¶ … LAN and WAN Analysis
Current Release
OS X Mountain Lion
Linux kernel 3.4; GNU C. Library
Windows Server 2008 R2 (NT 6.1.7600)
S-Net
SP
IBM AIX Variant
(UNIX System V Release
Range of compatible hardware
Low
Performance
High for fine-tuned applications to the processor and O.S. API calls (1)
Very High for natively-written applications
Medium for applications using emulation mode; very high for 64-bit applications
Slow for applications emulating MS-Windows; fast for direct API-call based applications
Very high for applications written directly to the UNIX API; support for emulated API calls slows down performance
Corporate Acceptance
Medium
Very High
Very High
Medium
High
Installed Base
Millions of Users
Millions of Users
Millions of Users
Thousands of Users
Millions of Users
Directory Services Power
Medium; not as well defined as Microsoft
Very Strong; supporting taxonomies
Very Strong with Win64-based Directories
Very High; the operating system is based on this
High
Stability
High
Very High; strong base of developers
Very High; Microsoft now into 3rd gen.
Moderate; Novell is seeking a new revenue model
Very High
Software Cost
Very High
Low to Free
High including site licensing
Medium to High
Medium to High
TCP/IP Support
Partial of the entire TCP/IP command set
Full support due to the developer community
Full support with advanced security
Partial of the entire TCP/IP command set
Full support due to the developer community
Security Strength
Strong; now several generations into this operating system
Very strong; global developer base continues to refine it
Medium to Strong; needs more focus on enterprise support
File Server; NDS make this one of the most secure server operating systems
Very strong, especially the IBM AIX operating system
(1) Application Programmer Interface (API) calls
Sources: (Bajgoric, 2003) (Bradley, 2009)(Cass, 2003) (Hong, Rezende, 2012) (MacKinnon, 1999)...
Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now