Title: EBUS400 eBusiness
1EBUS/400 eBusiness
2Agenda
1. Admin
2. Review
3. eBusiness IT Infrastructure Supply Chain
3Questions?
4Course Outline
- Week 1 eBusiness Strategy
- Week 2 eBusiness IT Infrastructure and Supply
Chain - Week 3 eBusiness Marketing
- Week 4 eBusiness Legal, Ethical, and Regulatory
Issues - Week 5 eBusiness Trends
5Objectives
- Explain IT infrastructure in eBusiness.
- Explain supply chain in eBusiness.
6 7IT Infrastructure Components
- Architecture
- Terms
- Concepts
- Performance
- Reliability / Availability
- Security
- Applications
8The Internet
- Public and global communication network
- Provides direct connectivity to anyone via a LAN
and an ISP - Access is not restricted to anyone
- This lack of control may result in an information
overload - Information is difficult to locate
- Users need effective and efficient search engines
to navigate the sea of information - No centralized control of network and information
9Technology Overview
- Internet is the most obvious technology needed to
conduct eCommerce - Other technologies are also required
- Clients and servers
- Web servers
- Application servers
- Database software
- Network switches and hubs
- Encryption hardware and software
- Multimedia support
10A Little History
- 1969 US military network
- Advanced Research Projects Agency (ARPANET)
- Allowed computers to talk to one another over a
client/server network - 1990 Internet is turned over to the private
sector - 1995-1997 WWW and rise of the browser help to
drive the commercialization of the internet - 1999 Peak of dot.com boom
- 2000 The crash of many dot.coms
11The Internet vs. The Web
- The Internet is ALL of the computers and ALL of
the information available - WWW
- Subset of the Internet
- Contains hypermedia
- Accessible through a browser
- In reality, the two terms tend to be used
interchangeably
12Internet overview and TLAs
- NAP Network Access Point
- POP Point of Presence
- ISP Internet Service Provider
- T1, T3 high speed dedicated circuits
- Backbones interconnect NAPs
- NAPs feed multiple POPs
- POPs feed individual users and Intranets
Three Letter Acronyms
13Intranets
- A private computer network that can be accessed
only by authorized persons, typically employees
of a company or other members of an organization - Low-cost way to distribute corporate information
- Collect and group information for external
dissemination - Infrastructure requirements are usually in place
if PCs are on a LAN - Includes TCP/IP network, Web authoring software,
Web server HW/SW, Web clients, firewall server
14Extranets
- An extension of an organizations intranet, often
using the Internet - Enables information sharing between the
organization and its members or partners - Connect companies with suppliers or other
business partners - Can be public, secure private network, or VPN
- Provide the infrastructure for companies to
coordinate purchases, use EDI, and improve
communications
15Networks
- Public Network
- An extranet that allows the public to access its
intranet - When two or more companies agree to link their
intranets using a public network (such as the
Internet) - Private Network
- A leased-line connection that physically connects
two intranets
16VPNs
- Uses public networks and protocols to send
sensitive data by using tunnels - private passageways through the Internet
- Designed to save money and create a competitive
advantage by alliances formed with cooperating
companies
17Intranets and Extranets
18Dedicated Intranet
19VPN Intranet
20Dedicated Extranet
21VPN Extranet
22Services
- http calls up web pages
- https calls up SSL secured web pages
- ftp retrieves a file
- mailto sends e-mail to specific address
- news accesses a newsgroup
- file accesses a file on the client-side computer
- older, mostly obsolete
- gopher connects to gopher menu
- telnet logs into a remote computer
23Protocols and IP Packets
- Whats a protocol?
- Just a method of communication
- TCP/IP
- Transmission Control Protocol / Internet Protocol
- Ensures two computers communicating must be
acknowledged as received or will retransmit - Universal rules of the road
- Everything that is sent over the Internet is sent
in an IP Packet - IP packets can contain anything
24Basic Terms
- URL (Uniform Resource Locator)
- Addressing scheme
- Where resources are
- HTTP (HyperText Transfer Protocol)
- Set of rules for exchanging text, images,
hypertext, and multimedia files over the World
Wide Web - HTML (Hypertext Markup Language)
- Coding language to create hypertext documents
- Tells the browser how to display a Web pages
words and/or images for the user - Can be created using any text editor
- Browsers
- Opera, Firefox, Mozilla, Internet Explorer,
Netscape, Safari, Camino - Cookies
- Small pieces of information placed onto a user's
computer that can be retrieved later by the Web
server - Mainly used to identify a user and their related
information
25Uniform Resource Locator (URL)
URL Internet address for web document or file
http//www.moolah.com/wealth/money.html
method or service (usually a protocol)
file name
file location (directory path)
computer (server)
domain
26Domain Name
Host Name e.g., www, encarta
http//www.hp.com
First Level (Top Level ) Domain Names e.g., com,
edu, gov, mil, net, org, int, info - several
hundred exist
Second Level Domain Names e.g., Yahoo, MSN,
Microsoft, Phoenix
http//computer.howstuffworks.com/dns.htm
27Domain Name Services (DNS)
- Translate domain names to IP addresses
- Created in 1983 by University of Wisconsin
- Sounds simple, but
- billions of IP addresses in use
- most machines have human-readable name as well
- billions of DNS requests made every day
- hundreds of millions of people/machines using the
Internet daily - domain names and IP addresses change daily
- new domain names get created daily
http//computer.howstuffworks.com/dns.htm
28Domain Name Services (DNS) (contd)
- Single entity controlling the list to ensure no
duplicates arise - Network Solutions is in charge of maintaining the
list - DNS is distributed
- Example microsoft.com will maintain their own
domain name server - Microsoft has several hundred thousand IP
addresses and host names - Microsoft can change the database for its domain
whenever it wants because it owns its DNS - Every domain has a DNS somewhere that handles its
request - Completely distributed throughout the world on
millions of machines administered by millions of
people, yet it behaves like a single, integrated
database - Only 14 DNS servers at the top level
http//computer.howstuffworks.com/dns.htm
29Reliability / Availability
- Service Level Agreement (SLA)
- Typically describes a providers promise for
service delivery and the processes for
interaction between the provider and customer - Metrics
- Uptime and availability
- Performance and capacity
- Backups and disaster recovery
- Problem resolution
30Security
- Many fears to overcome / assets to be protected
- Intercepted e-mail messages
- Unauthorized access to digital intelligence
- Access to client computers / web and commerce
servers - Credit card information falling into the wrong
hands - Trust of our customers
- Privacy
- Non-repudiation
- The sender cannot deny that he/she/it actually
sent the message
31Virus Protection
- What software that
- Examines files and data
- Identifies virus infections
- Cleans, quarantines, or deletes them
- Why
- Protects your PC and the data residing on it
- Prevents the virus from taking effect and
spreading
32Encryption
- What
- Processes and mechanisms for encoding data
- Why
- Preventing unauthorized access
- Validating data
- Verifying the source of data
- How
- One-way
- Private key (shared secret)
- SSL standard
33Identification
- What
- Processes and mechanisms for uniquely identifying
a user, usually to grant or deny access to
resources - Why
- Access control
- Individual accountability for resource usage
- Auditing
34Firewalls
- What
- Software and sometimes hardware that controls
access into and out of a private or semi-public
network - Why
- Primarily intended to prevent unauthorized access
- Can also provide caching to improve performance
- Can also provide protocol and/or content
restriction to enforce local network policies
35Firewalls (contd)
- How
- Packet filters
- Look at the IP header and allow or deny
transmission, based on the IP address and
protocol requested - Protocol gateway
- Act as a proxy between clients and servers for
specific protocols, and make allow/deny decisions
based on content within the packet - Address translation
- Hides the IP addresses of internal network
clients from the outside world - Packet inspection
- Extends the protocol gateway technique to inspect
the contents of individual packets
36Security Policies
- What
- Documentation and processes that define
guidelines for appropriate use of network
resources and specify how to prevent and respond
to security intrusions - Why
- Identifies resources, threats, risks, and
consequences - Helps ensure appropriate coverage at a consistent
level of detail - Instructs personnel on what to do and what not to
do, both during normal circumstances and during a
security event
37Elements of Good Security Policies
- Physical security
- Identification and authentication
- Encryption
- Password management
- Firewalls
- Software policies
- Architecture and access
- Incident detection and handling (NIDS, HIDS)
- Security awareness and education
- Audit and review
38Webpage Generation
- Static HTML
- Small, simple web sites
- Content doesnt change or rarely changes
- Example brochure
- Statically-generated HTML
- Small-to-medium size and complexity
- Content changes infrequently or on a schedule
- Example basic corporate informational web site
- Dynamically-generated HTML
- Medium-to-large size and complexity
- Content changes frequently or even continuously
- Example live eCommerce catalog site or
information/news site
39Databases
- Batch update vs. real-time
- Applications
- Product catalogs
- Inventory
- Customer information
- Web page content
40New Applications
- Corporate, product, support, and investor
information online - eCommerce
- Live help, webinars, etc.
- LiveMeeting, NetMeeting
41Legacy Applications
- AR / AP
- Order Entry
- Inventory Control
- Shipping and Receiving
- HR / Payroll
- GL
- Supply Chain
- via conventional mechanisms and EDI
42Web/Application Integration
- Webifying applications
- Inter-program communications
- Establishing common data dictionaries and
structures within an organization - Establishing common data dictionaries and
structures across organizations - Retraining
43 44Supply Chain
- The total sequence of business processes that
enables customer demand for a product or service
to be satisfied
Wholesale Distributors
Manufacturers
Suppliers
Retailers
Customers
Information Flows
Goods Flow
45Supply Chain Components
- Logistics
- Part of the supply chain process that plans,
implements, and controls the acquisition, storage
and transportation of goods, services, and
related information from the point of origin to
the point of consumption - Production
- The process of transforming inputs of raw
materials or goods into finished products - Distribution
- The marketing or merchandising of goods or
products
46Supply Chain Management (SCM)
- Ensures merchandise is produced and distributed
- at the right quantities,
- to the right locations,
- and at the right time,
- in order to minimize system-wide costs while
satisfying service level requests - Goal to reduce inventory
47SCM Benefits
- Reduced supply costs
- Improved profit margins
- Profit per additional unit produced
- Better return on assets
- Better information gathering and sharing
48Supply Chain and the Internet
- Advantages
- Reduced deployment and admin costs
- Familiar interfaces (i.e., web browser)
- Accessibility via technology (i.e., the Internet)
49SCM eBusiness Software
- Planning Applications
- Can use mathematical modeling and algorithms to
determine the best way to fill an order - Enables collaboration and information sharing
between parties - Real-time sharing of sales forecasts and
replenishment plans - Assists in new product development and
change-overs - Execution applications
- Track the physical status of goods, the
management of materials, and the financial
information of all parties - Records performance data about the supply chain
50SCM eBusiness Software ? Issues
- Learning curve
- Technology and existing processes
- Functional silos
- Conflicting goals and objectives
- Coordination
- Centralized vs. decentralized control
51Disintermediation / Reintermediation
- Removing the middleman
- Going direct from producer to the end consumer
- What are the advantages/disadvantages of
disintermediation?
52Some Supply Chain Metrics
- SLA measurements
- On-time deliveries
- Stock-outs and inventory levels
- Cycle time
- Inventory
- Cash to cash working capital
- Returns (for various reasons)
- Costs as percent of revenue
53Electronic Conferencing Tools
- Share information and collaborate while working
together on joint assignments, no matter where
they are located - Include such tools as
- Data Conferencing
- Voice Conferencing
- Video Conferencing
- Discussion Forums
- Chat Systems
- Electronic Meeting Systems
54Data Conferencing
- Users can view, markup, revise, and save
changes to a shared whiteboard of drawings,
documents, and other materials in real-time - Most allow a voice and data conference at the
same time - Can also provide highlighting and annotating
documents
55Voice Conferencing
- Telephone conversations shared among several
participants via speaker phones or networked PCs
with Internet telephone software
56Video Conferencing
- Provides real-time video/audio conferences among
users in different locations) - Teleconferencing often employs one-way video
- In such cases major participants may be televised
while participants at remote sites may only be
able to take part with voice input of questions
and responses - May include whiteboarding
- Examples White Pines CUSeeMe and Intels
ProShare
57Other Tools
- Discussion Forums
- Encourages and manages online text discussions
among members of special interest groups - Electronic bulletin boards
- Chat Systems
- Enable networked users to have real-time text
conversations - Electronic Meeting Systems
- Facilitate communication and improve efficiency,
quality, and creativity in group decision making
during business meetings
58Collaborative Work Management Tools
- Help business professionals accomplish or manage
group work activities - Includes the following
- Calendaring and Scheduling
- Task and Project Management
- Workflow Systems
- Knowledge Management
59Calendaring and Scheduling
- Automatically schedule, notify, and remind
members of teams and workgroups of meetings,
appointments, and other events - Many of these capabilities are provided in office
automation packages commonly available - e.g., Microsoft Office Professional
60Task and Project Management
- Manage team and workgroup projects by scheduling,
tracking, and charting the completion status of
tasks within a project - Most groupware packages also produce charts
(e.g., Gantt charts) to help plan and track
projects
61Workflow Systems
- Accomplish and manage the flow of structured work
tasks and electronic document processing within a
knowledge-based business process - Structured tasks are tasks that involve a set of
rules that govern the flow of subtasks and
typically involve task information contained in
documents - Example processing of a tax return
- Examples Novell GroupWise and Lotus Notes
62Knowledge Management
- Used to create an organizations knowledge base
- Help to organize and share the diverse forms of
business information created within an
organization - including managing project and enterprise
document libraries, discussion databases,
hypermedia databases - Examples Livelink and AltaVista
63Questions?
64Next Workshop
65- Dont hesitate to call or email
- Have a great week!
- Now, go home!