Free Essay

Operating System Upgrade

In:

Submitted By Mannie
Words 7042
Pages 29
Running Head: JINX TRANSPORT AND LOGISTICS COMPANY OPERATING SYSTEM UPGRADE

EMERGING TECHNOLOGIES AND ARCHITECTURE
PROJECT NAME: OPERATING SYSTEMS DESIGN

STUDENT NAME:
COURSE NUMBER:
COURSE NAME: MODERN OPERATING SYSTEMS
PROFESSOR:
SCHOOL:
DATE: MARCH 25th, 2013

Table of Contents

Company Background 4 Employee Access 4 Data center description (servers, OS) 4 Client machines 4 Company Communication 5 Problems with the Current Information Systems 5 Proposed System 6 OS Processor and Core 8 Hardware 8 Benefits from Upgrading to Operating System Utilizing a Multi-Processor 9 Steps to Upgrade the Processor and Core 9 Requirements Supporting the Upgrade 10 Conclusion 10 Scheduling Algorithm 11 In First-Come First-Served Scheduling 11 Benefits and Challenges Presented by FCFS 12 Round robin scheduling 12 Benefits and Challenges Presented by Round Robin Scheduling 13 Conclusion 14 Distributed Computing Environment 15 Operating System Concurrency Mechanism 15 Grid Computing 16 Concurrency control mechanisms in handling communications and synchronization 17 OS Security Risks and Mitigation Strategy 18 The main areas of the operating system that are evaluated for performing the risk assessment are: 20 Prioritization risks in the operating system: 21 Risk mitigations for the risks in the operating systems: 24 Emerging Technologies and Architecture 26 Cloud Computing 26 Remote Procedure Call (RPC) 27 Object Request Broker (ORB) 28 Advantages of Cloud Computing to Jinx 29 Advantages of RPCs 29 Advantages of using ORB 30 How Jinx Will Benefit from these Technologies 30 References 32 Appendix A 34

Company Background
Jinx Transport & Logistics Company (JT &LC) was established in the 90s by two brothers commonly known as Jinx Brothers and the company deal in ferry parcel business. The branding Jinx Brothers is specifically chosen to assist with the growth of ferry parcel business within the New York City and its metropolitan area. The increase in the demand for the company’s services makes the management to open other divisions within New York metropolitans.
Employee Access
The company has the total number of 200 employees, mostly loaders, drivers and logistic experts stationed at five main divisions within the city. More importantly, each divisional office has three workers positioned at each office and the drivers are dispatched from the head office to assist the business operations. However, the company mainly implements customer’s requisition through phone calls and commercial e-mail services.
Data center description (servers, OS)
Jinx Transport & Logistic Company is currently using LAN (Local Area Network) at every office in the New York. Typically, the LANs installed in each office are independent from one another. However, the head office has a server that supports all the ten workstations and the server acts as the company central database storage. The workstations within the company are running on a Microsoft Windows platform and the database is hosted on a Windows NT Server.
Client machines
The company is using client machine Pentium IV desktop running on the Microsoft Windows XP, and the company only sends data to the head office via emails. Moreover, the data backup is being done manually and the company employees use the commercial emails as means of communication.
Company Communication The Company Communication mainly through the use of emails. As described earlier, the company is using client machine Pentium IV laptop running on the Microsoft Windows which are connected at individual Company’s LANs via a hub / router or switch board. The internet is provided by the Company’s LANs servers which get the internet connections from the Companies ISP that are shared at the individual LANs through the router. The communication packets are transmitted at the individual LAN’s using round robin scheduling. The Company Communication is also through the main PBAX switch Box where land line telephones are interconnected in the different Company’s offices in the various LANs that are also connected through the Land line Telecommunication providers. The company also makes use of Mobile phones.
Problems with the Current Information Systems
The company current information systems have several problems. The operating system has a single core OS and single processor, making the system to support only a single-core processor. The shortcoming of a single processor is that it only has one execution making it to have only one Control unit, one Catch memory and single basic ALU components.
More importantly, the major problem with the current information systems is that it is slow, insecure and with a lot of redundancy. There is also a lot of data inconsistency, since there is no set standard way of presenting data, other than sending it in spreadsheet format. It is also characterized by an undefined way of submitting data, which involves just sending the daily datasheets to the database administrator, which has seen some data getting lost in the process of sending. Lack of a defined communication system such as that of an company e-mail makes it hard to track communication as well isolate official matters from the. The problems can be summarized with the points below * Slow due to time wasted sending data and time taken updating the database. * Insecure due to use of commercial e-mail service. * Full of data redundancy and inconsistency
Proposed System
The proposed system will seek to interconnect all the divisions of Jinx Transport and Logistics Company through a distributed database and communication system, with the head office, and introduce a secure remote database system. It will also introduce a customized E-Mail system which is secure and friendly to use putting into consideration the company’s demand. The system will also incorporate a fleet management system full with a tracking system for Jinx Transport and Logistics Company fleet of vehicles. The customers will have a platform for interacting with the system where they can make inquiries and even track individual parcels. The distributed system will allow a consistent updating of the database, where the users will be updating the database directly from their workstation. This will enhance data integrity, since the database will be updated real time.
Introduction of a customer platform will enable customers to log into the system and be able to make transactions online such as requesting for service, interacting with customer care representatives on issues of service delivery, and even track their parcels on the basis of if they have left a certain point, say the dispatch office, when they are expected to arrive at their destination.
This system will be characterized by * A distributed database system on an oracle platform to allow updating of the main database from the client workstations in the divisional level. * An integrated communication system for secure e-mailing and for sending other office correspondence. * A vehicle tracking system to enable tracking of individual vehicles in the fleet, as a way of enhancing security as well as help customers track their parcels * Bar code readers and bar code stickers for uniquely identifying the location of parcels. * Introduction of a WAN, interconnecting all the divisions as a way of enhancing data sending and communication. * Use of cloud computing technology for safe keeping of data in a secondary database backup in the cloud.

OS Processor and Core
Implementation of the Jinx Transport and Logistics Company requires for an incorporation of different technologies and platforms to make the system an all-purpose one.
Hardware
The proposed system will encompass client machines with Intel Pentium IV processors core i5 processor to support the distributed system. It also has multiple processing capabilities to support cloud computing capabilities and communication.
The proposed server processor is 64-bit Intel Xeon processor 7000. The hardware will be Processor Core VRMs/VRD’s, while the software will be Firmware/BIOS (Upgrading Intel Server Board Set SE8500HW4 to Support Intel Xeon Processors 7000 Sequence, n.d.). It is best suited for small and medium enterprises. It has the other following features. * Up to four fixed 3.5” hard drive bays or hot-swap 3.5” SAS/SATA drive bays * Tool-less drives, bays and fans * 365-watt high efficiency non-redundant power supply, 80Plus Silver * Customizable panel options (Upgrading Intel Server Board Set SE8500HW4 to Support Intel Xeon Processors 7000 Sequence, n.d.).
The server processor will enable Jinx Transport and Logistics Company run the following applications as small- and medium-sized business applications * Web service – Will enable the company to host a website. * File and print service – for ease of transfer of files and data as well as support printing at division level. * E-mail service – The server platform will support an Active directory of up to 1000 user accounts. * Storage service – to help in online backup capabilities in a remote backup system as well as on the cloud. * Vertical-specific business applications as well as embedded applications, mostly that support cloud computing for ease of data retrieval remotely
The server system will be implemented in every division for it to serve as the central administration point at the division level. This is to also enable implementation of a firewall system at the divisional level.
Benefits from Upgrading to Operating System Utilizing a Multi-Processor
Jinx Transport & Logistics Company will derive several benefits from upgrading to a multi-processor and multi-core configuration that is supporting a virtual or a distributed environment.
The new system will assist the company to effectively and efficiently maximizing the utilization of its CPU (Central Processing Unit) cores, which will assist the company to achieve the best performances from its new information systems. Typically, the company OS will be having lesser stress when the CPU is executing programs. More importantly, by upgrading the OS, the company will be able to achieve the best optimization of the multi-core processing, and multi-processor power. The system will be able to cope with multiple core instructions and requests during different phases of execution. The strategy will assist the company to enjoy maximum support from the multi-processor and multi-core processing during the execution process.
Steps to Upgrade the Processor and Core
The following steps should be followed to upgrade processor and core: * First, there is a need to verify the compatibility of the hardware to ensure that it can support the processors. * Moreover, there is a need to upgrade processor core VRMs (Voltage Regulator Modules). * The third step is to upgrade the system BMC and BIOS firmware. * The next step is to upgrade the operating system in order to add support for the multi-core processing. * Last step is to install the new processors (Upgrading Intel Server Board Set SE8500HW4 to Support Intel Xeon Processors 7000 Sequence, n.d.).
Requirements Supporting the Upgrade
The company will need to implement a compatible test to ensure that the new operating system support the new processor. Processor core VRDs (Voltage Regulator Down) must support the core processor electrical and are not replaceable. The VRMs plug-in processor core must come in two flavors. The hardware must also support the upgrade, and the company will need to upgrade some components such as BIOS, VRMs, and the BMC firmware to balance the upgrading process.
Conclusion
It’s evident that the company’s operations will really improve through multi-tasking by using operating system that utilizes a Multi-Processor. Secondly by incorporating Processor core VRDs (Voltage Regulator Down).

Scheduling Algorithm Jinx Transport & Logistics Company (JT &LC), a major transport company, currently uses a non-virtual Environment. This in most part is characterized by the use of laptops -DELL brand; with Intel Pentium IV processors core i5 processor speed of 2.4GHz, 6 GB DDR and 250 GB HDD. Each laptop is installed with one operating system which in this particular case is “Windows 7 Pro Service Pack 1”. This version of Windows operating system runs effectively on a multi-core processor.
I plan to employ two scheduling ordered systems. The particular algorithms will be First-Come First-Served Scheduling commonly abbreviated as FCFS and Round robin scheduling algorithm.
In First-Come First-Served Scheduling
FCFS is one of the most basic scheduling algorithms on a single processor computing environment which are supported by a First-Come First-Served prepared queue. The scheduler which is more often referred to and categorized as a “Batch System” chooses the first process at the start of the queue at any time it should execute a procedure. This scheduler is non-preemptive and designates that if at some point in time an I/O request or 50 I/O bound processes enter the system, they will have to wait for a single CPU bound process to complete its execution (Peter, 2007).The I/O processes are suspended in the waiting state. The scheduler picks the CPU bound procedure first from the head of the queue and runs it to completion before realizing the CPU to be used by the waiting I/O processes which rejoin the ready queue. This scenario creates a state referred to as a “Convoy effect” which basically means that processes that need a resource for a short time will wait for the single process holding the resource for a long time (Peter, 2007).
Benefits and Challenges Presented by FCFS Starting with the benefits, we look at the advantages of using this basic scheduling algorithm. First of all it is a simple procedure to implement and time allocation of the CPU and I/O devices is considered to be fair although this might also be considered as a disadvantage when looking at wasted time when short I/O processes have to wait for long to execute thus leaving the I/O in an idle state. First-Come First-Served scheduling algorithm is also known as Run-Until-Done or FCFS. It dispatches processes with regard to their arrival time on the ready to be executed queue and a new process goes to the end of the queue. Another advantage is that there is low machine overhead and it is more predictable with processes being allocated CPU in the order of request (Peter, 2007).
The major disadvantage of this scheduling algorithm is that the Average Waiting Time (AWT) is quite long! Importance of jobs and CPU time is measured using their arrival time which is a poor way of scheduling processes. As I/O bound processes wait in the ready queue, the I/O devices are left idle until the process holding the CPU releases it (Krzyzanowski, 2010).
Round robin scheduling
Round robin scheduling is a preemptive scheduler and it’s the most vastly utilized scheduling algorithm used in modern OSs like Linux, BSD and Windows (Hiranwal & Roy). It is the preemptive adaptation of First-Come First-Served scheduling. Unlike in the above discussed scheduling algorithm, every process is given a short at the CPU and allocated burst time. The short-term CPU allocation between the period one process is served to the time the following technique is served is known as a time- cut or time quantum. The list of processes in the ready queue is treated as a circular queue. Turn-around time in Round Robin is relatively larger than in First-Come First-Served although the response time is better. Incomplete processes before their time allocation expires are moved to the end of the ready queue list as the preempted CPU is allocated to the next available process. Where users need rational reaction time, Round Robin arrangement algorithm being preemptive, is effective in environments that support time sharing. The length of the quantum determines the amount of context exchange thus negatively affecting CPU efficiency by lowering it (Peter, 2007).
Benefits and Challenges Presented by Round Robin Scheduling
An extremely long quantum culminates to the functional process acting the same as FCFS scheduling since its extremely feasible a procedure with which most likely had a piece may be holding up to be served after the quantum is up. A humble quantum allows the framework burn with techniques instantly. This is heavenly for intuitive methodologies.
The focal point of this Round Robin arrangement is that it’s fair with each technique getting an equivalent portion of the CPU. It is moreover simple to accomplish. What's more, if the amount of courses of action in the record is known, then it’s plausible to ascertain or gauge the most exceedingly terrible conceivable reaction time for procedures.
The crucial property of Round Robin algorithm of scheduling is that it dispenses equivalent quantum CPU time to each procedure to be served by the CPU. Case in point, exceptionally intuitive I/O processes will work toward getting planned no more every now and again than CPU bound forms (Peter, 2007).
This scheduling algorithm is best utilized within virtual machine (VM) environment. This happens on the grounds that virtual machines as a rule utilize working frameworks that are extremely intelligent e.g. z/VM as contrasted with the working frameworks utilized by a non-virtual machine environment. Looking at the speed of a workstation (GHz) perspective, Round Robin scheduling algorithm is best utilized with and fulfills requests of appeals without smothering the Resource usage enhancement (Peter, 2007).
Conclusion
I choose The Round Robin scheduling algorithm can be utilized within both virtual and non-virtual machine environments. This is on the grounds that in both cases, the resource advancement regarding being permitted a quantum is streamlined without influencing the for the most part exhibition of the framework. It could even be quicker when utilized as a part of non-virtual machines (the present nature in utilization) contrasted with it being utilized as a part of virtual machines; this is because non virtual-machines are not intuitive. Moreover, this is because of the preemptive nature of Round Robin scheduling algorithm.

Distributed Computing Environment
A Distributed computing can be defined as a collection of individual computers that appear to operate as a single workstation to the system user. The computers which could independently work in principle, are linked together by a computer network usually called a LAN or WAN. A Distributed system allows for individual networked computers share resources like printers, scanners or shared connections to a server. Sharing resources is achieved through a system of messaging between host computers to coordinate events and communicate (Coulouris, Dollimore, Kindberg & Blair, 2012).
Operating System Concurrency Mechanism
The company’s information system has several problems. In short, the system is slow due to time wasted sending data and time taken updating the database; insecure due to use of commercial e-mail service and full of data redundancy and inconsistency.
This is where an operating concurrency mechanism can improve issues. Concurrency is the ability of multiple computational processes to run on a single machine with the illusion of simultaneous execution. Therefore we can define Operating system concurrency mechanisms as the several ways an Operating system design revolving around their ability and architecture can support and exhibit these features. Operating systems are designed with more emphasis and concern on their threads and processes management capabilities (Stallings, 2012). Among the most factors focused on in concurrency mechanisms are; * Multiprocessing – this is the managing of multiple tasks in a multiprocessor environment. * Distributed Processing – it involves management of processes executing on a distributed system. * Multiprogramming – is where we have multiple processes running within a single processor environment which is the currently employed at Jinx. Concurrency includes several design concerns which include competing for and sharing of available resources e.g. files or memory, processor time allocation to processes, inter-process communication and synchronizing multiple process activities. These matters arise in multiprogramming systems within a uniprocessor environment as much as in distributed and multiprocessing platforms (Stallings, 2012).
The world has become a globalized one and competition is keener than ever. The world too has become faster and for businesses to obtain and retain their clients that have to supply at the moment service, which is both accurate and complete. The company works in ferry parcel business within the New York City and its metropolitan area. They have to be constantly on their feet and fast, accurate and instantaneous in their response. One server is not enough for their expanded distributed offices. They need multiple servers that can concurrently distribute the data thereby facilitating smooth and fast passage of the data and ensuring that all messages arrive in a “just-on-time” process.
Grid Computing
Grid computing serves a similar process although it helps the company in that it deals with large packets of data. Until now, much of the data has been lost since it has been processed through one single-core processer. Significant and large pieces of data have been crammed in with smaller and more insignificant pieces of data leading to not only data loss but also slowing of system due to the lire’ packages’ taking up space and, therefore time (Fran, G & Anthony, 2003). This has caused redundancy and blockage of system leading to frequent crashing. The disorganization or hybrid compression also caused insecurity of system due to frequent collapse. The separation, therefore, of large from small chunks of data can simplify and free the system to operate more effectively, efficiently, and securely. This is where the system of grid computing comes in.
The grid can be considered a type of distributed system with workloads that are not interactive and involve larger number of files. Grid computing is one of the methods of harnessing power of numerous computes in a single network to resolve their problems. It encompasses a network of computers that are running a special grid computing network software (Fran, G & Anthony, 2003).
Concurrency control mechanisms in handling communications and synchronization The grid computing also creates flexibility and resilient operational infrastructures and when reinforced with, or integrated with concurrently, also protects the company’s data in that it enables recovery and failure.
There are challenges with the system primarily associated with data management, programming models, system architecture, algorithms and problem solving methods. (Fran, G & Anthony, 2003). Another challenge is associated with licensing where licensing across different servers make is prohibitive for certain applications. Nonetheless, grid computing can help the Company restore lost data protects its data and separate large chunks of data form smaller thereby facilitating the passage and fastness of passage of the system. Grid computing combined with concurrent processing gives Jinx Transport & Logistics Company a more powerful, more accurate, faster and more reliable system.

OS Security Risks and Mitigation Strategy Operating system security can be defined as the various sets of protection mechanisms or techniques employed by system administrators to prevent information theft and unauthorized resource access. All systems and especially in distributed systems require some measure of security that only allows authorized data manipulation and availability to employees of a company (Palmer, 2003). Jinx will also need to secure its system to prevent both external and internal threats. Services that are mostly focus on in system security include; * Authentication: This is the validation of system servers or the identity of users or information/data senders within an organization (Stallings, 2012). * Availability: Authorized users of a system should be able to access information freely in addition to withholding it from unauthorized access. This also includes shared resources in the (Heidari, 2011). * Authorization: This can also be referred to as Access Control. Organizations can limit the number of people access the network resources by simply verifying users when logging into the system. Using passwords and usernames is one way of controlling unauthorized access to computers and the system. However, authentication does not always guarantee a user full access to network resources or data. This is only achieved through the process of authorization (Stallings, 2012). * Confidentiality: When the personnel is involved in leaking information or if the system has poor measures in their security protocols then information can be disclosed to unauthorized people. Allowing access to delicate information anonymously is a good example of poor security (Stallings, 2012). * Integrity: It involves preventing of fraudulent access and altering of a company’s sensitive information. Authorized users can also cause errors or omissions hence alteration of important business data (Heidari, 2011).

System security is classified into three main protective measures. The system administrator needs knowledge of the information’s value so that they are able to develop the right security measures. They include; * Prevention: This can be done in a number of ways ranging from setting up high security protocols to locking servers in strong rooms. All these policies are put in place to prevent data theft, damage or alteration (Stallings, 2012). * Detection: Tools have been developed to aid in detecting unauthorized intrusion, alterations, viruses and damages. A system administrator is required to take steps that ensure information is protected from loss, being illegally altered or being damaged to enable a company function at maximum output. Detection also may include finding out information about extent of damages, how data has been altered or which data has been stolen (Stallings, 2012). * Reaction: This includes setting up corrective measure to effectively recover damaged or lost information (Stallings, 2012).
Security Threats We have various security threats and attacks that have been discussed worldwide. These threats can be divided into two categories; natural disasters and human threats. Natural disasters are unforeseen and in most cases very hard to predict. Hurricanes, fire, lightning or floods are some of the natural disasters that can occur and cause damage to physical components of a system. Other security threats that are human caused but categorized as natural disasters include terrorist attacks, riots or in the event of a war (Palmer, 2003). Human caused threats are many and consist of internal attacks by unsatisfied or malicious employees or external threats by hackers who look to disrupt and harm the smooth running of an organization (Palmer, 2003). Employees and former employees however pose the greatest security threat because they have knowledge of security passwords and protocols of a company. Insiders can delete vital information either maliciously or accidentally and they can also damage information by planting viruses and other malware. Crackers or hacker also pose considerable threats to vulnerable systems. The goal of a hacker could be to steal information, damage the information to disrupt the effective running of an organization or to simply alter important data (Palmer, 2003).
The main areas of the operating system that are evaluated for performing the risk assessment are:
Threat to the data: The biggest threat to the Operating system is the threat to the database. The data of the enterprise is highly confidential and the enterprise needs to secure that data. The data of the clients is precious and the enterprise has to make it confidential. To make the data more secure the Jinx may have to add some high-level data security permissions to the database (Watson M, 2012). Also controlling the availability of sensitive data to unauthorized employees is a threat to the integrity of a company’s information. Data threats sometimes can be caused by viruses, worms or Trojans planted by disgruntled employees or malicious hacker
Unprotected network access: The network of the enterprise should be protected from external access. External users may cause damage to confidential data or steal data for purposes of selling it to competitors. Most companies rely on the menu security because it is easy to build. Menu security ensures that different categories of employees have access to the data authorized for manipulation in their area of operation. Access is limited while other menu items remain deactivated and unavailable to the entire security group. Creating user accounts in separate security groups and creating passwords reduces the risk of compromising data integrity.
Weak or compromised cryptographic algorithms: Another security threat to the enterprise is weak and easily compromised passwords. The password of a user can be sniffed in the network traffic so there are more chances of security breach using stolen passwords. Passwords should be encrypted using strong cryptographic algorithms. Malicious attackers may sometimes manage to develop plaintext access codes from encrypted passwords (Palmer, 2003).
Physical security: Physical security is the most important method of ensuring operating system security. Since operating system code and configuration files are installed on a system's hard drive, an attacker with physical access to the system can easily modify, delete or steal critical files on a system. For this reason, most commercial servers are stored in locked rooms and monitored by armed security guards (Palmer, 2003).
Malware: Malware, short for malicious software, hijacks an operating system to perform some sort of destructive task for an attacker. Viruses, Trojans, Worms and spyware are the most common form of malware, and each work to destabilize operating system security controls (Shawgo, Faber & Whitney, 2005).
Prioritization risks in the operating system:
In risk prioritization the general set of recognized risk proceedings, their impact evaluation, and their likelihood of occurrence are "verified" to develop a most-to-least-critical sequence of acknowledged risks (Talabis & Martin, 2012). The main reason of prioritizing and identifying risks is to outline a basis for assigning resources.
Numerous qualitative and quantitative systems have been progressed for risk assessment and prioritization. Qualitative systems comprise of scrutiny of probability and damage, initializing a prospect and impact matrix, categorization of risks, risk occurrence ranking and risk necessity assessment. Quantitative systems include the evaluation of fundamental risk evaluation of effect, probability and timeframe, prospect distributions, understanding analysis, likely monetary assessment analysis and representation and replication. Specialist verdict is involved in all systems to recognize probable impacts and understand the data (Talabis & Martin, 2012).
When assessing risks it is advisable to use systems that are appropriate for the analysis. If the prioritization is to verify the threat of investment opportunity, the scale approach may be paramount system to use. The recommended step in taking any precautionary security action should be a risk prioritization. Prior to scheming and endorsing policies and before choosing and executing technological security methods, it is advisable to ensure that a rational picture of the hazards has been developed.
Every part of the system should be prioritized for its risk outline and after that evaluation, it is easy to successfully and efficiently assign time and finances towards accomplishing the suitable general security strategies (Talabis & Martin, 2012). The procedure of completing a risk evaluation can be rather complicated and should consider the effects and actions when choosing on how to tackle security for the system.
A profoundly risk evaluation, accustomed for the paramount logical precision and accuracy, necessitates an extensive assortment of areas of proficiency and can be time-consuming and costly mainly for big organizations. Depending on the extent and intricacy of the system and the budget, it becomes evident that what is required is not detailed evaluation of exact values and threats, but a universal prioritization (Talabis & Martin, 2012).

Table (1) Risk Assessment
Risk exposure color coding matrix
These colors are used when coding the Exposure cells in Table (1).

Risk mitigations for the risks in the operating systems:
Database security: 1) The first thing we have to implement in the enterprise is separate the web server and database server of the enterprise. 2) encrypt the stored files so that if someone steel the data can’t decrypt it 3) Encrypt your backup files 4) Use web application firewall. It protects the database of the enterprise from the unwanted users. 5) Another way to secure the database of the enterprise is; don’t use the shared servers.
Unprotected network access: 1) Apply the proper security to the network of the enterprise. Apply the proper and complex password to the network. 2) Apply the firewall in the network of the enterprise which restricts the unwanted user to enter the enterprise network.
Weak or compromise passwords: 1) Use Single Sign-On to reduce the number of stored passwords in your organization’s database. 2) Don’t send passwords via email, or over un-secured networks. 3) Require that passwords be changed at regular intervals. 4) Don’t use default passwords (Watson M, 2012).
Physical security:
Protect the resources from natural and human-made disasters by keeping them behind a locked door.
Malware:
1) Run Windows Firewall while on the Internet. 2) Run a secondary firewall program whenever you use the Internet (Palmer, 2003).

Emerging Technologies and Architecture
Jinx, can employ the use of several emerging technologies which include cloud computing (Miller, 2009) and other middleware connectivity services for Distributed Systems like ORB (Object Request Broker), RPC (Remote Procedure Call) and MOM (Message Oriented Middleware) (Kapsalis, Kalogeras, Charatsis & Papadopoulis, 2001).
Cloud Computing
This is a system of hosting a company’s data at distant hired data centers where files and applications are hosted on thousands of homogeneous servers and computers called a Cloud. All these servers and computers are connected and are accessed through the internet. Everything you do on a cloud become internet based as opposed to desktop based (Miller, 2009). As long as an authenticated user is connected to the internet, then they can access all documents and programs and a user is not tied to one computer. It is possible to take your work everywhere in the world because Cloud computing is web based and employees can access what they need via the internet thus facilitating collaboration of geographically dispersed groups. Simple cloud computing that we do every day without noticing is like using web based email services for example Hotmail or Gmail or media sharing sites such as Picasa or Flickr (Miller, 2009). Cloud computing has brought major changes in the way we store information and run programs which is accessed via the internet. If a single computer crashes, all the documents you create and programs are not affected and they are readily available for other users in real time. There are at least six main properties of Cloud computing; * Programmable: Cloud computing requires automation because to protect data integrity, stored information on a computer in the cloud is replicated on to other computers sharing the cloud (Miller, 2009). This done so that the data is available to the user even when that one computer is offline. Programming of the cloud redistributes that computer’s stored data automatically to another computer sharing the cloud. * Powerful: A single computer cannot have the same computing power that is created by a cloud environment which is a connection of hundreds of computers and servers. * User-Centric: A user connected to the cloud owns all the messages, applications, documents and images stored there. This extends to the devices that can access your data. The user is also able to share all these with other users. * Intelligent: Access to information is done in an orderly intelligent way because analysis and data mining are a prerequisite to access the various information stored in a cloud. * Task-Centric: Traditional programs like spreadsheets, word-processors and emails are slowly becoming less important than the data they create. This has the focus shift from applications to how the application can help you accomplish your tasks. * Accessible: Multiple repositories can be used to store data in a cloud thus retrieving the data becomes instant (Miller, 2009).
Remote Procedure Call (RPC) RPCs allow for the distribution of an application over heterogeneous connected platforms by presenting a client/server environment. This increases the flexibility, interoperability and portability of an application by presenting client/server communications. RPCs are characterized by special embedded function calls that are within the client side of the client-server program which increases the architecture’s flexibility accessing remote servers through function calls (Kapsalis, Kalogeras, Charatsis & Papadopoulis, 2001). The procedure is based on stubs.
Figure1. Interactions in a system for a simple call Request-reply functions are available both asynchronously and synchronously and are implemented in DCE (Distributed Computing Environment). The DCE being network and operating system independent is made up of sets of integrated heterogeneous flexible, portable and interoperable system services supporting client-server applications. DCE can be used on transport application programs like TCP/IP and on different network hardware as well as using standard operating systems. Among the services making up the DCE include (Kapsalis, Kalogeras, Charatsis & Papadopoulis, 2001); * Directory services * Data sharing services – diskless support and distributed file system * Remote sharing call * Time services * Thread services * Security services
Object Request Broker (ORB) This technology presents management of data exchange and communication within a network. Communication of objects is isolated and hidden to the user which enhances the maintainability of a system (Kapsalis, Kalogeras, Charatsis & Papadopoulis, 2001). Implementation information like operating system, object locations, programming languages and host hardware is also hidden to the users. The technology uses a framework enabling interoperability and cross-network communication. There are three major architectures in ORB technologies; * JRMI (Java Remote Method Invocation) – Most preferred because it is internet based * DCOM (Distributed Component Object) * COBRA (Common Object Request Broker Architecture)
Advantages of Cloud Computing to Jinx
Cloud computing has several advantages to users and they include (Marinescu, 2012); * Resource used in Cloud computing are metered to charge users only on the resources they use. * Resource multiplexing makes Cloud computing cost-effective by lowering cost to users passed on to them by service providers. * The use of the internet for Cloud computing presents an elastic computing environment where acquisition of resources is done dynamically. * Security and maintenance issues are ensured by the Cloud’s service provider. * Application data is used by devices accessing the Cloud is stored closer to where it is used independent of location. This mode of data storage increases security and reliability while lowering communication costs. * Centralization and specialization allows Cloud computing service providers to efficiently operate due to economies of scale (Marinescu, 2012).
Advantages of RPCs * Codes re-developing as well as code re-writing endeavors are minimized. * RPCs support both thread oriented and process oriented models. * It is server independent. * It enables the use of distributed applications in the distributed environment in addition to the local network environment. * The development of remote call procedures is very general. * RPCs procedure calls are supposed to preserve the business logics and they are aptly designed to do so (Kapsalis, Kalogeras, Charatsis & Papadopoulis, 2001). * The use of straightforward semantics makes it easy to develop distributed systems.
Advantages of using ORB * It is transport independent. * It is Operating system independent. * Server transparency and location transparency. * Implementation and language independence. * Architecture independence * It is also Protocol independent.
How Jinx Will Benefit from these Technologies Jinx stands to benefit a lot by incorporating these technologies in their current system which is just an open local LAN. The inclusion of Cloud computing will see to it that costs of data storage and communication are substantially reduced since the cloud service provider takes care of most of the set up expenses. Issues of security and data integrity are passed on to the cloud service provider thus the user is left with data manipulation and creation. The technology also allows Jinx to have an extensive flexible database provided for its data storage (Marinescu, 2012). The flexibility presented by Cloud computing will enable authorized employees of Jinx to access the company information from practically anywhere in the world and this will include working from home if need arises. The use of ORBs and RPCs ensure that the company can use simple protocols to communicate between it local remote branches using the existing client/server set up. Communication protocols are easy to develop and users can make procedure calls that access remote servers and enable extraction and manipulation of company data and retrieval of important information (Miller, 2009). The company can choose to use ORB architectures like COBRA, DCOM or JRMI to design communication procedures within the company’s distributed system. Since these architectures are transport protocol and Operating system independent, they are simple to develop and implement thereby making the running of administrative network functions an easy task (Miller, 2009).

References
Bassil, Y. (2012). Windows and linux operating systems from a security perspective. Journal of Global Research in Computer Science, 3(2), Retrieved from http://www.jgrcs.info/index.php/jgrcs/article/download/305/259
Bell, D., & Girmson, J. (1992). Distirbuted database systems. (p. 426). Addison-Wesley Publishers Inc.
Coulouris, G., Dollimore, J., Kindberg, T., & Blair, G. (2012). Distributed systems - concepts and design. (5th ed.). 501 Boylston Street, Suite 900, Boston, Massachusetts: Addison-Wesley.
Fran, B, G.F., & Anthony, J. (2003). Grid Computing: Making the Global Infrastructure a Reality. USA: John Wiley and Sons
Hale, B. (1991). An introduction to digital signal processing. 35-37. Retrieved from http://www.arrl.org/files/file/Technology/tis/info/pdf/79135.pdf
Heidari, M. (2011, July 11). Operating systems security considerations. Retrieved from http://www.packetsource.com/article/operating-system/40069/operating-systems- security-considerations
Hiranwal, S., & Roy, D. K. C. (n.d.). Adaptive round robin scheduling using shortest burst app roach based on smart time slice. 2(3), Retrieved from http://www.cscjournals.org/csc/manuscript/Journals/IJDE/volume2/Issue3/IJDE-57.pdf
Kapsalis, V., Kalogeras, A., Charatsis, K., & Papadopoulis, G. (2001, Nov 29 (Thu) to Dec 2 (Sun)). In Hashimoto Hideki (Chair). Seamless integration of distributed real time monitoring and control applications utilising emerging technologies. 27th Annual Conference of the IEEE Industrial Electronics Society Industrial electronics society, Hyatt Regency Tech Center, Denver, Colorado, USA. Retrieved from http://www.microlab.teipat.gr/faculty/kapsalis/papers/IntegrationofControlApplications.pdf
Krzyzanowski, P. (2010). Process scheduling . Retrieved from http://www.cs.rutgers.edu/~pxk/416/notes/07-scheduling.html
Marinescu, D. C. (2012). Cloud computing: Theory and practice. (Master's thesis, University of Central Florida)Retrieved from http://www.cs.ucf.edu/~dcm/LectureNotes.pdf
Miller, M. (2009). Cloud computing -web based applications that change the way you work and collaborate online. Indianapolis, Indiana: Que Publishing.
Palmer, M. J. (2003). Guide to operating systems security. Course Technology Ptr.
Peter, B. (2007). SchedulingAlgorithm.USA: Springer
Scheduling Algorithms. (n.d.). Decreasing-Time Algorithm. Retrieved March 4, 2013, from http://www.ctl.ua.edu/math103/scheduling/scheduling_algorithms.htm
Stallings, W. (2012). Operating systems -internal and design principles. (7th ed., pp. 220-298). Upper Saddle River, New Jersey: Prentice Hall.
Shawgo, J., Faber, S., & Whitney, N. (2005). Operating system legacy, enterprise, and specialized security benchmark consensus baseline security settings. The Center for Internet Security, 2(1)
Upgrading Intel Server Board Set SE8500HW4 to Support Intel Xeon Processors 7000 Sequence. (n.d.). Intel Corporation. Retrieved March 3, 2013, from http://download.intel.com/support/motherboards/server/sb/se8500hw4_board_set_tpsr10.pdf
Watson M, R. N. (2012). New approaches to operating system security extensibility. (Doctoral dissertation), Available from Technical Report. (UCAM-CL-TR-818)Retrieved from http://www.cl.cam.ac.uk/techreports/

Appendix A

Similar Documents

Premium Essay

Operating System Upgrade Implementation Report and Presentation

...IT 505- Core Technologies Operating System Upgrade implementation Report and Presentation Submitted by Jyothi Prasad Pechetti Sothern New Hampshire University Under Guidance of Professor Leonard Perkins Table of Contents Introduction4 Written Report…(5-22) Programming Report…………………………….....…………………………………………6 Components……………………………………………………………………………….6 DOCTYPE………………………………………………………………………...6 HTML……………………………………………………………………………..6 Body……………………………………………………………………………….6 Script………………………………………………………………………………6 Var…………………………………………………………………………………7 Networking Report…………………………………………………………………………11 Network Configuration…………………………………………………………………..11 Server Based Networking………………………………………………………..12 Cloud/ Internet…………………………………………………………………...12 Router…………………………………………………………………………….12 Firewall…………………………………………………………………………..13 Server…………………………………………………………………………….13 Ethernet…………………………………………………………………………..13 Printers…………………………………………………………………………...14 Necessary Networking Components……………………………………………………..14 Modem…………………………………………………………………………...14 Network Switch………………………………………………………………….15 Print Server………………………………………………………………………16 DHCP Server…………………………………………………………………….17 LDAP Server…………………………………………………………………….17 WAP……………………………………………………………………………...17 DNS Server………………………………………………………………………18 Database Report……………………………………………….…………………………....19 Database Examination…………………………………………………………………...19 Database Modification…………………………………………………………………...20 Database...

Words: 3956 - Pages: 16

Premium Essay

Nt1230

...NT1230 6/29/15 NT1230 – UNIT 1. EXERCISE 1. UPGRADING TO:   Valerie Bernier, Dentist RE:   Can I upgrade the office? Hello Ms. Bernier, Thank you for writing to me with detailed information about your computer’s operating system configuration. I am assuming that your present operating system (Windows XP) runs on 32-bit (x86) computers. I am also assuming that each of your machines have 16 GB of available hard disk space. From your systems’ configuration, it looks like your machines meet the minimum hardware requirements for an upgrade to Windows 7. For a 32-bit computer, the system needs to have the following configurations to meet the requirements for Windows 7 upgrade: Processor speed : 1 GHz or faster System Memory : 1 GB Available hard disk space : 16 GB Hardware compatibility with Windows 7 : DirectX 9 graphics adapter with WDDM 1.0 or higher driver From the information you have shared with me, it seems like your machines meet almost all the requirements to upgrade your operating system to Windows 7 Professional. With Windows 7 Professional, you will be able to participate in a Windows Server domain, it also allows you to increase your random access memory (RAM) up to 192 GB. Other add-ons that come with Windows 7 Professional are location aware printing, file system encryption, and the ability to back-up to a network location. You should note that you are upgrading from Windows XP to Windows 7 Professional, you may probably experience hardware...

Words: 385 - Pages: 2

Premium Essay

Operating Systems

...Operating Systems Christy Kegley IT/282 3/2/2014 Carlton Foster Operating Systems * Provide a brief history of three operating systems. The top three operating systems are; Windows XP, Windows Vista, and Linux. “Windows XP is the first Windows OS to allow multiple users to log on simultaneously to the OS, each with their own applications open. Although Windows XP was first released with some bugs, the second service pack (Service Pack 2) resolved most of these problems. XP underwent three service packs. It is an extremely stable OS and was popular in both the home and corporate markets” (Guide to Managing and Maintaining Your PC, Eighth Edition, Andrews, pg. 1116). This programs allows users to do many things that others might not allow like older versions of Windows. Windows Vista is the newest version of Windows. This program is not very popular with some people because there is a lack of compatibility with other programs, also it slows performance. “The first problem is partly caused by hardware manufacturers not providing Vista drivers for their devices that were originally sold with XP drivers. The second problem means that many low end desktop and laptop computers can’t run Vista. And the slow performance of Vista is partly due to the many unnecessary features (fluff) it offers; these features weigh heavy on system resources. Vista comes in five versions: Windows Vista Home Basic, Home Premium, Business, Enterprise, and Ultimate. (Vista Starter...

Words: 764 - Pages: 4

Premium Essay

Cmputers

...Datamax Inc., Training Handbook As Datamax progresses to this new era, the Datamax staff will encounter a new way of doing business in the area of IT. It is the desire of Datamax Inc. to develop the most knowledgeable and capable internal computer support team in the industry. Topics within this handbook will detail steps necessary for installation, maintenance, and troubleshooting company operating systems. It is important that all internal support team members understand the duties required of them, and how to fulfill those duties in accordance with company standards and policy. New support team members must be familiar with the information contained within this handbook and how to properly perform all assigned tasks. Operating System Overview According to GCF LearnFree.org, an Operating System (OS) “manages the computer's memory, processes, and all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language. Without an operating system, a computer is useless” (GCF LearnFree.org, 2015). Operating Systems (OS) allow the user to interface with the computer and make use of the many productivity tools available. The computer OS also manages and controls auxiliary equipment such as input/output devices (mouse/keyboard/monitors), and printers. Each of these allows the user to interact and communicate with the computer. Components and Functions Without an OS, a computer is a mix of hardware and applications...

Words: 3282 - Pages: 14

Free Essay

Unit 8 Video 6 Summary

...different operating modes and explained how they functioned. It also broke down the different operating system components; such as Video Summary 6 This video described the different operating modes and explained how they functioned. It also broke down the different operating system components; such as the shell, the Kernel, and the registry. It explains how the user interface interacts with the hardware through Kernel mode. It also described the different installation types and the steps to install new operating systems on a computer. Stating the advantages and disadvantages of a clean installation vs. an upgrade. It showed the different upgrade pathways of 9 x 05’ vs. NT OS. This video described what driver signing means, and how unsigned drivers might affect your device. It also showed different steps to access the driver signing options, and what each choice did. It told you how to check the verification of your system’s drivers. This last video described the uses for which you might change/add a hardware profile, and how to do it. It showed step by step instructions on how to add a profile and after restarting, how to use the device manager to enable/disable devices for that profile. the shell, the Kernel, and the registry. It explains how the user interface interacts with the hardware through Kernel mode. It also described the different installation types and the steps to install new operating systems on a...

Words: 361 - Pages: 2

Premium Essay

Project Scope

...Computer System Update November 5, 2015 Introduction This report states all the factors associated with the system update project for Chauffe Electric. They are a thriving business that is in desperate need of upgrading their computer hardware and network system in their office. This upgrade will bring the company up to date with the latest software and hardware innovations available to the industry. Upgrading the business to current market level with its local competitors allowing them to be productive and competitive. Project Purpose and Justification To compete in today's ever-changing business environment, Chauffe Electric, Inc. must be running on current technologies to meet specific their business intentions.  This project will elevate all the desktop and laptop PCs at Chauffe Electric, Inc. to the Windows XP10 operating system.  All new PCs will be analyzed for any possible compatibility issues and upgraded as needed.  A schedule will be developed to ensure the rollout of the PCs and Windows 10 XP is incorporated with as little interruption to regular business operations.  Also, all PCs will be tested before delivery for quality control.  To reduce the impact on the employees, this project will include post-delivery PC support for each staff members, and through the development of online tutorials and user manuals. Scope Description • Upgraded technologies – Windows 10XP & 1CEES software is a state of the art operating system...

Words: 1140 - Pages: 5

Free Essay

Name

...Executive Summery  The Zara case study is a case of the fundamental of whether or not to upgrade an IT system which already works, in this case a POS operating system that uses DOS, to more modern operating systems that includes more functionality to meet new demands. Zara is a chain fashion store around Europe, Middle East, Africa, and South America that was founded by Amancio Ortega, in 1975. The first store and main headquarters was found in La Cournia, Spain. Mr. Ortega believed and implemented his business model that:   Retailing and manufacturing needed to be closely linked. This created the backbone for Zara’s everyday functionality to have all the stores communicate with the main distributors and distribution centers (DCs) which in turn communicated directly to the manufactures. As a result, supply was meet with demand with ease and little latency.  This was all made possible through the use of technology and Zara’s IT department. Salgado Badas, the head of the IT, along with Bruno Sanchez Ocampo, were the main decision makers and brains behind the IT of Zara. For the past decade, Zara has implemented POS systems in each store that would have a direct connection via modem to the main headquarters in La Coruna. Managers on a daily basis transmit comprehensive sales information and other data back to La Coruna.   In 2003, PDA’s were also used for ordering and also for tasks such as handling garment returns to DCs and transmitting information from headquarters to all...

Words: 1805 - Pages: 8

Free Essay

Windows

...David Langham NT1110 Lab 1-1 Upgrading for the Best Windows 8 has not been good for most windows users. You as a user are to like the operating system that is setup with the computer you use the most. When choosing an upgrade to do first, think about what you can afford and what you will need the quickest. With each operating systems comes a different upgrade for each one. Windows, Linux, and MAC OX is always sending new updates just to compete with the other operating systems. When want to upgrade, you must first know what your computer is running currently. My computer is running windows 8.1, if I wanted to upgrade, I would go to windows 8.1 PRO. You should also research what specifications your computer must have to run that operating system. You may have to upgrade your RAM in order to keep the operating system running correctly. With wanting to upgrade your RAM, know what you have now. My operating system requires .10 GB of RAMS of background space. I have 4.00 GB installed on my laptop. If I wanted to upgrade my RAM, I would look for the highest amount of GB allowed in my computer. I would upgrade to 16 GB of RAM just to give me the fastest speed possible on my computer. With speed comes great power. With upgrading RAM, It would be highly suggested to upgrade the processor. Intel is one of the most command processor in the computer field. I currently am using an Intel Pentium. When wanting to installed a bigger processor to process quicker. I would like...

Words: 483 - Pages: 2

Premium Essay

Cmgt 445 Week 2 Ia

...17 years, Smith Systems Consulting has been providing organizations, such as Boardman Management Group, with top notch Information Technology and software development solutions. Since Information Technology and software development projects are all that Smith Systems Consulting does, they have the experience to know how to design, implement, and maintain a new system with the most minimal impact to your business. Smith Systems Consulting’s experience also allows them to understand the potential needs outside of the original scope, such as necessary hardware upgrades needed to support a software upgrade. According to the information sent to Smith Systems Consulting by Boardman Management Group, the Baderman Island Resort currently has 26 Windows XP computers with Word XP installed, 38 Windows 2000 computers with Word 2000 installed, and six Windows 98 computers with Word 97 installed. No matter whether Boardman Management Group decides to upgrade to the new version of Microsoft Word or switch to a different word processor all together, other hardware and operating system upgrades will likely be necessary. Smith Systems Consulting will be able to help Boardman Management Group make that decision by weighing the costs of the different solutions. Costs that Smith Systems Consulting would typically consider in a similar scenario would be the price of the software upgrade, the price of potential hardware upgrades, the price any necessary operating system upgrades, the labor cost...

Words: 587 - Pages: 3

Premium Essay

Mr Dtso

...ITCO211-1104B-02: Introduction to Operating Systems Unit 1 Individual project - Windows research Thomas D. Dotson, Sr. American InterContinental University November 13, 2011 Windows 7 operating system In order to upgrade the companies personal computer (PC) workstations to the windows 7 operating system each workstation must meet the following minimum requirements: 1. have at least a 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) Processor. 2. have 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit. 3. have16 GB available hard disk space (32-bit) or 20 GB (64-bit) 4. have DirectX 9 graphics device with Windows display driver model (WDDM) 1.0 or higher driver. (windows.microsoft.com, 2011) The Windows 7 upgrade advisor is the tool needed to make a determination as to whether or not a computer is Windows 7 compatible. This program can be downloaded directly from the Microsoft Windows 7 website. The following steps are needed to determine compatibility: 1. Download the Windows 7 upgrade advisor and install the software. 2. Plug in any hardware devices that are regularly used with the PC you're evaluating. This way the hardware can be evaluated as well for compatibility with Windows 7. 3. Run the Windows 7 Upgrade Advisor. 4. You will see the following window for a moment while the software checks for any updates to the program. 5. When the following window appears...

Words: 797 - Pages: 4

Free Essay

Zara Case Study

...Zara Case Study 1. Case Summary The Zara case study is a case of the fundamental of whether or not to upgrade an IT system which already works, in this case a POS operating system that uses DOS, to more modern operating systems that includes more functionality to meet new demands. Zara is a chain fashion store around Europe, Middle East, Africa, and South America that was founded by Amancio Ortega, in 1975. The first store and main headquarters was found in La Cournia, Spain. Mr. Ortega believed and implemented his business model that: Retailing and manufacturing needed to be closely linked. This created the backbone for Zara’s everyday functionality to have all the stores communicate with the main distributors and distribution centers (DCs) which in turn communicated directly to the manufactures. As a result, supply was meet with demand with ease and little latency. This was all made possible through the use of technology and Zara’s IT department. Salgado Badas, the head of the IT, along with Bruno Sanchez Ocampo, were the main decision makers and brains behind the IT of Zara. For the past decade, Zara has implemented POS systems in each store that would have a direct connection via modem to the main headquarters in La Coruna. Managers on a daily basis transmit comprehensive sales information and other data back to La Coruna. In 2003, PDA’s were also used for ordering and also for tasks such as handling garment returns to DCs and transmitting...

Words: 1656 - Pages: 7

Premium Essay

Riordan Manufacturing Company Inc. Wide Area Network

...into a single format and evaluate the WAN and security documentation for an executive overview. Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. With state-of-the art design capabilities, they create innovative plastic designs that have earned international acclaim. Attention to detail, extreme precision and enthusiastic quality control are the hallmarks of Riordan Manufacturing. With facilities in San Jose, California, Albany, Georgia, Pontiac, Michigan and Hangzhou, China, the company is heavily dependent upon their communication networks. The documentation produced by this analysis will give the management at Riordan Manufacturing an understanding of their networks today, a plan for future upgrades and a baseline to evaluate security. The goal of this exercise is three fold. Our first will be to provide an inventory of the existing network components for Riordan Manufacturing designated by location, review the network security for each site, and our last goal is to document the current security plan for use in future planning. Because of the limited scope of the project, several assumptions must be made. The first assumption is that Riordan Manufacturing has accurate records of the current infrastructure and no changes will be made during this study. Furthermore, we must assume the equipment at each location is similarly configured. The deliverables for this project will consist of an inventory by location of the network in a Visio...

Words: 11081 - Pages: 45

Premium Essay

Os Systems

...A proprietary system has to rely on the software and equipment it uses, which is licensed from a copyright. Therefore a proprietary operating system is specifically designed to work with each company that it is designed for, and nothing else. It is specific to their needs, and only that. Some examples are Windows and Mac OS X. A problem with this layout and design is that the system cannot be altered in any way; which is what can cause costly upgrades and repairs in the future, depending on the needs of the system and company that uses it. For the users that are not very technical, this is the better operating system to choose, since it is a lot easier to use. There are more options that are available as far as the settings for the system. Proprietary has more appeal to potential users, since it is specifically designed for each company individually. However can be more of a pain, since there aren’t the capabilities allowed to make changes within the system due to its design. Open Source Operating is cheaper, they don’t have to have licensing and also don’t require a specific format; unlike proprietary requires. An open source operating system does permit changes to be made, only after it is downloaded for the company that is using it. An example would be Linux that is used on a personal computer, or even Android for any mobile devices. . There are also more options that are available as far as the settings for the system, which do require more work to be involved. A benefit...

Words: 858 - Pages: 4

Premium Essay

Boardman

...Boardman Management Group Word Processing System Upgrade CMGT445 University of Phoenix Boardman Management Group Word Processing System Upgrade Boardman Management Group (BMG) was founded in 1994 and originally handled a series of small cottages and hotels in the Kelsey Valley. BMG took over management and operations of the Baderman Island Resort in 2004. BMG is dedicated to managing leisure and convention focused resorts that provide a quality experience for the visitors. BMG had recently relocated the main office and center of operations to the Baderman Island Resort. All management operations will now be run from this the Baderman Island Resort location. BMG is no stranger to growth and taking on new projects. BMG is willing to make changes in the company if the changes will benefit the company and stay in line with the goals and values of the company. Project overview With the quick growth of the Baderman Island Resort chain this has been the cause of multiple computer operating systems and the different versions of the Microsoft Office software. These inconsistencies, will directly affect the productivity of Baderman employees. Due to the valuable time and effort that will be lost daily from the different versions of the software, from formatting and adjusting documents, company logos and templates. Boardman Management Group strongly believes that upgrading all Baderman Island Resort point of service; computers to a unified system will reduce lost revenue due to wasted...

Words: 3892 - Pages: 16

Free Essay

Nt1110 Unit 8 Video Summary

...described the different operating modes and explained how they functioned. It also broke down the different operating system components; such as, the shell, the Kernel, and the registry. It also explained how the user interface interacts with the hardware through Kernel mode. * Real mode * Shell * API | * Protected mode * Kernel * HAL | * Long mode * Registry | 3.08 This video described the different installation types and the steps to install new operating systems on a computer. It also stated the advantages and disadvantages of a clean installation vs. an upgrade. Finally, it presented the different upgrade pathways of 9 x 05’ vs. NT OS’. * Clean install * Winnt.exe | * Dual boot * Winnt32.exe | * Upgrade | 3.22 This video described what driver signing means, and how unsigned drivers might affect your device. It also showed different steps to access the driver signing options, and what each choice did. It finally told you how to check the verification of your system’s drivers. * Driver signing * Signature verification | * Signed drivers | * Unsigned drivers | 3.23 This video described the uses for which you might change/add a hardware profile, and how to do it. It showed step by step instructions on how to add a profile and after restarting, how to use the device manager to enable/disable devices for that profile. * Device manager | | | Vocabulary 3.06 * Real mode – 15 bit operating mode * Protected...

Words: 413 - Pages: 2