Skip to main content

Path Exploration of Optimizing Management Practice for Power Information Room with the Help of KVM Technology

  • Conference paper
  • First Online:
Cyber Security Intelligence and Analytics (CSIA 2021)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1342))

  • 1063 Accesses

Abstract

For the daily management of conditions occurred in the computer information, KVM technology is proposed for solution. This article introduces the characteristics and types of KVM process as well as the features and functions of this scheme in detail, and points out the situations that need to be paid attention to in the process of practical application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Youbin, X., Sheng, H.: Remote maintenance of data room based on KVM, remote desktop and VPN. Anhui Electric Power, vol. 02 (2010)

    Google Scholar 

  2. Shuwen, M.: Application and research of KVM over IP technology in campus network. Computer Engineering and Design, vol. 07 (2008)

    Google Scholar 

  3. Xinzhou, L.: Application of service and storage technology based on IP in university library. Library Work and Study, vol. 03 (2007)

    Google Scholar 

  4. Ruirui, F.: Remote real-time monitoring and management of library server. Journal of Library Science, vol. 05 (2010)

    Google Scholar 

  5. Xikun, M., Yanjun, W., Caixia, Y.: Scheme design of remote centralized control system for machine room equipment. China Medical Devices, vol. 03 (2012)

    Google Scholar 

  6. Jie, L., Tianqiao, N.: Building an efficient green computer experimental teaching platform based on virtualization technology. Comput. Modern. 1(4), 210 (2013)

    Google Scholar 

  7. Qiulan, H., Sha, L., Yaodong, C., Gang, C.: Performance optimization and application of KVM virtual computer in high energy physics computing environment. Comput. Sci. 42(1), 67–71 (2015)

    Google Scholar 

  8. Zhenghong, G., Xinhua, M., Anyi, L.: Cloud computing on-line migration strategy based on AHP weight and grey server load prediction. Computer Measurement and Control, vol. 03 (2015)

    Google Scholar 

  9. Yanwen, X.: Design and implementation of desktop virtualization architecture based on KVM. Shanghai Jiao Tong University (2012)

    Google Scholar 

  10. Yi, H., Shengxian, L.: Implementation of processor isolation in KVM virtualization. Computer Systems and Applications (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ziliang Qiu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qiu, Z. (2021). Path Exploration of Optimizing Management Practice for Power Information Room with the Help of KVM Technology. In: Xu, Z., Parizi, R.M., Loyola-González, O., Zhang, X. (eds) Cyber Security Intelligence and Analytics. CSIA 2021. Advances in Intelligent Systems and Computing, vol 1342. Springer, Cham. https://doi.org/10.1007/978-3-030-70042-3_37

Download citation

Publish with us

Policies and ethics