Sunday, January 20, 2019
Differences in Programming Language
Answer The signifi ordurece of the programme knowledge for the company is in truth great since the correct choice impart ensure proper connectivity, accessibility, reliever of sustainment and the complexity of the software (Vine, 2005). Certain broad get hold ofments sand tooth be obtained from the transcript of the conversation between Hugh McBride of McBride Financial Services and Abram LaBelle of Smith Systems Consulting who discussed the electronic reckoner network needed for McBrides planned offices. By programming language, we mean(a) the check of instructions that are written and c solelyed a program and the computer processor carries out the instructions. The signifi sensce of the programming is felt on the t distributivelying and fear cost, ease of use, easy availability of the application from different points, rush along of access, features that empennage be provided in the application.A programming language much(prenominal)(prenominal) as Visual Basic is q uite easy to learn and implement only when the language does not all(a)ows for complex computations such as forecasting, gathering information, creating reports, and so on To perform complex operations, algorithms would have to be used and programming languages such as C++, C, and others are real much suited. further the cost of development and maintenance would be signifi open firetly higher. These languages are called as OOPS Object Oriented Programming Languages and they write the code around the info that has to be processed. In a majority of the cases, OOPS applications run on sacred Intranets or WANs.The other set of programming languages are the blade establish languages such as Java, .NET, HTML, PHP, etc. These languages allow the application to be web based and the software used is usually freely download fit. Another set of programming languages are centred around Unix and Linux operating systems. These are usually propagate source solely really complex and requ ires a dedicated teams of developers and maintenance personnel (OBrien, et all, 2005).2. Differences in Web Based and WANs programming languages.Answer There are two broad requirements, one is the website that customers, sales provide and brokers would be victimisation and the other is the back fetch up application that the staff would be using to complete their accounting and other tasks. The first possibilities is having a WAN that will have dedicated terminals, which usher out be placed in all the required areas. The terminal will be directly connected to a interchange server and since it is dedicated, only the Intranet of McBride Financial Services can be accessed. This kind of a system can be seen in ATMs and would require the application to be written in C++, have the exploiter interface written in Delphi or other front end languages.The system would be connected to a powerful database that would be able to handle hundreds of connection requests. Systems written in C++ ar e very stable, crashing of the system is very rare, system response is very fast and some important since it is a dedicated Intranet, hacking is not possible and can be immediately detected. But the development cost of such systems is huge, it becomes very complex, in house software programmers are required and software programming is not a core business area of McBride Financial Services. Another alternate is to have a web based system that is written in Java or .NET. These systems alike requires expensive programming but aft(prenominal) the software is implemented, it can be easily maintained by lesser expensive teams who are not skilled enough for programming but can set right small bugs and maintain the database.The case withal requires a powerful database into which information can be uploaded and downloaded as required. In both possibilities, the database would remain same and only the call procedures would be different. Since protective cover is a major concern, very st rict certification should be forced. For each connection request, the IP number of the computer should be verified and this can be done through web-based languages. Cookies should not be stored in the customer computer and this prevents the possibility of another person getting information from universal computers (Turban, et all, 2002).3. Recommendation for the applicationAnswer A web-based system is recommended since such a system can be accessed from anywhere in the world. A system written in Java or .NET can be implemented. Such programming languages can be easily maintained and less expensive and the work of maintenance can be outsourced as per the standard industry practice where back office operations are outsourced to reliable parties at lower costs. The database can be either Oracle or IBM WebSphere since both have connectivity to the earnings and are web servers. Such servers have the optimum speed and in that location are lesser instances of slow speeds. Customers c an access the application from cyber cafes, K Mart and other department stores and view the choices for financial plans.An online calculator can be provided that will calculate the amount, premium, interest rates, etc. and customers can also provide their personal information. By using 128 bit encryption for authentication as used by PayPal, the chances of hackers getting into the system are very remote and this system can be stored in a central server. Employees will log into another server which will fetch data from the customers server and carry out their tasks. A robust gateway can be provided between the two servers and this further reduces hacking possibilities.To prevent the chances of crashes and data loss, it is recommended that mean solar day to day records be cached in mirror servers and this data can be written either dynamically or once in 12 hours. In the case of system crashes, data can be recover from the mirror servers. To further prevent data loss, tape backups c an be taken periodically and stored in Storage Area Networks. By providing such a system, customers and even staff can access the system from anywhere and use secure login and authentication. If there is an unusually high suspicious operation in the network, then this can be seen as a hacking endeavour and the system can be stopped either manually or through programs. Web based application will ensure that all the requirements are met (Olson, 2006). 
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment