Sunday, January 26, 2020

Synthesis, Characterization and Thermal Studies of NDPAH

Synthesis, Characterization and Thermal Studies of NDPAH Synthesis, characterization and Thermal Studies of a Bis {N- (2, 4- dinitro- phenyl) N- (3- phenyl- allylidene)- hydrazine} Uranyl (VI) nitrate  [UO2(NDPAH)2]2+ Shahriar Ghammamy, Sajjad Sedaghat Abstract Bis {N- (2, 4- dinitro- phenyl) N- (3- phenyl- allylidene)- hydrazine} abbreviated as NDPAH was synthesized and characterized. Bis {N- (2, 4- dinitro- phenyl) N- (3- phenyl- allylidene)- hydrazine} Uranyl (VI) nitrate prepared r Keywords: Bis {N- (2, 4- dinitro- phenyl) N- (3- phenyl- allylidene)- hydrazine} Uranyl (VI) nitrate, synthesis, thermal analysis, FT-IR and UV–Visible spectroscopy, Schiff bases. Introduction A Schiff base, named after Hugo Schiff, is a compound with a functional group that contains a carbonnitrogen double bond with the nitrogen atom connected to an aryl or alkyl group, not hydrogen. Complexes of uranyl with nitrogen ligand are of considerable interest due to broad spectrum of biological activities. Formation of transition metal complexes with ligands of uranyl family are important because this ligands connected with various modes to the electron-rich and electron-poor metals. uranyl containing ligands are known to form stable complexes with class b metal ions, such as gold (I). Nitrogen-containing ligands is an important factor in the development of coordination chemistry such as Schiff bases and their metal complexes. and biochemically relevant studies of metal complexes [1]. A group of nitrogen-containing ligands represent a wide range of biological activities and this class of ligands known as pyrimidine system. These groups are valuable ligands in chemistry and on th e other hand have a huge impact on biological properties. For example, a furopyrimidine ring according to the isoelectric contact with purine, is highly regarded. Other uses are as a pesticide and medicine such as antifolates, antimalarials, and antivirus and other hand, protects against radiation. Recently, it has been found that the fluoropyrimidines to prevent some of the vascular endothelial growth factor receptor 2 (VEGFR2) and high epidermal growth factor receptor (EGFR) is used However, many synthetic protocols that have been reported as long-term reactions or quick reactions suffer from defects and flaws. Requires a multi-step reaction, requires without water conditions, low efficiency, the use of metal constructions containing materials and special tools or starting substances are examples of these flaws. Therefore achieve new techniques and efficient for the preparation of furo (2, 3, d) derivatives of pyrimidine is still highly desirable [7] Pyrimidine represents a very i nteresting group of compounds, because these compounds are used extensively in phytosanitary, pharmaceutical, and analytical . On the other hand, industrial aspects of this class of compounds is considered. For example, these compounds are used as anti-bacterial and anti-fungal. [8]. This class of compounds also have biological activities [9–13]. The role of metal ions in biological processes of life has long been known and is highly regarded. Studying the properties of transition metal complexes with this class of biologically active ligands is very interesting. In this paper, the synthesis and characterization of a number of the ligands and uranyl complexes have been studied. In this work, we report the synthesis and structural studies of the ligand and complex isolated from the reactions of: Bis {N- (2, 4- dinitro- phenyl) N- (3- phenyl- allylidene)- hydrazine} Uranyl (VI) nitrate. Experimental Solvents were purified by standard methods. All reagents were supplied by Merck and were used without further purification. Melting point was measured in an Electro thermal 9200. The FT-IR spectra were recorded in the range 400–4000 cm-1 by KBr disk using a Bruker Tensor 27 M 420 FT-IR spectrophotometer. The UV–Vis spectra in CH3CN were recorded with a WPA bio Wave S2 100 spectrophotometer. Thermo gravimetric analyses were done on a Perkin Elmer TGA/DTA lab system l (Technology by SII) in nitrogen atmosphere with a heating rate of 20 ºC/min from 35- 700  ºC.  ¹ H and  ¹Ã‚ ³ C-NMR spectra were measured on a BRUKER DRX-500 AVANCE spectrometer at 500 MHz. Synthesis of the [UO2(NDPAH)2]2+: For synthesis of the [UO2(NDPAH)2]2+ to a magnetically stirred of ligand (0.88g, 2.8mmol) in acetonitrile(10ml) was added to uranyl (VI) nitrate (0.71g, 1.4 mmol) And the reaction is performed at room temperature. To ensure complex formation and precipitation of the complex. The solid complex obtained was filtered. And to remove material that did not participate in the reaction complex was washed with diethyl ether. Yield, 75%. Anal. Calcd of [UO2(NDPAH)2]2+; C; 20.14, H; 1.34, N; 6.26; found: C; 20.24, H. 1.41, N; 6.32. Mp: 290  °C.  ¹HNMR (DMSO): 7.4-7.9 (CH phenol), 8.5-8.8 (CH dinitrobenzen), 8.4 (CH azomethyne), 7.1 (CH), FT-IR (KBr, cm-1): 1133 s (ÃŽ ½ N-N), 1614 s (ÃŽ ½ C=N), 420 w (ÃŽ ½ U-N), 935 s (ÃŽ ½ O=U=O), UV-vis (DMSO): à ¯Ã‚ Ã‚ ¬max 260nm(ÃŽ µ 26000), 320nm(ÃŽ µ 15000), 413nm(ÃŽ µ 32000) (Figure 1-8). [UO2(NDPAH)2]2+ is soluble in chloroform, acetone, dichloro methane, DMSO and DMF and insoluble in water, hexane and diethyl ether and little soluble in methanol, Acetonitrile and ethanol. Figure 9, 10 shows Chemical structures of NDPAH and [UO2(NDPAH)2]2+. Analysis of NDPAH Ligand Anal: %68. Calcd of C15H12N4O4; C; 57.72, H; 3.84, N; 17.94; found: C; 57.81, H. 3.89, N; 17.99. Mp 254-256  °C,  ¹HNMR (DMSO): 7.3-7.7 (CH phenol), 7.8-8.5 (CH dinitrobenzen), 8.1 (CH azomethyne), 7.1 (CH), 9.1 (NH), FT-IR (KBr, cm-1): 1133 s (ÃŽ ½ N-N), 1613 s (ÃŽ ½ C=N), 3111 w (ÃŽ ½ NH). NDPAH is soluble in acetonitrile, acetone, chloroform, DMF, DMSO and diethyl ether insoluble in water, hexane, methanol and ethanol little soluble in dichloro methane. Results and discussion Preparation of Ligand and complex Compounds are quite stable and could be stored without any appreciable changes for long time. Compounds with multiple methods using FT-IR, UV-Visible and  ¹ H and  ¹Ã‚ ³ C-NMR spectra were identified. These compounds were evaluated for thermal analysis. In this paper, a new method for the synthesis of the Bis {N- (2, 4- dinitro- phenyl) N- (3- phenyl- allylidene)- hydrazine} Uranyl (VI) nitrate is presented . Following the single-step reaction between the UO2(NO3)2.6H2O and the NDPAH desired compound is obtained.This method has some advantages for the manufacture of complex. These include: there is no side products and does not require special conditions such as high pressure or high temperature, and that this reaction is a very fast reaction. The [UO2(NDPAH)2]2+ has 290 °C melting points respectively. It is soluble in chloroform, acetone, dichloro methane, DMSO and DMF and insoluble in water, hexane and diethyl ether and slightly soluble in methanol, acetonitrile, and ethanol . The spectral data of the complexes have good relationship with the literature data. The IR spectra of the Schiff base show characteristic bands due to ÃŽ ½(NH), ÃŽ ½(C=N) and ÃŽ ½(N-N), in the region 3111cm-1, (1613, 1133) cm-1 respectively. The strong band in the region 1613, 1133cm-1 in the IR spectra of the Schiff base are assigned to ÃŽ ½( C=N), ÃŽ ½( N-N) respectively. In the case of U(VI) complex we observed the following changes. The bands appeared around 1133, 1614, 420 and 935cm-1 due to ÃŽ ½ N-N, ÃŽ ½ C=N, ÃŽ ½ U-N and ÃŽ ½ O=U=O. Thermo gravimetric analyses The thermal properties of these compounds were investigated by thermo grams (TG, DTG and DTA). Figure 11 shows TGA and DTA curves for [UO2(NDPAH)2]2+. In the temperature range 200-305ËÅ ¡C, 57.9% weight losing was observed which was related to the loss of most parts of compound. In the temperature range from 360-500ËÅ ¡C, 20.6% weight reduction was found, which was related to the loss of a part of compound. Conclusion It is clear from the above discussion that [UO2(NDPAH)2]2+complex and NDPAH ligand offer a new outlook for chemotherapy. The results of antitumor activity show that the metal complexes exhibit antitumor properties and it is important to note that they show enhanced inhibitory activity compared to the parent ligand. The mechanism by which these complexes act as antitumor agents is apoptosis. It has also been proposed that concentration plays a vital role in increasing the degree of inhabitation. References [1] R.J. Vidmar, IEEE Trans. Plasma Sci. 21 (1992) 876-880. [2] A.S.N. Murthy, A.R. Reddy, Journal of Chemical Sciences. 90 (1981) 519-526. [3] V.N.K. Razakantoanina, P. Phung, Parasitology Research 86 (2000) 665-668. [4] R.E. Royer, D.L. Meck, Journal of Medicinal Chemistry. 38 (1995) 2427-2432. [5] M.R. Flack, P.R. G.yle, The Journal of Clinical Endocrinology Metabolism.  76 (1995) 1019-1024. [6] R. Baumgrass, M. Weiwad, Journal of Biological Chemistry. 276 (2001) 47914-47921. [7] M.B. Teimouri, R. Bazhrang, Bioorganic Medicinal Chemistry Letters.  16 (2006) 3697-3701. [8] M.B. Teimouri, Tetrahedron. 62 (2006)10849-10853. [9] J.M. Grevy, F. Tellez, Inorganica Chimica Acta. 339 (2002) 532-542. [10] A. Bernalte-Garc ´Ãƒâ€žÃ‚ ±a, F.J. Garc ´Ãƒâ€žÃ‚ ±a-Barros, Polyhedron. 18 (1999) 2907-2912. [11] K. Lemma, J. Berglund, Journal of Biological Inorganic Chemistry. 5 (2000) 300-306. [12] M.J.M. Campbell, Coordination Chemistry Reviews. 15 (1975) 279-319. [13] S. Padhy ´e, G.B. Kauffman, Coordination Chemistry Reviews. 63 (1985) 127-160. [14] B. Erwin, C. Omoshile, Journal of the Chemical Society Perkin Transactions. 2 (1995)1333-1338. [15] G.Zhao, H. Lin, Journal of Inorganic Biochemistry. 70 (1998) 219-226. Figure 1: FTIR spectrum of NDPAH (KBr Disk) Figure 2: FTIR spectrum of [UO2(NDPAH)2]2+ (KBr Disk) Figure 3: 1H- NMR spectrum of NDPAH Figure 4: 1H- NMR spectrum of [UO2(NDPAH)2]2+ Figure. 5. 13C- NMR spectrum of NDPAH Figure. 6. 13C- NMR spectrum of [UO2(NDPAH)2]2+ Figure 7: UV/ Vis spectrum of NDPAH (DMSO, 5Ãâ€"10-4 M) Figure 8: UV/ Vis spectrum of [UO2(NDPAH)2]2+ (DMSO, 5Ãâ€"10-4 M) Figure 9: Chemical structure of NDPAH Figure 10: Chemical structure of [UO2(NDPAH)2]2+ Figure 11: Thermal analysis data of [UO2(NDPAH)2]2+ Figure 1: FTIR spectrum of NDPAH (KBr Disk) Figure 2: FTIR spectrum of [UO2(NDPAH)2]2+ (KBr Disk) Figure 3: 1H- NMR spectrum of NDPAH Figure 4: 1H- NMR spectrum of [UO2(NDPAH)2]2+ Figure. 5. 13C- NMR spectrum of NDPAH Figure. 6. 13C- NMR spectrum of [UO2(NDPAH)2]2+ Figure 7: UV/ Vis spectrum of NDPAH (DMSO, 5Ãâ€"10-4 M) Figure 8: UV/ Vis spectrum of [UO2(NDPAH)2]2+ (DMSO, 5Ãâ€"10-4 M) Figure 9: Chemical structure of NDPAH Figure 10: Chemical structure of [UO2(NDPAH)2]2+ Figure 11: Thermal analysis data of [UO2(NDPAH)2]2+

Saturday, January 18, 2020

Local Literature Essay

Follow-up or tracer studies have enjoyed popularity in LIS training needs/ assessment analyses over the past 20 years in Africa in studies by scholars such as Anadiran (1988) in Nigeria; Alemna (1991, 1999) and Kisie du (1993) in Ghana; Rosenberg (1989, 1994) in Kenya; Ocholla (2001 and 2005) and Stilwell (2004) in South Africa Rugambwa (1998) and Mammo (2007) in Ethiopia; Aina and Moahi (1999) in Botswana; and Lutwana and Kigongo – Bukenya (2004) in Uganda. Mammo (2007) conducted a study on the status of LIS education in Ethiopia and the perceptions of graduates on the LIS program me. The study revealed that in one university ,the LIS program me changed to Information Systems because of university-wide changes ,while in another university, the LIS curriculum remained the same. Graduates indicated that they were not satisfied with the LIS programme. 2 Lutwana and Kigongo-Bukenya (2004) conducted a study on the appropriateness of the EASLIS (East Africa School of Library and Information Science) curriculum to professional practice in Library and Information Science field in Uganda. The purpose of the study was to establish where graduates worked, what they did, and whether their education met employers’ expectations. It further identified areas of curriculum revision. The study revealed that most graduates were employed in academic institutions, government departments, banks and NGO’s libraries, where they performed various professional activities. The study also revealed that employers complained about the lack of practical skills among the graduates, citing specialization through electives as inadequate . Aina and Moahi (1999) conducted a tracer study of graduates from the Department of Library and Information Studies at the University of Botswana. The aim of the study was to determine the curriculum of the Department of LIS at the University of Botswana. The study revealed that the graduates were employed in traditional library settings. The study also found that their training was relevant to the tasks that they performed, although they advocated the strengthening of the information technology component of the curriculum . Kaijage (n. d. conducted a tracer study on the skills and knowledge of B. Com graduates of the University of Dares Salaam. The study concluded that the knowledge and skills that the graduates obtained from the university were relevant to their jobs. But it also suggested that changes should be made to the program me. There are also many other tracer studies conducted all over the Africa and the rest of the world. In South Africa, Stilwell (2004) conducted a survey of alumni perceptions of thepost graduate ILS (Information and Library Science program me at the University of Natal). Critical issues, such as balancing the human centre approach with IT, were identified. The findings of the study indicated that the program me achieved its outcomes because it prepared alumni well for the work place. Ocholla’s (2001) tracer study of LIS graduates from 1996 -1997 determined whether the skills and attitudes they gained during their training at the University of Zululand applied in their jobs. The results of the study indicate that graduates obtained sufficient knowledge from the degree program me . These examples indicate that tracer studies are generally conducted to find out about the fates of departmental graduates or alumni. They investigate where graduates are, whether they are employed, and employers’ perceptions about the skills and knowledge that LIS graduates have. They are also used to obtain feedback from employed alumni and employers on the relevance of the program me offered by different departments. Like most tracer studies, this study addresses the same questions: Are the graduates employable? Is the curriculum relevant? What are the perceptions of graduates and employers about the graduates’ skills, knowledge and education? Local literature At the Palanca literary awards dinner the other Saturday, Mrs. Sylvia Palanca Quirino invited the new Tourism Secretary, Ramon Jimenez Jr. , to be the guest speaker. Jimenez was responsible for coining the latest tourism come-on, â€Å"It’s More Fun in the Philippines. † He talked about literature and how it can help the tourism industry which, as we all know, has yet to be fully exploited. So many countries in our part of the world, particularly Thailand, have reaped millions from the flood of tourists visiting these countries. We get only a trickle, for though we have great possibilities, there is not enough global interest in our country and its attractions. Much of this is due to our own myopia, of our leaders who do not understand or realize the myriad possibilities here if we only know how to use them! Jimenez should produce long-range programs. This is one common fault of government; a new administration takes over and new policies are made no continuity is pursued. Will the slogan, â€Å"It’s More Fun in the Philippines† last only three years from now.? Will it be replaced when a new administration takes over? This is a minor point; will initiatives today be continued in the future? Does the present administration accept the past administration program enough to pursue its good aspects? Will our tourism executives use them? Just consider this: how many visitors go to England, to visit Stratford-on-Avon because they have enjoyed William Shakespeare’s plays. Those tourists clambering up the hills in Greece how many of them are there because they read the Homeric classics? And Spain, which reaps so much from the thousands upon thousands of visitors every year, how many visit that country because they have read Cervantes, and Hemingway’s novel, For Whom the Bell Tolls, and all those gory bullfight scenes in his fiction? Permit me to brag a bit. Once, I brought a busload of expats and some locals to the Ilokos because they wanted to see the setting of the Rosales saga. I was their tour guide. We went to my hometown, Rosales, and showed them two of the old houses which I used as models, and to that rundown barrio called Cabugawan where I was born, then on to Tayug where the Colorum rebelled in 1931, and to the Ilokos to see the old churches and finally to Cabugaw where the saga starts. And then one morning, more than a decade ago, a young man visited my bookshop. He was a schoolteacher in Holland; he had read Mass, the concluding novel in the Rosales saga which was published first in Dutch rather than in the English original. This was his first visit to Asia. Mass had appealed to him so much, he wanted to see its setting. I took him to Forbes Park first, then to Tondo, to Barrio Magsaysay and to Smokey Mountain which was still smoking then. Then we went to the university belt, to Recto and he saw all those young students milling about. And finally, that early evening we visited one of the massage parlors in Quezon City. Our National Hero, Jose Rizal he wrote the greatest Filipino novel why is there no literary tour based on his work and on his life? This literary tour will be more for Filipinos than for foreigners. It will impinge on our youth those virtues so terribly missing now the rectitude, the patriotism all the qualities which Rizal personified. Such a tour, led by a guide steeped in history, could start in the morning with a trip to Calamba, the Rizal house, the lake, and nearby Mt. Makiling. From there, back to Manila, to the Noli geography, the University of Santo Tomas, Binondo then Fort Santiago, the Luneta where Rizal was executed, and finally to Paco Cemetery where he was first buried. It could end with a view of the Manila sunset. Tourism for locals is growing it should be the way it is with Japan where the Japanese themselves are the best tourists in their own country. I told Jimenez to consider the movies. The Koreans are now producing epic historical movies, and those addictive telenovelas which have enthralled so many all over the world. My daughter-in-law, Lee Pai, who teaches history at the University of California at Santa Barbara happened to be visiting. She said those movies and telenovelas are scripted by Korea’s leading writers familiar with the literary classics of the West and East which explains the high quality of the telenovelas unlike the asinine and moronic serials produced by local TV. As evidenced by the Palanca awards, we are never short of literary talent. Why do our movie and TV people ignore them? Movie festivals are a great attraction in Europe and so are book fairs and literature meetings. Singapore has an international literary festival each year, India, too, and the annual Frankfurt Book Fair is one of the biggest attractions in this German city. Just concluded in Korea is the Annual PEN Congress an international meeting of writers. Writers attending this Congress will surely go home and write about Korea, further enlarging the global reach of that prosperous and booming country. Meanwhile, let me continue tossing encomiums at the Palancas for their perseverance, charity and goodwill in supporting the Awards for literature. I knew the founder, Carlos Palanca Jr. , personally he was very charming, debonair, with a wide circle of acquaintances in business and with the culturati. As far back as I can recall, it was the late NVM Gonzalez and Nick Joaquin who suggested to him the creation of the Awards to encourage literary excellence in the country. Sixty-two years three generations! I do not think such an effort has any equal in the region or in all of Asia. The vitality and continuing relevance of such effort requires organizational skills, massive expenditure and vision. It is a wonder to me why, up to now, this massive contribution of the Palancas to our culture and nation has not been publicly recognized. Filipino writers should be grateful to the children of Charlie Palanca who have not neglected their father’s vision. Sylvia Palanca Quirino leads them in plodding on. In the beginning, the awards were only for fiction and poetry in English and Tagalog they now include children’s stories, plays, novels, not just in these two languages but in Cebuano, Ilonggo and Ilokano. At the Awards dinner, Quirino also announced that the Awards will also recognize Filipino achievers. While the Palanca Awards promote creativity, it follows that media, particularly TV, can do so much by using the work of our best writers, as is done in Korea. Publishers can add to what the Palanca Awards have produced create literary sections in newspapers and magazines, publish those new and splendid works. May I also now suggest to Mrs. Socorro Ramos that her National Book Stores all over the country should exhibit in their show windows Filipino books, both fiction and non-fiction? They deserve exposure, a much wider audience. Do all these not because it is patriotic but because these good writers deserve a wider readership in their own country.

Friday, January 10, 2020

Itt221 Week 1 Research Assignment Part 1

Research Assignment, Part One Brandon Kelly IT221 – E-2 Fall 2011 Instructor: Stephen Todd 12-17-2011 Question 1 – Why does Windows Server 2008 come in different versions? What is the significance of each version? Most editions of Windows Server 2008 are available in x86-64 and IA-32 versions. Windows Server 2008 for Itanium-based Systems supports IA-64 processors. Microsoft has optimized the IA-64 version for high-workload scenarios like database servers and Line of Business (LOB) applications. As such it is not optimized for use as a file server or media server. Microsoft has announced that Windows Server 2008 is the last 32-bit Windows server operating system. Windows Server 2008 is available in the editions listed below, similar to Windows Server 2003. †¢ Windows Server 2008 Standard (IA-32 and x86-64) Windows Server 2008 Standard is one of Microsoft's entry level server offerings (alongside Windows Web Server 2008) and is one of the least expensive of the various editions available. Both 32-bit and 64-bit versions are available, and in terms of hardware Standard Edition supports up to 4GB of RAM and 4 processors. Windows Server 2008 is primarily targeted and small and mid-sized businesses (SMBs) and is ideal for providing domain, web, DNS, remote access, print, file and application services. Support for clustering, however, is notably absent from this edition. An upgrade path to Windows Server 2008 Standard is available from Windows 2000 Server and Windows Server 2003 Standard Edition. †¢ Windows Server 2008 Enterprise (IA-32 and x86-64) Windows Server 2008 Enterprise Edition provides greater functionality and scalability than the Standard Edition. As with Standard Edition both 32-bit and 64-bit versions are available. Enhancements include support for as many as 8 processors and up to 64GB of RAM on 32-bit systems and 2TB of RAM on 64-bit systems. Additional features of the Enterprise edition include support for clusters of up to 8 nodes and Active Directory Federated Services (AD FS). Windows Server 2000, Windows 2000 Advanced Server, Windows Server 2003 Standard Edition and Windows Server 2003 Enterprise Edition may all be upgraded to Windows Server 2008 Enterprise Edition. †¢ Windows Server 2008 Datacenter (IA-32 and x86-64) The Datacenter edition represents the top end of the Windows Server 2008 product range and is targeted at mission critical enterprises requiring stability and high uptime levels. Windows Server 2008 Datacenter edition is tied closely to the underlying hardware through the implementation of custom Hardware Abstraction Layers (HAL). As such, it is currently only possible to obtain Datacenter edition as part of a hardware purchase. As with other versions, the Datacenter edition is available in 32-bit and 64-bit versions and supports 64GB of RAM on 32-bit systems and up to 2TB of RAM on 64-bit systems. In addition, this edition supports a minimum of 8 processors up to a maximum of 64. Upgrade paths to Windows Server 2008 Datacenter Edition are available from the Datacenter editions of Windows 2000 and 2003. †¢ Windows HPC Server 2008 (Codenamed â€Å"Socrates†) (replacing Windows Compute Cluster Server 2003) Windows HPC Server 2008 R2, the Microsoft third-generation HPC solution, provides a comprehensive and cost-effective solution for harnessing the power of high-performance computing. Out-of-the-box, world-class performance, and scalability enable organizations of all sizes to rapidly deploy solutions ranging from personal HPC workstations to large clusters spanning thousands of nodes. Customers can lower both their operating and capital costs. Windows HPC Server 2008 R2 integrates easily with existing IT infrastructure to enable end users to access HPC resources using familiar Windows-based technologies. With a tightly integrated set of dedicated cluster and parallel development tools, anchored around Visual Studio 2010, developers can build robust and scalable HPC applications easily and quickly. Windows HPC Server 2008 R2 is complemented by a rich ecosystem of SI, ISV, and OEM partners to ensure that customers have access to the applications of their choice and the resources required to successfully run them. †¢ Windows Web Server 2008 (IA-32 and x86-64) Windows Web Server 2008 is essentially a version of Windows Server 2008 designed primarily for the purpose of providing web services. It includes Internet Information Services (IIS) 7. 0 along with associated services such as Simple Mail Transfer Protocol (SMTP) and Telnet. It is available in 32-bit and 64-bit versions and supports up to 4 processors. RAM is limited to 4GB and 32GB on 32-bit and 64-bit systems respectively. Windows Web Server 2008 lacks many of the features present in other editions such as clustering, BitLocker drive encryption, multipath I/O, Windows Internet Naming Service (WINS), Removable Storage Management and SAN Management †¢ Windows Storage Server 2008 (Codenamed â€Å"Magni†) (IA-32 and x86-64) Minimal information found. †¢ Windows Small Business Server 2008 (Codenamed â€Å"Cougar†) (x86-64) for small businesses Minimal information found. Windows Server 2008 for Itanium-based Systems Windows Server 2008 R2 for Itanium-Based Systems delivers an enterprise-class platform for deploying business-critical applications. Scale database, line-of-business, and custom applications to meet growing business needs. Windows Server 2008 R2, SQL Server 2008 R2 and the current 2010 line-up of our Developer Tools, plus associated . NET frameworks, will be the last iterations in each product line t o support the Intel Itanium processor and associated OEM server platforms. Windows Server 2008 Foundation (Codenamed â€Å"Lima†) Windows Server 2008 R2 Foundation is a cost-effective, entry-level technology foundation targeted at small business owners and IT generalists supporting small businesses. Foundation is an inexpensive, easy-to-deploy, proven, and reliable technology that provides organizations with the foundation to run the most prevalent business applications as well as share information and resources. Server Core is available in the Web, Standard, Enterprise and Datacenter editions. It is not available in the Itanium edition. Server Core is simply an alternate installation option supported by some of the editions, and not a separate edition by itself. Each architecture has a separate installation DVD. The 32-bit version of Windows Server 2008 Standard Edition is available to verified students for free through Microsoft's DreamSpark program. Question 2 – What are the new features or enhancements made to Windows Server 2008? How is Windows Server 2008 different from Windows Server 2003? Core OS improvements †¢ Fully multi-componentized operating system. †¢ Improved hot patching, a feature that allows non-kernel patches to occur without the need for a reboot. Support for being booted from Extensible Firmware Interface (EFI)-compliant firmware on x86-64 systems. †¢ Dynamic Hardware Partitioning o Support for the hot-addition or replacement of processors and memory, on capable hardware. Active Directory improvements †¢ Read-only domain controllers (RODCs) in Active Directory, intende d for use in branch office or other scenarios where a domain controller may reside in a low physical security environment. The RODC holds a non-writeable copy of Active Directory, and redirects all write attempts to a Full Domain Controller. It replicates all accounts except sensitive ones. citation needed][clarification needed] In RODC mode, credentials are not cached by default. Moreover, only the replication partner of the RODC needs to run Windows Server 2008. [clarification needed] Also, local administrators can log on to the machine to perform maintenance tasks without requiring administrative rights on the domain. †¢ Restartable Active Directory allows ADDS to be stopped and restarted from the Management Console or the command-line without rebooting the domain controller. This reduces downtime for offline operations and reduces overall DC servicing requirements with Server Core. ADDS is implemented as a Domain Controller Service in Windows Server 2008. Policy related improvements †¢ All of the Group Policy improvements from Windows Vista are included. Group Policy Management Console (GPMC) is built-in. The Group Policy objects are indexed for search and can be commented on. †¢ Policy-based networking with Network Access Protection, improved branch management and enhanced end user collaboration. Policies can be created to ensure greater Quality of Service for certain applications or services that require prioritization of network bandwidth between client and server. Granular password settings within a single domain – ability to implement different password policies for administrative accounts on a â€Å"group† and â€Å"user† basis, instead of a single set of password settings to the whole domain. Disk management and file storage improvements †¢ The ability to resize hard disk partitions without stopping the server, even th e system partition. This applies only to simple and spanned volumes, not to striped volumes. †¢ Shadow Copy based block-level backup which supports optical media, network shares and Windows Recovery Environment. DFS enhancements – SYSVOL on DFS-R, Read-only Folder Replication Member. There is also support for domain-based DFS namespaces that exceed the previous size recommendation of 5,000 folders with targets in a namespace. †¢ Several improvements to Failover Clustering (High-availability clusters). †¢ Internet Storage Naming Server (iSNS) enables central registration, deregistration and queries for iSCSI hard drives. Protocol and cryptography improvements †¢ Support for 128- and 256-bit AES encryption for the Kerberos authentication protocol. New cryptography (CNG) API which supports elliptic curve cryptography and improved certificate management. †¢ Secure Socket Tunneling Protocol, a new Microsoft proprietary VPN protocol. †¢ AuthIP, a Micro soft proprietary extension of the IKE cryptographic protocol used in IPsec VPN networks. †¢ Server Message Block 2. 0 protocol in the new TCP/IP stack provides a number of communication enhancements, including greater performance when connecting to file shares over high-latency links and better security through the use of mutual authentication and message signing. Miscellaneous improvements Windows Deployment Services replacing Automated Deployment Services and Remote Installation Services. Windows Deployment Services (WDS) support an enhanced multicast feature when deploying operating system images. †¢ Internet Information Services 7 – Increased security, Robocopy deployment, improved diagnostic tools, delegated administration. †¢ Windows Internal Database, a variant of SQL Server Express 2005, which serves as a common storage back-end for several other components such as Windows System Resource Manager, Windows SharePoint Services and Windows Server Update Se rvices. It is not intended to be used by third-party applications. †¢ An optional â€Å"Desktop Experience† component provides the same Windows Aero user interface as Windows Vista, both for local users, as well as remote users connecting through Remote Desktop. Question 3 – Why is 64-bit architecture an advantage? Advantages of 64-bit hardware and software Memory addressability Physical memory A 32-bit system architecture can directly address only a 4-GB address space. A 64-bit system architecture that is running a 64-bit edition of Windows Server can support up to 1,024 GB of both physical and addressable memory. Virtual memory The 64-bit editions of Windows Server can address 16 terabytes of virtual memory by using a flat addressing model. Virtual memory is divided equally between virtual address space for applications and the operating system. Even 32-bit applications can benefit from increased virtual memory address space when they are running in a 64-bit environment. For example, although a 32-bit application is still restricted to 4 GB of virtual memory, it no longer has to share that memory space with the operating system. As a result, it receives an effective increase in available virtual memory. Continuous memory Poor performance in 32-bit systems is often not the result of a lack of available memory, but the unavailability of large enough blocks of continuous memory. In a typical Windows SharePoint Services 3. 0 deployment, Windows, Internet Information Services (IIS), common language runtime (CLR), ASP. NET, SharePoint Products and Technologies, SSPs, and MDACs can all claim a portion of a server’s available virtual memory and can leave a 32-bit address space quite fragmented. When the CLR or SharePoint services request new memory blocks, it can be difficult to find a 64-MB segment in the crowded 32-bit address space. A 64-bit system offers practically unlimited address space for user mode processes. Better parallel processing A server that is using 32-bit architecture is limited to 32 CPUs. Improvements in parallel processing and bus architectures enable 64-bit environments to support as many as 64 processors and provide almost linear scalability with each additional processor. Faster bus architecture A 64-bit architecture provides more and wider general-purpose registers, which contribute to greater overall application speed. When there are more registers, there is less need to write persistent data to memory and then have to read it back just a few instructions later. Function calls are also faster in a 64-bit environment because as many as four arguments at a time can be passed in registers to a function. More secure The 64-bit editions of Windows Server offer the following enhanced security features: Buffer overflow protection A buffer overflow occurs when a data buffer is congested with more data than it is designed to handle. In 64-bit editions of Windows Server, the first parameters of a procedure call are passed in registers. As a result, it is less likely that the buffer will overflow, because the correct values have to be set up in registers and the variables and addresses have to be aligned on the stack. Data execution protection The 64-bit processors made by AMD and Intel include hardware support for data execution prevention (DEP). Windows Server uses DEP to prevent malicious code from being able to execute, even when a buffer overrun occurs. Even without a processor that supports DEP, Windows Server can detect code that is running in memory locations where it should not be. Patch Guard Microsoft Patch Guard technology prevents non-Microsoft programs from patching the Windows kernel. This technology prevents kernel mode drivers from extending or replacing kernel services, including system service dispatch tables, the interrupt descriptor table (IDT), and the global descriptor table (GDT). Third-party software is also prevented from allocating kernel stacks or patching any part of the kernel. Better scalability In a 64-bit environment, not only can database servers gain nearly unlimited virtual memory address space, but they also gain support for more physical memory. It is possible for a 64-bit server that is running 64-bit editions of Windows Server and SQL Server to get very large working data sets entirely into RAM, thereby improving performance and scalability. In addition, the number of application servers that are required to support a given user base can be substantially reduced because a 64-bit environment does not require worker processes to cycle as often. This reduced cycling results in fewer lost connections, improved I/O handling, and a better user experience. Lower total cost of ownership All the benefits of 64-bit operation that are listed in the previous sections enable you to do more with less. A 64-bit environment allows you to manage more data, serve more users, and run more applications while using less hardware. By reducing hardware, you are also able to reduce license, operations, and infrastructure costs. It takes up less floor space in your data center and costs less to maintain. Finally, because a Windows SharePoint Services 3. 0 farm that uses 64-bit hardware and software provides more room for growth, you can spend less over time on equipment because the life cycle of your equipment is likely to be longer. Question 4 – Explain the new features of Windows Server 2008, such as Server Core, Virtualization, and PowerShell. What is the role of these features and how will they improve efficiency in administering Windows? Server Core Windows Server 2008 includes a variation of installation called Server Core. Server Core is a significantly scaled-back installation where no Windows Explorer shell is installed. All configuration and maintenance is done entirely through command line interface windows, or by connecting to the machine remotely using Microsoft Management Console. However, Notepad and some control panel applets, such as Regional Settings, are available. Server Core does not include the . NET Framework, Internet Explorer, Windows PowerShell or many other features not related to core server features. A Server Core machine can be configured for several basic roles: Domain controller/Active Directory Domain Services, ADLDS (ADAM), DNS Server, DHCP Server, file server, print server, Windows Media Server, IIS 7 Web server and Hyper-V virtual server. Server Core can also be used to create a cluster with high availability using failover clustering or network load balancing. Andrew Mason, a program manager on the Windows Server team, noted that a primary motivation for producing a Server Core variant of Windows Server 2008 was to reduce the attack surface of the operating system, and that about 70% of the security vulnerabilities in Microsoft Windows from the prior five years would not have affected Server Core. Hyper-V Hyper-V is hypervisor-based virtualization software, forming a core part of Microsoft's virtualization strategy. It virtualizes servers on an operating system's kernel layer. It can be thought of as partitioning a single physical server into multiple small computational partitions. Hyper-V includes the ability to act as a Xen virtualization hypervisor host allowing Xen-enabled guest operating systems to run virtualized. A beta version of Hyper-V shipped with certain x86-64 editions of Windows Server 2008, prior to Microsoft's release of the final version of Hyper-V on 26 June 2008 as a free download. Also, a standalone version of Hyper-V exists; this version only supports the x86-64 architecture. While the IA-32 editions of Windows Server 2008 cannot run or install Hyper-V, they can run the MMC snap-in for managing Hyper-V. Server Manager Server Manager is a new roles-based management tool for Windows Server 2008. It is a combination of Manage Your Server and Security Configuration Wizard from Windows Server 2003. Server Manager is an improvement of the Configure my server dialog that launches by default on Windows Server 2003 machines. However, rather than serve only as a starting point to configuring new roles, Server Manager gathers together all of the operations users would want to conduct on the server, such as, getting a remote deployment method set up, adding more server roles etc. , and provides a consolidated, portal-like view about the status of each role. Windows Powershell Windows PowerShell is Microsoft's task automation framework, consisting of a command-line shell and associated scripting language built on top of, and integrated with the . NET Framework. PowerShell provides full access to COM and WMI, enabling administrators to perform administrative tasks on both local and remote Windows systems. Question 5 – What is a Read Only Domain Controller (RODC) and what are its advantages? What are the security and administrative issues addressed by a RODC? A read-only domain controller (RODC) is a new type of domain controller in the Windows  Server  2008 operating system. With an RODC, organizations can easily deploy a domain controller in locations where physical security cannot be guaranteed. An RODC hosts read-only partitions of the Active  Directory  Domain  Services (AD  DS) database. Before the release of Windows Server  2008, if users had to authenticate with a domain controller over a wide area network (WAN), there was no real alternative. In many cases, this was not an efficient solution. Branch offices often cannot provide the adequate physical security that is required for a writable domain controller. Furthermore, branch offices often have poor network bandwidth when they are connected to a hub site. This can increase the amount of time that is required to log on. It can also hamper access to network resources. Beginning with Windows Server  2008, an organization can deploy an RODC to address these problems. As a result, users in this situation can receive the following benefits: †¢ Improved security †¢ Faster logon times †¢ More efficient access to resources on the network Inadequate physical security is the most common reason to consider deploying an RODC. An RODC provides a way to deploy a domain controller more securely in locations that require fast and reliable authentication services but cannot ensure physical security for a writable domain controller. However, your organization may also choose to deploy an RODC for special administrative requirements. For example, a line-of-business (LOB) application may run successfully only if it is installed on a domain controller. Or, the domain controller might be the only server in the branch office, and it may have to host server applications. In such cases, the LOB application owner must often log on to the domain controller interactively or use Terminal Services to configure and manage the application. This situation creates a security risk that may be unacceptable on a writable domain controller. An RODC provides a more secure mechanism for deploying a domain controller in this scenario. You can grant a non-administrative domain user the right to log on to an RODC while minimizing the security risk to the Active  Directory forest. You might also deploy an RODC in other scenarios where local storage of all domain user passwords is a primary threat, for example, in an extranet or application-facing role. References – Works Cited â€Å"AD DS: Read-Only Domain Controllers. † Microsoft TechNet: Resources for IT Professionals. Web. 7 Dec. 2011. â€Å"Windows Server 2008. † Wikipedia, the Free Encyclopedia. Web. 12 Dec. 2011. Ward10/08/2007, Keith. â€Å"Top 10 Overlooked Windows Server 2008 Features, Part 2 — Redmond Developer News. † Powering the Windows Software Revolution — Redmond Developer News. Web. 03 Jan. 2012 â€Å"Windows Server 2008 Editions and System Requirements – Techotopia. † Main Page – Techotopia. We b. 05 Jan. 2012. â€Å"Microsoft Windows Server 2008 R2 Editions. † Web. 03 Jan. 2012. â€Å"Windows PowerShell. † Wikipedia, the Free Encyclopedia. Web. 01 Jan. 2012.

Thursday, January 2, 2020

Ngoki - 1140 Words

Functions of Potassium in Plants P When water supply is short, K is pumped out of the guard cells. The pores close tightly to prevent loss of water and minimize drought stress to the plant. If K supply is inadequate, the stomates become sluggish – slow to respond – and water vapor is lost. Closure may take hours rather than Potassium (K) increases Enzyme Activation minutes and is incomplete. crop yield and improves Enzymes serve as cataAs a result, plants with an quality. It is required for lysts for chemical reactions, insufï ¬ cient supply of K are numerous plant growth being utilized but not conmuch more susceptible to processes. sumed in the process. They water stress. bring together other molecules in such a†¦show more content†¦The plant’s transport system uses energy in the form of ATP. If K is inadequate, less ATP is available, and the transport system breaks down. This causes photosynthates to build up in the leaves, and the rate of photosynthesis is reduced. Normal development of energy storage organs, such as grain, is retarded as a result. An adequate supply of K helps to keep all of these processes and transportation systems functioning normally. Water and Nutrient Transport Potassium also plays a major role in the transport of water and nutrients throughout the plant in the xylem. When K supply is reduced, translocation of nitrates, phosphates, calcium (Ca), magnesium (Mg), and amino acids is depressed. As with phloem transport systems, the role of K in xylem transport is often in conjunction with speciï ¬ c enzymes and plant growth hormones. An ample supply of K is essential to efï ¬ cient operation of these systems. Protein Synthesis Potassium is required for every major step of protein synthesis. The â€Å"reading† of the genetic code in plant cells to produce proteins and enzymes that regulate all growth processes would be impossible without adequate K. When plants are deï ¬ cient in K, proteins are not synthesized despite an abundance of available nitrogen (N). Instead, protein â€Å"raw