Wednesday, November 17, 2010

7.1 IS Security

Accidents/ Natural Disasters- if a employee drops something on some papers with important information or if the store got caught on fire.

Employess/ Consultants- the employees will have a username and a password so they can login in and only get information if they are clocked in and limit them to what they only need to see. Also the system can follow them if they change or do anything to the system.

Outsides Intrudes- we will prevent them may having firewalls so they can not steal the company information or anything with our payroll.

Virues- Employees can get spam or a virus though email. We can help that by having firewalls and security systems to protect our information.

Links to outsides business- when employees are going though the internet or our business may have their database compromised bt spyware. Cookies may be harmyfully . You can use cookie killers software, and CAPTCHAS.

6.1 Web 2.0

1.Utilizing the web as a platform
-The internet is not just a add-on to the PC, but it is the platform for a business. DCQ PIZZA would use the web as a platform by harnessing the peer to peer technology.

2.Harnessing Collective Intelligence
-Sites not only provide contect, but also allow users to contribute. Improving the content. DCQ PIZZA would allow users to make profile that would show preferences and send coupons to the email based upon perferences and past orders. Also send coupons on users birthday indicated on the profile.

3.Leveraging The Data
-Powerful databases containing tremendous amounts of useful information. DCQ PIZZA would allow users to make profile on the websites that would shoe preferences and send coupons to the users email based upon perferences and past orders. 

4. Implementing Innovating Web Capabilities
-Using technology to gain competitive advantage. DCQ PIZZA would make an iPhone App that would alert user to special deal of the day.

Tuesday, October 26, 2010

5.3 B2E Electronic Commerce


5.2 Electronic Commerce

 We would use an extranet to do business with another business by the client buying the ingredients the server that we need. Enables 2 or more firms to use the internet to do business through use of VPN and firewall technologies. While theVPN ensure secured transmission of proprietary information.  Then the firewall will secure Proprietary Information within confines of a LAN.

5.1 Critique Your Competitor's E- Commerce Website

The website for Papa john's is in the stage of E-information because it has all the information you need you order a pizza.

Rule 1 : The Website Should Offer Something Unique: 3
Rule 2 : The Website Should be aesthetically pleasing:4
Rule 3 : The Website Must be easy to use and fast:5


Rule 4 : The Website must motivate people to visit: 3
Rule 5 : You must advertise your presence on the web:4
Rule 6 : You should learn from your website:5
I rated the website of how i would look at in if a was a customer. There were things that really got my attention. There were also things on there that could have been better.

4.4 Entity Relationship Diagram

4.3 Packet Switching Technologies

First, the TCP breaks information into small chunks called data packets and manages the transfer of those packets form computer to computer. The IP defines how a data packet must be formed and to where a router must forward each packet. Then the packets travel independently to their destination, sometimes following different paths and arriving out of order.