Free Essay

Extranet

In:

Submitted By teffcoool
Words 3699
Pages 15
INTRODUCTION
There's something about new technologies that makes people give them awkward and contrived labels. Extranets are no exception. First, there was the Internet, a reasonable enough name for a wonderful basket of technologies. Then came Intranets as a play on the Internet name. An Intranet is like a small private Internet living within the confines of an organization. Employee manuals, access to accounting and a variety of similar internal matters are all now frequently entrusted to a company's Intranet.
However, when early adapters began giving selected outsiders access to parts of their Intranets and creating private online communications tools for visitors, customers and clients, some Intranets stopped looking all that, well, intra. Inevitably, someone coined the word "Extranet" to describe these new tools and techniques, and the name stuck.
Big deal. Just another addition to the opaque jargon of the computer world. True, but if you dig into the concept a bit, there emerges a promising idea of real utility to law firms: the reduction or elimination of barriers between clients and lawyers, or in other words – the ability to communicate better with clients with much less effort. Where time is increasingly at a premium, it only makes sense for lawyers to learn a little something about what Extranets can do for their practices.

Extranets: the Basics
So here’s the first thing to understand. Extranets are not really a thing so much as they are a service—the service of creating novel and effective ways of communicating and sharing information with a client.
At its most basic an Extranet is a means of networking two or more entities so they can securely share information. In some cases an Extranet is simply an extension of a law firm's Intranet to include a connection to a client. In other cases an Extranet makes use of the public Internet combined with security features to create a new, more private, environment.
Extranets features: * The use of Internet technologies and standards. These include the standardized techniques for transmitting and sharing information and the methods for encrypting and storing information, otherwise known as the Internet Protocol, or IP. * The use of Web browsers. Users access Extranet information using a web browser like Microsoft Internet Explorer, Netscape Navigator or, more recently, Mozilla’s Firefox. Browser software uses relatively small amounts of memory and resources on a computer. The great thing about browsers is that an application written for a browser can be read on almost any computer without regard to operating system or manufacturer. That makes an application developed for a browser a snap to deploy. A browser on a user’s machine is all the software he or she needs to take full advantage of the Extranet application. No messy and confounding installation disks; fewer clogged hard drives. * Security. By their very nature, Extranets are embroiled in concerns about security. To protect the privacy of the information that is being transmitted, most Extranets use either secure communication lines or proven security and encryption technologies that have been developed for the Internet. * Central Server/Repository. Extranets usually have a central server where documents or data reside. Members can access this information from any computer that has Internet access.
While these are the broad attributes shared by most Extranets, Extranets vary dramatically in their design and implementation. They can be employed in a wide variety of environments and for very different purposes, like: * Sharing case information * Sharing of case-related documents—many Extranets contain document repositories that can be searched and viewed by both lawyer and client on-line * Calendaring—key dates and scheduling of hearings and trials can be shared on-line * Providing firm contact information * Acting as a “work flow engine” for various suppliers * Providing access to firm resources remotely * Sharing time and expense information

Is there a point?
Extranets have a high risk/reward factor. A successfully implemented Extranet can result in significant expansion in clientele and profitability for a law firm. An Extranet that is poorly designed or badly executed can be an endless headache. The failure to implement or join an Extranet can also have a negative impact on a law firm if it means that a more willing, entrepreneurial or adventurous competitor gains a significant advantage.
Let’s look at some of reasons why Extranets matter to lawyers:
Improved communications. The most common reason for building an Extranet is improved communication between lawyer and client. An Extranet can eliminate telephone tag, or worse, the failure of a lawyer to respond to calls and the delays involved with traditional correspondence. An Extranet is available 24 hours a day; both lawyers and clients can update or review information whenever it is convenient for them to do so. This can greatly reduce the friction between lawyers and clients and make life easier for both.
From the client’s perspective, an Extranet can make the arduous task of monitoring and following up with a roster of law firms much easier. Many clients decry the deeply frustrating process of chasing law firms for status information on the matters assigned to them. Extranets liberate the status information (“where are you on the Bloggs matter?”) from the physical file (a memo on the correspondence spike confirming that discoveries are scheduled for next Friday) by making that information open to review by the client online at any time.

Client retention and integration. High on the list of law firm motives for participating in or creating an Extranet is the desire to retain clients. Many law firms will create an Extranet around a key client or practice area where they have a significant volume of work. In an effort to enhance and solidify the relationship, an Extranet can build and reinforce deep links between the lawyer and client. Taken to the extreme, an Extranet can make it hard to tell where the law firm ends and the client begins.
Client marketing. Extranets can attract new clients or gain additional business from existing clients. A law firm that builds an Extranet can differentiate itself from those that don’t. What you are saying to the client is: "Not only do we provide excellent legal services and advice, but we do so in a way that makes it much more convenient for you to use, consume and monitor those services". And never underestimate the “wow” reaction that technology creates: the simple viewing of a computer screen with all of their file information available at a point and a click can seduce even the most cynical of clients.
Improved workflow management. Many legal matters involve a complex series of steps that must be completed in a specific order to get a file done properly. Some steps must be completed by the lawyer; other steps by the client or third parties. These steps can often be defined by a series of rules often referred to as the "workflow". An Extranet can be designed to incorporate and manage the workflow for handling a wide variety of legal matters. If properly designed, the workflow management built into an Extranet can be a boon to all parties. Done poorly, it can become a rigid straightjacket that does not conform to the realities of legal practice. Flexibility must be an inherent part of the design.
Higher quality. Implementation of an Extranet can significantly raise the level of quality control within an organization. Extranets can be built with real-time status reporting on the progress of matters. In other cases, information from the client's or law firm's core systems can be transferred automatically into the Extranet, eliminating the error-prone task of transcribing information or re-keying data. It all adds up to better product.
Community building. Something quite interesting happens when a well-designed Extranet gets properly implemented. In a very real sense, you have just built a new kind of community, a community where a shared set of values and purposes is given a new forum. The members of the Extranet community normally include the client but can include other law firms, suppliers, government offices or the courts. Rather than each of these community members working through or around each other with the benefit of only partial or third hand instructions, they can all be brought into the same circle and work toward the common goal by the very structure of the Extranet itself.
The Client wants it so. Some clients mandate participation in an Extranet as the cost of doing business with them. For this reason alone, it behooves the law firm to familiarize itself with the technology and to indicate a willingness to participate. Remarkably, many law firms, when confronted by a client who wants to introduce an Extranet, will raise objections and complain loudly about the costs of doing so. These objections often ignore the benefits that can accrue to the client and pessimistically ignore potential savings and benefits to the law firm. All talk of savings and benefits aside, if a client wants an Extranet, then a client will have an Extranet. The law firm that drags its heals will quickly lose that client.

Build or Buy
Extranets are still novel tools. So most law firms approach the world of Extranets gingerly and do so primarily at the behest of clients. Increasingly, however, leading law firms are taking steps to get in front of these things and have begun considering whether to build or buy their own Extranet applications.
If you or your firm are heading in this direction, the first task is to research whether there are existing Extranets that meet your requirements. It may be that the vendor or service provider for an Extranet could tailor an Extranet to meet your needs. Here are some things to keep in mind as you go through your planning.
Buy. If there is an existing application that meets most of your requirements and it can be customized with a modest amount of effort, you will be hard pressed not to choose this option. Here is why buying is generally considered the most effective solution: * An existing application may be far less expensive than designing your own. The vendor will likely have developed a series of Extranets using tools that it has developed specifically for that purpose. It can license the application on a one-time or periodic charge. The vendor can spread the development costs over a greater number of users, meaning the cost is lower for each user. * The vendor may host the solution on their web servers so that you do not have to build and maintain the hardware/software infrastructure internally. * Where an Extranet is developed by a third party or on behalf of more than one law firm/one client, the features developed by or at the request of one company can benefit all users of the Extranet. * Law firms specialize in practicing law and, generally speaking, not developing software. So it may make most sense to work with an organization that specializes in Extranet development and implementation.
Build. On the other hand, you may not find what you are looking for on the open market and so may have no choice but to construct your own tools. This has some real benefits: * You can specify the application to precisely meet your needs. You can accommodate the wishes of the law firm and client and the solution can have a unique look and feel. * You would have free reign over subsequent changes or modifications to meet the needs of users. You are not dependent on a third party's willingness to update the application. * You have the ability to support the application internally, meaning you can determine the level of support and training required. * You can show your client something proprietary that other law firms cannot offer.

some real disadvantages: * It’s generally quite costly, even with the contemporary design tools that have gone a great distance to simplify the job. * If you don’t have the resources and expertise internally, you may have to hire them or contract with a third party to provide them. * If you do not have existing web servers you will have to invest in additional hardware and software. * If you host it yourself, then you alone are responsible for all security issues and the risk of any breaches. * It may also take a substantial amount of time to construct your own Extranet from scratch.
There is usually a considerable learning curve associated with creating an Extranet. It takes time to assemble the hardware and resources. If you are doing a custom "design and build" it will take time to develop the web pages and features and test them thoroughly. Usually, there is a pilot phase where users test and provide feedback. It may take months before the application is ready for full implementation.

Whether you build or buy, those firms that have taken an aggressive approach to Extranet development and deployment are beginning to see some reward for their efforts. What is clear is that Extranets are not a passing technological fancy. They matter and, increasingly, clients want them.

http://apps.americanbar.org
ELEMENTS OF EXTRANETS

Extranets are composed of a wide variety of components and participants and have several possible configurations. Extranet components include intranets, Web servers, firewalls, ISPs, tunneling technology, interface software, and business applications.
The tunneling principle is the basic concept that makes extranets possible.
Tunneling means that data transmissions across the Internet can be made secure by authenticating and encrypting all IP packets. Several tunneling protocols are available, but IP Security sponsored by IETF (Internet Engineering Task Force) is one of the more popular protocols.
Two basic methods are used to configure extranets:
1. An extranet can be implemented using a direct leased line, linking all intranets.
2. A secure link (tunnel) can be created across the Internet, which can be used by the participating companies as a VPN, usually at a much lower cost.
The effectiveness of an extranet depends on the degree to which it is integrated with legacy systems and databases. In many instances, integrating with legacy systems involves integrating a System Network Architecture (SNA)—the backbone of legacy systems in many corporations—with TCP/IP, the Web backbone.
The technical differences between the two systems are often sources of conflict.
Security is also a key issue with extranets.

IMPLEMENTING EXTRANETS: COORDINATION AND SECURITY
Although extranets are easy to use, implementing an efficient extranet requires extensive coordination between the company and its business partners. Legacy systems, databases, and other corporate resources must be interconnected for outside access and protected from unauthorized intruders. Companies must approach extranet design and development with a needs analysis to identify the best business opportunities. The success of the extranet depends on the security measures implemented. The extranet is useless if it is unable to securely transmit sensitive data between the intranet and authorized partners. Although 100 percent security is impossible, differentiating between actual threats and perceived threats, and then selecting appropriate measures to deter actual threats, will help secure the communication environment.
Is selecting the strongest possible security for the entire extranet and associated intranets the best strategy? Not necessarily, because the stronger the security measures, the more hardware and software resources are required to maintain an acceptable performance level. A balance between security levels and return on investment analysis is an important component of an initial investigation into extranet development.
Once a thorough needs analysis is completed, the feasibility of outsourcing must be checked. For most companies, the best strategy is to acquire a complete extranet package from a vendor such as Nortel Communication, Microsoft, or Netscape Communications. Select an ISP that provides high performance, low latency connectivity, dial-in availability, and written service-level guarantees.

EXAMPLES OF EXTRANET APPLICATIONS

There are a multitude of extranet applications in use. Here we look at four examples.

AMP CONNECTS BUSINESS CUSTOMERS TO SELL PARTS
AMP of Harrisburg, Pennsylvania, is a large electric-connectors distribution company with annual sales of over $5 billion, conducting business in 50 countries. The company sells nearly 80,000 different products, including fiber-optic connectors, printed wiring boards, splices, and switches. In 1996, AMP launched an extranet called AMP Connect, which is based on electronic catalogs with product descriptions, three-dimensional models, and comparative charts and tables of all its products.The company operates one of the most advanced portals. The information is available in eight languages, and the site receives 100,000 hits daily from approximately
15,000 business customers worldwide.This application is an example of connecting a company with its customers through an extranet. AMP Connect is used to place orders and has given the company a forum for communicating with wholesalers, distributors, resellers, and customers, which is necessary for the creation of an exchange.

GM CONNECTS DEALERS BY KIOSK

General Motors (GM) wanted to change the way automobiles are marketed by using an extranet accessed in kiosks and through PDAs. The interactive kiosks are installed in dealerships and shopping malls. The extranet uses the GM-access network, which connects 8,600 North American dealers with GM factories. GMaccess is implemented worldwide using the Pulsar satellite system, which is operated by Hughes Network Systems.
The goal is to link the interactive kiosks to GM’s legacy infrastructure. Ideally, kiosk information will be instantly updated whenever GM changes the configuration or price of a car.

VHA, INC., CONNECTS WITH SUPPLIERS FOR PROCUREMENT

VHA, Inc., an Irving,Texas, alliance of 18 hospitals and 1,400 health-care organizations,developed an extranet that supports collaboration and allows access to an electronic catalog of products for approximately 22,000 dial-up users. VHA members purchase more than $8 billion in products annually under contracts from 350 suppliers.
Initial use of VHA.com was for access to VHA health-care organizations and the Internet. Since 2000, VHA members have been able to buy and sell merchandise and offer a wide range of medical, legal, and pharmaceutical research capabilities.
The extranet allows all VHA members to purchase directly from suppliers.
VHA.com enables all VHA members to exchange information through a ubiquitous, secure environment. VHA chose IBM as its ISP because of its experience with data networking. Security is a particularly important issue because of the sensitive nature of clinical information. Hospitals, clinics, home health companies, and managed care facilities in numerous locations are involved, and patient information must remain private.

CSX TECHNOLOGY TRACKS SHIPPING STATUS

In 1996, CSX Technology, a railroad company, developed a highly publicized intranet for tracking cross-country train shipments from point to point. The company expanded this intranet to an extranet, named TWSNet Premium, which links more than 200 freight shippers and forwarders. The extranet allows CSX customers to track shipments, initiate work orders, and view pricing data over the
Internet. TWSNet Premium includes large suppliers of transportation services such as railroads, trucks, container ships, and barges.
TWSNet Premium is also open to non-CSX customers who require Webbased solutions for managing inbound shipping or outbound delivery information as part of their supply chain management. The extranet allows tracking of shipments to the line-item level, simplifying identification of bottlenecks or problems.
A global reporting system analyzes carrier performance and trends. It also allows users to perform precise demand forecasting, while a special programming interface enables integration with legacy systems.
For additional applications, see Riggins and Rhee (2000).

Intranet, Internet and Extranet – What is the Difference?
With such similar names, the difference between internet, intranet and extranet may be difficult to understand. This article aims to show you how each differs and what the purpose of each is. * Overview
At a basic level, the internet, extranets and intranets are all types of networks. When discussing the internet, extranets and intranets, you’ve got to step back and ask about who the audience is. The audience really defines what each of these types of networks is and how they are structured. * Internet
The internet is the easiest to define since you’re accessing it as you read this article right now. The internet is a series of computers networked together to serve up information to the public.
Audience: The audience is really everyone and anyone – ranging from kids who use the internet to help them with their homework to the elderly using web mail to email friends. When compared to intranets and extranets, the internet has the largest audience by far.
Type of Information Served: If you can imagine it, it’s probably on the internet – news, reference materials, even TV shows – nearly any piece of information or media can be found on the internet. As an example, Bright Hub is a part of the internet. Bright Hub has a network of servers that serve web pages containing articles like this one. Search engines like Google and Bing catalog sites allowing users to find information easily.

Extranet
Extranets are set up by organizations to provide restricted access to special information. For example, a company may set up an extranet to share information with their customers. They may give customers access to support information or downloads for their software.
Audience: The audience in an extranet has some sort of relationship – typically of a business nature - with the organization hosting the extranet. Typically, extranets are password protected thus limiting the accessibility to the site.
Type of Information Served: As mentioned above, most extranets are built for customers and thus serve information related to the business – support information, software downloads, documentation or other pieces of information, or media that the hosting organization doesn’t want to make public.
Intranet
Intranets are private internal networks that serve information to employees or other closely related individuals of the organization. These sites are not accessible from the internet.
Audience: The audience for an intranet is typically an organization’s employees. In some cases, organizations may offer intranet access to close business partners, vendors or contractors. The content served is meant to allow employees to collaborate, communicate and organize information that is proprietary to the business.

Type of Information Served: Information served in an intranet can range from business process documents, internal user guides, training materials, business presentations and communications to employees. The other main purpose of an intranet is allowing employees to better organize information in their organization as well as being able to find it.

Similar Documents

Premium Essay

Domain Tasting Problem in 2003 and the Solution

...Angela Jiongco Chapter2 Review questions # 1 and # 5 Exercise # Review question #1. In one or two paragraphs, describe how the internet changed form a government research project into a technology for business users. The internet began as a way for the military to control weapons systems while under attack. In the 60’s, the U.S. Department of Defense became worried about possible effects of nuclear attack on its computing facilities. The Defense Department realized that in the future they need powerful computers for coordination and control. The Defense Department funded a research at leading universities and institute with the goal of designing a worldwide network that could remain operational even the network were sabotage by the military enemy. The researchers were determined the best solution to accomplishing their goal was to create networks that do not require a central computer control network operations. However, at the time the only network existed was a single connection between sender and receiver from the leased telephone company line. There was a concerned of risk using single connection method for connecting computers, so the researchers developed a different method in communication using multiple channels. In 1969 the Department of Defense researchers in the Advanced Research Projects Agency (ARPA) use this direct connection network model to connect four computers; one each at University of California at Los Angeles, SRI International, University of...

Words: 661 - Pages: 3

Free Essay

Modelo de Negocios

...MODELOS DE NEGOCIOS ELECTRÓNICOS B2B: NEGOCIO A NEGOCIO • • • Extranet Negocios en línea que venden a otros negocios. Incluye modelos como: lugares de mercado en la red (distribuidores electrónicos, compañías de adquisición de electrónicos, mercados de intercambio y consorcios industriales) y redes industriales privadas (redes de una sola empresa y redes a nivel empresarial). B2C: NEGOCIO A CONSUMIDOR • • Internet Negocios en línea que venden a consumidores individuales. Incluye modelos como: portales, tiendas de venta al detalle en línea, proveedores de contenido, corredores de transacciones, generador de mercado, proveedores de servicios y proveedores de comunidades virtuales. • B2E: NEGOCIO A EMPLEADOS • • • Intranet o Extranet Relación del negocio con los empleados. Útiles para trámites de vacaciones, recibos de nómica, préstamos, comunicación interna. Pueden significar grandes ahorros en tiempo y documentación. También pueden vender productos a sus empleados a precios especiales. B2S: BUSINESS TO SHAREHOLDER • • • Extranets Sirve como vinculo entre una empresa y sus accionistas. Entregan información sobre la situación de la empresa, pago de dividendos, ampliaciones de capital, nuevos desarrollos, reuniones de accionistas, nombramientos, etc. http://investor.google.com/ https://www.irtvazteca.com/ http://www.hsbc.com.mx/1/2/en/investor-relations
 • • • C2C: CONSUMIDOR A CONSUMIDOR • • • Internet Consumidores...

Words: 598 - Pages: 3

Premium Essay

Business Information Systems Tutorial

...Case Study: Amazon.com More than Your Average Bookstore 1. How has Amazon used technology to revamp the bookselling industry? Mainly use in the research engine of a website, it has comments and recommendations for buyers and give the idea of which book to buy. And the website can able to get the information of the customers’ interest of the book. Modify and evaluate the selling trend. 2. Is Amazon using disruptive or sustaining technology to run its business? Disruptive; this will bring more customers. 3. How is Amazon using intranets and extranets to run its business? Intranets: inside of the company, help the employee with the work; improve their communication and ability to work together. Extranets: outside of the company, corporate with other company and increase the market. 4. How could Amazon use kiosks to improve its business? A kiosk is a free website created by Amazon which can allow customers to access, research, buy and check out, which can improve the business. 5. What is Amazon’s e-business model? Business-to-Customer model; It sells product to customers via internet. Business-to-Business model; it does business with other business company. 6. How can Amazon use m-commerce to influence its business? Shopping by using mobile phones, customers can view all the products which Amazon offers, and buy them wherever they want only if they have internet access, this will make the shopping more convenient and quickly. 7. Which metrics could Amazon use to...

Words: 321 - Pages: 2

Free Essay

Issue in Entrepreneur

...Adoption of Electronic Commerce Technologies by SMEs in Malaysia Sherah Kurnia, Basil Alzougool, Mazen Ali Department of Information Systems, The University of Melbourne, Australia Emails: sherahk@unimelb.edu.au balzougool@pgrad.unimelb.edu.au mali@pgrad.unimelb.edu.au Saadat M. Alhashmi School of Information Technology Monash University Email: saadat.m.alhashmi@infotech.monash.edu.my Abstract Electronic commerce (EC) offers many benefits to organizations of any size including small to medium- sized enterprises (SMEs). At this stage, there is still a need for a better understanding of the potential and relevance of EC in developing countries as well as the behaviour of SMEs towards EC adoption. Moreover, there is still a need for a holistic view of how various widely known factors at the organization, industry and national levels affect EC adoption. Therefore, this study proposes a theoretical model of EC technologies adoption by SMEs in developing countries by incorporating various readiness factors identified in the literature that may determine EC technologies adoption by SMEs in developing countries. It then explores the influence of these factors on the adoption of different EC technologies. The environmental pressure is also considered in this study. Through a survey of SMEs within the grocery industry in Malaysia as an example of a developing country, the study demonstrates how various readiness factors influence the adoption of various EC technologies differently...

Words: 9310 - Pages: 38

Free Essay

Fidelizacion de Clientes

...Programa  de  Fidelización  de  Clientes.                                         M  en  C.  Verónica  Rueda     Introducción             Desarrollar   un   Programa   de   Fidelización   puede   significar   retener  y  fidelizar  a  los  mejores  clientes  o  por  contra,  perderlos   por   no   poseer   una   buena   estrategia   definida   a   corto   y   largo   plazo.       2   Introducción     Hasta  hace  poco  todos  eran  offline,  poseían  catálogos  impresos   y   los   regalos   eran   invariantes   y   poco   específicos   a   las   necesidades  de  los  usuarios.       3   Diferentes  

Words: 638 - Pages: 3

Free Essay

Abc Business

...CBC80001-FS1 A Complete System for Business Communications from Verizon and Cisco A Cisco Smart Business Communications System from Verizon offers everything you need for more secure voice and data networking. Start Your Business the Right Way Whether you are starting up or branching out, the Cisco Smart Business Communications System gives you an affordable, all-in-one solution. Built-in voice, messaging, and mobility features let you stay in touch with local, regional, and overseas suppliers easily and cost-effectively. Wired and wireless data networking supports all your business operations and data needs, enabling you to start your business as a paperless office. Simple, Secure, Complete The Cisco Smart Business Communications System is a complete solution that replaces your traditional telephone system. It also gives you highly secure Internet capabilities with a data network and wireless connectivity to support powerful business applications. Best of all, it’s easy to use. And when you are ready to add new users and new capabilities, the system can easily accommodate changes and upgrades. Hardware to Connect Phones and Computers At the heart of the solution is an intelligent IP network. Cisco offers a suite of proven, industry-leading products for wired and wireless voice and data communications. An all-in-one system combines connections to the public telephone network and the Internet with integrated network security, ports to plug in Cisco Unified IP phones and...

Words: 874 - Pages: 4

Premium Essay

Determining Databases and Data Communication

...Determining Databases and Data Communications BIS 320 August 11, 2014 Determining Databases and Data Communications In the first illustration, a marketing assistant for a consumer electronics company is responsible for the task of maintaining booths for trade shows from beginning to end and must resolve any related issues that may arise. There are many things that need to be kept track of including data related to the equipment received for trade shows. Situations such as these required detailed lists of all things involved. For example, the equipment related to the trade show booth would be kept in its own category where they would be listed individually in relation to their utilization purposes for the trade show. Other data would need to be recorded such as detailed information in relation to the condition of the items during the shipping process. The marketing assistant must ensure the booth and its display contents, are brought to their desired location in a timely fashion and taken back securely in order to assure their future use to the company. By having information such as postal tracking numbers, tabs can be kept on the dispatch and retrieval dates, hence being aware of the items locale at all times. Trade shows typically need certain tools for tracking and maintaining the information needed with relation to the equipment being used. A great initial option would be a program such as Excel, to track the necessary data. However, Excel may not be the most effective...

Words: 1026 - Pages: 5

Premium Essay

Extranet Solution

...Extranet solution – CSR24 Kimberly Giunta IS535 April 10, 2011 Professor Missakian Table of Contents 1. Summary of research paper 2. Background of ABC Agency 3. Current business issues 4. Definition and history of the extranet 5. Proposed solution – CSR24 6. Recommendations 1. Topic of Research Paper This research paper will talk about introducing an extranet to enhance the current business options available to clients at an ABC Agency, an insurance brokerage firm. I will discuss the background of the firm, their current processes and their current and future goals. Implementation of a program called CSR24 will be discussed along with how it will benefit ABC Agency and service their clients to keep a competitive advantage in this ever changing market. “When a firm sustains profits that exceed the average for its industry, the firm is said to possess a competitive advantage over its rivals.” (Quick MBA, 2010) Lastly, this paper will give recommendations on the implementation of ABC Agencies extranet and how it will benefit them in the short and long run to meet the goals and objectives of the agency. 2. Background of ABC Agency ABC agency is an Insurance brokerage company that works with numerous insurance companies to find their clients the best insurance product for their needs. The agency offers insurance products for auto, home, life, health business and other types of markets as well. ABC Agency is the largest insurance agency...

Words: 1909 - Pages: 8

Premium Essay

Ict Architecture and Security

...Submitted: 31. October 2008 Prepared by: André Nordal Sylte University of the Sunshine Coast Word count: 1665 Executive summary This report, authorised by Justin Debuse in Introduction to ICT, BUS108, looks at ICT architecture and security in an organisation. This report found that the major security threats within an organisation’s ICT are; Cracking into an organisation’s wireless intranet in search for vital corporate information; Former employees accessing wireless intranets and extranets without authorization; Information sent via an extranet could be intercepted in its transit; Viruses and Trojans accidentally downloaded by employees and been spread around the LAN. Solutions to these threats are; WiFi protected access (WPA) password and hide the network; ICTs should be protected with a login screen for the users; To secure an extranet, organisations should use a virtual private network (VPN); Any organisation should provide basic training in how to detect viruses and Trojans. This is a proactive way to prevent an infection in a whole organisation’s LAN. This report also found that the major legal and ethical issues within an organisation’s ICT are; Employee monitored by computer technology and in the building; Privacy on e-mail stored on an organisation’s computer; Illegal and offensive use of an organisation’s computer. Solutions to these issues are; the organisations have to inform their...

Words: 2419 - Pages: 10

Premium Essay

Business

...Internet and an Intranet and an Extranet: These three systems include that they all connect a group of people in a network. They all allow data to be uploaded onto the network and also allow it to be downloaded. They use software and hardware to share data. But they have many differences. Here I mention some differences among the Internet and an Intranet and an Extranet….. Internet: ❖ The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite to serve billions of users worldwide. ❖ Internet is global communication accessed through the web. ❖ It is available to the public. ❖ Internet speed is slower than Intranet. ❖ Internet based information is not much secure. ❖ Diagram: [pic] Intranet: ❖ An intranet is a private computer network that uses Internet Protocol technologies to securely share any part of an organization's information or operational systems within that organization. ❖ Intranet is shared content accessed by members within a single organization. ❖ It is private network only available to selected users. ❖ An Intranet provides much high speed than the internet. ❖ Intranet based information is more secure than Internet ❖ Diagram: [pic] Extranet: ❖ An extranet is a private network that uses Internet protocols, network connectivity. An extranet can be viewed as part of a company's...

Words: 367 - Pages: 2

Premium Essay

Zappos Case Study

...Discussion Questions: 1. What is the business of Zappos and what are its critical success factors (CSF’s)? [lists] • Business: Largest Online Shoe Retailer with fast efficient order fulfillment. • CSF’s: o Operational Excellence. Primary focus is selling a wide variety of shoes, but also sell other goods such as handbags, clothes and accessories o Focus on customer satisfaction o 4 week Employee training, will full pay o Employee retention, Zappos offered the employees “the offer” after first week of training, which was a 3,000K payout if they chose to quit. o Stocking of a vast inventory of all makes, styles, colors, and sizes, displayed and sold through the enabling power of Web 2.0 o Focused on fast and accurate order processing and speedy delivery to the customer. Website orders are fulfilled fast and efficiently o Zappos owns warehouses and fulfillment centers with an excess or 3+ million shoes, handbags, clothing and accessories, offering the best selection of shoes available anywhere (one stop shop) o Uses eCommerce for the transaction between business to consumer o Best customer service experience, employing approximately 1,600 workers o Offers free delivery and returns as well as a guaranteed 4-day delivery window and a 365-day return guarantee. o Innovated Company that kept culture and work environment ‘fun’ and relaxed. 2. Please complete the following table. Identify the key information systems and the related IT infrastructure investments that...

Words: 832 - Pages: 4

Premium Essay

Nt1310 Unit 5 Essay

...2.1 Intranet: this is a privately accessible infrastructure of cables, routers, and various servers, in most cases it is limited to one company or an organization or a group of companies, like the Internet, an Internet is used to carry a wide range of services. 2.2 Extranet: they too like intranets are privately owned wide area networks, which are generally owned by an organization or a company, however they differ from intranets in the sense that the owner of an extranet charges a specific fee to those who may require access to it or they can access the information provided on the extranet if they are given authorization by an organsiation. Furthermore an extranet, is also used to carry a wide range of services like the Internet. 2.3 Smartphone: this is a mobile phone which has an advanced mobile operating system, to which combines features of personal computer operating system. It has a mobile system environment, connected to the Wi-Fi which is connected to the Internet and has basic computer functions, iOS, some smartphones have a touchscreen display. An environment for applications to be created by an individual user of application developer, the user has a variety of applications...

Words: 550 - Pages: 3

Premium Essay

Widget Swot Analysis

...Internet, Intranet, Extranet and Relation to Widgets Company: WUSA and their customers are located within the united states with their few other branches located in other countries and are dependable upon intranet, extranet and internet to share or transfer their information or communicate with their employees, suppliers or external vendors etc. All three, Internet, intranet and extranet uses the similar technologies to the world wide web and they make use of TCP/IP protocols, web pages and web browsers for their access. Intranets and extranets operate similarly to the internet. The main objective for the WUSA and WRU Company is to securely transmit Data through firewall security and limit access to internal data while also authenticating users. Setting up these networks is very easy process. 2. Network Integration(Hardware and software equip) and...

Words: 632 - Pages: 3

Premium Essay

Voip over Internet Paper

...of TCP/IP which doesn’t contain any way of specifying a bandwidth requirement; this is what leads to packet loss. Once enough packet loss has occurred, it makes it impossible to hold a conversation because the other end isn’t getting the message. This then leads the caller or receiver having to wait until the internet traffic reduces in order to re-establish the connection; this can obviously be very costly for businesses that rely on telecommunications to do business. A way to overcome this problem is by allowing an outside business, person, vendor, etc. to access your organization’s extranet. An extranet according to Techopedia “is a controlled private network allowing customers, partners, vendors, suppliers and other businesses to gain information, typically about a specific company or educational institution, and do so without granting access to the organization’s entire network. An extranet is often a private part of a website. It is restricted to select users through user IDs, passwords, and other authentication mechanisms on a login page (Janssen, 2012).” In other words, it allows outsiders to...

Words: 714 - Pages: 3

Free Essay

Ing Life

...Canada, determined the need to provide faster access for brokers. Outside brokers relied on fax, phone and postal service for policy information requests and agent offices connected to the headquarters via 56-kbps frame relay. Thus, ING implemented an extranet solution using the Internet to connect external brokers and agent offices that lowered response times from hours to under a minute. This solution raises many questions concerning use of the Internet as part of its business solution. ING’s decision to facilitate use of the Internet for business operations poses many probable difficulties and risks. Use of an extranet can introduce an organization to unacceptable risks to its internal data and information systems. For example, allowing access to internal databases through an extranet webserver increases the opportunity for attackers to breach the network for several reasons. In ING’s case, it uses two Windows NT servers to provide web services protected by a single hardware firewall. Multiple brokers connect to ING through web services, causing multiple simultaneous openings in the firewall. Attackers can employ a port scanner to scan for open ports with known exploits to gain access. Furthermore, too many open extranet connections also create multiple entry points for viruses or other malicious code to infiltrate the network and cause damage. Another potential entry point for a security breach can originate from a broker’s own computer. Although it wasn’t stated...

Words: 444 - Pages: 2