IT

ALL IT Technology Information

windows dual boot remove

 windows dual boot remove

 


cloud hyper-v OS install || IN vmware

 Cloud hyper-v || IN VMware

 How to Install Hyper-V on vmware Workstation 10 ?
If you have connected your Server Manager to another server you could install Hyper-V remotely to that server is you are running Windows Server 2012 or Windows Server 2012 R2. On the Select server roles, select Hyper-V, when the Add features that are required for Hyper-V appears, click Add Features.

As we know we can’t install Hyper-V on vmware Workstation and when install it from Server Manager we get an Error.

What is NetFlow?

What is NetFlow?

NetFlow is a protocol for collecting, aggregating and recording traffic flow data in a network. NetFlow data provide a more granular view of how bandwidth and network traffic are being used than other monitoring solutions, such as SNMP.


 


 

What is Syslog?

 What is Syslog?

Syslog stands for System Logging Protocol and is a standard protocol used to send system log or event messages to a specific server, called a syslog server. It is primarily used to collect various device logs from several different machines in a central location for monitoring and review.


 

What is Ping?

 What is Ping?

The ping command sends a request over the network to a specific device. A successful ping results in a response from the computer that was pinged back to the originating computer.


 

What is virtualization?

 

What is virtualization?

Virtualization is the process of creating a virtual version of something like computer hardware. It involves using specialized software to create a virtual or software-created version of a computing resource rather than the actual version of the same resource.


 

What is bandwidth?

 

What is bandwidth?

Bandwidth is measured as the amount of data that can be transferred from one point to another within a network in a specific amount of time. Typically, bandwidth is expressed as a bitrate and measured in bits per second (bps).


 

 

What is Active Directory?

 

What is Active Directory? 

Active Directory (AD) is a directory service for use in a Windows Server environment. It is a distributed, hierarchical database structure that shares infrastructure information for locating, securing, managing, and organizing computer and network resources including files, users, groups, peripherals and network devices.


 

 

What is SNMP?

 

What is SNMP?

SNMP stands for Simple Network Monitoring Protocol. It is a protocol for management information transfer in networks, for use in LANs especially, depending on the chosen version.

 

 



What is WMI?

 What is WMI?

WMI stands for Windows Management Instrumentation. Designed by Microsoft, it is an infrastructure for the standardized management of data and information that is device independent. Since Windows 2000, WMI comes preinstalled with Windows operating systems.

WMI is the Microsoft implementation of the Web-Based Enterprise Management (WBEM), which is managed by the Distributed Management Task Force (DMTF). WBEM sets standards to allow access to data from non-uniform technologies and devices across a standardized architecture. WBEM uses the Common Information Model (CIM) as the schema for defining information about objects.hich both stores files and accepts print jobs from clients and then sends them on to a network-attached printer.

 


 

What is REST?

 

What is REST?


REST is an architecture style definition applied to networked applications. It exists as a series of constraints applied to the implementation of network components, enabling uniform interface semantics, rather than application-specific implementations and syntax.


REST as a network architecture was first documented by Roy Fielding in his doctoral thesis titled 
Architectural Styles and the Design of Network-based Software Architectures, published in 2000. REST allows clients to interact with data stored on a server, without having any prior knowledge of the server or what exists on it.


 

What is VPN?

 

What is VPN?

A virtual private network extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network


The VPN itself simply acts like a network interface to the client and is transparent the operating system, applications, and users accessing the VPN network. Therefore, applications, messages, and users can all use the connection normally without any need to understand how the VPN operates.

 

 

 

What is MQTT?

 

What is MQTT?


MQTT stands for Message Queuing Telemetry Transport. It is a lightweight messaging protocol for use in cases where clients need a small code footprint and are connected to unreliable networks or networks with limited bandwidth resources. It is primarily used for machine-to-machine (M2M) communication or Internet of Things types of connections.
 


 

 

 

 

What is packet sniffing?

 

What is packet sniffing?


Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet, or a defined subset of packets, may be gathered for further analysis. You as a network administrators can use the collected data for a wide variety of purposes like monitoring bandwidth and traffic.

A packet sniffer, sometimes called a packet analyzer, is composed of two main parts. First, a network adapter that connects the sniffer to the existing network. Second, software that provides a way to log, see, or analyze the data collected by the device.

 

 

What is CCTV & Informaction

What is CCTV?

closed-circuit television

CCTV stands for closed-circuit television and is commonly known as video surveillance. “Closed-circuit” means broadcasts are usually transmitted to a limited (closed) number of monitors, unlike “regular” TV, which is broadcast to the public at large. CCTV networks are commonly used to detect and deter criminal activities, and record traffic infractions, but they have other uses.

CCTV technology was first developed in 1942 by German scientists to monitor the launch of V2 rockets. It was later used by American scientists during the testing of the atomic bomb.