HRM 3450 Chapter Notes - Chapter 11: Data Integrity, Xml
HRM 3450 Chapter 11 Notes – Summary
Introduction
Peer-to-peer computing
• Internet standards such as XML allow the easy identification of relevant data within data
streams between interconnected systems, making these applications possible and
practical.
• This type of automation is a fundamental component of modern business-to-business
operations.
• An alternative to client-server architecture is peer-to-per architecture.
• Peer-to-peer architecture treats the computers in a network as equals, with the ability
to share files and other resources and to move them between computers.
• With appropriate permissions, any computer on the network can view the resources of
any other computer on the network, and can share those resources.
• Since every computer is essentially independent, it is difficult or impossible to establish
centralized control to restrict inappropriate access and to ensure data integrity.
• Even where the integrity of the system can be assured, it can be difficult to know where
a particular file is located and no assurance that the resource holding that file is actually
accessible when the file is needed.
• The particular computer that holds the file may be turned off.
• The system also may have several versions of the file, each stored on a different
computer.
• Synchronization of different file versions is difficult to control and difficult to maintain.
• Finally, since data may pass openly through many different machines, the users of those
machines may be able to steal data or inject viruses as the data passes through.
• All of these reasons are sufficient to eliminate peer-to-peer computing from
consideration in any organizational situation where the computers in the network are
controlled by more than one individual or group.
• In other words, nearly always.
find more resources at oneclass.com
find more resources at oneclass.com