The Availabilty of the Internet of Everything

1322 Words3 Pages

Introduction
The internet of everything (IoE) can be briefly described as the connection that could exist and relate people with people (P2P), machine with machine(M2M) and people with machines (P2M), this can be summarized as connection between people, processes, machines or things and data, what this also means for P2P connection is that in terms of distances, cultures it will bring people from different parts of the world together and thus making them understand each other’s difference which somehow bring the citizens of the world closer together, in terms of M2M it will allow for artificial intelligent machines to be able to maintain themselves which could result in the saving of funds and in terms of M2P it will allow for better communication between machines and people and which might result in lives being saved or certain catastrophic disasters being better prepared for. The availability of IOE mainly focuses on establishments of data centers, components of the server hardware, the server system management software, application software, disk hardware, database software, network software, network hardware, desktop hardware and also precautions that need to be focused on for every component installed during the establishment of the system and this components will allow for availability of the system and reduce downtime of the system if any should occur.
Data centers
Data centers are said to be a group of networked computer servers typicaly used by organizations for the remote storage, processing, or/and distribution of large amounts of data (Dictionary, 2014), so this will be a very important factor when the IOE is being rolled out, basically the are certain steps which need to be followed when setting up the data center, wh...

... middle of paper ...

...ducts/a/whatisadatabase.htm
M., R. (2006, july 10). About us: Search Security. Retrieved march 3, 2014, from Search Security: http://searchsecurity.techtarget.com/definition/encryption
M., R. (2007, May). About Us: Search Security. Retrieved march 3, 2014, from Search Security: http://searchsecurity.techtarget.com/definition/phishing
Stasiak M, G. M. (2011). Modeling and Dimensioning of Mobile Networks from GSM to LTE (1st Eddition ed.). Singapore: John Wiley & Sons.
T., D. (2014, March 13). About us: Business Insider. Retrieved march 13, 2014, from Business Insider: http://blogs.msdn.com/cfs-filesystemfile.ashx/__key/communityserver-blogs-components-weblogfiles/00-00-00-68-90-metablogapi/0564.image_5F00_1750E8E7.png
Turban E, V. L. (2011). Information Technology For Management improving stratergic and operational perfomance (8th ed.). New Jersey: John Wiley & Sons.

Open Document