StudentShare solutions
Triangle menu

Historical Information for Midrange computers - Thesis Example

Not dowloaded yet

Extract of sample
Historical Information for Midrange computers

However, by 1998, IBM again emerged as the major producer of the midrange systems. By the year 2002, client-server platforms and midrange computers almost mingled together technology-wise and expanded the sphere of enterprise spanning storage management. In the contemporary business environment, midrange systems are being used for electronic data interchange, B2B communication, and customer relationship management. These systems are becoming increasingly popular. (Datalink, 2007; Rojas, 2001) Client-Server Architecture Midrange computers have been increasingly incorporated in the client-server architecture, which involves synchronized programs in an IT application. The server provides a service to one or more clients that send requests for it. Midrange computers are thus enabled with database access, web access, email exchange, etc., which are based on this architecture. (Berson, 1996) Shared Resources In client-server model, the clients share the resources like database, hardware, applications, etc. through a server. Network computing is an apt example of utilizing shared resources. (Berson, 1996) Advantages and Disadvantages Advantages include distribution of responsibilities and roles in a computer system through numerous independent computers, which facilitates decentralization, redundancy, etc. Replacement, repairing, upgrading, and relocating the components of such systems are easier. Disadvantages include server overload and risk of network intrusion. If the server is down, the whole system is down. Peer-to-Peer Structure This system uses distributive application architecture. The member computers of such a system (or network) are equally powerful. (Subramanian and Goodman, 2005) Shared Systems Shared systems in peer-to-peer structure facilitate file and application sharing without the requirement of a central coordination. Peers are consumers as well as suppliers of the resources. (Subramanian and Goodman, 2005) Advantages and Disadvantages Advantages include higher computing power, storage space and bandwidth. Distributive architecture makes the system robust. However, this system lacks effective mechanisms for file security. If a malicious code enters the system through a network node, the entire network may shatter down. Security/Risk with regards to Midrange Technology Privacy: Since midrange technology is primarily client-server model based, privacy can be ensured by implementing appropriate security policies through the central server. (Newman, 2010; Berson, 1996) Disclosure of Data: Information in storage or during transmission through network resources may be disclosed by hacking, spyware, etc. Encryption can be used to solve this problem. (Newman, 2010) Data Access: Technologies like SQL, XML, Web Services, etc. can be used in the midrange computers to facilitate data access secure. (Newman, 2010) Secure Data Deletion: This is a general issue in the context of computers. Hard disc shredding and multiple overwrites are suggestible in this regard. (University of Pennsylvania, 2011) Key Management: Midrange computer system can provide secured encryption method through a central server along with effective public and private key management. (Ryabko and Fianov, 2005) Audit Rights: Audit rights can be implemented to midrange computing, which will enhance security through account management, system events tracking, recording logons and ...Show more

Summary

Running Head: Historical Information for Historical Information for Midrange Computers University Name Subject Name Instructor Name Historical Information for Midrange Computers Introduction to Midrange Computers Midrange computers (also called midrange systems) are a category of computers that fall between the microcomputers and the mainframe computers…
Author : raquelwuckert
Historical Information for Midrange computers essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the thesis on your topic
"Historical Information for Midrange computers"
with a personal 20% discount.
Grab the best paper

Related Essays

Integrating Sustainable Design with Building Information modeling for Energy Management in Saudi Arabia
The paper tells that green technologies and green methods employed in construction can benefit us not only in developing a sustainable environment but also a sustainable economy. Living in a sustainable world is not only beneficial for human beings but also for the environment. Plants and trees are the source that is capable of providing us with oxygen and food.
30 pages (7500 words) Thesis
The Conceptual and Theoretical Fundamentals of Management Information in Public Procurement
PPP is an arrangement wherein “public sector bodies enter into long-term contractual agreements in which private parties participate in, or provide support for, the provision of infrastructure, and a PPP project results in a contract for a private entity to deliver public infrastructure-based services.”
91 pages (22750 words) Thesis
Due to their low-cost and high-quality of goods, new technology and computers are eliminating jobs in America
Initially they were meant to help reduce muscular requirements of work but due to their low cost and high quality of goods, new technology and computers are eliminating jobs in America. Automation has reduced the need for human muscular and mental abilities.
5 pages (1250 words) Thesis
Historical Information for Minicomputer
Minicomputers gained popularity in the 1960s when computer engineers designed 12-bit machine from DEC, which was relatively low cost and small as compared to competitors. Small business owners, who did not have enough money to buy mainframes, used minicomputers because at that time minicomputers had the ability to perform somewhat similar tasks as mainframes could do and at relatively low cost.
3 pages (750 words) Thesis
Integrating Sustainable Design with Building Information modeling for Energy Management in Saudi Arabia
In old times when man started building the homes to fulfill his shelter needs, homes were very simple and do not contain the luxuries that we have today. The building of house was soon connected to art and people tried to beautify their homes by using good materials and decorating it with different things.
31 pages (7750 words) Thesis
What are the key challenges facing educational leaders in relation to Information and Communication technology
A touch of a button may spell wonders, especially for young students eager to discover awesome new things at the comfort of their own homes or classrooms. Likewise, modern inventions for communication have been
7 pages (1750 words) Thesis
Islamist and historical
enough to function as a strategic equaliser to Iraq and Iran, and is a vital ally in the collective security efforts of the United States in the region (Cordesman & Obaid 2005). Saudi Arabia, similar to its neighbours confronts numerous problems, such as Islamic threats or
15 pages (3750 words) Thesis
AN INTRODUCTION TO INFORMATION AND CYBER SECURITY
Moreover, it also extensively supports Voice over IP that is a significant option for the organization, as international and corporate organizations use VoIP for communication
10 pages (2500 words) Thesis
AN INTRODUCTION TO INFORMATION AND CYBER SECURITY
Although this technology enables people to be more productive and allows them to access a wide range of information, it also comes with it a lot of security issues because if the information in our system is hacked the consequences
4 pages (1000 words) Thesis
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation