SlideShare a Scribd company logo
1 of 7
Download to read offline
E-Commerce:
Part II Covering Your Back-End
         What You Should Know About Hardware, Software and Security


by Jim Thompson and Mike Woodward
Illustration by Brian Biggs

In the last issue of WH Mag, we intro-           HARDWARE                                    IS THERE AN APPLIANCE IN
duced you to Alfred Fuller, inventor of          Running a web hosting operation takes       YOUR FUTURE?
door-to-door selling. When a salesman            servers — lots of servers. There are many   Servers or appliances? That’s a question
from the Fuller Brush Company arrived            choices, but essentially, machines come     with no single right answer. Ultimately,
at his customers’ doors, all they saw was        in two flavors: full-fledged servers and    the choice depends on the need.
his smiling face, his magnetic personality       appliances.
and his line of brushes. The business                                                        “We don’t use appliances,” is the terse
                                                 Although there was a time when each         reply from the Loop, a small ISP in the
model seemed simple: Pack up the
                                                 served distinct purposes, the boundaries    Los Angeles area.
products, ring a few door bells and watch
                                                 between servers and appliances are
the cash roll in. But there was whole lot                                                    “A server can grow with a customer, an
                                                 blurring. Major manufacturers such as
more going on behind the scenes. The                                                         appliance can’t,” is the opinion of
                                                 Sun, IBM, Compaq, Hewlett-Packard
Fuller Brush men depended on the                                                             Haralds Jass, president and CEO of
                                                 and Intel have diversified their focus on
company’s back office staff to handle                                                        Superb Internet. “Thus [an appliance]
                                                 high end machines and added lower cost
issues such as manufacturing, distri-                                                        has the potential to greatly impair the
                                                 and more compact appliances to their
bution, accounting, sales support and                                                        growth of a business. Many current
                                                 product lines. (Sun has gone as far as
customer care.                                                                               appliances on the market are a step back-
                                                 acquiring Cobalt Networks, the leading
Today’s online merchants are in a                appliance maker.) Meanwhile, newer          wards in service-provider solutions.”
position similar to Alfred Fuller’s. An          hardware players Cobalt, NetMachines,       Not everyone feels as strongly on this
attractive web site alone does not a prof-       Network Engines, StarBox Netsystems         subject as Jass. Appliance advocates feel
itable business make. Therefore, e-tailers       and others offer both general purpose       that the current generation of products
rely on their hosting providers to help          server appliances along with appliances     offer immediate cost and time savings. In
orchestrate and automate back-offic              that handle specific tasks.                 addition, each new release brings more
processes to the point where all that                                                        robust, flexible and scalable machines.
                                                 Will a Santa site be able to scale from
needs to be added is the customer.                                                           Meanwhile, you can stack multiple units
                                                 four hits a day in March to million of
A web host’s job is to determine what            simultaneous visitors in December? To a     in a rack to quickly attain the function-
level of service — in terms of capital,          large extent, the answer is found in its    ality you need.
technological and staffing resources —           hosting provider’s hardware. The first      But Jass’ considerations are of paramount
it’s able to offer customers. To serve as an     thing on a web host’s shopping list         importance. Hardware can make or break
effective partner to e-tail merchants, a         should be servers that are big enough       a service provider’s ability to grow with
hosting provider must make hardware,             and powerful enough to handle the              his customers.
software, skill level and service-plan           incoming load around the clock,                 One manufacturer that’s won kudos
upgrades part of its way of life.                during any day of the year.                         from appliances fans is Starbox


                                               “If my server goes down, a lump of coal                      WEB HOSTING MAGAZINE
                                               will be the least of your worries, punk!”
WEB HOSTING MAGAZINE
Netsystems (starbox.net), which offers                                                             new type of service provider that inte-
an Apache-based device aimed specifi-                                                              grates Internet data centers with
cally at web hosts in three different size                                                         high-bandwidth optical backbones,
categories: 500 users, 1,000 users and                                                             thus eliminating bottlenecks on the
2,000 users. In the works is a name                                                                Internet. They offer high speed net-
server, a firewall appliance, a web-                                                               working and data center services to
caching device and an e-commerce                                                                   ASPs, ISPs, and web hosts who can
appliance. Another appliance maker,                                                                then resell services such as email and e-
Mirapoint (mirapoint.com), offers                                                                  commerce to both business and
scalable mail-serving devices. The                                                                 residential customers.
company recently lured Gene Banman, a                                                              Yet another useful tool is caching
former Sun vice president, to be its pres-                                                         devices, which are placed between the
ident and chief operating officer. By                                                              end user and the main server. By
voting with his feet, Banman has given           (telseon.com). It offers scalable band-
                                                 width within and between metropolitan           caching frequently accessed data, site vis-
quite an endorsement to the function-                                                            itors enjoy faster response times while
ality of appliances. Yet another                 areas to service providers. The amount of
                                                 bandwidth is controlled by the service          service providers benefit from reduced
manufacturer, Phobos (phobos.com),                                                               demands on main servers.
recently released a rack-mountable device        provider, eliminating the necessity of
that off-loads all SSL processing, allowing      buying more equipment and provisioning
                                                                                                 ASSESS YOUR GOALS
web and e-commerce servers to provide            another T-3 line as demand increases.
                                                                                                 What’s a web host to do in the face of
both secure and non-secure services at the       Yipes (www.yipes.com) currently offers          endless hardware options? The answer
same high speeds without becoming over-          the same service as Telseon directly to         depends on its goals.
loaded with the additional overhead of           customers with plans to make scalable
                                                                                                 For mom-and-pop hosting providers tar-
security processing.                             bandwidth available to service providers
                                                                                                 geting local small businesses, appliances
                                                 in the near future.
CONNECTIVITY                                                                                     may provide the easiest and most eco-
                                                 A PLACE FOR EVERYTHING                          nomical solution.
Once you’ve got a server system that’s
robust enough to handle the needs of               Another issue hosting providers need to       “I think there will continue to be a lot of
your hosted sites, the next thing to look          consider is real estate. Some WH Mag          smaller companies that provide hosting
at is sufficient connec-                                          readers literally started in   services and e-commerce hosting services
tivity. A T-1 line that      “No playing video games until you    their basements and garages.   because smaller companies are able to
                                 clean your server room!”         As their businesses expand,
runs at 1.5-Mbps                                                                                 have that customer service and customer
simply won’t cut it for                                           additional space is needed     contact through the sales cycle and
more than one popular                                             for their growing collection   service cycle,” says David Rowe, director
site. You will end up                                             of equipment.                  of marketing services and strategies for
falling victim to your                                            For many, the solution is to   Intel Online Services.
customers’ success.                                               move to a data center, like    On the other hand, for those of you whose
T-3 and OC-3 lines run between three               those run by Exodus or AboveNet. In           strategy is to build or maintain a large
and 30 times as fast as a T-1, but at a            addition the peace of mind that comes         hosting operation for high traffic e-com-
cost between 10 and 50 times that of the           with round-the-clock monitoring and           merce sites, it’s a good idea to make a
smaller pipe. High bandwidth lines also            redundant mechanical, electrical, storage     major data center your home base.
take a while to get provisioned. In most           and telecommunications systems, these         Developing your own data center is an
cases, you will need to place your con-            facilities may also offer a wide range of     extremely costly proposition. However,
nectivity order in October or even                 useful services.                              leasing, colocation and
September, if you want to be ready for             “Both new and traditional service             partnering are methods
the Christmas rush.                                providers need to meet the explosive          a growing hosting
Web hosts should also pay attention to             demand for next-generation services,” says    provider can use to
other methods of expanding the pipeline.           Pat Russo, executive vice president and       speed the transition
Fast ethernet and soon, gigabit ethernet           CEO, Service Provider Networks, Lucent        from working next
solutions, may be some of the arrows               Technologies. “To do that, they must link     to the 1956 Dodge
you’ll want to have in your quiver. Look           high speed data centers with very high-       in the CEO’s garage
also to solutions such as scalable band-           speed optical and wireless networks to        to rolling out opera-
width on demand.                                   eliminate Internet bottlenecks.”              tions centers
                                                                                                 worldwide.            “Sorry! We had to take your
One company that provides gigabit                  One of the ways to meet next-generation                             site down because my dad
Ethernet solutions is Telseon                      demands is through partnering with a                                    needed the garage.”


                                                                                                                WEB HOSTING MAGAZINE
SOFTWARE                                           packages, electronic customer relations        viding training for service providers in
UNIX (or Linux or FreeBSD) or                      management (CRM), supply-chain man-            the use of their product.
Windows (NT or 2000)? This is the first            agement and systems management.
choice hosting providers are faced with in                                                        FULL E-COMMERCE PACKAGES
                                                         Storefront software is just what the
terms of software.                                                                                BroadVision is well supported in the
                                                          name implies — a platform for
According to the folks at                                                                         industry with established B2B and B-2-C
                                                          setting up online what resembles
Uneven Internet                                                                                   packages. Recently allied with Hewlett-
                                                           a traditional store. It helps the e-
(uneven.com), “NT is                                                                              Packard and Sun to provide a hardware/
                                                           tailer to arrange products by
easier to use than                                                                                software package, the company offers
                                                            category and allows the shopper
UNIX, but UNIX is                                                                                 personalized e-business applications as
                                                               to search for, order and pay
usually faster and can                                                                            well as CRM. Although it is
                                                                for merchandise.
run Apache.”                                                                                      moving from a propri-
                                                            The goal of customer-relations        etary language
A recent survey by                                 software is to enhance and personalize         toward
Netcraft (netcraft.com/survey/) indicates          online-shopping experiences with an eye        XML and
that Apache is being used on more web              to getting the product through the             Java, current     “No general! Not B2 support!
servers than all other software combined.          payment and delivery process. Supply-          analysis            We need B2B support!”
Part of the reason is that it’s free; another is   chain management solutions control             reports that
that it’s a reliable, stable platform.             production rates and parts ordering to         it lags behind some competitors, such as
Outside of the open source world,                  minimize warehouse time and space.             InterShop and IBM in this regard.
Microsoft is the overwhelming market               Integration between these two systems,
                                                                                                  IBM (ibm.com) offers its WebSphere
leader. Some of the most popular e-com-            plus accounting, marketing and sales,
                                                                                                  suite in competition to Broadvision. The
merce packages only run under                      requires a systems-management package.
                                                                                                  company has allied with Ariba
Windows. Hosting providers will either             There are literally thousands of products      (ariba.com) to market supply-chain man-
have to make their UNIX-based                      to choose from in each category, ranging       agement solutions. As one of the largest
machines work with NT/2000 or pur-                 from full-service solutions from the likes     companies in the world, it also offer
chase dedicated servers that operate on            of BroadVision (broadvision.com) to spe-       smart cards and application servers, as
those systems.                                     cialized packages from Miva (miva.com),        well as e-commerce solutions. IBM pro-
                                                   for instance, which are designed for a         vides advice and training both in its
DATABASE SERVER                                    specific purpose.                              products and for general information
The next issue at hand is the database
                                                   Customers want to choose, “a fully             about the set up and operations of e-
server. While there are many choices,
                                                   managed service where the vendor pro-          commerce sites.
most industry players stick with the tried
and true. “There are two database servers          vides all the assets and integration as part   Intershop (intershop.com) is one of the
that support the majority of the e-com-            of the service,” Intel Online’s Rowe           leaders in online-storefront software. Its
merce world: SQL 7 and Oracle 8,” says             explains. Finding e-store software you         package includes Intershop Enfinity and
Intel OnLine’s David Rowe.                         can work with and support is key to            Intershop 4.0. The company has tradi-
                                                   helping your clients.                          tionally focused on small to medium
Microsoft’s SQL Server is the database
                                                   Web hosts who want to be competitive           businesses, but now also offers an enter-
for the Windows family. Oracle 8i, cur-
                                                   and keep their clients happy must be           prise-level product, Intershop
rently in release 3, is Apache compatible.
                                                   familiar with many different solutions.        Marketplace Tool Kit, which connects
Oracle continues to migrate to hosted
                                                   Not only should you know                       sell-side applications to e-marketplaces.
solutions with its new Oracle 9i, its phi-
                                                   about the most popular                         Over its history, Intershop has developed
losophy being that software is becoming
                                                   packages, but the search for                    a strong track record of allying with and
a hosted service more than a product.
                                                   better solutions should never                    supporting service providers.
So you’ve gotten the OS issues and                 end. Every day new, more                           Yet another major player in the e-
database software packages squared away?           powerful and more cost effective                    commerce software sphere is
These are but the tip of the iceberg in e-         e-commerce tools are offered.                        InterWorld (interworld.com). Its
commerce solutions. There remains                  The key to increasing your client                       primary strength lies in B2C
dozen of decisions to be made in terms             base and your revenues may be in one                     software. InterWorld’s
of software for designing, maintaining             of those new offerings. You also need                     Commerce Exchange suite
and monitoring e-commerce sites.                   to know your software well enough to                     offers transaction man-
                                                   be able to offer training and support for              agement, personalization,
E-COMMERCE PACKAGES
                                                   your customers. Software providers are         content management and a variety of
E-commerce software can be broken
                                                   more than willing to help out by pro-          merchandising features.
down into these categories: storefront


     WEB HOSTING MAGAZINE
When companies as large as Sun and               unlimited integration of product choices,      shopping from presentation through pur-
Netscape (recently assimilated by AOL            this can be overwhelming to the con-           chase. A recent report by Ovum
— resistance was futile) get together,           sumer,” says Online Insight’s Ken Forster.     (ovum.com) states that consumers expect
their offering cannot be ignored. IPlanet        CRM is the attempt to overcome the             their online experiences to match or
(iplanet.com) offers, in its own words, e-       problem of too much information                exceeds real-world experiences. Here are a
commerce solutions “from silicon to              scaring away the customer. The visitor to      few shopper-pleasing offerings:
eyeballs.” As a hardware/software combi-         a site doesn’t want to look at every pair of   In August, Oracle came up with a nice
nation of formidable parentage, it brings        brown shoes made, just the ones that           little loss leader — it’s giving away (or
the advantages of Sun’s hardware and             interest him.                                  was as of press time) its Sales Force
Netscape’s Enterprise Server software.           CRM allows online merchants to cus-            Automation (SFA) package online. This
                                                 tomize their offerings to meet the needs of    package provides pipeline management,
STOREFRONT SOFTWARE FOR
                                                 individual customers. There are any            which is the funneling of goods from
THE MASSES                                       number of ways of accomplishing this:          manufacturer to consumer, along with
The companies listed above offer online          visitor surveys, demographic analysis (poor    calendaring, expense and travel man-
storefronts as part of a full e-commerce         people don’t shop at Neiman-Marcus very        agement. Of course, Oracle is not in
package. These are the big boys whose                                                           business to lose money. The most likely
solutions meet enterprise-level needs.                                                          reason behind this giveaway is to attract
However, for those not in the business of                                                       customers to incorporate more elements
hosting large numbers of Global 2000                                                            of its CRM package.
companies, one of the following mass-
market players may serve as a more                                                              Siebel (siebel.com) is one of the larger
appropriate partner.                                                                            competitor to Oracle in the CRM arena. It
                                                                                                offers a full suite of applications for sales
Miva (miva.com) offers storefront solu-                                                         force, call centers and marketing, among
tions and credit-card enabled order forms                                                       other solutions. Its field and sales services
as part of Miva Merchant, its e-com-                                                            include online configuration and pricing as
merce package. It also participates in                                                          well as hand-held voice and wireless
different types of comarketing with                                                             software. It also has a full suite of B-B,
hosting partners, according to company                                                          B2C, auctioning and marketing software.
spokesperson Sherry Isler.
                                                                                                E.piphany (epiphany.com) offers web-
iHTML from of InLine Internet Systems                                                           based CRM applications with real-time
(inline.com) offers site solutions ranging                                                      analysis. The customer’s current
from database driven e-commerce sites to         often) and the use of algorithms to person-
                                                 alize the shopping experience.                 behavior is calculated real-time into the
simple brochureware. “Most of our                                                               interaction he’s having with the site. It
partners are smaller web hosting com-            In simple language, an algorithm is a          offers the E.phiphany E.5 system, an
panies,” says CEO Russ Cobbe.                    symbolic formula running through a             “analytical and operational” customer-
Mercantec (mercantec.com), which con-            number of steps that can remember the          relations management package that
centrates on the small to medium                 steps it went through. In practical terms      “coordinates and unifies, in real-time,”
businesses, markets its SoftCart package to      it means that when a visitor signs on to a     all interactions with customers.
service providers, as well as individual busi-   web site, his past behavior can be recalled
nesses. “Mercantec considers its channel         and used to present him with customized        A MORE PERSONALIZED
[service providers] to be key partners and       product offerings, designed specifically       EXPERIENCE
treats them as such,” says the company’s         for him. What makes an algorithm               Online Insight (onlineinsight.com) offers
Product Manager, Bob Honn.                       “intelligent” is its ability to adjust to      one of the most innovative ways of per-
                                                 changing circumstances.                        sonalizing web sites. Its current solution
CRM SOFTWARE                                     Closely allied with customer-response          is a two-fold product. On one hand, an
CRM software aims to do what old                 programs is the idea of data mining, or        intelligent algorithms uses a query-and-
Alfred Fuller aimed to do: know that             looking for patterns in data. This is not      response format to guide the consumer
your Aunt Harriet’s birthday was coming          just a new presentation of existing data.      to product choices that meet his needs.
and make you a special offer on a boar-          True data mining can find and present          On the other hand, the aggregate data is
bristle brush. It helps tailor the buying        previously unknown relationships among         collected and analyzed to provide
experience to the individual shopper and         and within existing data.                      feedback to the merchant. This process
gives them the feeling that the merchant                                                        allows not only a more efficient shopping
care about them and their needs.                 MANAGING SHOPPING                              experience, but literally improves the site
“While the power of the Internet enables         Again, a great many companies offer e-         each time it’s accessed.
                                                 CRM, the software that manages

                                                                                                              WEB HOSTING MAGAZINE
Another approach to giving the con-                    vendors like IBM, Cisco or Sun, they            kind of monitoring for intrusion.
sumer a personalized shopping                          likely have already familiarized you with       Known as IDS (Intrusion Detection
experience is to put a real person into the            their security offerings. If you’re a start-    Systems), these protocols are either
equation. Live Person (liveperson.com)                 up provider, patching together                  installed on the host machines or on
does just that. At crucial junctures in the            equipment and customers, while trying           the network. Each system, of course,
shopping process pop-ups appear that                   to keep one step ahead of intruders, some       has its advantages and blind spots, and
allow the consumer to chat online with a               of the first places you should visit are the    more complete coverage is provided
live operator.                                         web sites of these vendors. All of them         when the two types are combined.
The live operator has access to data col-              offer a wide range of services and infor-       Host-based IDS are not as fast as
lected from the shopper, allowing them                 mation to help you better address               network IDS, but their strengths
                to answer questions intelli-           security concerns.                              include stronger intrusion analysis.
                  gently and accurately. One           Firewalls, which are a combination of           Additionally, they focus on data specific
                   advantage is that, since            hardware and software implementing              to the host and have a lower entry cost
                  this live person interaction         security between two or more networks,          than network systems. IDS operate by
                            is occurring in a          are the most basic element of a security        examining the system, event and
                             chat format, the          system. They come in three basic flavors:       security logs on Windows NT and the
                             operator is able to       Packet filtering routers restrict traffic by    syslog in a UNIX environment. Since
“Your live operator went to     service several        looking at the sources and destinations of      they are using logs containing actual
   lunch. Say hello to a        customers at a         individual packets. Proxy/circuit level         events, they can verify whether a
 smooth operator, baby!”
                                time. The use          gateways act as an intermediary by              given attack
of ASP technology also means there is no               requiring each user to first connect to the     was successful.
hardware or software to install.                       firewall. Application proxy firewalls           One of the flaws
                                                       extend the proxy/circuit firewall to the        of an IDS is that
CREATING A MARKETPLACE                                 application level by inspecting traffic to      they cannot
The next step beyond hosting a single                  ensure that it conforms to the particular       detect every type
store is to combine individual storefronts             application’s protocol.                         of intrusion,
into a larger marketplace. Such a collabo-
                                                       A common addition or enhancement to a           most notably,
rative effort can pay big dividends
                                                       firewall is called a DMZ (de-militarized        those that are
including links between multiple mer-
                                                       zone). In most cases, this is a combination     launched from the key-
chants’ sites, group buying opportunities
                                                       of firewalls and bastion hosts (themselves a    board of a critical
and the sharing of software and
                                                       gateway between internal and external net-      server and, therefore,
hardware. Another plus is that shoppers
                                                       works). Generally a DMZ sits outside the        don’t cross the network.
can be kept in-house and not be lost to
                                                       main firewall, acting as an additional          In such cases, a host-
the competition. For the web host, this
                                                       barrier to intrusion.                           based system can be effective. since they
translates into more flexibility, higher
                                                       The basic function of a firewall is to          can detect infiltrations that may be
profits and ease of management.
                                                       restrict to the minimum what a service          unseen by network- based IDS. Also,
The focus of Actinic Catalog                                                                           since the host-based system examines
                                                       requires to implement an application. In
(actinic.com) is to assist ISPs and web                                                                de-encrypted data, it will see attacks
                                                       other words, it limits communications.
hosts with the set-up and maintenance of                                                               that can be missed by a network system.
                                                       Internal systems may need to initiate con-
multi-store e-commerce sites. It does so                                                               Although host-based systems don’t offer
                                                       nections with a server on a DMZ network,
by supplying a hosting engine, pre-con-                                                                true real-time response, when properly
                                                       but not the other way around. Access for a
figured to run on a service provider’s                                                                 implemented, they come very close.
                                                       database server, for example, should be
servers. Release 3.0 of the product
                                                       limited to web servers that retrieve infor-
received excellent reviews. Release 4.0                                                                NETWORK-BASED IDS
                                                       mation from the database and internal
was launched in late September.                                                                        While the initial cost of a host-based
                                                       systems used by database administrators.
                                                                                                       system is lower than that of a network-
SECURITY CONCERNS                                      Firewalls should also hide internal             based one, network systems can be
The number-one consumer concern in                     network architecture and addressing from        strategically deployed to monitor traffic
making purchases over the Internet is                  external users. Finally, the firewall should    destined for multiple systems. On
security. Buyers want assurances that                  itself be difficult to scan by limiting what    network systems, software only has to
credit card numbers won’t disappear into               protocols may pass through it.                  be loaded and configured once, instead
the Internet cloud, only to reappear in                                                                of on a variety of different systems.
some hacker’s computer.                                INTRUSION DETECTION                               This lowers the total cost of own-
                                                       Most of the commercially available                     ership in an enterprise
If you’re working with one of the major
                                                       security systems include some                            environment.
                                                   “North Korea just called. For a couple of bags of
     WEB HOSTING MAGAZINE                             rice, we can put our network in the DMZ.”
Network-based IDS also look at all             a safe — all of which                                identification is necessary for e-com-
packet headers. Since many denial of           have a rating. That                                  merce security.
service attacks can only be found by           rating tells the purchaser                            Another important security player is
looking at packet headers and host-            how long a professional                             Internet Security Systems (iss.net). In
based systems do not examine packet            with tools will take to get                         its own words, “not only does ISS offer
headers, network-based IDS are the             to the contents. If an alarm doesn’t                 market-leading, best-of-breed security
only way to protect a system against           alert a guard to come running, the                          management systems for
this type of attack.                           thief makes off with the jewels or, in                security assessment, policy
Another major advantage of the                 your case, a client’s database.                        enforcement and intrusion detection
network-based systems is that they             Those who offer web hosting services                    — all built on the company’s
operate in real-time. Attacks are              must give their clients an assurance that               SAFEsuitetm security-management
reported as they occur, allowing faster        not only are you using the best of current               platform — it also provides
notification and response. Since any           technology to protect them, but                          superior customer service, con-
hacker worth his salt knows how to             that you, or a service you employ, will                   sulting and education offerings
manipulate audit logs, the rapidity of         be there when the alarm sounds.                           that significantly reduce the com-
network-based response means that he           If you intend to be your own cop on                       plexity and expense inherent in
will not have time to remove the evi-          the beat, you should look at some of                protecting online assets.”
                       dence of his visit      the companies offering security systems             Each of the companies listed above not
                       before being            solutions. Among these are @Stake                   only sells products or services, but also
                       found out.              (atstake.com) whose chief science                   have web sites full of information.
                          The bottom line      officer is a man named Mudge (and you               Since, as a web host, you need to be
A hacker’s worth of salt.
                          is simply that       thought that was Mr. Spock...). In spite            informed to properly service your
                          each of these        of a name that sounds more like a                   clients, these sites are an excellent
intrusion detection systems has strong         crazed chef who makes candy, Mudge is               place to begin increasing your
and weak points. One or the other may          a highly respected cryptographer whose              knowledge of security.
work best for the particular envi-             company offers a rapid ramp-up to                   If you want to take a look at the other
ronment you are hosting, but it is likely      secure server architecture. He has also             side of things, visit Phrack Magazine.
that you will find some combination of         co-authored a number of technical                   This is a magazine aimed at “hackers
the two gives you the overlapping              papers and reports with Schneider. The              with honor.” Like the rogue Samurai
security necessary to protect your             @Stake web site is an excellent source              or Ronin of medieval Japan, their skills
clients’ businesses.                           of information.                                     are deadly, but their hearts are in the
                                               Also, check out Entrust (entrust.com).              right place. Though Dogpile lists its
WHO’S OUT THERE AND WHAT
                                               Its offerings include security solutions            URL as phrack.com, this link led
ARE THEY DOING?                                for both web and wireless transactions.             nowhere. Back issues were available on
In addition to the large companies,            Its customers include New York Life,                world.std.com /~loki/security/phrack.
there are many smaller outfits that offer      Chase Manhattan and the U.S.
special packages and options. If you                                                               E-commerce offers many opportunities
                                               Government. It wholly owns a subsidiary             along with a host of challenges for the
think the installation of a firewall           called Cygnacom (cygnacom.com),
between your hosted storefront and your                                                            web host. It's an area that's changing
                                               which specializes in public key infra-              daily as it struggles to meet the demands
database server is enough, you need to         structure (PKI), information security
think again. Counterpane (coun-                                                                    of customers. We have looked at only a
                                               consulting and security evaluations.                small percentage of the hardware,
terpane.com), one of these companies,
points out the obvious, “If a firewall was     PKI is a system of certificates and other           software and security solutions available
perfect, you wouldn’t need an alarm.”          registrations that verify and identify the          in this crowded field. The one con-
                                               parties in an Internet transaction.                 clusion that can be drawn is that, as a
Counterpane was started by the man             Currently, there’s no industry-wide                 web host, you can't ignore the impor-
who literally wrote the book on cryp-          standard for building a PKI or any                                         tance of e-commerce
tography. Bruce Schneier is the author         single PKI. While the                                                           and what it
of Applied Cryptography and a recog-           industry differs on                                                              means to your
nized expert in the field. The idea            which PKI will                                                                    future. In the
behind his company is that security is         be used and how                                                                   words of Ted
an on-going process, not a product.            to make one,                                                                     Turner, you
The concept here is that there’s no            there is general                                                                have to "lead,
perfect security technology. The analogy       agreement that                                                               follow, or get out
Counterpane makes is to the purchase of        this level of mutual                                              of the way."
                                             Posted with permission from Web Hosting. Copyright 2000.
                                #67528 Managed by Reprint Management Services, (717) 399-1900, www.reprintbuyer.com

More Related Content

What's hot

Redp4593
Redp4593Redp4593
Redp4593eyeOS
 
IBM Managed Hosting - Linux virtual services
IBM Managed Hosting - Linux virtual servicesIBM Managed Hosting - Linux virtual services
IBM Managed Hosting - Linux virtual serviceswebhostingguy
 
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1Ruud Ramakers
 
iStart the desktop goes virtual
iStart the desktop goes virtualiStart the desktop goes virtual
iStart the desktop goes virtualHayden McCall
 
Pacific strategy group 27th april 2012
Pacific strategy group  27th april 2012Pacific strategy group  27th april 2012
Pacific strategy group 27th april 2012ctrlsblog
 
Inter connected enterprise trends & directions feb 19 2013
Inter connected enterprise trends & directions feb 19 2013Inter connected enterprise trends & directions feb 19 2013
Inter connected enterprise trends & directions feb 19 2013Sid Bhatia
 
Inter|section gateways
Inter|section gatewaysInter|section gateways
Inter|section gatewaysWayne Caswell
 
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Novell
 
Lenovo: The Cloud Over BYOD
Lenovo: The Cloud Over BYODLenovo: The Cloud Over BYOD
Lenovo: The Cloud Over BYODLenovo Education
 
IBM Managed Hosting - server services
IBM Managed Hosting - server servicesIBM Managed Hosting - server services
IBM Managed Hosting - server serviceswebhostingguy
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaAsheem Chandna
 
As oportunidades para a Indústria Geradas pela Computação em Nuvem
As oportunidades para a Indústria Geradas pela Computação em NuvemAs oportunidades para a Indústria Geradas pela Computação em Nuvem
As oportunidades para a Indústria Geradas pela Computação em NuvemSoluções NEI
 
Ibm virtualization techday v2.0 final
Ibm virtualization techday v2.0 finalIbm virtualization techday v2.0 final
Ibm virtualization techday v2.0 finalAbhed
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center networkInterop
 
Mikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMicrosoft Windows Embedded
 
Esri maps out large-scale growth with SAP and IBM
Esri maps out large-scale  growth with SAP and IBMEsri maps out large-scale  growth with SAP and IBM
Esri maps out large-scale growth with SAP and IBMIBM India Smarter Computing
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudChris Pepin
 

What's hot (18)

Redp4593
Redp4593Redp4593
Redp4593
 
IBM Managed Hosting - Linux virtual services
IBM Managed Hosting - Linux virtual servicesIBM Managed Hosting - Linux virtual services
IBM Managed Hosting - Linux virtual services
 
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
 
iStart the desktop goes virtual
iStart the desktop goes virtualiStart the desktop goes virtual
iStart the desktop goes virtual
 
Pacific strategy group 27th april 2012
Pacific strategy group  27th april 2012Pacific strategy group  27th april 2012
Pacific strategy group 27th april 2012
 
Inter connected enterprise trends & directions feb 19 2013
Inter connected enterprise trends & directions feb 19 2013Inter connected enterprise trends & directions feb 19 2013
Inter connected enterprise trends & directions feb 19 2013
 
Inter|section gateways
Inter|section gatewaysInter|section gateways
Inter|section gateways
 
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
 
Lenovo: The Cloud Over BYOD
Lenovo: The Cloud Over BYODLenovo: The Cloud Over BYOD
Lenovo: The Cloud Over BYOD
 
IBM Managed Hosting - server services
IBM Managed Hosting - server servicesIBM Managed Hosting - server services
IBM Managed Hosting - server services
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
 
As oportunidades para a Indústria Geradas pela Computação em Nuvem
As oportunidades para a Indústria Geradas pela Computação em NuvemAs oportunidades para a Indústria Geradas pela Computação em Nuvem
As oportunidades para a Indústria Geradas pela Computação em Nuvem
 
Citrix Vision And Strategy Oct 2009
Citrix Vision And Strategy Oct 2009Citrix Vision And Strategy Oct 2009
Citrix Vision And Strategy Oct 2009
 
Ibm virtualization techday v2.0 final
Ibm virtualization techday v2.0 finalIbm virtualization techday v2.0 final
Ibm virtualization techday v2.0 final
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center network
 
Mikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivity
 
Esri maps out large-scale growth with SAP and IBM
Esri maps out large-scale  growth with SAP and IBMEsri maps out large-scale  growth with SAP and IBM
Esri maps out large-scale growth with SAP and IBM
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 

Similar to E-Commerce: Part II Covering Your Back End

Datacenter Of The Future Article - - Jon Greaves 1
Datacenter Of The Future Article - -  Jon Greaves 1Datacenter Of The Future Article - -  Jon Greaves 1
Datacenter Of The Future Article - - Jon Greaves 1Bill Alatis
 
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your CloudCloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your CloudMark Hinkle
 
Cloud Computing: Latest Buzzword or Glimpse of the Future?
Cloud Computing: Latest Buzzword or Glimpse of the Future?Cloud Computing: Latest Buzzword or Glimpse of the Future?
Cloud Computing: Latest Buzzword or Glimpse of the Future?white paper
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)Soetam Rizky
 
Cloudy with a chance of arm
Cloudy with a chance of armCloudy with a chance of arm
Cloudy with a chance of armStephan Cadene
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computingmciobo
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computingmciobo
 
cloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and corescloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and coresWajiha Muhammad Ismail
 
Hp Ncoic Susanne Balle Sept17 Final
Hp Ncoic Susanne Balle Sept17 FinalHp Ncoic Susanne Balle Sept17 Final
Hp Ncoic Susanne Balle Sept17 FinalGovCloud Network
 
Giga Spaces Getting Ready For The Cloud
Giga Spaces   Getting Ready For The CloudGiga Spaces   Getting Ready For The Cloud
Giga Spaces Getting Ready For The Cloudchzesin
 
GigaSpaces - Getting Ready For The Cloud
GigaSpaces - Getting Ready For The CloudGigaSpaces - Getting Ready For The Cloud
GigaSpaces - Getting Ready For The Cloudgigaspaces
 
Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?Cartesian (formerly CSMG)
 
Cloud Computing By Pankaj Sharma
Cloud Computing By Pankaj SharmaCloud Computing By Pankaj Sharma
Cloud Computing By Pankaj SharmaRanjan Kumar
 
Modern Web Development (2018)
Modern Web Development (2018)Modern Web Development (2018)
Modern Web Development (2018)Randy Connolly
 

Similar to E-Commerce: Part II Covering Your Back End (20)

Datacenter Of The Future Article - - Jon Greaves 1
Datacenter Of The Future Article - -  Jon Greaves 1Datacenter Of The Future Article - -  Jon Greaves 1
Datacenter Of The Future Article - - Jon Greaves 1
 
Cloud1
Cloud1Cloud1
Cloud1
 
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your CloudCloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
 
Cloud Computing: Latest Buzzword or Glimpse of the Future?
Cloud Computing: Latest Buzzword or Glimpse of the Future?Cloud Computing: Latest Buzzword or Glimpse of the Future?
Cloud Computing: Latest Buzzword or Glimpse of the Future?
 
Cloud
CloudCloud
Cloud
 
Cloud
CloudCloud
Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
 
Cloudy with a chance of arm
Cloudy with a chance of armCloudy with a chance of arm
Cloudy with a chance of arm
 
Cloud Model for SMB
Cloud Model for SMBCloud Model for SMB
Cloud Model for SMB
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computing
 
Clearing the fog from cloud computing
Clearing the fog from cloud computingClearing the fog from cloud computing
Clearing the fog from cloud computing
 
cloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and corescloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and cores
 
Hp Ncoic Susanne Balle Sept17 Final
Hp Ncoic Susanne Balle Sept17 FinalHp Ncoic Susanne Balle Sept17 Final
Hp Ncoic Susanne Balle Sept17 Final
 
Giga Spaces Getting Ready For The Cloud
Giga Spaces   Getting Ready For The CloudGiga Spaces   Getting Ready For The Cloud
Giga Spaces Getting Ready For The Cloud
 
GigaSpaces - Getting Ready For The Cloud
GigaSpaces - Getting Ready For The CloudGigaSpaces - Getting Ready For The Cloud
GigaSpaces - Getting Ready For The Cloud
 
Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?
 
Cloud Computing By Pankaj Sharma
Cloud Computing By Pankaj SharmaCloud Computing By Pankaj Sharma
Cloud Computing By Pankaj Sharma
 
Modern Web Development (2018)
Modern Web Development (2018)Modern Web Development (2018)
Modern Web Development (2018)
 

More from webhostingguy

Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Frameworkwebhostingguy
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guidewebhostingguy
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serverswebhostingguy
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidationwebhostingguy
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreementwebhostingguy
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...webhostingguy
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...webhostingguy
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructurewebhostingguy
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.pptwebhostingguy
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy webhostingguy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandiserswebhostingguy
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Productswebhostingguy
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mbwebhostingguy
 

More from webhostingguy (20)

File Upload
File UploadFile Upload
File Upload
 
Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Framework
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guide
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web servers
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidation
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreement
 
Notes8
Notes8Notes8
Notes8
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructure
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.ppt
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandisers
 
OLUG_xen.ppt
OLUG_xen.pptOLUG_xen.ppt
OLUG_xen.ppt
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Products
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mb
 
Reseller's Guide
Reseller's GuideReseller's Guide
Reseller's Guide
 

E-Commerce: Part II Covering Your Back End

  • 1. E-Commerce: Part II Covering Your Back-End What You Should Know About Hardware, Software and Security by Jim Thompson and Mike Woodward Illustration by Brian Biggs In the last issue of WH Mag, we intro- HARDWARE IS THERE AN APPLIANCE IN duced you to Alfred Fuller, inventor of Running a web hosting operation takes YOUR FUTURE? door-to-door selling. When a salesman servers — lots of servers. There are many Servers or appliances? That’s a question from the Fuller Brush Company arrived choices, but essentially, machines come with no single right answer. Ultimately, at his customers’ doors, all they saw was in two flavors: full-fledged servers and the choice depends on the need. his smiling face, his magnetic personality appliances. and his line of brushes. The business “We don’t use appliances,” is the terse Although there was a time when each reply from the Loop, a small ISP in the model seemed simple: Pack up the served distinct purposes, the boundaries Los Angeles area. products, ring a few door bells and watch between servers and appliances are the cash roll in. But there was whole lot “A server can grow with a customer, an blurring. Major manufacturers such as more going on behind the scenes. The appliance can’t,” is the opinion of Sun, IBM, Compaq, Hewlett-Packard Fuller Brush men depended on the Haralds Jass, president and CEO of and Intel have diversified their focus on company’s back office staff to handle Superb Internet. “Thus [an appliance] high end machines and added lower cost issues such as manufacturing, distri- has the potential to greatly impair the and more compact appliances to their bution, accounting, sales support and growth of a business. Many current product lines. (Sun has gone as far as customer care. appliances on the market are a step back- acquiring Cobalt Networks, the leading Today’s online merchants are in a appliance maker.) Meanwhile, newer wards in service-provider solutions.” position similar to Alfred Fuller’s. An hardware players Cobalt, NetMachines, Not everyone feels as strongly on this attractive web site alone does not a prof- Network Engines, StarBox Netsystems subject as Jass. Appliance advocates feel itable business make. Therefore, e-tailers and others offer both general purpose that the current generation of products rely on their hosting providers to help server appliances along with appliances offer immediate cost and time savings. In orchestrate and automate back-offic that handle specific tasks. addition, each new release brings more processes to the point where all that robust, flexible and scalable machines. Will a Santa site be able to scale from needs to be added is the customer. Meanwhile, you can stack multiple units four hits a day in March to million of A web host’s job is to determine what simultaneous visitors in December? To a in a rack to quickly attain the function- level of service — in terms of capital, large extent, the answer is found in its ality you need. technological and staffing resources — hosting provider’s hardware. The first But Jass’ considerations are of paramount it’s able to offer customers. To serve as an thing on a web host’s shopping list importance. Hardware can make or break effective partner to e-tail merchants, a should be servers that are big enough a service provider’s ability to grow with hosting provider must make hardware, and powerful enough to handle the his customers. software, skill level and service-plan incoming load around the clock, One manufacturer that’s won kudos upgrades part of its way of life. during any day of the year. from appliances fans is Starbox “If my server goes down, a lump of coal WEB HOSTING MAGAZINE will be the least of your worries, punk!”
  • 3. Netsystems (starbox.net), which offers new type of service provider that inte- an Apache-based device aimed specifi- grates Internet data centers with cally at web hosts in three different size high-bandwidth optical backbones, categories: 500 users, 1,000 users and thus eliminating bottlenecks on the 2,000 users. In the works is a name Internet. They offer high speed net- server, a firewall appliance, a web- working and data center services to caching device and an e-commerce ASPs, ISPs, and web hosts who can appliance. Another appliance maker, then resell services such as email and e- Mirapoint (mirapoint.com), offers commerce to both business and scalable mail-serving devices. The residential customers. company recently lured Gene Banman, a Yet another useful tool is caching former Sun vice president, to be its pres- devices, which are placed between the ident and chief operating officer. By end user and the main server. By voting with his feet, Banman has given (telseon.com). It offers scalable band- width within and between metropolitan caching frequently accessed data, site vis- quite an endorsement to the function- itors enjoy faster response times while ality of appliances. Yet another areas to service providers. The amount of bandwidth is controlled by the service service providers benefit from reduced manufacturer, Phobos (phobos.com), demands on main servers. recently released a rack-mountable device provider, eliminating the necessity of that off-loads all SSL processing, allowing buying more equipment and provisioning ASSESS YOUR GOALS web and e-commerce servers to provide another T-3 line as demand increases. What’s a web host to do in the face of both secure and non-secure services at the Yipes (www.yipes.com) currently offers endless hardware options? The answer same high speeds without becoming over- the same service as Telseon directly to depends on its goals. loaded with the additional overhead of customers with plans to make scalable For mom-and-pop hosting providers tar- security processing. bandwidth available to service providers geting local small businesses, appliances in the near future. CONNECTIVITY may provide the easiest and most eco- A PLACE FOR EVERYTHING nomical solution. Once you’ve got a server system that’s robust enough to handle the needs of Another issue hosting providers need to “I think there will continue to be a lot of your hosted sites, the next thing to look consider is real estate. Some WH Mag smaller companies that provide hosting at is sufficient connec- readers literally started in services and e-commerce hosting services tivity. A T-1 line that “No playing video games until you their basements and garages. because smaller companies are able to clean your server room!” As their businesses expand, runs at 1.5-Mbps have that customer service and customer simply won’t cut it for additional space is needed contact through the sales cycle and more than one popular for their growing collection service cycle,” says David Rowe, director site. You will end up of equipment. of marketing services and strategies for falling victim to your For many, the solution is to Intel Online Services. customers’ success. move to a data center, like On the other hand, for those of you whose T-3 and OC-3 lines run between three those run by Exodus or AboveNet. In strategy is to build or maintain a large and 30 times as fast as a T-1, but at a addition the peace of mind that comes hosting operation for high traffic e-com- cost between 10 and 50 times that of the with round-the-clock monitoring and merce sites, it’s a good idea to make a smaller pipe. High bandwidth lines also redundant mechanical, electrical, storage major data center your home base. take a while to get provisioned. In most and telecommunications systems, these Developing your own data center is an cases, you will need to place your con- facilities may also offer a wide range of extremely costly proposition. However, nectivity order in October or even useful services. leasing, colocation and September, if you want to be ready for “Both new and traditional service partnering are methods the Christmas rush. providers need to meet the explosive a growing hosting Web hosts should also pay attention to demand for next-generation services,” says provider can use to other methods of expanding the pipeline. Pat Russo, executive vice president and speed the transition Fast ethernet and soon, gigabit ethernet CEO, Service Provider Networks, Lucent from working next solutions, may be some of the arrows Technologies. “To do that, they must link to the 1956 Dodge you’ll want to have in your quiver. Look high speed data centers with very high- in the CEO’s garage also to solutions such as scalable band- speed optical and wireless networks to to rolling out opera- width on demand. eliminate Internet bottlenecks.” tions centers worldwide. “Sorry! We had to take your One company that provides gigabit One of the ways to meet next-generation site down because my dad Ethernet solutions is Telseon demands is through partnering with a needed the garage.” WEB HOSTING MAGAZINE
  • 4. SOFTWARE packages, electronic customer relations viding training for service providers in UNIX (or Linux or FreeBSD) or management (CRM), supply-chain man- the use of their product. Windows (NT or 2000)? This is the first agement and systems management. choice hosting providers are faced with in FULL E-COMMERCE PACKAGES Storefront software is just what the terms of software. BroadVision is well supported in the name implies — a platform for According to the folks at industry with established B2B and B-2-C setting up online what resembles Uneven Internet packages. Recently allied with Hewlett- a traditional store. It helps the e- (uneven.com), “NT is Packard and Sun to provide a hardware/ tailer to arrange products by easier to use than software package, the company offers category and allows the shopper UNIX, but UNIX is personalized e-business applications as to search for, order and pay usually faster and can well as CRM. Although it is for merchandise. run Apache.” moving from a propri- The goal of customer-relations etary language A recent survey by software is to enhance and personalize toward Netcraft (netcraft.com/survey/) indicates online-shopping experiences with an eye XML and that Apache is being used on more web to getting the product through the Java, current “No general! Not B2 support! servers than all other software combined. payment and delivery process. Supply- analysis We need B2B support!” Part of the reason is that it’s free; another is chain management solutions control reports that that it’s a reliable, stable platform. production rates and parts ordering to it lags behind some competitors, such as Outside of the open source world, minimize warehouse time and space. InterShop and IBM in this regard. Microsoft is the overwhelming market Integration between these two systems, IBM (ibm.com) offers its WebSphere leader. Some of the most popular e-com- plus accounting, marketing and sales, suite in competition to Broadvision. The merce packages only run under requires a systems-management package. company has allied with Ariba Windows. Hosting providers will either There are literally thousands of products (ariba.com) to market supply-chain man- have to make their UNIX-based to choose from in each category, ranging agement solutions. As one of the largest machines work with NT/2000 or pur- from full-service solutions from the likes companies in the world, it also offer chase dedicated servers that operate on of BroadVision (broadvision.com) to spe- smart cards and application servers, as those systems. cialized packages from Miva (miva.com), well as e-commerce solutions. IBM pro- for instance, which are designed for a vides advice and training both in its DATABASE SERVER specific purpose. products and for general information The next issue at hand is the database Customers want to choose, “a fully about the set up and operations of e- server. While there are many choices, managed service where the vendor pro- commerce sites. most industry players stick with the tried and true. “There are two database servers vides all the assets and integration as part Intershop (intershop.com) is one of the that support the majority of the e-com- of the service,” Intel Online’s Rowe leaders in online-storefront software. Its merce world: SQL 7 and Oracle 8,” says explains. Finding e-store software you package includes Intershop Enfinity and Intel OnLine’s David Rowe. can work with and support is key to Intershop 4.0. The company has tradi- helping your clients. tionally focused on small to medium Microsoft’s SQL Server is the database Web hosts who want to be competitive businesses, but now also offers an enter- for the Windows family. Oracle 8i, cur- and keep their clients happy must be prise-level product, Intershop rently in release 3, is Apache compatible. familiar with many different solutions. Marketplace Tool Kit, which connects Oracle continues to migrate to hosted Not only should you know sell-side applications to e-marketplaces. solutions with its new Oracle 9i, its phi- about the most popular Over its history, Intershop has developed losophy being that software is becoming packages, but the search for a strong track record of allying with and a hosted service more than a product. better solutions should never supporting service providers. So you’ve gotten the OS issues and end. Every day new, more Yet another major player in the e- database software packages squared away? powerful and more cost effective commerce software sphere is These are but the tip of the iceberg in e- e-commerce tools are offered. InterWorld (interworld.com). Its commerce solutions. There remains The key to increasing your client primary strength lies in B2C dozen of decisions to be made in terms base and your revenues may be in one software. InterWorld’s of software for designing, maintaining of those new offerings. You also need Commerce Exchange suite and monitoring e-commerce sites. to know your software well enough to offers transaction man- be able to offer training and support for agement, personalization, E-COMMERCE PACKAGES your customers. Software providers are content management and a variety of E-commerce software can be broken more than willing to help out by pro- merchandising features. down into these categories: storefront WEB HOSTING MAGAZINE
  • 5. When companies as large as Sun and unlimited integration of product choices, shopping from presentation through pur- Netscape (recently assimilated by AOL this can be overwhelming to the con- chase. A recent report by Ovum — resistance was futile) get together, sumer,” says Online Insight’s Ken Forster. (ovum.com) states that consumers expect their offering cannot be ignored. IPlanet CRM is the attempt to overcome the their online experiences to match or (iplanet.com) offers, in its own words, e- problem of too much information exceeds real-world experiences. Here are a commerce solutions “from silicon to scaring away the customer. The visitor to few shopper-pleasing offerings: eyeballs.” As a hardware/software combi- a site doesn’t want to look at every pair of In August, Oracle came up with a nice nation of formidable parentage, it brings brown shoes made, just the ones that little loss leader — it’s giving away (or the advantages of Sun’s hardware and interest him. was as of press time) its Sales Force Netscape’s Enterprise Server software. CRM allows online merchants to cus- Automation (SFA) package online. This tomize their offerings to meet the needs of package provides pipeline management, STOREFRONT SOFTWARE FOR individual customers. There are any which is the funneling of goods from THE MASSES number of ways of accomplishing this: manufacturer to consumer, along with The companies listed above offer online visitor surveys, demographic analysis (poor calendaring, expense and travel man- storefronts as part of a full e-commerce people don’t shop at Neiman-Marcus very agement. Of course, Oracle is not in package. These are the big boys whose business to lose money. The most likely solutions meet enterprise-level needs. reason behind this giveaway is to attract However, for those not in the business of customers to incorporate more elements hosting large numbers of Global 2000 of its CRM package. companies, one of the following mass- market players may serve as a more Siebel (siebel.com) is one of the larger appropriate partner. competitor to Oracle in the CRM arena. It offers a full suite of applications for sales Miva (miva.com) offers storefront solu- force, call centers and marketing, among tions and credit-card enabled order forms other solutions. Its field and sales services as part of Miva Merchant, its e-com- include online configuration and pricing as merce package. It also participates in well as hand-held voice and wireless different types of comarketing with software. It also has a full suite of B-B, hosting partners, according to company B2C, auctioning and marketing software. spokesperson Sherry Isler. E.piphany (epiphany.com) offers web- iHTML from of InLine Internet Systems based CRM applications with real-time (inline.com) offers site solutions ranging analysis. The customer’s current from database driven e-commerce sites to often) and the use of algorithms to person- alize the shopping experience. behavior is calculated real-time into the simple brochureware. “Most of our interaction he’s having with the site. It partners are smaller web hosting com- In simple language, an algorithm is a offers the E.phiphany E.5 system, an panies,” says CEO Russ Cobbe. symbolic formula running through a “analytical and operational” customer- Mercantec (mercantec.com), which con- number of steps that can remember the relations management package that centrates on the small to medium steps it went through. In practical terms “coordinates and unifies, in real-time,” businesses, markets its SoftCart package to it means that when a visitor signs on to a all interactions with customers. service providers, as well as individual busi- web site, his past behavior can be recalled nesses. “Mercantec considers its channel and used to present him with customized A MORE PERSONALIZED [service providers] to be key partners and product offerings, designed specifically EXPERIENCE treats them as such,” says the company’s for him. What makes an algorithm Online Insight (onlineinsight.com) offers Product Manager, Bob Honn. “intelligent” is its ability to adjust to one of the most innovative ways of per- changing circumstances. sonalizing web sites. Its current solution CRM SOFTWARE Closely allied with customer-response is a two-fold product. On one hand, an CRM software aims to do what old programs is the idea of data mining, or intelligent algorithms uses a query-and- Alfred Fuller aimed to do: know that looking for patterns in data. This is not response format to guide the consumer your Aunt Harriet’s birthday was coming just a new presentation of existing data. to product choices that meet his needs. and make you a special offer on a boar- True data mining can find and present On the other hand, the aggregate data is bristle brush. It helps tailor the buying previously unknown relationships among collected and analyzed to provide experience to the individual shopper and and within existing data. feedback to the merchant. This process gives them the feeling that the merchant allows not only a more efficient shopping care about them and their needs. MANAGING SHOPPING experience, but literally improves the site “While the power of the Internet enables Again, a great many companies offer e- each time it’s accessed. CRM, the software that manages WEB HOSTING MAGAZINE
  • 6. Another approach to giving the con- vendors like IBM, Cisco or Sun, they kind of monitoring for intrusion. sumer a personalized shopping likely have already familiarized you with Known as IDS (Intrusion Detection experience is to put a real person into the their security offerings. If you’re a start- Systems), these protocols are either equation. Live Person (liveperson.com) up provider, patching together installed on the host machines or on does just that. At crucial junctures in the equipment and customers, while trying the network. Each system, of course, shopping process pop-ups appear that to keep one step ahead of intruders, some has its advantages and blind spots, and allow the consumer to chat online with a of the first places you should visit are the more complete coverage is provided live operator. web sites of these vendors. All of them when the two types are combined. The live operator has access to data col- offer a wide range of services and infor- Host-based IDS are not as fast as lected from the shopper, allowing them mation to help you better address network IDS, but their strengths to answer questions intelli- security concerns. include stronger intrusion analysis. gently and accurately. One Firewalls, which are a combination of Additionally, they focus on data specific advantage is that, since hardware and software implementing to the host and have a lower entry cost this live person interaction security between two or more networks, than network systems. IDS operate by is occurring in a are the most basic element of a security examining the system, event and chat format, the system. They come in three basic flavors: security logs on Windows NT and the operator is able to Packet filtering routers restrict traffic by syslog in a UNIX environment. Since “Your live operator went to service several looking at the sources and destinations of they are using logs containing actual lunch. Say hello to a customers at a individual packets. Proxy/circuit level events, they can verify whether a smooth operator, baby!” time. The use gateways act as an intermediary by given attack of ASP technology also means there is no requiring each user to first connect to the was successful. hardware or software to install. firewall. Application proxy firewalls One of the flaws extend the proxy/circuit firewall to the of an IDS is that CREATING A MARKETPLACE application level by inspecting traffic to they cannot The next step beyond hosting a single ensure that it conforms to the particular detect every type store is to combine individual storefronts application’s protocol. of intrusion, into a larger marketplace. Such a collabo- A common addition or enhancement to a most notably, rative effort can pay big dividends firewall is called a DMZ (de-militarized those that are including links between multiple mer- zone). In most cases, this is a combination launched from the key- chants’ sites, group buying opportunities of firewalls and bastion hosts (themselves a board of a critical and the sharing of software and gateway between internal and external net- server and, therefore, hardware. Another plus is that shoppers works). Generally a DMZ sits outside the don’t cross the network. can be kept in-house and not be lost to main firewall, acting as an additional In such cases, a host- the competition. For the web host, this barrier to intrusion. based system can be effective. since they translates into more flexibility, higher The basic function of a firewall is to can detect infiltrations that may be profits and ease of management. restrict to the minimum what a service unseen by network- based IDS. Also, The focus of Actinic Catalog since the host-based system examines requires to implement an application. In (actinic.com) is to assist ISPs and web de-encrypted data, it will see attacks other words, it limits communications. hosts with the set-up and maintenance of that can be missed by a network system. Internal systems may need to initiate con- multi-store e-commerce sites. It does so Although host-based systems don’t offer nections with a server on a DMZ network, by supplying a hosting engine, pre-con- true real-time response, when properly but not the other way around. Access for a figured to run on a service provider’s implemented, they come very close. database server, for example, should be servers. Release 3.0 of the product limited to web servers that retrieve infor- received excellent reviews. Release 4.0 NETWORK-BASED IDS mation from the database and internal was launched in late September. While the initial cost of a host-based systems used by database administrators. system is lower than that of a network- SECURITY CONCERNS Firewalls should also hide internal based one, network systems can be The number-one consumer concern in network architecture and addressing from strategically deployed to monitor traffic making purchases over the Internet is external users. Finally, the firewall should destined for multiple systems. On security. Buyers want assurances that itself be difficult to scan by limiting what network systems, software only has to credit card numbers won’t disappear into protocols may pass through it. be loaded and configured once, instead the Internet cloud, only to reappear in of on a variety of different systems. some hacker’s computer. INTRUSION DETECTION This lowers the total cost of own- Most of the commercially available ership in an enterprise If you’re working with one of the major security systems include some environment. “North Korea just called. For a couple of bags of WEB HOSTING MAGAZINE rice, we can put our network in the DMZ.”
  • 7. Network-based IDS also look at all a safe — all of which identification is necessary for e-com- packet headers. Since many denial of have a rating. That merce security. service attacks can only be found by rating tells the purchaser Another important security player is looking at packet headers and host- how long a professional Internet Security Systems (iss.net). In based systems do not examine packet with tools will take to get its own words, “not only does ISS offer headers, network-based IDS are the to the contents. If an alarm doesn’t market-leading, best-of-breed security only way to protect a system against alert a guard to come running, the management systems for this type of attack. thief makes off with the jewels or, in security assessment, policy Another major advantage of the your case, a client’s database. enforcement and intrusion detection network-based systems is that they Those who offer web hosting services — all built on the company’s operate in real-time. Attacks are must give their clients an assurance that SAFEsuitetm security-management reported as they occur, allowing faster not only are you using the best of current platform — it also provides notification and response. Since any technology to protect them, but superior customer service, con- hacker worth his salt knows how to that you, or a service you employ, will sulting and education offerings manipulate audit logs, the rapidity of be there when the alarm sounds. that significantly reduce the com- network-based response means that he If you intend to be your own cop on plexity and expense inherent in will not have time to remove the evi- the beat, you should look at some of protecting online assets.” dence of his visit the companies offering security systems Each of the companies listed above not before being solutions. Among these are @Stake only sells products or services, but also found out. (atstake.com) whose chief science have web sites full of information. The bottom line officer is a man named Mudge (and you Since, as a web host, you need to be A hacker’s worth of salt. is simply that thought that was Mr. Spock...). In spite informed to properly service your each of these of a name that sounds more like a clients, these sites are an excellent intrusion detection systems has strong crazed chef who makes candy, Mudge is place to begin increasing your and weak points. One or the other may a highly respected cryptographer whose knowledge of security. work best for the particular envi- company offers a rapid ramp-up to If you want to take a look at the other ronment you are hosting, but it is likely secure server architecture. He has also side of things, visit Phrack Magazine. that you will find some combination of co-authored a number of technical This is a magazine aimed at “hackers the two gives you the overlapping papers and reports with Schneider. The with honor.” Like the rogue Samurai security necessary to protect your @Stake web site is an excellent source or Ronin of medieval Japan, their skills clients’ businesses. of information. are deadly, but their hearts are in the Also, check out Entrust (entrust.com). right place. Though Dogpile lists its WHO’S OUT THERE AND WHAT Its offerings include security solutions URL as phrack.com, this link led ARE THEY DOING? for both web and wireless transactions. nowhere. Back issues were available on In addition to the large companies, Its customers include New York Life, world.std.com /~loki/security/phrack. there are many smaller outfits that offer Chase Manhattan and the U.S. special packages and options. If you E-commerce offers many opportunities Government. It wholly owns a subsidiary along with a host of challenges for the think the installation of a firewall called Cygnacom (cygnacom.com), between your hosted storefront and your web host. It's an area that's changing which specializes in public key infra- daily as it struggles to meet the demands database server is enough, you need to structure (PKI), information security think again. Counterpane (coun- of customers. We have looked at only a consulting and security evaluations. small percentage of the hardware, terpane.com), one of these companies, points out the obvious, “If a firewall was PKI is a system of certificates and other software and security solutions available perfect, you wouldn’t need an alarm.” registrations that verify and identify the in this crowded field. The one con- parties in an Internet transaction. clusion that can be drawn is that, as a Counterpane was started by the man Currently, there’s no industry-wide web host, you can't ignore the impor- who literally wrote the book on cryp- standard for building a PKI or any tance of e-commerce tography. Bruce Schneier is the author single PKI. While the and what it of Applied Cryptography and a recog- industry differs on means to your nized expert in the field. The idea which PKI will future. In the behind his company is that security is be used and how words of Ted an on-going process, not a product. to make one, Turner, you The concept here is that there’s no there is general have to "lead, perfect security technology. The analogy agreement that follow, or get out Counterpane makes is to the purchase of this level of mutual of the way." Posted with permission from Web Hosting. Copyright 2000. #67528 Managed by Reprint Management Services, (717) 399-1900, www.reprintbuyer.com