elc 200 day 6 l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
ELC 200 Day 6 PowerPoint Presentation
Download Presentation
ELC 200 Day 6

Loading in 2 Seconds...

play fullscreen
1 / 38

ELC 200 Day 6 - PowerPoint PPT Presentation


  • 86 Views
  • Uploaded on

ELC 200 Day 6. Agenda. Finish discussion on Internets and Extranets Assignment 1 graded 5 A’s, 5 B’s, 4 C’s, 3 C’s & 2 Non Submits Assignments requires assimilation of textbook information not regurgitation

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'ELC 200 Day 6' - gwidon


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
elc 200 day 6

ELC 200 Day 6

© 2007 Prentice-Hall, Inc

agenda
Agenda
  • Finish discussion on Internets and Extranets
  • Assignment 1 graded
    • 5 A’s, 5 B’s, 4 C’s, 3 C’s & 2 Non Submits
    • Assignments requires assimilation of textbook information not regurgitation
      • If the questions reference a section of the text, your answer should be reflexive of the information on that page
    • Be consistent
      • Don’t tell me you selling widgets (a product) in Question 1 than say that you are a service provider in Question 4
    • Answer the QUESTION and only the QUESTION!
      • Extra “fluff” will cost you points
      • When you “dance around” the question, it means you don’t know the answer and you are hoping the answer in the shovel-full of whatever it is you provided as an answer
  • Quiz 1 Corrected
    • Bonus points awarded
    • 10 A’s, 6 B’s, 1 C, 1 F and 1 no-take
  • Assignment 2 is posted
    • Due Oct 4 (next class)

© 2007 Prentice-Hall, Inc

slide3

Intranets and Extranets

© 2007 Prentice-Hall, Inc

the focus of this chapter is on several learning objectives
The focus of this chapter is on several learning objectives
  • The concept, strategic significance, and technical infrastructure of intranets
  • How to plan for and install an intranet in the organization
  • The many issues, uses, and abuse of e-mail via a company’s intranet
  • A company’s extranet and how it links with its partners and vendors through SCM

© 2007 Prentice-Hall, Inc

what is an intranet
What Is an Intranet?
  • An intranet delivers collaboration and coordination to employees around the clock
    • Communication system designed by technical staff
    • A network of people, not of wired machines
    • Focus is the message, not the media
  • An organization-wide software and information distribution system that applies Internet technology and standards to a closed network within the organization
  • Normally runs in a client/server environment and a local area network configuration
  • Separated from other networks by firewalls, a means of preventing unauthorized access to the company’s internal data or leaks of sensitive company information

© 2007 Prentice-Hall, Inc

strategic significance
Strategic Significance
  • A cost-effective way of distributing information throughout an organization
  • Links employees and managers around the clock and automates a lot of intra-organizational traffic
  • Makes it possible for a company to gain better access to its primary resource - the knowledge and experience of decision makers
  • Enables easier integration of processes

© 2007 Prentice-Hall, Inc

applications human resources
Applications - Human Resources
  • Employee handbook
  • Benefits information
  • Employee surveys
  • Internal/external recruiting
  • Candidate screening
  • Organization charts
  • Newsletters
  • Company calendar

© 2007 Prentice-Hall, Inc

applications sales and marketing
Applications - Sales and Marketing
  • Product information
  • Market research
  • Prospecting
  • Managing sales contacts
  • Sales training

© 2007 Prentice-Hall, Inc

applications accounting and finance
Applications - Accounting and Finance
  • Financial reports
  • Expense reports
  • Accounts receivable/payable processing
  • Asset management
  • Policies and procedures
  • Payroll

© 2007 Prentice-Hall, Inc

applications manufacturing and operations
Applications - Manufacturing and Operations
  • Inventory control
  • Production schedules
  • Quality assurance
  • Part order/requisition system

© 2007 Prentice-Hall, Inc

other applications for intranets
Other Applications for Intranets
  • Real-time broadcasting of news, including medical information.
  • Document management to minimize unnecessary paperwork and waste of paper.
  • Customized application modules like a travel or document library.
  • Complete e-mail for interoffice and intraoffice communication.
  • Internal company office circulars can be routed electronically.
  • Bulletin board service.

© 2007 Prentice-Hall, Inc

other applications for intranets cont d
Other Applications for Intranets (cont’d)
  • Real-time chat service that electronically logs all data for record keeping.
  • Complete company staff, operations, and organizational chart directories.
  • Channel for confidential exchange of data for electronic funds transfers (EFTs) and checks.
  • A daily to-do list and assignments from a central desk to all connected desks.
    • Shared calendaring
  • Foreign news and financial data broadcasting (running ticker) from direct feeds.

© 2007 Prentice-Hall, Inc

does every company need an intranet
Does Every Company Need an Intranet?
  • A company needs an intranet for the following reasons:
    • When it has a large pool of information to share among hundreds of employees
      • <100 employees may not be cost effective
    • Intranets are cheap, robust, and fast. Any employee with access to an intranet can disseminate and publish information
    • Intranets operate across platforms
    • Information is available 24/7 to all employees at the click of a mouse
    • Information available on an intranet can be updated quickly

© 2007 Prentice-Hall, Inc

client server basics
Client/Server Basics
  • Client/server architecture is a versatile, message-based, modular infrastructure intended to improve usability, flexibility, interoperability, and scalability as compared to centralized, mainframe, time-sharing computing

© 2007 Prentice-Hall, Inc

types of client server architecture two tier architecture
Types of Client/Server ArchitectureTwo-Tier Architecture
  • Components
    • User system interface
    • Processing management
    • Database management

© 2007 Prentice-Hall, Inc

types of client server architecture two tier architecture cont d
Types of Client/Server ArchitectureTwo-Tier Architecture (cont’d)
  • Limitations associated with two-tier model
    • When the number of users grows, performance deteriorates
    • Implementation of processing management services using vendor proprietary database procedures restricts flexibility
    • There is limited flexibility in moving program functionality from one server to another without manually regenerating procedural code

© 2007 Prentice-Hall, Inc

two tier client server architecture
Two-tier Client/Server Architecture

© 2007 Prentice-Hall, Inc

types of client server architecture three tier architecture
Types of Client/Server ArchitectureThree-Tier Architecture
  • Middle tier is sandwiched between the user system interface client environment and the database management server environment
  • Middle tier manages distributed database integrity in a two-phase process
  • Third tier provides database management and is dedicated to data and file services
  • Allows different tiers to be developed in different languages
  • Improves performance for groups with a large number of users

© 2007 Prentice-Hall, Inc

three tier server architecture design
Three-tier Server Architecture Design

© 2007 Prentice-Hall, Inc

technologies that enable intranets
Server PC

Client PC

Web Server

Browser

TCP/IP electronic mail

Graphic and multimedia files

Network File System (NFS)

Internet Relay Chat (IRC)

HTML authoring tools

Hypertext Markup Language (HTML)

Portable electronic document (PED)

Technologies that Enable Intranets

© 2007 Prentice-Hall, Inc

using firewalls
Using Firewalls
  • Intranets can be protected from unauthorized access via firewalls
  • A firewallis a hardware/software security system that can be programmed to prevent unauthorized access to a company’s intranet or the Internet
  • Two primary types of firewalls:
    • Proxyis a go-between agent that acts on behalf of another
    • A packet filterchecks each packet at the network level and stops any packets that might be a security risk
  • Intranet security, properly designed by knowledgeable users and administrators, can ensure that the system is run properly

© 2007 Prentice-Hall, Inc

planning an intranet
Planning an Intranet
  • Plan ahead
  • Provide justification
  • Build in-house or outsource
  • Form an intranet team
  • Build and test a prototype
  • Ensure effective maintenence

© 2007 Prentice-Hall, Inc

e mail and the intranet
E-mail and the Intranet
  • E-mail is what intranets are best known for
  • Over 200 million in-boxes are active worldwide
  • E-mail is becoming smarter: It now can direct specific messages to defined folders and be a place to check voice, text, and fax messages
  • Intranets inherit Simple Mail Transport Protocol (SMTP) from the TCP/IP suite to operate e-mail
  • E-mail is a potential threat for employers
    • Confidentiality breaches
    • Legal liability
    • Lost productivity
    • Damage to company reputation
  • Important for a firm to create an e-mail usage policy and make sure the policy is actually implemented

© 2007 Prentice-Hall, Inc

spamming and appropriate e mail use
Spamming and Appropriate E-mail Use
  • Spamming is sending unwanted advertisements or literature through e-mail or the Internet
  • Companies have been overwhelmed by e-mail traffic, and spam is out of control
  • Spot checks are no longer adequate
  • Trend is more toward systematic monitoring of e-mail traffic using content-monitoring software

© 2007 Prentice-Hall, Inc

spamming and appropriate e mail use cont d
Spamming and Appropriate E-mail Use(Cont’d)
  • Spamming is nearly impossible to eliminate, but solutions exist:
    • Blacklist the sender; obtain a spammer’s address and block any e-mail from that address
    • Accept e-mail only from a list of approved addresses
    • Look for signs of spam
    • Use anti-spam software
  • Maine Spam Law
    • http://janus.state.me.us/legis/statutes/10/title10sec1497.html
  • Federal Can Spam Law
    • http://www.ftc.gov/bcp/conline/pubs/buspubs/canspam.htm

© 2007 Prentice-Hall, Inc

personal guidelines to avoid spam
Personal Guidelines to Avoid Spam
  • Stop giving away your e-mail address
  • Do not “unsubscribe,” it only confirms your e-mail address is real
  • Write to the Direct Marketing Association and credit bureaus
  • Contact your credit card companies, credit union, and mortgage companies and tell them not to release your name, address and similar data
  • Contact all organizations you belong to, schools, magazines you subscribe to, airline frequent flyer programs, your long-distance telephone carrier, and just about anyone who sends you a bill
  • As a last resort, contact your phone company and change your listing in the phone book, or simply list your name with no address

© 2007 Prentice-Hall, Inc

e mail and privacy
E-mail and Privacy
  • Companies have been wrestling with the issue of privacy versus liability for employee’s e-mail activity
  • Firms must have a company policy that addresses privacy. Such a policy should state in writing:
    • That the company’s intranet and the networks that carry e-mail are company property, to be used for business purposes only
    • A clear definition of what is and what is not appropriate use
    • A clear message to all employees that e-mail of any kind cannot be private and that all e-mail may be monitored at any time
  • International email privacy law
    • http://www.mofo.com/news/updates/files/update02051.html

© 2007 Prentice-Hall, Inc

e mail etiquette
E-mail Etiquette
  • Sending an e-mail message to someone is one-to-one communication as if face-to-face
  • E-mail etiquette mistakes to avoid:
    • Do not write when you’re in a bad mood or angry
    • Read what you write carefully
    • Do not use sarcasm in an attempt to be clever
    • Stay away from using all uppercase
    • Place the nature of the message in the subject line
    • Write short e-mails, normally less than two paragraphs
    • Think before you send
    • Watch your grammar, spelling, and vernacular
    • Remember to send your attachment when you say you will

© 2007 Prentice-Hall, Inc

blogging practices
Blogging Practices
  • Four major motivators for blogging:
    • Maintaining community forums
    • Articulating ideas through writing
    • Airing out pent-up emotions
    • Documenting one’s life
  • https://www.blogger.com/start

© 2007 Prentice-Hall, Inc

instant messaging
Instant Messaging
  • Sometimes the rapid response of e-mail is not fast enough
  • Instant messaging (IM) is one alternative medium
  • IM is an electronic communication system that involves immediate correspondence between two or more users who are all online simultaneously

© 2007 Prentice-Hall, Inc

extranets and scm
Extranets and SCM
  • Intranets are localized within a firm and move data quicker than the more widely distributed extranets
  • Extranets are already the backbone of the e-business future
  • Extranet designers at each participating company must collaborate to make sure there is a common interface with the company they are dealing with
  • The overall connectivity represents supply chain management
  • Extranet-SCM and Enterprise Resource Planning (ERP)
    • ERP facilitates integration of company-wide information systems with the potential to go across companies
    • The Internet allows linking the Web sites to back-end systems like ERP, offering connections to a host of external parties like vendors and suppliers

© 2007 Prentice-Hall, Inc

basic extranet layout
Basic Extranet Layout

© 2007 Prentice-Hall, Inc

key considerations for extranet installation
Key Considerations for Extranet Installation
  • Identify the user(s).
  • List the technology components.
  • Specify the security requirements.
  • Discuss the administration of the extranet.
  • Understand the functions of the extranet.

© 2007 Prentice-Hall, Inc

extranets and erp
Extranets and ERP
  • Management support of extranets are changing how organizations share internal resources and interact with the outside business world
  • The entire commitment should be viewed as a knowledge management asset
  • A “champion” represents management support. This person is:
    • An advocate with the ability to build company-wide support.
    • Sells top management on the potential of the technology.
    • Demonstrates how an extranet can help the company meet its revenue goals.
  • Extranets can be used to manage applications and tie applications into one integrated system for deriving real value

© 2007 Prentice-Hall, Inc

management implications
Management Implications
  • Intranets are tools to manage corporate intelligence
  • Change is closely related to employee satisfaction, and the effect of the intranet on the way employees do their jobs is important
  • Another management implication is the strategy for recruiting qualified technical personnel

© 2007 Prentice-Hall, Inc

chapter summary
Chapter Summary
  • An intranet is a network connecting a set of company clients using standard Internet protocols
  • Benefits of intranets include linking employees and managers around the clock; companies gain access to their primary resources; and it is the foundation for developing an enterprise-wide information system
  • The two types of client/server architecture are two-tier architecture and three-tier architecture
  • Intranets can be protected from unauthorized access via firewalls

© 2007 Prentice-Hall, Inc

chapter summary cont d
Chapter Summary (Cont’d)
  • Planning an intranet is a six-step procedure
  • E-mail is getting smarter
  • An alternative to e-mail is instant messaging
  • An extranet links two or more trading partners
  • Intranets are tools to manage corporate intelligence

© 2007 Prentice-Hall, Inc