Verified Document

Mobile Phones And Unix Research Paper

Related Topics:

Windows, UNIX, Linux Servers: Outline What is a computer server?

Introduction to major servers

Windows

UNIX

Linux

Windows

Why do so many people use Windows?

Advantages

Ease of use

Support

Disadvantages

Cost

Lack of flexibility

UNIX

Advantages

Scalability

Portability

Disadvantages

Not as well-supported or easy to use as Windows for average user

Still proprietary

Linux

Differences from UNIX

Advantages and disadvantages of nonproprietary technology

Windows, UNIX, Linux Servers

In computing, a server provides the necessary support for the functioning of all a user's various applications, including but not limited to "email, web and even database hosting" (Edmund 2014). Some of the most common servers are UNIX, Linux, and of course Microsoft. Because of Microsoft's ubiquity, it is often the default server that most organizations and private individuals choose. However, this is not necessarily the optimal system for all computing needs. Given the challenges of switching servers once one is selected, it is essential to select the best one for the organization or individual at the outset.

Microsoft's Windows server provides support and updates in a hassle-free way. Particularly for organizations which are not specifically IT-related, using outside support is considered to be less troublesome and thus less costly than having in-house expert staff. Also, the majority of individuals, including employees, are already familiar with using Windows...

"Majority of users utilizing the Microsoft server hosting utilize the Active Server Pages (ASP) technology" and users "can even develop a website utilizing the interface of Microsoft tools such as Visual Interdev, Microsoft FrontPage and Microsoft Access" with "Microsoft Access or Microsoft SQL as the database" (Edmund 2014). Still, many IT professionals are not enamored with Microsoft. Windows is considered to be a cumbersome resource suck and as it is a proprietary technology, it can force users to rely upon Microsoft products exclusively. As more and more organizations are using Macintosh products and attempting to move away from the Windows monopoly, this can be frustrating.
UNIX, in contrast, is a non-proprietary technology and many IT professionals consider it superior. First and foremost, it is utilizes fewer resources than Microsoft. "UNIX uses its virtual memory efficiently. In UNIX user[s] can run many programs at a time without using most of its physical memory" and a "number of users can have account on one machine and even use it simultaneously. Thus UNIX is a multiprocessing, multi-user system" that is more efficient than Microsoft ("Advantages and disadvantages of UNIX," 2014). Apple, HP, and a number of other major technology companies (other than Microsoft) favor it because of its "reliability" and "scalability" over Windows as well as the fact it can be used on both PCs and Macs ("Advantages and disadvantages of UNIX," 2014). While it does not offer Microsoft technical support, the system is considered to be easier to use than Microsoft by most independent analysts. Input and output operations are simpler in UNIX than in Microsoft and UNIX "uses a hierarchical file system that allows trouble-free maintenance and efficient implementation. Everything in UNIX is file or a process" ("Advantages and disadvantages of UNIX," 2014). In other…

Sources used in this document:
References

Advantages and disadvantages of UNIX. (2014). Datawarehouse Concepts. Retrieved from:

http://dwhlaureate.blogspot.com/2014/01/advantages-and-disadvantages-of-unix.html

Edmund. (2014). Windows server versus UNIX/Linus. Retrieved from:

http://www.webhostingproviderlist.com/guides/windows-server-vs.-unixlinux/
http://dwhlaureate.blogspot.com/2016/12/unix-vs.-linux-what-is-difference.html
https://opensource.com/resources/what-is-linux
Cite this Document:
Copy Bibliography Citation

Related Documents

Mobile Security
Words: 1535 Length: 6 Document Type: Research Paper

Mobile Device Security Analysis of Routing Optimization Security for Mobile IPv6 Networks Defining and Implementing Mobility Security Architectures Approaches to defining, implementing and auditing security for mobility devices have become diverse in approach, spanning from protocol definition and development including IPv6 through the creation of secure mobile grid systems. The wide variation in approaches to defining security for mobility devices has also shown the critical need for algorithms and constraint-based technologies that can

Unix/Linux Systems Vulnerabilities and Controls
Words: 1233 Length: 4 Document Type: Essay

6.30. When there are no restrictions for unprivileged users and if the option for config_rdskernel configuration is set, hackers can write arbitrary values into kernel memory (by making specific types of socket function calls) since kernel software has not authenticated that the user address is actually found in the user segment. The lack of verification of the user address can provide hackers to gain privileges and access to areas that

Cross Platform Mobile and Web
Words: 17284 Length: 63 Document Type: Thesis

82). Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actual content of the widget, namely text, linked images/video or content pulled from a server of Web service. Alternatively, the widget content can be created using Flash, although

Linux Server Proposal for Implementing
Words: 1166 Length: 4 Document Type: Research Proposal

, Minoves, Garrigos, 2011). UNIX and Linux are considered the best possible operating system for managing the development of unified collaboration and workflow-based applications as a result (West, Dedrick, 2006). For all the advantages of UNIX and Linux, the disadvantages include a development and administrator environment that is archaic and command-driven, lacking much of the usability enhancements that Apple and Microsoft both have invested heavily in. The UNIX and Linux user

Technology on Customers in Regard to the
Words: 1838 Length: 5 Document Type: Essay

Technology on Customers in Regard to the Following The greatest change in technology has been in the delivery of information. This has impacted the developed and developing world alike. So the firms in U.S., for example, spend more on office-based functions of information handling which has been the major change and has dominated the patterns of development and brought about a change in the structure of work and growth. The

EU Open Source Software Legal
Words: 6964 Length: 25 Document Type: Term Paper

" (Information Society and Media, 2005) f. The eContent Programme and the eTen Programme The 100 million dollar eContent Programme (2001-2005) focuses on encouraging growth and development of tie European digital content industry. This programme funds projects with short time-to-market and as well experiments with new models in business and partnerships through use of technology that is presently available. The programme's stated 'main thrust' is to; Improve access to an expand the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now