...Riordan’s Windows Server and Linux Critique Learning Team A POS/420 Date: Instructor: Riordan’s Windows Server and Linux Critique At the request of Riordan Manufacturing, Inc., the project team conducted a thorough review to compare the advantages and disadvantages of Windows Server and Linux. The recommendation of an operating system will ensure Riordan’s business operations continue with compatibility between all locations with the highest level of security, administration, networking, performance, and programmabilityimplemented. Security Although there are proponents everywhere for each type of operating system available on the market today, the focus of this project team, at the request of Riordan management, is to compare the security advantages and disadvantages of Windows Server and Linux. Windows Server Advantages. Windows Server has improved over the years in providing basic security provisions for administrators. Access to any system is extremely important to security professionals, such as domain name system (DNS), active directory domain services (AD), and access to web servers using Internet Information Services (IIS). DNS security extensions (DNSSEC) provide added security when a consumer is gaining access to a company’s website as well as how the company interacts...
Words: 1859 - Pages: 8
...UNIX, Linux, and Windows Server Critique Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active are just a few of the ways that help close the gap...
Words: 2750 - Pages: 11
...Linux versus Windows The purpose of this document is to explore the benefits or disadvantages of using UNIX® or Linux® versus Windows Server® for company business operations at Kudler Fine Foods. Background Three grocery stores in southern California comprise Kudler Fine Foods. Employing approximately 150 people, Kudler caters to people who enjoy gourmet-class foods, first-rate service, and a friendly atmosphere helps make a pleasant shopping experience. Current company information technology (IT) assets include local 10BaseT Ethernet networks at the three locations, Windows Server at the La Jolla headquarters, and 56kb modem links between the facilities enabling sharing of company information. At each store a point of service (POS) cash register application links the 20 total terminals to a proprietary purchasing application for inventory price lookup and monetary exchanges. The company also uses the Windows Server platform to run an e-commerce website for sales of select inventory over the Internet. Security The Kudler Fine Foods e-commerce stores security of the server is the number one priority of team B. Which server is the most secure, Linux or Windows? Many information technicians have their favorite but the bottom line is, which operating system has the target on their back as far a security breaches. According to Noyes (2010) there are five key factors that make Linux superior to Windows. • Privileges • Social Engineering • The Monoculture Effect •...
Words: 2469 - Pages: 10
...students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Blum, R. (2008). Linux® command line and shell scripting bible. Indianapolis, IN: Wiley. Love, P., Merlino, J., Zimmerman, C., Reed, J. C., & Weinstein, P. (2005). Beginning Unix®. Indianapolis, IN: Wiley. Software RedHat Linux 5 (Virtual Desktop) Article References Ahmed, M. F., & Gokhale, S. (2009). Reliable operating systems: Overview and techniques. IETE Technical Review, 26(6), 461–469. Anthes, G. (2009, June 20-July 27). UNIX turns 40. Computerworld, 43(24), 16. Berlot, M., & Sang, J. (2008, January). Dealing with process overload attacks in UNIX. Information Security Journal: A Global Perspective, 17(1),...
Words: 1560 - Pages: 7
...Unix/Windows Systems Review for Riordan Manufacturing Micah Gerber POS/420 December 21, 2012 Charles Mathieu Abstract Riordan Manufacturing is the leader in the plastic injection molding industry with facilities in both the United States and China. As a large global operation, having adequate systems in place to support the organization network and databases is of upmost importance. A critique which addresses the benefits and disadvantages of using UNIX or Linux versus Microsoft Windows Server within Riordan Manufacturing will be completed by Team A. Areas to be addressed within the critique will cover security, administration, networking, performance, programmability, and reliability as it relates to UNIX or Linux and Microsoft Windows Server. Riordan Manufacturing currently has a combination of Unix and Windows servers which support the organization, however, the team will recommend that the organization standardize it’s systems to support one platform across the agency. Through this recommendation Riordan’s Manufacturing infrastructure will have one platform Security Review The histories of both Windows and UNIX security development have taken diametric paths. The Windows operating system (OS) is monolithic by design, which means that most of the features are integrated into a single unit and is located into the core of the OS. UNIX, on the other hand is based on the core of the operating systems residing in a distributed manner where...
Words: 1893 - Pages: 8
...PropAdvwork Proposal University of Maryland University College Shiv LLC will greatly benefit from using Windows Server 2012 to manage their network. Windows Server 2012 brings great updates to security and functionality over past editions of Windows. In this proposal, the major areas I will cover are Active Directory, Group Policy, DNS, File Services, Remote Services, and WSUS (Windows Server Update Services). These major roles have features that will make Shiv LLC Company’s infrastructure run smoothly. Active Directory Shiv LLC will have sites across a large geographic location. Because of this, a regional domain model should be used. Domains will be broken down into where users are working. For example, currently Shiv LLC has three locations, Los Angeles, Dallas, and Houston. This means there will be three domains, representing each of these cities. This strategy will make sure the network can be maintained by regional administrators, who will only worry about users in their area of the network. With this style of deployment, it can be difficult to decide what will be the forest root domain. The main staff for the company is in two cities, Dallas and Houston. This makes it difficult to make one of these sites the forest root domain. To make this decision neutral, a dedicated forest root domain can be suggested. This domain will be created only to function as the forest root. It will not contain and users, except for service administrator accounts for the forest root....
Words: 466 - Pages: 2
...UNIX, Linux, and Windows Server Critique POS/420 Name Professor Date University of Phoenix Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active...
Words: 2760 - Pages: 12
...Describe some reasons why Linux is installed on only a very small fraction of desktop computers. Are there particular categories of products or users who might see Linux as more appealing than conventional operating systems? Do you think Linux's share of the desktop market will increase? Why or why not? Linux is used proportionally due to the fact that we live in a Windows world. All of the name brand software applications like Office, Peachtree and QuickBooks are Windows based. I couldn’t imagine playing Call of Duty on Linux. Not saying it couldn’t happen. Without being said there is a huge demand to make Windows applications. The overall installation process for Linux is different. I won’t say difficult but different. Linux overall doesn’t have the virus issues that Windows tends to obtain. I know there are a ton of LIVE CD’s out there that is used for forensics, firewalls, backup and recovery. I have used a few of them in the past to recover partitions on hard drives unattainable by windows. I see windows becoming more and more of an online service in the future. If Microsoft goes this route, I can see users adapting to Linux just to avoid a big brother conspiracy. One thing that could also increase the usage of Linux might be those entities that are trying to implement technology with a tight budget. 2) What are some of the benefits of cloud computing? What are some of the drawbacks? Find an article about cloud computing online. Summarize and critique the article in your...
Words: 663 - Pages: 3
... ©Copyright 2000, The Progress & Freedom Foundation. All rights reserved. TABLE OF CONTENTS EXECUTIVE SUMMARY iii I. INTRODUCTION 1 II. MICROSOFT’S OPERATING SYSTEM MONOPOLY 3 III. NEW MARKET DEVELOPMENTS 5 A. America Online/Netscape Merger 5 B. America Online/ Time Warner Merger 6 C. Linux 6 D. Information Appliances 6 E. Web-Based Computing 7 IV. ANTICOMPETITIVE ACTS: THE NETSCAPE BROWSER 8 A. Market Division Proposal 9 B. Exclusive Arrangements with Original Equipment Manufacturers (OEMs) 9 C. Exclusive Arrangements with Internet Access Providers (IAPs) 10 V. OTHER ANTICOMPETITIVE ACTS 12 A. Java 12 B. Intel 12 C. IBM 13 VI. HARM TO CONSUMERS 14 VII. ALTERNATIVE REMEDIES 16 A. Conduct Remedies 16 B. Structural Remedies 17 1. Functional Divestiture 18 2. Full Division Remedy 19 3. One-Time Licensing Auction 21 VIII. The Hybrid Structural Remedy 22 A. The Minimum Scope of the Windows Company 23 B. The Applications Company 24 C. Addition of Products into the Windows Companies 25 D. Other Operational Issues 26 1. Shareholders 26 2. Intellectual Property 27 3. Employees 27 4. Contracts 28 5. Pecuniary Assets and Investments 28 E. Measures to Preserve the Hybrid Structural Remedy 28 IX. BENEFITS OF THE HYBRID REMEDY 31 A. Operating Systems Competition 31 B. Competition in the...
Words: 15664 - Pages: 63
...CSE- 401 DISTRIBUTED SYSTEMS [3 1 0 4] 1. Distributed System Models: Introduction , Examples , Architecture models , Fundamental models (1.1,1.2,1.4, 2.1-2.3 of Text1 ) ..2hrs 2. Interprocess Communication, Distributed Objects and Remote Invocation: Introduction , External data representation and marshalling, Communication models, Communication between distributed objects , Remote procedure call Case study: Interprocess communication in UNIX, Java RMI . (4.1-4.6, 5.1-5.5 of Text1) ..6hrs 3. Operating System Introduction , Operating system layer, Processes and threads, Communication and invocation, Architecture (6.1-6.6 of Text1) ..4hrs. 4. Distributed File Systems and Name Services: Introduction , File service architecture, Name services, Domain Name System, Directory and directory services. Case study: Sun network file system, Global name service. (8.1-8.3, 9.1-9.4 of Text1) …6hrs 5. Synchronization: Clock Synchronization, Physical clocks, Logical clocks, Global state (5.1-5.3 of Text2) ..5hrs 6. Transactions&...
Words: 5050 - Pages: 21
...The Microsoft Antitrust Case* by Nicholas Economides** Revised April 2, 2001 Abstract This paper analyzes the law and economics of United States v. Microsoft, a landmark case of antitrust intervention in network industries. The United States Department of Justice and 19 States sued Microsoft alleging (i) that it monopolized the market for operating systems of personal computers and took anti-competitive actions to illegally maintain its monopoly; (ii) that it attempted to monopolize the market for Internet browsers because such browsers would create competition for operating systems; (iii) that it bundled its browser (Internet Explorer) with Windows; and that it engaged in a number of other anti-competitive exclusionary arrangements with computer manufacturers, Internet service providers, and content providers attempting to thwart the distribution of Netscape’s browser. The District Court Judge found in most points for the plaintiffs and ordered the breakup of Microsoft into two companies, one with all the operating systems software, and one with all other products of the company. The District Court also imposed a number of severe restrictions on the business conduct of Microsoft. We analyze the economic issues related to liability. We also analyze the applicability and effectiveness of the remedies imposed by the District Court and contrast them with other potential remedies. * Forthcoming in Journal of Industry, Competition and Trade: From Theory to Policy (August 2001)...
Words: 17051 - Pages: 69
...theories about so=ware engineering suggested by the history of Linux. I discuss these theories in terms of two fundamentally di:erent development styles, the “cathedral” model of most of the commercial world versus the “bazaar” model of the Linux world. I show that these models derive from opposing assumptions about the nature of the so=ware-debugging task. I then make a sustained argument from the Linux experience for the proposition that “Given enough eyeballs, all bugs are shallow”, suggest productive analogies with other self-correcting systems of selfish agents, and conclude with some exploration of the implications of this insight for the future of so=ware. 1 The Cathedral and the Bazaar Linux is subversive. Who would have thought even five years ago (1991) that a world-class operating system could coalesce as if by magic out of part-time hacking by several thousand developers scattered all over the planet, connected only by the tenuous strands of the Internet? Certainly not I. By the time Linux swam onto my radar screen in early 1993, I had already been involved in Unix and open-source development for ten years. I was one of the first gnu contributors in the mid-1980s. I had released a good deal of open-source so=ware onto the net, developing or co-developing several programs (nethack, Emacs’s vc and gud modes, xlife, and others) that are still in wide use today. I thought I knew how it was done. Linux overturned much of what I thought I knew. I had been preaching...
Words: 15545 - Pages: 63
...Projet de Fin d’Etudes Pour l’Obtention du Diplôme Master en Ingénierie Informatique et Internet Intitulé : Gestion et centralisation des logs avec leurs corrélations Présenté par : BENZIDANE KARIM Le, 06/07/2010 Encadrants : Moussaid Khaild , Faculté des Sciences, Casablanca Zoubir Sami , Crédit du Maroc, Casablanca Ouali Youness, Crédit du Maroc, Casablanca Membres du Jury : Mr Abghour, Faculté des Sciences, Casablanca Mr Bouzidi, Faculté des Sciences, Casablanca Mme Fetjah, Faculté des Sciences, Casablanca Année Universitaire 2009 / 2010 1 Remerciements J’adresse mon remercîment à Mr. Zoubir sami pour sa disponibilité et écoute ainsi de m’avoir accepté dans son département et m’avoir permis le choix du sujet. Je remercie également Mr. Youness OUALI pour ses valeureux conseils ainsi que son encadrement au cours de ce stage allant de la démarche du travail jusqu’au technique de déploiement. Je remercie également Mr Abderahim SEKKAKI pour nous avoir donnée l’opportunité d’acquérir ces connaissances, ainsi que tous les enseignants que j’ai eu au long de ces 2 années du Master. Un grand merci à mon encadrant Mr Moussaid pour son aide et conseil pour que ce stage soit réalisé et finalisé. Je tiens aussi à remercier toute l’équipe du plateau ou j’étais à CDM, pour leur aide afin de me fournir les informations nécessaires pour le bon déroulement du projet . Mes remerciements aux membres des jurys qui m’ont honoré en acceptant de juger ce travail. 2 Table des matieres Liste...
Words: 19106 - Pages: 77
...MIS (Spring 2007) Information Systems Theory and Practice Professor: Professor Jason C.H. Chen, Ph.d. Class time: Tuesday (February 27 – June 16) E-mail: chen@jepson.gonzaga.edu URL: http://barney.gonzaga.edu/~chen Office: to be announced Office hour: to be announced and by appointment Required text: 1. Pearlson, K.E. and Saunders, C.S, Managing and Using Information Systems, Wiley, 2006 (3nd edition) 2. A package of Harvard Business School Case Studies Additional Readings and Cases: Class handouts as needed. Course Description and Goals This course is designed to provide the current and future managers with understanding and appreciation of the issues that are related to the organization’s information technology assets. The course is not to educate technical specialists, rather, it is to give students a managerial perspective on the use of, design of, and evaluations of information systems that exist in organizations today. The objective of this course is to prepare students to manage information services in both today’s and tomorrow’s environment with its managerial, social, political, ethical and global issues. Conduct of the Course All students are expected to read the assigned materials (text, end-of-chapter discussion board questions (DBQ) and Harvard Business School case studies- HBC) before coming to the class. Some days we will discuss the materials in the text book. You are expected to be prepared...
Words: 4164 - Pages: 17
...Cyber-crimes: A Practical Approach to the Application of Federal Computer Crime Laws Eric J. Sinrod† and William P. Reilly†† I. Introduction Cyber-crime, once the domain of disaffected genius teenagers as portrayed in the movies “War Games” and “Hackers,” has grown into a mature and sophisticated threat to the open nature of the Internet. “Cyber-criminals,” like their non-virtual traditional criminal counterparts, seek opportunity and are attracted to vacuums in law enforcement. The news media is filled with reports of debilitating denial of service attacks, defaced web sites, and new computer viruses worming their way through the nation’s computers. However, there are countless other cyber-crimes that are not made public due to private industry’s reluctance to publicize its vulnerability and the government’s concern for security.[1] Along with the phenomenal growth of the Internet has come the growth of cyber-crime opportunities.[2] As a result of rapid adoption of the Internet globally, computer crimes include not only hacking and cracking, but now also include extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage, to name a few.[3] Law enforcement officials have been frustrated by the inability of legislators to keep cyber-crime legislation ahead of the fast-moving technological curve.[4] At the same time, legislators face the need to balance the competing interests between individual rights, such as privacy...
Words: 23991 - Pages: 96