Skip to main content

All about Emulation and Virtualisation

NETWORK TECH WORLD

All about Emulation and Virtualisation

As computers are become more and more powerful by the date, they have easily reached a level when we can run multiple OSes at the same time! One would ask “How’s that beneficial?”. Well, the answer varies from person to person, but the basic sum up is this: Running multiple OSes allows you to be productive. You can test your under-work website on that crappy Internet Explorer ( Yea, some still people use it! Don’t ask me why! ) when you are using OS X/Ubuntu/Any other Linux.

There are multiple ways to do it, One is Virtualisation, another is Emulation, and the last one is emulating the OS’ APIs. Emulation is like making a virtual computer inside a computer, Yea that’s kinda fuzzy! This means the “real” computer is totally safe from any malfuntion in the “virtual” one. Sounds promising, but most of the emulating softwares are extremely slow. FYI emulators aren’t just for emulating computers, there are varied types of emulators, some for even emulating gaming consoles!
Here is a (not so) long list of emulators:
  • JPC (Java PC) Probably the most impressive on the list, this emulator can run on any system that supports Java, Yea that includes your mobile phone too! It can run some Linux distros such as Damn Small Linux and Feather Linux, and partially run some of the older days windows. Its worth a try out especially when you can run it as an applet in your browser only! Go, give it a try!
  • Palm OS Simulator This one emulates HP’s no longer existent Palm OS on any x86 architecture (that is your computer).
  • WINE Dubbed as a recursive name “Wine is not an Emulator”, this one has been grabbing headlines from quite some time. It emulates the Windows API on Linux and Mac systems. That means you can run your favorite windows app ( not all, there is a compatibility list, see here )  , you can run it on your non supported system. There are derivatives like PlayOnLinux and Crossover Linux which make this Command Line Interface much more easy to use with a Graphical Interface!
  • PCSX As some of you might have guessed, this one emulates PS and PS2 on your windows/linux/mac system.
Above I highlighted some of the coolest Emulators, A complete but obtrusive list is present on the Wikipedia here.
When it comes to virtualisation, the big players are VMware and Parallels, here’s a list of some impressive virtualisation options:
Some of these like Bochs are available for mobile OSes like Android.

Comments

Popular posts from this blog

What is network

NETWORK TECH WORLD What is network  A network is a group of devices, such as computers, servers, and printers, that are connected together and able to communicate with each other. Networks can be classified based on their size and scope, such as a local area network (LAN), which is a network that is confined to a small area, such as a single building or campus, or a wide area network (WAN), which is a network that spans a large geographical area, such as a city or a country. Networks can also be classified based on their communication protocols, such as the Internet, which is a global network that uses the Internet Protocol (IP) to connect devices around the world.

Network Devices

NETWORK TECH WORLD A network device is a hardware device that helps to connect a computer or other devices to a network. There are several types of network devices, including: Routers: These devices route data packets between different networks. Switches: These devices allow multiple devices on a network to communicate with each other by forwarding data packets to the intended recipient. Hubs: These devices are similar to switches, but they do not filter the data packets based on the destination. Instead, they broadcast the data packets to all devices connected to the hub. Bridges: These devices connect two different networks and allow data packets to be transmitted between them. Modems: These devices allow computers to connect to the internet by converting data into a format that can be transmitted over a phone line or cable connection. Firewalls: These devices protect a network by blocking unauthorized access and monitoring traffic for any malicious activity. These are just a few exa...

How to Hack Computer

NETWORK TECH WORLD  How to Hack Someone's Computer As the digital world becomes more and more complex, the need for deliberate, thorough security grows. Yes, we know, you’ve got everything “password protected.” And yes, not every hacker is like the guys in the movies who are able to keyboard their way through complicated layers of encrypted, password-protected security faster than a gamer boots up a new version of Call of Duty. In the real world it’s a lot easier than that. And no, this isn’t actually a tutorial about how to break into someone’s computer or smart phone or tablet. Just an observation of sorts. A caution to our loyal readers, if you like. The Brand Keys 2012 Customer Loyalty Engagement Index reveals that consumers choose laptop computers on the basis of anything but security. Instead, consumers tend to select on the basis of factors like innovative design and brand reputation. This doesn’t mean that security isn’t important, but that it does mean that it’s...