Nobody downloaded yet

EISA: Client/Server vs. Web-based Approaches - Essay Example

Comments (0) Cite this document
Summary
The General Electric business desires to enhance the corporate working and management of the business by implementing these two technologies. These two network…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
EISA: Client/Server vs. Web-based Approaches
Read TextPreview

Extract of sample
"EISA: Client/Server vs. Web-based Approaches"

Download file to see previous pages Thus, server is free from huge processing, also, there is no need to buy huge server. In this structure client is accountable for the graphical presentation of layer, in addition to things similar to field edits, error handling etc (Zhaao, 2000).
For the business of General Electric the technology of the Client/Server network could also be recognized as the "rich clients," in which they are permitted to have additional complex graphical user interfaces as well as utilize the client-side processing for the business applications. In addition, the DCOM, COM, and Active X allow client-side handling and processing in Microsoft environment (Zhaao, 2000).
The Client/server based network offers the direct manipulation of data, like that dragging and dropping elements, storing data locally and client side-processing. In this way General Electric Corporation does not need to buy so much powerful servers. Since, in working environment the processing load is divided among the network systems and server (Shah, 2009).
In scenario of system costs the client-server technology is offering facilities of upgrades as well as we get concession from the software provider if we want to get the latest features or support (Clouse, 2009).
In case of client/server network system the main problem is that, we need to have a license for each Windows on each PC that needs to run it. This aspect of network technology can be very costly, as well as we have to include disk space and installation scripts etc. This is not essentially an easy step for huge organizations having old PCs. Since, we frequently discover that latest applications with drivers to install create some installation conflicts (Clouse, 2009).
Another main and biggest disadvantage we have is about the limitation of the Client/Server network. The Client/Server network is offering approach and network working services only reach to ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“EISA: Client/Server vs. Web-based Approaches Essay”, n.d.)
EISA: Client/Server vs. Web-based Approaches Essay. Retrieved from https://studentshare.org/miscellaneous/1564280-eisa-clientserver-vs-web-based-approaches
(EISA: Client/Server Vs. Web-Based Approaches Essay)
EISA: Client/Server Vs. Web-Based Approaches Essay. https://studentshare.org/miscellaneous/1564280-eisa-clientserver-vs-web-based-approaches.
“EISA: Client/Server Vs. Web-Based Approaches Essay”, n.d. https://studentshare.org/miscellaneous/1564280-eisa-clientserver-vs-web-based-approaches.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Client/Server Networking Technologies
...infrastructures (ZDNet.com). 3-tier with application server This architecture allows the main body of an application to run on a shared host instead on running on the machine which is already overloaded due to its minimal resources. The application server shares the sections of the business logic, computational and data retrieval engine. The good thing about this architecture is the fact that applications are scalable compared to 3-tier with message server. Furthermore, the installation costs are less on a single server compared to a situation where maintenance is done on each of the client machines (ZDNet.com). Multi-tiered architecture In the above...
3 Pages(750 words)Term Paper
EISA: Client/Server vs. Web-based Approaches
...? Client/Server vs. Web Based Approach al Affiliation) There are two options when it comes to software that manages information. Client-server and web-based known as hosted typically reside soon an external application service provider network. For light walker Limited (Ltd) to install either of the software options, they need to analyze what advantages and disadvantages either application will bring. (De Heuvel, 2009) Introduction Most companies opt to use the client-server based architecture in their organization, because it is what is commonly used. The web-based architecture however, is still new, and most organizations are choosing to invest in this architecture. The scope of this paper is investigating the advantages... and...
4 Pages(1000 words)Research Paper
Selection of Web Server Software for Client
...Services, Active Server Pages and SQL Server (Microsoft Products) 2) – Apache, PHP and MySQL It is to be noted here that that both sets have a web server, a web programming language and a database. We should now just compare these technologies individually in detail and then in the subsequent sections, we will relate our results with the available IT infrastructure of the client. 2.1 - Web Servers The function of web server is to deliver services (web content) to the users who are requesting access via Hyper Text Transfer Protocol. The HTTP protocol is...
5 Pages(1250 words)Essay
Web Server Application Attacks
...? Web Server Application Attacks Reg Submitted Web Server Application Attacks Part 1 Common Web Application Attacks and their Control 1. SQL Injection Vulnerabilities In this type of web application attack, malicious SQL queries execute unexpected actions through web applications, and disturb the back-end of the web application. To prevent this attack, user input in web application must always be validated before sending to the web server for action. This keeps the web application safe from malicious user inputs. 2. Session Security Vulnerabilities When session ID’s are sequential and persistent or when session tokens are not protected, one user may access another user’s data through assuming the other user’s identity. To mitigate... this,...
3 Pages(750 words)Assignment
Embedded Web Server
...Table of contents Introduction to Web Server (a) Aims and objectives 2. Required Equipments 3. Main component (a) Printed circuit board (b) Construction of a printed circuit board (c) Features of a printed circuit board 4. Problem Analysis and Solutions (a) The process of testing printed circuit board (b) Safety measures to be employed (c) Protection and packaging process (d) Peculiarities in a PIC WEB PCB (e) Testing of PIC boards 5. Uploading of web pages 6. Result 7. Conclusion 8. Reference sources 1. Introduction to Web Server: Web...
14 Pages(3500 words)Essay
Client/Server Architectures
...the company, which was based in Germany. However, today there are dozens of subsidiaries which have been acquired one way or another. KEY ISSUES Banks must provide a consistent customer experience across multiple distribution channels under demanding time-to-market, data distribution, and product quality conditions. This was a prime consideration when Allianz began acquiring very valuable financial instruments, which were important for its distribution of insurance and fiduciary plans. It is not unusual for IT spending to consume 15–20% of total operating costs, and these often grow after the acquisition as new uses for advanced technology are developed. Paying close attention to systems analysis is key to keeping costs...
3 Pages(750 words)Essay
Web Server Hacking
...whatsoever. A send mail attack involves a lot of messages being sent in a short period. Other attacks on web server are SQL injection, Bruce force attacks and cross-site scripting. Cross-site scripting is a major problem on websites since a vast majority of websites are vulnerable (Leyden, 2002). An arbitrary code on either the server or the client is run. The input strings, in either such boxes or forms, may not be properly sanitized so they can remove illegal characters. The non- sanitized string can escape the code of the form hence execute its own code that is hosted on another site and in this way the client’s machine will be exploited. SQL...
8 Pages(2000 words)Research Paper
Client/Server Computing
...operations. For example, we assume a sign-on service that is centralized and activates a client application for authentication for a single time. Next, the provided user / password will be granted access to required web services. Conversely, for signing off from the application, only single operation will fulfill this task, irrespective to logged on to different web services. Moreover, security issues must be considered for authentication procedures such as XML encryption and XML digital signatures that may provide high assurance of security. In summary, WS coordination is comprehensive enough to revolutionize as a standard on the Internet for activity synchronization. Moreover, WS...
2 Pages(500 words)Assignment
EISA: Client/Server vs. Web-based Approaches
...Client/Server vs. Web-based Approaches Introduction: Organizations have had to struggle with the decision of choosing the type of implementation for their enterprise systems for quite some time now. This is generally because conflicting ideas and requirements emerge from the different disciplines that are required to tackle this i.e. IT and engineering. The organizations have had to make tradeoffs in terms of cost, functionality, simplicity in deployment, usability and long-term support (Goodyear, 2000). This paper looks into factors that are considered in deciding the implementation method for an enterprise system. Several issues should...
4 Pages(1000 words)Essay
EISA: Software Components -- Diagram for a Client/Server Approach
...Client/server implementation at Intel Corp Number: Lecturer: One of the business processes in Intel Corporation that I would liketo evaluate is that of the finance. The financing process is important to any organization and should be handled well. The client is the object which requests for services while the server is the object which provides the services that have been requested by the client. The resources of the computer acting for both must be high (Orfali, Dan, & JeriM 2006). The diagram below shows a visual representation of this structure. The server that the client machines will be accessing is an ERP...
1 Pages(250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic EISA: Client/Server vs. Web-based Approaches for FREE!
Contact Us