After you provide this information, continue to provide standard configuration data such as virtual machine resource allocation information, cell name, node name, and passwords.
提供这些信息之后,继续提供标准的配置数据,比如虚拟机资源分配信息、单元名称、节点名称和密码。
Operating systems and applications will no longer run only on the employee's PC but on a virtual machine in a data centre that can be accessed remotely, theoretically from any PC in the world.
操作系统和应用将不再只运行在员工的个人电脑上而是可以远程访问的数据中心的虚拟机上,理论上就可以用世界上任何一台个人电脑来访问。
The hacker can steal sensitive information from residual data that has not been purged from re-allocated instance resources within a virtual machine.
黑客可以从虚拟机中重新分配的实例资源中获取还没有清除的残留数据,从中窃取敏感的信息。
So, what happens when data stored on a virtual machine get compromised?
那么,如果存储在虚拟机的数据失去安全保障时怎么办?
This particular use, called server virtualization, is transforming data centers, as a single physical machine can be used to host typically 10 or more virtual machines (VMs), as shown in Figure 1.
这一特殊用途(称为服务器虚拟化)正在演变为数据中心,因为单个物理机能够用于托管10个(一般情况)或更多虚拟机(VM),如图1所示。
Data leakage by virtual machine replication is a vulnerability that's also rooted in the use of cloning for providing on-demand service.
虚拟机复制造成的数据泄漏也是一个类似的漏洞,原因同样在于为了提供随需服务而进行镜像克隆。
When you delete the virtual machine, the ephemeral storage is deleted and thus the data stored on that storage will be deleted.
当您删除虚拟机时,临时性存储会被删除,因此该存储中保存的数据也将随之被删除。
You can delete your virtual machine and the persistent storage will not be deleted, thus you can reattach the storage to a new virtual machine and access your data again.
删除虚拟机的同时并不会删除持久性存储,因此您可以将持久性存储重新附加给新的虚拟机并在此访问您的数据。
In the strictest sense, cloud computing can mean many things, including simply running a sequential script on a virtual machine in a data center.
严格地说,云计算可以意味着许多活动,包括在数据中心中的虚拟机上运行顺序的脚本。
Because software transforms data, each application is also a machine - albeit a "virtual" one, given the absence of physical parts.
由于软件将转换数据,因此每个应用程序也是一台机器——但是是一台“虚拟”机器,因为没有使用物理部件。
This is accomplished using HTTP content-negotiation. This will result in an OVF file with external links to CDMI managed data (application data, virtual machine images etc.).
使用HTTP内容协商可以完成这个任务,这将得到一个OVF文件,外部连接到CDMI管理下的数据(应用数据、虚拟机映像等)。
The next step is to specify the virtual hard disk that the virtual machine will use to store its data, as shown in Figure 8.
下一步是指定虚拟机用来存储数据的虚拟硬盘,见图8。
You need to provision the virtual machine in the same data center as the VLAN. To create the instance, type this command.
您需要在与VLAN相同的数据中心配置虚拟机。
Bloated application Architecture stacks (from the hypervisor, the operating system, the virtual machine to the various service, data and application containers) are ripe for a major transformation.
日益成长的应用程序架构(从管理程序、操作系统、虚拟机到各种服务、数据以及应用程序容器)已经成熟,足以进行主要的转换了。
Data exchange between entities, which lying in the same AOI region and belonging to the different node machine (entity manager), must consume network bandwidth in Distributed Virtual Environment.
分布式虚拟环境中,位于同一个AOI中的实体需要进行数据交换,若它们属于不同的节点机(实体管理器),就会占用网络资源。
The Java virtual machine defines various runtime data areas that are used during execution of a program.
虚拟机定义了各种运行时数据区以备程序运行时利用。
The Java virtual machine defines various runtime data areas that are used during execution of a program.
虚拟机定义了各种运行时数据区以备程序运行时利用。
应用推荐