bcor2500_internetwww

bcor2500_internetwww - communication is accessible to all!...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
BCOR 2500 “Da Web” Ken Kozar/Tom Miaskiewicz Ken Kozar/Tom Miaskiewicz Leeds School of Business Leeds School of Business University of Colorado/Boulder University of Colorado/Boulder
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
I nternet vs. WWW Internet is network on which the “web” is built A series of tubes?
Background image of page 2
Wonderful but, Why the Web? Communicating Sharing Selling Convincing Overall Business Communities
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Dangers of the Web Incorrect information Inconsistent information In state of flux Many authors, few editors Security and privacy Creeps!
Background image of page 4
How does the web work? Based on open standards and protocols Why are they important? Other everyday standards?
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How does the web work? Asynchronous Disassemble/send/receive/reassemble Parts is Parts Not like a phone call Inherent latency Reassembly delay
Background image of page 6
How does the web work? Distributed No central traffic control Scalable Multiple paths Links can be removed
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security measures Unless some restrictions are introduced, internet
Background image of page 8
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 10
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 12
Background image of page 13
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: communication is accessible to all! 45.7 million credit card numbers stolen at TJX Security measures Encryption TOM -> RAD (T=R, O=A, M=D) Firewall Fence around an organization Traffic monitoring Avoiding flooding (denial of service) I ntranets Within the boundaries of an organization You have used? Registration? Leeds School? Meeting minutes, announcements, bylaws, lists, calendar, etc.) Companies? Benefits enrollment, performance reporting, etc. Extranets Suppliers with purchasing and supply chain Customers with customer relationship management (Amazon) Global Network World is Smaller World is Flatter The Eurasia Project Why? Where? Eurasia e-Commerce Module 1 Understanding and Planning e-Commerce Module 2 Implementing an e-Commerce website...
View Full Document

Page1 / 13

bcor2500_internetwww - communication is accessible to all!...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online