StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

EISA: Client/Server vs. Web-based Approaches - Essay Example

Cite this document
Summary
The General Electric business desires to enhance the corporate working and management of the business by implementing these two technologies. These two network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
EISA: Client/Server vs. Web-based Approaches
Read Text Preview

Extract of sample "EISA: Client/Server vs. Web-based Approaches"

Download file to see previous pages

Thus, server is free from huge processing, also, there is no need to buy huge server. In this structure client is accountable for the graphical presentation of layer, in addition to things similar to field edits, error handling etc (Zhaao, 2000). For the business of General Electric the technology of the Client/Server network could also be recognized as the "rich clients," in which they are permitted to have additional complex graphical user interfaces as well as utilize the client-side processing for the business applications.

In addition, the DCOM, COM, and Active X allow client-side handling and processing in Microsoft environment (Zhaao, 2000). The Client/server based network offers the direct manipulation of data, like that dragging and dropping elements, storing data locally and client side-processing. In this way General Electric Corporation does not need to buy so much powerful servers. Since, in working environment the processing load is divided among the network systems and server (Shah, 2009). In scenario of system costs the client-server technology is offering facilities of upgrades as well as we get concession from the software provider if we want to get the latest features or support (Clouse, 2009).

In case of client/server network system the main problem is that, we need to have a license for each Windows on each PC that needs to run it. This aspect of network technology can be very costly, as well as we have to include disk space and installation scripts etc. This is not essentially an easy step for huge organizations having old PCs. Since, we frequently discover that latest applications with drivers to install create some installation conflicts (Clouse, 2009). Another main and biggest disadvantage we have is about the limitation of the Client/Server network.

The Client/Server network is offering approach and network working services only reach to

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“EISA: Client/Server vs. Web-based Approaches Essay”, n.d.)
EISA: Client/Server vs. Web-based Approaches Essay. Retrieved from https://studentshare.org/miscellaneous/1564280-eisa-clientserver-vs-web-based-approaches
(EISA: Client/Server Vs. Web-Based Approaches Essay)
EISA: Client/Server Vs. Web-Based Approaches Essay. https://studentshare.org/miscellaneous/1564280-eisa-clientserver-vs-web-based-approaches.
“EISA: Client/Server Vs. Web-Based Approaches Essay”, n.d. https://studentshare.org/miscellaneous/1564280-eisa-clientserver-vs-web-based-approaches.
  • Cited: 0 times

CHECK THESE SAMPLES OF EISA: Client/Server vs. Web-based Approaches

Definition and Application of iAM

Name: Instructor: Course: Date: Presentation of the Project Definition and Application of iAM iAM application in a brief is mobile application installed on Smartphones that support NFC (Near Field Communication) technology and helps in the authentication of the users.... hellip; Since the development of this technology, there are a lot of benefits which the end user have enjoyed as its applicability is not limited to certain stages but is generally applied....
27 Pages (6750 words) Essay

Global Business Vodafone in Emerging Regions Thailand

Vodafone in Thailand Table of Contents Vodafone in Thailand 1 Introduction 3 The Strategy of Vodafone 5 Thailand – from market point of view 6 Market Challenges 7 Market Opportunities 8 Market Entry Strategy 8 Establishing an Office 8 Franchising 9 Direct Marketing 10 Joint Ventures/Licensing 11 Selling Factors/Techniques 12 Electronic Commerce 13 Trade Promotion and Advertising 13 Conclusion 15 References 15 Introduction Vodafone has progressed beyond anyone's expectations since making the first ever mobile bring in the on 1 January 1985....
14 Pages (3500 words) Essay

Toward a Behavioral Theory of Charismatic Leadership in Organizational Settings

CEA has been passing through a changing business environment that has generated several variables that need immediate attention so as to minimize risks .... change management strategy has been in place at CEA and it has the central focus on costs reduction and improving the… This strategy has been knitted well with the organization structure of the CEA; however elements of employee empowerment, employee motivation and knowledge management have not been explicitly stated in such a strategy....
12 Pages (3000 words) Essay

Marketing, Strategy, and Enterprise for Saxon Plumbing Services London, Ltd

What is the suitable way of promoting the business, and the options available to the brothers with regards to organizing the sales force, and which method is most appropriate?... 5 b.... .... Both Peter and Harvey… Discuss to what tourism and sustainability development variables are likely to be important for SPSL when establishing their new office in Manchester....
10 Pages (2500 words) Essay

Web Server Application Attacks

Examples of such approaches would be to hire web application developers with proper knowledge on use of more sophisticated database capabilities like stored procedures to reside in the back end database system or the concept of data objects when writing APIs to access the database system that supports the web utilities.... Such an attack could target the web server or the network utilities that support it with the intention of hindering or denying legitimate users from leveraging the web server services. One mitigation… Some of the particular methods to accomplish this would be to set a limit on the level of hard drive space designated for uploads and installation of web A command injection attack refers to an attack aimed at compromising the sensitive information featured in the back end database that supports the interactive aspects of a web application....
4 Pages (1000 words) Research Paper

Database Systems - Akamai Content Distribution Network

Finally, the business approaches used by the corporation responsible for the database system are discussed.... hellip; The Akamai CDN system is a distributed server system with more than 100,000 servers in more than 80 countries all over the world (Akamai.... The paper "Database Systems - Akamai Content Distribution Network" describes the company's system purpose, technical aspects of the system, and a detailed explanation of how the system works, including its input, processing, and output activities, and the costs associated with the system....
11 Pages (2750 words) Case Study

Advanced Manufacturing Approaches

The paper “Advanced Manufacturing approaches” describes the major features of the lean approach to manufacturing and manufacturing measurement.... It is used for increasing the quality of products, cutting production costs and for making quick delivery in it the market....
19 Pages (4750 words) Term Paper

Database Security - Threats and Challenges

In today's world, data is a very valuable asset used by individuals as well as organizations.... This paper is about database securities layers such as database administration, system administration, security office, developers and employees, about the problem of the provenance of data, ownership and IPR....
15 Pages (3750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us