SlideShare a Scribd company logo
GlobalFreelancing Platform
Ahmad Yar
BS Computer Science
Bahauddin Zakariya University
Multan (BZU), Sahiwal Campus.
Email ahmadyark1@gmail.com
Mobile +92303 9464551
Group Members
Saqlain
Asif
Bcs-15-14
Imran
Khan
Bcs-15-61
Muhammad
Usama
Bcs-15-60
Aziz
Masood
Bcs-15-59
Transparency
Methodologies
Reliability
Scalability
Resource Sharing
Concurrency
Data Integrity
Fault-
Tolerance
Openness
GlobalFreelancing Platform
Upwork is a freelancing marketplace where businesses of
all sizes can find talented professionals across multiple
disciplines and categories. If you are a business and are
looking to get projects done, consider signing up!
Introduction
Operation
Upwork
Introduction:
Upwork, formerly Elance-o-Desk, is a global freelancing platform where
businesses and independent professionals connect and collaborate remotely. In
2015, Elance-oDesk was rebranded as Upwork. It is based in Mountain view
and San Francisco, California. The full name is Upwork Global Inc.
Upwork has twelve million registered freelancers and five million registered clients.
Three million jobs are posted annually, worth a total of $1 billion USD, making it
one of the largest freelancer marketplaces along with Fiverr.
Operation:
Upwork allows clients to interview, hire and work with freelancers and agencies
through the company's platform. The platform now includes a real-time chat
platform aimed at reducing the time to find and hire freelancers.
The platform offers a time sheet application that tracks time and takes screenshots
while the freelancer is working.
O
1
 Transparency
 Fault Tolerance
Transparency
What Is Transparency?
A transparency is some aspect of the distributed system that is
hidden from the user (programmer, system developer, user or application
program). A transparency is provided by including some set of mechanisms in
the distributed system at a layer below the interface where the transparency is
required
How it is Achieved?
- through Firewall & Ebay Server
Why we Achieve Transparency?
- avoids user involvement in server internal working
Diagram:
Types of Transparency
Access Transparency
- local and remote resources accessed in the same way
Location Transparency
- users are unaware from the location of resources
Migration Transparency
- resources can migrate without name change
Replication Transparency
- users are unaware of existence of multiple copies of
resources
Concurrency Transparency
- users are unaware of sharing resources with others
Failure Transparency
- users are unaware of the failure of individual components
Fault Tolerance
What is Fault Tolerance?
- the property that enables a system to continue operating properly in
the event of the failure of some of its components.
How it is Achieved?
- fault tolerance is achieved by
 Recovery
 Redundancy
Issues in Achieving Fault Tolerance?
 Detecting failures
 Recovery from failures
 Redundancy
What if fault tolerance ability is not there?
 lack of reliability
 system will shutdown completely
Some important considerations when creating fault tolerant and high
availability systems in an organizational setting include:
Downtime – A highly available system has a minimal allowed level of service
interruption. For example, a system with “five nines” availability is down for
approximately 5 minutes per year. A fault-tolerant system is expected to work
continuously with no acceptable service interruption.
Scope – High availability builds on a shared set of resources that are used
jointly to manage failures and minimize downtime. Fault tolerance relies on
power supply backups, as well as hardware or software that can detect
failures and instantly switch to redundant components.
Cost – A fault tolerant system can be costly, as it requires the continuous
operation and maintenance of additional, redundant components. High
availability typically comes as part of an overall package through a service
provider (e.g., load balancer provider).
 Scalability
 Resource Sharing O
2
Scalability
What Is Scalability?
Addition of users and resources without suffering a noticeable loss of performance
or increase in administrative complexity
How Scalability is Achieved?
By enhancing RAM, hardware & other specifications of that computer & also using
better (upgraded) micro-tech boards we can extend our system or in simple words
we can gain scalability (large number of users)
Benefits of achieving Scalability?
Scalability helps in increasing the numbers of users & resources and hence
helps to grow our network.
What if we will not be able to achieve scalability?
 it will have worse effects on our network performance
 network will not extend
ResourceSharing
What Is Resource Sharing?
Resource sharing means the existing resources in a computing system can be
accessed or remotely accessed across multiple administrative domains. Learn
more in: Exploiting P2P and Grid Computing Technologies for Resource
Sharing to Support High Performance Distributed System
 Successful shared resource access allows users to operate as if the
shared resource were on their own computer. The most frequently used
shared network environment objects are files, data, multimedia and
hardware resources like printers, fax machines and scanners.
 One of the benefits of a network is that it allows groups
of computer users to share data, share software and even share hardware
(such as a printer or a modem). Most organizations that use
many computers have them connected together as a network
WhyWe Share Resources?
 Concurrency
 ReliabilityO
3
Concurrency
What is Concurrency?
In database systems and transaction processing (transaction
management)distributed concurrency control refers primarily to
the concurrency control of a distributed database . Distributed concurrency control
poses special challenges beyond centralized one, primarily due to communication
and computer latency.
How it is achieved?
- with the help of micro-tech board we manage multiple accesses to the
data simultaneously
What is Reliability?
 Provide services according to the user’s contribution. Means we
provide as much as user pay.
How it is Achieved?
 For providing services we use Micro-Tech firewall.
Reliability
Benefits of Achieving Concurrency?
 Multiple access also not effect on performance
 Users can access resources without waiting.
Benefits of Achieving Reliability?
 easily manage users & deal with them in quite well manner
What if we will not be able to achieve reliability?
 will have worse effects on performance
 may crash our system.
 Openness O
4
 What is Openness?
 How Openness is Supported?
 What extensions can be done?
 Benefits of Openness?
 What if we will not be able to achieve openness?
Openness
What is Openness?
- Whether the system can be extended in various ways without
troublesome existing system and services.
What Extensions can be done?
Hardware extensions
 Adding peripherals, memory, communication interfaces
Software extensions
 Operating System features
 Communication protocols
How Openness is Supported?
Openness is supported by:
Public interfaces
A public interface is the logical point at which independent software
entities interact. The entities may interact with each other within a single
computer, across a network, or across a variety of other topologies.
Standardized communication protocols
Benefit of Openness:
it helps in adjusting system according to our needs
What if we will not be able to achieve openness?
If we will not ensure scalability, it
 will have worse effects on our network performance
 will be unable to extend our network in terms of hardware & software
 will fail to make a name in market
Upwork presentaion in distributed systems
Upwork presentaion in distributed systems

More Related Content

What's hot

User access profiling model
User access profiling modelUser access profiling model
User access profiling model
Jose Guerrero
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Switch email platforms
Switch email platformsSwitch email platforms
Switch email platforms
Info-Tech Research Group
 
What is real time SOA?
What is real time SOA? What is real time SOA?
What is real time SOA?
Thejan Wijesinghe
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paper
jagan339
 
Architecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArchitecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems Design
Armen Arzumanyan
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
Info-Tech Research Group
 
Chapter1
Chapter1Chapter1
Chapter1
@d!tya Gs
 
Groupware tech
Groupware techGroupware tech
Groupware tech
Azmawati Lazim
 
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
Integral university, India
 
Helview Microsoft Platform For Social Computing 21 11 2007 Final Ppt2k3
Helview   Microsoft Platform For Social Computing   21 11 2007   Final   Ppt2k3Helview   Microsoft Platform For Social Computing   21 11 2007   Final   Ppt2k3
Helview Microsoft Platform For Social Computing 21 11 2007 Final Ppt2k3
Peter de Haas
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and Simplicity
PeopleWorks IN
 
Unit 5
Unit 5Unit 5
netsuite-integration-whitepaper
netsuite-integration-whitepapernetsuite-integration-whitepaper
netsuite-integration-whitepaper
Olivier Gagnon
 
Ecm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleEcm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sample
Christopher Wynder
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
swamipise14
 
Multi-Agency Multi-Media Interoperable Communication, Enabled By Redis: Paul ...
Multi-Agency Multi-Media Interoperable Communication, Enabled By Redis: Paul ...Multi-Agency Multi-Media Interoperable Communication, Enabled By Redis: Paul ...
Multi-Agency Multi-Media Interoperable Communication, Enabled By Redis: Paul ...
Redis Labs
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 
MIS enterprise system for collaboration
MIS enterprise system for collaborationMIS enterprise system for collaboration
MIS enterprise system for collaboration
Sabana Maharjan
 
Hp trim vs objective
Hp trim vs objectiveHp trim vs objective
Hp trim vs objective
traciep
 

What's hot (20)

User access profiling model
User access profiling modelUser access profiling model
User access profiling model
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Switch email platforms
Switch email platformsSwitch email platforms
Switch email platforms
 
What is real time SOA?
What is real time SOA? What is real time SOA?
What is real time SOA?
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paper
 
Architecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems DesignArchitecture and Distributed Systems, Web Distributed Systems Design
Architecture and Distributed Systems, Web Distributed Systems Design
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
Chapter1
Chapter1Chapter1
Chapter1
 
Groupware tech
Groupware techGroupware tech
Groupware tech
 
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
 
Helview Microsoft Platform For Social Computing 21 11 2007 Final Ppt2k3
Helview   Microsoft Platform For Social Computing   21 11 2007   Final   Ppt2k3Helview   Microsoft Platform For Social Computing   21 11 2007   Final   Ppt2k3
Helview Microsoft Platform For Social Computing 21 11 2007 Final Ppt2k3
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and Simplicity
 
Unit 5
Unit 5Unit 5
Unit 5
 
netsuite-integration-whitepaper
netsuite-integration-whitepapernetsuite-integration-whitepaper
netsuite-integration-whitepaper
 
Ecm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleEcm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sample
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Multi-Agency Multi-Media Interoperable Communication, Enabled By Redis: Paul ...
Multi-Agency Multi-Media Interoperable Communication, Enabled By Redis: Paul ...Multi-Agency Multi-Media Interoperable Communication, Enabled By Redis: Paul ...
Multi-Agency Multi-Media Interoperable Communication, Enabled By Redis: Paul ...
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
MIS enterprise system for collaboration
MIS enterprise system for collaborationMIS enterprise system for collaboration
MIS enterprise system for collaboration
 
Hp trim vs objective
Hp trim vs objectiveHp trim vs objective
Hp trim vs objective
 

Similar to Upwork presentaion in distributed systems

Distributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingDistributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server Computing
Haseeb Rehman
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
Jill Lyons
 
Download
DownloadDownload
Download
Valar Mathi
 
Elements Of Cloud Computing 09
Elements Of Cloud Computing 09Elements Of Cloud Computing 09
Elements Of Cloud Computing 09
Geeks
 
Cloud pres (1)
Cloud pres (1)Cloud pres (1)
Cloud pres (1)
Purushottam Basnet
 
Anil Nembang: Hures Company Case Study
 Anil Nembang: Hures Company Case Study Anil Nembang: Hures Company Case Study
Anil Nembang: Hures Company Case Study
Anil Nembang
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes
SAhammedShakil
 
CSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating SystemCSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating System
ghayour abbas
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!
Dayalan Punniyamoorthy
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)
Isuru Vincent
 
Operating system
Operating systemOperating system
Operating system
Neha Saxena
 
Middleware – Its Types, Architecture, and Benefits.docx
Middleware – Its Types, Architecture, and Benefits.docxMiddleware – Its Types, Architecture, and Benefits.docx
Middleware – Its Types, Architecture, and Benefits.docx
Xavor Corporation - Redefining Health Technology
 
Cms pres
Cms presCms pres
Cms pres
Mario Noble
 
نظم موزعة Distributed systems slides.01.pdf
نظم موزعة Distributed systems slides.01.pdfنظم موزعة Distributed systems slides.01.pdf
نظم موزعة Distributed systems slides.01.pdf
Bilal Al-samaee
 
Contrasting High Availability, Fault Tolerance, and Disaster Recovery
Contrasting High Availability, Fault Tolerance, and Disaster RecoveryContrasting High Availability, Fault Tolerance, and Disaster Recovery
Contrasting High Availability, Fault Tolerance, and Disaster Recovery
MaryJWilliams2
 
Quality Attributes of Web Software Applications ∗
Quality Attributes of Web Software Applications ∗Quality Attributes of Web Software Applications ∗
Quality Attributes of Web Software Applications ∗
hasnainqayyum1
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
Alokeparna Choudhury
 
DISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docxDISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docx
vinaypandey170
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1
shaik subhani
 

Similar to Upwork presentaion in distributed systems (20)

Distributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingDistributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server Computing
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
Download
DownloadDownload
Download
 
Elements Of Cloud Computing 09
Elements Of Cloud Computing 09Elements Of Cloud Computing 09
Elements Of Cloud Computing 09
 
Cloud pres (1)
Cloud pres (1)Cloud pres (1)
Cloud pres (1)
 
Anil Nembang: Hures Company Case Study
 Anil Nembang: Hures Company Case Study Anil Nembang: Hures Company Case Study
Anil Nembang: Hures Company Case Study
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes
 
CSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating SystemCSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating System
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)
 
Operating system
Operating systemOperating system
Operating system
 
Middleware – Its Types, Architecture, and Benefits.docx
Middleware – Its Types, Architecture, and Benefits.docxMiddleware – Its Types, Architecture, and Benefits.docx
Middleware – Its Types, Architecture, and Benefits.docx
 
Cms pres
Cms presCms pres
Cms pres
 
نظم موزعة Distributed systems slides.01.pdf
نظم موزعة Distributed systems slides.01.pdfنظم موزعة Distributed systems slides.01.pdf
نظم موزعة Distributed systems slides.01.pdf
 
Contrasting High Availability, Fault Tolerance, and Disaster Recovery
Contrasting High Availability, Fault Tolerance, and Disaster RecoveryContrasting High Availability, Fault Tolerance, and Disaster Recovery
Contrasting High Availability, Fault Tolerance, and Disaster Recovery
 
Quality Attributes of Web Software Applications ∗
Quality Attributes of Web Software Applications ∗Quality Attributes of Web Software Applications ∗
Quality Attributes of Web Software Applications ∗
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
DISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docxDISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docx
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1
 

Recently uploaded

DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 

Upwork presentaion in distributed systems

  • 1.
  • 2. GlobalFreelancing Platform Ahmad Yar BS Computer Science Bahauddin Zakariya University Multan (BZU), Sahiwal Campus. Email ahmadyark1@gmail.com Mobile +92303 9464551
  • 5. GlobalFreelancing Platform Upwork is a freelancing marketplace where businesses of all sizes can find talented professionals across multiple disciplines and categories. If you are a business and are looking to get projects done, consider signing up!
  • 7. Introduction: Upwork, formerly Elance-o-Desk, is a global freelancing platform where businesses and independent professionals connect and collaborate remotely. In 2015, Elance-oDesk was rebranded as Upwork. It is based in Mountain view and San Francisco, California. The full name is Upwork Global Inc. Upwork has twelve million registered freelancers and five million registered clients. Three million jobs are posted annually, worth a total of $1 billion USD, making it one of the largest freelancer marketplaces along with Fiverr. Operation: Upwork allows clients to interview, hire and work with freelancers and agencies through the company's platform. The platform now includes a real-time chat platform aimed at reducing the time to find and hire freelancers. The platform offers a time sheet application that tracks time and takes screenshots while the freelancer is working.
  • 9. Transparency What Is Transparency? A transparency is some aspect of the distributed system that is hidden from the user (programmer, system developer, user or application program). A transparency is provided by including some set of mechanisms in the distributed system at a layer below the interface where the transparency is required How it is Achieved? - through Firewall & Ebay Server Why we Achieve Transparency? - avoids user involvement in server internal working
  • 11. Types of Transparency Access Transparency - local and remote resources accessed in the same way Location Transparency - users are unaware from the location of resources Migration Transparency - resources can migrate without name change Replication Transparency - users are unaware of existence of multiple copies of resources Concurrency Transparency - users are unaware of sharing resources with others Failure Transparency - users are unaware of the failure of individual components
  • 12. Fault Tolerance What is Fault Tolerance? - the property that enables a system to continue operating properly in the event of the failure of some of its components. How it is Achieved? - fault tolerance is achieved by  Recovery  Redundancy Issues in Achieving Fault Tolerance?  Detecting failures  Recovery from failures  Redundancy
  • 13.
  • 14. What if fault tolerance ability is not there?  lack of reliability  system will shutdown completely Some important considerations when creating fault tolerant and high availability systems in an organizational setting include: Downtime – A highly available system has a minimal allowed level of service interruption. For example, a system with “five nines” availability is down for approximately 5 minutes per year. A fault-tolerant system is expected to work continuously with no acceptable service interruption. Scope – High availability builds on a shared set of resources that are used jointly to manage failures and minimize downtime. Fault tolerance relies on power supply backups, as well as hardware or software that can detect failures and instantly switch to redundant components. Cost – A fault tolerant system can be costly, as it requires the continuous operation and maintenance of additional, redundant components. High availability typically comes as part of an overall package through a service provider (e.g., load balancer provider).
  • 16. Scalability What Is Scalability? Addition of users and resources without suffering a noticeable loss of performance or increase in administrative complexity How Scalability is Achieved? By enhancing RAM, hardware & other specifications of that computer & also using better (upgraded) micro-tech boards we can extend our system or in simple words we can gain scalability (large number of users)
  • 17.
  • 18.
  • 19. Benefits of achieving Scalability? Scalability helps in increasing the numbers of users & resources and hence helps to grow our network. What if we will not be able to achieve scalability?  it will have worse effects on our network performance  network will not extend
  • 20. ResourceSharing What Is Resource Sharing? Resource sharing means the existing resources in a computing system can be accessed or remotely accessed across multiple administrative domains. Learn more in: Exploiting P2P and Grid Computing Technologies for Resource Sharing to Support High Performance Distributed System
  • 21.  Successful shared resource access allows users to operate as if the shared resource were on their own computer. The most frequently used shared network environment objects are files, data, multimedia and hardware resources like printers, fax machines and scanners.  One of the benefits of a network is that it allows groups of computer users to share data, share software and even share hardware (such as a printer or a modem). Most organizations that use many computers have them connected together as a network WhyWe Share Resources?
  • 23. Concurrency What is Concurrency? In database systems and transaction processing (transaction management)distributed concurrency control refers primarily to the concurrency control of a distributed database . Distributed concurrency control poses special challenges beyond centralized one, primarily due to communication and computer latency. How it is achieved? - with the help of micro-tech board we manage multiple accesses to the data simultaneously
  • 24. What is Reliability?  Provide services according to the user’s contribution. Means we provide as much as user pay. How it is Achieved?  For providing services we use Micro-Tech firewall. Reliability Benefits of Achieving Concurrency?  Multiple access also not effect on performance  Users can access resources without waiting.
  • 25. Benefits of Achieving Reliability?  easily manage users & deal with them in quite well manner What if we will not be able to achieve reliability?  will have worse effects on performance  may crash our system.
  • 27.  What is Openness?  How Openness is Supported?  What extensions can be done?  Benefits of Openness?  What if we will not be able to achieve openness? Openness
  • 28. What is Openness? - Whether the system can be extended in various ways without troublesome existing system and services. What Extensions can be done? Hardware extensions  Adding peripherals, memory, communication interfaces Software extensions  Operating System features  Communication protocols
  • 29. How Openness is Supported? Openness is supported by: Public interfaces A public interface is the logical point at which independent software entities interact. The entities may interact with each other within a single computer, across a network, or across a variety of other topologies. Standardized communication protocols
  • 30. Benefit of Openness: it helps in adjusting system according to our needs What if we will not be able to achieve openness? If we will not ensure scalability, it  will have worse effects on our network performance  will be unable to extend our network in terms of hardware & software  will fail to make a name in market