Premium Essay

Microsoft Os It 221

In:

Submitted By hdemetri92
Words 712
Pages 3
1. Why Windows Server 2008 comes in different versions? What is the significance of each version

The reason Windows Server 2008 many different versions is to meet the needs of its customers. They provide 7 different versions ranging from the basic entry level software for a small business to very large corporations that require immense computing power. Windows Server 2008 R2 (Foundation) – Is the basic starter server package.
Windows Server 2008 R2 (Standard) – Is well built, with the average tools and flexibility.
Windows Server 2008 R2 (Enterprise) – Specialized to meet the needs of very unique applications.
Windows Server 2008 R2 (Datacenter) – Has a Very large capacity.
Windows Server 2008 R2 (Web) – For internet applications only.
Windows Server 2008 R2 (HPC Suite) – It is Customizable to get the most out of the system resources.
Windows Server 2008 R2 (Itanium Based) – It is the most scalable. 
 "Nick MacKechnie." How Many Versions of Windows Server 2008 Are There Going to Be? N.p., n.d. Web. 13 Feb. 2015.

2. What are the new features or enhancements made to Windows Server 2008? How is Windows Server 2008 different from Windows Server 2003?

Some of the new features according to Microsoft’s website are Powerfull Hardware and Scaling Features, Reduced Power Consumption, Hyper-V in Windows server 2008 R2 SP1, Expand Desktop Deployment Options with VDI, and Easier and more Efficient Server Management. New Networking Features in Windows Server 2008 and Windows Vista.
" New Networking Features in Windows Server 2008 and Windows Vista. N.p., n.d. Web. 13 Feb. 2015.


3. Why is 64-bit architecture and advantage?
 64 –bit architecture is actual design of the CPU. Some of the advantages of 64-bit architecture are increase to a maximum of 1,024 GB of RAM, the use of an increased number of processors, faster bus architecture, more secure, and it has

Similar Documents

Premium Essay

Eng 221 Week 2 Corporate Memo

...Corporate Memo Student ENG/221 February 30, 2014 Instructor Corporate Memo Memorandum To: CIO Jeff Bridges CC: CIO Support Team From: Student Date: 6/30/2014 ------------------------------------------------- Re: Choices for Web Conferencing Software Choosing the Best Available Software There are many web conference choices available for almost any purpose. Our team would benefit greatly from most of them, but their value varies greatly by cost, usability, and resource usage. I have selected three different programs for your review. Software Selection Firstly, all of our onsite users are currently using the Microsoft Windows operating system. Some users located offsite use Macintosh OS X. This would have presented a problem in the past, but luckily almost every choice today allows for use in both cases. Software Number 1: Cisco WebEx This software is excellent. It allows for almost any application that could be desired in a business setting. The price is $19.99 a month for the annual plan, it allows for HD video conferencing, desktop sharing, mobile phone access, remote control, VOIP, and can be initiated by a single host computer. Software Number 2: Adobe Connect This software also allows for basically anything we could expand to use. It’s price is $45.00 a month per host. The service offers HD and SD video conferencing, desktop sharing, mobile phone access, remote control, VOIP, great document sharing support, and like all others listed here, a virtual shareable whiteboard...

Words: 433 - Pages: 2

Free Essay

Online User Manual

...Online Discussion User Manual Your name ENG/221 Date Instructor Online Discussion User Manual Table of Contents Page COVER PAGE 1 TITLE 2 Table of Content 3 Purpose 4 Introduction 4 Requirements 5 Software/Application 5 Discussion Forum 5 Forums ...

Words: 1064 - Pages: 5

Free Essay

Ceh Practice Exam

...Question: 1 What is the name of the software tool used to crack a single account on Netware Servers using a dictionary attack? A. NPWCrack B. NWPCrack C. NovCrack D. CrackNov E. GetCrack Answer: B Explanation: NWPCrack is the software tool used to crack single accounts on Netware servers. Question: 2 How can you determine if an LM hash you extracted contains a password that is less than 8 characters long? A. There is no way to tell because a hash cannot be reversed B. The right most portion of the hash is always the same C. The hash always starts with AB923D D. The left most portion of the hash is always the same E. A portion of the hash will be all 0's Answer: B Explanation: When loosheets at an extracted LM hash, you will sometimes observe that the right most portion is always the same. This is padding that has been added to a password that is less than 8 characters long. Question: 3 Several of your co-workers are having a discussion over the etc/passwd file. They are at odds over what types of encryption are used to secure Linux passwords.(Choose all that apply). A. Linux passwords can be encrypted with MD5 B. Linux passwords can be encrypted with SHA C. Linux passwords can be encrypted with DES D. Linux passwords can be encrypted with Blowfish E. Linux passwords are encrypted with asymmetric algrothims Answer: A, C D Explanation: Linux passwords can be encrypted with several types of hashing algorithms. These include SHQ, MD5, and Blowfish...

Words: 2821 - Pages: 12

Premium Essay

Smartphones Operating Systems

...Operating system : An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function. Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources. For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and will frequently make a system call to an OS function or be interrupted by it. Operating systems can be found on almost any device that contains a computer—from cellular phones and video game consoles to supercomputers and web servers. Examples of popular modern operating systems include Android, BSD, iOS, Linux, OS X, QNX, Microsoft Windows, Windows Phone, and IBM z/OS. All these, except Windows, Windows Phone and z/OS, share roots in UNIX. Smartphone A Smartphone, or smart phone, is a mobile phone built on a mobile operating system, with more advanced computing capability and connectivity than a feature phone. The first smartphones combined the functions of a personal digital assistant (PDA), including email...

Words: 15551 - Pages: 63

Free Essay

Handheld Industry

...consumers via the Internet, Wi-Fi, and cellular networks. Application stores developed alongside Web 2.0 and began with Apple’s App Store. The store’s huge success has since attracted other players to the market. As of October 2009, the App store has earned over US$ 2.4 billion for Apple and the independent developers the store uses. Over 93,000 applications are currently available, and over 2 billion downloads were made. There are two kinds of application store depending on the type of platform provider used. . Handset and OS vendors: Currently, most top smartphone vendors have launched their own application stores. Examples include Nokia’s Ovi Store, RIM’s BlackBerry App World, Palm’s App Catalog, Google’s Android Market, Microsoft Windows Marketplace for Mobile (WMM), and Samsung’s Mobile Innovator. Mobile carriers: Examples include China Mobile’s Mobile Market, China Telecom’s AppMarket, and Shanghai Unicom’s Wo-Store HIGHLIGHTS Most smartphone and OS vendors are becoming involved in the application store market because of the huge success of the App Store. Most platform providers use the 30/70 revenue share model, under which the platform provider takes 30% and the developer 70%. Licensing, application localization, and payment systems will be the most crucial factors for platform providers in China. China Mobile’s Mobile Market will be one of the winners in China’s application store market because of its competitive payment system and strong developer ecosystem. Regarding...

Words: 10056 - Pages: 41

Premium Essay

Is3440

...Project: Project Part 1: Executive Summary First World Savings and Loan is a financial institution that processes credit card transactions and loan applications online. We are currently considering implementing an open source infrastructure. This could potentially save us over $4,000,000 per year in licensing fees for the software we are currently using. However, due to our business needs; we must still comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry - Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA). We must comply with SOX, because we are a publicly-traded financial institution; PCI-DSS, because we process online credit card transactions; and GLBA, because we are a financial institution. All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad. All security requirements for SOX, PCI-DSS, and GLBA can be achieved using Linux and open source infrastructure. Some examples of open source software that we might use are: Web Server - Apache Web Filtering - DansGuardian Network Firewall - Turtle Firewall VPN - Endian Firewall Community IDS/IPS - Suricata Database - MySQL File Server - Samba SMTP Server - hMailServer I would recommend that we use a "Defense in Depth" strategy, having multiple layers of access protection. We need to have an IDS/IPS on...

Words: 3253 - Pages: 14

Premium Essay

Apple Case Study

...9-708-480 REV: SEPTEMBER 8, 2008 DAVID B. YOFFIE MICHAEL SLIND Apple Inc., 2008 In January 2007, three decades after its incorporation, Apple Computer shed the second word in its name and became Apple Inc.1 With that move, the company signaled a fundamental shift away from its historic status as a vendor of the Macintosh personal computer (PC) line. Mac sales remained vital to Apple’s future, but they now accounted for less than half of its total revenue. A year and a half later, in June 2008, the company posted results that ratified the success of its leap beyond the PC business: In its third quarter, Apple earned a net profit of $1.07 billion on $7.46 billion in revenue, for a 38% increase on year-ago quarterly sales. Annual results were also impressive. Sales in the 2007 fiscal year topped $24 billion, up 24% from the previous year. (See Exhibit 1a—Apple Inc.: Selected Financial Information, plus Exhibit 1b and Exhibit 1c.) Investors, meanwhile, sent Apple’s stock to new heights: Despite a sharp drop in early 2008, its share price had risen more than 15-fold since 2003 and now hovered near its all-time high. (See Exhibit 2—Apple Inc.: Daily Closing Share Price.) Non-PC product lines drove much of Apple’s financial performance. The company’s iPod line of portable music players, together with its iTunes Store, had upended the music business. With the iPhone, a multifunction handheld device released in June 2007, Apple aimed to do the same for the mobile phone market....

Words: 18878 - Pages: 76

Premium Essay

Apple Inc.: Managing a Global Supply Chain

...rP os t W14161 APPLE INC.: MANAGING A GLOBAL SUPPLY CHAIN 1 Ken Mark wrote this case under the supervision of Professor P. Fraser Johnson solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. op yo This publication may not be transmitted, photocopied, digitized or otherwise reproduced in any form or by any means without the permission of the copyright holder. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Business School, Western University, London, Ontario, Canada, N6G 0N1; (t) 519.661.3208; (e) cases@ivey.ca; www.iveycases.com. Copyright © 2014, Richard Ivey School of Business Foundation INTRODUCTION Version: 2014-06-12 tC Jessica Grant was an analyst with BXE Capital (BXE), a money management firm based in Toronto. 2 It was February 28, 2014, and Grant was discussing her U.S. equity mandate with BXE’s vice president, Phillip Duchene. Both Grant and Duchene were trying to identify what changes, if any, they should make to BXE’s portfolio. “Apple is investing in its next generation of products, potentially the first new major product lines since Tim Cook took over from Steve Jobs,” she...

Words: 11092 - Pages: 45

Free Essay

Google

...April 13, 2012 Technology Google Inc. Ticker: GOOG Current Price: $630.84 Recommendation: Buy Implied Price: $688.77 Investment Thesis Key Statistics 52 Week Price Range 50-Day Moving Average Estimated Beta Dividend Yield Market Capitalization 3-Year Revenue CAGR $473.02 - $670.25 $XX$XX.XX $624.35 1.09 N/A $205.1 billion 20.26%  Google’s market leading search engine will allow the company to continue to grow their advertising revenues domestically and internationally. As the internet continues to grow in popularity, demand for Google’s advertising services will continue to increase. With over 250 million mobile devices running Google’s Android operating system, and 850,000 being activated each day, any successful monetization of this system will result in substantial profits. Google’s culture of innovation will allow Google to continue to grow and remain a leader of the technology sector.   Trading Statistics Diluted Shares Outstanding Average Volume (3-Month) Institutional Ownership Insider Ownership EV/EBITDA 325 million 2.647 million 81.80% 0.42% 9.2x Google Inc. (5- Year) Margins and Ratios Gross Margin EBITDA Margin Net Margin Debt to Enterprise Value Leverage Ratio 70.00% 39.25% 27.37% 2.55% 0.2x Covering Analyst: David Douglas 1 University of Oregon Investment Group University of Oregon Investment Group April 13, 2012 Business Overview Google Inc. was started in 1998 by two Stanford University students attempting to...

Words: 9272 - Pages: 38

Premium Essay

Business Plan

...Microsoft Business Plan DD   Business Plan Executive Summary The mission statement Microsoft has defined for its self is: “to help people and businesses throughout the world realize their full potential.” ("About microsoft,") In addition to aspiring to fulfill their mission statement they also uphold a set of core values. These values are practiced by the employees as well as the company as a whole. Microsoft’s makes the following statement concerning the values they admonish their employees to emulate: “Our values guide our behaviors and must shine through in all our interactions with each other and our stakeholders. Microsoft employees are great people who share the following values: integrity and honesty; passion for customers, partners, and technology; open and respectful with others and dedicated to making them better; willingness to take on big challenges and see them through; self-critical, questioning, and committed to personal excellence and self-improvement; and accountable for commitments, results, and quality to customers, shareholders, partners, and employees.” ("Microsoft standards of," 2010) Microsoft is a multi-billion dollar company currently based in Redmond, WA in the United States of America. It was founded in 1976 by two very young entrepreneurs by the names of William H. Gates III (Bill Gates) and Paul Allen. Both men are natives of Seattle, Washington. Bill Gates was just 19 and Paul Allen was 21 when they first started their venture...

Words: 5362 - Pages: 22

Premium Essay

It Sector India

...PROJECT REPORT ON THE INFORMATION TECHNOLOGY SECTOR Index |Topic |Page | | |Number | |Information Technology |3 | |Industry Analysis |3 | |Key Players In The IT Sector |3 | |Employment Trends |4 | |India-based Service Provider Landscape |4 | |Key Highlights Of The IT-ITES Sector Performance | | | IT Industry’s Sector Wise Break-Up |5 | | Growth in Revenues |5 | | Increasing Exports |6 | |Indian IT Industry-Top View ...

Words: 6634 - Pages: 27

Premium Essay

Assignment 2

...J O I N T C E N T E R AEI-BROOKINGS JOINT CENTER FOR REGULATORY STUDIES The Antitrust Economics of Two-sided Markets David S. Evans Related Publication 02-13 September 2002 David Evans is Senior Vice President, NERA Economic Consulting. The author is extremely grateful to Howard Chang, George Priest, Jean-Charles Rochet, Richard Schmalensee, and Jean Tirole for many helpful comments and suggestions and Irina Danilkina, Anne Layne-Farrar, Daniel Garcia Swartz, Bryan Martin-Keating, Nese Nasif, and Bernard Reddy for their many contributions to the research upon which article is based. The author has worked for a number of companies in the two-sided markets discussed in this paper including Bloomberg, Microsoft, and Visa. © David S. Evans 2002. Abstract “Two-sided” markets have two different groups of customers that businesses have to get on board to succeed—there is a “chicken-and-egg” problem that needs to be solved. These industries range from dating clubs (men and women), to video game consoles (game developers and users), to credit cards (cardholders and merchants), and to operating system software (application developers and users). They include some of the most important industries in the economy. Two-sided firms behave in ways that seem surprising from the vantage point of traditional industries, but in ways that seem like plain common sense once one understands the business problems they must solve. Prices do not and prices cannot follow marginal costs...

Words: 34916 - Pages: 140

Premium Essay

Leadership Steve Jobs

...ABSTRACT The concerns of improving the quality of life emerged when human societies had developed some kind of morality in term of regular standards of right and wrong. Accordingly, Leadership could have come into existents when human being started to reflect on the best way to live. As a result, leadership began with the introduction of style of leadership. This thesis is build based on the agreement of including education on the leadership style and type of leadership on the selected individual that success in corporate business. As an initial step, this thesis sought to characterize and perform case study towards selected individual that success in corporate business and the impact gain by the corporate of committing their leadership. This thesis does set for understanding in deeper on the individual leadership characteristic and their contribution on leadership method. This thesis also proposes an educational approach of including the education of the societal and moral implications of leadership practices within a corporate in management engineering courses. Management engineering students that encounter leadership style across social sciences and humanities may be better equipped to participate in debates about how leadership style ought to be helping corporate communities. OBJECTIVE The objective of this case study is to gain a deeper understanding of the leadership manifestation that had been presented by the well-known late chief executive officer (CEO) of an...

Words: 4261 - Pages: 18

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742

Premium Essay

Impact of Smartphone

...See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/236669025 Impact of Smartphone's on Society ARTICLE in EUROPEAN JOURNAL OF SCIENTIFIC RESEARCH · FEBRUARY 2013 Impact Factor: 0.74 CITATIONS READS 7 50,697 2 AUTHORS, INCLUDING: Tariq Rahim Soomro Shaheed Zulfikar Ali Bhutto Institute of Scien… 48 PUBLICATIONS 36 CITATIONS SEE PROFILE Available from: Tariq Rahim Soomro Retrieved on: 28 September 2015 European Journal of Scientific Research ISSN 1450-216X / 1450-202X Vol. 98 No 2 March, 2013, pp.216-226 http://www.europeanjournalofscientificresearch.com Impact of Smartphone’s on Society Muhammad Sarwar Department of Information Technology, SZABIST Dubai, United Arab Emirates E-mail: sarwar.baloch@gmail.com Tel: +971-50-5055285; Fax: +971-2-4045110 Tariq Rahim Soomro Corresponding Author, College of Engineering & Information Technology Al Ain University of Science & Technology, Al Ain, United Arab Emirates E-mail: tariq.soomro@aau.ac.ae Tel: +971-3-7024883; Fax: +971-3-7024777 Abstract The intention of this study is to investigate how Smartphone‘s are impacting the society and also how Smartphone‘s are going to transform the culture, social life, technology landscape and other diverse aspects of modern society. The intention of this study is to understand all the positive and negative aspects of Smartphone on the society. The study will primarily focus on impact...

Words: 6276 - Pages: 26