Wednesday, May 8, 2019
Historical Information for Midrange computers Thesis
Historical selective information for Midrange estimators - Thesis ExampleHowever, by 1998, IBM again emerged as the major(ip) producer of the midrange arrangings. By the year 2002, client- emcee platforms and midrange computers almost mingled together technology-wise and expanded the sphere of enterprise spanning storage management. In the contemporary business environment, midrange systems ar being used for electronic data interchange, B2B communication, and customer relationship management. These systems atomic number 18 becoming increasingly popular. (selective informationlink, 2007 Rojas, 2001) Client-Server Architecture Midrange computers have been increasingly incorporated in the client-server architecture, which involves synchronized programs in an IT application. The server provides a service to one or more clients that send requests for it. Midrange computers are thus enabled with database access, web access, electronic mail exchange, etc., which are based on this arch itecture. (Berson, 1996) Shared Resources In client-server model, the clients share the resources like database, hardware, applications, etc. through a server. Network computing is an apt example of utilizing shared resources. (Berson, 1996) Advantages and Disadvantages Advantages include distribution of responsibilities and roles in a computer system through numerous independent computers, which assists decentralization, redundancy, etc. Replacement, repairing, upgrading, and relocating the components of such systems are easier. Disadvantages include server clot and risk of electronic network intrusion. If the server is down, the whole system is down. Peer-to-Peer Structure This system uses distributive application architecture. The extremity computers of such a system (or network) are equally powerful. (Subramanian and Goodman, 2005) Shared Systems Shared systems in peer-to-peer structure facilitate file and application sharing without the requirement of a central coordination . Peers are consumers as well as suppliers of the resources. (Subramanian and Goodman, 2005) Advantages and Disadvantages Advantages include higher computing power, storage space and bandwidth. Distributive architecture makes the system robust. However, this system lacks trenchant mechanisms for file security. If a malicious code enters the system through a network node, the entire network may shatter down. Security/Risk with regards to Midrange Technology Privacy Since midrange technology is primarily client-server model based, privacy can be ensured by implementing appropriate security policies through the central server. (Newman, 2010 Berson, 1996) Disclosure of Data Information in storage or during transmission through network resources may be disclosed by hacking, spyware, etc. Encryption can be used to solve this problem. (Newman, 2010) Data Access Technologies like SQL, XML, entanglement Services, etc. can be used in the midrange computers to facilitate data access secure. (Newman, 2010) Secure Data Deletion This is a general issue in the context of computers. Hard disc shredding and multiple overwrites are suggestible in this regard. (University of Pennsylvania, 2011) Key Management Midrange computer system can provide secured encryption rule through a central server along with effective public and private key management. (Ryabko and Fianov, 2005) analyse Rights Audit rights can be implemented to midrange computing, which will enhance security through account management, system events tracking, recording logons and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.