...The world of information Technology has come a long way from MSDOS system to now smart phones, supercomputers. Smart phone and tablets are becoming more popular, there are two machines that are still the heart of the technology world and that are a PC’s and Mainframes. With technology advancing every day the line between the two are surely fading fast. What is a Mainframe and how would you define what it is? A centralization and distribution rather than computing power (Oman, n.d.). Many corporations and governmental companies’ main back bone are mainframe computers. These companies have a great need for this; regular PC’s would not have the power to process the tons of data such as census, industry, consumer statistics, enterprise resource planning, and transaction processing. One of the major disadvantages to the mainframe is the cost. Starting in the tens of thousands of dollars, into the hundreds of thousands, the cost of a mainframe is simply too much for small companies that needs them. Another major cost about mainframes is the skill level of employees you would have to hire to maintain and run the programs. Most cutting edge mainframe design is not so much interpret by single task computational speed, typically defined as MIPS rate or FLOPS. A PC is a ‘is any general-purpose computer whose size, capabilities, and original sales price make it useful for individuals, and which is intended to be operated directly by an end-user with no intervening computer...
Words: 599 - Pages: 3
...Computers v Mainframes James Ratti POS355 April 9, 2012 John Stewart Abstract The world of Information Technology covers many variations of computers, from smart phones to supercomputers like IBM’s Watson. While smart phones and tablets have are becoming more popular, there are two venerable machines that are at the heart of computing, the Personal Computer and the Mainframe. With advances in technology the lines between the two are fading, but will never disappear completely. Personal Computers v Mainframes The information systems backbone of many companies is their mainframe computer. The mainframe computer is a large centrally located machine capable of processing multiple very large transactions at the same time. Users access these large computers by workstations that can resemble a personal computer, but are often a dumb terminal. What is a Mainframe and how would you define what it is? It really comes down to centralization and distribution rather than computing power (Oman, n.d.). With ever increasing technologies, the actual computing power of Personal Computers is rivaling that of Mainframes, however, the Personal Computer becomes limited when it comes to how many users can log on to it and how many jobs can run. The huge amounts of data that can be processed by many more users than can be logged into a personal computer and the ability of the mainframes users to be located around the globe and stay secure are all things that define a mainframe. A...
Words: 752 - Pages: 4
...work load more than ever before thought. With the advancement of technology have come many milestones both positive and negative. These milestones can be seen economically, culturally, and socially. What began as a large mainframe which filled up rooms of space has evolved into portable devices like smart-phones that can easily be customized to each users preferences. Two avenues in technology to explore are the mainframe and the PC which sets the tone and is the foundation of what technology can bring into the next millennium. Mainframes are a digital computer that is designed for high speed data processing through the heavy use of input/output units such as large capacity disks and printers. The industrial era relied heavily on manpower to satisfy consumer needs. But as time wore on the consumer demand became so great that the use of mainframes was necessary to simplify and meet consumer demands. In addition, what would take months or even years to produce could easily be completed in weeks or a few days with mainframes. They have even been used for such applications as payroll computations, accounting, business transactions, information retrieval, airline reservations, and scientific engineering which involve complex computations. From the mainframes, came the birth of the personal computer and its introduction to the mass market. The personal computer is a digital computer designed for use by only one person. A typical personal computer consists of a...
Words: 1100 - Pages: 5
...CISC vs RISC By Armin Gerritsen - Which one is better? - RISC vs CISC is a topic quite popular on the Net. Everytime Intel (CISC) or Apple (RISC) introduces a new CPU, the topic pops up again. But what are CISC and RISC exactly, and is one of them really better? This article tries to explain in simple terms what RISC and CISC are and what the future might bring for the both of them. This article is by no means intended as an article pro-RISC or pro-CISC. You draw your own conclusions … CISC Pronounced sisk, and stands for Complex Instruction Set Computer. Most PC's use CPU based on this architecture. For instance Intel and AMD CPU's are based on CISC architectures. Typically CISC chips have a large amount of different and complex instructions. The philosophy behind it is that hardware is always faster than software, therefore one should make a powerful instructionset, which provides programmers with assembly instructions to do a lot with short programs. In common CISC chips are relatively slow (compared to RISC chips) per instruction, but use little (less than RISC) instructions. RISC Pronounced risk, and stands for Reduced Instruction Set Computer. RISC chips evolved around the mid-1980 as a reaction at CISC chips. The philosophy behind it is that almost no one uses complex assembly language instructions as used by CISC, and people mostly use compilers which never use complex instructions. Apple for instance uses RISC chips. Therefore fewer, simpler and faster instructions...
Words: 1125 - Pages: 5
...Matching Dell - Case Summary by jaina2004 | studymode.com Matching DELL History: IBM Market Leader in Mainframe –market share 61%, starts PC business in ’81, in 2 yrs market share is 42% IBM Strategy : • Purchase PC components as against manufacturing inhouse (Main frame) • Open Architecture : OS – Microsoft, Microprocessor – Intel , reason, to encourage application developers and enhance Peripheral market • Sales : o Largely corporate clients - thought its huge sales force o Retail clients through value added resellers – handled, installations, configured SW,customer networks and service part of responsibility • Competition : Apple with propriety architecture had 20% market share, Compac enters in ’82, Dell in ’84, • Competitors strategy :: use resellers for large corporate accounts, due to lack of sales force • 1986- IBM moves to propriety architecture with PS/2 line and rejects 386 chip • 1980-90 – PC performace improved and chip price declined, o New technology advancement of 386DX and Pentium II processors were significant o Windows 3.0 launched in 1990, commonly called Wintel architecture o PC Sales declined in 1990 due to US recession • Post 1990 o Demand picks up due to economic growth, and technology like computer Networking, email and WWW. o PC prices decline to less than 499USD, 45.5% of US household owsn PC in 1998 â–ª Modular architecture prevalent for HW and SW, PC differed depending on configuration â–ª Most HW components sourced my numerous companies...
Words: 1511 - Pages: 7
...Logical Design and Physical Design CMGT 555/ Systems Analysis and Development Throughout the whole process of system development, there are designs that take place before any coding or setup takes place. During this time, phrases like logical design and physical design get tossed around a lot, but what are they and what do they mean? In short, the logical design defines what must take place, not how it is accomplished. The logical design is like a set of blue prints, it describes the actual processes of entering, verifying, and storing data. In this paper we will explain when logical designs and physical designs are used, what design information a logical design and physical design contain and any similarities or differences. Figure 1. Example of Logical Model and Physical Model for an ERD Relationship Diagram (Compare Logical and Physical ERD, 2009) The direct definition of a logical design “is the Conceptual Blueprint of a software application, illustrating entities, relationships, rules, and processes (Thibeault, 2011)”. So what is the logical design is used for? The logical design contains all the business entries, what each entries attributes are, and relationships among entries. Now the logical design to some is misleading because they often confuse it with detailed technical design, even though the goals for these two are not similar at all. Now when do we use the logical design? That question is simpler to answer; it usually starts during the requirements...
Words: 845 - Pages: 4
...didn’t work in the new game that was driven by technological advances and progress. IBM didn’t change its traditions and bureaucratic culture. IBM drove away many great, talented employees who were frustrated with top management’s serious mistakes and slow decision making. IBM’s Personal Computer market shares dropped from 50% to less than 10% in a decade. This was due to senior management’s technical ignorance, inattention, arrogance and detrimental decision making mistakes. IBM had desirable products but their slow, bureaucratic decision making and refusal to change and adjusting to a dynamic market place resulted in lost sales/customers. IBM Personal Computer division, once brought inside the company, was crushed by the old ‘mainframe’ mentality of corporate hierarchy that wanted to hold on to IBM’s traditional business IBM’s traditional structure did not work well in an unstable environment. The problem of: bureaucratic culture and long-standing traditions Affects: employees, senior management and consumers And results in: talented employees quitting, loss in market share, stagnant company culture in a rapidly changing era Benefits of a solution: increased IBM share of the PC market, retain...
Words: 719 - Pages: 3
...Abstract: This term paper presents two instructions set architectures, particularly the CISC and the RISC, which have been developed as computer architects aimed for a fast, cost-effective design. Included in this paper are the arguments made for each architecture, and of some performance comparisons on RISC and CISC processors. These data are collected from various papers published concerning the RISC versus CISC discussion. INTRODUCTION: The advent of microprocessor and strides in integrated circuit technology improved the performance of computer system at roughly 35% per year. Mass production of lower cost microprocessors has increased the share of microprocessor based computer in the market. This new architecture of microprocessor based computers has become a true success after two major changes in computer marketplace. One is elimination of programming at the assembly language level which eliminated the need for object-code compatibility. So any architecture could reuse the source code written in higher level languages. The second is the creation of standardized vendor-independent operating systems like UNIX and its clones like Linux which lowered the cost and risk of bringing out a new architecture. The open standard of systems eased the new computer architecture introduction. The above improvements helped evolve computer architecture from general microprocessor based architecture to a new set of architectures called RISC architectures. RISC stands for Reduced...
Words: 2342 - Pages: 10
...This paper is about Copper Cable versus Fiber Cable. Or Copper vs Fiber. Two completely different materials- One’s ancient, the other is almost as old. But in today’s modern environment, both are being used to carry signals through a system, namely computer networking or the larger system, the Internet. Just in a different manner. We’ll look at what Copper and Copper Cable is, what Fiber (glass) and Fiber Optic Cable is, how it’s used and the pros and cons between the two (2). Copper is one of the most important metals available. It’s a member of the Periodic Table of Elements, whose number is #29. It’s been used for thousands of years and has many uses. It’s second only to silver in electrical conductance. Today, Copper cable is a medium whose uses range from communications to the building industry to the electrical and electronics industry. Electrical wiring in buildings is the most important market for the copper industry. Roughly half of all copper mined is used to manufacture electrical wire and cable conductors. Copper used in building wire has a conductivity rating of 100% IACS (International Annealed Copper Standard) or better. Copper building wire requires less insulation and can be installed in smaller conduits than when lower conductivity conductors are used. Copper is also used to make communications wire (Telephone, Cable TV, and Ethernet) such as coaxial wire and Twisted Pair cables. Twisted pair cabling is...
Words: 2266 - Pages: 10
...rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (13) : 978-81-224-2861-2 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com Preface In recent years there have been significant advances in the development of high performance personal computer and networks. There is now an identifiable trend in industry toward downsizing that is replacing expensive mainframe computers with more cost-effective networks of personal computer that achieve the same or even better results. This trend has given rise to the architecture of the Client/Server Computing. The term Client/Server was first used in the 1980s in reference to personal computers on a network. The actual Client/Server model started gaining acceptance in the late 1980s. The term Client/Server is used to describe a computing model for the development of computerized systems. This model is based on the distribution of functions between two types of independent and autonomous entities: Server and Client. A Client is any process that request specific services from server processes. A Server is process that provides requested services for Clients....
Words: 79055 - Pages: 317
...Android: Is Open Source Better for the Masses? Jarrod R. Worlitz ITT Technical Institute, Sylmar Campus EN1420 Abstract This paper makes the argument that Google’s Android Operating System and the open source platform it provides is superior to its major competitor, Apple’s closed source iOS. The focus will be on how the ecosystem of “smartphones” and other mobile devices (such as tablets and phablets) has been impacted by Google, Inc.’s decision to release the Android Operating System as “Open Source Software” (OSS), allowing for a wider adoption of the platform than was achievable by Apple Inc.’s iPhone, whose marketing strategy and decision to is control both hardware and software. The claim will be supported by explaining the superiority of Android in terms of its benefits to manufacturers, consumers, and software developers. Android: Is Open Source is Better for the Masses? One of the fastest growing technologies is mobile computing. This fascinating trend in communication was propelled in large by the introduction of smartphones. Smartphones provide instant access to information and programs only previously available users from a desktop PC. To be clear, there are many other such mobile devices on the market that do not qualify as phones, such as tablets and “phablets” (a hybrid phone and tablet) however their roots can be traced back to two major platforms. These platforms are maintained by some of the largest companies in a competitive market. The two...
Words: 2830 - Pages: 12
...Tech Guide 1 Hardware TG1.1 Components of a Computer System TG1.2 Evolution of Computer Hardware TG1.3 Types of Computers TG1.4 Microprocessor and Primary Storage TG1.5 Input/Output Devices TG1.1 Components of a Computer System Computer hardware is composed of the following components: central processing unit (CPU), primary storage, secondary storage, input devices, output devices, and communication devices. Communication devices are covered in detail in Tech Guide 4. The input devices accept data and instructions and convert them to a form that the computer can understand. The output devices present data in a form people can understand. The CPU manipulates the data and controls the tasks done by the other components. Primary storage (internal storage that is part of the CPU) temporarily stores data and program instructions during processing. Secondary storage (external storage such as flash drives) stores data and programs that have been saved for future use. Communication devices manage the flow of data from public networks (e.g., Internet, intranets) to the CPU, and from the CPU to networks. A schematic view of a computer system is shown in Figure TG1.1. REPRESENTING DATA, PICTURES, TIME, AND SIZE IN A COMPUTER ASCII. Computers are based on integrated circuits (chips), each of which includes millions of sub-miniature transistors that are interconnected on a small (less than l-inch-square) chip area. Each transistor can be in either an “on” or an “off” position...
Words: 8488 - Pages: 34
...National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made...
Words: 93564 - Pages: 375
...www.GetPedia.com National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Words: 93588 - Pages: 375
...INFORMATION TECHNOLOGY MANAGEMENT INTRODUCTION With a weakened global economy, consumer confidence at record lows, and widespread layoffs unlike anything we have seen in over eighty years, information technology is taking on new roles in the business world. CIO's are relying more heavily on IT in order to reduce operating costs, increase productivity and give their companies a competitive edge. Historically viewed as an expense and liability, IT is now being thought of as strategic business enabler. Management of IT and the associated strategy, funding and security are top of mind for many in today's challenging environment. Executives are under more pressure than ever to maximize return on their technology investments. However, our research has revealed that there are several key concerns that appear to be trending throughout corporations as they determine the exact roles IT should play. READINGS Members of the group read several chapters from the textbook, Information Technology for Management: Improving Performance in the Digital Economy (Turban and Volonino, 7th Edition), as well as numerous articles on various information technology subjects. A topic which received a significant amount of attention throughout our readings is the importance of aligning IT strategies with the business priorities of the company, and how this is critical to the success of an organization. An important component of this alignment is ensuring that the IT division...
Words: 7761 - Pages: 32