Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Payroll management system project literature review
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Payroll management system project literature review
What type of architecture the new payroll application should use and why.
The new payroll system will utilize client/server based architecture with the use of thin clients running from a central terminal server located at the Data Center. The terminal server will communicate with the application server where the new payroll application will reside and the application server will communicate with the payroll database server.
The decision to use thin clients versus a traditional PC is based on cost, security and network traffic. According to 2X Software, A study conducted by Bloor Research shows that “Deploying thin client technology across enterprises can cut costs by up to 70%”. (2X Cloud Computing Software, 2010) There are also cost savings in software since it will run on a server environment there will not be a cost per installation.
From the security standpoint, information and data security can be improved with the usage of thin clients. As they do not have local disks or portable media drives, they are less vulnerable to anti-viruses and spy wares. Users can only store data on remote file servers and cannot copy or move critical data to a portable media. The usage of thin clients in a domain on the network makes system administration easier and safer with respect to the remote user control and system policy checking in the domain that lessens the system internal threats. (Caghan Cimen, April 2014)
As far as network traffic is concerned, the traffic used by a thin client is significantly lower than that of a PC since the workspace is on a centralized server and the traffic to the terminal is strictly input and output. The majority of the data traffic is from server to server, as in this case from the terminal server to th...
... middle of paper ...
...odes of ethics and professional conduct, which can serve as a guideline for individuals and other organizations.
Works Cited
2X Cloud Computing Software. (2010). White Papers. Retrieved from 2X Cloud Computing Software: http://www.2x.com/whitepapers/savings-thin-client-computing/
ACM Council. (1992, 10 16). ACM Code of Ethics and Professional Conduct. Retrieved from Association of Computing Machinery: http://www.acm.org/about/code-of-ethics
Caghan Cimen, Y. K. (April 2014). USAGE OF THIN-CLIENT / SERVER ARCHITECTURE IN COMPUTER AIDED EDUCATION. The Turkish Online Journal of Educational Technology, volume 13 issue 2 .
K, R. (2010, May 2). Advantages of MPLS VPN Network over Point to Point Leased Lines for WAN Connectivity. Retrieved from excITingIP: http://www.excitingip.com/707/advantages-of-mpls-vpn-network-over-point-to-point-leased-lines-for-wan-connectivity/
American Nurses Association (ANA), (2001), Code of Ethics for Nurses, American Nurses Association, Washington, D.C.
NAEYC Code of Ethical Conduct and Statement of Commitment. (2005, April). Retrieved from http://www.naeyc.org/files/naeyc/file/positions/PSETH05.pdfRetrieved from http://journal.naeyc.org/btj/200511/ColomboBTJ1105.pdf
NAEYC. (2005, April). Code of Ethical Conduct and Statement of Commitment. Retrieved May 13, 2010, from NAEYC.org: http://www.naeyc.org/files/naeyc/file/positions/PSETH05.pdf
Professional Code of Conduct for Nurses Chantel Findley Nova Southeastern University Professional Code of Conduct The classical term for the word ethics is, moral philosophies that rule an individual’s or group behavior or action. The American Nurses Association used ethics to write the Code of Ethics for Nurses with these values and visions in mind: “(1) As a statement of the ethical obligations and duties of every person who chooses to enter the profession of nursing. (2) To act as the nonnegotiable standard of ethics.
Fowler, M. D., & American Nurses Association (2008). Guide to the code of ethics for nurses: Interpretation and application. Silver Spring, MD: American Nurses Association.
Argues that we must do more to ensure that computers are fully integrated into all our schools. Suggestion that there is no limit to the possibilities of computers; Topic of distance learning; Ways that the Internet can make schools more effective; Call for schools to develop innovative budgeting to acquire the funds for te...
As the internet is becoming faster and faster, an operating system (OS) is needed to manage the data in computers. An Operating system can be considered to be a set of programed codes that are created to control hardware such as computers. In 1985 Windows was established as an operating system and a year earlier Mac OS was established, and they have dominated the market of the computer programs since that time. Although, many companies have provided other operating systems, most users still prefer Mac as the most secured system and windows as it provides more multiple functions. This essay will demonstrate the differences between windows
NSNA (2003). Code of ethics for nursing students Part I: Code of professional conduct. Retrieved June26, 2011, from: http//www.nsnsa.orgpdf/pubs_CodeofProfessionalConduct.pdf
Server-based networks are higher in cost because money is invested for dedicated servers, network operating software, and network administrators with technical expertise required for network management and configuration. On a small network consisting of fewer than five workstations, client/server architecture is not recommended and is very costly.
After the introduction of client server architecture, this is used in many industries, business companies and military institutes. Its popularity is high than other software because it is provides more versatile structure.
The Chartered Institute For It Trustee Board Regulations - Schedule 3 Code Of Conduct For BCS Members, BCS, accessed 12 November 2013, http://www.bcs.org/upload/pdf/conduct.pdf
In the paragraphs that follow you will be introduced to the Code of Ethics as outlined by IEEE, and what it means to its members. A comprehensive summarization will be provided for each guideline along with examples of how this code has been recently violated. The vast world of technology, as ever-changing as it is, can affect almost everyone in any aspect of life. This being the case it is important that we as students and engineers adhere to the guidelines set forth by the IEEE, and commit to conduct ourselves to act in a professional and ethical manner. While this is the conduct expected to be exemplified by the members of IEEE, many organizations and firms have similar codes to which they too expect their members to follow.
Security concerns relating to physical security of the system placing access controls to the server room, having regular updates, data backups and installing anti-virus protection for the system.
Tavani, Herman T. "Chapter 4 :Professional Codes of Ethics and Codes of Conduct." Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Hoboken, NJ: Wiley, 2010. Print.
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.