• Research Paper on:
    Intranet Business Intelligence Applications

    Number of Pages: 12

     

    Summary of the research paper:

    In twelve pages a description of intranet based applications for business is presented and then they are compared with their Internet based counterparts in terms of similarities and differences with the sensitive publishing of information more easily handled by intranet based applications while the Internet is nondiscriminatory in its applications. Twelve sources are cited in the bibliography.

    Name of Research Paper File: D0_JGAstlda.rtf

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    make this system - and others like it - an integral component to data protection. The five software tools that comprise the primary components of the Hardlock System include  Hardlock Bistro, Espresso Wizard, Espresso, Cappuccino and Lattecino, as well as nine separate hardware varieties that offer a combination of different ports or security features (Anonymous, 1999). FIREWALLS Quite  similar to Internet-based applications, intranet-based applications vary only in the manner in which they are utilized. Instead of reaching an audience of general users, those who employ intranet-based applications  are seeking to provide data to a controlled group. One can easily discern the difference by recognizing the fact that Internet-based applications make use of the Internets "non-discriminating nature"  (Anonymous, 1997, PG), while intranet-based applications are used to publish more sensitive information. Users are required to gain access to the web site before they are permitted to obtain  any data. By establishing their sites in such a manner, authors are better able to reach a target crowd, rather than have to sift through the masses to find  their audience. Intranet-based applications utilize two distinct methods for entry into the site, both of which employ the practice of firewalls: an isolating server system that effectively keeps the populace  from entering. Creating the web site on an internal network is one way to keep certain people from gaining access; authorization is yet another to make sure that only  permitted people enter the site. "Intranet applications, when making use of interactivity and applets, can be extremely powerful" (Anonymous, 1997, PG). Unlike the Internet-based applications, intranet sites are  considered to be interactive in that they allow users to send back data through a variety of ways. Such interaction can be in the form of questionnaires or an 

    Back to Research Paper Results