wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

virtual machine

profile
Harsh Rathod
Jul 11, 2023
0 Likes
0 Discussions
23 Reads

WHAT IS THE CONCEPT VIRTUAL MACHINE ?

 Virtualization is the process of creating a software-based, or "virtual" version of a computer, with dedicated amounts of CPU, memory, and storage that are "borrowed" from a physical host computer—such as your personal computer— and/or a remote server—such as a server in a cloud provider's datacenter. A virtual machine is a computer file, typically called an image, that behaves like an actual computer. It can run in a window as a separate computing environment, often to run a different operating system—or even to function as the user's entire computer experience—as is common on many people's work computers. The virtual machine is partitioned from the rest of the system, meaning that the software inside a VM can't interfere with the host computer's primary operating system.

BENEFIT OF VIRTUAL MACHINE 

 While virtual machines run like individual computers with individual operating systems and applications, they have the advantage of remaining completely independent of one another and the physical host machine. A piece of software called a hypervisor, or virtual machine manager, lets you run different operating systems on different virtual machines at the same time. This makes it possible to run Linux VMs, for example, on a Windows OS, or to run an earlier version of Windows on more current Windows OS.

And, because VMs are independent of each other, they're also extremely portable. You can move a VM on a hypervisor to another hypervisor on a completely different machine almost instantaneously.


Comments ()


Sign in

Read Next

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

The launch of UniMap by HERE

Blog banner

The Sunny Side of Instagram

Blog banner

Virus

Blog banner

Service Operation

Blog banner

Modern operating system

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Data Warehousing

Blog banner

Deadlock

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Question

Blog banner

Types of Malware in Cyber Security

Blog banner

What is Packet Filtering?

Blog banner

Article on team management software

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Life

Blog banner

Dos (Denial of service) Attack

Blog banner

Uniprocessor Scheduling

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Virtualisation

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Service transistion under difficult conditions

Blog banner

Cyber Security Control

Blog banner

Social Media Sentiment Analysis

Blog banner

BharatPe

Blog banner

Lifestyle of a photographer

Blog banner

VIRTUAL MACHINES

Blog banner

Technological Advancement

Blog banner

Ransomware

Blog banner

Memory management

Blog banner

Platonic Solids

Blog banner

Microsoft Windows Overview

Blog banner

Old age lifestyle

Blog banner

Animal’s have my heart

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

RAID_142

Blog banner

Expert System In AI

Blog banner

Open Source Project By Google

Blog banner

CSI and Organizational Change

Blog banner

Self managing devices

Blog banner

Threat management

Blog banner