StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Historical Information for Midrange computers - Thesis Example

Cite this document
Summary
Running Head: Historical Information for Historical Information for Midrange Computers University Name Subject Name Instructor Name Historical Information for Midrange Computers Introduction to Midrange Computers Midrange computers (also called midrange systems) are a category of computers that fall between the microcomputers and the mainframe computers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Historical Information for Midrange computers
Read Text Preview

Extract of sample "Historical Information for Midrange computers"

Download file to see previous pages

However, by 1998, IBM again emerged as the major producer of the midrange systems. By the year 2002, client-server platforms and midrange computers almost mingled together technology-wise and expanded the sphere of enterprise spanning storage management. In the contemporary business environment, midrange systems are being used for electronic data interchange, B2B communication, and customer relationship management. These systems are becoming increasingly popular. (Datalink, 2007; Rojas, 2001) Client-Server Architecture Midrange computers have been increasingly incorporated in the client-server architecture, which involves synchronized programs in an IT application.

The server provides a service to one or more clients that send requests for it. Midrange computers are thus enabled with database access, web access, email exchange, etc., which are based on this architecture. (Berson, 1996) Shared Resources In client-server model, the clients share the resources like database, hardware, applications, etc. through a server. Network computing is an apt example of utilizing shared resources. (Berson, 1996) Advantages and Disadvantages Advantages include distribution of responsibilities and roles in a computer system through numerous independent computers, which facilitates decentralization, redundancy, etc.

Replacement, repairing, upgrading, and relocating the components of such systems are easier. Disadvantages include server overload and risk of network intrusion. If the server is down, the whole system is down. Peer-to-Peer Structure This system uses distributive application architecture. The member computers of such a system (or network) are equally powerful. (Subramanian and Goodman, 2005) Shared Systems Shared systems in peer-to-peer structure facilitate file and application sharing without the requirement of a central coordination.

Peers are consumers as well as suppliers of the resources. (Subramanian and Goodman, 2005) Advantages and Disadvantages Advantages include higher computing power, storage space and bandwidth. Distributive architecture makes the system robust. However, this system lacks effective mechanisms for file security. If a malicious code enters the system through a network node, the entire network may shatter down. Security/Risk with regards to Midrange Technology Privacy: Since midrange technology is primarily client-server model based, privacy can be ensured by implementing appropriate security policies through the central server.

(Newman, 2010; Berson, 1996) Disclosure of Data: Information in storage or during transmission through network resources may be disclosed by hacking, spyware, etc. Encryption can be used to solve this problem. (Newman, 2010) Data Access: Technologies like SQL, XML, Web Services, etc. can be used in the midrange computers to facilitate data access secure. (Newman, 2010) Secure Data Deletion: This is a general issue in the context of computers. Hard disc shredding and multiple overwrites are suggestible in this regard.

(University of Pennsylvania, 2011) Key Management: Midrange computer system can provide secured encryption method through a central server along with effective public and private key management. (Ryabko and Fianov, 2005) Audit Rights: Audit rights can be implemented to midrange computing, which will enhance security through account management, system events tracking, recording logons and

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Historical Information for Midrange computers Thesis”, n.d.)
Retrieved from https://studentshare.org/finance-accounting/1423629-historical-information-for-midrange-computers
(Historical Information for Midrange Computers Thesis)
https://studentshare.org/finance-accounting/1423629-historical-information-for-midrange-computers.
“Historical Information for Midrange Computers Thesis”, n.d. https://studentshare.org/finance-accounting/1423629-historical-information-for-midrange-computers.
  • Cited: 0 times

CHECK THESE SAMPLES OF Historical Information for Midrange computers

Historical Information for Minicomputer

historical information about Minicomputers Before going into the discussion regarding different facts related to minicomputers, let us get a better understanding of what minicomputer actually is.... historical information about Minicomputers Before going into the discussion regarding different facts related to minicomputers, let us get a better understanding of what minicomputer actually is.... states, “Minicomputers are computers that are somewhere in between a microcomputer and a mainframe computer”....
3 Pages (750 words) Thesis

The Language of Reality

We therefore largely depend upon these two elements to formulate successful interactions, and to form the fabric of what we perceive as reality - in the sense that we depend upon information to guide, instruct, elucidate and define the world around us.... In this way, the eventual meaning conveyed by a piece of information is outside of the control of the speaker or communicator from the moment the idea leaves their immediate sphere and enters a communication channel - whether that channel be through the medium of speech, or through a technological pathway such as the internet....
32 Pages (8000 words) Essay

E-Business in the United States

By the middle of 2001 the business revolution promised by the 'new economy' and the functions of the Internet had come to naught.... The promise of a new business model based on e-Commerce or e-Business (as the term has been used interchangeably) failed to deliver as the dotcom phenomenon imploded into that of the dot-bomb....
20 Pages (5000 words) Essay

Police as Crime-fighters

(Braga and Moore, 2004)The historical Evolution of the Police ForceThe idea of modern police force has evolved over many years.... The huge edifice of police set up in each country is built and run on taxpayer's money and as the stakeholders in the investment the citizens have every reason to expect the police to deliver goods....
16 Pages (4000 words) Essay

Computer information

The series of operations are defined by the user and can be changed at any one moment to allow the user solve more than one… computers are composed of the processor which carries out all the operations of the computer, the memory unit that stores data and instructions, the peripheral devices that send information outside the computer to other devices, the hardware elements which are the tangible Computer Information A computer is a machine that is programmable and designed to chronologically and automatically carry out a series of arithmetic and logical operations....
2 Pages (500 words) Term Paper

Origins of Espionage and Famous Cases

It is commonly regarded as spying that entails secretly gathering of information about a competing industry or a foreign government without the holder's consent of the information.... This paper seeks to discuss the origins of Espionage, its' famous cases, targets, and various agents and techniques used to collect this information.... It categorized as political crime that involves transmitting and gathering information correlated to the intent of national defence....
10 Pages (2500 words) Term Paper

Digital Music Production and Authenticity

For one, it is a rich source of information (educative) especially to those who are keen on the history of music and entertainment.... This essay "Digital Music Production and Authenticity" discusses how digital music production practices (like sampling) have affected notions of musical 'authenticity'....
10 Pages (2500 words) Essay

Studies of Employee Motivation

This paper looks at the theories and studied of employee motivation and applies them to the practices in the plant maintenance department (PMD) of the Bahrain Petroleum Company (BAPCO).... The particular company was chosen because this writer is employed in the said department … Management experts, practitioners, and business would universally agree that employees are one of the most important assets of an organization....
18 Pages (4500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us