Research on Application of Virtualization Technology in the Construction of Digital Hospital

2014 ◽  
Vol 687-691 ◽  
pp. 2023-2026
Author(s):  
Hao Jie Wen ◽  
Min Hu

With the development of the hospital information construction, there are the continued implementations of virtualization technology in a variety of business applications, which can integrate and deploy these resources, and improve equipment utilization. In this paper, we analyze the problems existed in traditional hospital data center architecture, proposes the construction of new hospital data center using virtualization technology from the aspects of virtualization framework, server resources integration, network configuration optimization, etc. Server virtualization integration could save resources, improve server utilization ratio, simplify the hardware maintenance and upgrades, reduce operating costs and improve maintenance efficiency. We have introduced the experiences of Virtual Technology using in the hospital data center storage, the core server, integration system, network application and remote access applications, server and database platform as well as the application effects, which make a useful exploration for the building and the development of digital hospital.

2014 ◽  
Vol 1049-1050 ◽  
pp. 1781-1787
Author(s):  
Shan Jing ◽  
Qi Qi ◽  
Run Yuan Sun ◽  
Bo Yang

With the gradual improvement of the level of college informatization, it has become more and more important to build a stable and efficient service platform. In this paper, by analyzing the problems in the process of information construction of colleges, the research focuses on the platform of front-end server technology, reliability, security and manageability to complete the design and implementation of campus network virtualization service platform by adopting server virtualization technology. This research also provides the reference for small and medium-size campus network service platform construction and management.


2017 ◽  
Vol 7 (3) ◽  
pp. 59-75 ◽  
Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

With the rise in cyber-attacks on cloud environments like Brute Force, Malware or Distributed Denial of Service attacks, information security officers and data center administrators have a monumental task on hand. Organizations design data center and service delivery with the aim of catering to maximize device provisioning & availability, improve application performance, ensure better server virtualization and end up securing data centers using security solutions at internet edge protection level. These security solutions prove to be largely inadequate in times of a DDoS cyber-attack. In this paper, traditional data center design is reviewed and compared to the proposed three tier data center. The resilience to withstand against DDoS attacks is measured for Real User Monitoring parameters, compared for the two infrastructure designs and the data is validated using T-Test.


2019 ◽  
Vol 9 (2) ◽  
pp. 369-376
Author(s):  
Soni Soni ◽  
Abdurrahman Abdurrahman ◽  
Afdhil Hafid

Virtualization technology is a topic that began to be scrutinized by researchers. This is inseparable from the technology's ability to reduce the cost of providing infrastructure and operations independently for each service to be served. With server virtualization, we can make several computers into one, which used to be possible for server computers to have three physical computers that can be used as one for the three server computers which in fact the resources on a single physical server computer will not use all the resources in one single physical computer. The existence of proxmox, then all servers can be connected in a network together so that they are able to streamline time. In addition, Proxmox has a web console that can be used for various purposes in server virtualization and maintenance. In this study, the performance of server virtualization using ProxmoxVE will be examined. This study is intended to determine the load of memory usage, load the CPU when running all the servers in Proxmox, and examine the Throughput, PacketLoss, Delay and Jitter on the server. Keyword: Proxmox, Virtualization, Resources, Server, Operating System


2014 ◽  
Vol 1023 ◽  
pp. 240-244
Author(s):  
Ru Liu ◽  
Jun Hui Wu ◽  
Quan Zhou ◽  
Jie Chen ◽  
Hui Ping Si ◽  
...  

The banking information construction in China has made great progress with the rapid development of science and technology. The various systems is on-line continuously for the expansion of banking. While the in-depth development of banking systems is in various types and the scale and complexity of software projects is increasing, the quality of software testing become a constraint to improve the quality of each system bottleneck gradually. As an important aspect of a quality assurance software testing, the test management system is being pay attention gradually. The application software on banking for test management system is first described in this article, and than the research and implementation of test management system is described in detail.


Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

With the rise in cyber-attacks on cloud environments like Brute Force, Malware or Distributed Denial of Service attacks, information security officers and data center administrators have a monumental task on hand. Organizations design data center and service delivery with the aim of catering to maximize device provisioning & availability, improve application performance, ensure better server virtualization and end up securing data centers using security solutions at internet edge protection level. These security solutions prove to be largely inadequate in times of a DDoS cyber-attack. In this paper, traditional data center design is reviewed and compared to the proposed three tier data center. The resilience to withstand against DDoS attacks is measured for Real User Monitoring parameters, compared for the two infrastructure designs and the data is validated using T-Test.


Author(s):  
O Sri Nagesh ◽  
Tapas Kumar ◽  
Venkateswara Rao Vedula

Significant exploitation and utilization of cloud computing in industry is come with and in the identical time vulnerable by unease regarding protection of data hold by cloud computing providers. One of the penalties of moving data processing and storage off business site is that organizations have fewer controls over their infrastructure. seeing that, cloud service (CS) providers must hope that the CS provider is capable to protect their data and infrastructure from both exterior and domestic attacks. Presently however, such hope can only rely on organizational procedures stated by the CS provider and cannot be remotely verified and validated by an external party. The central distinction between cloud computing and conventional enterprise internal Information Technology services is that the proprietor and the consumer of cloud Information Technology infrastructures are separated in cloud. This transform requires a safety responsibility severance in cloud computing. Cloud service providers (CSP) should safe the services they propose and cannot surpass the customers’ authorities. Virtualization is a buildup utterance in the Information Technology world. With the assure to reduce the ever mounting infrastructure inside data centers connected to other important apprehensions such as ease of use and scalability, virtualization technology has been in advance recognition not only with IT experts yet also among administrators and executives as well. The progressively more growing rate of the approval of this technology has exposed these systems to new protection concerns which in recent history have been unnoticed or merely overlooked. This paper presents an in depth state of art gaze at  present most old server virtualization explanations, as well as a writing study on different security matters found inside this virtualization technology. These problems can be practical to all the existing virtualization technologies accessible with no spotlight on a specific answer. Nevertheless, we do susceptibility investigation of two of the mainstream recognized virtualization answers: VMware ESX and Xen. to conclude, we illustrate some clarifications on how to progress the security of online banking and electronic commerce, using virtualization.


Sign in / Sign up

Export Citation Format

Share Document