Operating Systems Comparing The MS-DOS, Essay

PAGES
3
WORDS
981
Cite

Configuration of Microsoft Windows in more complex networking environments required an extensive amount of add-in software and programming to ensure all systems could work. Finally the levels of security inherent in the Microsoft Windows operating system continue to be problematic (Bradley, 2009). The Linux and UNIX operating systems are comparable in terms of kernel and memory architectures (MacKinnon, 1999)(Predd, Cass, 2005). There are variations in the pricing models used for selling them, with Linux being open source and offered in a variety of distributions from leading open source providers including Red Hat (Predd, Cass, 2005). Linux has the strengths of being one of the more stable server-based operating systems given the architecture of its kernel and memory allocation algorithms (MacKinnon, 1999). Linux is more affordable than any of the operating systems in this analysis as well given the unique pricing structure of open source software (Predd, Cass, 2005). Linux also has gained support of server-based application developers as well, with many of the worlds' most used and secure online ordering, distributed order management and supply chain integration systems running on Linux server software (MacKinnon, 1999). For all these strengths, Linux does have the depth of application tiles on the desktop that it has on the server platforms being sold today (Predd, Cass, 2005). It also lacks the ease of use that the graphical interface of Windows has, and this is made very clear when comparing the latest editions of desktop Linux to Windows 7(Bradley, 2009).

UNIX is considered the workhorse of enterprise operating systems, with proven ability to scale...

...

UNIX is also considered to be one most effective operating systems at remote management functions including virtual system definition and virtual machine performance (Cass, 2003). As a result it is often the preferred operating system many developers choose to create their applications on first. For all its strengths, UNIX also has problems with legacy application support and the ability to support down-rev versions of software as well. There is little if any multithreaded support across hardware platforms given the highly unique approach this kernel takes to recompiling every time an application is run as well.
Conclusion

Comparing these operating systems shows both the progression of the structure, scalability and compatibility of kernel and memory architectures over time. MS-DOS was well suited to the proliferation of desktops and laptops, while MS-Windows is more attuned to the needs of networking within enterprises and rapid application development. Linux and UNIX are ideally designed for large-scale transaction support. Their role as e-commerce and web servers further underscores this point.

Sources Used in Documents:

References

Bradley, S.. (2009). Windows 7: Is It Right for You? Journal of Accountancy, 208(5), 32-36,12.

Stephen Cass. (2003). Linux's challenge to Unix. IEEE Spectrum, 40(6), 15-16.

MacKinnon, James G. (1999). The Linux operating system: Debian GNU/Linux. Journal of Applied Econometrics, 14(4), 443-452.

Prachi Patel Predd, & Stephen Cass. (2005). Showdown On the Desktop. IEEE Spectrum, 42(4), 20.


Cite this Document:

"Operating Systems Comparing The MS-DOS " (2011, May 11) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/operating-systems-comparing-the-ms-dos-44556

"Operating Systems Comparing The MS-DOS " 11 May 2011. Web.23 April. 2024. <
https://www.paperdue.com/essay/operating-systems-comparing-the-ms-dos-44556>

"Operating Systems Comparing The MS-DOS ", 11 May 2011, Accessed.23 April. 2024,
https://www.paperdue.com/essay/operating-systems-comparing-the-ms-dos-44556

Related Documents

Without the consent of the user, the program will never be elevated to administrator privilege. The MIC or integrity levels is again a new security concept with Vista OS. This feature is controlled by the Access control entry (ACE) in the System Access control List (SACL) of a file, process or a registry key. By associating every process with an integrity level, the OS limits privilege escalation attacks. [Matthew

7 billion by 2008 establishing the fact that Linux is no more a fringe player but rather a mainstream. IDC admitted that Linux is not being used just on new hardware only. As an alternative customers frequently reinstall existing servers to run Linux. While considering for such use as also the use of Linux for secondary OS, IDC forecasts for servers running Linux to remain 26% larger in 2008. Evidently,

For instance, architectures rivaling the IBM personal computer (based on the Intel 8080 microprocessor and the MS-DOS operating system) generally failed once the IBM standard became established. The standard was entrenched in distribution channels and the mind of the consumer; the price of IBM-compatible machines had been reduced sharply by cumulative experience; and, perhaps most significantly, the vast majority of software and peripherals were specifically engineered for compatibility with

Microsoft XP
PAGES 9 WORDS 2303

Windows XP is the latest and most robust of the family of all windows operating systems that are popular with PC users worldwide. Windows XP comes in two editions namely the home edition and the professional edition to cater to the varying needs of the respective class of users. One of the main problems with the previous versions (9x) of windows operating systems was that they were prone to frequent

Marketing Report for Ms. Janet Bradley Keeping in view the increasing obesity rates in Australia and finding the spicy and high-calorie fast foods as the major reason for it, Ms. Janet Bradley has planned to establish a low-calorie fast food restaurant chain that will serve as an alternative to McDonald's, Red Rooster, KFC, and other fast food chains. This paper presents a comprehensive analysis of the micro and macro environment for

This RIS includes Toshiba digital desktop telephones, plus 24 SpectraLink wireless telephones; these wireless phones were programmed to extend the features and capabilities of the users' desktop telephones to anywhere they roam at the 22-bed hospital; however, other wireless technologies such as cellular, could not be used due to the interference with sensitive medical equipment (Just the right prescription 24). The hospital's chief operating officer, Darryl Thornton, reported, "Being