Free Essay

Bibliofind

In:

Submitted By egs12
Words 750
Pages 3
Chapter 8 Case 2: Random Walk Shoe

1 .Determine the features and capacities (RAM, disk storage, processor speed) that Amy should include in the Web server computer that she will need for her site. Summarize your purchase recommendation in a one-page memorandum to Amy. You may include information from vendor's site (such as Dell, Hewlett Packard, or Sun) as an approach to your memorandum.

Amy Lawrence have paid to education by decorating sneaker her used hand painted designs and started as collect her education, it is a successful of business her now plan to open an c-commerce a website where to expects to get wider audience and customers can choose their own design-shoes combinations. Website would be to uploaded, host and maintain by Amy Lawrence web server computers of different kinds exist in the order to make the right choice it all depends on what hardware, operating system the web server software you choose.
What exactly your web server can be either the hardware to computer or software the computer application that helps deliver web content that can be accessed through to internet. The hosting a website can be made from almost any computer with help of special hardware the website can become more efficient. If you have when choose to host your website power at your hands and rapid updates are made to the website without have hiring of an external company.
The web users have a low tolerance the show page loads many will simply press to back button or close the web browser . To prevent this your sever needs to be fast, and if you follow these minimum requirements you would avoid traffic your hard drive should have a minimum of 80 GB for data storage with a 3 GHz processor the speed of computer .
2. Consider the advantages and disadvantages of each major operating system that Amy might use on the Web server. In a one-page memorandum to Amy, make a specific recommendation and support it with facts and a logical argument. If you do not believe that one operating system is clearly superior for this application, explain why.

This have two major operating systems are Windows and Linux here are some advantages and disadvantages to both operating systems: Windows | Advantages | Disadvantages | Easier to patch | Security weaknesses | Easier to learn and use | NOT FREE,LICENSING FEES |

Linux | Advantages | Disadvantages | Faster performance | INSTALL AND USE APPLICATIONS | More stable and secure | HARDER TO PATCH | Free performance | EXTRA KNOWLEDGE IS NEEDED TO |

The server I recommended the Windows operating system to Amy based on the fact that it will be easier for her to use her small business. Linus and Windows are excellent operating systems, but it all depends on what you think is best operating system for what you want to do and what you know. The people say that Linux is better to use for Web servers, but special knowledge is needed to install and manage the applications on a Linux. Windows sever far simpler for ideally for people who are starting out their business online..
3. Consider the advantage and disadvantage of each major Web server software package for accomplishing the goals that Amy has for this site. In a one-page memorandum to Amy, make a specific recommendation regarding which Web server software package she should use. Provide and explanation that supports your recommendation.

Most have two commonly used Web server programs to Apache HTTP server and Microsoft Internet information Server (IIS) has over half of the market and Microsoft IIS only h 10 to 20 percent of the market. Apache HTTP Server has free open source application with which signifies that users of Apache can edit the initial code and abundance of experienced users that provide technical guidance able to be run on many operating systems, though it’s commonly used along with Linux, Some advantages of Apache are its small price of the fact that it’s open source, and more secure than Microsoft Internet information Server.
Microsoft is internet of Information Server the other most commonly used Web server program. Since it is by Microsoft and specially designed to operate the Windows server operating systems of some the advantages of Microsoft’s IIS include supported by Microsoft,.NET FRAMEWORK, AND PROVIDES MEDIA PACK OF MODULES.
I recommend Amy use Microsoft’s Internet Information Server the main reason that it is would be a great deal simpler for large amount of people that are accustomed to Windows operating systems to learn IIS.

Similar Documents

Premium Essay

Bibliofind

...Research Assignment ACCT 311 The Cash Flow Statement: Problems with the Current Rules This article is about the cash flow statement and its problems with the current rules. It was written by Neil S. Weiss and James G.S. Yang. The cash flow statement has been used to give information about a company’s performance, as well as well as its major activities during the year. However, some of the rules for preparation make the cash flow statement less useful than it should be. Based on the article, the authors listed weaknesses of the statement of cash flow which are divided in five sections. 1) differences between commercial and industrial companies versus financial institutions; 2) problems with operating activities; 3) problems with investing activities; 4) problems with financing activities; and 5) the role of free cash flow. Due to these weaknesses, the authors offer potential solutions to these problems that could improve the cash flow statement. Regarding the case of financial institutions, the identification of the core operating activities is important, because they differ markedly from nonfinancial companies in this respect. Considering commercial banking institutions, where the core operations can be divided between on–balance sheet activities and off–balance sheet activities. The off–balance sheet activities consist primarily of fee-based activities for services rendered that do not create an asset or a liability. These create no problem for the cash flow presentation...

Words: 961 - Pages: 4

Premium Essay

Case Bibliofind

...Chapter 10 – Security for Electronic Commerce |Chapter Case | | |General Accounting Office |http://www.gao.gov/ | | | | |Online Security Issues Overview | | | Security Policy and Integrated Security | | |Network Security Library |http://secinf.net/ | |Information Security Policy World |http://www.information-security-policies-and-standards.com/ | | | | |Security for Client Computers | | | Cookiess | | |Cookie Central...

Words: 912 - Pages: 4

Premium Essay

Bibliofind Chapter 8 Case 2: Random Walk Shoe

...IMED 2409 – Chapter 7 – The Environment of Electronic Commerce: Legal, Ethical and Tax Issues Assignment: Complete Exercise E1 (200 WORDS) & E2 (200 WORDS) Complete Case Problem C1. Nissan.com, parts 1 (200 words) & 2 (200 words) Answer Exercise 1 Use your favorite Web search engine to obtain a list of Web pages that include the words “privacy statement.” Visit the Web pages on the search results list until you find a page that includes the text of a privacy statement. Print the page and turn it in with a report of about 200 words in which you answer the following questions: a. Does the site follow an opt-in or opt-out policy (or is the policy not stated clearly in the privacy statement)? b. Does the privacy statement include a specific provision or provisions regarding the collection of information from children? c. Does the privacy statement describe what happens to the collected personal information if the company goes out of business or is sold to another company (list these provisions, if any)? Close your report with one paragraph in which you evaluate the overall clarity of the privacy statement. Answer Exercise 2 Companies that do business online can find themselves in legal trouble if they commit a crime, breach a contract, or engage in a tortious action. In about 200 words, provide an online business example of each offense. As part of your answer, explain why you believe each action you describe is either...

Words: 5450 - Pages: 22

Premium Essay

Ecommerce

...Bibliofind Case 1) Due to Bibliofind's size the company they should have taken preventive measures to protect their information from attack. Many policies could have been enforced to protect the data and ensure a safe haven for their customer's information. Firewalls are essential to protect sensitive data in multitudes of ways. One of the steps would be to set up a secure channel in which to communicate with the client, such as SSL, TSL, PPTP, and/or L2TP. That way when a consuer trys to make a purchase through the website the transaction will be through a secure connection so that hackers cannot steal the information in transit. A firewall is able to perform many different tasks related to connection, including inspection, and application analysis. This makes sure the session isn't hijacked, and questionable code isn't injected into the packet stream. External firewalls can ensure that data is being processed from one system to another without interference. Also encryption streams can be established in the chance the data is moving internally along untrusted components such as a wan. The firewall could have also protected against brute force attacks by hiding the core machines that held the customer's transactions. It would create a wall that no one could see beyond. The only way to ensure this to work is to configure the firewall properly. When Bibliofind wanted to store their data they should have had a firewall as it's an important step in processing, log-ons...

Words: 640 - Pages: 3

Premium Essay

Fundamentals of E-Buisiness

...Bibliofind Fundamentals of E-Business – BUS107 August 31, 2011 The computers we use in today’s society are advancing every day. Every child and adult can operate or manipulate most home computers. We are being taught that to succeed in today’s electronic world, the computer will help in providing all the answers. One of the problems we face with the computer is that there are so many rights versus wrong, or good versus bad things that can be done using a computer. In this report we will discuss how Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers, how encryption might have helped prevent or lessen the effects of Bibliofind’s security breach, and the California law requiring companies to inform customers when private information might have been exposed during a security breach. How Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers, where the firewalls should have been placed in the network, and what kinds of rules they should have used to filter network traffic at each point. For people who are not familiar with a lot of computer terms, “a firewall is software or a hardware-software combination that is installed in a network to control the packet traffic moving through it. The firewall provides a defense between a network and the Internet or between a network and any other network that could pose a problem (Schneider, 2011, p.479)”. If Bibliofind had wanted...

Words: 1092 - Pages: 5

Premium Essay

Ecommerce Security

...Bibliofind as a company of complexity needs to ensure that their data in acquisition, processing and storage is protected from attack. Notwithstanding the policies and accounting principles, there are significant technical steps that can be taken to protect the data. Firewalls are a very important device for data protection from a couple of levels. From a data acquisition perspective, a firewall can also be configured as an an encryption gateway. This means when a customer try’s to commence a transaction, the firewall negotiates using a variety of available encryption methods (SSL, TSL, PPTP, L2TP) a secure channel to communicate with the client. This enable the customer and firewall to communicate in a secure fashion such that eavesdroppers would not see plain text, and intercept the data. In addition to the encryption methods, a firewall is able to perform a number of tasks related to the connection, including stateful inspection, and application (packet) analysis. This ensures that a session is not hijacked, and questionable code is not injected within the packet stream. This packet injection is not nearly the same level of risk when using a secured or encrypted method of communication. From a Data processing, the firewall can use the same techniques externally as it does internally. It can separate various networks internally to ensure that data being processed from one system to another is not interfered with. Using access lists the source and destination can...

Words: 1069 - Pages: 5

Premium Essay

All in One

...IMED 2409 – Chapter 7 – The Environment of Electronic Commerce: Legal, Ethical and Tax Issues Assignment: Complete Exercise E1 (200 WORDS) & E2 (200 WORDS) Complete Case Problem C1. Nissan.com, parts 1 (200 words) & 2 (200 words) Answer Exercise 1 Use your favorite Web search engine to obtain a list of Web pages that include the words “privacy statement.” Visit the Web pages on the search results list until you find a page that includes the text of a privacy statement. Print the page and turn it in with a report of about 200 words in which you answer the following questions: a. Does the site follow an opt-in or opt-out policy (or is the policy not stated clearly in the privacy statement)? b. Does the privacy statement include a specific provision or provisions regarding the collection of information from children? c. Does the privacy statement describe what happens to the collected personal information if the company goes out of business or is sold to another company (list these provisions, if any)? Close your report with one paragraph in which you evaluate the overall clarity of the privacy statement. Answer Exercise 2 Companies that do business online can find themselves in legal trouble if they commit a crime, breach a contract, or engage in a tortious action. In about 200 words, provide an online business example of each offense. As part of your answer, explain why you believe each action you describe is either...

Words: 5450 - Pages: 22

Premium Essay

Business Ethics

...Electronic Commerce, 7th Edition 14188-37032 Chapter 10 Solutions Review Questions 1. In about 200 words, explain why Web sites use cookies. In your answer, discuss the reasons that cookies were first devised and explain where cookies are stored. You can use the links in the Online Companion to help with your research. Answer: Responses will vary, but should include references to shopping carts. Since cookies contain text data, they can help with the statelessness of the Internet. 2. In about 100 words, describe steganography and explain its connection to the topic of online security. You can use the links in the Online Companion to help with your research. Answer: Responses will vary, but should mention that this involves hiding information within another piece of information. 3. In about 200 words, explain the differences between public-key encryption and private-key encryption. List advantages and disadvantages of each encryption method. Explain which method you would use for e-mail sent from a field sales office to corporate headquarters. Assume that the e-mail regularly includes highly confidential information about upcoming sales opportunities. Answer: Responses will vary but should mention that public-key encryption, encodes messages by using two mathematically related numeric keys. Private-key encryption, encodes a message with one of several available algorithms that use a single numeric key, such as 456839420783, to...

Words: 1430 - Pages: 6

Premium Essay

Cis 60

...Jialiang Cui ID: 00952328 CIS 60 Chapter 10 RQ1: A cookie, also known as a tracking cookie, browser cookie, or HTTP cookie, is a text file that is stored on your computer by a website. The cookie can be used to track such information as shopping cart contents on websites, preferences, or authentication. A website uses cookie software and code for a variety of different reasons. Depending upon what the website is attempting to use the cookie for will influence how the website uses the cookie. For example cookies can be used to: * Track an individual’s time on a website. * Store data about a user during his or her navigation of a website, even over a number of visits. When a cookie is used like this, it can be used as a shopping cart application on the website. Cookies are stored on the user's hard drive. The directory is different for each platform. RQ2: Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Well through the 20th century, stenography was a necessary skill for secretaries, reporters, and other people who needed to quickly and accurately record written information. In all cases, the goal of stenography is to make it easy to write something down quickly and with great accuracy. Using stenography, someone can record information much more quickly than he or she could be writing. Like many security...

Words: 665 - Pages: 3

Premium Essay

Cis1101 Review Questions and Case Study Questions Cis 1101 Review Questions and Case Study Questions

...CIS1101 REVIEW QUESTIONS AND CASE STUDY QUESTIONS Click below link for Answer http://workbank247.com/q/cis1101-review-questions-and-case-study-cis-1101-r/23695 http://workbank247.com/q/cis1101-review-questions-and-case-study-cis-1101-r/23695 MODULE 1 CHAPTER 1 REVIEW QUESTIONS 1. Briefly describe the technologies that led businesses into the second wave of electronic commerce. 3. Briefly describe the specific activities that a computer assembly operation might include in B2B electronic commerce for its supply management or procurement operations. 5. Many business analysts have discussed the concept of the first-mover advantage. What are some of the disadvantages of being a first mover? CASE STUDY C1 CRITICAL THINKING QUESTIONS 1. Toys“R”Us sales exceeded $300 million by 2004 on the Amazon.com site. Explain how Amazon, Toys“R”Us, and other toy sellers who participated in Amazon’s Marketplace retailer program benefitted from the network effect as a result of the relationship between Amazon and Toys“R”Us. 2. In 2004, Toys“R”Us sued Amazon.com for violating terms of the agreement between the companies; specifically, Toys“R”Us objected to Amazon.com’s permitting Amazon Market-place retailers to sell toys. (Note: When the lawsuit was filed, Amazon Marketplace was called “zShops.”) Amazon.com responded by filing a countersuit. After more than two years of litigation, a New Jersey Superior Court judge ruled that the agreement had been violated...

Words: 2988 - Pages: 12

Free Essay

Testing

...HOW TO MAKE AT LEAST $100,000 Or More A Year As A Used and Rare Book Seller On The Internet BY YOUR NAME BY YOUR NAME Web Site: http://www.your-web-site-here.com Email: yourname@your-web-site-here.com ( Copyright 2006. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission. Excerpts may be used with proper credit and contact information (address, telephone number or website URL of the publisher) No responsibility is assumed by the Publisher for any injury and/or damage and/or financial loss sustained to persons or property as a matter of the use of this report. While every effort has been made to ensure reliability of the information within, the liability, negligence or otherwise, or from any use, misuse or abuse of the operation of any methods, strategies, instructions or ideas contained in the material herein is the sole responsibility of the reader. The reader is encouraged to seek competent legal and accounting advice before engaging in any business activity. Introduction Not only am I going to show you step-by-step how to make $100,000 each year with your own business on the Internet I'm going to share with you exactly how I do it! Now, you can copy exactly what I'm doing- dealing in out-of-print and...

Words: 36393 - Pages: 146