{"created":"2020-11-17T15:31:52.925621+00:00","id":6193,"links":{},"metadata":{"_buckets":{"deposit":"1c4aec34-2546-4ff0-85d6-159b313efe0f"},"_deposit":{"created_by":45,"id":"6193","owner":"45","owners":[45],"owners_ext":{"displayname":"","email":"dimennyaung@uit.edu.mm","username":""},"pid":{"revision_id":0,"type":"recid","value":"6193"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/6193","sets":["1582963342780:1596102355557"]},"communities":["uit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Local Disaster Recovery Using Virtualization Technology","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Business applications running on IT\ninfrastructure necessitate high levels of availability in\norder to minimize the amount of downtime\nexperienced during any planned and unplanned\noutages. As a result, disaster recovery has gained\ngreat significance in IT. Exploiting virtualization and\nability to automatically reinstall a host, where the\naction on a virtual machine is performed only when a\ndisaster occurs. Virtualization affords significant cost\nand performance advantages over more traditional\ndisaster recovery options such as tape backup or\nimaging. Our approach is to design and implement a\ncontinual migration strategy for virtual machines to\nachieve automatic failure recovery. By continually\nand transparently propagating virtual machine’s state\nto a backup host via live migration techniques, trivial\napplications encapsulated in the virtual machine can\nbe recovered from hardware failures with minimal\ndowntime while no modifications are required.\nMoreover, our framework intends to monitor virtual\nmachines for problems such as CPU utilization, I/O\nactivity, and memory utilization. This raises a\ndifficult problem, since it is quite difficult to\ndiscriminate based on these measures between a\nvirtual object that is performing properly, and one\nthat is quite ill. We apply the out-of-band monitoring\nusing virtualization and machine learning can\naccurately identify faults in the guest OS, while\navoiding the many pitfalls associated with in-band\nmonitoring."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"virtualization"},{"interim":"availability"},{"interim":"fault-tolerance"},{"interim":"machine learning"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-11-17"}],"displaytype":"preview","filename":"Local Disaster Recovery Using Virtualization Technology.pdf","filesize":[{"value":"60 Kb"}],"format":"application/pdf","licensetype":"license_0","url":{"url":"https://meral.edu.mm/record/6193/files/Local Disaster Recovery Using Virtualization Technology.pdf"},"version_id":"e0846c0b-dda9-4b11-9295-b4e54ab248fa"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"PSC","subitem_c_date":"16 December, 2010","subitem_conference_title":"The Local Conference on Parallel and Soft Computing","subitem_place":"Yangon, Myanmar"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aye Myat Myat Paing"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-12-16"},"item_title":"Local Disaster Recovery Using Virtualization Technology","item_type_id":"21","owner":"45","path":["1596102355557"],"publish_date":"2020-11-17","publish_status":"0","recid":"6193","relation_version_is_last":true,"title":["Local Disaster Recovery Using Virtualization Technology"],"weko_creator_id":"45","weko_shared_id":-1},"updated":"2021-12-13T04:55:51.882878+00:00"}