895 research outputs found

    The design and implementation of a local area network configurational audit tool

    Get PDF
    Configurational audit deals with identifying oversights or omissions in the use of otherwise secure computer security controls. Over the past decade, these errors, and the system vulnerability they create, have featured in many successful computer system attacks. Often, such vulnerability is easily introduced to systems, but difficult to manually detect. This thesis deals with configurational audit tools, which are used detect such vulnerability; an overview of technical vulnerability, as well as the field of configurational audit, are provided. A configurational audit and conformance tool called NetAudit is described. This tool, designed for the Novell NetWare 3.1x LAN operating system, uses conformance testing as its primary means of detecting vulnerability. The design and implementation of NetAudit are described, and the effectiveness of conformance testing as a means of performing configurational audit is assessed

    CD-ROM networking in libraries : an investigation

    Get PDF
    There is a growing awareness of the advantages of the applications of CD-ROM networking in libraries. The databases can be effectively shared among multi-users simultaneously or within the library or the organisation or several libraries. The CD-ROM technology is discussed to provide basic understanding of the technology. This will further improve the understanding of CD-ROM networking. The CD-ROM networking technology is thoroughly discussed to provide an in-depth information of the technology. The cabling system; network topologies; CD-ROM network software; network operating system; case studies of its application in various libraries etc. are investigated

    Is There a Market for Work Group Servers? Evaluating Market Level Demand Elasticities Using Micro and Macro Models

    Get PDF
    This paper contains an empirical analysis demand for "work-group" (or low-end) servers. Servers are at thecentre of many US and EU anti-trust debates, including the Hewlett-Packard/Compaq merger and investigationsinto the activities of Microsoft. One question in these policy decisions is whether a high share of work serversindicates anything about shortrun market power. To investigate price elasticities we use model-level panel dataon transaction prices, sales and characteristics of practically every server in the world. We contrast estimatesfrom the traditional "macro" approaches that aggregate across brands and modern "micro" approaches that usebrand-level information (including both "distance metric" and logit based approaches). We find that the macroapproaches lead to overestimates of consumer price sensitivity. Our preferred micro-based estimates of themarket level elasticity of demand for work group servers are around 0.3 to 0.6 (compared to 1 to 1.3 in themacro estimates). Even at the higher range of the estimates, however, we find that demand elasticities aresufficiently low to imply a distinct "anti-trust" market for work group servers and their operating systems. It isunsurprising that firms with large shares of work group servers have come under some antitrust scrutiny.demand elasticities, network servers, computers, anti-trust

    Heterogeneous internetworking model with enhanced routing security and management functions

    Get PDF

    Networking vendor strategy and competition and their impact on enterprise network design and implementation

    Get PDF
    Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; in conjunction with the Leaders for Manufacturing Program at MIT, 2006.Includes bibliographical references (leaves 93-99).While a significant amount of literature exists that discuss platform strategies used by general IT vendors, less of it has to do with corporate networking technology vendors specifically. However, many of the same strategic principles that are used to analyze general IT vendors can also be used to analyze networking vendors. This paper extends the platform model that was developed by Michael Cusumano and Annabel Gawer to networking vendors, outlining the unique strategic aspects that the networking market possesses. The paper then reviews the strategy of the first dominant corporate datacom vendor, IBM, how it achieved its dominance, and how it lost it. The paper then discusses the strategies of various vendors who attempted to replace IBM as the dominant networking platform vendor and how they failed to do so. Finally, the paper discusses Cisco Systems, a vendor who did manage to achieve a level of dominance that parallels IBM's, and how that company has utilized its strategy to achieve and maintain its current dominance. Finally, Cisco's current strategic challenges are discussed. The impact of the strategies of the various vendors on the evolution of corporate networking is also discussed.by Ray Fung.S.M.M.B.A

    Implementation of a Network Intensive Management Information System Major

    Get PDF

    Functional requirements document for NASA/MSFC Earth Science and Applications Division: Data and information system (ESAD-DIS). Interoperability, 1992

    Get PDF
    These Earth Science and Applications Division-Data and Information System (ESAD-DIS) interoperability requirements are designed to quantify the Earth Science and Application Division's hardware and software requirements in terms of communications between personal and visualization workstation, and mainframe computers. The electronic mail requirements and local area network (LAN) requirements are addressed. These interoperability requirements are top-level requirements framed around defining the existing ESAD-DIS interoperability and projecting known near-term requirements for both operational support and for management planning. Detailed requirements will be submitted on a case-by-case basis. This document is also intended as an overview of ESAD-DIs interoperability for new-comers and management not familiar with these activities. It is intended as background documentation to support requests for resources and support requirements

    InfoTech Update, Volume 3, Number 1, Fall 1993

    Get PDF
    https://egrove.olemiss.edu/aicpa_news/4946/thumbnail.jp

    The medium is NOT the message or Indefinitely long-term file storage at Leeds University

    Get PDF
    Approximately 3 years ago we implemented an archive file storage system which embodies experiences gained over more than 25 years of using and writing file storage systems. It is the third in-house system that we have written, and all three systems have been adopted by other institutions. This paper discusses the requirements for long-term data storage in a university environment, and describes how our present system is designed to meet these requirements indefinitely. Particular emphasis is laid on experiences from past systems, and their influence on current system design. We also look at the influence of the IEEE-MSS standard. We currently have the system operating in five UK universities. The system operates in a multi-server environment, and is currently operational with UNIX (SunOS4, Solaris2, SGI-IRIX, HP-UX), NetWare3 and NetWare4. PCs logged on to NetWare can also archive and recover files that live on their hard disks

    QUALITY MANAGEMENT OF HOTEL INFORMATION SYSTEM

    Get PDF
    An information system is the basis of a hotel as a business system. Its role is to improve the processes involved in performing, managing and strategically planning business operations. It enhances the intangible features of services and increases process and service quality through improvements and innovations. As a business system, a hotel consists of a number of interrelated subsystems. A feature of modern hotel operations is the existence of an integrated hotel information system through the use of computers. This system comprises several components (Hardware, Software, Orgware, Lifeware, Netware and Dataware) that must all possess the same level of quality. Only by continuously analysing the quality and alignment of all components is it possible to gain insight into the global quality of a hotel information system and to ensure a more efficient management process. This paper presents the results of a survey conducted among 72 hotel managers from Croatia concerning the importance of the individual components of a hotel information system
    • 

    corecore