Operating Systems

Operating Systems

  • Submitted By: netwizard
  • Date Submitted: 07/12/2009 4:01 PM
  • Category: Technology
  • Words: 1729
  • Page: 7
  • Views: 613

Operating Systems
Common operating systemsuse sets of codes and instructions for hardware to execute the most complicated and basic of functions. Countless versions of operating systems come from a variety of high-end software manufacturers, supportinga multitude of clients from private companies, to military sectors, to small businesses and individual consumers. We will be concentrating on three popular operating systems: the Linux OS, Windows Server 2003, and the ever popular Windows XP.
Windows Server 2003
Released in April 24, 2003, Windows Server 2003 was released to the public. Multiple versions were released including Standard, Enterprise, Datacenter, Web, and Business Editions. Most of the editions were released for each type of small or large business to support active file and print sharing, secure Internet connectivity, the use of web applications, and using Microsoft SharePoint services.
Some of the improvements of Windows Server 2003 are the enhancement of cluster services. Clustering services allow multiple computers to be connected by cables and communicate through a group of servers. File and print sharing, e-mail, correspondence, and database maintenance are all accomplished through the servers (nodes). If one of the nodes were to breakdown, clustering services will allow another server to begin service, thus allowing constant communication between computers, printers, and users without disturbing the network. The operating system support multiple system with the two most common being 32-bit and 62-bit systems. Security is perhaps one of the most important aspects of an operating system, especially one that is heavily involves with the company’s Internet, Intranet, and shared server usage. With the updated Internet Information Services 6.0, administrators have the power to restrict user access, encrypt information using SSL technology, audit unsuccessful logons by suspicious users, use file system securities to control file use,...

Similar Essays