wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual machine and virtualizing

profile
UPG NSS Rohan Bagaria
Jul 11, 2023
0 Likes
0 Discussions
16 Reads

Virtual machine and virtualizing

Traditionalthere was an issue where only one operating system can work on one pc. But after the innovation of virtualization things have became easy. We can now use many different operating system on one pc. Also it includes the benefits like virtualizing on different pc i.e when we make one operating system as host server and this server virtualize other pc connected to it. This means the same operating system can run over different pc. This is called Virtual machine. It is one of the most used in companies for optimising hardware usuage. Virtual machine monitor handles and manages storage and networks between the host and other pc. It creates software connection with other pc with the host 

 


Comments ()


Sign in

Read Next

E-BUSINESS RISK MANAGEMENT

Blog banner

Evolution of Operating System

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Wiretapping

Blog banner

DISK SCHEDULING

Blog banner

Risk management in IT

Blog banner

Linux 94

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Blockchain Transactions

Blog banner

Virtual memory

Blog banner

BITCOIN WALLET

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

AOL Mail

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Excel records

Blog banner

HR Automation : Need of the hour

Blog banner

Child labour

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Memory Management

Blog banner

Memory Management of Operating System(OS)

Blog banner

The seven-step improvement process

Blog banner

Booting Process In Operating System

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

RAID - LEVELS OF RAID

Blog banner

Smartsheet

Blog banner

Service Strategy In ITSM

Blog banner

Cache memory

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

The Laws of Karma

Blog banner

Computer Security

Blog banner

Multicore and Multithreading

Blog banner

Modern Operating system

Blog banner

Modern Operating Systems.

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Article on team management software

Blog banner

PYTHON

Blog banner

Firewall

Blog banner