Recent orders

Building on prior success

Building on prior success

Name

Institution

The network operating software refers to software that runs on a server. It enables the server effectively manage data, groups, users, security applications and a number of networking tasks. The main reasons for using networks is enabling the clients communicate and share available resources effectively. The majority of the servers rely on a server that is far from the minimum hardware consideration as suggested by the vendor of the software. In order to determine the optimum hardware for the server, one should put in mind some questions. Such include; the number of clients connecting to the server, applications running on the server, storage space and even what the organization or business can afford (Ciccarelli, 2013). 

The questions have varying intensity in terms of their importance in application. The most important consideration in this case is the number of applications running on the server (Ciccarelli, 2013).For instance; one can make a purchase of a cheap low-end server that Linux runs on adequately. This calls for sufficing of resource sharing and the existing simple application services. However, in order to perform advanced tasks and run resource intensive applications on a network, it requires heavy investment. This is for the purchase of servers having very high processing power and storage memory. All applications manufactured come with different processors storage requirements and RAM.

Question 1

The best operating system is The Window Server 2008. It is among the latest severs and the most current version from Microsoft. The server entered the market in February 2008. It is an improvement on the earlier version, Windows Server 2003. However, majority of the features in the older version are still visible in the new version. The windows based network operating systems are famous for their instinctive (GUI) graphical user interface. This also includes the capability of multitasking and the compatibility with a huge number of existing applications. The graphical user is a pictorial representation of the computer functions. In the case like that of network operating system, it enables administrators manage files, groups, users, printers and provision of security. The server has comes up to use with numerous editions in place. The most commonly installed editions include the standard edition, enterprise edition, web edition and the datacenter edition (Ciccarelli, 2013). 

Question 2

I would make use of the initial server as a file server. This is because there is the use of client or rather server architecture. The sharing applications are many a time shareable on a on a file server specially designed for running of applications. The sharing gives a person the ability to share resources thus reducing costs and time taken to manage resources. Preferably, using another server for security purposes is a good option. The network administrators should understand well the resources on the servers that the users have to access. These may include the privileges of viewing and executing programs from the server. They also perform a number of functions such as reading, creating, deleting, and executing files shared in data directories (Kolesnikov, & Hatch, 2002). 

In addition, the network administrators have to group the users according to the security levels and the assigned additional rights that most likely meet the needs of the groups. The server gives on the ability to establish who or what accesses what information. The individuals or workstations on new networks may access information that is available to the president, management and the team leader. The third server will best be in use as a printer server. This can increase efficiency of managing resources and ultimately reduce the operation costs of the organization. The server would take care of the print services in the work area. A printer directly can be directly having attachment to the print server or network in a location that is convenient users. Lastly, it will be worth using the last server as a remote access server (Ciccarelli, 2013). 

Question 3

The VPN (Virtual Private Network) is very advantageous for the purposes of remote access implementation. This is because it is inexpensive for a company to afford. The VPN has unique features that make it much compatible with majority of other software’s such as window server 2008 and 2003. The VPN enables the remote users to make use of a special key exchange that should certainly have authentication by the VPN. After the authentication confirmation, there is immediate authorization of a network connection. The VPN will thus allow the person to back up the important files on a regular basis. This may take place on a daily basis, weekly or even monthly depending on various circumstances playing a key role in determination. This protects in event of power failure or occurrence of catastrophic events (Kolesnikov, & Hatch, 2002). 

The other function of the VPN is the provision of additional security such as the point-to-point tunneling protocol. This encapsulates raw data and thus traversing the internet that is masked as the IP transmission. The other significant feature is the Layer 2 tunneling protocol. In this, the ends do not have to be on the same packet network switch to have the traffic flowing. L2TP hast tactics on how to correctly avoid the interpretation of frames it trying to isolate itself from traffic. In conclusion, the two fundamental designs of VPN are security and interoperability (Kolesnikov, & Hatch, 2002). 

References

Ciccarelli, P. (2013). Networking basics. New York: Wiley.

Kolesnikov, O., & Hatch, B. (2002). Building Linux Virtual Private Networks (VPNs). Indianapolis, Ind: New Riders.

ABORTION LAWS IN THE US

ABORTION LAWS IN THE US

Student’s name

Professor

Department of affiliation

Course

Date

Abortion laws in the US

Women’s rights have, most of the time, not been upheld. However, it becomes essential to look at this whole phenomenon from a different perspective with individuals like Blackmun. Since it informs us of how important women’s rights are and how they should always be upheld, and that women should not be looked down upon when expressing such desires and wishes like planning an abortion. According to Blackmun, their lives are theirs to manage, and they can do whatever they want with them. Blackmun was the judge during the case of roe V wade, and he was one of the judges who were involved in making a conclusive judgment about this case which was about abortion and if it was illegal or legal (Levine, 1999).

Therefore, the court ruled that it was upon the women to determine their extent of what they wanted to do and that the states and the federal government were not to impose their desires and their restrictions on women and what they were able to do. In planned parenthood, V Casey supreme court also upheld the decision made for Roe V Wade (Devins, 2008)). This was that the abortion laws were upheld, and a woman could procure an abortion in certain circumstances and a general manner without government restrictions. Justice Blackmun is one of the major forces within the American court system. Therefore, he provides the American culture with a lot of case judgments full of wisdom, which causes him problems as after Roe V Wade’s case, he finds himself being attacked and even being given death warnings by different people.

In becoming a justice Blackmun, we see how it is a complex situation to be working with the judicial system. This is because even legal cases could lead to personal setbacks and the creation of distant friends or even enemies. For example, justice Blackmun’s friend justice warren becomes almost a stranger due to the stand of justice Blackmun about the different cases he listens to and decides (Greenhouse, 2007). References

Devins, N. (2008). How Planned Parenthood v. Casey (pretty much) settled the abortion wars. Yale LJ, 118, 1318.

Greenhouse, L. (2007). Becoming Justice Blackmun: Harry Blackmun’s Supreme Court Journey. Macmillan.

Levine, P. B., Staiger, D., Kane, T. J., & Zimmerman, D. J. (1999). Roe v Wade and American fertility. American Journal of Public Health, 89(2), 199-203.

Build A Bear’ CEO Spokesmanship

‘Build A Bear’ CEO Spokesmanship

Name

Institution

‘Build A Bear’ CEO Spokesmanship

An organization’s spokesperson needs to answer required questions entirely, provide the crisis information clearly, and handle difficult questions proficiently. Build the bear CEO, Sharon Price John spoke about a crisis that occurred after failing to offer services to all the customers who attended the pay your age event. The CEO well performs the roles of a spokesperson by answering the questions required and explaining the cause of the problem, and the solutions put in place to avoid such challenges in the future.

According to Coombs (1996), a good spokesperson should have characteristics, including the ability to convey that the organization can control the situation and demonstrate compassion to the crisis victims. Sharon Price was well equipped with the two features. She explained the problem effectively and offered possible solutions to the public. Also, she put herself in the parents’ shoes and felt the hurt they had after the failed event. This led her to apologize to the parents and promise better services in the future.

Also, a spokesperson’s traits could be depicted through her facial and bodily expressions (Coombs, 1996). She was empathetic throughout the interview and could persuade the stakeholders of better days in the future. This was due to her calmness and ensuring the credibility of the information.

I found Sharon Price’s interview more informative and clearer than the Facebook Sheryl Sandberg spokesmanship. In her interview, she seemed nervous, and she seemed to lack answers to some of the questions. Even though she was empathetic, the crisis explanation could not be well understood, and her words and actions could not be connected.

Reference

Coombs, W. T., & Holladay, S. J. (1996). Communication and attributions in a crisis: Anexperimental study of crisis communication. Journal of Public Relations Research, 8(4), 279–295.