Saturday, December 28, 2019

Self Assessment Teamwork Assignment Teamwork Essay

Self-Assessment Teamwork Assignment 5 Teamwork strategies In every organization, teamwork should be a term very emphasized among all the members. However, a company should have the tools and willing to motivate its employees towards a teamwork formation within the organization. Therefore, the company should acknowledge the correct incentives that are applicable to build a motivational environment where the people feel free to express ideas, and feel empowered to lead others to a common goal; a place where they feel valued and important for the development of the company, and also, well compensated. After providing incentives to employees that are part of a group within a company, there are strategies and tactics needed to build that group into a teamwork where all the individual goals align toward the organization objectives. The strategies for building teamwork are as follows: - Get qualified members. People in teamwork should be excited and willing to succeed; conscientious, extraverted and knowledgeable people with that spark needed to get a good performance towards the proposed goals. - Be well motivated yourself. All leaders should be role models, so, in order to motivate others, managers and leaders should show up their motivation. - Have urgent, constructive purpose. The members of the team should acquire an urgent behavior in a constructive manner. Demanding performance keeps the team motivated to achieve goals. Also, rewards should be part of the challenges. -Show MoreRelatedManagement Skills Development Assignment : Self Explanatory1355 Words   |  6 PagesBackground Information The MSDA The Management Skills Development Assignment is self-explanatory. In order for Schulich students to fulfill the requirements to be successful in the work place, they must identify their weaknesses and work towards improving them. The MSDA is a learning platform that offers a variety of ways to develop a management skill that affects both teamwork and leadership. In order to develop this skill, Dr. Jean Adams has created a platform that merges content and context withinRead MoreLeadership Teamwork In The Public Serv1685 Words   |  7 PagesDEPARTMENT OF SPORT PUBLIC SERVICES Edexcel Extended Diploma in Public Services Unit 2: Leadership Teamwork in the Public Services Assessment and grading criteria To achieve a pass grade the evidence must show that the learner is able to: To achieve a merit grade the evidence must show that, in addition to the pass criteria, the learner is able to: To achieve a distinction grade the evidence must show that, in addition to the pass and merit criteria, the learner is able to: P1 describe theRead MoreThe Canadian Workplace Culture : Meeting And Greeting866 Words   |  4 Pages Assignment #3: Canadian Workplace Culture Meeting and Greeting: Canada is a highly diverse country that comprises people from different cultural background, therefore, we need to be mindful and cautious about the way we extend greetings to people. When extending greetings to people, it is important to say good morning, or hello, and how are you doing today? More importantly, introduce oneself, while demonstrating a positive body language to avoid misinterpretation of our non-verbal languages becauseRead MoreHardens Curriculum Questions938 Words   |  4 PagesEmergency disaster pharmacy. To achieve these needs the graduate should be able to acquire good communication and teamwork skills in hospital setting as well as good managerial skills in military and disaster toxicology settings. 2. What are the aims and objectives? The Toxicology course aims and objectives serve - To teach principles of general toxicology and risk assessment, - To identify and describe important toxic responses in human body organ system, - To describe the important environmentalRead MoreEmpathy, Teamwork And Diligence Sounds Like The Perfect Formula For A Nurse1251 Words   |  6 PagesEmpathy, teamwork and diligence†¦ sounds like the perfect formula for a nurse to be able to tackle daily occurrences in the field. The diversity in patients, coworkers and environments allow for a large gap in what is normal for a nurse. Being able to take on that variety with compassion, collaboration and a careful yet hard work ethic is a task difficult in any profession. Great nurses are those who are able to incorporate these traits within their caring, planning and implementation towards theRead MoreCommunication and Conflict Resolution Case Study941 Words   |  4 Pagesdata entry errors are slowing production and payment for the doctor. As head of the billing department, I am leading you in a problem-solving team to resolve this issue. Communication skills needed The most important and fundamental aspect of teamwork is communication. Communication in a team setting means creating an environment in which every team member feels encouraged and supported to say what he or she think, so that all good ideas are shared and on the table. We also need to ensure thatRead MorePerformance Evaluation : Performance Evaluations Essay961 Words   |  4 Pagesspecific criteria and ensuring honest participation. For instance, one can rate each team member base on the following rubric: †¢ Participation. How well did the individual contribute to the project? Did he or she contribute a fair share to weekly assignment? †¢ Teamwork. How effectively did the individual work with other team members? Was the contribution considered positive or negative? †¢ Communication. How did the individual interact with other team members? Did he or she attend group meetings? †¢ RespectRead MoreBtec higher national diploma2227 Words   |  9 PagesCourse Name BTEC Higher National Diploma (HND) in Business Unit number 3 Unit Name Organisations and Behaviour Credit Value 15 Hand Out/Issue Date w/c 07.10.2013 Submission Deadline 28/11/2013 Introduction You should submit your assignment separately the following sections/parts: Part A: Students are expected to write an essay. Part B: Students are expected to make a presentation. Aims of the unit: The aim of this unit is to give learners an understanding of individualRead MoreLeadership Style And Personality Traits1252 Words   |  6 Pageslearning and building skills. Equally important, among the use of various evaluation tools, I have come to understand my leadership style and personality traits which will help me to become a more effective leader in my organization. Leadership Style Assessment Participative leadership style has also been known as democratic leadership which is typically the most effective leadership style. According to Ferraris (2015), this leadership values the ideas of team members, but it is the leader responsibilityRead MoreGlobal Events and Leadership753 Words   |  4 PagesMnisri (e-facilitator) Alistair Benson Workshop Overview Introductions Global Events and Leadership The Leadership Resource Challenge Global Issue Project Global Issue Presentations Team Factors Study Project and Workshop Review Briefing for assignment 2 What you will Learn from the Forum Understand the processes of business analysis of a complex issue with global implications How to evaluate a text (book, article, project brief, situation) through map reading, map testing, and map making

Friday, December 20, 2019

The Threat Of Cyber Security - 1452 Words

Dakota Stern May 8, 2017 Executive Briefing Executive Summary â€Å"When the Target data breach occurred in 2013, the response was surprising as it took too much time to manage the consumer fallout. Watching communications unfold over time, I assumed that lawyers must have managed the response, because marketers would have handled it differently--focusing effort on mitigating consumer trust damage, brand damage, and negative financial consequences.† Introduction Purpose The purpose of this briefing is to: †¢ Clarify the importance of cyber security in marketing †¢ Educate employees on the importance of cyber security in the workplace †¢ Explain to marketer why they are targets of cyber security attacks †¢ Educate employees on how they can prevent†¦show more content†¦Finally, a single academic source was used to outline how cyber threats can be detrimental to systems outside of consumer based organizations. In order to completely understand the gravity of the future of cyber security, interviews were sought out first in order to create a first-hand understanding of the problem at hand. From the interviews reviewed to create this briefing, Holly Rollo gave us the most in depth answers to the questions we were looking to get answers to. We selected marketing departments for two reasons after reading a series Kimberly Whitler, a former CMO and current Assistant Professor at the University of Virginia’s Darden School of Business, posted on Forbes. The first reason is that according to Holly, marketing departments handle sensitive information about customers that can be valuable targets for hackers. Secondly, no one thinks to put IT and marketing in the same sentence, so marketers usually never think about security. Results/Findings What is a data breach? A data breach, in simplified terms is â€Å"a disclosure of information to an unauthorized party† (Whitler, A Wake-Up Call To CEOs And Marketers: The Perfect Cyber Security Storm Is Approaching, 2016). To be more specific, an attack can be broken up into three types; a breach, compromise, or intrusion. Each are defined below: 1. Intrusion: Unauthorized access to networks or systems 2.Show MoreRelatedCyber Security And Cyber Threats Essay1510 Words   |  7 Pagesbeen confronting issues of cyber-attacks to such an extent that majority of the patients feel every moment that they are at great risk and thus their treatment processes suffer a lot.(Hacking Healthcare IT in 2016) The small sized clinics do not have many resources to enhance their information security systems. Even the large sized enterprises are vulnerable to the cyber threats. The White House had declared that it would increase opportunities to tackle the cyber threats in every sphere, but the moreRead MoreCyber Security And The Cyber Threat763 Words   |  4 Pagesdeal with the impact of the cyber-threat. With this in mine, security awareness training is economical and obvious choice for organization of all sizes. Many companies invest heavily in cyber security education programs for all employees to learn how to protect their computers and personal information and how to be aware of the cyber cri minals that sour the Web in search of targets and vulnerabilities. For the most part the training should include educating users on security concepts such as be conversantRead MoreThe Threat Of Cyber Security4382 Words   |  18 Pages2013).These days it takes merely minutes for news to travel around the globe. Our airwaves are filled with tiny nuggets of information whooshing past us undetected; that is, until it is detected. In the 21st century, cyber security is an international issue. The threat of cyber warfare is very real and would be devastating beyond any conventional weapon imaginable. With the entire globe becoming more interconnected, an attack on online infrastructure could ground airplanes, control informationRead MoreThe Threat Of Cyber Security3043 Words   |  13 PagesABSTRACT While many organizations focus their security efforts on their network border, it is the insider that perhaps poses the most risk to cyber-security. An Insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization s security practices, data and computer systems. The threat may involve fraud, the theft of confidential orRead MoreThe Threat Of Cyber Security1351 Words   |  6 Pagesthe technology from ten years ago, even to the point in which a single cyber-attack can cause the death of millions of people. For that reason, cyber security has become one of the most important matters for many countries. There is no doubt that the United States is one of the most technologically advanced and more powerful countries in the world and for that same reason it instantly becomes one of the main target of cyber-attacks. In o rder to maintain the country safe and defend against attacksRead MoreThreat Vectors For Cyber Security965 Words   |  4 PagesThreat Vectors There are three main areas identified as threat vectors for cyber security in relation to CIP: IT networks, insider threats, and equipment and software. Normally, ICS operate on an internal network, called OT (Operational Technology). Occasionally, this isolated network requires a connection to the organization’s corporate network (IT) for routine operation and management. As displayed in the Ukraine blackout, cyber threats infiltrate an organization’s IT systems in order to accessRead MoreThe Threat Of Cyber Security2050 Words   |  9 Pagesage, the risks of cyber-attacks have seemingly become more prevalent through aggressions done by both foreign and domestic terrorists acting out in response towards either religious, political, or financial consciences. These attacks consist of hackers possessing abilities that can alter digital perspectives of banking and also the capability to adjust physical aspect like water systems and even nuclear power plants. The relevance in emphasizing the importance of cyber-security is directly relatedRead MoreCyber Security Threats And Crimes1279 Words   |  6 Pages Cyber security threats/crimes Before people even knew you could do so much with computers and internet beside common work activity before it got popular and admired, criminals had to get a lot more personal when retrieving their personal information like dig through trash, steal or break into their mailboxes, are buy it from a somebody who sold other people identity was some of the way criminal got people personal information. Now many of people aroundRead MoreCyber Warfare And Security Threats2770 Words   |  12 Pagesbecome prey to attackers and has given birth to a new era of Cyber warfare. Consequently, the Internet, computers and networks have become targets and vehicles of cyber attacks and generate challenges to our security privacy. Cyber Warfare presents an ever-increasing amount of security threats, which continue to escalate with increasing harshness, and is now a critical issue in our technology realm and a growing threat to the world. Cyber wars are generally politically or economically motivated, withRead MoreCyber Security : The Threat Of The Digital Age1811 Words   |  8 Pagesgreatest threats to our national security revolve around that of a computer network. These networks are vulnerable to human error, negligence, and internal sabotages. In the years of 2014 and 2015 the United States Intelligence Community’s threat assessment placed cyber security as the top priority. External attacks on computer mainframes and data networks that contain critical intelligence are being recognized as the nation’s most vulnerable weakness and steps must be taken to combat the threat of the

Thursday, December 12, 2019

Managing Strategic Resources & Operations

Question: Discuss about theManaging Strategic Resources Operations. Answer: Introduction The factory Guan Hin Coffee Manufacturer is a private company that was established in the year 1980, who were the first generation owner and it was maintained by Mr. Chew Theng Kuans father later it was reestablished in the year 2015 by Mr. Chew Theng Kuan who is the second generation owner as a small firm business and successfully reached the heights in coffee manufacturing business in Singapore. His daughters were not a part of business anytime as they were not interested in taking up the firm. It has completed five successful years as an exempt private limited company (Slack, 2015). Their main objective was to manufacture coffee powder and is the principal target. It is located in Singapore at Gourmet East Kitchen as a registered company. They made complete efforts in bringing the success by depending on their own personal experience as coffee roaster as well as owner (Heizer, Render Munson, 2016). Overview of Guan Hin Coffee Manufacturer The company Guan Hin Coffee Manufacturer has chosen to make coffee powder since they can get huge business as coffee is the essential drink that is taken in todays lifestyle. The preference of sipping coffee only varies like it might either be from a coffee shop, a traditional one or at the coffee joints (David David, 2016). The company gives us the opportunity of knowing how coffee beans are originated from, if you are a great coffee lover then utilize this chance of knowing the edge (Berman Evans, 2013). Supply Chain They are specialized in exporting their coffee roasting services to countries such as Japan and China. Irrespective of age, their main motto is to bring coffee heritage and involve all age group people such as old and young to get engaged with the flavor. They wanted to create a brand for their business by developing it in Singapore and induced this coffee culture as a part of their daily chores (Hill, Jones Schilling, 2014). These coffee powder factories are owned in Singapore. The different coffee powders and the roasted beans that are used in top coffee selling shops such as Starbucks and others have their delicious coffee powder from this manufacturer (Collings, 2014). The wonderful, interesting and unknown facts can be known if this coffee manufacturing company tour is followed. It will give us the idea of their efforts and the time taken by them and the kind of ingredients used by them to make your coffee a delicious sip which needs a huge lot of appreciation. Significance of its Operations As it is known that the high profile coffee chops all over Singapore and other metropolitan countries are being supplied with the coffee powder form Guan Hin Coffee Manufacturer. The coffee shops like Starbucks have got the great importance because of the type of coffee they provide with the flavor and taste (De Neufville et al, 2013). Its significance is due to the usage of beans from this industry said by kopi-O the, VIP of Starbucks. The roasted and brewing intensity of the beans in spite of being expensive add a different flavor to it (Berman Evans, 2013). The most commonly available coffee beans are Robusta and Arabica and these are the familiar ones in the industry. They made a recipe that meets the traditions. The Gourmet coffee powder is just a roasted bean powder with no other additional ingredients(David David, 2016). While roasting the beans they found out where the acidity and sweetness of beans meet by this they make their own delicious tasty coffee powder. Day-to-Day Operations Guan Hin Coffee Manufacturer is being operated from Singapore and it has wide spread its operations and developed a number of 20 factories of coffee manufacturing units all over the country. Process of Manufacturing The entire process of turning coffee beans into a fine powder takes approximately one and half an hour based on the quantity that is being involved in the processing. Its just on an average time told above for small quantity (Heizer, Render Munson, 2016). The steps that are involved in the manufacturing process are roasting, cooling and adding different flavors. The first step is the roasting of beans which takes about 60 minutes, but to be noted that this time changes according to the number of coffee beans that are involved in the processing. After the beans are roasted to the necessary intensity it has to be cooled down to take down for further processing. This cooling time is around 10-15 minutes (Hitt, Ireland Hoskisson, 2012). In the roasting process of beans there would be a reduction of about 12kgs from the actual quantity that is taken. For example, if the quantity of beans that is taken before the roasting process is 60kgs then the final output that is available after roasting is 48kgs. This is due to charring of the beans (Hitt, Ireland Hoskisson, 2012). So to this amount of available beans after getting roasted different flavored coffee powders can be made such as black coffee, chocolate coffee etc. An amount of18kg sugar, a little of butter and salt should be added to the roasted beans of 60kgs to make it a local black coffee. This quantity should be decided on the amount of beans that are taken for roasting but not according to the quantity that has come after being roasted. The color black added to the powder is made from the sugar and the coffee powder. Marketing Prices The coffee powder with wide variety of flavors and the finest powders are now available to sell in the market and make the business. The purest form of coffee powder that is taken after grinding of beans without adding any additional ingredients is sold for 16 Singapore dollars per one kg (Hill, Jones Schilling, 2014). The flavored local black coffee is sold at 10 Singapore dollars per kg but its purely based on the quality that is opted by the customers. Coffee Beans Chosen by Company As it is known that coffee is available in different flavors with different names and these are due to the usage of beans of different grades. The most commonly used coffee beans by Guan Hin Coffee Manufacturer are Indonesian coffee beans, Robusta coffee beans, Arabica coffee beans etc. The Robusta coffee beans are available in numerous numbers of grades such as ranging from 1 to 8. But this industry has chosen the coffee beans grades of 1 -2 because it majorly focuses on the quality and the taste that it is giving to the people (Berman Evans, 2013). Packaging Cost As wide varieties of coffee powders and their beans are available their packaging is also made simpler to make it available in small quantities as well as in larger quantities depending on the requirements and needs of customers. The coffee beans are offered in the packing of 60kg bag and a container that totally contains 300 bags on one container (David David, 2016). Conclusion The overall turnover for the factory is in such high peaks that it pays a rent of 6000 Singapore dollars for a month. It took high efforts for the factory to reach that stage where it was developed into a factory from an empty space. References Berman, B. R., Evans, J. R. (2013).Retail management: a strategic approach. Pearson Higher Ed. Brown, S., Bessant, J. R., Lamming, R. (2013).Strategic operations management. Routledge. Collings, D. G. (2014). Integrating global mobility and global talent management: Exploring the challenges and strategic opportunities.Journal of World Business,49(2), 253-261. David, F., David, F. R. (2016). Strategic Management: A Competitive Advantage Approach, Concepts and Cases. De Neufville, R., Odoni, A., Belobaba, P., Reynolds, T. (2013).Airport systems: planning, design and management. Heizer, J., Render, B., Munson, C. (2016).Principles of operations management: sustainability and supply chain management. Pearson Higher Ed. Hill, C. W., Jones, G. R., Schilling, M. A. (2014).Strategic management: theory: an integrated approach. Cengage Learning. Hitt, M. A., Ireland, R. D., Hoskisson, R. E. (2012).Strategic management cases: competitiveness and globalization. Cengage Learning. Jacobs, R., Chase, R. (2013).Operations and supply chain management. McGraw-Hill Higher Education. Slack, N. (2015).Operations strategy. John Wiley Sons, Ltd.

Wednesday, December 4, 2019

File System Evolution

Question: Describe about the File System Evolution? Answer: Introduction Before the computers were developed in order to function the disk operating system, then each of the computers is built to run the application that has a complete as well as exclusive control of the entire machine (Ovsiannikov, 2013). The file system applications are managing the absolute locations of the data on the disk. As one application is running on the computer at a time, then the task is not difficult to do. The file system gives a single level of indirection among the applications as well as risks; therefore, the outcome is that each of the applications saw a file as a single nearby stream of bytes on the disk still when the file system stores the file in irregular sectors (Coronel Morris, 2016). This application tracks the absolute position of the data on the storage device. This research paper is based on the evolution of file system. As the file system is developed over the time with the restricted file system, therefore over time additional file system focuses on particular requirements such as allocation of data, accessing the remote file, distributed file, and parallel files. Therefore, the file system imposes on the structure on the address space of one or more physical devices. Problem Statement The problem statement is that the file systems produce near their limits; the performance for streaming does not see to balance linearly with the size as well as degrades with disintegration (Maeno et al., 2014). Due to scalable metadata in the file system model, a sustained large block performance does not matter. It is addressed by the evolution of the file system, which faces problem in the open source model. There is no such prior work to understand the development process of the file system in the Linux world (Agren et al., 2014). It is difficult to analyze the development process of Linux in order to understand the difficulties involved with it. As a result, the problems in the file system are introducing the same bugs within the file systems. The file system provides a single level of indirection among the applications as well as disks (Campana Atlas 2014). Therefore, the result is that each of the application sees a file as a single contiguous stream of bytes on the disk. Goal and Objectives of the Study The goal of this study is to identify the future use of file system to observe the changes in the complexity of the system. It is related to the metrics to the features as well as the stability of the file system. From this research paper, it is identified that only a few of the file system components are vital to getting right the first time. The objectives are: To identify the benefits of the file system modifications To understand the internal behavior of the file system evolution To identify the future use of file system Significance and Relevant of the Study As the system is growing in complexity, therefore there is a requirement of techniques as well as approaches that enable the users to understand the operation process of a system (Aghaei, Nematbakhsh Farsani, 2012). The researcher creates and introduces semantic follow playback (STP) that empowers the assessment of new imaginative thoughts into the record framework. The pieces inside of the record framework are gatherings of divisions, which will streamline the tending to of capacity. Modern file systems are using a block size of from 1 up to 128 sectors (Rembar, 2015). The files are stored from the creation of the block as well as take the entire blocks. In addition to this, the user files the file system, which stores the parameters such as the size of the block and descriptions of the file such as file location, size, and fragments. It makes the computer faster to restart, as the operating system is not able to scan, the entire file system in order to find out if anything is out of synchronization (Podos Patek, 2014). The file system stores information related to security, information as well as extended attributes. The clear plan characterizes the different components of the examination theme and its effect on utilizing huge information for evaluation of file management system. An accumulation of the pertinent and significant information and data from dependable and substantial source helps in leading the exploration in the right way Review on File System Evolution Architecture of File System The file system has evolved largely during the last two decades. Rembar, (2015) The evaluation has started from local file system, but now a day, the additional file system has also come in front in the computerized world to share crucial data and information, to access remote files and to distribute information over the network channel. Siewiorek and Swarz (2014) stated that architectural compliments of the file system has their significances and run the whole network system effectively and efficiently. The file system has several command lines such as ls (List files), mv (move files), rm (remove files), cp (copy files) uses to transfer the control of computers for users. In the architecture of file system, a layer called kernel space which is used for privileged access (Barroso, Clidaras Holzle, 2013). Inter-process communication mechanism allows communicating the file system with another file system using segmented memory. Schedule section of this files system schedules the timel ine for tasks and multi tasking processes to run these files in proper operating system platform. Figure 1: Architecture of Files System (Source: Verissimo Rodrigues, 2012, pp-100) Enck (2014) mentioned that Local file system is located with the co-ordination of single server applications. The crucial data and files are either connected to the server or data and can be accessed by the accessing of storage area network, channel. On the other hand, Campana and Atlas (2014) opined that shared file system is very useful in the data and information sharing aspect through different servers with different running applications. The shared storage device of this system helps to store all the important data and information for business purposes can be shared with multiple devices simultaneously. Vrable, Savage and Voelker (2012) addressed the major part of shared file system called cluster file system, which allows accessing data and information for user purposes. It is a peer-to-peer structure where users know about the logical arrangement of the file system. File system communication is done between the server and client directly. The most useful part of network file s ystem is the client server distributed system where the important files are served across the entire network servers, and each of those files is segmented into small sections, which help to extract important data and information from those files. Features of File System The key features of this file system are described in the following sections Volume Management: According to Feitelson (2015) the above mentioned file system support both Robin round access and striped access. The master architectural configuration and parameters allow these file systems to identify the relationships between computerized devices and its controls. This feature allows passing the input-output requests over the driver interfaces. Support for Direct I/O and Paged: Ovsiannikov (2013) discovered that file systems support two kinds of input-output features, one is paged input-output, and other is direct input-output. Paged input-output facilities catch the users' data in virtual memory space, and the kernel layer writes the data to a disk (Wen et al., 2014). On the other hand, direct input-output features help to write users data directly from the memory to disk. By the use of these features, users can realize the performance improvements of large block and aligned input-output. High Capacity: The architectural components of the file system and coding data present in it can be extracted from any devices or disks. As the processing application of file system is 64 addressing system can manage more than 252 devices at a time. This high capacity feature and processing operation can easily recover the files from an unscheduled outage (Agarwal et al., 2015). These kinds of file system do not require a file checking system to repair its inconsistencies, as it uses journaling process. The journaling process recovers the files dynamically by the use of serial writes, identification records and error checking system for all the critical and crucial input-output operations. Operation of File System The main function of these file system is to control the data storage and retrieval process for a network system operations. If there is no file system, information could not be extracted from the large body of the database system (Rezaei Muntz, 2014). By the use of kernel space mechanism, data can be divided into several sections, so that important information can be extracted for user purposes. Methodology The most significant chapter of this particular research paper is the Research Methodology. Following a particular research methodology, assists in having a transparent view of the research topic file system management (Agren et al., 2014). The usage of a proper procedure helps in getting more profound information, and better examination of the information gathered. In this specific research, the experts have connected the different natty determined strategy of the viewpoint to comprehend the entire scenario of the file system management in the operating system. Here the researcher discussing the file management system there are many terms for referring too many concepts, and so it is necessary to know the methodology of the file system (Yang et al., 2014). The fundamental reason for PCs is to make, control, store, and recover information. A file framework gives the hardware to encourage these activities. At the most abnormal amount, a file framework is an approach to composing, store, recover, and oversee data on a changeless stockpiling medium, for example, a circle (Agarwal et al., 2015). File frameworks manage unchanging capacity and structure an indispensable part of every single working framework (He et al., 2014). There are many methodologies to perform a file management process in a computer. At the other hand, the ranges are persistent item stores and object-situated databases conceptual the entire idea of lasting stockpiling so that the client and developer never at any point should know about it. Apart from that, the researcher id entifies all approach of a file system how it store and evaluation that furthermore reduces the chances of error. The scientists have picked Deductive Approach to use of hypothetical learning in the down to mechanical earth field while directing the examination. With the assistance of deductive methodology, the specialist can comprehend the best possible way or a way for doing the examination (Siewiorek, Swarz, 2014). In addition, the choice of Explanatory Research Design bolsters the longitudinal normal for the exploration. The clear plan characterizes the different components of the examination theme and its effect on utilizing huge information for evaluation of file management system. An accumulation of the pertinent and significant information and data from dependable and substantial source helps in leading the exploration in the right way (Barroso, Clidaras Holzle, 2013). The information gathered permits better entrance and comprehension the extent of the exploration. For the investigation of this specific research, the specialist has picked the individual meeting and online review as the essential information-gathering source. The data in regards to the medicinal advancements and innovation is gathered from web and diary is considered as optional information accumulation source (Verissimo Rodrigues, 2012). Furthermore, the writing audit is additionally considered as the optional information for the examination. The subjective information gathered gives hypothetical move down to the examination methodology while the quantitative information gathered presents the factual result of the investigation (Enck et al., 2014). In this research, the primary data collected from many researchers and this data are studies will be considered for the implementation of a new file system Summary Within the computing, the file system is a technique that is used to store as well as systematize the computer files as well as the data that contain in order to make easy access to them. The file system uses a storage device like the hard disk and CD-ROM (Campana Atlas 2014). It engages maintaining of the physical location of the files so that it may be virtual as well as exit the access model for the virtual data over the network. A bunch of developers implements the file system before it gets included in the Linux (Vrable, Savage Voelker, 2012). Each of the file systems has its list of mailings. Currently, they are tracked through emails, which is inefficient. This particular chapter is used to describe the several research tools and selection methods to analyze the particular topic with better explanations. With the use of this chapter, the researcher will collect reliable and valid data from primary and secondary sources. After the collection of data, proper data analysis technique has been adopted to analyze the data in order to channelize them inside the research proposal for better evaluation and explanation (He et al., 2014). These research tools and techniques are very useful to analyze and throw a better light on the on the file system evaluation. The shared storage device of this system helps to store all the important data and information for business purposes can be shared with multiple devices simultaneously. Conclusion It is concluded from the research is that files are made up of blocks and the blocks are made up of bits as well as bytes. The metadata structure of the file system is responsible in order to provide semantics for the blocks. The extensions, as well as enrichment of the files with increasing amounts of metadata as well as information, are such that they become autonomous. In the future traditional file system, as well as the file system, manages the objects, which will co-exist as well as complement each other. The document framework applications are dealing with the outright areas of the information on the circle. As one application is running on the PC at once, then the errand is not hard to do. It is seen that the file system needs to keep track of the bits that are required to make the file itself where they are placed logically in the hard drive. It also stores information about the file. The most significant thing is that it also stores the name of the file as because without t he file name, it is vital to choose the file again. Finally, the file system worries about the metadata. Future Work The future exploration of this paper is that the working framework has developed, and it has more elements, which are added to the document framework (Rezaei Muntz, 2014). More information alternatives are added to the record framework, for example, change, the capacity to list documents for speedier explores the new capacity of plans that will diminish the document fracture and strong capacity to redress. The greatest advances in the document framework keep a log of changes that the PC is made to each of the records. On the off chance that the PC crashes and the force go out all through the operation of a document, then it checks the log and completes the operation rapidly without ruining the record (Mohammad, Mcheick Grant, 2014). It makes the PC quicker to restart, as the working framework does not ready to check, the whole document framework with a specific end goal to see whether anything is out of synchronization. References Agarwal, S., Pape, L. E., Dagli, C. H., Ergin, N. K., Enke, D., Gosavi, A., ... Gottapu, R. D. (2015). Flexible and Intelligent Learning Architectures for SoS (FILA-SoS): Architectural Evolution in Systems-of-Systems. Procedia Computer Science, 44, 76-85. Aghaei, S., Nematbakhsh, M. A., Farsani, H. K. (2012). Evolution of the world wide web: From WEB 1.0 TO WEB 4.0. International Journal of Web Semantic Technology, 3(1), 1. Agren, J. A., Wang, W., Koenig, D., Neuffer, B., Weigel, D., Wright, S. I. (2014). Mating system shifts and transposable element evolution in the plant genus Capsella. BMC genomics, 15(1), 602. Barroso, L. A., Clidaras, J., Hlzle, U. (2013). The datacenter as a computer: An introduction to the design of warehouse-scale machines. Synthesis lectures on computer architecture, 8(3), 1-154. Campana, S., Atlas Collaboration. (2014). Evolution of the ATLAS distributed computing system during the LHC long shutdown. In Journal of Physics: Conference Series (Vol. 513, No. 3, p. 032016). IOP Publishing. Chang, B., Wang, Z., Chen, B., Zhang, F. (2015, December). MobiPluto: File System Friendly Deniable Storage for Mobile Devices. In Proceedings of the 31st Annual Computer Security Applications Conference (pp. 381-390). ACM. Chen, M., Mao, S., Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171-209. Coronel, C., Morris, S. (2016). Database Systems: Design, Implementation, Management. Cengage Learning. Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., Cox, L. P., ... Sheth, A. N. (2014). TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), 5. Faibish, S., Bent, J. M., Tzelnic, P., Grider, G., Zhang, J. (2014). U.S. Patent No. 8,825,652. Washington, DC: U.S. Patent and Trademark Office. Feitelson, D. G. (2015). Workload modeling for computer systems performance evaluation. Cambridge University Press. Giampaolo, D. B., Cisler, P., Weiss, E., McIntyre, K. A. (2015). U.S. Patent No. 8,984,029. Washington, DC: U.S. Patent and Trademark Office. Gross, D., Nicolaou, C. (2013). U.S. Patent No. 8,560,579. Washington, DC: U.S. Patent and Trademark Office. He, J. Y., Liu, W. H., Wang, H., Wu, Y., Liu, X. J., Nieh, T. G., Lu, Z. P. (2014). Effects of Al addition on structural evolution and tensile properties of the FeCoNiCrMn high-entropy alloy system. Acta Materialia, 62, 105-113. Lucas, W. J., Groover, A., Lichtenberger, R., Furuta, K., Yadav, S. R., Helariutta, Y., ... Patrick, J. W. (2013). The Plant Vascular System: Evolution, Development and FunctionsF. Journal of Integrative Plant Biology, 55(4), 294-388. Maeno, T., De, K., Klimentov, A., Nilsson, P., Oleynik, D., Panitkin, S., ... Yu, D. (2014). Evolution of the ATLAS PanDA workload management system for exascale computational science. In Journal of Physics: Conference Series (Vol. 513, No. 3, p. 032062). IOP Publishing. Mashtizadeh, A. J., Bittau, A., Huang, Y. F., Mazieres, D. (2013, November). Replication, history, and grafting in the ori file system. In Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (pp. 151-166). ACM. Mohammad, A., Mcheick, H., Grant, E. (2014, September). Big data architecture evolution: 2014 and beyond. In Proceedings of the fourth ACM international symposium on Development and analysis of intelligent vehicular networks and applications (pp. 139-144). ACM. Ovsiannikov, M., Rus, S., Reeves, D., Sutter, P., Rao, S., Kelly, J. (2013). The quantcast file system. Proceedings of the VLDB Endowment, 6(11), 1092-1101. Podos, J., Patek, S. N. (2014). Acoustic Signal Evolution: Biomechanics, Size, and Performance. Animal Signaling and Function: An Integrative Approach, 175-203. Rembar, C. (2015). The law of the land: The evolution of our legal system. Open Road Media. Rezaei, B. A., Muntz, A. H. Y. M. (2013). U.S. Patent No. 8,380,721. Washington, DC: U.S. Patent and Trademark Office. Siewiorek, D., Swarz, R. (2014). Reliable Computer Systems: Design and Evaluatuion. Digital Press. Stefanov, E., van Dijk, M., Juels, A., Oprea, A. (2012, December). Iris: A scalable cloud file system with efficient integrity checks. In Proceedings of the 28th Annual Computer Security Applications Conference (pp. 229-238). ACM. Ting, D. P., Vahalia, U. K., Hilliar, J. A., Gupta, U. (2013). U.S. Patent No. 8,417,788. Washington, DC: U.S. Patent and Trademark Office. Verissimo, P., Rodrigues, L. (2012). Distributed systems for system architects (Vol. 1). Springer Science Business Media. Vrable, M., Savage, S., Voelker, G. M. (2012, February). Bluesky: A cloud-backed file system for the enterprise. In Proceedings of the 10th USENIX conference on File and Storage Technologies (pp. 19-19). USENIX Association. Warren, I. (2012). The renaissance of legacy systems: method support for software-system evolution. Springer Science Business Media. Wen, J., Liu, W. H. E., Arons, P. L., Pandey, S. K. (2014). Evolution Pathway Towards Wide Area Monitoring and ProtectionA Real-World Implementation of Centralized RAS System. Smart Grid, IEEE Transactions on, 5(3), 1506-1513. Yang, H. M., Song, X. L., Yang, T. L., Liang, Z. H., Fan, C. M., Hao, X. G. (2014). Electrochemical synthesis of flower shaped morphology MOFs in an ionic liquid system and their electrocatalytic application to the hydrogen evolution reaction. RSC Advances, 4(30), 15720-15726. Significance and Relevant of the Study