Deadlock Avoidance Top Secret, Inc. Essay

Exclusively available on IvyPanda Available only on IvyPanda

According to the script, The Top Secret, Inc. Operating System (TSI OS) provides high-quality services to a large number of customers from a variety of industries. However, problems identified at the company’s back office might reduce the efficiency of the company. The main issues of the work of headquarters are the reason for the business-related challenges including technological lag, the urgent need to switch to modern hardware, and security vulnerabilities.

We will write a custom essay on your topic a custom Essay on Deadlock Avoidance Top Secret, Inc.
808 writers online

Several business-related challenges can be located for the organization because TSI OS support for the general-purpose operating system (GPOS) is not modern. According to the provided matrix, TSI faces severe difficulties in optimizing its labor, which manifests itself in the inability to run more than one program at the same moment, software incompatibility, and the need to regularly reboot operating systems as a result of errors associated with insufficient memory. Moreover, TSI software developers are forced to work in limited conditions related to creating custom device drivers and storing information on primitive media. Sadowski et al. (2018) provide an example of work processes in Google, in which a lot of attention is paid to multitasking and the ability to respond to changes quickly. Lack of technologies will not allow TSI to react rapidly to changes in the market and meet new needs of customers, which is essential to maintain competitiveness in IT technologies.

Timely updating of the working equipment is one of the critical factors in a large company’s success. In the conditions under which TSI needs to use old single-core processors, several difficulties arise at once. First, each new hardware generation is more productive than the previous one (Serre and Püschel, 2019). Second, the use of outdated technologies leads to a decrease in the company’s efficiency: over time, an increasing part of the workflow will have to be spent on fixing and replacing old processors. In conditions of using inadequate quality working equipment, depreciation costs will continuously grow, and labor efficiency will fall, which eventually will lead to the loss in the quality of the final product and systemic processing of company employees.

Besides, TSI’s main product is the operating system, which is the subject of the company’s intellectual property and is associated with industrial and commercial secrets. The security system’s significant issues can lead not only to the theft of technologies by competing companies but also to the leakage of information about the TSI customers (Stergiou et al., 2018). Given the high status of most of the company’s clients, this kind of vulnerability can cause irreparable damage to the company’s reputation.

The aforementioned shortcomings of the TSI production process would negatively affect the personal level of productivity. The inability to work on modern equipment would lead to the fact that instead of performing work or educational tasks, a person spends the vast majority of his time correcting errors. The use of the latest technologies, especially in the IT field, is a prerequisite for sufficient work.

A lack of technological features of modern operating systems leads Top Secret, Inc. to face some problems associated with managing a business. Features such as working on old equipment, the inability to optimize the workflow, and security vulnerabilities can severely negatively impact the company. In a high-tech business environment, the latest advances in hardware and software development should first of all be implemented by manufacturing companies. Otherwise, the competitiveness of such firms will rapidly decline.

References

Sadowski, C., Söderberg, E., Church, L., Sipko, M., & Bacchelli, A. (2018). . In Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice (pp. 181-190). Web.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Serre, F., & Püschel, M. (2019). . ACM Transactions on Reconfigurable Technology and Systems (TRETS), 13(1), 1-23. Web.

Stergiou, C., Psannis, K. E., Gupta, B. B., & Ishibashi, Y. (2018). . Sustainable Computing: Informatics and Systems, 19, 174-184. Web.

Print
Need an custom research paper on Deadlock Avoidance Top Secret, Inc. written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, February 21). Deadlock Avoidance Top Secret, Inc. https://ivypanda.com/essays/deadlock-avoidance-top-secret-inc/

Work Cited

"Deadlock Avoidance Top Secret, Inc." IvyPanda, 21 Feb. 2022, ivypanda.com/essays/deadlock-avoidance-top-secret-inc/.

References

IvyPanda. (2022) 'Deadlock Avoidance Top Secret, Inc'. 21 February.

References

IvyPanda. 2022. "Deadlock Avoidance Top Secret, Inc." February 21, 2022. https://ivypanda.com/essays/deadlock-avoidance-top-secret-inc/.

1. IvyPanda. "Deadlock Avoidance Top Secret, Inc." February 21, 2022. https://ivypanda.com/essays/deadlock-avoidance-top-secret-inc/.


Bibliography


IvyPanda. "Deadlock Avoidance Top Secret, Inc." February 21, 2022. https://ivypanda.com/essays/deadlock-avoidance-top-secret-inc/.

Powered by CiteTotal, free essay citation creator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1