Powered By Blogger

Tuesday, April 12, 2011

Ch. 7 Online Rental

Netflix is on online rental company who sells a montly supscription to their on demand video services and movie rentals.  This online entertainment system has almost singlehandedly put the traditional movie rental model out of existence.

Ch. 7 E-business Models

There are several models of E-business.  Business to consumer (B2C), sells their products directly to their customers.  Examples of this model is Land's End and Amazon.com.  A second model is Consumer to Consumer(C2C) which would be consumers selling products to other consumers like a swap site or Auction site like eBay.  A third model is Consumer to business.  This model consists of consumers naming a price they are willing to pay for a service and the selling company can either accept or rejsct.  Examples of this are found at sites like Priceline.com.  Another model is Business to Business(B2B).  This model consists of sales of products from one business to another.  Physician sales and service, staples and office max are great examples of this model.  Last we have business to Government(B2G).  This model provides information of government agencies accepting bids for products and services  Some examples are FedMarket.com and Onvia.

Text pg. 369

Ch. 7 Understanding Ebusiness

Ecommerce is the retail form of ebusiness which has been growing tremendously in the past ten years.  It is a form of shopping that provides people the ability to shop on the internet ad not have to leave the comfort of their own home in order to get everything done.  On the left you can see an example of this-Walmart.com.  Here you can shop Walmart and check inventory of the local stores, have it shipped for free to your local Walmart, or have the product shipped directly to you.

Ch. 6 - Sucurity

Security is a large part of any network due to costs of information being lost, stolen, or re-distributed by un-authorized users.  This is prevented by taking security measures to reduce the risks.  Firewalls, which keep outside users out of the network information behind it out, are utilized by all types of networks.  Along with this are the threats of malware and viruses that can make you lose your important documents.
This is an example of a firewall used in a network setting:

Ch. 6 - Network Address


Computers connected to a network have addresses, just as we have addresses where we reside.  A computer on a network have an IP address(Internet Protocol) that states wher that computer is and how to gain access to it.  It is broken up into four parts.  The first set is the Network address and the other three are the host address.  An example given in the text is 72.14.207.99 where "72" is the network address and "14.207.99" is the host address.

Ch. 6 Networking