Sunteți pe pagina 1din 42

Amity Business School Amity University

Project Report on Operating Systems Submitted in Partial fulfillment of ITM Course curriculum

Submitted to: Mr. Gaurav Chandiok

Submitted By: Ronak Agarwal D43 Niharika D10

1|P a ge

Contents Acknowledgemet Certificate I. II. Introduction6 Technological Aspect..9 a. History..9 b. Mainframes..9 c. Microcomputers.13 d. Types of Operating Sytem.14 e. Components16 Business Aspects.24 Research Paper and Articles.26 References...42

III. IV. V.

2|P a ge

CERTIFICATE

This is to certify that Mr. Ronak Agarwal and Ms. Niharika working in a group have satisfactorily completed Project " Operating Systems " towards the partial fulfillment of degree in MBA (Marketing & Sales) awarded by AMITY UNIVERSITY,Noida for the academic year 2011-2012.

Project Guide: Mr.Gaurav Chandok

Head of the Department: Mr. .

Sign:

Sign:

3|P a ge

ACKNOWLEDGEMENT We would like to express my gratitude to those whose insights and thoughts helped me in furthering my knowledge and understanding of my research. To begin with we would like to thank Prof. Mr. Hargovind Kakkar, Program Director who gave us an opportunity to synergize ourselves to prepare this project. We take it as my privilege to acknowledge the encouragement, guidance and the required timely help provided by Mr Gaurav Chandiok our mentor for the project. We would like to thank all our friends who have directly or indirectly contributed to our project. Ronak Agarwal Niharika

4|P a ge

Chapter 1 Introduction

5|P a ge

Introduction An operating system or OS is a software program that enables the computer hardware to communicate and operate with the computer software. Without a computer operating system, a computer and software programs would be useless. It is considered the backbone of a computer,. Operating systems are responsible for everything from the control and allocation of memory to recognizing input from external devices and transmitting output to computer displays. They also manage files on computer hard drives and control peripherals, like printers and scanners. Users can interact with the operating system through a user interface such as a command language or a graphical user interface (GUI).

Operating systems are found on almost any device that contains a computerfrom cellular phones and video game consoles to supercomputers and web servers. Examples of popular modern operating systems for microcomputers include Linux, Android, iOS, Mac OS X, and Microsoft Windows, and IBM CP-67 IBM System/360 for the mainframes.

6|P a ge

In the early 1950s, a computer could execute only one program at a time. Each user had sole use of the computer for a limited period of time and would arrive at a scheduled time with program and data on punched paper cards and/or punched tape. The program would be loaded into the machine, and the machine would be set to work until the program completed or crashed. Later machines came with libraries of software, which would be linked to a user's program to assist in operations such as input and output and generating computer code from human-readable symbolic code. This was the genesis of the modern-day operating system. However, machines still ran a single job at a time. Through the 1950s many major features were pioneered in the field of operating systems, including batch processing, input/output, multitasking etc. This started the development of OS for personal computers and giving them ability to multitask etc. Introduction of operating systems like UNI X, Windows and Mac OS caused aggressive innovations in this field.

7|P a ge

Chapter 2 Technological Aspect

8|P a ge

History In the 1940s, the earliest electronic digital systems had no operating systems. Electronic systems of this time were so primitive compared to those of today that instructions were often entered into the system one bit at a time on rows of mechanical switches or by jumper wires on plug boards. In early 1950s a computer could run only one program at a time and the limited periods were divided among people who used it turn by turn. Later machines came with libraries of software, which would be linked to a user's program to assist in operations such as input and output and generating computer code from human-readable symbolic code. This was the genesis of the modern-day operating system. The development of computers was divided into 2 forms which also divided the operating systems required to run on them: Mainframes for official and heavy works which the industry and scientists use and Microcomputers which we use at our homes which were way less powerful and did less work.

Mainframes Through the 1950s, many major features were pioneered in the field of operating systems, including batch processing, input/output interrupt, buffering, multitasking, spooling, runtime libraries, link-loading, and programs for sorting records in files. In 1959 the SHARE Operating System was released as an integrated utility for the IBM 704, and later in the 709 and 7090 mainframes. During the 1960s, IBM's OS/360 introduced the concept of a single OS spanning an entire product line, which was crucial for the success of the System/360 machines. IBM's current mainframe operating systems are distant descendants of this original system and applications written for OS/360 can still be run on modern machines. In the mid-'70s, MVS, a descendant of OS/360, offered the first implementation of using RAM as a transparent cache for data.

9|P a ge

OS/360 also pioneered the concept that the operating system keeps track of all of the system resources that are used, including program and data space allocation in main memory and file space in secondary storage, and file locking during update. When the process is terminated for any reason, all of these resources are re-claimed by the operating system. Control Data Corporation developed the SCOPE operating system in the 1960s, for batch processing. In cooperation with the University of Minnesota, the Kronos and later the NOS operating systems were developed during the 1970s, which supported simultaneous batch and timesharing use. Like many commercial timesharing systems, its interface was an extension of the Dartmouth BASIC operating systems, one of the pioneering efforts in timesharing and programming languages. In the late 1970s, Control Data and the University of Illinois developed the PLATO operating system, which used plasma panel displays and long-distance time sharing networks. Plato was remarkably innovative for its time, featuring real-time chat, and multi-user graphical games. Burroughs Corporation introduced the B5000 in 1961 with the MCP, Plato Terminal (Master Control Program) operating system. The B5000 was a stack machine designed to exclusively support high-level languages with no machine language or assembler, and indeed the MCP was the first OS to be written exclusively in a high-level language ESPOL, a dialect of ALGOL. UNIVAC, the first commercial computer manufacturer, produced a series of EXEC operating systems. Like all early main-frame systems, this was a batch-oriented system that managed magnetic drums, disks, card readers and line printers.

10 | P a g e

The enormous investment in software for these systems made since 1960s caused most of the original computer manufacturers to continue to develop compatible operating systems along with the hardware. The notable supported mainframe operating systems include: * Burroughs MCP B5000, 1961 to Unisys Clearpath/MCP, present.

* IBM OS/360 IBM System/360, 1966 to IBM z/OS, present.

IBM System/360
11 | P a g e

* IBM CP-67 IBM System/360, 1967 to IBM z/VM, present. * UNIVAC EXEC 8 UNIVAC 1108, 1967, to OS 2200 Unisys Clearpath Dorado, present.

UNIVAC 1108

12 | P a g e

Microcomputers The first microcomputers did not have the capacity or need for the elaborate operating systems that had been developed for mainframes and minis; minimalistic operating systems were developed, often loaded from ROM and known as Monitors. One notable early disk-based operating system was CP/M, which was supported on many early microcomputers and was closely imitated by Microsoft's MS-DOS, which became wildly popular as the operating system chosen for the IBM PC (IBM's version of it was called IBM DOS or PC DOS). In the '80s, Apple Computer Inc. (now Apple Inc.) abandoned its popular Apple II series of microcomputers to introduce the Apple Macintosh computer with an innovative Graphical User Interface (GUI) to the Mac OS. The introduction of the Intel 80386 CPU chip with 32-bit architecture and paging capabilities, provided personal computers with the ability to run multitasking operating systems like those of earlier minicomputers and mainframes. Microsoft responded to this progress by hiring Dave Cutler, MAC OS Equipment Corporation. The GNU Project was started by activist and programmer Richard Stallman with the goal of a complete free software replacement to the proprietary UNIX operating system. While the project was highly successful in duplicating the functionality of various parts of UNIX, development of the GNU Hurd kernel proved to be unproductive. In 1991, Finnish computer science student
13 | P a g e

MS DOS

who had developed the VMS operating system for Digital

Linus Torvalds, with cooperation from volunteers collaborating over the Internet, released the first version of the Linux kernel. It was soon merged with the GNU user space components and system software to form a complete operating system. Since then, the combination of the two major components has usually been referred to as simply "Linux" by the software industry, a naming convention that Stallman and the Free Software Foundation remain opposed to, preferring the name GNU/Linux. Types of Operating System Real Time A real-time operating system is a multitasking operating system that aims at executing real-time applications. The main objective of real-time operating systems is their quick and predictable response to events. They have an event-driven or time-sharing design and often aspects of both. An event-driven system switches between tasks based on their priorities or external events while time-sharing operating systems switch tasks based on clock interrupts. Multi-tasking vs. Single-tasking When only a single program is allowed to run at a time, the system is grouped under a singletasking system. However, when the operating system allows the execution of multiple tasks at one time, it is classified as a multi-tasking operating system. Multi-tasking can be of two types: pre-emptive or co-operative. In pre-emptive multitasking, the operating system slices the CPU time and dedicates one slot to each of the programs. Unix-like operating systems such as Solaris and Linux support pre-emptive multitasking. Cooperative multitasking is achieved by relying on each process to give time to the other processes in a defined manner. MS Windows prior to Windows 2000 used to support cooperative multitasking. Now most of the systems including current Windows are running pre-emptive multitasking kernels. Multi-user vs. Single-user A multi-user operating system allows multiple users to access a computer system concurrently. Time-sharing system can be classified as multi-user systems as they enable a multiple user access to a computer through the sharing of time. Single-user operating systems, as opposed to a multi-user operating system, are usable by a single user at a time. Being able to have multiple
14 | P a g e

accounts on a Windows operating system does not make it a multi-user system. Rather, only the network administrator is the real user. But for a Unix-like operating system, it is possible for two users to login at a time and this capability of the OS makes it a multi-user operating system. Distributed A distributed operating system manages a group of independent computers and makes them appear to be a single computer. The development of networked computers that could be linked and communicate with each other, gave rise to distributed computing. Distributed computations are carried out on more than one machine. When computers in a group work in cooperation, they make a distributed system. Embedded Embedded operating systems are designed to be used in embedded computer systems. They are designed to operate on small machines like PDAs with less autonomy. They are able to operate with a limited number of resources. They are very compact and extremely efficient by design. Windows CE and Minix 3 are some examples of embedded operating systems. Mobile Operating System Though not a functionally distinct kind of operating system, mobile OS is definitely an important mention in the list of operating system types. A mobile OS controls a mobile device and its design supports wireless communication and mobile applications. It has built-in support for mobile multimedia formats. Tablet PCs and smart phones run on mobile operating systems. Components of Operating system The components of an operating system all exist in order to make the different parts of a computer work together. All softwarefrom financial databases to film editorsneeds to go through the operating system in order to use any of the hardware, whether it is as simple as a mouse or keyboard or complex as an Internet connection.

15 | P a g e

Kernal The kernel is the central part of an operating system, that directly controls the computer hardware. Usually, the kernel is the first of the user-installed software on a computer, booting directly after the BIOS. Operating system kernels are specific to the hardware on which they are running, thus most operating systems are distributed with different kernel options that are configured when the system is installed. Changing major hardware components such as the motherboard, processor, or memory, often requires a kernel update. Additionally, often new kernels are offered that improve system security or performance. Program execution The operating system provides an interface between an application program and the computer hardware, so that an application program can interact with the hardware only by obeying rules and procedures programmed into the operating system. The operating system is also a set of services which simplify development and execution of application programs. Executing an application program involves the creation of a process by the operating system kernel which assigns memory space and other resources, establishes a priority for the process in multi-tasking systems, loads program binary code into memory, and initiates execution of the application program which then interacts with the user and with hardware devices.

Interrupts Interrupts provide a computer with a way of automatically saving local register contexts, and running specific code in response to events. Even very basic computers support hardware interrupts, and allow the programmer to specify code which may be run when that event takes place. When an interrupt is received, the computer's hardware automatically suspends whatever program is currently running, saves its status, and runs computer code previously associated with
16 | P a g e

the interrupt; this is analogous to placing a bookmark in a book in response to a phone call. In modern operating systems, interrupts are handled by the operating system's kernel. Interrupts may come from either the computer's hardware or from the running program. When a hardware device triggers an interrupt, the operating system's kernel decides how to deal with this event, generally by running some processing code. The amount of code being run depends on the priority of the interrupt (for example: a person usually responds to a smoke detector alarm before answering the phone). The processing of hardware interrupts is a task that is usually delegated to software called device driver, which may be either part of the operating system's kernel, part of another program, or both. Device drivers may then relay information to a running program by various means. A program may also trigger an interrupt to the operating system. If a program wishes to access hardware for example, it may interrupt the operating system's kernel, which causes control to be passed back to the kernel. The kernel will then process the request. If a program wishes additional resources (or wishes to shed resources) such as memory, it will trigger an interrupt to get the kernel's attention.

Memory management Among other things, a multiprogramming operating system kernel must be responsible for managing all system memory which is currently in use by programs. This ensures that a program does not interfere with memory already used by another program. Since programs time share, each program must have independent access to memory. Cooperative memory management, used by many early operating systems, assumes that all programs make voluntary use of the kernel's memory manager, and do not exceed their allocated memory. This system of memory management is almost never seen any more, since programs often contain bugs which can cause them to exceed their allocated memory. If a program fails, it may cause memory used by one or more other programs to be affected or overwritten. Malicious programs or viruses may purposefully alter another program's memory, or may affect the

17 | P a g e

operation of the operating system itself. With cooperative memory management, it takes only one misbehaved program to crash the system. Virtual Memory The use of virtual memory addressing (such as paging or segmentation) means that the kernel can choose what memory each program may use at any given time, allowing the operating system to use the same memory locations for multiple tasks. If a program tries to access memory that isn't in its current range of accessible memory, but nonetheless has been allocated to it, the kernel will be interrupted in the same way as it would if the program were to exceed its allocated memory. Under UNIX this kind of interrupt is referred to as a page fault. When the kernel detects a page fault it will generally adjust the virtual memory range of the program which triggered it, granting it access to the memory requested. This gives the kernel discretionary power over where a particular application's memory is stored, or even whether or not it has actually been allocated yet. In modern operating systems, memory which is accessed less frequently can be temporarily stored on disk or other media to make that space available for use by other programs. This is called swapping, as an area of memory can be used by multiple programs, and what that memory area contains can be swapped or exchanged on demand. Multitasking Multitasking refers to the running of multiple independent computer programs on the same computer; giving the appearance that it is performing the tasks at the same time. Since most computers can do at most one or two things at one time, this is generally done via time-sharing, which means that each program uses a share of the computer's time to execute. An operating system kernel contains a piece of software called a scheduler which determines how much time each program will spend executing, and in which order execution control should be passed to programs. Control is passed to a process by the kernel, which allows the program access to the CPU and memory. Later, control is returned to the kernel through some mechanism,
18 | P a g e

so that another program may be allowed to use the CPU. This so-called passing of control between the kernel and applications is called a context switch. Disk access and file systems Access to data stored on disks is a central feature of all operating systems. Computers store data on disks using files, which are structured in specific ways in order to allow for faster access, higher reliability, and to make better use out of the drive's available space. The specific way in which files are stored on a disk is called a file system, and enables files to have names and attributes. It also allows them to be stored in a hierarchy of directories or folders arranged in a directory tree. While many simpler operating systems support a limited range of options for accessing storage systems, operating systems like UNIX and GNU/Linux support a technology known as a virtual file system or VFS. An operating system such as UNIX supports a wide array of storage devices, regardless of their design or file systems, allowing them to be accessed through a common application programming interface (API). This makes it unnecessary for programs to have any knowledge about the device they are accessing. A connected storage device, such as a hard drive, is accessed through a device driver. The device driver understands the specific language of the drive and is able to translate that language into a standard language used by the operating system to access all disk drives. On UNIX, this is the language of block devices Various differences between file systems make supporting all file systems difficult. Allowed characters in file names, case sensitivity, and the presence of various kinds of file attributes makes the implementation of a single interface for every file system a daunting task. Operating systems tend to recommend using (and so support natively) file systems specifically designed for them.

19 | P a g e

Device drivers A device driver is a specific type of computer software developed to allow interaction with hardware devices. Typically this constitutes an interface for communicating with the device, through the specific computer bus or communications subsystem that the hardware is connected to, providing commands to and/or receiving data from the device, and on the other end, the requisite interfaces to the operating system and software applications. It is a specialized hardware-dependent computer program which is also operating system specific that enables another program, typically an operating system or applications software package or computer program running under the operating system kernel, to interact transparently with a hardware device, and usually provides the requisite interrupt handling necessary for any necessary asynchronous time-dependent hardware interfacing needs. Networking Currently most operating systems support a variety of networking protocols, hardware, and applications for using them. This means that computers running dissimilar operating systems can participate in a common network for sharing resources such as computing, files, printers, and scanners using either wired or wireless connections. Networks can essentially allow a computer's operating system to access the resources of a remote computer to support the same functions as it could if those resources were connected directly to the local computer. This includes everything from simple communication, to using networked file systems or even sharing another computer's graphics or sound hardware. Some network services allow the resources of a computer to be accessed transparently, such as SSH which allows networked users direct access to a computer's command line interface. Client/server networking allows a program on a computer, called a client, to connect via a network to another computer, called a server. Servers offer (or host) various services to other

20 | P a g e

network computers and users. These services are usually provided through ports or numbered access points beyond the server's network address. Security A computer being secure depends on a number of technologies working properly. A modern operating system provides access to a number of resources, which are available to software running on the system, and to external devices like networks via the kernel. The operating system must be capable of distinguishing between requests which should be allowed to be processed, and others which should not be processed. While some systems may simply distinguish between "privileged" and "non-privileged", systems commonly have a form of requester identity, such as a user name. External security involves a request from outside the computer, such as a login at a connected console or some kind of network connection. Network services include offerings such as file sharing, print services, email, web sites, and file transfer protocols (FTP), most of which can have compromised security. At the front line of security are hardware devices known as firewalls or intrusion detection/prevention systems. At the operating system level, there are a number of software firewalls available, as well as intrusion detection/prevention systems. Most modern operating systems include a software firewall, which is enabled by default. A software firewall can be configured to allow or deny network traffic to or from a service or application running on the operating system. Therefore, one can install and be running an insecure service, such as Telnet or FTP, and not have to be threatened by a security breach because the firewall would deny all traffic trying to connect to the service on that port. Internal security is especially relevant for multi-user systems; it allows each user of the system to have private files that the other users cannot tamper with or read. Internal security is also vital if auditing is to be of any use, since a program can potentially bypass the operating system, inclusive of bypassing auditing.

21 | P a g e

Graphical User interface Most of the modern computer systems support graphical user interfaces (GUI), and often include them. In some computer systems, such as the original implementation of Mac OS, the GUI is integrated into the kernel. While technically a graphical user interface is not an operating system service, incorporating support for one into the operating system kernel can allow the GUI to be more responsive by reducing the number of context switches required for the GUI to perform its output functions. Other operating systems are modular, separating the graphics subsystem from the kernel and the Operating System. Modern releases of Microsoft Windows such as Windows Vista implement a graphics subsystem that is mostly in user-space; however the graphics drawing routines of versions between Windows NT 4.0 and Windows Server 2003 exist mostly in kernel space. Graphical user interfaces evolve over time. For example, Windows has modified its user interface almost every time a new major version of Windows is released, and the Mac OS GUI changed dramatically with the introduction of Mac OS X in 1999.

22 | P a g e

Chapter 3 Business Aspect

23 | P a g e

Business Aspect Today there are many operating systems available in the market, UNIX, Windows; Mac OS are some of the most commonly used. Some of them are available for free to the user whereas others are to be paid for. Microsoft is one of the biggest players in the field of operating systems; more than 85% of the computers are running on windows. Entering this business is very difficult due to the extensive marketing techniques used by Microsoft to ensure that almost every new PC sold today has a copy of its latest offering preinstalled on it. Mac OS being the 2nd most used OS followed by LINUX and UNIX which are available freely and can be installed on a users pc as per his choice. Apple Mac OS and Microsoft Windows are the operating systems being used by the people worldwide in their homes, whereas LINUX, UNIX, Solaris etc are being used by corporate for running their servers and maintaining databases. Management or business requires OS which are most secure and can handle multitasking very well. A business operating system should be dependable and should perform well under any circumstances, its important due to the increasing dependence on PCs. Security is the biggest concern of a business as it has to protect the sensitive data like account details in case of a bank, or future plans concept products etc for a manufacturing firm etc. These details are confidential and are to be protected against any intrusion for which the OS should be very secure. Simplicity to use is also important for a system as it helps to reduce clutter and the users can fully utilize the PC to its potential. UNIX and LINUX are the most commonly used operating systems used as they are the most secure operating systems. One of the reasons is it not being widely used by the home pc user therefore hackers and viruses are not usually targeted on UNIX or LINUX. Along with this UNIX have various levels of securities which a person has to pass in order to open a file, each user has to have a separate account and this makes it even more secure.

24 | P a g e

Also, unlike windows which requires you to purchase a separate copy for each PC you install it on Linux allows you to install it on as many PCs as you want after purchasing a single copy, this save a lot of money for the company. Therefore, the multilevel security and even if the system is compromised no damage to root files, the low cost, the ease of use and ability to run servers better all makes them the choice for businesses.

25 | P a g e

Chapter 4 Research Papers & Articles

26 | P a g e

Operating System Paper Introduction Operating Systems have come a long way since the times of a separate windows system and Disk Operating System (DOS). Now, both systems are combined which made DOS obsolete. According to Capron (2001), An operating system is a set of programs that lies between applications software and computer hardware; it is the fundamental software that controls access to all other software and hardware resources (p. 65). Operating systems have three main functions: to manage computer resources, to establish user interface and to execute and provide services for application software. The computer would just be useless machine with no direction or purpose without an operating system. According Nickerson (2001), The most important system software is the operating system because without it computers would be extremely difficult to use (p. 31). Operating System Compatibility in the Workplace Watts-Smith and Cheng (2004) define compatibility as, The ability of all hardware and all software in one unit, such as a computer, to work together without difficulty (no pg.). As with a perfect world, there is no such thing as a perfect computer or software. There will always be compatibility issues with their set of patches and service packs to assist in the smooth operation of a computer information system. In the case of operating systems, upgrades always bring their host of compatibility problems or issues. While most compatibility issues go relatively unnoticed to the average computer user, the ones that are noticeable are extreme in nature. Too many times, previous programs which worked smoothly with the previous operating systems develop problems in speed, memory or even overall usability when upgraded to a newer version. For example, there was a large compatibility issue at work with Microsoft Office Access when the systems at work were upgraded from Windows NT to Windows 2000. An Access database that was critical to our work, which worked perfectly with Windows NT was no longer operable with Windows 2000. Therefore, a single computer had to be reconverted back to Windows NT in order to continue to work with this Access database. If this was not allowed, a vast wealth of information would have been lost forever. Now that the Government has approved the use of Windows XP, these compatibility issues are becoming less and less.

27 | P a g e

Operating system of Choice I prefer Windows XP Professional. There seems to be less compatibility issues with Windows XP than with Windows 2000 or Windows NT. In fact, the big problem which I described in one of my discussion questions was when my workplace tried to apply a service pack without testing it, happened with Windows 2000. In my opinion, Windows 2000 was a big mistake for Microsoft, which led to the immediate development and implementation of Windows XP Professional and Home editions. This nightmare cost our Government a lot of time and money. Basically, everyones system was completely down for weeks. It took many service packs, patches and correspondence with Microsoft to get the systems up and running again. Lots of valuable information was lost. On the other hand, Windows XP comes with a Program Compatibility Wizard. According to Microsoft (2001, Oct 25), You can use the Program Compatibility Wizard to test your program in different modes (environments) and with various settings. For example, if the program was originally designed to run on Windows 95, set the compatibility mode to Windows 95 and try running your program again. If successful, the program will start in that mode each time (no pg). Common Application Software At work I predominantly use Microsoft Office application software. Microsoft application software includes Word, PowerPoint, Excel and Access. Each type of application software has a particular purpose. Microsoft Word is a word processing program which allows you to produce professional documents. The program is very user friendly with a host of wizards, templates and tutorials to even allow the beginning user the ability to create professionally looking documents. The program even comes with a spell check, thesaurus and grammar check. PowerPoint is a graphic program that allows you to create professional looking presentations. You can choose from a wide host of templates and slide designs in order to create a presentation masterpiece. PowerPoint also allows the more advanced user to add sounds and animations quickly and easily. Microsoft Excel is a program designed to allow users to create complex and professional looking spreadsheets. Like Microsoft Offices other application software, this application comes with a wide variety of wizards, templates and tutorials in which to choose. Excel has pivot tables which allow the user to manipulate data within their spreadsheets. Excel can also be used for very simplistic database analysis. Microsoft Access is a relational database tool. This program allows
28 | P a g e

you to create meaningful, purposeful and complex databases, which allows for the better analysis of data. Another unique feature with Microsoft Office applications is that you can link applications. This is great feature and stops the need to reinvent the wheel every time you update data. For example, you can link a PowerPoint graph in a presentation with an Excel spreadsheet. If you update the spreadsheet, it automatically updates the graph in your presentation. As Nickerson (2001) states when differentiating between system and application software, System software helps the computer function, whereas application software helps the business or organization function (p.27). Bottom line, the U.S. Government would be lost without Microsoft Office application software. Custom Application At my work place there are various custom applications. For the purpose of this paper, I will limit it to one, the Advantor Access/Entry Control System. The Advantor Access/Entry Control System is a complex data base which controls the access of various personnel into critical facilities and restricted areas. Advantor System (2003) claims: The Advantage|Plus integrated security system is designed around a modular approach that can expand as your security needs grow. This flexible and expandable system ensures that you will always have the right security system for your needs. Remotely programmed and controlled through Advantor's Advantage Suite for Networks, this integrated intrusion detection and physical access control solution provides for total peace of mind. (no pg.)

The system basically utilizes a database which allows certain individuals access into certain facilities and areas, while restricting access to facilities and areas they are either not cleared for or do not have a required need for. The system uses a proxy card with an associated pin number in order to gain access or entry into a particular area or facility. The system also records and monitors individual entries and exits into a particular area or facility. The system quickly detects internal system problems which allows for quick maintenance and troubleshooting. The system requires its own CPU, hardware, software, peripherals and remote connections. In other words, the system is entirely dedicated to access control. If you would like to learn more about Advantor

29 | P a g e

and their products and services they provide, you can check out their website at www.avantor.com. Conclusion This paper has given an overview of some of the compatibility issues with operating systems. This is defined as the ability of software and hardware to work together without difficulties. Regardless of the hardware or software, there will always be issues of compatibility. Microsoft operating systems provide patches and system packs free of charge for those who purchase their operating systems or buy a new computer system with a Microsoft operating system. The system of choice is Windows XP Professional, which offers a Program Compatibility Wizard which allows its users to incorporate previous applications with XP if at all possible. No other Windows based operating system offers this feature. Microsoft Office application software is the all purpose software which will cover your every word processing, presentation, spreadsheet and database needs. The software is easy to use and offers a multitude of templates, wizards and tutorials. Advantor Access/Entry Control System is one type of custom software used by the U.S. Government. The system controls the access of certain individuals into critical facilities and restricted areas. The system is basically a database system dedicated to the protection National Security assets.

References Advantor Systems Incorporated (2003). Securing america's critical resources. Retrieved Nov 14, 2004, from http://www.advantor.com/plus.html. Capron, H. L. (2000). Computers: Tools for an information age. 6th ed. Upper Saddle River, NJ: Prentice Hall. Microsoft (2001, Oct 25). How to troubleshoot program compatibility issues in windows xp. (2001). Retrieved Nov 14, 2004, from MicrosoftTechNet Web site: http://www.microsoft.com/technet/prodtechnol/winxppro/support/troubleshoot.mspx.

30 | P a g e

Nickerson, R.C. (2001). Operating systems and programming. [UOP Custom Edition Series]. Information Technology. (pp. 27-60). Boston, MA: Pearson custom publishing. Watts-Smith, A. & Cheng, N. (2004). Compatibility: As in component compatibility or software compatibility. The Computer Dictionary. Retrieved Nov 14, 2004, from Cheap Computer Information Center Web site: http://www.cheap-computers-and-cheaplaptops.com/compatibility.html.

31 | P a g e

Microsoft And Windows Competitors A lot of people today, mostly microsofties, argue that Microsoft should not be split up since it isnt really a monopoly; Windows has a lot of competitors out there and some of the companies that make them are even bigger than Microsoft. And that is actually quite true: Microsoft has only about 6% of the global software market and only 3% of the global computer market overall. There are several computer companies that make more than Microsoft, like Sun Microsystems and Compaq and there are at least nine other operating systems besides Windows, some of which you could even get for free. After three decades of use, the UNIX computer operating system from Bell Labs is still regarded as one of the most powerful, versatile, and flexible operating systems (OS) in the computer world. Its popularity is due to many factors, including its ability to run a wide variety of machines, from micros to supercomputers, and its portability -- all of which led to its adoption by many manufacturers. The UNIX operating system was designed to let a number of programmers access the computer at the same time and share its resources. While initially meant for medium-sized computers, the system was soon moved to larger, more powerful mainframe computers. As personal computers grew in popularity, versions of UNIX found their way into these boxes, and a number of companies produce UNIX-based machines for the scientific and programming communities. A major contribution of the UNIX system was its portability, permitting it to move from one brand of computer to another with a minimum of code changes. At a time when different computer lines of the same vendor didn't talk to each other -- yet alone machines of multiple vendors -- that meant a great savings in both hardware and software upgrades. It also meant that the operating system could be upgraded without having all the customer's data inputted again. And new versions of UNIX were backward compatible with older versions, making it easier for companies to upgrade in an orderly manner. UNIX comes with hundreds of programs that can be divided into two classes: integral utilities that are absolutely necessary for the operation of the computer, such as the command interpreter, and tools that aren't necessary for the operation of UNIX but provide the user with additional

32 | P a g e

capabilities, such as typesetting capabilities and e-mail; the tools can be added or removed from a UNIX system, depending upon the applications required. The UNIX system is functionally organized at three levels: the kernel, which schedules tasks and manages storage; the shell, which connects and interprets users' commands, calls programs from memory, and executes them; and the tools and applications that offer additional functionality to the operating system. The kernel, the heart of the operating system, controls the hardware and turns part of the system on and off at the programmer's command. If you ask the computer to list (ls) all the files in a directory, the kernel tells the computer to read all the files in that directory from the disk and display them on your screen. There are several types of shell, most notably the command driven Bourne Shell and the C Shell, and menu-driven shells that make it easier for beginners to use. Whatever shell is used, its purpose remains the same -- to act as an interpreter between the user and the computer. The shell also provides the functionality of "pipes," whereby a number of commands can be linked together by a user, permitting the output of one program to become the input to another program. There are hundreds of tools available to UNIX users and they are typically grouped into categories for certain functions, such as word processing, business applications, or programming. LINUX, a 1991 version of UNIX, was developed by Linus Torvalds, a student at the time, and by hundreds of volunteer programmers around the world. This system can be downloaded at absolutely no charge from the Internet. Caldera is the commercial version of Linux; although you have to pay for it, the advantage is that it is almost self-installing, like Windows is (some say its even easier than Windows). Sun Microsystems has also developed a platform of its own, whose latest edition, Solaris 8 or the ".com Operating Environment", is said to raise the bar for the industry, re-defining the operating system and revolutionizing the operating system business. Suns claim that it built the backbone of the Internet is not that far from the truth, said a PC World article in May, 1999. The new features in Solaris 8 software are said to drive the five critical requirements for Internet-

33 | P a g e

based systems - scalability, availability, manageability, security and connectivity - to new heights.

BeOS is the operating system from Be, Inc. Based on an entirely new idea in computing, BeOS was designed to satisfy the higher processing and memory requirements of today's digital media on standard PC hardware, without slowing down or freezing up. say the developers. It works with audio, video, image, and Internet-based applications, and edits files of millions of gigabytes in size, simultaneously, in real-time and boots up in less than 20 seconds. A very innovative feature that BeOS brings is the fact that each application runs in its own protected memory space, so if one crashes, the system and other applications don't even notice; all you need to do is reload the crashed application. That could also be time-saving when you need to make a configuration change. Be Inc. also offers BeIA, a version of the BeOS intended specifically for internet appliances. Unfortunately, this OS isnt all that popular. Another operating system that a lot of people havent heard of is Amiga OS; Amiga is quite new to the market, 3.5 being its newest version. Some of the features offered by this new operating system are easy Internet access, a modern Graphical User Interface (GUI), extensive CD-ROM support, support for current printers, PowerPC support, and HTML online documentation. BSD/OS is a fast, scalable, multitasking, 32-bit server network platform with a small footprint, virtual memory (optional) and memory protection, with support for 768 Mbytes of RAM and up to 3.75 Gbytes of user virtual memory; it can perform on systems equipped with as little as 2 Mbytes of RAM. The new platform offers an Internet Server System using Intel, Sparc, and Alpha processors, Internet Appliance Platforms, RAID solutions, Multi-boot Workstations, and LAN/WAN products. The BSD/OS kernel is derived from the UC Berkeleys 4.4BSD release with a few other enhancements. OS/2 Warp is offered by IBM, which OS/2 fanatics claim is better than Windows 95 in everything, even ease of use. The truth is that OS/2 has more software than Windows 95, although it is harder to find in retail stores. This platform has other advantages too: it allows you to run Java applications directly on the OS instead of a browser and it includes VoiceType

34 | P a g e

Dictation (basically software that allows to speak to your computer), and Internet applications such as Telnet, FTP, and gopher.

And last, but not least, Apple Computers, one of Microsoft oldest competitors, has its own operating system to offer: MacOS. When Apple began, it brought a revolutionary product into the market, a product that was to change the way everyone worked. Computers were no longer monolithic number crunchers that could only be used by mega-corporations; through Apple computers, every business would be able to use them for a number of applications, including word processing. It was this creative surge that got Apple rolling. With first year sales of $111 million, Apple became the record breaker in corporate history. But as soon as Apple decided that it had the market under its thumb, and it no longer needed to be creative, IBM and the clone industry very rapidly took over. Mac OS X is the name of the next-generation operating system software from Apple. Apple built this all new operating system (with a new user interface that is very easy to use) using open standards, and with contributions from the open source software community. The Mac OS X is made out of three basic parts: the core OS, graphics and Aqua. Also called Darwin, the core OS, is the part that was built using open standards. At the core of Darwin is a key component called the kernel, the component that mediates most of the interaction between the operating system and the hardware; Mac OS X features the Mach 3.0 kernel, originally developed at Carnegie-Mellon University. Among others, the Darwin also features a super-efficient virtual memory manager, a memory protection architecture that allocates a unique address space for each application or process running on your Mac and advanced device support. Apple combines Quartz, QuickTime and OpenGL, three of the most powerful graphics technologies today, to enhance the graphics performance of the new internet -- built operating system. The Quartz technology provides built-in support for PDF (potable document format), which enables you to embed and manipulate PDF data with almost any Mac OS X application.

35 | P a g e

OpenGL, the 3D technology used by computer games today, is suppose to take the quality of your photorealistic graphics and games to a whole new level.

Mac OS X also includes QuickTime, the unifying format and platform for multi-source, multidestination content creation and consumption in the digital age; the engine that powers iMovie and Final Cut Pro, as the PC Magazine puts it. QuickTime is now the Internet standard for multimedia and is at the core of Apples digital video editing software; it allows you to watch live videos and create your own home videos. Aqua is the name of the new interface of the Mac operating system; it was baptized with this name because it uses such effects as depth, translucence and fluid motion. The reason for this new design is not only the appearance, which, if you ask me, would be enough by itself; the underlying reason is an ability to keep the user informed of the status of the activities on the desktop with continuous visual feedback. With all these great operating systems though, 90% of computer owners today are still using Windows. A lot of people might argue that this is a big enough figure to make Microsoft a monopoly. The argument against them is that these 90% are users who chose Windows because they thought it to be better than all the other operating systems out there and not because they did not have another choice. They do have a choice...

36 | P a g e

OS X Lion start your downloading or buy it on USB for twice as much Apples OS X Lion is available today which is big news on its own, but the companys push for digital delivery through the Mac App Store is a very interesting underlying story. Rather then buying the OS update from retailers or from brick-and-mortar Apple stores, the 3.7GB file will predominantly be sent out through Apples servers, just like any other Mac app. Apple is incentivizing the move away from physical media by pricing the digital copy at just $29.99 and making purchases quick and easy for Snow Leopard users, who are by now already familiar with the App Store. Despite the massive amount of data Apple must be moving, downloads are going smoothly and moving along at a pretty reasonable clip (from what weve seen). Of course a 4GB download isnt great news for everyoneusers who dont have broadband or on metered accounts are out of luck for launch day purchases. Apple has noted that users that are unable to download the software will be able to buy the upgrade on a USB drive for $69.99 later this August. That way they will have a physical copy and no downloading will be necessary, but some extra cost will be involved. The other option Apple floats is that buyers will be able to visit an Apple store and download it there. This probably means just hopping on their network and downloading, or possibly using one of their USB copies to install and then just getting your own serial. So why charge $40 for a 4GB USB drive? Foremost, the price differential will discourage people from buying the USB copy. Plus we can be sure that Apple wants to promote usage of the Mac App store. Once you buy a $30 OS upgrade with that account youll a) know how to use the store b) your account will be setup c) youll have an account youll want to retain with something valuable in it. Apple gets the secondary benefits of having your information on file and not having to split the profits with any sort of middleman. The download took me a little under 2 hours (see below), which isnt long to wait for an OS update. Its definitely a good way to go if bandwidth isnt an issue, but it wont be possible for everyone. If youre not a broadband user then consider a trip to your local Apple store or you can always find a place with fast WiFi where you can camp out for a bit and download it. The USB

37 | P a g e

copy of Lion will be a last resort, but for some people it will be usefuleven in the age of digital delivery some people still need old fashioned delivery methods to get the job done.

Microsoft, Behind in Mobile, Tries to Woo App Developers With Windows 8 Microsoft has a knack for comebacks. History suggests that the company is rarely first with a technology, but it is persistent and it often prevails. Steven Sinofsky, president of Microsoft's Windows division, said Windows 8 would offer developers a unique opportunity. This week, the company is trying to begin another come-from-behind campaign this time, in touch-screen tablet computing, with its Windows 8 operating system. Products using the new software are not expected until next year. But the crucial effort to woo software developers to write apps for Windows 8 starts Tuesday at a four-day conference in Anaheim, Calif. Microsoft will give away an early preview version of Windows 8 and thousands of tablets, made by Samsung, to developers at the conference, according to two industry consultants who have been told about the plans but would talk about them only if they were not named. Tablets, as well as smartphones, look to be the computing devices of the future. Sales forecasts of personal computers have been scaled back in recent months, as consumers and business people have increasingly chosen tablets. Windows 8 is Microsofts effort to get back in the game, said Michael Silver, an analyst at Gartner, a research firm. Windows 8 is intended to run on both ARM chips, which now power most tablets and smartphones, and Intel microprocessors. The goal, Microsoft executives say, is to reduce the skills that developers will need to write applications for Windows 8, which will run smoothly on both tablets and PCs. Windows 8 will provide a unique industry opportunity across hardware architectures for developers, said Steven Sinofsky, president of Microsofts Windows division.
38 | P a g e

Web developers have been impressed with Microsofts new approach. Microsoft is opening things up for Web developers, said Emily P. Lewis, a 37-year-old Web applications designer in Albuquerque. They had no choice. What I do isnt a Windows thing or an Apple thing. That approach is in contrast to Apple, which often forces developers to rewrite their applications for its new products, like the iPad, favoring innovation over stability.

Yahoo-Microsoft Deal In the spring of 2008, Microsoft made a $47.5 billion hostile offer to buy Yahoo after on-and-off talks about a merger had led nowhere. After a bruising, four-month battle, Microsoft abandoned the offer. Anger among Yahoo shareholders led to a management change and the replacement of its co-founder Jerry Yang by Carol Bartz, an outsider who is now Yahoo's chief executive. On July 29, 2009, the two companies announced a more limited deal, a partnership in Internet search and advertising intended to create a stronger rival to the industry powerhouse Google. The new Microsoft-Yahoo pact is a measured step that represents a pragmatic division of duties between the two companies. Under the pact, Microsoft will provide the underlying search technology on Yahoo's popular Web sites. The deal provides a lift for Microsoft's recent overhaul of its search engine, renamed Bing, which has won praise and favorable reviews, after years of falling farther and farther behind Google. For Yahoo, the move furthers the strategy under Ms. Bartz to focus the company on its strengths as a producer of Web media sites, from finance to sports, as a marketer and a leader in on-line display advertising that accompanies published Web sites. While Microsoft receives access to Yahoo's search technology, Yahoo receives a big bump in annual revenues, 88% of the search-generated ad revenues from its own sites for the first 5 years of the 10-year deal, much higher than is standard in the industry. After the takeover bid failed, the companies renewed talks about a partnership in the summer of 2008. The talks included a discussion of a large up-front payment from Microsoft. But when Ms. Bartz became Yahoo's CEO at the beginning of 2009, the company's emphasis shifted. She was more interested in steady revenue to ensure the longer-term financial health of Yahoo instead of
39 | P a g e

a big one-time payment. Yahoo estimates that after the partnership is fully in place, the company's operating income will increase by $500 million a year, based on higher search traffic and ad revenue, and a substantial drop in its investment in search technology. Steven A. Ballmer, Microsoft's chief executive, said that Ms. Bartz had driven a hard bargain. "Look," he said, "she got 88 percent of the revenue and none of the cost." Mr. Ballmer also said that he got something he badly wanted as well: "I got an opportunity to swing for the fences in search." When it made its initial takeover offer in February 2008, Microsoft said it wanted to buy Yahoo to compete more effectively with Google in online search and advertising, two related markets where Google is the runaway leader. Both Microsoft and Yahoo have spent billions trying to best Google in search and advertising, and both have failed so far.

Apple holding more cash than USA Apple now has more cash to spend than the United States government. Latest figures from the US Treasury Department show that the country has an operating cash balance of $73.7bn (45.3bn). Apple's most recent financial results put its reserves at $76.4bn. The US House of Representatives is due to vote on a bill to raise the country's debt ceiling, allowing it to borrow more money to cover spending commitments. If it fails to extend the current limit of $14.3 trillion dollars, the federal government could find itself struggling to make payments, and risks the loss of its AAA credit rating. The United States is currently spending around $200bn more than it collects in revenue every month. Apple, on the other hand, is making money hand over fist, according to its financial results. In the three months ending 25 June, net income was 125% higher than a year earlier at $7.31bn.
40 | P a g e

iPhone Patent Wars: Could it all End in a Truce? Smartphone and tablet developers like Apple, Samsung Electronics, Google and HTC are in court daily suing each other over patents and intellectual property violations. That's one reason why 36 percent of all U.S. patent lawsuits filed in the U.S. this year by the Fortune 100 have been in the tech sector, along with an additional 11 percent for telecommunications, according to Ocean Tomo, the Chicago-based intellectual property investment bank. That's what happened in the PC wars of the late 1980s and the 1990s, as the x86 microprocessor that fueled the explosion of PCs was fought over by co-developer Intel and Advanced Micro Devices. The two California semiconductor giants fought for years in every conceivable court and spent tens of millions on litigation. Finally, they settled, on Nov. 12, 1999, Intel and AMD cross-licensed each other and dropped the case. The deal has held ever since, although Intel expressed concern when AMD, of Sunnyvale, Calif., sold its manufacturing lines and other assets to GlobalFoundries, a holding company controlled by Abu Dhabi interests. But there may no truce this time, lawyers and bankers say, because the sector is so dynamic. As well, governments outside the U.S. are vigorously defending their intellectual property, especially in emerging markets. While the U.S. International Trade Commission plans to evaluate claims by Apple that Samsung violated its patents, it's not likely to bar Samsung from U.S. markets. On the other hand, the European Union appears to have taken a tougher line. This week, a German court issued a preliminary injunction barring Samsung from shipping its Galaxy tablets in most of Europe, accepting a complaint by Apple that it had "slavishly" copied its IP. Samsung on Friday announced it would appeal, at a hearing scheduled for Aug. 25. In the U.S., Congress has been working on patent reform but generally maintains "a laissez-faire attitude," said Ocean Tomo's Malackowski. That could mean tougher sailing down the line.

41 | P a g e

References http://www.123helpme.com/operating-system-paper-view.asp?id=159259 http://www.123helpme.com/view.asp?id=77205 http://en.wikipedia.org/wiki/Operating_system http://what-is-what.com/what_is/kernel.html http://images.google.com/ http://en.wikipedia.org/wiki/Apple_Computer,_Inc._v._Microsoft_Corporation http://www.zdnet.com/blog/bott/microsoft-vs-apple-whos-winning-the-numbers-dont-lie/2504 http://www.geek.com/articles/apple/os-x-lion-start-your-downloading-or-buy-it-on-usb-fortwice-as-much-20110720/ http://topics.nytimes.com/top/news/business/companies/yahoo_inc/yahoo-microsoftdeal/index.html?scp=2&sq=Microsoft&st=cse http://www.nytimes.com/2011/09/13/technology/microsoft-tries-to-woo-mobile-developerswith-windows-8.html?_r=1&scp=6&sq=operating%20system&st=cse http://www.ibtimes.com/articles/197141/20110812/patent-tablet-iphone-ipad-sue-lawsuit-applegoogle-samsung-ip.htm

42 | P a g e

S-ar putea să vă placă și