Skip to main content

How is a Server Different From a Desktop?

The Difference between a Server and a Desktop Computer
Many people mistakenly believe that a server is no different from a typical desktop computer. This couldn't be further from the truth. While almost any computer that meets the minimum hardware requirements can run a server operating system that alone does not make a desktop computer a true server. Even if the desktop computer had similar processor speeds, memory and storage capacity compared to a server, it still isn't a replacement for a real server. The technologies behind them are engineered for different purposes.


Servers
A desktop computer system typically runs a user-friendly operating system and desktop applications to facilitate desktop-oriented tasks.  In contrast, a server manages all network resources. Servers are often dedicated (meaning it performs no other task besides server tasks). Because a server is engineered to manage, store, send and process data 24-hours a day it has to be more reliable than a desktop computer and offers a variety of features and hardware not typically used in the average desktop computer.

The Server Role
One of the best choices for a small business is a dedicated server built from the ground up as a file server to provide features and expansion options that a desktop computer lacks. Some server hardware decisions you will need to make include the following:
1. Form Factor: For small businesses,  the best choice is a dedicated entry-level server in a tower configuration.
2. Processor: Choose a server-specific processor to boost performance and data throughput. 
3. Memory: Buy as much memory as you can afford and look for expansion slots for future upgrades.
4. Storage: Look for SATA or SCSI hard disks, not IDE.

Server Memory and Storage Needs
The operating system (OS) is the software platform on top of which other programs will run. Choosing a server operating system is no easy task. The specific operating system you go with will depend on what the server is going to be mainly used for. For basic file servers a small business should choose an operating system that staff will be the most comfortable with. Another issue to consider is if you have any application that is best-suited to a particular operating system.



Server Map
For the average home user looking for a basic, infrequently used server a built from an old desktop computer could work.  For the small business owner, however, the question to ask is: Do you really want to trust your business data and processes to just any old hardware? Most small businesses will be far happier with a computer that is ready-made to be a dedicated server than with one that began life as a standard desktop computer. If your company's data is at all important to you, it is the only way to go.


Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...