434:(DR) plan is often considered good practice for a hardware virtualization platform. DR of a virtualization environment can ensure high rate of availability during a wide range of situations that disrupt normal business operations. In situations where continued operations of hardware virtualization platforms is important, a disaster recovery plan can ensure hardware performance and maintenance requirements are met. A hardware virtualization disaster recovery plan involves both hardware and software protection by various methods, including those described below.
300:
1637:
38:
1649:
241:
A virtual machine can easily be relocated from one physical machine to another as needed. For example, a salesperson going to a customer can copy a virtual machine with the demonstration software to their laptop, without the need to transport the physical computer. Likewise, an error inside a virtual
417:
In operating-system-level virtualization, a physical server is virtualized at the operating system level, enabling multiple isolated and secure virtualized servers to run on a single physical server. The "guest" operating system environments share the same running instance of the operating system as
799:
Surprisingly, we find that the first-generation hardware support rarely offers performance advantages over existing software techniques. We ascribe this situation to high VMM/guest transition costs and a rigid programming model that leaves little room for software flexibility in managing either the
234:
A virtual machine (VM) can be more easily controlled and inspected from a remote site than a physical machine, and the configuration of a VM is more flexible. This is very useful in kernel development and for teaching operating system courses, including running legacy operating systems that do not
230:
In addition to reducing equipment and labor costs associated with equipment maintenance, consolidating servers can also have the added benefit of reducing energy consumption and the global footprint in environmental-ecological sectors of technology. For example, a typical server runs at 425 W
222:
consolidation, many small physical servers can be replaced by one larger physical server to decrease the need for more (costly) hardware resources such as CPUs, and hard drives. Although hardware is consolidated in virtual environments, typically OSs are not. Instead, each OS running on a physical
376:
In hardware-assisted virtualization, the hardware provides architectural support that facilitates building a virtual machine monitor and allows guest OSs to be run in isolation. This can be used to assist either full virtualization or paravirtualization. Hardware-assisted virtualization was first
448:
The implementation of this method will require control software and storage capacity for application and data file storage replication typically on the same site. The data is replicated on a different disk partition or separate disk device and can be a scheduled activity for most servers and is
337:
In paravirtualization, the virtual machine does not necessarily simulate hardware, but instead (or in addition) offers a special API that can only be used by modifying the "guest" OS. For this to be possible, the "guest" OS's source code must be available. If the source code is available, it is
188:
software. The guest software is not limited to user applications; many hosts allow the execution of complete operating systems. The guest software executes as if it were running directly on the physical hardware, with several notable caveats. Access to physical system resources (such as the
253:
However, when multiple VMs are concurrently running on the same physical host, each VM may exhibit varying and unstable performance which highly depends on the workload imposed on the system by other VMs. This issue can be addressed by appropriate installation techniques for
149:. Virtualization emulates the hardware environment of its host architecture, allowing multiple OSes to run unmodified and in isolation. At its origins, the software that controlled virtualization was called a "control program", but the terms "
441:
This common method can be used to store data offsite, but data recovery can be a difficult and lengthy process. Tape backup data is only as good as the latest copy stored. Tape backup methods will require a backup device and ongoing storage
208:
Virtualization often exacts performance penalties, both in resources required to run the hypervisor, and as well as in reduced performance on the virtual machine compared to running native on the physical machine.
277:
Duplicating specific environments: A virtual machine could, depending on the virtualization software used, be duplicated and installed on multiple hosts, or restored to a previously backed-up system state.
227:(P2V) transformation. The average utilization of a server in the early 2000s was 5 to 15%, but with the adoption of virtualization this figure started to increase to reduce the number of servers needed.
455:
This method ensures the highest level of disaster recovery protection for a hardware virtualization solution, by providing duplicate hardware and software replication in two distinct geographic areas.
268:
Running one or more applications that are not supported by the host OS: A virtual machine running the required guest OS could permit the desired applications to run, without altering the host OS.
338:
sufficient to replace sensitive instructions with calls to VMM APIs (e.g.: "cli" with "vm_handle_cli()"), then re-compile the OS and use the new binaries. This system call to the
907:
274:
Server virtualization: Multiple virtual servers could be run on a single physical server, in order to more fully utilize the hardware resources of the physical server.
501:
471:
223:
server is converted to a distinct OS running inside a virtual machine. Thereby, the large server can "host" many such "guest" virtual machines. This is known as
280:
Creating a protected environment: If a guest OS running on a VM becomes damaged in a way that is not cost-effective to repair, such as may occur when studying
1108:
944:
284:
or installing badly behaved software, the VM may simply be discarded without harm to the host system, and a clean copy used upon rebooting the guest .
255:
205:, or may be limited to a subset of the device's native capabilities, depending on the hardware access policy implemented by the virtualization host.
55:
721:
Smith, L.; Kägi, A.; Martins, F. M.; Neiger, G.; Leung, F. H.; Rodgers, D.; Santoni, A. L.; Bennett, S. M.; Uhlig, R.; Anderson, A. V. (May 2005).
169:
system. The creation and management of virtual machines has also been called "platform virtualization", or "server virtualization", more recently.
900:
812:
697:
884:
422:
is also used to implement the "guest" environments, and applications running in a given "guest" environment view it as a stand-alone system.
403:
In 2006, first-generation 32- and 64-bit x86 hardware support was found to rarely offer performance advantages over software virtualization.
1482:
855:
102:
145:
as complete hardware platforms, certain logical abstractions of their componentry, or only the functionality required to run various
1063:
915:
630:
121:
74:
1675:
675:
371:
81:
754:
307:
In full virtualization, the virtual machine simulates enough hardware to allow an unmodified "guest" OS designed for the same
1622:
521:
59:
782:
937:
351:
88:
1429:
987:
579:
856:"Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take"
70:
1652:
466:
837:
1447:
496:
343:
1641:
1547:
1098:
1083:
930:
526:
992:
604:
419:
412:
271:
Evaluating an alternate operating system: The new OS could be run within a VM, without altering the host OS.
48:
1078:
1038:
661:
481:
476:
190:
1487:
1477:
1251:
1133:
1123:
1048:
1017:
1012:
1007:
982:
355:
320:
238:
A new virtual machine can be provisioned as required without the need for an up-front hardware purchase.
819:
707:
702:
722:
392:
developed additional hardware to support virtualization ran on their platforms. Sun
Microsystems (now
1216:
1103:
1002:
997:
977:
967:
894:
95:
1442:
1264:
881:
727:
550:
294:
224:
299:
1399:
486:
393:
332:
219:
1452:
1314:
1309:
1113:
972:
626:
516:
511:
431:
246:
202:
1582:
1241:
1156:
1088:
736:
242:
machine does not harm the host system, so there is no risk of the OS crashing on the laptop.
146:
862:
1577:
1527:
1344:
1334:
953:
888:
506:
308:
194:
162:
17:
813:"The One Essential Guide to Disaster Recovery: How to Ensure IT and Business Continuity"
1462:
1379:
1289:
1093:
1033:
138:
679:
646:
1669:
1437:
1284:
1274:
1259:
1236:
1184:
1141:
1058:
1043:
165:(sometimes called "pseudo machine"), a term which itself dates from the experimental
1607:
1567:
1467:
1457:
1359:
1211:
1201:
1161:
491:
660:
Rajesh Chheda; Dan
Shookowsky; Steve Stefanovich; Joe Toscano (14 January 2009).
201:
processor and system-memory. Guests are often restricted from accessing specific
1492:
1299:
1053:
791:
249:
scenarios without concerns with impact of refurbished and faulty energy sources.
166:
37:
1612:
1597:
1557:
1497:
1414:
1394:
1384:
1364:
1349:
1319:
1304:
1221:
693:
339:
150:
381:
processors in 1980, with the Start
Interpretive Execution (SIE) instruction.
1562:
1522:
1502:
1472:
1419:
1374:
1329:
1279:
1231:
1196:
1179:
1174:
245:
Because of this ease of relocation, virtual machines can be readily used in
350:; it is implemented via a DIAG ("diagnose") hardware instruction in IBM's
1532:
1339:
1269:
1206:
1189:
1168:
1073:
397:
378:
311:
to be run in isolation. This approach was pioneered in 1966 with the IBM
142:
740:
1592:
1572:
1542:
1537:
1369:
1354:
1294:
1226:
1146:
1118:
841:
784:
A Comparison of
Software and Hardware Techniques for x86 Virtualization
281:
1617:
1587:
1552:
1517:
1512:
1409:
1404:
1324:
1151:
172:
Platform virtualization is performed on a given hardware platform by
908:"Using a hypervisor to reconcile GPL and proprietary embedded code"
1602:
1507:
1389:
922:
385:
316:
312:
298:
161:
The term "virtualization" was coined in the 1960s to refer to a
926:
580:"Virtual Machines: An Introduction to Platform Virtualization"
557:
389:
347:
231:
and VMware estimates a hardware reduction ratio of up to 15:1.
31:
197:) is generally managed at a more restrictive level than the
756:
153:" or "virtual machine monitor" became preferred over time.
261:
There are several approaches to platform virtualization.
790:. ASPLOS’06. San Jose, California, USA. Archived from
438:
Tape backup for software data long-term archival needs
180:), which creates a simulated computer environment, a
625:. San Rafael, CA: Morgan & Claypool Publishers.
621:
Bugnion, Edouard; Nieh, Jason; Tsafrir, Dan (2017).
1428:
1250:
1132:
1026:
960:
62:. Unsourced material may be challenged and removed.
662:"Profiling Energy Usage for Efficient Consumption"
762:(First ed.). IBM. January 1984. SA22-7095-0
623:Hardware and software support for virtualization
449:implemented more for database-type applications.
27:Virtualization of computers or operating systems
781:Keith Adams; Ole Agesen (21–25 October 2006).
551:"The Origin of the VM/370 Time-sharing System"
502:Popek and Goldberg virtualization requirements
472:Comparison of platform virtualization software
938:
818:. Vision Solutions, Inc. 2010. Archived from
8:
945:
931:
923:
616:
614:
426:Hardware virtualization disaster recovery
256:temporal isolation among virtual machines
122:Learn how and when to remove this message
800:frequency or cost of these transitions.
538:
303:Logical diagram of full virtualization.
676:"VMware server consolidation overview"
445:Whole-file and application replication
264:Examples of virtualization use cases:
407:Operating-system-level virtualization
7:
1648:
838:"Disaster Recovery Planning Process"
544:
542:
60:adding citations to reliable sources
696:; Ozgur Can Leonard (August 2000).
897:, ACM, 2003, by a group of authors
396:) added similar features in their
358:(which was the origin of the term
25:
1064:Distributed file system for cloud
993:Integration platform as a service
906:Zoppis, Bruno (27 August 2007) .
895:Xen and the Art of Virtualization
882:An Introduction to Virtualization
723:"Intel virtualization technology"
1647:
1636:
1635:
605:"What is Server Virtualization?"
452:Hardware and software redundancy
418:the host system. Thus, the same
372:Hardware-assisted virtualization
366:Hardware-assisted virtualization
36:
578:Thomson, Julian (23 May 2018).
47:needs additional citations for
1623:Virtual Private Cloud OnDemand
861:. VMware. 2010. Archived from
522:Virtualization for aggregation
1:
901:Linux Virtualization Software
988:Infrastructure as a service
342:is called a "hypercall" in
1692:
467:Application virtualization
410:
369:
330:
292:
213:Reasons for virtualization
1631:
1448:Abiquo Enterprise Edition
497:Instruction set simulator
193:, display, keyboard, and
71:"Hardware virtualization"
18:Virtualization technology
1084:Native cloud application
647:"Chip Aging Accelerates"
527:Workspace virtualization
235:support modern hardware.
1676:Hardware virtualization
1608:Virtual Machine Manager
1069:Hardware virtualization
887:22 October 2020 at the
420:operating system kernel
413:OS-level virtualization
135:Hardware virtualization
1079:Mobile cloud computing
1049:Cloud storage gateways
1039:Cloud-native computing
482:Dynamic infrastructure
477:Desktop virtualization
319:, predecessors of the
304:
1124:Virtual private cloud
1018:Software as a service
1013:Security as a service
1008:Platform as a service
983:Function as a service
868:on 23 September 2010.
549:Creasy, R.J. (1981).
302:
1104:Serverless computing
1003:Network as a service
998:Backend as a service
978:Desktop as a service
968:Content as a service
918:on 24 December 2013.
710:on 22 November 2019.
584:Performance Software
400:processors in 2005.
56:improve this article
1443:Amazon Web Services
1265:Amazon Web Services
797:on 8 January 2022.
741:10.1109/MC.2005.163
649:. 14 February 2018.
398:UltraSPARC T-Series
295:Full virtualization
289:Full virtualization
225:Physical-to-Virtual
1400:SAP Cloud Platform
1109:Structured storage
844:on 15 August 2012.
703:Dr. Dobb's Journal
698:"Examining VMware"
682:on 8 January 2022.
487:Hardware emulation
394:Oracle Corporation
384:In 2005 and 2006,
377:introduced on the
333:Paravirtualization
327:Paravirtualization
305:
203:peripheral devices
1663:
1662:
1315:Google App Engine
1114:Virtual appliance
973:Data as a service
517:Virtual appliance
512:Thin provisioning
432:disaster recovery
247:disaster recovery
147:operating systems
132:
131:
124:
106:
16:(Redirected from
1683:
1651:
1650:
1639:
1638:
1583:Safe Swiss Cloud
947:
940:
933:
924:
919:
914:. Archived from
870:
869:
867:
860:
852:
846:
845:
840:. Archived from
836:Wold, G (2008).
833:
827:
826:
824:
817:
809:
803:
802:
796:
789:
778:
772:
771:
769:
767:
761:
751:
745:
744:
718:
712:
711:
706:. Archived from
690:
684:
683:
678:. Archived from
672:
666:
665:
657:
651:
650:
643:
637:
636:
618:
609:
608:
601:
595:
594:
592:
590:
575:
569:
568:
566:
564:
555:
546:
127:
120:
116:
113:
107:
105:
64:
40:
32:
21:
1691:
1690:
1686:
1685:
1684:
1682:
1681:
1680:
1666:
1665:
1664:
1659:
1627:
1578:Rackspace Cloud
1528:Microsoft Azure
1424:
1345:Microsoft Azure
1246:
1128:
1022:
961:Business models
956:
954:Cloud computing
951:
905:
891:, by Amit Singh
889:Wayback Machine
878:
873:
865:
858:
854:
853:
849:
835:
834:
830:
825:on 16 May 2011.
822:
815:
811:
810:
806:
794:
787:
780:
779:
775:
765:
763:
759:
753:
752:
748:
720:
719:
715:
692:
691:
687:
674:
673:
669:
659:
658:
654:
645:
644:
640:
633:
620:
619:
612:
603:
602:
598:
588:
586:
577:
576:
572:
562:
560:
553:
548:
547:
540:
536:
531:
507:Physicalization
462:
428:
415:
409:
374:
368:
335:
329:
309:instruction set
297:
291:
218:In the case of
215:
182:virtual machine
178:control program
163:virtual machine
159:
128:
117:
111:
108:
65:
63:
53:
41:
28:
23:
22:
15:
12:
11:
5:
1689:
1687:
1679:
1678:
1668:
1667:
1661:
1660:
1658:
1657:
1645:
1632:
1629:
1628:
1626:
1625:
1620:
1615:
1610:
1605:
1600:
1595:
1590:
1585:
1580:
1575:
1570:
1565:
1560:
1555:
1550:
1545:
1540:
1535:
1530:
1525:
1520:
1515:
1510:
1505:
1500:
1495:
1490:
1485:
1480:
1475:
1470:
1465:
1460:
1455:
1450:
1445:
1440:
1434:
1432:
1430:Infrastructure
1426:
1425:
1423:
1422:
1417:
1412:
1407:
1402:
1397:
1392:
1387:
1382:
1380:PythonAnywhere
1377:
1372:
1367:
1362:
1357:
1352:
1347:
1342:
1337:
1332:
1327:
1322:
1317:
1312:
1307:
1302:
1297:
1292:
1290:Cocaine (PaaS)
1287:
1282:
1277:
1272:
1267:
1262:
1256:
1254:
1248:
1247:
1245:
1244:
1239:
1234:
1229:
1224:
1219:
1214:
1209:
1204:
1199:
1194:
1193:
1192:
1187:
1177:
1172:
1166:
1165:
1164:
1159:
1149:
1144:
1138:
1136:
1130:
1129:
1127:
1126:
1121:
1116:
1111:
1106:
1101:
1096:
1094:Personal cloud
1091:
1086:
1081:
1076:
1071:
1066:
1061:
1056:
1051:
1046:
1041:
1036:
1034:Cloud database
1030:
1028:
1024:
1023:
1021:
1020:
1015:
1010:
1005:
1000:
995:
990:
985:
980:
975:
970:
964:
962:
958:
957:
952:
950:
949:
942:
935:
927:
921:
920:
903:
898:
892:
877:
876:External links
874:
872:
871:
847:
828:
804:
773:
746:
713:
685:
667:
652:
638:
631:
610:
596:
570:
537:
535:
532:
530:
529:
524:
519:
514:
509:
504:
499:
494:
489:
484:
479:
474:
469:
463:
461:
458:
457:
456:
453:
450:
446:
443:
439:
427:
424:
411:Main article:
408:
405:
370:Main article:
367:
364:
331:Main article:
328:
325:
293:Main article:
290:
287:
286:
285:
278:
275:
272:
269:
251:
250:
243:
239:
236:
232:
228:
214:
211:
191:network access
184:(VM), for its
158:
155:
139:virtualization
130:
129:
44:
42:
35:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1688:
1677:
1674:
1673:
1671:
1656:
1655:
1646:
1644:
1643:
1634:
1633:
1630:
1624:
1621:
1619:
1616:
1614:
1611:
1609:
1606:
1604:
1601:
1599:
1596:
1594:
1591:
1589:
1586:
1584:
1581:
1579:
1576:
1574:
1571:
1569:
1566:
1564:
1561:
1559:
1556:
1554:
1551:
1549:
1546:
1544:
1541:
1539:
1536:
1534:
1531:
1529:
1526:
1524:
1521:
1519:
1516:
1514:
1511:
1509:
1506:
1504:
1501:
1499:
1496:
1494:
1491:
1489:
1486:
1484:
1481:
1479:
1476:
1474:
1471:
1469:
1466:
1464:
1461:
1459:
1456:
1454:
1451:
1449:
1446:
1444:
1441:
1439:
1438:Alibaba Cloud
1436:
1435:
1433:
1431:
1427:
1421:
1418:
1416:
1413:
1411:
1408:
1406:
1403:
1401:
1398:
1396:
1393:
1391:
1388:
1386:
1383:
1381:
1378:
1376:
1373:
1371:
1368:
1366:
1363:
1361:
1358:
1356:
1353:
1351:
1348:
1346:
1343:
1341:
1338:
1336:
1333:
1331:
1328:
1326:
1323:
1321:
1318:
1316:
1313:
1311:
1308:
1306:
1303:
1301:
1298:
1296:
1293:
1291:
1288:
1286:
1285:Cloud Foundry
1283:
1281:
1278:
1276:
1273:
1271:
1268:
1266:
1263:
1261:
1260:Alibaba Cloud
1258:
1257:
1255:
1253:
1249:
1243:
1240:
1238:
1235:
1233:
1230:
1228:
1225:
1223:
1220:
1218:
1215:
1213:
1210:
1208:
1205:
1203:
1200:
1198:
1195:
1191:
1188:
1186:
1183:
1182:
1181:
1178:
1176:
1173:
1170:
1167:
1163:
1160:
1158:
1155:
1154:
1153:
1150:
1148:
1145:
1143:
1140:
1139:
1137:
1135:
1131:
1125:
1122:
1120:
1117:
1115:
1112:
1110:
1107:
1105:
1102:
1100:
1097:
1095:
1092:
1090:
1087:
1085:
1082:
1080:
1077:
1075:
1072:
1070:
1067:
1065:
1062:
1060:
1059:Dew computing
1057:
1055:
1052:
1050:
1047:
1045:
1044:Cloud storage
1042:
1040:
1037:
1035:
1032:
1031:
1029:
1025:
1019:
1016:
1014:
1011:
1009:
1006:
1004:
1001:
999:
996:
994:
991:
989:
986:
984:
981:
979:
976:
974:
971:
969:
966:
965:
963:
959:
955:
948:
943:
941:
936:
934:
929:
928:
925:
917:
913:
909:
904:
902:
899:
896:
893:
890:
886:
883:
880:
879:
875:
864:
857:
851:
848:
843:
839:
832:
829:
821:
814:
808:
805:
801:
793:
786:
785:
777:
774:
758:
757:
750:
747:
742:
738:
734:
730:
729:
724:
717:
714:
709:
705:
704:
699:
695:
689:
686:
681:
677:
671:
668:
663:
656:
653:
648:
642:
639:
634:
632:9781627056939
628:
624:
617:
615:
611:
606:
600:
597:
585:
581:
574:
571:
559:
552:
545:
543:
539:
533:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
503:
500:
498:
495:
493:
490:
488:
485:
483:
480:
478:
475:
473:
470:
468:
465:
464:
459:
454:
451:
447:
444:
440:
437:
436:
435:
433:
425:
423:
421:
414:
406:
404:
401:
399:
395:
391:
387:
382:
380:
373:
365:
363:
361:
357:
353:
349:
345:
341:
334:
326:
324:
322:
318:
314:
310:
301:
296:
288:
283:
279:
276:
273:
270:
267:
266:
265:
262:
259:
257:
248:
244:
240:
237:
233:
229:
226:
221:
217:
216:
212:
210:
206:
204:
200:
196:
192:
187:
183:
179:
175:
170:
168:
164:
156:
154:
152:
148:
144:
140:
136:
126:
123:
115:
104:
101:
97:
94:
90:
87:
83:
80:
76:
73: –
72:
68:
67:Find sources:
61:
57:
51:
50:
45:This article
43:
39:
34:
33:
30:
19:
1653:
1640:
1568:Oracle Cloud
1488:Google Cloud
1468:DigitalOcean
1458:Citrix Cloud
1360:Oracle Cloud
1212:Proton Drive
1202:Oracle Cloud
1134:Applications
1068:
1054:Data centers
1027:Technologies
916:the original
912:Linux Gizmos
911:
863:the original
850:
842:the original
831:
820:the original
807:
798:
792:the original
783:
776:
764:. Retrieved
755:
749:
735:(5): 48–56.
732:
726:
716:
708:the original
701:
688:
680:the original
670:
655:
641:
622:
599:
587:. Retrieved
583:
573:
561:. Retrieved
492:Hyperjacking
429:
416:
402:
383:
375:
359:
336:
306:
263:
260:
252:
207:
198:
195:disk storage
185:
181:
177:
176:software (a
173:
171:
160:
134:
133:
118:
109:
99:
92:
85:
78:
66:
54:Please help
49:verification
46:
29:
1493:GreenButton
1300:Engine Yard
563:26 February
167:IBM M44/44X
1613:Wakame-vdc
1598:libguestfs
1558:OpenNebula
1498:GreenQloud
1478:Eucalyptus
1453:CloudStack
1415:vCloud Air
1385:RightScale
1365:OutSystems
1350:MindSphere
1320:GreenQloud
1222:Salesforce
1185:Office 365
1089:Networking
766:27 October
694:Jason Nieh
534:References
360:hypervisor
340:hypervisor
151:hypervisor
112:April 2010
82:newspapers
1563:OpenStack
1523:Lunacloud
1503:IBM Cloud
1473:EMC Atmos
1420:WaveMaker
1395:Force.com
1375:OpenShift
1330:IBM Cloud
1310:GE Predix
1280:CloudBolt
1252:Platforms
1232:PlateSpin
1217:Rackspace
1197:Nextcloud
1180:Microsoft
1175:IBM Cloud
1157:Workspace
442:material.
143:computers
1670:Category
1642:Category
1533:Mirantis
1340:Jelastic
1270:AppScale
1207:Owncloud
1190:OneDrive
1171:(closed)
1169:HP Cloud
1119:Web APIs
1099:Security
1074:Internet
885:Archived
728:Computer
460:See also
379:IBM 308X
323:family.
1654:Commons
1593:libvirt
1573:OrionVM
1543:Nimbula
1538:Netlify
1483:Fujitsu
1370:openQRM
1355:Netlify
1335:Inktank
1295:Creatio
1237:Workday
1227:Seafile
1147:Dropbox
282:malware
157:Concept
137:is the
96:scholar
1618:Vercel
1588:Zadara
1553:OpenIO
1548:Nimbus
1518:Linode
1513:Joyent
1410:Vercel
1405:Splunk
1325:Heroku
1305:Helion
1152:Google
629:
589:8 July
354:under
344:TRANGO
220:server
98:
91:
84:
77:
69:
1603:OVirt
1508:iland
1390:Scalr
1162:Drive
866:(PDF)
859:(PDF)
823:(PDF)
816:(PDF)
795:(PDF)
788:(PDF)
760:(PDF)
554:(PDF)
386:Intel
317:CP-67
313:CP-40
186:guest
103:JSTOR
89:books
1463:Deft
1242:Zoho
768:2022
627:ISBN
591:2023
565:2013
388:and
362:)..
346:and
315:and
199:host
174:host
75:news
1275:Box
1142:Box
737:doi
558:IBM
390:AMD
352:CMS
348:Xen
141:of
58:by
1672::
910:.
733:38
731:.
725:.
700:.
613:^
582:.
556:.
541:^
430:A
356:VM
321:VM
258:.
946:e
939:t
932:v
770:.
743:.
739::
664:.
635:.
607:.
593:.
567:.
125:)
119:(
114:)
110:(
100:·
93:·
86:·
79:·
52:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.