• Save
Biblio Tech Online Services Proposal
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Biblio Tech Online Services Proposal

  • 628 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
628
On Slideshare
626
From Embeds
2
Number of Embeds
1

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 2

http://www.linkedin.com 2

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Confidential Page 1 21/03/2001 BiblioTech Online Services Proposal BY BiblioTech Confidential Prepared By Jonathan Lishawa Business Development BiblioTech Ltd. Unit 3, The Piper Centre, 50 Carnwath Rd London SW6 3EG 26th February 2001
  • 2. Confidential Page 2 21/03/2001 TABLE OF CONTENTS1 BIBLIOTECH HISTORY................................................................................................... 42 BIBLIOTECH ADVANTAG E .......................................................................................... 7 2.1 PROVEN EXPERIENCE, AND RELIABILITY ......................................................... 7 2.2 SERVICE INTEGRATION................................................................................................ 7 2.3 CUSTOMIZATION .............................................................................................................. 8 2.4 INTERNATIONAL SUPPORT WITH MULTIPLE LANGUAGES ..................... 83 BIBLIOTECH SOLUTION................................................................................................ 9 3.1 FULLY BRANDED WITH YOUR LOGO, LOOK AND FEEL ............................. 9 3.2 RICH FUNCTIONALITY................................................................................................. 9 3.3 VERIFIED BEST-OF-BREED PERFORMANCE...................................................... 9 3.4 ONLINE ADMINISTRATION ......................................................................................... 9 3.5 UNIFIED REGISTRATION ............................................................................................10 3.6 SECURE TRANSMISSION .............................................................................................10 3.7 PUBLIC KEY INFRASTRUCTURE.............................................................................10 3.8 DISASTER RECOVER Y AND DATA BACKUP......................................................11 3.9 SERVICE MANAGEMENT ............................................................................................11 3.10 CONSULTATION SERVICES .......................................................................................114 SCOPE OF RELATIONS HIP .........................................................................................12 4.1 AD SERVING AND BLOCKING...................................................................................125 ONLINE SERVICES..........................................................................................................13 5.1 EMAIL SERVICES ............................................................................................................13 5.2 MESSAGE MANAGEMENT ..........................................................................................14 5.3 MESSAGE COMPOSITION ...........................................................................................14 5.4 FOLDER MANAGEMENT .............................................................................................15 5.5 CONTACT CENTER.........................................................................................................15 5.6 CALENDAR .........................................................................................................................15 5.7 PREFERENCES ..................................................................................................................15 5.8 FILTERS ................................................................................................................................16 5.9 ANTI-VIRUS SERVICE ...................................................................................................16 5.10 FILE FILTERING SERVICE .........................................................................................17 5.11 SPAM FILTERING SERVICE .......................................................................................17 5.12 KEYWORD FILTERING SERVICE............................................................................17 5.13 REPORTING SERVICE...................................................................................................17 5.14 SECURE LOGIN (SSL).....................................................................................................17
  • 3. Confidential Page 3 21/03/2001 5.15 PUBLIC KEY SECURITY...............................................................................................17 5.16 ONLINE CALENDAR.......................................................................................................17 5.17 COMPANY DIRECTO RY SERVICES ........................................................................18 5.18 ONLINE FILE STO RAGE SERVICES .......................................................................18 5.19 ONLINE COLLABOR ATION SERVICES .................................................................18 5.20 WEB HOSTING SERVICES ...........................................................................................19 5.21 BOOKMARK SERVIC ES ................................................................................................19 5.22 DISCUSSION SERVICES ................................................................................................19 5.23 REAL TIME CHAT SERVICES ....................................................................................20 5.24 WIRELESS SERVICES ....................................................................................................206 RELATED SERVICES ......................................................................................................217 TECHNICAL INFRASTRUCTURE.............................................................................238 SERVICE LEVEL AGREEMENT ................................................................................24 8.1 UPTIME GUARANTEE ...................................................................................................24 8.2 ROUNDTRIP GUARANTEE ..........................................................................................24 8.3 SECURITY............................................................................................................................24 8.4 DISASTER RECOVER Y ..................................................................................................24 8.5 SERVICE MONITORING...............................................................................................269 CUSTOMER SERVICE ....................................................................................................28 9.1 CUSTOMIZATION SUPPORT ......................................................................................28 9.2 THE BUSINESS PARTNER SUPPORT ......................................................................28 9.3 END-USER SUPPORT ......................................................................................................2810 DATA & CUSTOMER OWNERSHIP/REPORTING .............................................2911 TIMING AND STAFFING...............................................................................................3012 INTERNATIONAL CAPABILITIES ............................................................................3113 PRICING ...............................................................................................................................3214 INTERGRATION SERVICES ........................................................................................3415 REVENUE OPPORTUNITIES .......................................................................................35 15.1 BIBLIOTECH GENERATED REVENUES ................................................................35 15.2 CLIENT GENERATED REVENUES ...........................................................................3516 COMPANY INFORMATION .........................................................................................3717 REFERENCE SITES ..........................................................................................................38
  • 4. Confidential Page 4 21/03/2001ACKNOWLEDGEMENTS Contributing to this article was Jonathan Lishawa.
  • 5. Confidential Page 5 21/03/2001OVERVIEW This document describes the online services that BiblioTech can provide to client organisation. It is intended to be used by BiblioTech’s business development team, members of the sales department and partners who wish to understand BiblioTech online services proposition in more detail.
  • 6. Confidential Page 6 21/03/20011 BIBLIOTECH HISTORY BiblioTech is a leading Internet software development company providing sophisticated interactive online environments. Our Application Service Provider (ASP) model allows for an open and collaborative environment, through which applications are receptive to communications with other applications either within the organisational boundaries or beyond. Building on this collaborative enterprise application environment, BiblioTech can offer fully managed solutions and services to organizations. The ASP model BiblioTech provides uses proprietary web-enabled software applications that have been developed and build solutions, that can, collectively and singly, fulfil all existing and future market requirements. Within any given iteration of BiblioTech’s ASP model, there exists the potential to offer a range of value-added services. These value-added services may already exist, be developed or outsourced as appropriate to serve the specific requirements and sensitivities of organisations and their membership.
  • 7. Confidential Page 7 21/03/20012 BIBLIOTECH ADVANTAGE BiblioTech empowers organizations worldwide by providing an open online environment with associated web based applications and integrated communication services. BiblioTech’s enterprise environment enables organizations to immediately deploy a community-building, fully integrated communication service that is scaleable across millions of end-users. BiblioTech’s modular applications use a platform independent proprietary web based interface. These solutions are backed by over five years of development expertise and one of the most experienced technical teams in the industry. Since BiblioTech’s inception in 1996, it has been at the forefront of developing interactive online environments and associated applications. BiblioTech is an Internet ASP with two key business products, launched in 1997 and 1999 respectively: Postmaster is a free multilingual web based email system which was judged ‘simply the best’ in a November 1999 survey of nearly 300 such services by internet.com, and Schoolmaster is the only secure multinational multilingual online education portal. It has already registered in excess of 25% of UK senior schools, with 4,300 registered schools worldwide. It won the Intel-sponsored ‘Best Application for Secondary Schools’ at BETT 2000. 2.1 PROVEN EXPERIENCE, AND RELIABILITY BiblioTech has been providing free web based email and other associated services to the general public since 1996, through Postmaster, while schools around the world rely on schoolmaster.net Service Portal every day to provide hundreds of thousands of students with a secure, robust, easy-to-use, 24-hour online education environment catering to their immediate communication needs. No other Web company can rival the long history of actively developing for and supporting the needs of organisations and online communities worldwide. 2.2 S ERVICE INTEGRATION BiblioTech’s ASP model is an open enterprise environment on which to offer multiple premium service options to organisations and their constituents. BiblioTech has successfully integrated a wide range of communication products directly into this environment, providing organisations with a secure cost effective solution to all their online communication needs. BiblioTech also has the technical capability to rapidly integrate organisation’s existing information systems into the environment, enabling them to enjoy the benefits that such service integration provides. With the open framework supplied by the enterprise environment, integrating third party products and services is also not problematic and is encouraged where advantageous or reques ted.
  • 8. Confidential Page 8 21/03/20012.3 CUSTOMIZATION BiblioTech can provide fully branded services for organisations around the world. With intuitive, online customisation and automated tools, the process of creating a unique presence will be simple, efficient and quick. To aid this process all applications have an interchangeable visual interface (or skin), which allows for rapid customisation. With standard skin templates provided with the applications and enterprise environment, organisations are assured a final service solution that is consistent within their environment and beyond.2.4 INTERNATIONAL S UPPORT WITH MULTIPLE LANGUAGES BiblioTech provides the enterprise environment in seven languages. These are: – Dutch, English, French, German, Italian, Spanish, and Welsh. Through the multilingual nature of the environment, BiblioTech is uniquely able to support organisations as their communities expand throughout the world. Due to the modular framework provided by the enterprise environment, adding new language support to the environment and applications is straightforward. The language functionality is core to the enterprise environment and as such allows for languages to be dynamic and swapped on the fly by organisations and their membership.
  • 9. Confidential Page 9 21/03/20013 BIBLIOTECH SOLUTION The ASP solutions and community environment BiblioTech provides are distinguished by numerous technical and operating advantages that allow BiblioTech to offer organisations a significant and sustainable lead in user service. The open and modular framework that is the enterprise environment, allows for applications to be developed or purchased, and integrated at less cost and on a shorter timeframe than most other off the shelf proprietary solutions. This is made possible through the plug-and-play way applications are installed into the environment and do not communicate directly with the core APS engine. Exploiting our history of technical leadership, BiblioTech’s on going investment in software development enables us to offer better products and services for less, which drive new users to, and more revenue per user, on the sites we serve. BiblioTech is one of the only ASP’s with both the technology and the vision to transform the user interface into a comprehensive communication service centre for organisations. Schoolmaster.net, BiblioTech’s education service portal with over 4,000 schools and 500,000 registered students proves this. 3.1 FULLY B RANDED W ITH YOUR LOGO , LOOK AND FEEL The products and services BiblioTech provide to organisations are an extension of their brand. The online enterprise environment allows organisations to customise the Web-based interfaces, to be entirely consistent with their existing products, branding or service portals. BiblioTech provides a complete turnkey fully branded service for organisations by hosting and managing all services at a state of the art facility in the United Kingdom, with built in redundancy and failover protection. 3.2 RICH FUNCTIONALITY BiblioTech provides organisations with secure user-friendly environments with leading-edge functionality. Organisations and their membership will have the ability to interact together in a secure, access controlled, online environment, free to use any of the associated services allowed to them. Applications are developed internally wherever possible, however this does not stop BiblioTech from using product/applications that have been developed by third parties or those requested. 3.3 VERIFIED BEST-OF-B REED PERFORMANCE Independent third party testing has verified BiblioTech performance. Internet.com compared the performance of BiblioTech and nearly 300 competing email providers and rated Postmaster email ‘simply the best’. Organisations can rely on the fact that BiblioTech is taking care of their users online, enhancing their valuable reputation and brand name on the Internet. 3.4 ONLINE ADMINISTRATION Core to BiblioTech’s enterprise environment is the administration engine. This engine allows standard administration functionality to be addressed directly by an application, thereby providing management by organisations for the applications themselves and the environment in which they are provided. Each application has unique administration requirements, which can be accessed through the administration console provided.
  • 10. Confidential Page 10 21/03/2001 However, administrators have easy access to the enterprise environment’s administration tools, which provide critical operating, service and use management, as well as user statistics. The console provides: 1. Full management and approval/permission of users, including internal employees and external customers and suppliers. 2. Versatile grouping mechanisms to easily manage access privileges to all areas of the applications and services contained within the environment. 3. Application level controls for adjusting usage quotas, resources and access. 4. Password protected online usage reports include detailed information on the number of daily users, number of page views, number of active accounts, and other critical usage metrics.3.5 UNIFIED REGISTRATION BiblioTech has an API that allows organisations to incorporate user registration into the registration process for other online services. Using BiblioTech’s “Unified Registration” process, organisations are able to develop their own registration procedure, host it on independent servers and store user demographic information on their own servers. The unified sign-up is used when a single user ID and password is used for accessing other services, or when you wish to host the sign-up/login pages at site for greater flexibility and control of the process.3.6 S ECURE TRANSMISSION Information security is now a major issue facing today’s electronic society. As the information highway transcends borders, locked doors are no longer sufficient to protect organisation’s most valuable assets, their information. BiblioTech has developed a secure connectivity solution that incorporates SSL connection encryption and Public Key user authentication and communication encryption, ensuring all communications between the user and service are transmitted privately while at the same time preventing identity theft. Secure electronic service delivery is key to providing organizations with improved, more flexible and convenient access to online services, and enhancing the efficiency of their operations. The SSL and PKI solution work together to provide organisations with a web based Virtual Private Network (VPN) and when used along side connectivity solutions provided by our network partners can become a Physical Private Network.3.7 PUBLIC KEY INFRASTRUCTURE BiblioTech’s Public Key Infrastructure provides the four principal security functions required by organizations for secure communication: 1. Data Confidentiality — to keep information private 2. Data Integrity — to prove that the information has not been manipulated 3. Authentication — to prove the id entity of an individual or application 4. Non-repudiation — to ensure that information cannot be credibly disowned
  • 11. Confidential Page 11 21/03/20013.8 DISASTER RECOVERY AND DATA B ACKUP When organizations take services from BiblioTech they can be confident in the knowledge that all information residing in BiblioTech systems are covered by a Disaster & Recovery Plan that allows for minimal disruption in service in the advent of system failure be it network, hardware or storage based. When a service disruption occurs, BiblioTech assigns highest priority to the timely restoration of services. After service is restored, organizations will typically have access only to new communications until data backup from online or offline sources are complete.3.9 S ERVICE MANAGEMENT BiblioTech delivers the enterprise environment and all associated applications from systems in a state-of-the-art Co-location Facility that offers a comprehensive range of data services, backed up by the highest quality infrastructure. The day-to-day management of services, data and connectivity are handled by BiblioTech, leaving organisations to concentrate on their core business. All the critical power, maintenance and physical security requirements that can affect, ensuring consistent peak performance and security at all times are handled by the Co-location Facility.3.10 CONSULTATION S ERVICES BiblioTech can offer organisations a consultancy service to identifying their market/membership’s online application needs and aid with organisations existing legacy system integration.
  • 12. Confidential Page 12 21/03/20014 SCOPE OF RELATIONSHIP One of the key benefits for organizations taking services with BiblioTech is that we are a software-driven company. It is our philosophy to provide products and services that are interoperable with industry standard protocols and are mo dular by design. For this reason, major elements and premium services may be included or removed from the product at the discretion of the organization. 4.1 AD SERVING AND B LOCKING It is left to the organizations to serve their own banner ad program and is given space within the email interface to do so. Organizations retain all revenues generated.
  • 13. Confidential Page 13 21/03/20015 ONLINE SERVICES The services that are offered are outlined below. BiblioTech clearly understands the importance for organizations to offer the best online experience possible. To that end, BiblioTech is committed to work diligently toward offering the most robust, complete suite of online communication and unified messaging tools on the market today and in the future. 5.1 EMAIL S ERVICES 1. Off-line Email Client Interface (POP3 Access) - Permits email subscribers to read, compose and send email messages using the familiar user interface of their favourite off-line, PC-resident email client software -- like Microsoft Outlook or Eudora. Off-line clients minimize connect time when subscribers are working on lengthy email correspondence. End-users must provide offline client software. Available through the VIP services and paid direct to us from the end user. 2. Web-based Mailbox - Gives your end users the ability to store up to 5MB of messages, create folders, attach a variety of files, and sort and delete messages. 3. Email Management within the Inbox- Extensive end user preference capabilities enable each account to send vacation replies, retrieve and colour code messages from up to three POP accounts, and set notification functions to a pager or other email accounts. 4. New Message Notification - When a new message or event arrives in a user’s inbox, a notification alert may be enabled via email, ICQ, Pager or Mobile phone. Notification at login page is also capable. 5. Contact Manager - The Address Book includes the ability to create and manage groups and import personal information from other contact databases. Synchronization of your address book to integrated Calendaring and PDAs 6. Spam Protection - Advanced anti-spamming controls and mail filtering, including green list and red list filters, which allow a user to block an undesirable or unknown sender at the server. In addition, a user has the ability to select only their specific address book contacts or create a list of desirable senders. 7. Automated, Rules-based Email Forwarding - Sophisticated email users maintain multiple email accounts. Rules-based email forwarding automatically transmits email received by the web email account to another email address. Email messages are screened according to pre-set criteria for "from", "to" or "subj." header lines in the incoming email message, and only those messages meeting the criteria are forwarded to the alternative email address. Available through the VIP services and paid direct to us from the end user. 8. Automated, Rules-based Pager Notification - For the mobile users, important email messages shall never be missed with automated pager notification. Incoming emails, which satisfy pre-set criteria for header line content in the incoming email message, generate an alphanumeric pager message containing all header information Available through the VIP services and paid direct to us from the end user. 9. Supplemental Disk Space - For the active email user, supplemental disk space, taking them to 10MB or more allowing the subscriber to maintain more folders and messages in their email account.
  • 14. Confidential Page 14 21/03/20015.2 MESSAGE MANAGEMENT 1. Viewing Messages - This option allows users to view different types of messages , including text messages, HTML messages and messages with attached files. In addition, there is a URL and Email detection mechanism, which marks URLs as links, which may be opened in a separate browser window and Email addressees, which may be added to the user’s Contact List. 2. Selecting All Messages - This option allows users to select all messages in a folder in order to perform message management operations on them, such as moving or deleting messages. 3. Deleting Messages - This option allows users to move messages to their Wastebasket folder, which, in turn, will be removed from their Email account. 4. Moving Messages - This option allows users to move messages from one folder to another. 5. Forwarding Messages - This option allows users to forward incoming messages to several recipients. 6. Replying to Messages - This option allows users to send a reply to the sender of an incoming message, with the option of including the original message as part of the message body.5.3 MESSAGE COMPOSITION 1. Add Recipients - Each message contains 3 fields in which recipients may be entered. Recipients in any of the fields below can be entered manually or selected from the Contact List. a. To - The main recipients are entered in this field. Every Email message should have at least one entry in this field. b. CC - Additional or secondary recipients are entered in this "carbon copy" field. c. BCC - Additional recipients, whose names will not be displayed in the outgoing message, are entered in this "blind carbon copy" field. 2. Check Spelling - A Multi-lingual Spell Checker is provided in order for users to verify the spelling of each of their outgoing messages. Currently, 7 languages are supported 3. Attach Files - Files can be attached to each outgoing message, providing the Web browser, being used by t e user, supports the File Upload h operation. 4. Add a Signature - A personal signature may be added to each outgoing message, in addition to a general signature, which is automatically added by the service. 5. Add to SentLog - A copy of the outgoing message ma y be added to the SentLog folder, after being sent to its destination. 6. Notify via ICQ™ - When this option is selected, each message recipient, whose ICQ™ number appears in the Contacts page, will receive notification of the incoming Email message, via ICQ™ . 7. Advanced HTML compose - Based on JavaScript capabilities only t is h feature enables the user to create an HTML message and send it as HTML in order to send rich email message. The editor includes Personalized Stationery, Rich-Text (Bold, Italic etc.), alignment, preview and more.
  • 15. Confidential Page 15 21/03/20015.4 FOLDER MANAGEMENT 1. View Folders - This option allows users to view the list of System and Personal folders, currently available in their account. Selecting any of the folders, will display the list of messages currently located in the folder. 2. Create folders - This option allows users to create a Personal folder and add it to the list of available folders in their account. 3. Delete Folders - This option allows users to remove a Personal folder from the list of available folders in their account. 4. Rename Folders - This option allows users to rename a Personal folder from the list of available folders in their account.5.5 CONTACT CENTER 1. Adding Contacts - This option allows users to add a simple entry to their Contact List. Each entry is comprised of a Nickname, Email address, ICQ™ number, Pager PIN number & Provider, Home & Work Telephone numbers, Cellular-phone number, Fax number, Company name and full residential address, including Country of residence. 2. Modifying Contacts - This option allows users to modify an entry in their Contact List. Modifications can be made to all contact fields. 3. Grouping Contacts - This option allows users to add a group entry to their Contact List. Each group entry is comprised of a group Nickname and a list of Email Addresses associated with it. 4. Deleting Contacts - This option allows users to remove an entry from their Contact List. 5. Import from address book - Enables the user to import all the contact data from his offline client (Outlook, Netscape, Outlook Express) directly to the application contact list.5.6 CALENDAR 1. View Calendar - Users can choose a daily / weekly / monthly or yearly view of their calendar. Also configurable are the time zone, workdays, and viewed hours. 2. Add / modify / delete appointments - An appointment includes a subject, a description, a date, hour and duration (or can defined as an all day event). 3. Add / modify / delete to-do list - A to-do includes a subject, a description, start and due dates, status priority and category. 4. Add /modify / delete notes - A note includes a subject, the memo and the creation date.5.7 PREFERENCES 1. Download Mail from Other Email Accounts (Multi-POP) - For users who have other Email accounts, besides the one issued by our service, we provide the ability to fetch messages addressed to those accounts and store them in the users service account. 2. POP Auto-filing - In order to distinguish messages that arrive from other POP accounts, the user can file those messages to another host folder, or change the colour of these messages.
  • 16. Confidential Page 16 21/03/2001 3. Personal Information - This is where the user enters personal profile information, such as full name, geographic location, areas of interest, etc. This information is used in order to tailor sponsor advertisement banners, which are presented to the users. All personal information is private and is not disclosed, sold or given to any third party. 4. User Preferences - This is where the user can modify his/her password, Reply-To address, outgoing signature and identification information placed on all outgoing mail. In addition, the user can select to use the following options: a. Supply ICQ™ UIN number in order to use the integrated ICQ™ features. b. Receive notification of incoming messages via ICQ™ . c. Receive notification of incoming messages to a different Email address. d. Select to view HTML messages in Safe Mode, i.e. by opening a separate browser window in order to display the message. e. Define the number of messages that are displayed on each page of the inbox and other folders5.8 FILTERS 1. Administration Rules - These rules enable users to move incoming Email to other folders and delete messages according to specified criteria. Users can define up to 5 administration rules and enable each rule individually. 2. Vacation Reply - This option enables users to send an automatic reply to incoming mail, for examp le, when they are on vacation or to automatically acknowledge receipt of incoming mail anytime and for any reason. 3. Safety Preferences - There are several safety options provided to each user. Note: The first option can be combined with any of the others, in order to provide additional safety measures. a. Blocking of spammers - Automatically block unsolicited Email (commonly known as "spam") from known bulk Email addresses. b. Message retrieval only from specific senders (Green-List option) - In this option, the user can provide a list of Email addresses of senders whose Email he/she consents to receiving. The user may also use the Contact List in order to provide this list. c. Message blocking from specific senders (Red-List option) - In this option, the user can provide a list of Email addresses of senders whose Email he/she does not wish to receive. The user may also use the Contact List in order to provide this list. Incoming Email may also be blocked from entire domains, by adding the domain name to this list. d. Receive mail from anyone - This option allows Email to be received from all senders5.9 ANTI-VIRUS S ERVICE BiblioTech provides a service to identify and quarantine e-mail borne virus infection. New viruses continue to emerge and there appears to be no slackening of pace. Many organizations will already have anti-virus provisions in place, however the administrative problem with keeping the current virus list up to date can become an administrative burden.
  • 17. Confidential Page 17 21/03/20015.10 FILE FILTERING SERVICE Bibliotech allows organizations to block specific file-types (images, executables, videos etc). Terabytes of information is sent around the world via e-mail every day using organizations valuable network resources. The main issue is not the number of e-mails but their size and attachments. For example, program files are often larger than 1MB and are not at all relevant. They also commonly carry viruses. BiblioTech provides a tool to control their propagation, which is essential to maintaining network and system integrity. Many organizations do not need to send e-mail with included or embedded graphics. Image and video files can contain offensive material or breach copyright. Organizations are provided the means with which to manage this information-flow.5.11 S PAM FILTERING S ERVICE BiblioTech can filter spam, keywords and phrases. Unsolicited Commercial E -mail (UCE) or malicious junk-e-mail is at best a nuisance and at worst a waste of bandwidth, time and money. BiblioTech uses advanced text analysis to identify spam, providing a high-performance and flexible approach to managing junk e-mail on behalf of organizations.5.12 KEYWORD FILTERING S ERVICE BiblioTech can scan for offensive keywords and phrases. Profanity. Sexual expletives. Obscene language. Their usage in e-mail from an organizations domain and the damage caused can be devastating. Bibliotech can enables organizations to reduce legal liability and avoid the damage to their membership and themselves caused by improper language.5.13 REPORTING S ERVICE BiblioTech can provide reporting that can be scheduled for regular delivery via e- mail. We provide organisations with reports on e-mail, these can be e-mailed to the administrator or anyone else in either html, excel or word format.5.14 S ECURE LOGIN (SSL) To address the users concerns with regards to Internet communication, BiblioTech offers a secure login and signup authentication API. Secure Socket Layer (SSL) encryption protects the privacy of the login and password information transferred between end users and the enterprise environment.5.15 PUBLIC KEY S ECURITY Users are allowed to decrypt incoming or encrypt outgoing email using Public Key Security (PKI). Public Key Security provides software encryption and user authentication technology, to protect the security of communications on the Internet.5.16 ONLINE CALENDAR The Web-based calendar feature allows users to access their events and tasks from any browser. Functionality includes adding, modifying, and viewing appointments,
  • 18. Confidential Page 18 21/03/2001 to-do tasks, notes or events. Create recurring appointments and tasks on a daily, weekly or monthly basis setting notifications for upcoming events via email, ICQ, or Pager. Modular Web-based functionality, i.e., may be removed from the Web-Based application5.17 COMPANY DIRECTORY S ERVICES The fully searchable Company Directory application lists all your community’s members including employee and guest account holders such as customers and partners. The directory also provides group listings to quickly and simply build email and distribution lists. Using the company directory, you can: 1. Provide company-wide employee contact information. 2. Publish discrete individual and group entries to your public company website. 3. Select individuals and groups for email lists, project groups and workflow. 4. Search by any field for individual and group entries.5.18 ONLINE FILE S TORAGE S ERVICES Our online file storage application is an always-accessible place to store important documents, files, music, and images. The ASP Model includes both individual file storage (with private, public and controlled access directorie s) and shared file storage, also with controlled access directories. 1. With BiblioTech’s File Storage, you can: 2. Upload and access files via an intuitive an intuitive web-based interface or through a traditional ftp client. 3. Create folders to organize files and control access privileges. 4. Control access to sensitive or confidential files. 5. Post large files for group access without worrying about email message-size or transfer time. 6. Create and edit webpages. 7. Include stored files as attachments to email messages. 8. Save email attachments directly to your File Store. 9. Backup files and perform version control by synchronizing files on different devices. 10. Search documents’ meta-information or contents for standard MIME types.5.19 ONLINE COLLABORATION SERVICES A secure, confidential place to exchange information and share messages, schedules, files and photos. Full control over access privileges allows you and your employees to select participants, from either a small select group of individuals to an entire department or the general public. With BiblioTech’s online collaboration environment, you can: 1. Interface with the Company Directory to easily manage access privileges by individual or group.
  • 19. Confidential Page 19 21/03/2001 2. Instantly deploy Project Workgroup environments where registered members worldwide can collaborate on short- and long-term projects. 3. Define individual and group-level permissions including, read only, add or delete content, set appointments on the calendar and more. 4. Create public “Community” areas where your employees can interact with registered and/or unregistered visitors to your company website. Customer support environments, for example, can include helpful webpages such as FAQs, news and updates, events calendars, real-time chat rooms and discussion boards, file and document download areas. 5. Select from a tool box of add-on applications including: 6. chat rooms, 7. discussion groups, 8. shared calendars, and 9. online polls .5.20 W EB HOSTING SERVICES Customers can choose to host their company website, independently, with BiblioTech, as an integral part of your ASP managed service, or with BiblioTech, as an independently maintained, traditionally hosted website that sits alongside your CSP environment. Our standard hosting service provides full ftp access to a traditional flat file website directory, complete with form handlers, traffic counters, and management reports. Pages can be designed or modified offline, then uploaded to your live website. Alternatively, you can use the applications in our CSP offering to build and manage your company website as an integral part of your online community environment. In either case, BiblioTech’s CSP offering allows you to integrate aspects of your online community directly in company website.5.21 B OOKMARK S ERVICES BiblioTech’s Bookmarks application accommodates both personal and shared bookmarks. Individual users can easily add website links to their own Bookmarks or recommend them for inclusion in your company’s Shared Bookmarks. This allows all your employees to contribute to a shared knowledge pool of online information resources. With BiblioTech Bookmarks, you can: 1. Easily add and delete your bookmarks. 2. Create folders to organize bookmarks into convenient groupings. 3. Have instant access to all your important bookmarks regardless of location or PC. 4. One click access to both personal and share bookmarks.5.22 DISCUSSION S ERVICES The discussion service allows users to leave messages for others to read in a "bulletin-board" style forum. It is similar in functionality to Usenet. Users may post messages or reply to existing messages. By using simple key sequences, users may post in bold, write bullet points as well as send file attachments.
  • 20. Confidential Page 20 21/03/2001 System administrators may create new discussion groups and set their access restriction levels.5.23 REAL TIME CHAT S ERVICES The enterpris e environment includes a simple chat system. When the user visits chat a list of the accessible chat rooms is presented, along with the number of users in them. If the users access privileges allow, they can enter the room. Within a room, users can send pu blic messages, private messages, see which users are also in the room. System administrators may create new chat rooms and set their access restriction levels. Chat is fully internationalized. According to the local language settings, the "room furniture" appears in different languages (the messages posted by other users are not, of course, translated). Chat is accessible through a browser that supports basic HTTP, HTML and Javascript level 1.2 or higher. It works through standard firewalls and proxies.5.24 W IRELESS S ERVICES BiblioTech provides mobile access to its products and services. The mobile services BiblioTech offers are fully functional, these are: 1. Email 2. Address Book 3. Calendaring Fully functional referrers to how the web based services have been presented. In this sense everything that can be achieved through the normal service has been replicated within the mobile offering. BiblioTech can provide SMS solutions based around its communication products to organisations.
  • 21. Confidential Page 21 21/03/20016 RELATED SERVICES Address Book Available Interface with: - Calendar Yes - Instant message client Yes Synchronize with: - Desktop email clients No - PDAs No Calendars Private personal calendars Yes Shared or "published" calendars (public access) Yes Group or "controlled access" calendars Yes Event content feeds for calendars Yes Access controls for shared & group calendars Yes Populate individual calendars with shared/group events Yes Integrated email notification and reminder options Yes Calendar content search Yes Automatic calendar updates with "subscription" function Yes "Rollup" of selected calendar views (individual, shared & group) Yes Date and list calendar views Yes Active URLs in calendar entries No Real-time notification via instant messages No Instant messaging Address book integration No Calendar integration No Support for multiple host servers (ICQ, AOL, Netscape, CompuServe, No Microsoft) Other features Integrated listserv capabilities Yes Integrated fax and voice utilities No Integrated audio, video mail No One of BiblioTech’s many strengths is the ability to develop fully integrated services in-house. We have been developing email services and features since 1996 with a research and development team that now exceeds over 15 engineers, programmers and technicians we are a leading innovator of online applications and web-based environments and limit our product partners to those offering “best-of-breed” services that can be fully integrated with our enterprise environment.
  • 22. Confidential Page 22 21/03/2001 Below is a list of some of those partners and the services they provide. Strategic Relationship Strategic Relationship Filtering Partner Strategic Relationship Anti Virus Filtering Partner Connectivity provider Secure hosting services
  • 23. Confidential Page 23 21/03/20017 TECHNICAL INFRASTRUC TURE In general, BiblioTech has an API that allows its partners to incorporate the registration process for other online services offered by organizations. Using our “Unified Registration” process, you will be able to develop your own registration procedure, host it on independent servers, and store user demographic information on their own server. The unified sign-up is used when a single user ID and password is used for accessing services, or when partners wish to host the sign -up/login pages at their site for greater flexibility and control of the process. BiblioTech will provide you with the APIs for provisioning accounts in our database and for synchronization. As for BiblioTech’s network and backbone connectivity, it is our philosophy to practice what we preach. Much like our partners leverage our core competency around providing a highly reliable, secure, feature-rich and flexible suite of email messaging services so they don’t have to be burdened with the cost of developing or maintaining the technology and infrastructure themselves, BiblioTech leverages the competency and 24x7x365 NCC support of our tier-one hosting partners. These partners include COLT (NASDAQ:COLT), PSINet (NASDQ:PSIX) and RedBus Interhouse (LSE:RBI). This network strategy allows BiblioTech to focus the majority of our efforts and resources on developing best-of-breed application services and support for our partners, all the while providing robust, highly available connectivity out to the Internet. This business decision also supports BiblioTech’s multi-home and content distribution strategy. By definition, our technology-hosting partners must have networks that are engineered for maximum performance and scalability. Our hosting partners’ networks provide BiblioTech with reliable Internet connectivity through highly redundant OC-192 backbones and high-bandwidth capacity for efficient delivery of our partners’ email messages across the Internet, while ensuring organizations connectivity keeps up with the rapid growth in Internet traffic. Additionally, they must be interconnected to every major IXP, NAP or MAE (e.g., Sprint, UUNet, MCI, AT&T, AOL, PSI), be on multiple power grids and have diesel generators on site in the event of a power failure. Furthermore, they must utilize a Routing Protocol that can provide BiblioTech with the fastest reaction to a failed connection. Currently, BiblioTech’s routing protocol of choice is BGP and all servers are connected to the Internet via fully redundant 100Mbps Fast Ethernet connections with over 1Gbps of aggregate capacity. This network topology ensures that services and data are transmitted through the shortest paths by leveraging an extensive combination of public and private peering relationships with other Internet Service Providers. As a result, BiblioTech can scale its bandwidth on the fly to meet demand, while minimizing response times for your end-users.
  • 24. Confidential Page 24 21/03/20018 SERVICE LEVEL AGREEMENT 8.1 UPTIME GUARANTEE BiblioTech’s services will be available 99% or more of the scheduled uptime. Calculation of this average availability will not include scheduled downtime for maintenance. Scheduled and unscheduled down time will each be l mited to 25 i minutes per day and the client will receive 7 days’ notice of scheduled downtime by email or phone. Any network outages caused by a BiblioTech’s service provider (other than a substantial failure of the Internet generally across a wide geographic area) shall constitute down time. BiblioTech maintains a reliable and scalable network that can support unlimited numbers of end-users. BiblioTech is constantly improving its infrastructure and performs continual audits, improvements and upgrades for hardware, software and bandwidth resources to provide the highest performance available. In those instances where network problems arise BiblioTech performs immediate investigation and resolution. BiblioTech will work with its partners to solve any problems that may occur for organizations as a result of network connectivity. If a system outage should occur, BiblioTech will make reasonable efforts to place a post- explanatory page on the partner site(s). 8.2 ROUNDTRIP GUARANTEE BiblioTech guarantees an average of less than 3 seconds round-trip time (login page + logout), measured inside the network. Incoming Mail will be received by the end- user Inbox in less than 30 seconds on average and for 90% of the messages in less than 5 seconds, not including time o maintenance. Outgoing email will leave f BiblioTech Network in less than 30 seconds and for 90% of the messages in less than 5 seconds, not including time of maintenance. (These averages measure only BiblioTech server response time, and not Network WAN transmission.) 8.3 S ECURITY In an effort to address the physical security concerns of our clients, BiblioTech have placed the bulk of its server environment behind dual firewalls. To address the users concerns with regards to Internet transmission, BiblioTech has developed a secure connectivity solution that incorporates SSL encryption of Web-based services and a PKI user authentication API for message encryption, which insures that email messages are transmitted privately while preventing identity theft. It should be noted however, that these features are disabled by default due to the well-known performance implications of running SSL and PKI. 8.4 DISASTER RECOVERY As more businesses turn to outsourcing the management of their mission-critical applications, the need for maximum availability and consistent uptime has grown substantially. Companies who do business online are quickly finding that any downtime at all, no matter how short a period, can cause drastic effects on their revenues, reputations and market status. Relying on the Internet, in other words, means finding a solution that provides more than redundant network access. Organizations need a partner that also have a reliable process in place for proactive
  • 25. Confidential Page 25 21/03/2001 problem prevention. In response to these needs, BiblioTech has developed a proven and complete Disaster Recovery Plan. When a service disruption occurs, BiblioTech assigns highest priority to the timely restoration of services. After service is restored, organizations will typically have access only to new communications until data backup from online or offline sources are complete. If data is being restored from offline archives, this may take as long as five hours. Organisations will not have access to archived information during this time. In order to assure the readiness of BiblioTech operators to complete the offline restoration process, the company runs frequent drills to test, troubleshoot and improve restoration performance. Below is an outline of BiblioTech’s Disaster Recovery plan and Service Restoration Procedures: 1. Web Server Failure – Because of the redundant design of our topology, 2. the service will not be affected. 3. Mail Server Failure - In case of mail server failure, we can restore service 4. with a functional mail server within one hour. Only users of the specified 5. mail server will experience a service interruption for this time period. 6. Recovery of mail data will be completed in less than five hours. 7. Data Base Failure - Operational procedures are in place to restore service 8. within twenty minutes. 9. MDS Failure - Due to the BiblioTech design and implementation, this type of failure will not affect users service. 10. Local Director - Due to hot standby machines, this type of failure will not 11. affect user service. 12. Firewall Failure: Fully redundant with ability to reroute traffic on the fly if required backed by an on-site, dedicated security team on a 24/7 basis. 13. Service Disruptions : Service disruptions can be classified by degree of severity. We have unique operational plans for disruptions where a) service is unavailable, but no data is compromised, and b) where user data is compromised. 14. Service Unavailability: If service is temporarily unavailable due to server problems, all incoming messages are stored offsite until server operation is restored. Messages stored offsite during the disruption may be unavailable for a period of several minutes to several hours after service is restored, but no data is lost. 15. Loss of Data: In the unlikely event that both primary and secondary online disk storage becomes corrupted, data is recovered from offline, archived media. 16. Disruption Recovery: BiblioTech technicians and automated monitoring systems continually assess service availability and response time. Any service disruption will be detected and automatically reported to system operators within seconds. System operators who are able to diagnose system failure modes and implement recovery plans are available 24 hours per day, on-site and through immediate pager notification. BiblioTech operators have 24/7 access to all relevant server locations, in addition to remote access to servers and other resources, speeding response time and simplifying recovery efforts. The company maintains an extensive inventory of critical spare parts at key locations to insure rapid response. 17. Failover: By design, BiblioTech maintains failover capability with remote service centers that can be deployed in case of service disruptions at a specific location. Service maintenance procedures are continuously tested
  • 26. Confidential Page 26 21/03/2001 under BiblioTech failover scenario planning. The BiblioTech systems are designed to automatically implement failover, and to mirror and duplicate all services at remote facilities during the failover event. Organizations may not have access to all their data during a failover event until service is restored at the primary location. 18. Backup: BiblioTech clearly recognizes the value of organisations data and has taken all the necessary precautions to insure a “high-availability” solution in place. Data storage is of paramount importance to the BiblioTech service. All data storage systems are fault-tolerant, with redundant components for key sub-systems, including power supplies and disk drives. In an effort to minimize network performance issues, backups are performed on a separate network so that the backup traffic has no impact on service traffic. The automated backup sequence is programmed and executed based on the following schedule: 19. Database – Backed up every 6 hours and restored to another machine with the same HW configuration as the Main IDS2000 machine for redundancy. 20. Mail Server - A Full image of the mailbox volume is taken once a week, and an incremental backup is performed daily. 21. System - 4 DLT drives working as a tape Raid for high backup performance and fault tolerance is backed up once a week. A set of these tapes consisting of the system backup is then taken off-site and stored in a secure location.8.5 S ERVICE MONITORING A robust monitoring system and escalation procedure is crucial to minimizing downtime and assuring that problems are rectified immediately. BiblioTech’s dedicated technical staff is highly qualified and identifies and resolves potential problems before there is an impact on the end-user. BiblioTech monitors services on a 24/7 basis. BiblioTech operators also monitor system performance around the clock to respond to potential service-disrupting situations before they occur. Such events include usage spikes, spam attacks, storage l mits, application failure and i other occurrences. All operators have instant access to a clear chain of command that can authorize additional resources to respond to service-affecting situations. Monitoring includes: 1. Web Servers using login procedure 2. Mail Server: availability of all mail ports. (POP3, IMAP4, SMTP, management ports) 3. Disk Space 4. Mail Send/Receive: receiving and sending mail from mail servers 5. Data Base connectivity 6. DNS availability 7. Load Balancing: load balance functionality 8. Network Functionality (firewall, packetloss and latency) In addition to BiblioTech’s internal process monitoring tools, we have deployed Big Brother as our external monitoring tool. Our 24/7 monitoring is employed within our network, and from two external locations around t e world. Monitors continually h perform roundtrip response tests on all the servers in our system, checking incoming and outgoing mail, user login times and application performance for all services. If
  • 27. Confidential Page 27 21/03/2001 any problem is detected, BiblioTech technicians are immediately dispatched according to predefined procedures based on the severity of the event. As a result of implementing this high-availability monitoring service, BiblioTech can offer organizations a superior Service Level Guarantee as well as online statistics. It should be noted that BiblioTech would make every effort to prevent user spamming from our email system. Anti-spam measures are already designed into the service, including a limit on the number of addresses in the address fields (To: cc: bcc) and limits on the number of users in a single group in the address group. At any time you can request that BiblioTech block a particular users’ email accounts. Likewise, BiblioTech provides organizations with an online administrative tool that will enable you to edit, modify and delete specific user accounts at their discretion.
  • 28. Confidential Page 28 21/03/20019 CUSTOMER SERVICE BiblioTech clearly recognizes that in order for organisations to offer their membership an outstanding service, BiblioTech must be ready to support both the organization and its membership in some fashion. Historically, organizations insist on providing front-line technical support to their end-users for two reasons. First, organizations generally wish to own the relation with their customers. Second, organizations typically view any service interaction with an end-user as an opportunity to up sell additional products and services. For this reason, BiblioTech has embedded a comprehensive online help tool in to its service along with supporting “How To” documentation. Either way, BiblioTech has a dedicated team of experienced professionals trained and mobilized to provide superior technical support to organizations in an efficient and friendly manner. The three areas of support are: 9.1 CUSTOMIZATION S UPPORT An Accoun t Manager will be assigned to organizations who will guide you during the customization process and branding of services. They are here to answer any questions and solve any issues that may arise. In addition, you will receive full Quality Assurance support, both on the initial launch of the service and for any subsequent updates. The service will be supported by a comprehensive quality assurance review by the BiblioTech’s QA team and loaded to the production site after approval by both BiblioTech QA and the organization. 9.2 THE B USINESS PARTNER S UPPORT In those instances where the organizations require immediate support, BiblioTech will provide both telephone and email support 24 hours a day, 7 days a week. Response to email inquiries will occur not more than 20 minutes after receipt by BiblioTech. In addition, BiblioTech will assign an account manager who will be available by both email and phone Monday – Friday, 8:00AM – 5:00PM for general requests and questions. 9.3 END-USER S UPPORT BiblioTech shall provide technical support in English to end-users. On the average, response to any technical support request will be sent in less than 24 hours. Technical Support will be provided both automatically and by service representatives if required. Your end-users will also have a dedicated mailbox for technical support.
  • 29. Confidential Page 29 21/03/200110 DATA & CUSTOMER OWNERSHIP/REPORTING It is BiblioTech’s Corporate Policy to protect all user data by putting our databases behind firewalls as outlined in the Technical Document in the Appendix. BiblioTech has addressed the need for its organizations to have real-time access to their end-user statistics by developing a proprietary, real-time online statistics engine. This engine will provide organizations, weekly and monthly real-time data of their users online, anytime. Organizations will have access to statistics on service usage, page impressions, user sessions, user activity and number of new users. BiblioTech will also provide organizations with a downtime and new user data report upon request.
  • 30. Confidential Page 30 21/03/200111 TIMING AND STAFFING Historically, BiblioTech launches Branded websites within twenty-one days upon contract completion. The first step is to assign the Project Manager who coordinates all day-to-day activities including time-lines, schedules, a action items using nd standard Project Management tools that are monitored carefully. The Project manager will work with the organization during the Customisation process and design stages. Once all parties agree on the design, the BiblioTech QA team will test the service for functionality and perform a pilot test of service to ensure the service is stable and ready for production. After final certification from the client and the QA team that a desired results has been achieved, the service in launched. Additionally, an Account Manager will continue to manage the relationship and be available to address any questions or concerns over the course the agreement.
  • 31. Confidential Page 31 21/03/200112 INTERNATIONAL CAPABILITIES BiblioTech’s proprietary technology allows it to provide complex foreign language support to organizations. BiblioTech has dedicated research and development teams allowing for rapid and regular new development of additional languages.
  • 32. Confidential Page 32 21/03/200113 PRICING The Non-Recurring Charge (NRC) described in the table below is due within ten (10) business days from the Effective Date of the Agreement. The Monthly Recurring Charge (MRC) is based on the average number of provisioned users per month multiplied by the per unit price outlined in the Tiered Pricing Schedule below. The Customer shall be invoiced on the fifth day of the next subsequent calendar month and service fees are due and payable within thirty days of the invoice date. The number of registered users served shall be computed using a simple average of the End-Users on first and last days of the month.PACKAGED PRICING SCHEDULE: Destination Site Solution Line Product Description # Code Quantity MRC NRC Web-based environment and Average 5 M B of storage space number of 1 provisioned users per month 2 Set Up Fee 1 Subtotal Total:TIERED PRICING SCHEDULE: Web-based email Volume Threshold Tiers Monthly Service Fee Annual Service Fee (i.e. # of mailboxes served) per Mailbox per MailboxAdditional Services and Features Product Code Description: Add-on Services Quantity NRC MRC N/A ------- ------- -------
  • 33. Confidential Page 33 21/03/2001 TBD ------- G/A ------- ------ G/A ------- -------*Non-Recurring Charges for Additional Services are payable prior to implementation.
  • 34. Confidential Page 34 21/03/200114 INTERGRATION SERVICES BiblioTech can provide the following integration services: 1. A set of critically evaluated approaches to providing the organisation with identified functionality. 2. A set of recommendations from BiblioTech as to the best solution for organisations. 3. A set of recommendations from BiblioTech as the best path for organisations legacy system integration. 4. An outline as to how BiblioTech would suggest proceeding with the implementation of the recommendations made. Once this consultation is completed, BiblioTech can provide a final integration solution based on the information gathered to organisations.
  • 35. Confidential Page 35 21/03/200115 REVENUE OPPORTUNITIES 15.1 BIBLIOTECH GENERATED REVENUES Opt-In Programs Revenues. BiblioTech shall, with organizations prior written approval, provide End-Users of the service the ability to request the delivery of third party electronic messages to their inbox. End-Users, at all times, shall be able to opt- out of any opt-in program at their sole discretion. Revenue Generated from Opt -In Programs. BiblioTech shall pay to organizations twenty percent (20%) of the Opt-In revenue generated, directly or indirectly, by BiblioTech. Additional Features, BiblioTech shall make available to the organization additional features, which they market to their membership e.g. additional storage. These are made available through API’s 15.2 CLIENT GENERATED REVENUES 1. Banners A typical banner rate for email is £15cpm (£ per 1000 banners) based on Hotmail UK rates of £13-£19cpm. To prevent overly high expectations, we will use a rate of £10cpm for t e following illustrations (which breaks down to h 1pence per page impression). A user will generate an average of 5 page impressions per visit, based upon them reading and replying to just 1 email each visit. Working on the above figures, the following can be concluded: (i) A user that logs in 365 days a year will create 1825 page impressions, and will generate a potential £18.25* per year (ii) A user that logs in 3 times per week will create 780 page impressions, and will generate a potential £7.80* per year (iii) A user that logs in once per week will create 780 page impressions, and will generate a potential £2.60* per year (iv) A user that logs in twice every month will create 120 page impressions, and will generate a potential £1.20* per year (v) A user that logs in once every month will create 60 page impressions, and will generate a potential £0.60* per year * All figures are based on selling all inventory. 2. Email shot Client can utilise a third party, to generate and send email shots. By sending email shots to your users, enormous revenues can be generated. A typical sponsorship rate for email shots is very high, in excess of £50cpm. It should also be borne in mind, that you could have more than a single sponsor of
  • 36. Confidential Page 36 21/03/2001 an email shot, but again, to prevent overly high expectations, we will use a rate of £40cpm for the following illustrations net of an average cost of mailing (which breaks down to 2.5pence per email shot per recipient). Email shots should contain useful information, to ensure that the recipient perceives an ongoing value in both reading and receiving them. Each email shot should contain an opt-out option – and unless the recipient sees ongoing value they will opt-out. Regarding frequency, it really depends on the individual company and the information that they are providing. We would not recommend exceeding 1 mail per week that could include – but not be restricted to – information such as special offers, revision information, course work etc. Working on the above figures, the following can be concluded: (i) Sending an email shot once per week, each recipient would be worth £1.30 per year (ii) Sending an email shot twice per month, each recipient would be worth £0.60 per year (iii) Sending an email shot once per month, each recipient would be worth £0.30 per year 3. Calendar entries As you know, BiblioTech branded email provides the ability to insert events into the users calendar. This is achieved through our API and dependant on the level user information collected on registration, and the amount of work you are prepared to put in on your database, can be targeted right down to an individual user. However, it is typically used as a ‘global’ entry to all users, or to relatively basic demographic such as gender, age, location or a combination thereof. We have no specific rates to work with here, as this is a BiblioTech specific ability and our clients do not share their revenue details with us. However, I believe that clients could achieve potential revenues in excess of £500 per entry. Limiting this to just one company per week would accrue £26,000 per annum – and at a rate as low as £500 the potential market would be huge.
  • 37. Confidential Page 37 21/03/200116 COMPANY INFORMATION BiblioTech has been a leading provider of email messaging solutions for over 5 years. Founded in 1996, the company has been exclusively dedicated to delivering advanced online services with associated applications for the Internet. Over 150,000 registered Postmaster, and 500,000 registered schoolmaster users, rely on BiblioTech’s services. These demanding communities depend upon BiblioTech to deliver a consistent, positive and satisfying Web experience to their users on a 24/7 basis. BiblioTech has experienced rapid growth of its email services Postmaster over the past years without any significant service marketing. Our 100% standards-based and modular architecture has proven its scalability and stability in serving hundred of thousands of subscribers in 52 countries and on five continents. With a highly seasoned technology team, BiblioTech has aggressively proliferated its core p roducts to deliver additional value to its clients and their end users. BiblioTech is a leader in providing an enterprise environment with associated online applications in the worlds many languages. BiblioTech offers user interfaces in 7 languages, including Japanese. These non-Latin alphabets present special technical challenges that. Every language that BiblioTech supports, and every product that BiblioTech integrates into its core Web based environment, opens new revenue and branding opportunities for BiblioTech clients. Unique amongst ASP’s, BiblioTech is expanding the capabilities and reach of its services faster than any other vendor. No other vendor can match BiblioTechs years of experience, the breadth of our product and language offerings, or the scalability of our modular technology architecture. The Company partners with internationally recognized consumer -driven organizations, including - Founded in 1996, BiblioTech has offices in London and Milan. Additional information may be obtained b y visiting: www.BiblioTech.com
  • 38. Confidential Page 38 21/03/200117 REFERENCE SITES Site Name: schoolmaster Customer Home Page URL: http://www.schoolname.schoolmaster.net Customer Mail URL: http://www.schoolname.schoolmaster.net Sample Account: Site Name: postmaster Customer Home Page URL: http://www.postmaster.co.uk Customer Mail URL: http://www.postmaster.co.uk Sample Account: