Search Results

2 Results
for "ping+yang"
Use Advanced Search
Sort By:

Recovering Virtual Machine from Failure of Post-Copy Live Migration

New approach to recover a Virtual Machine during post-copy live migration Background: Post-copy is one of the two key techniques (besides pre-copy) for live migration of virtual machines in data centers. Post-copy provides deterministic total migration time and low downtime for write-intensive VMs. However, if post-copy migration fails for any...
Published: 12/28/2023   |   Inventor(s): Kartik Gopalan, Ping Yang, Dinuni Fernando, Jonathan Terner
Keywords(s):  
Category(s): Technology Classifications > Computers, Campus > Binghamton University

Security and Privacy Aware Virtual Machine Checkpointing

A security and privacy aware checkpointing mechanism that enables users to selectively exclude processes and terminal applications that contain sensitive data from being checkpointed. Background: Virtual Machine (VM) checkpointing enables a user to capture a snapshot of a running VM on persistent storage. VM checkpoints can be used to roll back...
Published: 7/22/2024   |   Inventor(s): Ping Yang, Kartik Gopalan
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Computers, Campus > Binghamton University

Search SUNY Technologies

Trending Searches

Latest Technologies