Free

CIS 206 U1 Discussion - Essay Example

Comments (0) Cite this document
Summary
The major operating systems and distributions are Debian, Ubuntu, Arch, and Red hat. Debian distribution produces operating systems like Ubuntu while Red-hat produces fedora and arch…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
CIS 206 U1 Discussion
Read TextPreview

Extract of sample "CIS 206 U1 Discussion"

Fedora Comparison to other Linux Distributions School Linux operating system has many distributions that come up with several operating systems. The major operating systems and distributions are Debian, Ubuntu, Arch, and Red hat. Debian distribution produces operating systems like Ubuntu while Red-hat produces fedora and arch produce the Arch Linux. Other notable Linux distributions include OpenSuse, CentOS, Mint, Mandriva and Kali Linux formerly backtrack. In the text, we will focus on Fedora, Ubuntu and Arch Linux.
Fedora started in 2002 as a spun off from an undergraduate project called Fedora Linux and is supported by the open-source community. Ubuntu is a fork of Debian, that is on of the oldest Linux distributions available and is sponsored by Canonical. The features to look at in comparing the Linux distribution are stability, performance, software availability and installation, user interface and update support and release schedule. Fedora and Ubuntu are both stronger than Arch Linux. Ubuntu users have reported more application crashes that Fedora users. The reason behind this is the high number of third party applications in Ubuntu. Therefore, Fedora is more stable than Ubuntu and Arch Linux.
Fedora, Ubuntu and Arch Linux are very fast Linux distributions. Fedora has a high I/O performance than Ubuntu but on the other hand Ubuntu starts up quickly. From some test by OpenBenchmarking.org fedora 20 outperforms Ubuntu 13.10 when working with large number of files as in a business setting. Fedora scored 279.22 files/second as compared to 184.10/second files in Ubuntu. Performance in graphical applications was almost similar in Fedora and Ubuntu of around 31.4 frames/second. Therefore, fedora outscores Ubuntu in performance.
Hardware support in Linux is still a bigger problem than other commercial distributions like Windows and OS X. In Linux, Ubuntu has a better hardware compatibility than both arch and fedora, and different drivers will quickly work in it. Ubuntu outperforms both fedora and arch in software availability. Ubuntu has a lot of developers working on their applications, and it also supports personal package archives. Fedora has a large library of applications but not as extensive as Ubuntu. Fedora uses a package manager called yum and rpm; Ubuntu uses apt-get and Deb while Arch Linux uses a package manager called Pacman. Arch Linux outperforms both Fedora and Ubuntu in building customized multimedia production workstation. Arch also has a user repository hundreds of user supported packages. All the distributions have constant updates and full dependency tracking. Fedora has an entirely different perspectives on software licensing. Fedora supports free and open source software only while Ubuntu supports any propriety software that can run on it.
Fedora uses a Gnome desktop environment while the latest Ubuntu releases have switched from Gnome to Unity desktop environment. Unity is beautiful and supports both 3D and 2D elements and has a very powerful notification system. Ubuntu comes out on top since Unity is more polished than Gnome. Fedora has a fast software release schedule than both Ubuntu and Arch Linux. Fedora has a new version every six months. On the other hand, Ubuntu has two version releases each year. Ubuntu uses both Ubuntu LTS and Ubuntu standard release. Constant updates of Fedora mean that users get new features, fewer software bugs, and updated drivers on very regular basis.
Ubuntu and Arch Linux works better for a personal environment since they are very user-friendly, easy to install and support a lot of software that many people migrating from other operating systems like windows are used to. Ubuntu is suited for personal software and also supports more games than fedora while arch supports a lot of multimedia application that might interest many people. In a business setting, Fedora will be a better option due to its high stability and superior performance while handling large data files found in an enterprise environment.
Reference
Fedora (2015). Comparison of Other Distributions. Retrieved from http://fedoraproject.org/wiki/Comparison_to_other_distributions Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS 206 U1 Discussion Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1681139-cis-206-u1-discussion
(CIS 206 U1 Discussion Essay Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1681139-cis-206-u1-discussion.
“CIS 206 U1 Discussion Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1681139-cis-206-u1-discussion.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CIS 206 U1 Discussion

Cis 331 discussion wwek 2

...Please respond to (2) other discussion posts. The original post will be highlighted in bold red colors. The yellow will be what I put as myanswer for the same discussion post. You may agree or disagree with their posting. Or you can add something to their answer, but please remember to be respectful. Please remember that you are no editing their post answer, you are just writing what you think about what reading their post for the week. It will be just like a sit in class discussion with you the teacher and the other students. You can put all answers ONE pages of work. No sources are needed. I have provided an example of how to respond to student post at the bottom of the page in...
1 Pages(250 words)Essay

Class Discussion cis 242

...Discussion Making Decisions in C++ using Conditions, Operators and Values" Please respond to the following: Explain how decisions are made in C++ programming using conditions, operators, and values. Give a coded example to support your response. Define the significance of Boolean operators and explain how they relate to the conditions in your discussion. Give an example using C++ syntax to support your response. Note: values can be either variables or constants. The structure of Decision Making in C++ requires (at-least) one or more conditions for evaluation, if the condition is determined to be true the statement(s) needs to be executed, however, the if the condition is becomes false, there is an option for other statement(s... Operators...
2 Pages(500 words)Essay

CIS

...Sherry Turkle: Connected, But Alone? Turkle in the TED.com show talks about how technology has transformed the manner in which people communicate today. The traditional forms of communication where people used to talk face to face or through phone calls have been replaced by new forms of technology through use of text messages, social networks and emails. According to her, this transformation has led to loss of genuine real life conversation converting people into robot- like machines. She asserts that there are features of real conversation that can never be replaced by the electronic communication. These features are what connect people as social beings. It is through real conversation that one can express their real emotions... Turkle:...
2 Pages(500 words)Essay

Unit 3 Discussion CIS 204

...Computer Case Study Institute Since it is a lunch meeting, I need to be brief. I would ask them about the last time they updated their firewall firmware. I would further like to know how often there is a security breach at this small local company. Knowledge about missing updates on their servers and PCs would be crucial at this point. Before going to the site, I would like to know if they have a secure backup for their data. Since it is a lunch meeting it would be highly improbable for them to be carrying the flowchart or any documentation of their network, but I would still inquire about that. Lastly, I would ask them if they have WEP encryption because this is highly vulnerable to attack. 2. There are many things that can... Case Study...
1 Pages(250 words)Case Study

U1 Discussion

...Cause of IP Address Conflict and its Resolution s Cause of IP Address Conflict and its Resolution As a network administrator, I am tasked with maintaining the computer software and hardware systems which make up the computer network, such as, monitoring and maintaining of either converged infrastructure or active data network, monitoring network traffic, testing the network for weakness, and installing and implementing security programs (Bautts, Dawson, & Purdy, 2010). The Dynamic Host Configuration Protocol (DHCP) is a network protocol which enables the server to assign automatically an IP address to a computer from a definite scope configured from a certain network. The DCHP allows the network administrator to supervise... of IP Address...
1 Pages(250 words)Coursework

CIS 206 Research Assigment

...File system interaction in a UNIX Environment The file system interaction in the Unix Environment is crucial. Unix allows users to have a compromise system functionally in which the kernel, the shell, and file system. Rachel (2003)The kernel of the core is critical for organization data and conducting transfers. This is crucial because managing the machine’s memory and allocating to users allows the UNIX to be proactive in organizing data. As a user, it is imperative to enforce these access permissions. The popularity of UNIX has been growing steadily and has been used by many organizations. Rachel (2003)As a matter of fact, the article is keen on the fact that many accomplished technical professional with experience in in e... system...
1 Pages(250 words)Essay

CIS 206 U1 Review Assigment

...Computer Sciences and Information Technology Reasons why Linux is Popular Linux is popular because it has unique, as well as powerful features. It can work as a control program for computers. In addition, it is a well-orchestrated family of utility programs and a set of tools, which allow users to connect and use its utilities to build systems and applications (Sobell, 2012). Linux is popular in academia as students can easily understand it. It supports several codes and a rich software development environment. The development of Linux from the time it was UNIX took the effort of universities took the efforts of university and college students to publicize it. Linux also offers more flexible and configuration options... Sciences and...
1 Pages(250 words)Coursework

CIS U2 206 Research Assigment

...CIS U2 206 Research Assignment CIS U2 206 Research Assignment Chad Perrin’s article “Understand basic Unix file permissions” explores the configuration of users, groups, and file or directory permissions in UNIX in an instructive manner. Perrin’s main argument is that one can use the regular file authorization framework for UNIX to improve primary data security (Perrin, 2009). A section of this framework comprises three groups of entities that one can either allow or deny each of them particular authorizations. The entities are owner, group, and world. The owner entity is when every file and its path has an “owner.” The group entity is when one affiliates every file with...
1 Pages(250 words)Coursework

CIS212 U1 Discussion

...Security Management Process Insert Insert Security management entails ensuring that the integrity, confidence and consistency in theavailability of services and data in an organization. It is inclusive of how the security controls are. It has to be in a manner that advances the security and integrity of the data in the organization. It also ensures that users are not services that should be available at all times. Testing will ensure a smooth operation and prevent attacks that take advantage of obsolete concepts. Further, management of intrusions is crucial (Poulsen & LaPage, 2011). The mission is to identify and counter attacks. These should level to a situation that is accommodating to the organization at least. The preceding... Management...
1 Pages(250 words)Essay

CIS126 U1 Discussion 2 - 1

...The Dark Side of Object Technology Insert Insert Object technology became prevalent in industrial languages as from 80’s but became established in other languages like Java and UML in the 90s. The evolving nature of Object Technology has caused many companies to reexamine their legacy codes to ensure that it matches it. The progress and acceptability of Object Technology have been growing significantly in the market. In the recent years, some languages like C++ and Java have considerably advanced in the use of Object Technology. Despite the many benefits that object technology poses, its weaknesses include them being complex legacies that scare its owners. The latter has made timely delivery a complicated process. TDD... Dark Side of Object...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic CIS 206 U1 Discussion for FREE!

Contact Us