Optimizing Windows Redstone 3 Boot Process
DOI:
https://doi.org/10.21015/vtse.v13i1.490Abstract
Almost every Microsoft Windows user at some point in life must have experience that his/her laptop or desktop has gone down slow and is just not performing swiftly as it used to do when Windows was initially installed on that system. This results in decreased performance of the system in over a few weeks of fresh installation of Microsoft Redstone 3 OS, the system starts to show degraded performance and increased bootup and shutdown times. This is not only the case, the loading of documents and power point files along with other programs gets slow. The system gets slower and slower. To tackle this challenge, we propose a solution in this paper that will optimize the starting and shutdown times of Redstone 3 OS with marked improvement.
References
IDC Technology spotlight. Managing the I/O explosion without additional hardware. Retrieved from http://www.techrepublic.com/resource-library/whitepapers/idc-spotlight-managing-the-o-explosion-without-additional-hardware-using-v-locity
BURBANK, CA--(Marketwired - November 17, 2015) Validation Data from ESG Labs . Retrieved from http//www.marketwired.com/press-release/esg-labs-validates-results-condusivs-v-locity-i-o-reduction-software-reducing-up-50-2074493.htm [Accessed: 15-Sep-2018].
V-locity Application Accelerator: Overview | Application Performance in Virtual, Physical, and Cloud Environments. Retrieved from http://www.condusiv.com/business/v-locity/overview/.
Zheng, D., Jin, H., Liao, X., & Zhang, Y. (2014, August). Accelerating the Massive VMs Booting Up. In High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC, CSS, ICESS), 2014 IEEE Intl Conf on (pp. 197-204). IEEE. DOI: https://doi.org/10.1109/HPCC.2014.40
Soundararajan, V., & Anderson, J. M. (2010, June). The impact of management operations on the virtualized datacenter. In ACM SIGARCH Computer Architecture News (Vol. 38, No. 3, pp. 326-337). ACM. DOI: https://doi.org/10.1145/1816038.1816003
Azmandian, F., Moffie, M., Alshawabkeh, M., Dy, J., Aslam, J., & Kaeli, D. (2011). Virtual machine monitor-based lightweight intrusion detection. ACM SIGOPS Operating Systems Review, 45(2), 38-53. DOI: https://doi.org/10.1145/2007183.2007189
Khan, Y. D., Ahmad, F., & Anwar, M. W. (2012). A neuro-cognitive approach for iris recognition using back propagation. World Applied Sciences Journal, 16(5), 678-685.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY