Continuous Data Protection for Better Backup
Backing up mission-critical data can become a burden to IT because data volumes are growing at 40 to 50 percent each year. Using continuous data protection, businesses can improve overall data protection without a costly solution that weighs down IT.
Register Now to Download.
Optimizing Performance of the Continuous Protection Server
The stress points that continuous data protection places on system architectures are somewhat different from traditional backup and recovery technologies. Learn how one customer characterizes these points and quantifies best practices.
Register Now to Download.
Overcoming the Challenges of Dissimilar Hardware Restore
Learn to tackle recovery to virtual computer environments, hardware migration strategies, hardware repurposing for optimal resource utilization, recovery time objectives, and increasing disaster tolerance.
Register Now to Download.
Converging System and Data Protection
Learn how to keep your business up, running, and growing in the face of threats and how to achieve efficient restoration of normal operations.
Register Now to Download.
Best Practices for Protecting Microsoft Exchange with Backup Exec
Attend this Webcast and learn how to manage your applications in an efficient manner for faster restores and minimized impact on business productivity.
Register Now to Watch.
The most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers.
For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop -- it makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system.
Operating systems can be classified as follows:
multi-user : Allows two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of concurrent users.
multiprocessing : Supports running a program on more than one CPU.
multitasking : Allows more than one program to run concurrently.
multithreading : Allows different parts of a single program to run concurrently.
real time: Responds to input instantly. General-purpose operating systems, such as DOS and UNIX, are not real-time.
Operating systems provide a software platform on top of which other programs, called application programs, can run. The application programs must be written to run on top of a particular operating system. Your choice of operating system, therefore, determines to a great extent the applications you can run. For PCs, the most popular operating systems are DOS, OS/2, and Windows, but others are available, such as Linux.
As a user, you normally interact with the operating system through a set of commands. For example, the DOS operating system contains commands such as COPY and RENAME for copying files and changing the names of files, respectively. The commands are accepted and executed by a part of the operating system called the command processor or command line interpreter. Graphical user interfaces allow you to enter commands by pointing and clicking at objects that appear on the screen.