Application Sharing

Read Complete Research Material

APPLICATION SHARING

Application Sharing



MAINTENANCE AND OWNERSHIP OF APPLICATION SHARING

APPLICATION SHARING

Document management traditionally has very structured, highly specialized systems with applications originally designed to use a narrow circle of specialists, united territorially. These systems are generally designed to work with very formal documents.

Owners of the Shared Information

The information on computer network is shared with every user therefore every user is the owner of that information. However, system administrator is present who is a senior technician and possess the skills to install, configure, and manage network elements, both hardware, and software. Administrator is also capable of handling techniques and certification of structured cabling networks. Administrator possesses the power to manage different types of networks with a strong emphasis on safety and finally with the skills to function successfully in the installation, configuration, and support of computers and peripherals (Feenberg 2000, Pp. 67-97).

The discretionary access control (DAC) model permits the owner of a resource to identify the users who can access the resource. You become the owner of the resource by either creating the resource or by being granted ownership of that resource. You grant access to the resources using access control lists (ACLs) (Harasim 2000, Pp. 39-66).

Maintenance of the Shared Information

The Internet is a universal association of shared information and data assets that belong to different people and organizations. This association is deconcentrated, and a sole obligatory group of regulations (laws) using the Internet is not installed. There are however; normally established standards of the Internet to ensure that the activities of each user on the network do not interfere with other users. Fundamental provision of these rules is as follows: rules for the use of any resources on the Internet determine the owners of these resources, and only they (hereinafter the word "resource" denotes any set of software and hardware components in one sense or another whole. Internet resources can be considered, for example, mailbox, PC, virtual or physical server, local area network, a communication channel, etc) (Harasim 2003, Pp. 19-30).

This document represents one possible formal descriptions of generally accepted rules of network interaction, considered in most networks (both within and outside the Internet directly, and are available from the Internet one way or another indirect way) binding upon all users (Harasim, Hiltz, Teles & Turoff 2005, Pp. 123-140). These or similar rules apply to all available network resources, when not known in advance the rules established by the owners of these resources yourself.

Practice shows that most Internet users expect from other users of network performance generally accepted norms, as their violation entails serious difficulties of the web, both technical, and caused by human error. When you create a document does not attempt to formulate universal rules for the purposes of the web, to duplicate the provisions of the legislation of different states, etc. The document covers only intranet standards prevailing in the international online community as a manifestation of self-preservation on the Internet.

The document's authors hope that the formalization of generally accepted norms will be useful as network administrators ...
Related Ads