E-Commerce: Part II Covering Your Back End

1,667 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,667
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

E-Commerce: Part II Covering Your Back End

  1. 1. E-Commerce: Part II Covering Your Back-End What You Should Know About Hardware, Software and Security by Jim Thompson and Mike Woodward Illustration by Brian Biggs In the last issue of WH Mag, we intro- HARDWARE IS THERE AN APPLIANCE IN duced you to Alfred Fuller, inventor of Running a web hosting operation takes YOUR FUTURE? door-to-door selling. When a salesman servers — lots of servers. There are many Servers or appliances? That’s a question from the Fuller Brush Company arrived choices, but essentially, machines come with no single right answer. Ultimately, at his customers’ doors, all they saw was in two flavors: full-fledged servers and the choice depends on the need. his smiling face, his magnetic personality appliances. and his line of brushes. The business “We don’t use appliances,” is the terse Although there was a time when each reply from the Loop, a small ISP in the model seemed simple: Pack up the served distinct purposes, the boundaries Los Angeles area. products, ring a few door bells and watch between servers and appliances are the cash roll in. But there was whole lot “A server can grow with a customer, an blurring. Major manufacturers such as more going on behind the scenes. The appliance can’t,” is the opinion of Sun, IBM, Compaq, Hewlett-Packard Fuller Brush men depended on the Haralds Jass, president and CEO of and Intel have diversified their focus on company’s back office staff to handle Superb Internet. “Thus [an appliance] high end machines and added lower cost issues such as manufacturing, distri- has the potential to greatly impair the and more compact appliances to their bution, accounting, sales support and growth of a business. Many current product lines. (Sun has gone as far as customer care. appliances on the market are a step back- acquiring Cobalt Networks, the leading Today’s online merchants are in a appliance maker.) Meanwhile, newer wards in service-provider solutions.” position similar to Alfred Fuller’s. An hardware players Cobalt, NetMachines, Not everyone feels as strongly on this attractive web site alone does not a prof- Network Engines, StarBox Netsystems subject as Jass. Appliance advocates feel itable business make. Therefore, e-tailers and others offer both general purpose that the current generation of products rely on their hosting providers to help server appliances along with appliances offer immediate cost and time savings. In orchestrate and automate back-offic that handle specific tasks. addition, each new release brings more processes to the point where all that robust, flexible and scalable machines. Will a Santa site be able to scale from needs to be added is the customer. Meanwhile, you can stack multiple units four hits a day in March to million of A web host’s job is to determine what simultaneous visitors in December? To a in a rack to quickly attain the function- level of service — in terms of capital, large extent, the answer is found in its ality you need. technological and staffing resources — hosting provider’s hardware. The first But Jass’ considerations are of paramount it’s able to offer customers. To serve as an thing on a web host’s shopping list importance. Hardware can make or break effective partner to e-tail merchants, a should be servers that are big enough a service provider’s ability to grow with hosting provider must make hardware, and powerful enough to handle the his customers. software, skill level and service-plan incoming load around the clock, One manufacturer that’s won kudos upgrades part of its way of life. during any day of the year. from appliances fans is Starbox “If my server goes down, a lump of coal WEB HOSTING MAGAZINE will be the least of your worries, punk!”
  2. 2. WEB HOSTING MAGAZINE
  3. 3. Netsystems (starbox.net), which offers new type of service provider that inte- an Apache-based device aimed specifi- grates Internet data centers with cally at web hosts in three different size high-bandwidth optical backbones, categories: 500 users, 1,000 users and thus eliminating bottlenecks on the 2,000 users. In the works is a name Internet. They offer high speed net- server, a firewall appliance, a web- working and data center services to caching device and an e-commerce ASPs, ISPs, and web hosts who can appliance. Another appliance maker, then resell services such as email and e- Mirapoint (mirapoint.com), offers commerce to both business and scalable mail-serving devices. The residential customers. company recently lured Gene Banman, a Yet another useful tool is caching former Sun vice president, to be its pres- devices, which are placed between the ident and chief operating officer. By end user and the main server. By voting with his feet, Banman has given (telseon.com). It offers scalable band- width within and between metropolitan caching frequently accessed data, site vis- quite an endorsement to the function- itors enjoy faster response times while ality of appliances. Yet another areas to service providers. The amount of bandwidth is controlled by the service service providers benefit from reduced manufacturer, Phobos (phobos.com), demands on main servers. recently released a rack-mountable device provider, eliminating the necessity of that off-loads all SSL processing, allowing buying more equipment and provisioning ASSESS YOUR GOALS web and e-commerce servers to provide another T-3 line as demand increases. What’s a web host to do in the face of both secure and non-secure services at the Yipes (www.yipes.com) currently offers endless hardware options? The answer same high speeds without becoming over- the same service as Telseon directly to depends on its goals. loaded with the additional overhead of customers with plans to make scalable For mom-and-pop hosting providers tar- security processing. bandwidth available to service providers geting local small businesses, appliances in the near future. CONNECTIVITY may provide the easiest and most eco- A PLACE FOR EVERYTHING nomical solution. Once you’ve got a server system that’s robust enough to handle the needs of Another issue hosting providers need to “I think there will continue to be a lot of your hosted sites, the next thing to look consider is real estate. Some WH Mag smaller companies that provide hosting at is sufficient connec- readers literally started in services and e-commerce hosting services tivity. A T-1 line that “No playing video games until you their basements and garages. because smaller companies are able to clean your server room!” As their businesses expand, runs at 1.5-Mbps have that customer service and customer simply won’t cut it for additional space is needed contact through the sales cycle and more than one popular for their growing collection service cycle,” says David Rowe, director site. You will end up of equipment. of marketing services and strategies for falling victim to your For many, the solution is to Intel Online Services. customers’ success. move to a data center, like On the other hand, for those of you whose T-3 and OC-3 lines run between three those run by Exodus or AboveNet. In strategy is to build or maintain a large and 30 times as fast as a T-1, but at a addition the peace of mind that comes hosting operation for high traffic e-com- cost between 10 and 50 times that of the with round-the-clock monitoring and merce sites, it’s a good idea to make a smaller pipe. High bandwidth lines also redundant mechanical, electrical, storage major data center your home base. take a while to get provisioned. In most and telecommunications systems, these Developing your own data center is an cases, you will need to place your con- facilities may also offer a wide range of extremely costly proposition. However, nectivity order in October or even useful services. leasing, colocation and September, if you want to be ready for “Both new and traditional service partnering are methods the Christmas rush. providers need to meet the explosive a growing hosting Web hosts should also pay attention to demand for next-generation services,” says provider can use to other methods of expanding the pipeline. Pat Russo, executive vice president and speed the transition Fast ethernet and soon, gigabit ethernet CEO, Service Provider Networks, Lucent from working next solutions, may be some of the arrows Technologies. “To do that, they must link to the 1956 Dodge you’ll want to have in your quiver. Look high speed data centers with very high- in the CEO’s garage also to solutions such as scalable band- speed optical and wireless networks to to rolling out opera- width on demand. eliminate Internet bottlenecks.” tions centers worldwide. “Sorry! We had to take your One company that provides gigabit One of the ways to meet next-generation site down because my dad Ethernet solutions is Telseon demands is through partnering with a needed the garage.” WEB HOSTING MAGAZINE
  4. 4. SOFTWARE packages, electronic customer relations viding training for service providers in UNIX (or Linux or FreeBSD) or management (CRM), supply-chain man- the use of their product. Windows (NT or 2000)? This is the first agement and systems management. choice hosting providers are faced with in FULL E-COMMERCE PACKAGES Storefront software is just what the terms of software. BroadVision is well supported in the name implies — a platform for According to the folks at industry with established B2B and B-2-C setting up online what resembles Uneven Internet packages. Recently allied with Hewlett- a traditional store. It helps the e- (uneven.com), “NT is Packard and Sun to provide a hardware/ tailer to arrange products by easier to use than software package, the company offers category and allows the shopper UNIX, but UNIX is personalized e-business applications as to search for, order and pay usually faster and can well as CRM. Although it is for merchandise. run Apache.” moving from a propri- The goal of customer-relations etary language A recent survey by software is to enhance and personalize toward Netcraft (netcraft.com/survey/) indicates online-shopping experiences with an eye XML and that Apache is being used on more web to getting the product through the Java, current “No general! Not B2 support! servers than all other software combined. payment and delivery process. Supply- analysis We need B2B support!” Part of the reason is that it’s free; another is chain management solutions control reports that that it’s a reliable, stable platform. production rates and parts ordering to it lags behind some competitors, such as Outside of the open source world, minimize warehouse time and space. InterShop and IBM in this regard. Microsoft is the overwhelming market Integration between these two systems, IBM (ibm.com) offers its WebSphere leader. Some of the most popular e-com- plus accounting, marketing and sales, suite in competition to Broadvision. The merce packages only run under requires a systems-management package. company has allied with Ariba Windows. Hosting providers will either There are literally thousands of products (ariba.com) to market supply-chain man- have to make their UNIX-based to choose from in each category, ranging agement solutions. As one of the largest machines work with NT/2000 or pur- from full-service solutions from the likes companies in the world, it also offer chase dedicated servers that operate on of BroadVision (broadvision.com) to spe- smart cards and application servers, as those systems. cialized packages from Miva (miva.com), well as e-commerce solutions. IBM pro- for instance, which are designed for a vides advice and training both in its DATABASE SERVER specific purpose. products and for general information The next issue at hand is the database Customers want to choose, “a fully about the set up and operations of e- server. While there are many choices, managed service where the vendor pro- commerce sites. most industry players stick with the tried and true. “There are two database servers vides all the assets and integration as part Intershop (intershop.com) is one of the that support the majority of the e-com- of the service,” Intel Online’s Rowe leaders in online-storefront software. Its merce world: SQL 7 and Oracle 8,” says explains. Finding e-store software you package includes Intershop Enfinity and Intel OnLine’s David Rowe. can work with and support is key to Intershop 4.0. The company has tradi- helping your clients. tionally focused on small to medium Microsoft’s SQL Server is the database Web hosts who want to be competitive businesses, but now also offers an enter- for the Windows family. Oracle 8i, cur- and keep their clients happy must be prise-level product, Intershop rently in release 3, is Apache compatible. familiar with many different solutions. Marketplace Tool Kit, which connects Oracle continues to migrate to hosted Not only should you know sell-side applications to e-marketplaces. solutions with its new Oracle 9i, its phi- about the most popular Over its history, Intershop has developed losophy being that software is becoming packages, but the search for a strong track record of allying with and a hosted service more than a product. better solutions should never supporting service providers. So you’ve gotten the OS issues and end. Every day new, more Yet another major player in the e- database software packages squared away? powerful and more cost effective commerce software sphere is These are but the tip of the iceberg in e- e-commerce tools are offered. InterWorld (interworld.com). Its commerce solutions. There remains The key to increasing your client primary strength lies in B2C dozen of decisions to be made in terms base and your revenues may be in one software. InterWorld’s of software for designing, maintaining of those new offerings. You also need Commerce Exchange suite and monitoring e-commerce sites. to know your software well enough to offers transaction man- be able to offer training and support for agement, personalization, E-COMMERCE PACKAGES your customers. Software providers are content management and a variety of E-commerce software can be broken more than willing to help out by pro- merchandising features. down into these categories: storefront WEB HOSTING MAGAZINE
  5. 5. When companies as large as Sun and unlimited integration of product choices, shopping from presentation through pur- Netscape (recently assimilated by AOL this can be overwhelming to the con- chase. A recent report by Ovum — resistance was futile) get together, sumer,” says Online Insight’s Ken Forster. (ovum.com) states that consumers expect their offering cannot be ignored. IPlanet CRM is the attempt to overcome the their online experiences to match or (iplanet.com) offers, in its own words, e- problem of too much information exceeds real-world experiences. Here are a commerce solutions “from silicon to scaring away the customer. The visitor to few shopper-pleasing offerings: eyeballs.” As a hardware/software combi- a site doesn’t want to look at every pair of In August, Oracle came up with a nice nation of formidable parentage, it brings brown shoes made, just the ones that little loss leader — it’s giving away (or the advantages of Sun’s hardware and interest him. was as of press time) its Sales Force Netscape’s Enterprise Server software. CRM allows online merchants to cus- Automation (SFA) package online. This tomize their offerings to meet the needs of package provides pipeline management, STOREFRONT SOFTWARE FOR individual customers. There are any which is the funneling of goods from THE MASSES number of ways of accomplishing this: manufacturer to consumer, along with The companies listed above offer online visitor surveys, demographic analysis (poor calendaring, expense and travel man- storefronts as part of a full e-commerce people don’t shop at Neiman-Marcus very agement. Of course, Oracle is not in package. These are the big boys whose business to lose money. The most likely solutions meet enterprise-level needs. reason behind this giveaway is to attract However, for those not in the business of customers to incorporate more elements hosting large numbers of Global 2000 of its CRM package. companies, one of the following mass- market players may serve as a more Siebel (siebel.com) is one of the larger appropriate partner. competitor to Oracle in the CRM arena. It offers a full suite of applications for sales Miva (miva.com) offers storefront solu- force, call centers and marketing, among tions and credit-card enabled order forms other solutions. Its field and sales services as part of Miva Merchant, its e-com- include online configuration and pricing as merce package. It also participates in well as hand-held voice and wireless different types of comarketing with software. It also has a full suite of B-B, hosting partners, according to company B2C, auctioning and marketing software. spokesperson Sherry Isler. E.piphany (epiphany.com) offers web- iHTML from of InLine Internet Systems based CRM applications with real-time (inline.com) offers site solutions ranging analysis. The customer’s current from database driven e-commerce sites to often) and the use of algorithms to person- alize the shopping experience. behavior is calculated real-time into the simple brochureware. “Most of our interaction he’s having with the site. It partners are smaller web hosting com- In simple language, an algorithm is a offers the E.phiphany E.5 system, an panies,” says CEO Russ Cobbe. symbolic formula running through a “analytical and operational” customer- Mercantec (mercantec.com), which con- number of steps that can remember the relations management package that centrates on the small to medium steps it went through. In practical terms “coordinates and unifies, in real-time,” businesses, markets its SoftCart package to it means that when a visitor signs on to a all interactions with customers. service providers, as well as individual busi- web site, his past behavior can be recalled nesses. “Mercantec considers its channel and used to present him with customized A MORE PERSONALIZED [service providers] to be key partners and product offerings, designed specifically EXPERIENCE treats them as such,” says the company’s for him. What makes an algorithm Online Insight (onlineinsight.com) offers Product Manager, Bob Honn. “intelligent” is its ability to adjust to one of the most innovative ways of per- changing circumstances. sonalizing web sites. Its current solution CRM SOFTWARE Closely allied with customer-response is a two-fold product. On one hand, an CRM software aims to do what old programs is the idea of data mining, or intelligent algorithms uses a query-and- Alfred Fuller aimed to do: know that looking for patterns in data. This is not response format to guide the consumer your Aunt Harriet’s birthday was coming just a new presentation of existing data. to product choices that meet his needs. and make you a special offer on a boar- True data mining can find and present On the other hand, the aggregate data is bristle brush. It helps tailor the buying previously unknown relationships among collected and analyzed to provide experience to the individual shopper and and within existing data. feedback to the merchant. This process gives them the feeling that the merchant allows not only a more efficient shopping care about them and their needs. MANAGING SHOPPING experience, but literally improves the site “While the power of the Internet enables Again, a great many companies offer e- each time it’s accessed. CRM, the software that manages WEB HOSTING MAGAZINE
  6. 6. Another approach to giving the con- vendors like IBM, Cisco or Sun, they kind of monitoring for intrusion. sumer a personalized shopping likely have already familiarized you with Known as IDS (Intrusion Detection experience is to put a real person into the their security offerings. If you’re a start- Systems), these protocols are either equation. Live Person (liveperson.com) up provider, patching together installed on the host machines or on does just that. At crucial junctures in the equipment and customers, while trying the network. Each system, of course, shopping process pop-ups appear that to keep one step ahead of intruders, some has its advantages and blind spots, and allow the consumer to chat online with a of the first places you should visit are the more complete coverage is provided live operator. web sites of these vendors. All of them when the two types are combined. The live operator has access to data col- offer a wide range of services and infor- Host-based IDS are not as fast as lected from the shopper, allowing them mation to help you better address network IDS, but their strengths to answer questions intelli- security concerns. include stronger intrusion analysis. gently and accurately. One Firewalls, which are a combination of Additionally, they focus on data specific advantage is that, since hardware and software implementing to the host and have a lower entry cost this live person interaction security between two or more networks, than network systems. IDS operate by is occurring in a are the most basic element of a security examining the system, event and chat format, the system. They come in three basic flavors: security logs on Windows NT and the operator is able to Packet filtering routers restrict traffic by syslog in a UNIX environment. Since “Your live operator went to service several looking at the sources and destinations of they are using logs containing actual lunch. Say hello to a customers at a individual packets. Proxy/circuit level events, they can verify whether a smooth operator, baby!” time. The use gateways act as an intermediary by given attack of ASP technology also means there is no requiring each user to first connect to the was successful. hardware or software to install. firewall. Application proxy firewalls One of the flaws extend the proxy/circuit firewall to the of an IDS is that CREATING A MARKETPLACE application level by inspecting traffic to they cannot The next step beyond hosting a single ensure that it conforms to the particular detect every type store is to combine individual storefronts application’s protocol. of intrusion, into a larger marketplace. Such a collabo- A common addition or enhancement to a most notably, rative effort can pay big dividends firewall is called a DMZ (de-militarized those that are including links between multiple mer- zone). In most cases, this is a combination launched from the key- chants’ sites, group buying opportunities of firewalls and bastion hosts (themselves a board of a critical and the sharing of software and gateway between internal and external net- server and, therefore, hardware. Another plus is that shoppers works). Generally a DMZ sits outside the don’t cross the network. can be kept in-house and not be lost to main firewall, acting as an additional In such cases, a host- the competition. For the web host, this barrier to intrusion. based system can be effective. since they translates into more flexibility, higher The basic function of a firewall is to can detect infiltrations that may be profits and ease of management. restrict to the minimum what a service unseen by network- based IDS. Also, The focus of Actinic Catalog since the host-based system examines requires to implement an application. In (actinic.com) is to assist ISPs and web de-encrypted data, it will see attacks other words, it limits communications. hosts with the set-up and maintenance of that can be missed by a network system. Internal systems may need to initiate con- multi-store e-commerce sites. It does so Although host-based systems don’t offer nections with a server on a DMZ network, by supplying a hosting engine, pre-con- true real-time response, when properly but not the other way around. Access for a figured to run on a service provider’s implemented, they come very close. database server, for example, should be servers. Release 3.0 of the product limited to web servers that retrieve infor- received excellent reviews. Release 4.0 NETWORK-BASED IDS mation from the database and internal was launched in late September. While the initial cost of a host-based systems used by database administrators. system is lower than that of a network- SECURITY CONCERNS Firewalls should also hide internal based one, network systems can be The number-one consumer concern in network architecture and addressing from strategically deployed to monitor traffic making purchases over the Internet is external users. Finally, the firewall should destined for multiple systems. On security. Buyers want assurances that itself be difficult to scan by limiting what network systems, software only has to credit card numbers won’t disappear into protocols may pass through it. be loaded and configured once, instead the Internet cloud, only to reappear in of on a variety of different systems. some hacker’s computer. INTRUSION DETECTION This lowers the total cost of own- Most of the commercially available ership in an enterprise If you’re working with one of the major security systems include some environment. “North Korea just called. For a couple of bags of WEB HOSTING MAGAZINE rice, we can put our network in the DMZ.”
  7. 7. Network-based IDS also look at all a safe — all of which identification is necessary for e-com- packet headers. Since many denial of have a rating. That merce security. service attacks can only be found by rating tells the purchaser Another important security player is looking at packet headers and host- how long a professional Internet Security Systems (iss.net). In based systems do not examine packet with tools will take to get its own words, “not only does ISS offer headers, network-based IDS are the to the contents. If an alarm doesn’t market-leading, best-of-breed security only way to protect a system against alert a guard to come running, the management systems for this type of attack. thief makes off with the jewels or, in security assessment, policy Another major advantage of the your case, a client’s database. enforcement and intrusion detection network-based systems is that they Those who offer web hosting services — all built on the company’s operate in real-time. Attacks are must give their clients an assurance that SAFEsuitetm security-management reported as they occur, allowing faster not only are you using the best of current platform — it also provides notification and response. Since any technology to protect them, but superior customer service, con- hacker worth his salt knows how to that you, or a service you employ, will sulting and education offerings manipulate audit logs, the rapidity of be there when the alarm sounds. that significantly reduce the com- network-based response means that he If you intend to be your own cop on plexity and expense inherent in will not have time to remove the evi- the beat, you should look at some of protecting online assets.” dence of his visit the companies offering security systems Each of the companies listed above not before being solutions. Among these are @Stake only sells products or services, but also found out. (atstake.com) whose chief science have web sites full of information. The bottom line officer is a man named Mudge (and you Since, as a web host, you need to be A hacker’s worth of salt. is simply that thought that was Mr. Spock...). In spite informed to properly service your each of these of a name that sounds more like a clients, these sites are an excellent intrusion detection systems has strong crazed chef who makes candy, Mudge is place to begin increasing your and weak points. One or the other may a highly respected cryptographer whose knowledge of security. work best for the particular envi- company offers a rapid ramp-up to If you want to take a look at the other ronment you are hosting, but it is likely secure server architecture. He has also side of things, visit Phrack Magazine. that you will find some combination of co-authored a number of technical This is a magazine aimed at “hackers the two gives you the overlapping papers and reports with Schneider. The with honor.” Like the rogue Samurai security necessary to protect your @Stake web site is an excellent source or Ronin of medieval Japan, their skills clients’ businesses. of information. are deadly, but their hearts are in the Also, check out Entrust (entrust.com). right place. Though Dogpile lists its WHO’S OUT THERE AND WHAT Its offerings include security solutions URL as phrack.com, this link led ARE THEY DOING? for both web and wireless transactions. nowhere. Back issues were available on In addition to the large companies, Its customers include New York Life, world.std.com /~loki/security/phrack. there are many smaller outfits that offer Chase Manhattan and the U.S. special packages and options. If you E-commerce offers many opportunities Government. It wholly owns a subsidiary along with a host of challenges for the think the installation of a firewall called Cygnacom (cygnacom.com), between your hosted storefront and your web host. It's an area that's changing which specializes in public key infra- daily as it struggles to meet the demands database server is enough, you need to structure (PKI), information security think again. Counterpane (coun- of customers. We have looked at only a consulting and security evaluations. small percentage of the hardware, terpane.com), one of these companies, points out the obvious, “If a firewall was PKI is a system of certificates and other software and security solutions available perfect, you wouldn’t need an alarm.” registrations that verify and identify the in this crowded field. The one con- parties in an Internet transaction. clusion that can be drawn is that, as a Counterpane was started by the man Currently, there’s no industry-wide web host, you can't ignore the impor- who literally wrote the book on cryp- standard for building a PKI or any tance of e-commerce tography. Bruce Schneier is the author single PKI. While the and what it of Applied Cryptography and a recog- industry differs on means to your nized expert in the field. The idea which PKI will future. In the behind his company is that security is be used and how words of Ted an on-going process, not a product. to make one, Turner, you The concept here is that there’s no there is general have to "lead, perfect security technology. The analogy agreement that follow, or get out Counterpane makes is to the purchase of this level of mutual of the way." Posted with permission from Web Hosting. Copyright 2000. #67528 Managed by Reprint Management Services, (717) 399-1900, www.reprintbuyer.com

×