wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual machine and virtualizing

profile
UPG NSS Rohan Bagaria
Jul 11, 2023
0 Likes
0 Discussions
16 Reads

Virtual machine and virtualizing

Traditionalthere was an issue where only one operating system can work on one pc. But after the innovation of virtualization things have became easy. We can now use many different operating system on one pc. Also it includes the benefits like virtualizing on different pc i.e when we make one operating system as host server and this server virtualize other pc connected to it. This means the same operating system can run over different pc. This is called Virtual machine. It is one of the most used in companies for optimising hardware usuage. Virtual machine monitor handles and manages storage and networks between the host and other pc. It creates software connection with other pc with the host 

 


Comments ()


Sign in

Read Next

MAJOR ACHIEVEMENTS OF OS

Blog banner

Cache memory

Blog banner

Characteristics of Etherum

Blog banner

What is Network Security?

Blog banner

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Types of Big Data

Blog banner

Animal’s have my heart

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Senseless Teeths

Blog banner

Hello World

Blog banner

"Audit" In Data Science

Blog banner

Importance of Education

Blog banner

Amazon

Blog banner

Embaded operating system

Blog banner

Top 10 Logos and their meanings

Blog banner

Secure Hypertext transfer protocol

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Raid

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Making Money through Instagram

Blog banner

Cache memory

Blog banner

Deadlock Prevention

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Functions Of Operating Systems

Blog banner

Threat management

Blog banner

Disk scheduling

Blog banner

How I use google in my daily life

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Data Mining

Blog banner

ProofHub

Blog banner

Life of a 2020-2021 student

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Self defence

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

What is E-commerce

Blog banner

Service Design Model

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Multithreading in Operating System

Blog banner

What are Virtual Machines

Blog banner