Overview of the System Project

Overview of the System Project
Different organization applies unique operating systems in relation to their objectives and goals in the process of meeting the needs and requirements of their clients. It is therefore crucial for the organization to adopt effective and efficient operating system that would meet the demands of the business entity with reference to tackling relevant standards of service delivery. Different operating systems perform unique roles in accordance to their specifications. The modern business environment requires implementation of technology in enhancing the performance levels of the business entities. Effective and efficient application of the operating systems in the technical aspect of the organization would foster attempts of the business entity towards achievement of the relevant goals and objectives. This is crucial towards the achievement of competitive advantage within the market and the industry. It is the responsibility of the business entity to ensure accurate and elaborate implementation of the operating software and relevant components such as backup, store, security, and licensing.
These aspects are applicable in the standalone or client server environment with the aim of addressing the needs of the organization and clients. The needs of the organization and clients are met through extensive diagnostics tests as preventive maintenance on the platforms. Effectiveness of the application of the operating systems depends on the availability of resources and technical information in relation to the components. The organization should also consider the specification of the roles of the operating systems since this would aid the activities of the components in addressing the needs and requirements of the business entity and their relevant clients. It is ideal to enhance the performance of the components of the operating systems in order to maximize the productivity levels of the organization with reference to meeting the goals and objective set at the beginning of the financial year.
Review of Operating Systems
Operating system reflects the most beneficial program that enhances the running of the digital computer. Every computer must possess operating system in order to run other programs. Operating systems execute several functions such as recognizing input from the keyboard, sending output in displaying on the screen, and keeping tracks on the files within the system. Operating systems would also enhance the performance of the computer in controlling peripheral devices such as printers and disk drives. Operating systems have maximum responsibilities in the essence of large systems. Operating systems act like a traffic cop in making sure that all programs and users run simultaneously with minimal or no interference. Operating systems are also crucial in relation to the security of the computer. In the aspect of the security, operating systems ensure that unauthorized users do not have access to the system thus enhancing the safety of the files and documentation system (Lone et al, p. 168). Operating systems can be classified as multi-user, multiprocessing, multitasking, multithreading, and real time. Multi-user operating systems enable two or more users to execute the role of running the programs at the same time. Some operating systems have the capacity to encourage hundreds or thousands of users operating at the same time. Multiprocessing operating systems enable the running of a computer program on more than central processing units (CPU). Multitasking is the ability of the operating system to run numerous programs at the same time. Multithreading is the capacity of the operating system to enable different sections of a program to run at the same time. Real time reflects on the ability of the operating system to respond instantly to directives or inputs. Operating systems also offers the platform that encourages the running of the computer applications.
The purpose of the OS
Operating system is vital in enabling users to execute things with their computers. An operating system plays a critical role in ensuring that programs and applications of the computer interact effectively and efficiently. Operating system acts the manager of the computer system. It is the responsibility of the operating system to monitor the software needs and relevant output of the hardware. Operating system locates relevant resources that are crucial in handling the computer tasks. Operating systems also enable programs to run on the computer. Operating systems reduce the need for redesigning applications that would run the programs directly. This is an indication that operating system plays the role of being the interface to the computer hardware thus crucial to the operation of the computer. This is executed through the application program interface (API) with the aim of ensuring all the programs run on the computer (Lone et al, p. 168).
Identify the use of batch; real-time or multitasking
Batch is critical in enhancing instant response by the computer systems. Batch files enable the computer system to perform real-time response in relation to the instruction by the user. Batch files are essential in dealing executing the instruction by the users. Batch files are also crucial in initiating multitasking. Multitasking is the ability of the computer to run different programs at the same time. The modern society demands a lot from users in relation to application of the computer systems. This makes it critical for organizations to adopt multitasking operating systems to initiate the running of numerous programs on the computer systems. Multitasking would enable the business entities to meet the needs and requirements of the organization and relevant clients. It is ideal for the organization to implement or install batch files in order to maximize the productivity of the computer system with reference to executing numerous instructions from authorized computer users. Batch Files would enhance the achievement of the goals and objectives of the organization in relation to tackling the needs and requirements of their consumers. Batch files would also improve the speed of the computer system thus responding adequately and effectively in accordance with the demands and instructions of the computer users. This would aid technical aspect of the organization in storing files, initiating interactions, and avoiding relapses in the process of interpreting the instructions from the relevant computer users.
Basic Functionality of each OS including
Linux is an operating system that enhances the running of computer programs in the sense of applying numerous features. Linux operating systems enable the computer systems to run programs in a multitasking way. This indicates that numerous programs run at the same time within the Linux operating system. The operating system is also vital for the influence of numerous computer users. This is an indication that the operating system is a multiuser in its classification. This makes it ideal for use by different users at the same time. It is also ideal for running in relation to different central processing units. The operating system reflects the multiplatform in the essence of promoting running of programs in different central processing units. Linux Operating Systems are also multiprocessors or multithreading (Vasile p. 80).
Mac OS X is apple’s operating system that is vital for application in the Macintosh Computer systems. The interface of this operating system is build under the influence of Unix foundation. The interface of this operating system is known as Aqua. Mac OS X offers organizations and individual users the opportunity to enjoy maximum productivity in relation to meeting the needs and requirements of the consumers. This operating system possesses features such as multitasking, multithreading, multiprocessing, and protection of the memory thus the improvement and enhancement of its performance in addressing the needs of the organizations and individual computer users.
Microsoft Windows operation systems reflect on numerous programs that initiate the running of different applications of the computer system. It is a family of operating systems for organizational and individual computer users. These operating systems dominate the world of computer technology due to their friendly aspects in relation to meeting the needs and demands of the organizations and individual computer users. Microsoft windows operating systems possess numerous features including virtual memory, multitasking, graphical user interface (GUI), and relevant support for the peripheral devices in relation to the operation of the computer systems.
File System
The file system of Linux Operating system is hierarchical in nature in that everything starts with the root directory and then expands to the sub-directories (Vasile p. 80). This is an indication that Linux puts all the relevant partitions under the main or root directory through mounting them under specific directories. This system is essential since it offers the opportunity for the computer users to choose on mounting the file structures in another partition. This is possible under minimal registry and system error in the process of moving the executable and data within the Linux Operating System.
Microsoft Windows has the capacity to support file systems in the format of NTFS 5, FAT 16, and FAT 32 (Lone et al, p. 172). The ability to support these file systems offers the opportunity for organizations and individual computer users to choose on the version to install in relation to meeting the needs and demands of the organizations and relevant clients. The filing system is associated with the registry and systems error in relation to movement of transfer of executables or data from one base to another within the operating system. Mac OS X supports the following file systems; UDF, UFS, NTFS, MSDOS, and ISO9660. This is crucial towards meeting the requirements of the organizations and individual computer users.
Security Controls on the file system
Linux adopts the use of encryption as a move towards ensuring security of the computer systems. The operating system also applies the use of authentication that involves verification of the users of the computer systems. It is also elementary for the Linux Operating system to promote the use of firewalls to enhance the protection levels thus reducing the elements of invasion from external intruders. Linux Operating system is also crucial towards limitation of spam levels thus the application of spam filters to enhance protection levels. The last aspect of protection that is applied by the Linux operating system is the intrusion detection systems. This provides the opportunity for the organization to determine whenever hackers or crackers try to invade the system (Vasile p. 80). Mac OS X and Microsoft Windows apply numerous techniques towards enhancing protection to the computer systems (Lone et al, p. 171). These features include passwords, encryption, spam filter, firewalls, and authentication. These features enable operating system to reduce essence of external intruders into influencing the running of the programs within the operating systems.
Memory Management
Memory management of Microsoft Windows, Mac OS X, and Linux have evolved in the modern society to address unique needs of the organizations and individual computer users. The management of the memory entails the creation of space for the virtual memory in relation to the three operating systems in meeting the needs and requirements of the organization and individual computer users.
Licensing
Licensing of the Operating systems in the three common attributes is similar. This is because the licensing process in Mac OS X, Microsoft Windows, and Linux operating systems requires the use of product keys. This limits the essence of intrusion by external sources in relation to the organization and individual computer users.
Backup and Restore
All the three operating systems possess unique steps in relation to backup and restoration of the files within the programming and relevant applications. This is vital to enable organizations and individual computer users the opportunity to recover their files in case of any interruption with the system. Restoration is also vital to monitor the essence of external intruders trying to access the system without authentication of the user of the computer. This reflects on the protection levels in the Microsoft Windows and Mac OS X operating systems.
Licensing
Majority of software products is licensed instead of ownership. This means that through purchase of the software does not guarantee the ownership. It is still usable under that terms dictated by the licensing agreement. This is through entitling them to an unlimited application with a certain number of installations. The tangible software is an asset protected through the contract law and the copyright. The legal right of the software application is granted through the conditions and terms dictated by the license purchased. Irrespective to the incurred price when purchasing the software, it must be manageable to enable the assurance of compliance to the contractual and legal license conditions and terms. The deployment of a software product to a device requires a license irrespective of the software use or not (Rittinghouse Pg 5).
Software license management structure
The implementation of an effectual software license framework provides the Systems Administration with a structured approach with the control and management of risks in the process of maintaining the critical asset of the clients. It is significant realizing that the process is continuous, and for its effectiveness, an equal contribution of the clients is necessary with the policy covering the regulatory requirements and the process. The framework should not lack any of these elements in order to help realize all applications to benefit the administration (Rittinghouse Pg 5).
People
They form the resources required for the completion of the necessary tasks for proper implementation of the framework with maintenance on an ongoing basis. It also requires the employee’s commitment within the system administration to handle the procedural tasks developed as part of the system framework.
Software
This is the integral part of the system software registration with policy meant for maintenance and review of the specified client machines for any illegal software. It provides the mechanism for deployment of the software automatically acting as the repository for the procedural licensing information hence enabling the protection of the system administration environment with functionality to the subscriber.
Processes
It defines the policy instructions within the framework. This is with regulatory requirements, usage of licensing registrar and detail update on the schedule of handling personal computers including the illegal software network. The formal processes being in place ensure the software supports the procedures with a structural framework for action inclusive of person identification.
Security
Information security
Accessibility to the systems administration information system is a subject to the Client System Access Request Software Policy. It is the policy under the codes and conduct proposed during the software purchase protects the information asset. This allows the clients accessibility to the requirements and clearance levels inclusive of files, internet and the applications. The accessibility and disclosure of the agreement information on the purchased software should be only in accordance to the applicable interest regulations and laws stipulated to protect the software. This is ensured through the creation of a conventional user account with detailed password. This is to ensure there is an ethical obligation to protect the client’s confidential information. The purpose of the security access register is to establish the responsibility of the user in safeguarding the purchased software and information on its application. The accomplishment of the policy requires issuance of specified system ID that is not sharable or utilizable by anybody outside or inside the client’s system administration inclusive of the staff (Rittinghouse Pg 31).
All the information printed including software microfiche, magnetic and optical storage media is a property recognized under the license policy as confidential. The client’s departmental head has the responsibility of notifying the system administration for any security breach in the event of adjustments to provisional services.
Infringement of intellectual property
The trademark, copyright and the infringement of the purchased software are strictly under prohibition. The license provided extends to the protection of the software accessibility. Copyright infringement of the software purchased in prohibited given that its ownership is still non-dependent hence treated as liability crime. The client purchases the right to apply the software on computers under the protection of federal copyright laws. The copying of the software at any given time to apply to a personal computer is an infringement. The exposure potentially to any computer virus with impact to the network of the client’s computer is an unapproved software internet downloading. The client is given the right through the license details to monitor for any possible compliance without the prior notification to the system management (Rittinghouse Pg 40).
Electronic signature
The signatures are only approvable to clients with appropriate levels of security in the specified software application module. For any given legal reasons, the client using the purchased software has to adhere to the set up criteria in support and maintenance of of signature authentication. The client agrees to the license requirements through writing and should not share outside the agreement terms (Rittinghouse Pg 40).
The breach of the given policies inclusive of sharing identifications, the access codes and the password is a violation to the terms of the purchase. This aids to the subjection to disciplinary from the system administration inclusive of access termination with violators being subject to criminal liability.
Form for user requests of IT services (URF)
First name MI Last name 4-digit PIN (personal identification number) MMDD of Birth E-mail Address Phone number

The PDM provider reviewer that does not conflict with data entry
Access administrator name Organization full name
Access Administrator Email Address Organization ID Number
Access Administrator Telephone Date

5. Backup and restore
For the BRMS to handle the performance of backups in variety, configuring defaults in the entire software system is significant. The techniques and tools available will enable the operation of backup and recovery to suite the specified client needs. During the installation of the software, BRMS registers with initialization automatically attaching to the client system platform creating a corresponding information entry. It is significant attaching the necessary devices for the client before the installation of the backup and restore media service. Addition of devices after the installation enables running of the initializing process for the registration of the new devices using BRMS. The usage of the BRMS initials (INZBRM) command is necessary in accordance to the OPTION (*DATA) parameter. The installation of the MSE (media and storage extensions) should be considerably in the clients system before the installation of the BRMS for registration to exit points (Rittinghouse Pg 106). The following diagram illustrates of how BRMS backup and recovery process through media storage labels. Control groups, policies and the software devices links up the recovery and backup process.

How What Where to Store

How What Where to Retrieve
The BRMS is applicable in setting up of the software-automated system to track the progress through the entire cycle from the initial creation through return and expiration to the availability of scratch pool (Rittinghouse Pg 125). The BRMS media service constitutes components in variety that enables the assistance in task performance including:
• Media preparation for use
• Software storage location setting for the media
• Media movement tracking to and from location of storage
• Software use, enrolment and expiration tracking through the media
The figure below illustrates of the components that may assist in the mentioned tasks.
All the components provided by the BRMS are accessible through commands or the menu of Media Management.
6. Maintenance and diagnostics
The RCM as a task established form maintenance of the specified client software enables the determination of proper maintenance strategies basing on techniques that are reliable to the system management. It is the most appropriate in solving any maintenance concern of the purchased software application with encompassing analyzed methods and procedures. The establishment for schedules to handle virus scans requires closer examination to determine the specified scanning software application particulars. The chosen scanning software application must take into account the expected cost from the system management, safety to the software and the operational consequences. The repairs must be considerably inclusive of any additional parameters (Rittinghouse Pg 206).
2b. Deliverables
STLC Stage Entry Activity Exit criteria Deliverables
Requirement analysis Requirements document available (functional and non functional)
Acceptance criteria defined
Application architectural document available Analyze business functionality to know the modules of the business and specific functionalities.
Identify all transactions in the modules
Identify the user profiles
Gather the user interface
Prep[are requirement traceability matrix
Automation feasibility analysis Signed off RTM
Test automation feasibility report signed off by the specified client RTM
Automation feasibility report
Test planning Requirement
Documents
Analyze various testing approaches, test tool selection and test effort estimation `approved test plan
Effort estimation Test plan
Test case development System design and architecture Prepare hardware and software requirement list
Finalize the connectivity requirements The test is functional and complete Environment ready
Test execution Baseline RTM
Test environment is ready Execute the planned test plan All the planned tests are executed
Defects are logged and tracked to closure Test updates with specified results
Defects report
Test cycle closure The testing has been completed
Availability of the test results
Defects logs are available Evaluation of the cycle criteria completion basing on software quality, test coverage and time
Preparation of test closure report Test closure report signed off by the specified client Test closure report
Test matrices

Works Cited
Cristian, Vasile. “Optimization of Work Performance with Linux Operating System.” Banat’s Journal of Biotechnology 1.2 (2010): 79-82.
Lone, Mohammad Ishaq, and Zahid Ashraf Wani. “Analysis of Operating Systems and Browsers: A Usage Metrics.” Trends in Information Management 7.2 (2011): 163-175.
Rittinghouse, John W. Managing Software Deliverables: A Software Development Management Methodology. Amsterdam: Elsevier, 2004. Internet resource.

Latest Assignments