Nt1330 Unit 9 Final Paper

Improved Essays
MidTerm Exam
Question 1 Cloud computing is open space where you can place all our music and videos at one place. We can listen to the music, play video games and watch videos from anywhere and not necessarily connect to the computer. So, after turning off computer we can listen to music and watch videos through other device.
Question 2
(c)
Maintenance: First of all, you do not have to spend more money on the high ended hardware devices to store and retrieve your data. All the hardware and software would be handled by the cloud providers and you need not worry about setting up new hardware or installing/upgrading software’s. Moreover I have read in an article that the applications installed in the cloud are multitenant in nature which means that the same is shared by all the customers thus the setup and maintenance costs are all distributed among the customers which narrowly cuts down all the maintenance/support costs.
Security:
If we
…show more content…
Safety essentially says consensus not violated which means two process does not end up deciding with different values. Where liveness says that process decides a value. Paxos works in round wise. Here each round consist three phases. The first phase is election phase where the leader is elected, the second phase is build phase in which leader proposes a value and other process acknowledges this value and finally third phase is law phase where the leader finalizes the value . For instance process might fail and the majority not include in this case when the process restart it uses log to retrieve the last decided value and continue with the protocol. when leader crashes the other process wait for timeout then other process makes itself as a leader and try to coordinate transaction. Here the problem occur when two leaders proposes different value then paxos assigns orders to the leaders to distinguish current and older

Related Documents

  • Improved Essays

    My first research experience started when I participated in bone scaffold designing project at the Cooper Union in Spring 2012, under the supervision of professor David Wootton at Cooper Union Department of Mechanical Engineering. The purpose of this study was to design and manufacture bone scaffold for orthopedic trauma, especially for segmented bone fracture. I worked with a senior mechanical engineering student who had been conducting the research as his senior capstone project. The first task was to test manufacturing efficiency of two different types of polycaprolactone (PCL) with different average molecular weight. I concluded that the low molecular weight PCL is more convenient for mold-casting fabrication, due to low viscosity, while the high molecular weight PCL has an advantage of being mechanically stronger than the brittle…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The Aegis Secure Key 3.0 has military grade full disk AES 256-bit XTS hardware encryption and is FIPS 140-2 Level 3 validated. You unlock the drive by entering your 7-16 digit PIN before you connect it to your device that way hackers cannot use software on your device to capture your password, and it automatically locks when you unplug it. If an incorrect password is typed 20 consecutive times all the data and the encryption key are erased. It is also dust and water resistant as well as a wear resistant keypad to hide key usage and to help prevent hackers from knowing the commonly used keys. This USB is a Super Speed USB 3.0 that has data transfer rates of 195 for read and 162 for write.…

    • 351 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The new Mercedes-AMG GLC 63 has been spotted on mule testing recently almost undisguised. This trim is going to join compact SUV competition on auto market. Even though the details are not complete yet, there are several changes found on the tested vehicle. Here is the update on it. Power and Specs Under that long hood, the SUV will be empowered by twin turbocharged V8 4.0 liter engine that produces up to 503 hp of power output with 516 lb-ft of torque performance.…

    • 401 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The date for my sister’s engagement party was fast approaching. It was two years before her wedding, and she also has acne prone skin. She decided to look up a dermatologist and found one that she thought would suit her needs. After seeing the regimen done on my sister, and how her skin reacted. I had changed my dermatologists to the same one as my sister.…

    • 415 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Paper

    • 985 Words
    • 4 Pages

    Recommended Kernel Custom kernel can be fantastic for organizations that need to utilize only one or minimum services and applications for their organization. Open source codes of Linux distributions make it possible for Linux administrators to configure kernels for exactly what the company needs. The downside to this is that you would have to employee a Linux administrator adequate enough to configure and update Linux for the company full time.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The Notorious B When you walk past the toy aisle at a store what do you see? Usually there are aisles that you look down and see nothing but a sea of pink. Why is this? Why do certain products lean toward certain genders? Companies often do this to target a certain audience and increase sales.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    5.2.3Direct Access DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 354 Words
    • 2 Pages

    HIE provides the capability to electronically move clinical information among disparate healthcare information systems, and maintain the meaning of the information being exchanged. (HIMSS Dictionary of Healthcare Information Technology Terms, Acronyms and Organizations, Third Edition) 11)) 1) 1. What sorts of HIEs are there? 2. How are protection and security of patient wellbeing data guaranteed?…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    I have to agree with you that waterway ports are the busiest at the same time I do not believe that are the hardest to secure. Living here in Jacksonville, FL I have several ports around me. There is Jacksonville Port Authority (Jaxport) that controls three cargo terminals, a cruise terminal and an intermodal rail terminal. Blount Island (controlled by the Marines) is one terminal that I am familiar with because of the military. This facility has some of the tightest security even more than some operational bases.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Task 1 In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system. Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    How to Configure a VPN Connection in Windows 8.1 A VPN is one common method of extending a private network across the Internet and gain access to network resources from a remote location in a secure manner. A virtual private network (VPN) is a private network that uses public telecommunications infrastructure, usually the Internet, to connect to a private network, such as a company's internal network infrastructure. A VPN remains private by using a secure tunneling protocol and other security mechanisms including encryption. This ensures that only authorized users can access the private network and that the data cannot be intercepted by anyone else. A virtual private network makes it possible to have the same privacy and protection when sharing network resources across WANs.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Application / Files sharing between computers Windows Homegroup Windows home networking has been extremely complicated to configure in the past, but Homegroup is easy to set up. Just create a Homegroup from the Homegroup option within Windows Explorer (File Explorer on Windows 8) and you’ll get a password which enables you to access fromyour nearby computers and they can join your Homegroup. The other members of the Homegroup will now have access to your shared files when they log ON to the same network — then you may select the libraries whichever you want to share while you create a Homegroup. Dropbox LAN Sync Many people exchange files between their computers by synchronising them with any one of the cloud storage solutions like Dropbox, Google Drive, or SkyDrive. This can take a while — the file first gets uploaded to your cloud storage provider’s servers and then it gets downloaded back to your other computers.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Mid-Term Exam 1) Tom and Jerry are two friends with 10 and 2 toys each. If more friends come to visit Jerry, he may have to buy more toys, while Tom is not using his toys. So, Children keep all their toys in one big box and use them. This common big box is cloud computing. 2) I believe that “Maintenance Costs will be lower with cloud computing”.…

    • 1100 Words
    • 5 Pages
    Improved Essays