wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

virtual machine

profile
Harsh Rathod
Jul 11, 2023
0 Likes
0 Discussions
23 Reads

WHAT IS THE CONCEPT VIRTUAL MACHINE ?

 Virtualization is the process of creating a software-based, or "virtual" version of a computer, with dedicated amounts of CPU, memory, and storage that are "borrowed" from a physical host computer—such as your personal computer— and/or a remote server—such as a server in a cloud provider's datacenter. A virtual machine is a computer file, typically called an image, that behaves like an actual computer. It can run in a window as a separate computing environment, often to run a different operating system—or even to function as the user's entire computer experience—as is common on many people's work computers. The virtual machine is partitioned from the rest of the system, meaning that the software inside a VM can't interfere with the host computer's primary operating system.

BENEFIT OF VIRTUAL MACHINE 

 While virtual machines run like individual computers with individual operating systems and applications, they have the advantage of remaining completely independent of one another and the physical host machine. A piece of software called a hypervisor, or virtual machine manager, lets you run different operating systems on different virtual machines at the same time. This makes it possible to run Linux VMs, for example, on a Windows OS, or to run an earlier version of Windows on more current Windows OS.

And, because VMs are independent of each other, they're also extremely portable. You can move a VM on a hypervisor to another hypervisor on a completely different machine almost instantaneously.


Comments ()


Sign in

Read Next

File system

Blog banner

Virtual memory in windows

Blog banner

Deadlock

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

Amazon

Blog banner

Scheduling

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Service Operations in ITSM

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

Paid Email

Blog banner

Blockchain in IoT Applications

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Security in Operating Systems

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

BharatPe

Blog banner

Consumer to consumer Business model

Blog banner

Buffering

Blog banner

Threads and concurrency

Blog banner

Photorec - media recovery tool

Blog banner

Odoo

Blog banner

Business-to-Business

Blog banner

Instagram

Blog banner

Supervised and unsupervised learning

Blog banner

Virtual Memory

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Deadlock

Blog banner

Threats To Computer System

Blog banner

Service Design Model

Blog banner

File management

Blog banner

Proton mail

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

The application udemy

Blog banner

Constrained Management in IT

Blog banner

Deadlocks in Operating Systems

Blog banner

Friendship

Blog banner

Outlook.com

Blog banner

Cyber Forensics on IOT Devices

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Assignment 2

Blog banner