CIS 155
Some Beneficial Features of the UNIX Operating System
Safety issues have always been one of the major aspects of effective operation of human beings and systems invented and implemented by individuals all over the world in different periods of human history. The rise of the personal computer in the market is another potential threat; nowadays this threat comes from the internet through computers and other devices. As stated in the study by Garfinkel, Spafford, and Schwartz (2011), “in today’s world of international networks and electronic commerce, every computer system is a potential target” (p. 3). Computers and servers store information that can be damaged or retrieved by hackers that are not interested in keeping the operating system safe and sound. As such, the UNIX operating system can be considered one of the safest for your network activities with a minimum threat to your operating system and the computer in general.
Benefits of the UNIX Operating System There are many benefits of the UNIX operating system when viewed independently or in comparison with other operating systems. It is natural that UNIX has supporters and those who oppose the use and benefits of this OS. Nevertheless, everything depends on the purposes for which the operating system is installed and the activities for which it operates. In other words, the scope of commands makes UNIX one of the cheapest and compatible operating systems on the market (Afzal, 2008). With the option of being installed on any type of hardware regardless of the brand and price, UNIX is a viable option for any information technology professional. In addition, it is important to mention that UNIX became the basis for other operating systems generally referred to as the UNIX-like ones as they use UNIX codes and are rather competitive compared to non-UNIX-like systems (Afzal, 2008). Simplicity and Origins The UNIX operating system became one of the first attempts of the information technology age to make the computer popular among average users. The contribution was made in the form of this beneficial operating system that helps people all over the world get access to the internet and surf the web for hours without being under threat of getting a virus or damage to software. It is simple and user-friendly compared to other operating systems. One of the examples of simplicity in UNIX is the Simple Mail Transfer Protocol (SMTP), “an Internet standard for transferring electronic mail between computers [implemented by UNIX] with programs or systems called Message Transfer Agents” (Garfinkel, Spafford, and Schwartz, 2011, p. 347). The overall simplicity of the UNIX operating system can be traced in all its utility programs and other supportive agents that help the system to operate effectively without application of complicated schemes and codes. In other words, the simplicity of the system makes it attractive for programmers and people working with codes and programs to be written (Afzal, 2008). So, simplicity, toolbox, democratic approach, flexibility and stability, as well as virtual memory and cheap hardware are the basis for making this operating system an attractive solution for people that need a good and reliable OS for their personal or professional purposes. Open Standards and Portability The open standards and cross-platform portability of the UNIX operating system is another great beneficial feature of this operating system. As stated in the study by Liu, Yue, and Guo (2011), “since most of the networking protocols were initially implemented on UNIX and most of the Internet services are provided by server processes running on the UNIX operating system, UNIX has a fundamental and profound influence on computer networking” (p. 316). The impact of UNIX on the development of other operating systems and the overall progress of information technology so far has been undeniable. However, it is necessary to emphasize the applicability of this operating system to a small number of computers due to the users’ preferences. Different types of machines can be considered valid for the UNIX operating system, because it is treated as highly portable. Various computing machines can host UNIX, which would be only advantageous for them. The UNIX operating system was not coined for the expensive machines with the hardware changing every six months or less and upgrades available for even higher prices. Its flexibility and cross-platform portability make it an integral part of the democratic approach used by the creators of the operating system. Main-frame and micro-computers can benefit from the UNIX operating system and all its features (Afzal, 2008). Stability of the operating system is another beneficial feature that can be treated as a competitive advantage compared to other systems, such as Windows, with regard to maintenance and related procedures. Security features as well as processing power can also be treated as beneficial features of the UNIX operating system, especially when compared to other operating systems. Prerequisite software is something pertaining to all operating systems except the UNIX operating system, because it does not require additional upgrades in terms of hardware and software being absolutely cheap in maintenance and administration (Afzal, 2008). Besides, users can use UNIX on the cheapest and simplest hardware regardless of the brand. Most effective operating systems operate on the codes designed and introduced to the market by AT&T that created UNIX and contributed positively to the development of personal computers. The UNIX operating system is aimed at solving problems in the field of information technology: It uses simple tools, agents, and codes that are free of charge and helps the users operate effectively and safely on this basis (Afzal, 2008). Application programs compared to the simple tools by UNIX are too complicated to be beneficial for users and the overall effective performance of the system. The memory of the UNIX system is protected and considered to be as secure as the overall operating system and the number of programs that can be launched with no threat or compromise to other running programs in the same instance (Afzal, 2008). The benefits of the virtual memory should be described in another section, whereas it is necessary to mention that UNIX security, customization, and controls options make users select this operating program out of dozens of other existing ones. Open standards enable the UNIX operating system to share its codes and achievements with the users and other developers. As stated in the study by Raymond (2004), “Unix is still the only operating system that can present a consistent, documented application programming interface (API) across a heterogeneous mix of computers, vendors, and special-purpose hardware” (p.8). Moreover, no other operating system can compare to its applicability and open standards as well as its cross-platform portability. Along with all other advantages of this OS, open standards attract more users that can value the portability of UNIX and its simplicity. Virtual Memory, Toolbox, and Customization The benefits of the UNIX operating system are numerous with the virtual memory and customization options as well as the authorization procedures and the general security of it all. So, the virtual memory of the UNIX operating system is on the high level: Low or medium levels of physical memory cannot compromise the virtual memory of the operating system (Afzal, 2008). So, users can launch many programs at once with no threat to the performance of the UNIX OS. The resources of the system are capable of running many programs being active which will not make the work of the entire system less effective. In other words, more complicated and proficient tasks can be performed with the help of other commands and utility programs combined in the framework of UNIX (Afzal, 2008). Files are unified to make the operation of UNIX more efficient in terms of times needed to respond to commands and costs necessary to upgrade the overall system. As such, all types of data and devices are identified by UNIX as files, making it better and more appropriate for different purposes. Access to the computer is reached only via application of valid passwords and keys that are aimed at making UNIX rather protected and security-based (Afzal, 2008). Authentication is another tool that helps the system to operate effectively. Accounts and their owners are subject to the owner of the personal computer with the UNIX operating system to decide whether he or she wants anyone else to use the computer or not. The toolbox is designed in a way that makes the operations fast and efficient. Utility programs and commands are used to perform specific tasks; so, they are created for very particular purposes. This approach is contrasted to the one when commands and utilities serve for a variety of complicated tasks rather than simple ones. In other words, the UNIX operating system can be referred to as a box with all necessary tools that carry out their tasks in a corresponding manner (Afzal, 2008). Customization enables the users to adjust the system to their needs and purposes without being designed for particular settings and menus. As such, a user owning the UNIX operating system can change the options and settings unlike the user of other operating systems with pre-configured settings. Overall, the UNIX operating system is used all over the world due to the approach selected by its developers: they made it a free-access tool that can be used by any individual that has a personal computer and needs an operating system. Main-frame computers and mini-models of personal PCs can operate on UNIX without visible or invisible threats to their effectiveness. It can be used on different platforms regardless of their origin and compatibility. UNIX is a well-documented system with everything stocked within that a user would need.
References
Afzal, A. (2008). CIS155: UNIX Operating System: Custom edition (5th ed.). Upper Saddle River, NJ: Prentice Hall/Pearson Custom Publishing.
Garfinkel, S., Spafford, G., & Schwartz, A. (2011). Practical UNIX and internet security (3rd ed.). Sebastopol, CA: O’Reilly Medis, Inc.
Liu, Y., Yue, Y., & Guo, L. (2011). UNIX operating system. Beijing: Springer.
Raymond, E. S. (2004). The art of UNIX programming. Boston, MA: Addison-Wesley Professional.
References: Afzal, A. (2008). CIS155: UNIX Operating System: Custom edition (5th ed.). Upper Saddle River, NJ: Prentice Hall/Pearson Custom Publishing. Garfinkel, S., Spafford, G., & Schwartz, A. (2011). Practical UNIX and internet security (3rd ed.). Sebastopol, CA: O’Reilly Medis, Inc. Liu, Y., Yue, Y., & Guo, L. (2011). UNIX operating system. Beijing: Springer. Raymond, E. S. (2004). The art of UNIX programming. Boston, MA: Addison-Wesley Professional.
You May Also Find These Documents Helpful
-
When beginning a discussion of computer security, a number of variables come into play. From patch availability to OS popularity, antivirus offerings, user/administrator knowledge and even physical user controls, many elements must be considered to create a computing environment that is secure. While Windows and Linux each have their advantages and disadvantages, neither operating system is, at its core, more or less safe than the other from attacks and data theft. All operating systems have vulnerabilities before they ever ship, and it is up to the administrator of those systems to maintain a level of security that protects the valuable data stored on those servers.…
- 2424 Words
- 10 Pages
Powerful Essays -
Palmer, M. (2003). Guide to Operating Systems Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 21, 2009, from University of Phoenix, CMGT440.…
- 1371 Words
- 6 Pages
Powerful Essays -
In this report I will briefly explain about the features and functions of different operating systems. I have chosen to compare windows 7 Mac OS.…
- 537 Words
- 3 Pages
Good Essays -
Programmers originally built the Unix operating system for other programmers to use. It is an extensible operating system, meaning it allows programmers to extend and change it to do anything they need it to. Essentially, it is built to multitask. It allows multiple users to use the same app or multiple users access to the same file. Although the computer cannot process all the requests at once, it does prioritize the requests to keep things orderly.…
- 680 Words
- 3 Pages
Good Essays -
Cited: Jang, M. (2011). Security Strategies in Linux Platforms and Applications. Jones & Bartlett Learning.…
- 295 Words
- 2 Pages
Good Essays -
Operating systems were not in existence before the 1960s. The definition of operating systems is a program designed to run other programs on the computer and is the most important program. In the past, computers were built to execute a series of single task similar to a calculator. In the 1960s came the MCP (Master Control Program) for the B5000 mainframe computer created by the company Burroughs/Unisys. The MCP was the first OS written exclusively in a high-level language. As the years progressed, OS giants were starting to form such as Windows, Linux, and Mac. In, this paper, these 3 tech OS giants will be examined thoroughly while covering memory management, process management, file management, and security.…
- 2010 Words
- 9 Pages
Better Essays -
Guide to UNIX Using Linux Fourth Edition Chapter 4 SolutionsAnswers to the Chapter 4 Review Questions…
- 1020 Words
- 5 Pages
Satisfactory Essays -
Overview | UNIX, the Precursor to Linux | The Introduction of Linux | General Public License and Linux | Linux Distributions | The Linux Kernel | Linux Installation | Linux Application Packages…
- 2162 Words
- 9 Pages
Powerful Essays -
The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®.…
- 2760 Words
- 12 Pages
Best Essays -
UNIX is a computer operating system originally developed in the 1960s and 1970s by a group of AT&T employees at Bell Labs including Ken Thompson, Dennis Ritchie, and Douglas McIlroy. Today's Unix systems are split into various branches, developed over time by AT&T, as well as various commercial vendors and non-profit organizations.…
- 535 Words
- 3 Pages
Good Essays -
The Internet society believe that the Internet should be used by everyone freely, meaning that the number one objective is to promote the development, security and stability of the World Wide Web. Malicious attacks such as viruses, spams, spyware and other viscous attacks on hardware and software have become well known wide spread through the web. These attacks often result in irreparable damage and abuse the very freedom the Internet principles were based on (Internet security," 2012).…
- 1786 Words
- 8 Pages
Better Essays -
Both the operating system and software applications improve the organizations ability to operate in an efficient and effective manner. There are four operating systems which include: Windows, Mac OS, Unix, and Linux. Operating systems handle data that is received, processed, saved, and backed up through application software. According to Kroenke (2012), “for business users, the most important operating system is Microsoft Windows. Some version of Windows resides on more than 85 percent of the world’s desktops and considering just business users, the figure is more than 95 percent” (p. 80). The Mac OS operating systems are primarily used by artists and workers in the arts community. Whereas Unix is used more so in the scientific and engineering communities.…
- 796 Words
- 4 Pages
Good Essays -
Dan Blacharski (Dec 2000). Unix vs. Linux, ComputerUser Inc. Retrieved July 16, 2008 from: http://www.computeruser.com/about/copyright.html…
- 852 Words
- 4 Pages
Good Essays -
The system requirements for Windows 2008 Server Edition R2 are much higher than those needed for Windows XP Home and Professional Editions. The requirements for Windows Server 2008 are a1.4GHz (x64) processor (it also…
- 4523 Words
- 19 Pages
Better Essays -
Operating systems are the link between the user and the applications and the hardware. They are responsible for deciding how the user commands will be interpreted and how the operating system itself will carry the process. There are several different types of operating and each carries out processing in their own way. Windows, UNIX/Linux and Mac are some of the most popular and widely used operating systems.…
- 1355 Words
- 6 Pages
Better Essays