Verified Document

Linux Server Proposal For Implementing Research Proposal

, Minoves, Garrigos, 2011). UNIX and Linux are considered the best possible operating system for managing the development of unified collaboration and workflow-based applications as a result (West, Dedrick, 2006). For all the advantages of UNIX and Linux, the disadvantages include a development and administrator environment that is archaic and command-driven, lacking much of the usability enhancements that Apple and Microsoft both have invested heavily in. The UNIX and Linux user command lines are more adept at managing the specific features and commands at the operating system level, and often must be coordinated in a shells script to accomplish complex tasks. This has led to many utilities and add-on applications being created, which tends to confuse the novice just getting started on the UNIX and Linux operating systems. The learning curve for UNIX and Linux from a user standpoint is quite high and takes months to master at the system command line level. Once mastered however, these two operating systems can be much more effective in managing diverse workflows and workgroups, which have made them ideal for global product development and knowledge management application s, which have become a necessity in many organizations that have global operations.

UNIX and Linux Application Software Compatibility

By far the majority of enterprise software is developed and sold on the UNIX operating system, as its business licensing, superior security options and broader installed base generated over decades of adoption make this server a viable market for developers to sell into. Linux has also experienced exponential growth in desktop, server and mobile applications over the last three years as well, due to the same factors and the agility of building on this platform (Wall Street Journal, 2010). Of the two, Linux is getting far more a developer creating applications for the desktop and server environments, as this platform supports a more equitable development model and...

Linux has emerged as a favorite operating systems for developers and the rapid growth of application sales show this (Wall Street Journal, 2010).
Challenges of Deploying & Maintaining UNIX or Linux Server Environments

UNIX and Linux are intricate, complex and have many options in defining the optimal configuration for a given company's needs. They both require a system administrator with many years of expertise to install correctly and ensure the highest level of performance over the long-term. There is also the steep learning curve associated with these operating systems at the command line and system utility level for system administrators as the utilities they rely on change frequently (West, Dedrick, 2006). This learning curve is further accelerated by the pace of change in UNIX and Linux operating system developments, which force system administrators to continually get system certifications to stay current over time (Doughty, 2003). All of these factors are also complicated by how difficult it is to integrate UNIX and Linux system into diverse operating system environments (Suzanne, 1996).

References

Currier, G.. (2010, November). The Top 10 Tech Trends of 2011. Baseline,(107), 20-25.

Ken Doughty. (2003). Implementing enterprise security: A case study. Computers & Security, 22(2), 99-114.

Shelley, Suzanne. (1996). The quest for seamless data integration. Chemical Engineering, 103(2), 127.

Torkar, R., Minoves, P., & Garrigos, J.. (2011). Adopting Free/Libre/Open Source Software Practices, Techniques and Methods for Industrial Use. Journal of the Association for Information Systems, 12(1), 88-122.

Global Handset Shipments Jump. (2010, November 10). Wall Street Journal (Online) Pg. 10

Joel West, & Jason Dedrick. (2006). Scope and Timing of…

Sources used in this document:
References

Currier, G.. (2010, November). The Top 10 Tech Trends of 2011. Baseline,(107), 20-25.

Ken Doughty. (2003). Implementing enterprise security: A case study. Computers & Security, 22(2), 99-114.

Shelley, Suzanne. (1996). The quest for seamless data integration. Chemical Engineering, 103(2), 127.

Torkar, R., Minoves, P., & Garrigos, J.. (2011). Adopting Free/Libre/Open Source Software Practices, Techniques and Methods for Industrial Use. Journal of the Association for Information Systems, 12(1), 88-122.
Cite this Document:
Copy Bibliography Citation

Related Documents

Network Design Proposal
Words: 4024 Length: 15 Document Type: Business Proposal

Network Design Proposal Network Requirements ABC School Stats/User Counts Having a current strength of approximately 845 students, ABC School provides education from Pre-Kindergarten to the 12th Grade. According to the requirements of The New York School District, 250 Curriculum computers along with 75 Administration computers are to be installed. The requirements for the wiring per room of layer 1 are that it should adjust a total of 25 computers, 24 of which will

Data Warehouse a Strategic Weapon of an Organization
Words: 10375 Length: 38 Document Type: Term Paper

Data Warehousing: A Strategic Weapon of an Organization. Within Chapter One, an introduction to the study will be provided. Initially, the overall aims of the research proposal will be discussed. This will be followed by a presentation of the overall objectives of the study will be delineated. After this, the significance of the research will be discussed, including a justification and rationale for the investigation. The aims of the study are to

Microsoft Diversification Strategy Define the
Words: 1450 Length: 5 Document Type: Research Proposal

Thirdly there is the broader dynamic of how social computing is completely re-ordering the competitive dynamics of the two sectors that comprise this division as well. a. Determine the extent to which Microsoft competes with other companies in its industry by assessing the levels of market commonality and resources similarity for each major competitor. Microsoft's levels of commonality and resources similarity with other competitors are relegated to those companies who have

Honeypot to Determine if Dictionary,
Words: 4047 Length: 13 Document Type: Research Proposal

An overview of several honeypots and their respective applications, their level of involvement, and demonstrated value to date are provided in Table 1 below. Table 1. Types of honeypots by level of involvement. Honeypot Name/Type Description BackOfficer Friendly BOF (as it is commonly called) is a very simple but highly useful honeypot developed by Marcus Ranum et al. At NFR. It is an excellent example of a low involvement honeypot. BOF is a program that

New Generation Technology CRM at
Words: 2581 Length: 8 Document Type: Research Proposal

Figure 2: Dell Inc. Marketing and Manufacturing Process Integration Based on analysis of Sources: (Kapuscinski, Zhang, Carbonneau, Moore, Reeves, 2004) (Gunasekaran, Ngai, 2009) (Bilek, 2010) Discussion of Current Business Issues Today Dell suffers from not having enough insight into the most critical customer relationships necessary to grow its emerging virtualization and Cloud computing businesses, as the company's approach to managing by technology instead of customers created a very myopic mindset. The transition from being

Cross Platform Mobile and Web
Words: 17284 Length: 63 Document Type: Thesis

82). Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actual content of the widget, namely text, linked images/video or content pulled from a server of Web service. Alternatively, the widget content can be created using Flash, although

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now