SlideShare a Scribd company logo
1 of 6
Download to read offline
Using an Intranet Within a Company


       Corporate Database;
           Mail Server;
            Fire Wall;
         Exterior Router;
Corporate Database
         ●   You know if you
             see the left
             graph. But I
             have to say
             something, this
             thing is
             Corporated
             Datebase.
Mail Server
      ●   Mail Srever is
          management
          system. So it
          manage to
          gathered mail.
Fire Wall
     ●   A firewall is a part of a
         computer system or
         network that is
         designed to block
         unauthorized access
         while permitting
         authorized
         communications.
Exterior Router
        ●    Exterior Router
            is big router on
            my imagination.
            So , Exterior
            mean similar to
            outside. I mean
            it is big router.
Reference

http://e-words.jp/w/E383A1E383BCE383ABE382B5E3

http://www.capitalmarket.com/careers/recruit-database


http://www.geocities.jp/stray203/tlink/image/rtext-sht.jp

More Related Content

Similar to Week13

Presentation Week14
Presentation Week14Presentation Week14
Presentation Week14
guest50b02e
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
MOHD ARISH
 
Ajith Kamath_3.5+yrs_IT support Engineer
Ajith Kamath_3.5+yrs_IT support EngineerAjith Kamath_3.5+yrs_IT support Engineer
Ajith Kamath_3.5+yrs_IT support Engineer
Ajith kamath
 
How Circuit-Switched Didital Networks Work
How Circuit-Switched Didital Networks WorkHow Circuit-Switched Didital Networks Work
How Circuit-Switched Didital Networks Work
Tomoko Nishiuchi
 

Similar to Week13 (20)

En35793797
En35793797En35793797
En35793797
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
Presentation Week14
Presentation Week14Presentation Week14
Presentation Week14
 
Human Firewall - IoT presentation
Human Firewall - IoT presentationHuman Firewall - IoT presentation
Human Firewall - IoT presentation
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
 
Firewall management introduction
Firewall management introductionFirewall management introduction
Firewall management introduction
 
[White Paper] Leveraging-Automation-For-Advanced-Network-Troubleshooting
[White Paper] Leveraging-Automation-For-Advanced-Network-Troubleshooting[White Paper] Leveraging-Automation-For-Advanced-Network-Troubleshooting
[White Paper] Leveraging-Automation-For-Advanced-Network-Troubleshooting
 
White Paper Leveraging Automation for Advanced Network Troubleshooting
White Paper Leveraging Automation for Advanced Network TroubleshootingWhite Paper Leveraging Automation for Advanced Network Troubleshooting
White Paper Leveraging Automation for Advanced Network Troubleshooting
 
Presentation aim better ver2.1
Presentation aim better ver2.1Presentation aim better ver2.1
Presentation aim better ver2.1
 
aimbetter
aimbetteraimbetter
aimbetter
 
Computer network
Computer networkComputer network
Computer network
 
L'Internet des objets (IDO)
L'Internet des objets (IDO)L'Internet des objets (IDO)
L'Internet des objets (IDO)
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
Ajith Kamath_3.5+yrs_IT support Engineer
Ajith Kamath_3.5+yrs_IT support EngineerAjith Kamath_3.5+yrs_IT support Engineer
Ajith Kamath_3.5+yrs_IT support Engineer
 
IT Portfolio
IT PortfolioIT Portfolio
IT Portfolio
 
How Circuit-Switched Didital Networks Work
How Circuit-Switched Didital Networks WorkHow Circuit-Switched Didital Networks Work
How Circuit-Switched Didital Networks Work
 

Recently uploaded

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Week13