine. The scan engine executes within the virtualization layer outside a context of the target VM.