What is the charge?

Download Report

Transcript What is the charge?

Internet/WWW
Web Browsers


Internet Explorer
Netscape Navigator
Netscape
Explorer
Viewing HTML code




HTML – Hypertext Markup Language
Viewing HTML code can help you learn
more about how to create web sites.
You can copy HTML code from any site on
the internet, modify it and create your own
site.
Software exists to allow you to build a web
page w/o knowing HTML (Geocities, Web
Page Builder)
How to View HTML code

Internet Explorer:
View - Source
OR
 Right-click and choose View Source


Netscape Navigator
View - Page Source
OR
 Right-click and choose View Page Source

Using Search Engines



Search Engines are the “Yellow Pages” of
the Web
Type in any key words and the search
engine will find web pages with those key
words in them
Examples:




www.yahoo.com
www.lycos.com
www.iwon.com
www.netscape.com
Business use of the Web





Products
Information
Marketing
Customer Support
Low-cost alternative to:



Fax
Express-mail
Provide employees access to company
information and systems
Intranet



Internal corporate network
Built using Internet and WWW standards
Employees can access information and
applications
Extranet



A network that links specific parts of an
Intranet to outside customers, business
partners, etc.
Built using Internet and WWW standards
Security concerns:


Authentication
Information is protected
Internet/Intranet/Extranet
VPN – Virtual Private Network



VPN – secure connection between two
points on the Internet
Uses Tunneling - Encapsulate data in an IP
packet that is sent over the internet.
VPNs are usually provided by ISPs
Firewall


Sits between the internal network of a
company and the Internet.
Limits access into and out of the network
based on a set of rules (policy)
VPN
Internet Issues – who owns it?




Who owns the Internet???
Who manages the Internet???
Government provided early funding and direction
but does not own or manage it
Internet Society/Internet Activities Board:



Manage protocols
Foster growth
Universities/Govt agencies investigate how
Internet content can be controlled.
Internet Issues – Service Bottlenecks





Internet traffic increases every day
Companies underestimate computing
power needed to service all requests
Phone lines and slow modems
Poor ISP service
Routers get overloaded and lose packets
Bottleneck Solutions



New transmission technologies
Improve routers
Prioritize traffic
Internet Issues – Privacy

Cookie - file created on your hard drive by a
web site you visit



Companies can track actions you take on their site
Browsers allow you to prevent cookies from
being created
Cryptography:



Encryption – converts text to “unreadable form”
Decryption – converts it back to std text form
Both sender and receiver use a electronic key to
“lock” and “unlock” the data
E-Commerce




Electronic Commerce
Conducting business activities using
electronic means
B2C (Business to Consumer) – customers
deal directly with a business
B2B (Business to Business) – businesses sell
products/services to other businesses

Expected to grow faster then B2C
E-Commerce Applications

Retail



Marketing


Market segmentation
Investment/Finance



Buy products on-line (Jcrew, Office Depot, etc.)
Sell wholesale to other companies
On-line stock trading
On-line banking
Auctions
E-Commerce Technology
Poor web-site performance loses customers
 Hardware
 Server Software


Web Page Construction Software



Apache HTTP Server, Microsoft Internet Information
Server
Dynamic – information on page varies based on user
requests
Static – web page does not change
E-commerce Software
Paying on-line


Credit Card, Charge Card, Debit Card
Smart Card



Contains a microchip that has memory and
processing capability
Financial, health, credit card, id/pwd
Reader attached to pc