SlideShare a Scribd company logo
1 of 6
Download to read offline
Using an Intranet Within a Company

            Contents
         *What is Intranet
             (1,2)

      *3.Corporate database
           4.Intranet

  *An intranet for subcontractors
               (5,6)

   *Corporations and Customers
               (7)
What is Intranet

    An intranet is separated from the rest of the
Internet by a firewall that protects corporate
intranet from snooping eyes and malicious
attack.
    A key component of an intranet is an
internal email system. You can use it like
Internet email and it use the internal routers
and mail server.

   Other component of intranet contain a
database system etc.
3.Corporate database
                      4.Intranet

Corporate database:
● Corporate databases with important information can be made

  available over the intranet via webbased
  ○ HTML documents

  ○ search tools




Intranet:
● An intranet is a private computer that uses Internet

   technologies to securely share any part of an organization's
   information or operational systems with its employees.
● enable people to collaborate on their work electronically

   using groupware.




●   Reference
    ○ http://www.ncgicc.org/Portals/3/documents/nclulc.html

●   http://en.wikipedia.org/wiki/Intranet
An intranet for subcontractors

●   An intranet can make it easier for
    subcontractors to work with other businesses.

●   Subcontractors can use a secure web link into
    the intranet to submit bids for projects, send
    invoices, and even receive electronic payment
    for services.

●   Employees of the subcontractor can order parts
    and services from other businesses similarly.




         https://decc.wcb.ab.ca/decc/default.htm
Corporations and Customers
     Corporations can enable customers to buy goods and
services from them on the Internet by linking the
corporation's sales system to the Internet through the
intranet.

    Users can browse through catalogs on the company's
public website, order goods , and then submit secure
payments.

    The transaction travels through a firewall in both
directions and uses encryption technology as a security
measure.




     Quoted by:
http://latestrealestatetechnology.com/2008/02/
References

        Google
http://www.google.co.jp

        Wikipedia
http:ja.wikipedia.org/wiki

More Related Content

Similar to Week13 F

Similar to Week13 F (20)

Week13_Web_Presentation
Week13_Web_PresentationWeek13_Web_Presentation
Week13_Web_Presentation
 
Presentation Week13
Presentation Week13Presentation Week13
Presentation Week13
 
Week13presentation
Week13presentationWeek13presentation
Week13presentation
 
SW3 Presentation13
SW3 Presentation13SW3 Presentation13
SW3 Presentation13
 
Akshita
AkshitaAkshita
Akshita
 
eng_hw
eng_hweng_hw
eng_hw
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaa
 
Week13
Week13Week13
Week13
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranet
 
Internet
InternetInternet
Internet
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
 
E-Commerce 07
E-Commerce 07E-Commerce 07
E-Commerce 07
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
Week13pre
Week13preWeek13pre
Week13pre
 
Intranet for Small Business – A Complete Guide.docx
Intranet for Small Business – A Complete Guide.docxIntranet for Small Business – A Complete Guide.docx
Intranet for Small Business – A Complete Guide.docx
 
English Week13
English Week13English Week13
English Week13
 

Week13 F

  • 1. Using an Intranet Within a Company Contents *What is Intranet (1,2) *3.Corporate database 4.Intranet *An intranet for subcontractors (5,6) *Corporations and Customers (7)
  • 2. What is Intranet An intranet is separated from the rest of the Internet by a firewall that protects corporate intranet from snooping eyes and malicious attack. A key component of an intranet is an internal email system. You can use it like Internet email and it use the internal routers and mail server. Other component of intranet contain a database system etc.
  • 3. 3.Corporate database 4.Intranet Corporate database: ● Corporate databases with important information can be made available over the intranet via webbased ○ HTML documents ○ search tools Intranet: ● An intranet is a private computer that uses Internet technologies to securely share any part of an organization's information or operational systems with its employees. ● enable people to collaborate on their work electronically using groupware. ● Reference ○ http://www.ncgicc.org/Portals/3/documents/nclulc.html ● http://en.wikipedia.org/wiki/Intranet
  • 4. An intranet for subcontractors ● An intranet can make it easier for subcontractors to work with other businesses. ● Subcontractors can use a secure web link into the intranet to submit bids for projects, send invoices, and even receive electronic payment for services. ● Employees of the subcontractor can order parts and services from other businesses similarly. https://decc.wcb.ab.ca/decc/default.htm
  • 5. Corporations and Customers Corporations can enable customers to buy goods and services from them on the Internet by linking the corporation's sales system to the Internet through the intranet. Users can browse through catalogs on the company's public website, order goods , and then submit secure payments. The transaction travels through a firewall in both directions and uses encryption technology as a security measure. Quoted by: http://latestrealestatetechnology.com/2008/02/
  • 6. References Google http://www.google.co.jp Wikipedia http:ja.wikipedia.org/wiki