Tuesday, November 16, 2010

7.1 Security

There are 5 major threats that can potentially harm our system. The first threat is natural disasters; our company can counter this by backing up our system or storing our data in a separate location.  The next threat can be either employees or consultants that can harm our system by tampering or unintentional errors.  We can avoid this by incorporating physical access restrictions within our stores.  Another threat to our system is Links to outside business contacts.  We can prevent this threat by encrypting our data before we send it. Finally there's the threats of outsiders and viruses corrupting our systems.  We have the choice of using firewalls and/or encryption to off put these threats.

Friday, November 12, 2010

6.1 - Web 2.0

Using the Web as a Platform levels the playing field and gives every one equal opportunities to branch out using the web.   Our company, The Pizza Shop, uses the web to promote, interact, and preform transactions with our consumers and other businesses.  Harnessing Collective Intelligence compiles all input into making the web or products better. Our company allows users to give us feedback on some things that we could do to better our company.  Our site also allows users to leave reviews on their visit to our business.  Our company uses the Leveraging the data aspect by connecting our site to a database to make it more dynamic.  Doing this we are able to customize our site to meet the customers needs and provide our services to them effectively.  Implementing Innovative Capabilities is basically enhancing the web in any way.  Our company enhances our site by allow our customers to use a widget that allows them to place future orders for our products.

Tuesday, October 26, 2010

5.2 Extranet Diagram


My company would use the extranet to communicate with our supplier to get the materials when needed. We would set up a firewall so that other people outside of the company cannot access our VPN. The VPN would protect our information from other people who can access the internet. we would then be able to communicate with our suppliers without any outside interference.

5.1 B2C website critique

Website:  Pizzahut.com

     Pizzahut.com offers customers the opportunity to create and purchase their pizza products online.  Pizza Hut uses a Click-and-Mortar business strategy to conduct their business. This means that they have a physical store and a offer purchasing through their website. 

Rules and Ratings: 
1.  The website offers something unique - (3/5)
     Pizza Hut's signiture pizzas are unique in their own, but there are other online ordering options.

2. Website is aesthetically pleasing - (5/5)
    Great pictures and see the pizza while you build it.

3. Easy to interface - (5/5)
    Website is very easy to use and appeals to customers of all ages

4. Motivates people to visit - (4/5)
   The only thing I could think of that would motivate people to come back to the site is its convenient and fast.

5. Advertise presence on the web - (3/5)
    Pizza Hut has over 2100 other sites that link into it.

6. Learn something from the website - (2/5)
   There isn't too much to learn from Pizzahut.com.

4.4 Entity Relationship Diagram

This Entity Relationship Diagram shows the attributes of a particular invoice from our company.  It shows the connection between our customer and his purchase on that date.  The different attributes related to this customer is Name, Address, etc.  The attritbute types are name, quantity of order, price of order, place of residence and sex, which we keep a record of for future references and to build our networking and relationships. All these data types are stored for our records and is also included inside of our database table.

4.3 Packet-Switching


This image shows how the router sends off data from A and B converts it into packets and sends it out to C and D. The router uses the client to request the work and the server does all the work. While requesting the work the router creates a peer network between each of the routers. The IP then determines the size of the packets. TCP then checks the packets for errors or duplicates. The IP then delivers the packets to the appropriate routers.  Everything explained in the diagram is packet-switching technology.

Friday, October 22, 2010

5.3 Intranet Achitectural Diagram


    This diagram shows how an intranet works within a corporation.  Inside the "intranet" block, the client  inside the network sends information through the corporate server, through the firewall, and over the internet to the client outside the LAN.  The client can now see the information sent using an intranet.