Monday, February 17, 2020

Historical Information for Midrange computers Thesis

Historical Information for Midrange computers - Thesis Example However, by 1998, IBM again emerged as the major producer of the midrange systems. By the year 2002, client-server platforms and midrange computers almost mingled together technology-wise and expanded the sphere of enterprise spanning storage management. In the contemporary business environment, midrange systems are being used for electronic data interchange, B2B communication, and customer relationship management. These systems are becoming increasingly popular. (Datalink, 2007; Rojas, 2001) Client-Server Architecture Midrange computers have been increasingly incorporated in the client-server architecture, which involves synchronized programs in an IT application. The server provides a service to one or more clients that send requests for it. Midrange computers are thus enabled with database access, web access, email exchange, etc., which are based on this architecture. (Berson, 1996) Shared Resources In client-server model, the clients share the resources like database, hardware, a pplications, etc. through a server. Network computing is an apt example of utilizing shared resources. (Berson, 1996) Advantages and Disadvantages Advantages include distribution of responsibilities and roles in a computer system through numerous independent computers, which facilitates decentralization, redundancy, etc. Replacement, repairing, upgrading, and relocating the components of such systems are easier. Disadvantages include server overload and risk of network intrusion. If the server is down, the whole system is down. Peer-to-Peer Structure This system uses distributive application architecture. The member computers of such a system (or network) are equally powerful. (Subramanian and Goodman, 2005) Shared Systems Shared systems in peer-to-peer structure facilitate file and application sharing without the requirement of a central coordination. Peers are consumers as well as suppliers of the resources. (Subramanian and Goodman, 2005) Advantages and Disadvantages Advantages i nclude higher computing power, storage space and bandwidth. Distributive architecture makes the system robust. However, this system lacks effective mechanisms for file security. If a malicious code enters the system through a network node, the entire network may shatter down. Security/Risk with regards to Midrange Technology Privacy: Since midrange technology is primarily client-server model based, privacy can be ensured by implementing appropriate security policies through the central server. (Newman, 2010; Berson, 1996) Disclosure of Data: Information in storage or during transmission through network resources may be disclosed by hacking, spyware, etc. Encryption can be used to solve this problem. (Newman, 2010) Data Access: Technologies like SQL, XML, Web Services, etc. can be used in the midrange computers to facilitate data access secure. (Newman, 2010) Secure Data Deletion: This is a general issue in the context of computers. Hard disc shredding and multiple overwrites are sug gestible in this regard. (University of Pennsylvania, 2011) Key Management: Midrange computer system can provide secured encryption method through a central server along with effective public and private key management. (Ryabko and Fianov, 2005) Audit Rights: Audit rights can be implemented to midrange computing, which will enhance security through account management, system events tracking, recording logons and

Monday, February 3, 2020

To practice following the law of least intervention and develop the Essay

To practice following the law of least intervention and develop the habit of nipping potential misbehavior in the bud - Essay Example entails the introduction of an aversive stimulus, which more often than not inflicts physical or psychological harm on the victim, with the sole intention of deterring undesired behaviors. In light of this, it is possible for teachers to deter their students from engaging in disruptive behaviors. As outlined in the Module 4’s text, a hierarchy of intervention strategies exists for teachers to use to deter unwanted behaviors (COMP 4.22). Almost two years ago, I happened to be interning at an elementary school in the district, when I came across the most bizarre disruptive behavior from a student. Approximately ten minutes into the lesson, this young boy would start tapping his pencil on the desk rapidly. As time elapsed, the tapping got louder, which caused students seating near him to lose their concentration. At first, I wrote this behavior off because I simply assumed that it was the student’s way of internalizing taught concepts. It was only when students started complaining about the behavior, that I decided to intervene. Immediately the boy began tapping his pencil ten minutes into the lesson, I first ignored him for a minute. However, as the tapping got louder, I made eye contact with the student, and soon increased the physical proximity between the student and I. This did not seem to deter this bizarre behavior, and I could tell that the student was unaware of my intention. Therefore, I decided to touch his hand gently, an action, which forced him to spontaneously stop the behavior. Excited that I had achieved what I had set out to do, I walked away from the student. By the time I got to the front of the classroom, the tapping commenced. This prompted me to engage the student directly whereby, I deliberately asked him a question hoping that the destruction would pull his attention from the undesirable behavior, and in turn help me assess whether he had grasped the course content. He answered correctly, which made me aware that his behavior was