wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

virtual machine

profile
Harsh Rathod
Jul 11, 2023
0 Likes
0 Discussions
23 Reads

WHAT IS THE CONCEPT VIRTUAL MACHINE ?

 Virtualization is the process of creating a software-based, or "virtual" version of a computer, with dedicated amounts of CPU, memory, and storage that are "borrowed" from a physical host computer—such as your personal computer— and/or a remote server—such as a server in a cloud provider's datacenter. A virtual machine is a computer file, typically called an image, that behaves like an actual computer. It can run in a window as a separate computing environment, often to run a different operating system—or even to function as the user's entire computer experience—as is common on many people's work computers. The virtual machine is partitioned from the rest of the system, meaning that the software inside a VM can't interfere with the host computer's primary operating system.

BENEFIT OF VIRTUAL MACHINE 

 While virtual machines run like individual computers with individual operating systems and applications, they have the advantage of remaining completely independent of one another and the physical host machine. A piece of software called a hypervisor, or virtual machine manager, lets you run different operating systems on different virtual machines at the same time. This makes it possible to run Linux VMs, for example, on a Windows OS, or to run an earlier version of Windows on more current Windows OS.

And, because VMs are independent of each other, they're also extremely portable. You can move a VM on a hypervisor to another hypervisor on a completely different machine almost instantaneously.


Comments ()


Sign in

Read Next

Direct memory access (DMA)

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

HTML vs HTML5

Blog banner

Wiretapping

Blog banner

Importance of business process documentation

Blog banner

1.1 basic elements

Blog banner

Data Visualization in Decision-Making

Blog banner

Steganography and Steganalysis

Blog banner

Short note on Microsoft office

Blog banner

Multiprocessor scheduling

Blog banner

Rain bow

Blog banner

Deadlock

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Service Operation

Blog banner

Types of E-Commerce

Blog banner

Mumbai local ......

Blog banner

RACI model in IT services

Blog banner

Process in OS

Blog banner

Install Ubuntu in Vmware

Blog banner

A True Friendship

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

FRIENDSHIP

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

I/O Buffering

Blog banner

Google

Blog banner

Operation system

Blog banner

Network Security Risks

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

The Evolution of Operating Systems

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

operating system

Blog banner

Bharat Maps

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Computer Security

Blog banner

Multiprocessor and scheduling

Blog banner

Shoulders

Blog banner

Firewall in Computer Network

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner