StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Historical Information for Midrange Computers - Thesis Example

Cite this document
Summary
This technology emerged in the late 1960s and then the midrange computers were known as minicomputers. Noted midrange computer ranges…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Historical Information for Midrange Computers
Read Text Preview

Extract of sample "Historical Information for Midrange Computers"

The paper "Historical Information for Midrange Computers" is a delightful example of a thesis on information technology. Midrange computers (also called midrange systems) are a category of computers that fall between the microcomputers and the mainframe computers. This technology emerged in the late 1960s and then the midrange computers were known as minicomputers. Noted midrange computer ranges were produced by IBM, HP, Sun Microsystems, etc. The 1980s have witnessed the fierce competition between INM and Digital Equipment in this segment.

However, by 1998, IBM again emerged as the major producer of the midrange systems. By the year 2002, client-server platforms and midrange computers almost mingled together technology-wise and expanded the sphere of enterprise spanning storage management. In the contemporary business environment, midrange systems are being used for electronic data interchange, B2B communication, and customer relationship management. These systems are becoming increasingly popular. (Datalink, 2007; Rojas, 2001) Client-Server Architecture Midrange computers have been increasingly incorporated in the client-server architecture, which involves synchronized programs in an IT application.

The server provides a service to one or more clients that send requests for it. Midrange computers are thus enabled with database access, web access, email exchange, etc., which are based on this architecture. (Berson, 1996)Shared Resources In the client-server model, the clients share the resources like database, hardware, applications, etc. through a server. Network computing is an apt example of utilizing shared resources. (Berson, 1996)Advantages and Disadvantages Advantages include the distribution of responsibilities and roles in a computer system through numerous independent computers, which facilitates decentralization, redundancy, etc.

Replacement, repairing, upgrading, and relocating the components of such systems are easier. Disadvantages include server overload and the risk of network intrusion. If the server is down, the whole system is down.Peer-to-Peer Structure This system uses distributive application architecture. The member computers of such a system (or network) are equally powerful. (Subramanian and Goodman, 2005)Shared Systems Shared systems in a peer-to-peer structure facilitate file and application sharing without the requirement of central coordination.

Peers are consumers as well as suppliers of the resources. (Subramanian and Goodman, 2005)Advantages and Disadvantages Advantages include higher computing power, storage space, and bandwidth. Distributive architecture makes the system robust. However, this system lacks effective mechanisms for file security. If a malicious code enters the system through a network node, the entire network may shatter down.Security/Risk with regards to Midrange Technology Privacy: Since midrange technology is primarily client-server model-based, privacy can be ensured by implementing appropriate security policies through the central server.

(Newman, 2010; Berson, 1996) Disclosure of Data: Information in storage or during transmission through network resources may be disclosed by hacking, spyware, etc. Encryption can be used to solve this problem. (Newman, 2010) Data Access: Technologies like SQL, XML, Web Services, etc. can be used in the midrange computers to facilitate data access secure. (Newman, 2010) Secure Data Deletion: This is a general issue in the context of computers. Hard disc shredding and multiple overwrites are suggestible in this regard.

(University of Pennsylvania, 2011) Key Management: Midrange computer system can provide a secure encryption method through a central server along with effective public and private key management. (Ryabko and Fianov, 2005) Audit Rights: Audit rights can be implemented to midrange computing, which will enhance security through account management, system events tracking, recording logins and logoffs, etc. A Windows 2000 (or later version) environment is particularly helpful in this regard. (Robichaux, 2000)Security Protection Government regulation/policies and privacy protection play a key role in the implementation and security of midrange computing since this sort of technology is exposed to the public network.

“The E-Government Act [Public Law 107-347] passed by the 107th Congress and signed into law by the President on December 2002 recognized the importance of information security to the economic and national security interests of the United States” (HG.org-HGExperts.com, 2011). This sort of regulations covers midrange computing as well since midrange computing has extensive use in eCommerce, higher education, research, etc. In the context of e-commerce, it should be further mentioned that on 30th June 2000, President Bill Clinton signed the Electronic Signatures in Global and National Commerce Act (ESIGN) using his own electronic signature ID, and established the validity of electronic signatures in relation to international and interstate commerce (HG.

org-HGExperts.com, 2011). This legislation adds security to midrange computing at the levels of Point of Sales, electronic fund transfer, etc. Moreover, Health Insurance Portability and Accountability Act 1996, Electronic Communication Privacy Act 1986, Health Information Technology Act 2009, etc. are important regulations, which ensure protection and integrity of the computer systems in general. (Newman, 2010).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Historical Information for Midrange Computers Thesis - 1, n.d.)
Historical Information for Midrange Computers Thesis - 1. https://studentshare.org/information-technology/1753142-historical-information-for-midrange-computers
(Historical Information for Midrange Computers Thesis - 1)
Historical Information for Midrange Computers Thesis - 1. https://studentshare.org/information-technology/1753142-historical-information-for-midrange-computers.
“Historical Information for Midrange Computers Thesis - 1”. https://studentshare.org/information-technology/1753142-historical-information-for-midrange-computers.
  • Cited: 0 times

CHECK THESE SAMPLES OF Historical Information for Midrange Computers

Computers and information processing

The best method of output for handheld computers is flat panel displays because they are thin, light, and power saving (Williams, Sawyer, & Hutchinson, 1997).... A Practical Introduction to computers & Communications.... Optical mark recognition technology scans the printed questionnaire, detects the presence of marks, and transfers this information to the processor (MB Imaging, 2006)....
3 Pages (750 words) Essay

The Implementation of Databases in a Business

In the world right now where technology has taken great leaps to reach a height that was never expected the use of computers in every business has almost become a necessity.... hellip; Every organization looks for the best technology that is available to them according to their needs. Organizations have a fight going on in between each other to reach the top and become the best in the business, this is called competition and leads organization to implement a database to give them an edge over their counterparts. Organizations can't survive with working in international markets with out the help of databases and computers....
3 Pages (750 words) Essay

School of Computer and Information Sciences

Like chemistry, computers change the way one view and perceive things.... computers too change the construct and elements of data to different forms and use for different users.... How a few pieces of hardware can modify, develop and present information to the whole world in a different manner is a fascinating phenomenon for me....
3 Pages (750 words) Essay

Data versus information

Modern day computers are referred to as being digital because they can only comprehend data as some… This 1s and 0s are known as binary digits or bits.... Modern day computers are referred to as being digital because they can only comprehend data as some combination of 1s and 0s.... Given that humans find it difficult and time-consuming to work with binary digits, computers are able to store, process and deliver data in various formats that are much easier for humans to comprehend....
1 Pages (250 words) Essay

Dell Inspiron 15R Laptop Description

Computer Technology company provides a variety of computers.... The laptop is unique in nature since it offers the features of… th mid-range and mid-sized computers, it is also flexible and is very efficient for operators who do not need neither a technical powerhouse nor a computer that withholds on the normal basic features.... Computer Technology company provides a variety of computers.... The laptop is unique in nature since it offers the features of both mid-range and mid-sized computers, it is also flexible and is very efficient for operators who do not need neither a technical powerhouse nor a computer that withholds on the normal basic features....
2 Pages (500 words) Essay

Personal computer

The information technology is becoming more and more human and user friendly with the passage of time (Klonoff, 2014).... The time has been constantly remembered when human communities all around the world… However, the induction of Personal Computing, Wireless Communication Devices and Mobiles all took less than ten years each before becoming common in the society (Kurzweil, 2005)....
4 Pages (1000 words) Research Paper

Micro, Midrange and Macroissues: Polifact

om as reporting because they do not provide any new information to their consumers.... Nevertheless, the site can be considered quite objective as they assess information critically and define its reliability.... om as reporting because they do not provide any new information to their consumers.... Nevertheless, the site can be considered quite objective as they asses information critically and define its reliability.... om are aimed to double check the information....
2 Pages (500 words) Assignment

Computer sciences and information technology

According to Rivard (2013), the switch facilitates proper flow of information to an intended device through transmission of a message across the network.... Computer Sciences and information Technology Computer Sciences and information Technology A switch is suitable for use in a situation where a large number of devices connected using a computer network exists.... According to Rivard (2013), the switch facilitates proper flow of information to an intended device through transmission of a message across the network....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us