Web Based Operating Systems

In: Computers and Technology

Submitted By dgonzales
Words 1086
Pages 5
Web Based Operating Systems
David Gonzales
POS/355 Instructor John Buono
June 18th, 2012

WebOS systems are operating systems that are scaled for internet computing (R. MacManus, May 11, 2006). There are many types of Web Operating Systems and the terminology can seem a bit fuzzy from a metacomputing standpoint. But with the growth of the internet so too has the term WebOS become serious in the ranks of computing systems. There have been many attempts to hoard market share on Web Operating Systems like Microsofts Windows 2003 Server Web Edition (Pingdom, 2011). But basically WebOS Servers are common operating systems serving the public over the internet. Most of these are server editions vary among todays popular operating systems like Windows, Linux, MAC, and UNIX. An additional platform is usually common to layer on top of these operating systems and these come in various flavors as well depending on the function of the website. This paper will target the popular server operating systems that are common on the internet today with emphasis on why these systems are popular and some of the features these systems offer as systems suitable for internet servers. Windows Servers Without question Microsoft Windows bases servers are among the most popular servers on the internet today. Need proof? Just look for the .htm extention at the end of the URL and you will find that most websites are easily identifiable as a Windows based server (J. Kyrnin, About.com). Windows based servers are popular operating systems in general because they offer a wide variety of popular system platforms that are also commonly used on the web today such as Microsoft Hyper-V, Microsoft SQL Server, Microsoft Exchange, Microsoft SharePoint, and Microsoft even offers a web server platform customized for content management with (MCMS) Microsoft Content Management Server (MSDN,…...

Similar Documents

Operating Systems

...Operating systems What an operating system does The operating system is software, an operating system makes a computer come alive. When a computer is first built it is effectively cut-off from the world as it cannot receive input or provide output. Without an operating system a computer cannot work efficiently. The operating system has three main tasks to do:  Manage the computer resources: Input and output functions of the computer are controlled by the operating system. The operating system has to manage the CPU, how memory is allocation , access to disk drives, and many other tasks.  Interact with the user: All computers need someone to interact with it, to control it . It is the operating system's task to provide a means of doing this which is easy, consistent, flexible and structured. An operating system also allows the user of the computer to make changes as well.  Run applications: Application packages, such as word processors or spreadsheets, are what most users use on their computers, for most it is essential for their daily use of computers . The operating system provides a means of executing them, and provides the programs with tools and services. These include commands from retrieving data from a hard disk, or even to send data to a printer. LINUX The history of Linux began in 1991 with the commencement of a personal project by a student who was called Linus Torvalds. He studied at the University or Helsinki and this is where he created......

Words: 293 - Pages: 2

Operating System

...Khajeh-Hosseini, 2009). As experienced by large or small companies while adopting cloud computing technology, the issues can be outlined as security, privacy, data migration as (Hosseini, et al., 2010 ). Adoption of cloud technology by enterprises especially those are using KBE (knowledge based engineering) systems are in risk in terms of migration their data over the cloud. Most enterprises are in a midst of creating, sharing, streaming and storing data in digital formats to allow collaboration , hence there is a need to continuously managed and protect the data to ensure its value and authenticity (Yale &ump; Chow, 2011). Enterprises now acquire increasingly more information about their products, customers and partners- whether it’s stored in a cloud environment or not and failure to protect this data can be damaging. Partners and clients anticipate their information will be constantly protected before conducting business with a company. Within lay the need for complete data governance to manage and protect crucial data, which has become a key issue for the cloud (Yale, 2011). The literature review aims to address the adoption of cloud computing within enterprises those are using KBE systems and how this adoption of cloud will affect their data governance strategies by drawing findings from different practices and other studies. The report will highlight importance of cloud computing in enterprises and address the state of cloud data governance importance within......

Words: 2090 - Pages: 9

Operating Systems

...MODERN OPERATING SYSTEMS SECOND EDITION by Andrew S. Tanenbaum Publisher: Prentice Hall PTR ISBN 0-13-031358-0, 976 pages Table of Contents About the Author MODERN OPERATING SYSTEMS PREFACE 1 INTRODUCTION 1.1 WHAT IS AN OPERATING SYSTEM? 1.1.1 The Operating System as an Extended Machine 1.1.2 The Operating System as a Resource Manager 1.2 HISTORY OF OPERATING SYSTEMS 1.2.1 The First Generation (1945-55) Vacuum Tubes and Plugboards 1.2.2 The Second Generation (1955-65) Transistors and Batch Systems 1.2.3 The Third Generation (1965-1980) ICs and Multiprogramming 1.2.4 The Fourth Generation (1980-Present) Personal Computers 1.2.5 Ontogeny Recapitulates Phytogeny 1.3 THE OPERATING SYSTEM ZOO 1.3.1 Mainframe Operating Systems 1.3.2 Server Operating Systems 1.3.3 Multiprocessor Operating Systems 1.3.4 Personal Computer Operating Systems 1.3.5 Real-Time Operating Systems 1.3.6 Embedded Operating Systems 1.3.7 Smart Card Operating Systems 1.4 COMPUTER HARDWARE REVIEW 1.4.1 Processors 1.4.2 Memory 1.4.3 I/O Devices 1.4.4 Buses 1.5 OPERATING SYSTEM CONCEPTS 1.5.1 Processes 1.5.3 Memory Management 1.5.4 Input/Output 1.5.5 Files 1.5.6 Security 1.5.8 Recycling of Concepts 1.6 SYSTEM CALLS 1.6.1 System Calls for Process Management 1.6.2 System Calls for File Management 1.6.3 System Calls for Directory Management 1.6.4 Miscellaneous System Calls 1.6.5 The Windows Win32 API 1.7 OPERATING SYSTEM STRUCTURE 1.7.1 Monolithic Systems 1.7.2 Layered Systems 1.7.3 Virtual Machines......

Words: 387392 - Pages: 1550

Web Based Systems

...INF 630: Systems Analysis Web-based Systems In an electronic age where paper forms are becoming obsolete and electronic forms are becoming the best method for gathering, maintaining, and storing information; it is time for the regional offices of Langmade Corporation to make the switch. Time is money, and too much time is wasted filling out sales reports, only to be mailed where added delays are incurred. If the company switches to an electronic sales report that can be submitted either online or through email, not only will the organization save money from reduced paper expenses, employee time, or stamps, but the organization will also increase its efficiency. After comparing three web-based systems submitted by candidates, it will be found that the second candidate solution is the most economically feasible for the organization. Information and Criterion “The return-on-investment (ROI) analysis technique compares the lifetime profitability of alternative solutions or projects” (Whitten & Bentley, 2007, p. 425). While designing a web-based system, the company seeks to choose the candidate solution the solution that will offer the most benefits for the investment that will be made. It is important to note that each solution presented has been time-adjusted over the projected five-year lifetime of each alternative. This is done so the results do not appear more attractive than they actually are (Whitten & Bentley, 2007). The company......

Words: 911 - Pages: 4

Operating System

...Paper: Open Source Operating Systems Linux is one of the modern, free open source operating system provides speed, performance, stability, and reliability comparable to commercial operating systems. Kernel performance, System libraries and System utilities added by Linux open source development community, licensing and compatibility across distributions made Linux successful. (Silberschatz, Galvin, Gagne Wiley & Sons, 2011, page.38) Kernel Performance: The core Linux operating-system kernel is entirely original and implemented as a traditional monolithic kernel for performance reasons. Kernel design is modular enough to allow most drivers to be dynamically loaded and unloaded at run time. The initial kernel does not have networking support, limited device driver’s support and basic virtual memory system included. Kernel is evolved with time by supporting technologies like improved TCP/IP performance, ISDN. Latest kernel supports remotely mount / un-mount volumes, internal kernel threads, loadable modules, automatic loading modules on demand, dynamic kernel configuration at run time, symmetric multiprocessors, and journal file systems. Kernel mode allows a process to be pre-empted while running. (Silberschatz, Galvin, Gagne Wiley & Sons, 2011, page.802) The Linux System: The kernel forms only the core operating system. Kernel is responsible of maintaining all important abstractions of the operating systems including virtual memory and processes. System libraries......

Words: 1110 - Pages: 5

Web Based Hotel Management System

...on room management, guest management and reservation 1.2 Statement of the Problem According to Frederick W. Daily, one of the initial decision to be made is how the records of the company are to be managed and kept accurately to ensure the success of the business (choosing the right business record-keeping system, n.d., para1). In the Covenant University Guest house, client information, registration, room details, billing records are all kept and managed manually. This type of record keeping leads to high rise in paper work which then leads to slow data exchange, scattered client data and difficulty in data storage and retrieval hence making the system time consuming [1]. 1.3 Significance of project The main purpose of this work is to reduce data duplication and data inaccuracy, hence reducing the paper work, minimal redundancy and increase in speed and ease of access to information * It also demonstrates how information technology can be used to improve performance levels of employees * It also validates the debate supporting E-reocord-keeping of manual record-keeping. 1.4 Aim The aim of the project is to design and develop a web-based data management system for hotels and guest houses to solve the setbacks of data access difficulties, duplicated information and data insecurity that many face today due to manual data collation. This will result in reduced paper files and easy access to useful information by automating the client services, postings of......

Words: 5965 - Pages: 24

Operating Systems

...DENIS In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in various security problems. What are two such problems? A time sharing environment or multi programming is one in which a computer system provides direct communication between the user and the system. It allows many users to share the computer at the same time. One of the problems that may result from the fact that resources are being shared is information theft, this is because all the users are able to access the files that are being shared on the system and so one can easily copy a file and modify it without the knowledge of all the other parties. Such scenarios can result into loss of security confidentiality and integrity since the owner of a file Without being aware of the system used as time-sharing and multiprogramming, may insert or have a secret or confidential data that he wants to remain at the file and also other users may change, add, or even remove some information in the file if they want to, since they have access to all files running on the system The other problem resulting from using such systems is the fact that there could be loss of storage space. Since users have equal privileges to create and access files on the system, then there could be a possibility that the users will create numerous files and eat up the storage space on the system without the other users’ knowledge, so as time goes by, each user will......

Words: 1053 - Pages: 5

Operating Systems

...Operating Systems Christy Kegley IT/282 3/2/2014 Carlton Foster Operating Systems * Provide a brief history of three operating systems. The top three operating systems are; Windows XP, Windows Vista, and Linux. “Windows XP is the first Windows OS to allow multiple users to log on simultaneously to the OS, each with their own applications open. Although Windows XP was first released with some bugs, the second service pack (Service Pack 2) resolved most of these problems. XP underwent three service packs. It is an extremely stable OS and was popular in both the home and corporate markets” (Guide to Managing and Maintaining Your PC, Eighth Edition, Andrews, pg. 1116). This programs allows users to do many things that others might not allow like older versions of Windows. Windows Vista is the newest version of Windows. This program is not very popular with some people because there is a lack of compatibility with other programs, also it slows performance. “The first problem is partly caused by hardware manufacturers not providing Vista drivers for their devices that were originally sold with XP drivers. The second problem means that many low end desktop and laptop computers can’t run Vista. And the slow performance of Vista is partly due to the many unnecessary features (fluff) it offers; these features weigh heavy on system resources. Vista comes in five versions: Windows Vista Home Basic, Home Premium, Business, Enterprise, and Ultimate. (Vista......

Words: 764 - Pages: 4

Operating Systems

...Operating Systems’ Differences There are three operating systems, Windows, Linux, and Mac OS. The purpose of the operating system as defined in (dictionary.com) is the collection of software that directs a computer’s operations, controlling and scheduling the execution of other programs, managing storage, input/output, and communication resources. Its abbreviation is OS. Mac OS used by Apple on Macintosh computers is used by 10% of Americans. It uses a GUI (graphical user interface) that is run by a keyboard and mouse. But is not a PC and is not compatible with PC hardware. Previously, it ran on a Motorola processor but its successors run on an Intel platform. Mac OS is a favorite of graphic artist, musicians, and multi-media designers. It uses a point release system. It uses Safari and Mozilla Firefox for internet connection. Mac OS has a specialized version of the program developed for the iphone and ipod. Linux operating system is similar to Unix in design but is meant to be run on PC’s, gaming consoles, DVR’s, and mobile phones. 1 to 2 % of the U.S. population use Linux on personal computers. It was written by Linus Torvalds and can be freely downloaded by anyone. Several companies distribute their own versions of Linux called Ubuntu, SuSE, Red Hat, and Knoppix. Linux’s GUI runs on top of the system, free of open software. ......

Words: 730 - Pages: 3

Web - Based Information System

...UNIVERSIty OF GHANA BUISINESS SCHOOL Write a Case Study report on the use of web-based information systems by an organization in Ghana UNIVERSIty OF GHANA BUISINESS SCHOOL Write a Case Study report on the use of web-based information systems by an organization in Ghana Index No: 10508454 Table of Contents Background 2 Information Systems 2 Web-based Information Systems 3 Health Information Systems 3 Types of Health Information System 5 Components and Functions of Health Information System 6 Brief Overview of the Health Care System in Ghana 7 Context of Study 8 Vision and Mission 9 Core Objectives 9 Benefits of web – based health information system 9 Barriers to web – based Health Information System 11 References 13 Background For the thriving nature of every business setting, whether for-profit or not-for-profit, but also for long term survival, there is a need for the adoption of proper information dissemination and sharing systems in real time to the benefit of all stakeholders in the organization. In times past, most businesses operated with less or no importance attached to how data and information about their businesses are handled, oblivious of its subsequent consequences to the organization. Currently, in the midst of a swiftly moving landscape in technology, coupled with transient business innovations that seek to maximize both short-term and long-term profits as well as benefits; that......

Words: 3411 - Pages: 14

Operating Systems

...Operating Systems Vulnerabilities NAME POS 355 18 Mar 15 Carol Eichling Operating Systems Vulnerabilities As the reported number of security vulnerabilities continued to spike in the 20th century let us define a security flaw. A security flaw according to "Apple Security Flaw: What You Need To Know" (2014), "The flaw is in the way the operating system provides the essential services, known as secure sockets layer (SSL) or transport layer security (TLS). These two layers of security allow information to be transmitted worry-free between browsers and web servers, or between a mail server and mail client. SSL is in the form of encryption, which scrambles data sent over a network to keep it private. The second layer involves verification that the server is authentic." With the heighten computer security regarding vulnerabilities, the increase of user awareness and training users to not click on particular links is difficult yet feasible. Although most operating system has computer security protection, the tasks of protecting the systems from vulnerabilities are a daunting task because the operating systems are unique. Security flaw in Microsoft and Mac OS X® A known security flaw in Windows is called the Freak. The Freak security flaw allowed hackers to create a simulated middle person attacks on the encrypted secure sockets layer and transport layer of a security connections. It was discovered that hackers could force websites to weaken the system......

Words: 843 - Pages: 4

A Case Study of the Web-Based Information Systems Development.

...three years the focus of the information technology industry has moved towards development for the World Wide Web (WWW). Information systems using WWW technology, delivered by an Intranet or via the Internet, are now prevalent throughout New Zealand and overseas. Within New Zealand, a wide variety of organisations are deploying information systems onto the WWW, including banks, government departments and other service providers. They are using the WWW as a strategic business tool, supporting their existing operations or providing a low-cost solution for delivering a new product or service line. 1.1 Proposition and Aims There is an abundance of information on the graphical and user interface aspects of WWW site design. In addition, a large body of knowledge has been developed in the area of software development methodologies. However, there has been very little research conducted to examine if these existing research methodologies are applicable to the information systems developed for the WWW. The WWW is a technologically dynamic environment, and presents new challenges for developers. In order to address the emerging WWW environment, a number of researchers have proposed software development methodologies specifically for the WWW. Consequently, the aim of this research was to investigate how organisations are currently developing WWW-based information systems, and the reasons why those methods are being used. This examination is important because, as the......

Words: 1709 - Pages: 7

Analysis of Web Based Malware

...The Ghost In The Browser Analysis of Web-based Malware Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu Google, Inc. {niels, deanm, panayiotis, kewang, ngm}@google.com Abstract As more users are connected to the Internet and conduct their daily activities electronically, computer users have become the target of an underground economy that infects hosts with malware or adware for financial gain. Unfortunately, even a single visit to an infected web site enables the attacker to detect vulnerabilities in the user’s applications and force the download a multitude of malware binaries. Frequently, this malware allows the adversary to gain full control of the compromised systems leading to the ex-filtration of sensitive information or installation of utilities that facilitate remote control of the host. We believe that such behavior is similar to our traditional understanding of botnets. However, the main difference is that web-based malware infections are pull-based and that the resulting command feedback loop is looser. To characterize the nature of this rising thread, we identify the four prevalent mechanisms used to inject malicious content on popular web sites: web server security, user contributed content, advertising and third-party widgets. For each of these areas, we present examples of abuse found on the Internet. Our aim is to present the state of malware on the Web and emphasize the importance of this rising threat. ...

Words: 8266 - Pages: 34

Operating System

...Intercontinental University * Leonel A Silvestre * ITCO211 * File System Hi As your help desk technician I will do everything we can to help you with the operating system problem. Everybody knows what is a Hard Disk or Hard Drive let me refresh your mind, with a simple explanation: Hard Disk/ Drive, is a device for storing and retrieving digital information, primarily computer data. It consists of one or more rigid rapidly rotating discs (platters) coated with magnetic material, and with magnetic heads arranged to write data to the surfaces and read it from them. With that been said, now move forward with Operating System and Hard Disk/ Drive. I would like to recommend you the best operating system is DOS (Disk Operating System), why? Because has everything you need. Let me tell you a little more about DOS. Disk Operating System: Most often abbreviated as DOS, refer to operating system software used in most computers that provides the abstraction and management of secondary storage devices and the information on them (e.g., file systems for organizing files of all sorts). Such software is referred to as a disk operating system when the storage devices it manages are made of rotating platters, such as floppy disks or hard disks. In the early days of microcomputers, computer memory space was often limited, so the disk operating system was an extension of the operating system. This component was only loaded if needed. Otherwise, disk access......

Words: 1780 - Pages: 8

Operating System

...The Amoeba Distributed Operating System 1. INTRODUCTION Roughly speaking, we can divide the history of modern computing into the following eras: 1970s: Timesharing (1 computer with many users) 1980s: Personal computing (1 computer per user) 1990s: Parallel computing (many computers per user) Until about 1980, computers were huge, expensive, and located in computer centers. Most organizations had a single large machine. In the 1980s, prices came down to the point where each user could have his or her own personal computer or workstation. These machines were often networked together, so that users could do remote logins on other people’s computers or share files in various (often ad hoc) ways. Nowadays some systems have many processors per user, either in the form of a parallel computer or a large collection of CPUs shared by a small user community. Such systems are usually called parallel or distributed computer systems. This development raises the question of what kind of software will be needed for these new systems. To answer this question, a group under the direction of Prof. Andrew S. Tanenbaum at the Vrije Universiteit (VU) in Amsterdam (The Netherlands) has been doing research since 1980 in the area of distributed computer systems. This research, partly done in cooperation with the Centrum voor Wiskunde en Informatica (CWI), has resulted in the development of a new distributed operating system, called Amoeba, designed for an environment......

Words: 4509 - Pages: 19

6.4 Bean (1997) | WATCH NOW! | Faux Fur HOT