Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
payroll management system project literature review
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: payroll management system project literature review
What type of architecture the new payroll application should use and why.
The new payroll system will utilize client/server based architecture with the use of thin clients running from a central terminal server located at the Data Center. The terminal server will communicate with the application server where the new payroll application will reside and the application server will communicate with the payroll database server.
The decision to use thin clients versus a traditional PC is based on cost, security and network traffic. According to 2X Software, A study conducted by Bloor Research shows that “Deploying thin client technology across enterprises can cut costs by up to 70%”. (2X Cloud Computing Software, 2010) There are also cost savings in software since it will run on a server environment there will not be a cost per installation.
From the security standpoint, information and data security can be improved with the usage of thin clients. As they do not have local disks or portable media drives, they are less vulnerable to anti-viruses and spy wares. Users can only store data on remote file servers and cannot copy or move critical data to a portable media. The usage of thin clients in a domain on the network makes system administration easier and safer with respect to the remote user control and system policy checking in the domain that lessens the system internal threats. (Caghan Cimen, April 2014)
As far as network traffic is concerned, the traffic used by a thin client is significantly lower than that of a PC since the workspace is on a centralized server and the traffic to the terminal is strictly input and output. The majority of the data traffic is from server to server, as in this case from the terminal server to th...
... middle of paper ...
...odes of ethics and professional conduct, which can serve as a guideline for individuals and other organizations.
Works Cited
2X Cloud Computing Software. (2010). White Papers. Retrieved from 2X Cloud Computing Software: http://www.2x.com/whitepapers/savings-thin-client-computing/
ACM Council. (1992, 10 16). ACM Code of Ethics and Professional Conduct. Retrieved from Association of Computing Machinery: http://www.acm.org/about/code-of-ethics
Caghan Cimen, Y. K. (April 2014). USAGE OF THIN-CLIENT / SERVER ARCHITECTURE IN COMPUTER AIDED EDUCATION. The Turkish Online Journal of Educational Technology, volume 13 issue 2 .
K, R. (2010, May 2). Advantages of MPLS VPN Network over Point to Point Leased Lines for WAN Connectivity. Retrieved from excITingIP: http://www.excitingip.com/707/advantages-of-mpls-vpn-network-over-point-to-point-leased-lines-for-wan-connectivity/
This organization has been setting ethical standards and publishing the Code of Professional Conduct for the profession since the early 1900s. A Code of Professional Conduct is necessary for any profession to help maintain strict ethical standards. This organization is the basis of ethical reasoning in the accounting profession because of what the Code of Professional Conduct covers. The code is comprised of a preamble and six articles. The preamble and the six articles serve as a foundation to provide guidance and guidelines for accountants to overcome any emerging ethical issues with ease on a daily basis. The six articles’ purpose is to protect the public, investors, and creditors. The AICPA Code of Professional Conduct consists of: Responsibility, Public Interest, Integrity, Objectivity and Independence, Due Care, and Scope and Nature of
I designed a program in Java which when executed, assumes the role of a company’s payroll system. It allows the company t...
Code of Ethics. (n.d.). National Society of Professional Engineers. Retrieved January 16, 2014, from http://www.nspe.org/resources/ethics/code-ethics
The Software Engineering Code of Ethics and Professional Practice is the public policy developed by the IEEE Computer Society (CS) and the Association of Computer Machinery (ACM). The IEEE-CS is dedicated to “advancing the theory, practice, and application, of computer and information processing technology.” 3 With more than 100,000 members, it hails itself as the world's leading organization of computer professionals. The ACM serves the same purpose as the IEEE-CS but also encompasses membership for computing students. Both organizations are highly respected among the engineering community and both include membership and offices worldwide.
Ethical Codes are in use today by many organizations to clearly establish their values and provide a procedure if a code violation occurs. Medical ethics began as a professional code for physicians and has now expanded and includes a variety of health care professions and health care organizations. The growth of medical knowledge and technology have grown so have the concerns that ethical standards and issues facing our society today may be compromised or not appropriately addressed (Littleton et al., 2010).
The multi-tenant applications by Saas will helps in reducing the cost, as every customers uses the common database through encapsulation. While locally hosted service will produce different database for each customer which will increase the load on system.
The codes of ethics are established to help, protect, and provide guidance to each individual professional on how to act in their respective profession and create an environment where ethical behavior is practiced and observed by everyone in the profession. By observing the code of ethics every member ensures that they are held to a higher standard when it comes to quality patient care and at the same time help eliminate bad actors in the profession. For example, every physician is held to a code of “do no harm” when it comes to patient care and every physician or medical student are required to follow this
The Code of Ethical Conduct provides professionals with a guideline as to how to address situations in the field in a profession manner by providing theory (ideals) and practice (principles) in four major areas which involve our ethical responsibility with children, families, colleagues, community and
...or ethical conduct such as professional behaviour, integrity, confidentiality, conflict of interest, code of violations and also security.
However, As we develop a web application which runs over the internet that allows teachers and students to communicate with each other and access data that are produced in one physical location, the Smart Course will be designed as a distributed system. This will provide a higher availability of services, better reliability of data and more secur...
In the paragraphs that follow you will be introduced to the Code of Ethics as outlined by IEEE, and what it means to its members. A comprehensive summarization will be provided for each guideline along with examples of how this code has been recently violated. The vast world of technology, as ever-changing as it is, can affect almost everyone in any aspect of life. This being the case it is important that we as students and engineers adhere to the guidelines set forth by the IEEE, and commit to conduct ourselves to act in a professional and ethical manner. While this is the conduct expected to be exemplified by the members of IEEE, many organizations and firms have similar codes to which they too expect their members to follow.
Brinkman, B. & Sanders, A. (2013). Ethics in a computing culture. Boston, MA: Course Technology, Cengage.
Tavani, Herman T. "Chapter 4 :Professional Codes of Ethics and Codes of Conduct." Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Hoboken, NJ: Wiley, 2010. Print.
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.
Nowadays with the implementation of new emerging technologies, the way businesses keep this financial information has become computerised. At the moment businesses use computers with a computerised accounting system in order to perform many other new activities than what they were able to do in the past. Businesses can access financial information from different department in the organisation, access to the information through computers and find financial data very fast, being more efficient. (Beliss, 2013)