blog




  • Essay / The Availability of the Internet of Things - 1322

    IntroductionThe Internet of Things (IoE) can be briefly described as the connection that could exist and connect people to people (P2P), machines to machines (M2M) and people with machines. (P2M), this can be summarized as a connection between people, processes, machines or objects and data, what it also means for P2P connection is that in terms of distances and cultures, it will bring together people from different parts of the world and create thus they understand each other's difference, which in one way or another brings the citizens of the world closer together, in terms of M2M this will enable artificial intelligent machines to be able to maintain, which could result in savings of funds and in terms of M2P, it will allow better communication between machines and humans and which could save lives or better prepare for certain catastrophic disasters. IOE availability mainly focuses on data center establishments, server hardware components, server system management software, application software, disk hardware, database software, network software , network hardware, office equipment as well as precautions to focus on. for each component installed during system establishment and these components will enable system availability and reduce system downtime where applicable. Data Centers Data centers are called a group of networked computer servers generally used by organizations for the remote storage, processing and/or distribution of large amounts of data (Dictionary, 2014), so it will be a very important factor when deploying IOE. Basically, there are certain steps that need to be followed while setting up the IOE. data center, wh...... middle of paper ......ducts/a/whatisadatabase.htmM., R. (July 10, 2006). About Us: Security Research. Retrieved March 3, 2014, from Search Security: http://searchsecurity.techtarget.com/definition/encryptionM., R. (May 2007). About Us: Search Security. Retrieved March 3, 2014, from Search Security: http://searchsecurity.techtarget.com/definition/phishingStasiak M, GM (2011). Modeling and sizing of mobile networks from GSM to LTE (1st edition ed.). Singapore: John Wiley & Sons.T., D. (March 13, 2014). About us: Business Insider. Retrieved March 13, 2014 from Business Insider: http://blogs.msdn.com/cfs-filesystemfile.ashx/__key/communityserver-blogs-components-weblogfiles/00-00-00-68-90-metablogapi/0564. image_5F00_1750E8E7.pngTurban E, VL (2011). Information technologies for management improving strategic and operational performance (8th ed.). New Jersey: John Wiley and Sons.