StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computing - New Client Server PC System - Assignment Example

Cite this document
Summary
The paper "Computing - New Client Server PC System" tells us about planning for the installation of replacing the standalone systems. With the ever-growing focus on security, enterprises are spending countless hours and dollars on network and application protection, yet they are still vulnerable…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Computing - New Client Server PC System
Read Text Preview

Extract of sample "Computing - New Client Server PC System"

Computing Installing and delivering the new client server PC system in time is key to management of data base of PES. Changing from standalone to client/server enhances the administration and usage of information. The goal is to manage the upgrade of the system in Oracle 8.0 which specifically suits the system of PES. Availability and usage of the SE, TSE and IE is the key issue in completing the task in time. The available time and the human resources must be used efficiently to make the upgrade success in all aspects. Utilising the services of available human resources is key to the completion of task in time. Computing Gant Chart Project duration Start date End date Total expenditure 90 days 20-03-06 20-06-06 March April May June S M T W Th F S S M T W Th F S S M T W Th F S S M T W Th F S Total 2 2 2 2 2 3 4 4 4 3 3 5 5 4 4 3 3 3 3 3 Brian Outline the database 1 Demonstrate prototype 1 Build DB 2 2 2 2 2 1 1 1 1 Initial test of DB 1 1 1 1 Test data base 1 1 Install fire wall 1 1 Routine maintainance before launch 1 Launch system 1 Sam design prototype database 2 2 2 2 2 Populate the db 2 1 Corrections to DB and IF 1 1 1 1 1 Test system server 1 1 1 1 1 Test internet, intranet, email 1 1 1 1 Install database at PES 1 1 Train IT Manager 1 Install 2nd server 1 1 1 1 Train data base administrator 1 1 1 Karen DUI for database 1 1 1 1 Build DB 1 1 1 1 Initial test of interface 1 1 1 Install, internet, intranet, email. 1 1 Test internet, intranet, e mail 1 1 Train IT technician 2 1 1 Sarah build DB 2 2 2 2 1 Configure system for internet 1 1 1 1 Test data base 1 1 Install fire wall security 1 1 Ben Install 2nd server 1 1 1 1 IE1 survey 1 Install 1 2 2 2 2 3 2 2 2 2 Remove old system 1 1 1 1 Remove the old system 2 2 1 1 1 Install DB at PES 1 1 IE2 Install 2 2 2 2 2 1 1 1 1 1 Expenditure 4600 4680 4680 4180 4430 6130 7330 7330 5900 3730 600 600 1375 775 175 640 640 320 495 920 59530 Alternative Plan Project duration Start date End date Total expenditure 90 days 20-03-06 20-06-06 March April May June S M T W Th F S S M T W Th F S S M T W Th F S S M T W Th F S Total 2 2 2 2 2 3 4 4 4 3 3 5 5 4 4 3 3 3 3 3 Brian Outline the database 1 Demonstrate prototype 1 Build DB 1 1 1 1 1 1 1 1 1 1 Initial test of DB 1 1 1 Test data base 1 1 Install fire wall 1 Routine maintainance before launch 1 Launch system 1 Sam design prototype database 1 1 1 1 1 1 Populate the db 1 1 Corrections to DB and IF 1 1 Test system server 1 Test internet, intranet, email 1 Install database at PES 1 Train IT Manager 1 Install 2nd server 1 1 1 Train data base administrator 1 1 1 Karen DUI for database 1 1 Build DB 1 1 Initial test of interface 1 1 1 Install, internet, intranet, email. 1 1 Test internet, intranet, e mail 1 1 Train IT technician 1 1 Sarah build DB 1 1 1 1 1 1 Configure system for internet 1 1 Test data base 1 1 Install fire wall security 1 1 Ben Install 2nd server 1 1 1 IE1 survey 1 Install 1 2 1 1 1 1 1 1 1 Remove old system 1 1 Remove the old system 1 1 Install DB at PES 1 1 IE2 Install 1 1 1 1 1 1 1 1 1 1 1 1 expenditure 2910 640 1560 2090 2090 1530 3560 3390 3040 3260 1770 1120 1225 1045 1095 320 920 31565 : While planning for the installation replacing the standalone systems the change of technology, making staff familiar to it, taking precautionary measures to keep the installation bug and problem free and the cost efficiency were to be taken into consideration. The available budget 31000 pounds must be made enough towards installation costs. With the ever-growing focus on security, enterprises are spending countless hours and dollars on network and application protection, yet they are still vulnerable. With users sharing passwords, writing them down or utilizing the same password for multiple applications, users easily compromise security. PES found that they can identify 80% of their user's passwords using commonly-available password cracking software. Even with password alternatives, users can still lose smart cards or tokens, or forget their PINs. User authentication remains one of the weakest links in the security chain and a costly risk for users and IT staff. Digital Persona Pro can be easily and quickly integrated into Microsoft Windows2000-based networks by leveraging existing Windows infrastructure. Digital Persona Pro Server installs onto Windows domain controllers and then uses Windows Active Directory to: Store user authentication data, Use existing access policies, Provide application and policy management, Provide load balancing and failover. Doing so eliminates the need to: Purchase new, dedicated servers Duplicate user data. Learn new management applications. Replicate network-wide policies. PES requires secure access to sensitive, valuable information realize immediate benefits from Digital Persona's secure authentication solution by: Improving security at the desktop by eliminating the inherent weaknesses of password- and PIN-based security. Company wants to decrease help desk calls and enabling IT staff to focus on more critical projects. By decreasing time for setting passwords the productivity is increased. The above mentioned plans are proposed pathways to implement aforesaid modalities and enhancements. The 2nd plan is recommended to be applied in this case as it was nearer to the budget proposed by the company and it can be implemented according to the convenience of the company and in the proposed 3 months. In the first plan the 75% of the work was completed in first half of the proposed time and remaining work will be completed in the last days leaving large gap between which rise a problem of coordination between company and the vendor or installation team. But in the case of 2nd plan the work was equally distributed along the proposed 3 months period taking the availability of the staff and the holidays for the company. Performance-tuning DBA working on improving run-time of Micro strategies reports for PES can be done effectively using the above plans. This effort includes optimizing performance of multi-terabyte VLDB's and tables. Analysis and improving the performance of numerous reports for 1.7- terabyte customer information system can be achieved. Performance will be expedited and the design improvements can eliminate the performance bottlenecks. Senior Oracle DBA/architect must be responsible for designing and implementing Oracle databases throughout the PES. Designed, implemented, and tested HA (High Availability) for critical 24x7 production databases were populated. Design and implementation of database layout increases the performance of the total system. The system enables the company to analyze and provide corrective action for the problems regarding the performance. It can manage numerous production and development databases for critical company functions, such as Billing, On-line Claims, and Litigation. The training session will be conducted for the members for tackling; Back up/Recovery, performance tuning, database installation, etc. Numerous database installs were performed including 8i as well as version upgrades. The problems with Oracle Transparent gateway to DB2 will be resolved if the performance is optimised. The testing team was supported in various database needs, such as back up/ recovery, trouble shooting regarding application problems. Conclusion: The two plans of installation proposed are capable of delivering according to the measures mentioned aftermath. But the 2nd plan was cost effective and completes installation in specified time without disturbing the present working set up. The integrated timesheet allows the company to create real-time reports on the hours staff spends at work. The time spent on projects, tasks and user-definable overhead categories can be easily tracked and reported. The timesheet information integrates directly with resource, and financial reporting tools to automatically insert information into timesheets. As it was cost effective and the existing work and execution setup was least disturbed, we conclude the report recommending the 2nd plan for the up gradation of client/server technology from standalone PCs of PES. References: The references were given in Harvard style which was as follows, name/s of author/s, date of publication, title of publication, publisher/organisation, edition, type of medium, date item retrieved, name or site address on internet. The edition details were not given as I viewed only articles but not any editions of regular publications. 1. 1.@task team, 2006, Project scheduling, @task, electronic,18-07-2006, http://www.attask.com/sst-project-scheduling.html 2. @task team, 2006, Ease of use, @task, ,electronic, 18-07-06, http://www.attask.com/sst-ease-of-use.html 3. Mike Glen, 2006, Microsoft Project: 23, Techtrax, ,electronic, 18-07-06, http://pubs.logicalexpressions.com/pub0009/LPMArticle.aspID=548 4. ,2006, POLICY FOR INTERNET, INTRANET, E-MAIL IN FEDERAL GOVERNMENT WEB-SITES, government directorate, electronic, 18-07-06, http://66.249.93.104/searchq=cache:Jt-zJpJpwSEJ:pakistan.gov.pk/e-government-directorate/policy/Internet Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computing Assignment Example | Topics and Well Written Essays - 2250 words”, n.d.)
Computing Assignment Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/technology/1522504-computing-assignment
(Computing Assignment Example | Topics and Well Written Essays - 2250 Words)
Computing Assignment Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/technology/1522504-computing-assignment.
“Computing Assignment Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/technology/1522504-computing-assignment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computing - New Client Server PC System

Web applications development

Preferably, a server offers a consistent visible interface to their clients in order that clients don't need to know about the information of the system (specifically, program and hardware) that is offering the required service.... The 2nd layer comprises the useful information development technology based tool for instance Active server Pages (ASP) or JSP.... This report presents a detailed analysis of web based applications, their working frameworks, client-server architecture, advantages and disadvantages of client-server architecture....
6 Pages (1500 words) Research Paper

Networking in a Client Environment

Their paper, (Lewandowski, 1998) relates the concept of client/server networking to a consumer/producer relationship where a client performs the role of a consumer in a client/server system while the job of the product is performed by the server.... Additionally, in the past few years, client/server networking environment has become very popular among industries because of the development of economical and low-priced equipment and the more and more obvious fact of the supposition that a framework formed on huge applications fails when a large number of functionalities and processes are integrated into a single system or when the number of people using a network increases too high (Lewandowski, 1998)....
5 Pages (1250 words) Essay

Heteregeneous Networks

This paper ''Heteregeneous Networks'' tells that With the rapid paradigm shift into embracing heterogeneous networks that comprise of Microsoft windows system and the Linux/unix3.... This makes it possible for the configuration of Linux Servers that appear on the network and pc users like windows-based server SMB can be traced back toto the days of DOS time when IBM used SMB to communicate with the original network cards.... It is possible to configure Linux Servers so that they appear to the network and pc Users like WA windows-based server....
24 Pages (6000 words) Coursework

Remotely Controlled Heating System

wo server application programs are loaded and run on the server pc every time the server operating system is fired up.... he server pc operates a Windows XP operating system.... Two server application programs are loaded and run on the server pc every time the server operating system is fired up.... A database is created, maintained and run on the server pc every time it starts.... he task to be completed is the design of an embedded distributed network system....
6 Pages (1500 words) Assignment

Web Servers and Internet Applications.Client Server Communication.Goodyear (1999)

Client/server is network architecture that separates a client application that generally deals with end user from a server that does the most work.... Each instance of the client software can send requests to a server.... Client/server is network architecture that separates a client application that generally deals with end user from a server that does the most work.... Each instance of the client software can send requests to a server....
12 Pages (3000 words) Essay

Heterogeneous Networks

The paper 'Heterogeneous Networks' analyzes heterogeneous networks that comprise of Microsoft windows system and the Linux/unix3.... This makes it possible for the configuration of Linux Servers that they appear on the network and pc users like Windows-based servers.... interoperability toolkit with acronym SFU in 1999 to streamline, the integration between windows server 2003 family, windows XP professional and the windows 2000Family of operating systems and Unix/Linux systems in heterogeneous networks....
24 Pages (6000 words) Assignment

Thin Client Computing

Generally, thin client technology protects the data and information, hiding all weak points that can be used to penetrate the security system of the institution (Net Work Computing Lab, 2009).... hin client/ stateless environments protect the laptops against malware; malware is software that is designed to damage a system without the user's knowledge or consent.... This means that when there is an update, the system administrator will be required to update it on the server, meaning that the entire program is updated rather than other technologies in which updates procedures could be fulfilled by updating every laptop....
6 Pages (1500 words) Assignment

Thin Client Technology Analysis

This report or article explores the practical benefits that are associated with the conversion of ILC laptops to thin client architecture within the college computing system (Richardson, et al.... he security of information in the institution can be maintained through the reduction of the frequent threat of the existence of viruses that affect the computing system of ILC laptops.... The thin client technology reduces the number of entry points of viruses into the computer system of any particular organization....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us