Disk Type and Performance
Hyper-v Network type
How to creat a virtual disk step by step
How to create a virtual disk in vmware ,All Type Windows Machine step by step
===============================================
A key advantage of virtual disks is their portability. Because the virtual disks
are stored as files on the host machine or a remote computer, you can
move them easily to a new location on the same computer or to a
different computer.
RAID || Data Storage and Backups
Cloud || hyper-v movement || migration
SERVER IN Install AD-DS ROLES
SERVER IN Install AD-DS (Active Directory Domain Services)ROLES
cloud hyper-v ALL Setting || IN vmware
cloud hyper-v OS install || IN vmware
Cloud hyper-v || IN VMware
As we know we can’t install Hyper-V on vmware Workstation and when install it from Server Manager we get an Error.
What is NetFlow?
What is Syslog?
What is Syslog?
Syslog stands for System Logging Protocol and is a standard protocol used to send system log or event messages to a specific server, called a syslog server. It is primarily used to collect various device logs from several different machines in a central location for monitoring and review.
What is Ping?
What is virtualization?
What is bandwidth?
What is Active Directory?
What is Active Directory?
Active Directory (AD) is a directory service for use in a Windows Server environment. It is a distributed, hierarchical database structure that shares infrastructure information for locating, securing, managing, and organizing computer and network resources including files, users, groups, peripherals and network devices.
What is SNMP?
What is WMI?
What is WMI?
WMI stands for Windows Management Instrumentation. Designed by Microsoft, it is an infrastructure for the standardized management of data and information that is device independent. Since Windows 2000, WMI comes preinstalled with Windows operating systems.
WMI is the Microsoft implementation of the Web-Based Enterprise Management (WBEM), which is managed by the Distributed Management Task Force (DMTF). WBEM sets standards to allow access to data from non-uniform technologies and devices across a standardized architecture. WBEM uses the Common Information Model (CIM) as the schema for defining information about objects.hich both stores files and accepts print jobs from clients and then sends them on to a network-attached printer.
What is REST?
What is REST?
REST is an architecture style definition applied to networked applications. It
exists as a series of constraints applied to the implementation of network
components, enabling uniform interface semantics, rather than
application-specific implementations and syntax.
REST as a network architecture was first documented by Roy Fielding in his
doctoral thesis titled Architectural Styles and the Design of Network-based Software
Architectures, published in 2000. REST allows clients
to interact with data stored on a server, without having any prior knowledge of
the server or what exists on it.
What is VPN?
What is VPN?
A virtual private network extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network
The VPN itself simply acts like a network interface to the client and is
transparent the operating system, applications, and users accessing the VPN
network. Therefore, applications, messages, and users can all use the connection
normally without any need to understand how the VPN operates.
What is MQTT?
What is MQTT?
What is packet sniffing?
What is packet sniffing?
Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet, or a defined subset of packets, may be gathered for further analysis. You as a network administrators can use the collected data for a wide variety of purposes like monitoring bandwidth and traffic.
A packet sniffer, sometimes called a packet analyzer, is composed of two main parts. First, a network adapter that connects the sniffer to the existing network. Second, software that provides a way to log, see, or analyze the data collected by the device.
What is CCTV & Informaction
What is CCTV?
closed-circuit television
CCTV stands for closed-circuit television and is commonly known as video surveillance. “Closed-circuit” means broadcasts are usually transmitted to a limited (closed) number of monitors, unlike “regular” TV, which is broadcast to the public at large. CCTV networks are commonly used to detect and deter criminal activities, and record traffic infractions, but they have other uses.
CCTV technology was first developed in 1942 by German scientists
to monitor the launch of V2 rockets. It was later used by American scientists
during the testing of the atomic bomb.
What is TLS?
What is TLS?
TLS is short for Transport Layer Security. It is a form of security protocol that offers high levels of privacy, as well as data integrity when it comes to communication using networks and the internet. TLS is the standard for use in secure web applications and websites around the world since its introduction in 1999. It is the successor and replacement for the older SSL (Secure Socket Layer) system. It is often still referred to as SSL when it comes to businesses explaining the safety features they have in place for their websites and data security. While TLS is most commonly associated with browsing the web, it is also used for a range of other forms of applications where security is a requirement, such as instant messaging, email, VoIP networks, and similar functionalities. Its widespread use and development have provided additional security, privacy, and better performance – especially since the release of TLS 1.3, the most recent version of the TLS Protocol. TLS is used actively in the majority of browsers, as indicated by the padlock symbol, which suggests encryption of the sites you are viewing. HTTPS is designated as the more protected form of websites, thanks to its use of the TLS protocol to protect visitors whenever data is exchanged.
What is IIoT?
What is IIoT?
I saw a recent magazine article outlining six steps to take to implement the Industrial Internet of Things (IIoT). It was mostly political – form a team, get buy-in from a C-level executive, etc. It’s not that I think the political approach is not valuable, but most of us live in a technical world. So here are the technical steps to the IIoT.
Cloud Computing
CCNA IPV6 router prtocol and informaction
comparison between RIP, EIGRP, IGRP, and OSPF
भारत के टॉप Free Movie Streaming Sites और Apps
Search Engine क्या है
अपने नाम की रिंगटोन कैसे बनाएं और डाउनलोड करें?
Keyboard क्या है और कितने प्रकार के होते है?
Keyboard क्या है और कितने प्रकार के होते है?
आखिर कंप्यूटर कीबोर्ड क्या है? आपने जरुर कीबोर्ड का इस्तमाल किया होगा. क्यूंकि अगर आप एक computer या फिर कोई laptop का इस्तमाल किया होगा तब आपके typing के लिए कीबोर्ड का इस्तमाल जरुर किया होगा. पर आप में से ऐसे बहुत लोग होंगे जिन्हें की Keyboard के विषय में पूरी जानकारी नहीं है. इसलिए ये post कीबोर्ड की जानकारी इन हिंदी उन लोगों को बहुत सहायक होगा समझने के लिए.
10 Troubleshooting FAQs of Fiber Transceivers
Intel vs AMD: Which is Better Processor? Learn Intel vs AMD Comparison Chart!
Intel vs AMD: Which is Better Processor? Learn Intel vs AMD Comparison Chart!
When you want to buy a server or computer, could you select the most suitable processor for your device? If you have any trouble, this article may help you!
We all know there are Intel processors and AMD processors in the market. Most of the famous servers are using Intel Xeon processor, such as HPE servers, Dell servers. However, these servers will also install AMD processors. Both of Intel and AMD are popular but their processors can’t work in the same equipment. So we must select the right processor.
There are three main differences between Intel and AMD.
- Different Price
In terms of price, compared with the main frequency AMD and Intel, the former is only about half the price of the latter; for AMD, its most popular place is its good overclocking performance and low price. This is the root cause that AMD has the current processor market share.
- Overclocking performance is not the same
Most of AMD’s processor motherboards have fool overclocking software. Although they can’t push overclocking to the limit, they can also get overclocking addiction. From the perspective of overclocking, since all Intel processors are frequency-locked, they do not show much advantage in overclocking; although the CPU is locked in frequency multiplication, it can still be overclocked, but the range of overclocking is small.
- Different CPU
The main advantage of Intel is that it has strong single-core performance, strong stability and advanced technology. There is no doubt that, for example, the latest ladder diagram is also Intel’s CPU top machine;
At the current stage, for the x86 architecture, both AMD and Intel are roughly optimized to the limit. Turbo-boost is also available in AMD’s next-generation CPUs, while Hyper-Threading technology is also built into AMD’s next-generation CPUs, but for trademark reasons, AMD cannot call its technology Hyper-Threading.
Intel vs AMD Comparison Chart
There are also many models of Intel processors and AMD processors. Now here shares you a model comparison chart, which can help you compare these two brands and select the right model.
Which brand do you think is better? Leave your comments now!
6 Types of the Wireless Access Point
6 Types of the Wireless Access Point
Nowadays, WiFi-6 access points are more and more popular than before. According to the generations of WiFi, we have known there are WiFi 6 APs, WiFi 5 APs, etc., but do you know how many types the Wireless APs provide?
In this post, let’s discuss the types of APs.
- Divided by Applications: Commercial AP and Enterprise AP
Commercial AP: Suitable for commercial environments, such as hotels, guesthouses, KTVs, supermarkets, restaurants and other places, which require aesthetics and have many access users. We know there are Hospitality Access Points, which is designed for hotels, such as Aruba 500H Hospitality WiFi-6 Access Points .
Enterprise-level AP: It is suitable for use in large enterprises, companies and other places, and has high security requirements. Commercial APs can also be used in enterprises. Many manufacturers provide this kind of AP, like Cisco AP, Huawei AP, Aruba AP, Ruckus AP, etc.
5 Comments: