IT

ALL IT Technology Information

Disk Type and Performance

 Disk Type and Performance

5 Comments:

Hyper-v Network type

 Hyper-v Network type 

Three type in hyper -v :

1)Private Network 

2)Internal Network

3)External network 


4 Comments:

How to creat a virtual disk step by step

 How to create a virtual disk in vmware ,All Type Windows Machine step by step

 ===============================================

A key advantage of virtual disks is their portability. Because the virtual disks are stored as files on the host machine or a remote computer, you can move them easily to a new location on the same computer or to a different computer.

                             

5 Comments:

Windows Shortcut Key and Cmd Command

Run commands


 

5 Comments:

RAID || Data Storage and Backups

 Cloud || RAID || Data Storage and Backups || All Type Diskmgmt


 
A volume is a storage device, such as a fixed disk, floppy disk, or CD-ROM, that is formatted to store directories and files. A large volume can be divided into more than one logical volume, also called a partition

 

3 Comments:

Cloud || hyper-v movement || migration

 Cloud || hyper-v movement || migration

 


2 Comments:

SERVER IN Install AD-DS ROLES

 SERVER IN Install AD-DS (Active Directory Domain Services)ROLES

The part of the directory in charge of management of domains, which was previously a core part of the operating system, was renamed Active Directory Domain Services (ADDS) and became a server role like others. "Active Directory" became the umbrella title of a broader range of directory-based services.
Protocols used: Lightweight Directory Access ...
Developer: Microsoft Corporation
 

3 Comments:

cloud hyper-v ALL Setting || IN vmware

 cloud hyper-v ALL Setting || IN vmware

 

0 Comments:

windows dual boot remove

 windows dual boot remove

 


3 Comments:

cloud hyper-v OS install || IN vmware

 Cloud hyper-v || IN VMware

 How to Install Hyper-V on vmware Workstation 10 ?
If you have connected your Server Manager to another server you could install Hyper-V remotely to that server is you are running Windows Server 2012 or Windows Server 2012 R2. On the Select server roles, select Hyper-V, when the Add features that are required for Hyper-V appears, click Add Features.

As we know we can’t install Hyper-V on vmware Workstation and when install it from Server Manager we get an Error.

1 Comments:

What is NetFlow?

What is NetFlow?

NetFlow is a protocol for collecting, aggregating and recording traffic flow data in a network. NetFlow data provide a more granular view of how bandwidth and network traffic are being used than other monitoring solutions, such as SNMP.


 


 

3 Comments:

What is Syslog?

 What is Syslog?

Syslog stands for System Logging Protocol and is a standard protocol used to send system log or event messages to a specific server, called a syslog server. It is primarily used to collect various device logs from several different machines in a central location for monitoring and review.


 

2 Comments:

What is Ping?

 What is Ping?

The ping command sends a request over the network to a specific device. A successful ping results in a response from the computer that was pinged back to the originating computer.


 

6 Comments:

What is virtualization?

 

What is virtualization?

Virtualization is the process of creating a virtual version of something like computer hardware. It involves using specialized software to create a virtual or software-created version of a computing resource rather than the actual version of the same resource.


 

1 Comments:

What is bandwidth?

 

What is bandwidth?

Bandwidth is measured as the amount of data that can be transferred from one point to another within a network in a specific amount of time. Typically, bandwidth is expressed as a bitrate and measured in bits per second (bps).


 

 

2 Comments:

What is Active Directory?

 

What is Active Directory? 

Active Directory (AD) is a directory service for use in a Windows Server environment. It is a distributed, hierarchical database structure that shares infrastructure information for locating, securing, managing, and organizing computer and network resources including files, users, groups, peripherals and network devices.


 

 

2 Comments:

What is SNMP?

 

What is SNMP?

SNMP stands for Simple Network Monitoring Protocol. It is a protocol for management information transfer in networks, for use in LANs especially, depending on the chosen version.

 

 



2 Comments:

What is WMI?

 What is WMI?

WMI stands for Windows Management Instrumentation. Designed by Microsoft, it is an infrastructure for the standardized management of data and information that is device independent. Since Windows 2000, WMI comes preinstalled with Windows operating systems.

WMI is the Microsoft implementation of the Web-Based Enterprise Management (WBEM), which is managed by the Distributed Management Task Force (DMTF). WBEM sets standards to allow access to data from non-uniform technologies and devices across a standardized architecture. WBEM uses the Common Information Model (CIM) as the schema for defining information about objects.hich both stores files and accepts print jobs from clients and then sends them on to a network-attached printer.

 


 

2 Comments:

What is REST?

 

What is REST?


REST is an architecture style definition applied to networked applications. It exists as a series of constraints applied to the implementation of network components, enabling uniform interface semantics, rather than application-specific implementations and syntax.


REST as a network architecture was first documented by Roy Fielding in his doctoral thesis titled 
Architectural Styles and the Design of Network-based Software Architectures, published in 2000. REST allows clients to interact with data stored on a server, without having any prior knowledge of the server or what exists on it.


 

2 Comments:

What is VPN?

 

What is VPN?

A virtual private network extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network


The VPN itself simply acts like a network interface to the client and is transparent the operating system, applications, and users accessing the VPN network. Therefore, applications, messages, and users can all use the connection normally without any need to understand how the VPN operates.

 

 

 

2 Comments:

What is MQTT?

 

What is MQTT?


MQTT stands for Message Queuing Telemetry Transport. It is a lightweight messaging protocol for use in cases where clients need a small code footprint and are connected to unreliable networks or networks with limited bandwidth resources. It is primarily used for machine-to-machine (M2M) communication or Internet of Things types of connections.
 


 

 

 

 

1 Comments:

What is packet sniffing?

 

What is packet sniffing?


Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet, or a defined subset of packets, may be gathered for further analysis. You as a network administrators can use the collected data for a wide variety of purposes like monitoring bandwidth and traffic.

A packet sniffer, sometimes called a packet analyzer, is composed of two main parts. First, a network adapter that connects the sniffer to the existing network. Second, software that provides a way to log, see, or analyze the data collected by the device.

 

 

1 Comments:

What is CCTV & Informaction

What is CCTV?

closed-circuit television

CCTV stands for closed-circuit television and is commonly known as video surveillance. “Closed-circuit” means broadcasts are usually transmitted to a limited (closed) number of monitors, unlike “regular” TV, which is broadcast to the public at large. CCTV networks are commonly used to detect and deter criminal activities, and record traffic infractions, but they have other uses.

CCTV technology was first developed in 1942 by German scientists to monitor the launch of V2 rockets. It was later used by American scientists during the testing of the atomic bomb.

1 Comments:

What is TLS?

What is TLS?

TLS is short for Transport Layer Security. It is a form of security protocol that offers high levels of privacy, as well as data integrity when it comes to communication using networks and the internet. TLS is the standard for use in secure web applications and websites around the world since its introduction in 1999. It is the successor and replacement for the older SSL (Secure Socket Layer) system. It is often still referred to as SSL when it comes to businesses explaining the safety features they have in place for their websites and data security. While TLS is most commonly associated with browsing the web, it is also used for a range of other forms of applications where security is a requirement, such as instant messaging, email, VoIP networks, and similar functionalities. Its widespread use and development have provided additional security, privacy, and better performance – especially since the release of TLS 1.3, the most recent version of the TLS Protocol. TLS is used actively in the majority of browsers, as indicated by the padlock symbol, which suggests encryption of the sites you are viewing. HTTPS is designated as the more protected form of websites, thanks to its use of the TLS protocol to protect visitors whenever data is exchanged.


 

0 Comments:

What is IIoT?

 What is IIoT?

I saw a recent magazine article outlining six steps to take to implement the Industrial Internet of Things (IIoT). It was mostly political – form a team, get buy-in from a C-level executive, etc. It’s not that I think the political approach is not valuable, but most of us live in a technical world. So here are the technical steps to the IIoT.

 

1 Comments:

What is a server?

What is a server?

1 Comments:

Cloud Computing

  Cloud Computing

What are some of the most effective ways to use cloud computing to achieve business goals?


4 Comments:

CCNA IPV6 router prtocol and informaction

IPv6

IPv6 is the newest version of internet protocol formulated by the IETF, which helps identify and local endpoint systems on a computer network and route online traffic while addressing the problem of IPv4 address depletion due to prolonged internet use worldwide

5 Comments:

match essay tips

match essay tips
 
 

3 Comments:

comparison between RIP, EIGRP, IGRP, and OSPF

 comparison between RIP, EIGRP, IGRP, and OSPF


 

6 Comments:

भारत के टॉप Free Movie Streaming Sites और Apps

 

भारत के टॉप Free Movie Streaming Sites और Apps

 

2 Comments:

Search Engine क्या है

 

Search Engine क्या है और कैसे काम करता है?


4 Comments:

अपने नाम की रिंगटोन कैसे बनाएं और डाउनलोड करें?

 

अपने नाम की रिंगटोन कैसे बनाएं और डाउनलोड करें?


3 Comments:

Keyboard क्या है और कितने प्रकार के होते है?

 Keyboard क्या है और कितने प्रकार के होते है?



आखिर कंप्यूटर कीबोर्ड क्या है? आपने जरुर कीबोर्ड का इस्तमाल किया होगा. क्यूंकि अगर आप एक computer या फिर कोई laptop का इस्तमाल किया होगा तब आपके typing के लिए कीबोर्ड का इस्तमाल जरुर किया होगा. पर आप में से ऐसे बहुत लोग होंगे जिन्हें की Keyboard के विषय में पूरी जानकारी नहीं है. इसलिए ये post कीबोर्ड की जानकारी इन हिंदी उन लोगों को बहुत सहायक होगा समझने के लिए.

5 Comments:

10 Troubleshooting FAQs of Fiber Transceivers

 

10 Troubleshooting FAQs of Fiber Transceivers


 

0 Comments:

Intel vs AMD: Which is Better Processor? Learn Intel vs AMD Comparison Chart!

 

Intel vs AMD: Which is Better Processor? Learn Intel vs AMD Comparison Chart!

When you want to buy a server or computer, could you select the most suitable processor for your device? If you have any trouble, this article may help you!

We all know there are Intel processors and AMD processors in the market. Most of the famous servers are using Intel Xeon processor, such as HPE servers, Dell servers. However, these servers will also install AMD processors. Both of Intel and AMD are popular but their processors can’t work in the same equipment. So we must select the right processor.

There are three main differences between Intel and AMD.

  1. Different Price

In terms of price, compared with the main frequency AMD and Intel, the former is only about half the price of the latter; for AMD, its most popular place is its good overclocking performance and low price. This is the root cause that AMD has the current processor market share.

  1. Overclocking performance is not the same

Most of AMD’s processor motherboards have fool overclocking software. Although they can’t push overclocking to the limit, they can also get overclocking addiction. From the perspective of overclocking, since all Intel processors are frequency-locked, they do not show much advantage in overclocking; although the CPU is locked in frequency multiplication, it can still be overclocked, but the range of overclocking is small.

  1. Different CPU

The main advantage of Intel is that it has strong single-core performance, strong stability and advanced technology. There is no doubt that, for example, the latest ladder diagram is also Intel’s CPU top machine;

At the current stage, for the x86 architecture, both AMD and Intel are roughly optimized to the limit. Turbo-boost is also available in AMD’s next-generation CPUs, while Hyper-Threading technology is also built into AMD’s next-generation CPUs, but for trademark reasons, AMD cannot call its technology Hyper-Threading.

Intel vs AMD Comparison Chart

There are also many models of Intel processors and AMD processors. Now here shares you a model comparison chart, which can help you compare these two brands and select the right model.





Which brand do you think is better? Leave your comments now!


2 Comments:

6 Types of the Wireless Access Point

 

6 Types of the Wireless Access Point

Nowadays, WiFi-6 access points are more and more popular than before. According to the generations of WiFi, we have known there are WiFi 6 APs, WiFi 5 APs, etc., but do you know how many types the Wireless APs provide?

In this post, let’s discuss the types of APs.

  1. Divided by Applications: Commercial AP and Enterprise AP

Commercial AP: Suitable for commercial environments, such as hotels, guesthouses, KTVs, supermarkets, restaurants and other places, which require aesthetics and have many access users. We know there are Hospitality Access Points, which is designed for hotels, such as Aruba 500H Hospitality WiFi-6 Access Points .

Enterprise-level AP: It is suitable for use in large enterprises, companies and other places, and has high security requirements. Commercial APs can also be used in enterprises. Many manufacturers provide this kind of AP, like Cisco AP, Huawei AP, Aruba AP, Ruckus AP, etc.


                       



1 Comments:

CCNA || cisco router high availability commend || TYPE :GLBP ,HSRP, VRRP

 GLBP ,HSRP, VRRP


1 Comments: