Sun Microsystem Essays (Examples)

68+ documents containing “sun microsystem”.
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
Sun Microsystems Economic and Market
Pages: 5 Words: 1446

"For it organizations with large investments in mainframes, this is an increasing challenge. ith no real competitors left in the mainframe server business, the cost of the associated hardware and software licenses continue their rapid rate of increase." (Sun Microsystems, Inc.) the mainframe-based businesses today are all trying to quickly convert to more Sun Microsystems like approaches to computerizing. hen Sun creates products and services like the Mainframe Affinity Program, it is clear they are in tune with the needs of the business world. "Through the Mainframe Affinity Program, Sun offers products, tools, partnerships and services that help enable you to interoperate with, rehost or replace mainframe applications on more cost-efficient, open platforms - often at equal or greater levels of performance, flexibility and scalability. Sun's services experts, teaming with partners, put technology and proven services methodologies to work to help you meet your migration needs, including high reliability,…...

mla

Works Cited

Cisco Systems. (n.d.). E-marketing. Retrieved on May 20, 2005, at  http://www.cisco.com/ .

Sun Microsystems, Inc. Solutions: Education and Research. Retrieved on May 20, 2005, at  http://www.sun.com/products-n-solutions/edu/solutions/index.html#business_solutions .

World Com Inc. "Mission-Critical Enterprise Systems Deliver." IDC eBusiness Case Study (2002).

Yahoo Finance. Sun Micro Systems. Yahoo Finance. Retrieve on May 20, 2005, at  http://finance.yahoo.com/q/bc?s=SUNW&t=my

Essay
Management of Sun Microsystems Sun
Pages: 8 Words: 2768

Agile has transitioned from being a development tool to a means to compete and drive another team into conformance with a competing team's agenda. This is a prime example of how product development environments can turn into a dysfunctional control system. As senior management, above the project leaders, looks at a literally seventy to one hundred projects a month in reviews, all they have time to see are the critical path factors, Agile-based metrics and KPIs on accomplishment. The immediate reaction of senior management is that the coding for the main part of the application is going extremely well and the more complex, engineering-centric features that Sun is so well-known for is slowing down the process. What needs to happens is that a stronger leader needs to step in and place equal weight of project performance and quality of coding based on customer requirements, including adherence to the Marketing…...

mla

References

Amason, Allen C. (1996). Distinguishing the effects of functional and dysfunctional conflict on strategic decision-making: Resolving a paradox for top management teams. Academy of Management Journal, 39(1), 123.

Joaquin Camps, & Hannia Rodriguez. (2011). Transformational leadership, learning, and employability. Personnel Review, 40(4), 423-442.

Charpentier, Claes, & Samuelson, Lars A. (1996). Effects of new control systems in Swedish health care organizations. Financial Accountability & Management, 12(2), 157.

Grant, D., & Mergen, A.. (2009). Towards the use of Six Sigma in software development. Total Quality Management & Business Excellence, 20(7), 705.

Essay
Ethical Awareness Issues -- Sun Microsystems Sun
Pages: 2 Words: 588

Ethical Awaeness Issues -- Sun Micosystems
Sun Micosystems was a company that sold computes, softwae and infomation technology -- including the popula Java pogamming language and the UNIX opeating system. In 2010, they meged with oacle, but pio to that had a business philosophy that was po-open systems, copoate social esponsibility (CSR) and ethics. Fo the focus on ethics, this is the idea that any oganization now has a esponsibility to not only poduce poducts in a sustainable manne, but to make sue that all aspects of the company wok in an ethical way.

Sun knew that it was facing pessue fom competitos and public opinion of lage copoations, paticulaly afte the Enon scandal. The company decided to povide ethics seminas. These seminas became moe and moe intense - and finally evolved to include all manages in evey office globally to undego ethics taining. The company would bing in expets to pesent…...

mla

references. Command economy and administrative economy are systems that were used in the Soviet Union and China. In the 21st century global economy, though, developed and developing nations are communicating better, stakeholders have a higher degree of expectation, and consumerism seems to be driving the global economy -- none of which work well for planned economies.

Part 6 -- Gross Domestic Product is the total of all the goods and services produced within a country. Total productivity is the relationship between goods and services and what is needed to produce them (example: Human Resources, Raw Materials, Money). Productivity impacts GDP in the medium and long-term because the higher the productivity, eventually the higher amount of goods and services produced. The two issues, GDP and TP have a positive relationship -- the larger the TP the larger the GDP. The more production, the more workers employed who also spend -- and the more products available for export.

Essay
Jini Is Software From Sun Microsystems That
Pages: 4 Words: 1196

Jini is software from Sun Microsystems that seeks to simplify the connection and sharing of devices, such as printers and disk drives, on a network (Jini, Webopedia). Unlike devices that require installation and boot-up processes to be added to a computer or a network, a device that uses Jini will announce itself to the network, provide some details about its capabilities, and immediately become accessible to other devices on the network. Therefore, it is possible to leverage Jini to create distributed computing, whereby capabilities are shared among the machines on a common network. Thus, users can access the features of any device on the network and the desktop computer does not have to hold all the memory, storage and processing power it needs to use a device. ecause Jini has the potential to make operating systems incidental to the power of networks, some view Jini as having the potential to…...

mla

Bibliography

Java brews up a storm in the enterprise. Network Computing. Retrieved April 29, 2004 from Web site: http://www.networkcomputing.com/919/919f1side11.html

Jini, Retrieved April 28, 2004 from Web site:  http://www.webopedia.com/TERM/J/Jini.html 

Jini. Retrieved April 28, 2004 from Web site:  http://searchnetworking.techtarget.com/sDefinition/0,sid7_gci212422,00.html 

Perrone, P. And Chaganti, V. (1999, November). Jini in the box. Embedded Systems Programming. Retrieved April 29, 2004 from Web site: http://216.239.39.104/search?q=cache:qAhHzYdWVIsJ:www.assuredtech.com/papers/jini/embedded.pdf+Jini+and+RMI&hl=en

Essay
Recommendation for Greg James in Sun Microsystem
Pages: 5 Words: 2258

3. Executive summary Cross-cultural units and companies structured around such units apparently pose numerous advantages, including a rich talent pool, edge over competition, invention, efficiency, and improved capability of offering diverse services/products. Nevertheless, firms adopting this strategy encounter several difficulties like disputes, communication and integration related issues and setbacks.
In this paper, Greg James and his company, Sun Microsystems, will be examined. James is currently the company’s data recovery and protection department leader. In spite of being recognized as a competitive firm and a creative hub, Sun Microsystems has encountered numerous instances of failure. Thus, the many structural issues plaguing the company will be identified and solutions put forward.
4. Introduction
Adopting a team-based strategy for organizational problem resolution aids companies in making the most of personnel strengths, while minimizing their shortcomings. In such a company, personnel tasked with particular responsibilities are grouped into project units required to carry out particular activities (Baligh, 2006).…...

mla

Reference list

Baligh, H. H. (2006). Organization structures theory and design, analysis and prescription. New York, Springer

Condrey, S. E. (2005). Handbook of Human Resources Management in Government. Hoboken, John Wiley & Sons.

Duggan, T. (2017). The Advantages of Team-Based Structure. [online]. Available at: (Accessed: 18 December 2017)

HULT (2017). 13 benefits and challenges of cultural diversity in the workplace in 2017, International Business School. [online]. Available at: http://www.hult.edu/news/benefits-challenges-cultural-diversity-workplace/ (Accessed: 18 December 2017)

Kokemuller, N. (n.d.). The Disadvantages of Team-Based Organizational Structure. [online]. Available at: https://yourbusiness.azcentral.com/disadvantages-teambased-organizational-structure-1053.html (Accessed: 18 December 2017)

Mcphee, R.D., Poole, M.S. (2001). Organizational Structures and Configurations, in: The New Handbook of Organizational Communication. SAGE Publications, Inc., Thousand Oaks, pp. 503–544.

Resource, I.H., Management, R. (2006). Introduction to International Human Resource Management. Human Resource Management pp. 25, 1–11.

Simons, R. (2012). Human Resource Management: Issues, Challenges and Opportunities. Hoboken, Apple Academic Press. http://smallbusiness.chron.com/advantages-teambased-structure-55624.html

Essay
Identification When One Company Looks at Taking
Pages: 3 Words: 1010

Identification
When one company looks at taking over another company that are many issues that must be looked at before a final bid can be put on the table. The first thing that the buying company must do is determine a vision for the combined companies. In the case of Oracles buy out of Sun Microsystems the visions that Oracles' Ellison was to transform the combination of the two companies into the Apple for the business customer by delivering high-quality, seamlessly integrated consumer products where software and hardware components were developed in conjunction, thus minimizing the customer setup process.

Ellison developed this vision by looking at what Sun Microsystems had that Oracle didn't and how would this acquisition help to better Oracles position in the market. If a company can buy another company at a practical price that has a unique niche in a particular industry it will more than likely…...

Essay
Dell Inc
Pages: 15 Words: 6698

Dell Inc.
The head office of Dell is at Austin, Texas at the same place where the company was based. Dell Americas is also located in Texas, which is the regional business unit for the United States, Canada and Latin America. The regional headquarters offices of the company are in England, for Europe Middle East and Africa; in Singapore catering to Asia-Pacific; and in Kawasaki, Japan, to serve the market for Japan. The production unit for the manufacture of computers is located in Texas, Tennessee, Brazil, Ireland, Malaysia, and China. Dell Computer Corporation sells products and services meant for Information Technology and the Internet backbone. The proceeds of the company for the previous four quarters were $31.2 billion. (Stories of Entrepreneurs: Michael Dell)

Dell's product, pricing, distribution, and promotion strategies

Product

The Dell product line-up of high performance computer systems comprises of PowerEdge servers, PowerApp server applications, PowerVault storage products, Dell Precision workstations, Latitude…...

mla

References

Bean, Michael. The Price Strategy Simulator: Anatomy of a Price War Hewlett-Packard / Compaq vs. Dell. Retrieved at   Accessed on 16 October, 2004http://www.forio.com/pricing20010912.htm .

Best practice resources enabling lean manufacturing excellence. Retrieved at   Accessed on 16 October, 2004http://www.superfactory.com/Resources/concepts/demandflow.htm .

Brief Description of the Product/Service. Retrieved at Accessed on 16 October, 2004http://homepages.wmich.edu/~j0karnat/Dell%20Project.htm.

Build-To-Order Model for Success (Part-II) Retrieved at Accessed on 16 October, 2004http://www.themanagementor.com/kuniverse/kmailers_universe/manu_kmailers/scm_build2order2.htm.

Essay
Microsoft Office Is the Most Popular Comprehensive
Pages: 2 Words: 631

icrosoft Office is the most popular comprehensive bundle of productivity applications in the world. It contains word publishing, spreadsheet, presentation, e-mail, and database software and is most often used with the icrosoft Windows operating system. It can also be used with the Apple acintosh. The icrosoft Office suite enjoys almost universal worldwide familiarity. The most recent version of S Office is Office XP, which is designed specifically to be compatible with the Windows XP environment.
Functionally, Sun StarOffice is very similar to icrosoft Office. The chief difference is that it is written using open source code and may be altered by programmers to match their specifications. It is the most popular system for Linux and Unix-based computers and utilizes an XTL-based interface. It is considered an 'alternative' to the Windows system because it is popular with developers, who often criticize icrosoft for the fact that the source code is unavailable and…...

mla

Microsoft Powerpoint allows the user to design presentations that use graphics and visual effects. It is often used in with data that has been created in Excel. Microsoft Access is a database project that allows the user to enter and manage data and sort according to fields. Its chief limitation is that it is meant for one user to operate at a time. StarOffice Impress has essentially similar features, but uses the Macromedia Flash format to present its documents. Sun Microsystems pioneered Java Internet application technology and most computers have the capability of reading flash documents.

Datasheet: StarOffice 7 Data Sheet. http://wwws.sun.com/software/star/staroffice/ds/STAROFS7RETAIL_90903.pdf

Microsoft Office XP: Office Home.  http://www.microsoft.com/office

Essay
Computer Company Rivalry
Pages: 2 Words: 690

battles of the C# and Java wars between Sun and Microsoft. The winner will greatly affect the entire internet which in turn means they are in control of major part of our modern world. The net offers us a plethora of possibilities and opportunities. For example, I know that I can't live without my daily emails, chat and of course I am a big fan of music downloads and bargain shopping. The future of not only information technology is tied to the internet, but business in general as more companies move to the likes of the net for B2B and b2c marketing. The bottom line is that the internet is really comprised of nothing more that physical hardware that runs on intricate software with routers and Local Area Networks (LANs) sprinkled around the world. Basically, the company that grabs a monopoly hold over the rest of the industry can…...

mla

Works Cited

Niccolai, James. "Sun's Gosling Testifies In Java Case." InfoWorld. September 9, 1998: Retrieved on 16 May 2005, from .

Sullivan, Tom and Ed Scannell. "Microsoft, Sun At War Again Over Java." InfoWorld. (2001): Retrieved on 16 May 2005, from <   >.http://www.infoworld.com/articles/hn/xml/01/01/29/010129hnmsjava.html 

Essay
Computer Clustering Involves the Use of Multiple
Pages: 8 Words: 2319

Computer clustering involves the use of multiple computers, typically personal computers (PCs) or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single integrated system (Cluster computing). Clustering has been available since the 1980s when it was used in Digital Equipment Corp's VMS systems. Today, virtually all leading hardware and software companies including Microsoft, Sun Microsystems, Hewlett Packard and IM offer clustering technology. This paper describes why and how clustering is commonly used for parallel processing, batch processing, load balancing and high availability.
Despite some challenges such as achieving transparency, mitigating network latency and the split-brain problem, clustering has proven to be a huge success for bringing scale and availability to computing applications. Hungry for even more efficient resource use, IT departments are now turning their eye on the next evolution of clustering called grid computing.

Parallel processing is the processing of program instructions by…...

mla

Bibliography

Beowulf clusters compared to Base One's batch job servers Retrieved May 2, 2004 from Web site: http://www.boic.com/beowulf.htm

Burleson, D. Requirements for parallel clusters. Retrieved May 1, 2004 from Web site:  http://www.fast-track.cc/teas_ft_rac07.htm 

Cluster computing. Retrieved May 1, 2004 from Web site:  http://search390.techtarget.com/sDefinition/0,sid10_gci762034,00.html 

D'Souza, Marco (2001, April 13). Meeting high-availability through clustering. ZDNet. Retrieved May 2, 2004 from Web site:  http://www.zdnetindia.com/biztech/services/whitepapers/stories/19538.html

Essay
Crisis of Microsoft Lawsuit
Pages: 3 Words: 797

Crisis of Microsoft Lawsuit
The Microsoft Lawsuit: Microsoft vs. Sun

The emergence of computers has brought a name in the computing industry as the giant of all giants - the Microsoft. Microsoft is a company that was started and established by one of the richest man in the world today, ill Gates. Whenever we use a computer, we must remember that 98% of all computer users in the world uses Microsoft applications and tools as the major content that fills the hard disks space of our computers. Microsoft has indeed achieved the trust and confidence of most computer users worldwide.

Despite of the success that Microsoft has been reaping from its patrons, who are continuously growing in number, and where most of the Microsoft products became the standard tools for them, a large number of issues are being faced by the company. Most of which are lawsuits concerning contracts with other leading companies…...

mla

Bibliography

Microsoft Agrees to Settlement that Protects Future Integrity of the Java Platform.

Lawsuit Related Information, Sun v. Microsoft.  http://java.sun.com/lawsuit

Essay
Java Network Computing Technologies
Pages: 8 Words: 2035

Internet Inter-OR Protocol (IIOP)
Java Network Computing Technologies

Internet Inter-OR Protocol (IIOP) is a protocol that enables distributed programs located anywhere in the Internet to communicate with each other. It is an interoperability protocol that supports heterogeneous environments. IIOP offers possible communication between applications regardless of the platform and programming elements used in their development.

IIOP is an element of Object Management Group's (OMG) standard architecture called CORA (Common Object Request roker Architecture). It is a TCP/IP-based protocol and a GIOP mapping that provides standard communication methods between ORs. OR (Object Request roker) is a communication mediator used by CORA during requests and data interchange between clients and servers.

CORA/IIOP is a solution to the complexity that web applications are now becoming. efore, protocols are specifically developed on the basis of applications to allow compatibility in communication. ut with CORA/IIOP, communication is possible between diverse application platforms.

IIOP technology is an element of Internet applications…...

mla

Bibliography

Curtis, David. IIOP: OMG's Internet Inter-ORB Protocol.

OMG. 08 June 2003.  http://www.omg.org/library/iiop4.html 

Golding, Michael. Java Socket Programming.

UEL.AC.UK. 09 June 2003. http://homepages.uel.ac.uk/2795l/pages/javaapps.htm

Essay
Network Security as an Issues for Business Data Communication
Pages: 5 Words: 1631

Network Security: An Issue for Business Data Communication
Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has made keeping data secure more difficult. The Internet did not change the key issues, just the number of users trying to access the information. Network administrators have been facing these issues for quite some time.

The key security issue facing IT professionals is to protect the system from invaders or intruders known as Hackers. Hackers can be grouped into several categories according to motive. They are Joyriders (who do it for fun), Vandals (who do it to cause harm), Scorekeepers (who…...

mla

Works Cited

Atempo. Improving Network Security with Time navigator. 2001.   Accessed July, 2002.http://www.atempo.com/library/pdf/wp_security.pdf .

CITES. Introduction to Windows Security. 2002. Accessed July, 2002.http://www.cites.uiuc.edu/security/winintro.html

Coffey, Tom, Dojen, Reiner and Flanagan, Tomas. Verification of Cryptographic Protocols used in Fixed and Mobile Networks..Information Security. ERCIM News No. 49, April 2002.   Accessed July 2002.http://www.ercim.org/publication/Ercim_News/enw49/coffey.html 

Joint Information Systems Committee (JISC) Senior Management Briefing Paper 1. 1997.   Accessed July 2002.http://www.jisc.ac.uk/pub97/sm01_sec.html 

Essay
Architecture 2a Brief History of
Pages: 10 Words: 2876

These markets need the categorization of information assets and also the plan of interaction interfaces that conventionally were built up within the organizations. Nevertheless, as the diversities of the access to information and also functionality of these applications are increasing, the difficulties of the organization of information and also the user interfaces that are possible will also increase. Due to this, the architects of information are becoming increasingly concerned with the vertical application development to design and also to put into practice precise architectures to maintain users and also to develop and increase organically with functionality. In a number of instances, vertical IAs might principally be cautiously organized, task-based boundaries to customary end-user applications and databases accessed through a Web browser and customized to every purpose, activity and industry. A common example is the applications of e-commerce which are within commercial Web sites like shopping carts and exact term…...

mla

References

Beckett, D., & McBride, B., (2004).RDF=XML Syntax Specification (Revised): W3C

Recommendation 10 February 2004. World Wide Web Consortium, Cambridge, MA.,   / (accessed Mar 27-2011).http://www.w3.org/TR/rdf-syntax-grammar 

Dillon & Turnbull (2005). Dillon, a. & Turnbull, D. ( 2005). Information Architecture. (Pp. 1-9).

In: Encyclopedia of Library and Information Science. New York: Marcel Dekker. Pp. 1-14. Online: http://www.dekker.com/sdek/abstract~db=~content=a713609832?words=&hash=

Essay
Microsoft NASDAQ Msft Is a
Pages: 6 Words: 1744

Further diversification is also recommended. Given the pace of change in the industry, the reliance on PC operating platforms and office software packages must be reduced. The risk of an entirely new technological paradigm emerging is high, so Microsoft must therefore diversify its revenue streams in order to defend against this threat. Overall, Microsoft's strategic thrust is strong and its operating results fantastic. The company must guard against major non-strategic threats such as technological change or acute damage from financial scandal. If Microsoft deals with these two issues effectively, the will remain in good position to continue to build their revenues in the coming years.
orks Cited

Financial and operating unit information from Reuters. Retrieved December 8, 2008 at http://www.reuters.com/finance/stocks/companyProfile?symbol=MSFT.O

No author. (2004) Microsoft Corporation. Funding Universe Retrieved December 8, 2008 at http://www.fundinguniverse.com/company-histories/Microsoft-Corporation-Company-History.html

Microsoft 2008 Annual Report. (2008). Microsoft. Retrieved December 8, 2008 at http://www.microsoft.com/msft/reports/ar08/index.html

No author. (2006). Microsoft's Multiple Challenges: Is Its Size…...

mla

Works Cited

Financial and operating unit information from Reuters. Retrieved December 8, 2008 at  http://www.reuters.com/finance/stocks/companyProfile?symbol=MSFT.O 

No author. (2004) Microsoft Corporation. Funding Universe Retrieved December 8, 2008 at  http://www.fundinguniverse.com/company-histories/Microsoft-Corporation-Company-History.html 

Microsoft 2008 Annual Report. (2008). Microsoft. Retrieved December 8, 2008 at http://www.microsoft.com/msft/reports/ar08/index.html

No author. (2006). Microsoft's Multiple Challenges: Is Its Size a Benefit or a Burden? Wharton School of Business. Retrieved December 8, 2008 at  http://knowledge.wharton.upenn.edu/article.cfm?articleid=1478

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now