SlideShare uma empresa Scribd logo
1 de 30
Internet
The Internet is a worldwide, publicly
accessible network of interconnected
computer networks that transmit data using
the standard Internet Protocol (IP).
It is a "network of networks" that consists of
millions of smaller domestic, academic,
business, and government networks, which
together carry various information and
services, such as electronic mail, online chat,
file transfer, and the interlinked Web pages
and other documents of the World Wide Web.
Internet and the workplace
The Internet is allowing greater flexibility in
working hours and location, especially with the
spread of unmetered high-speed connections and
Web applications.
The mobile Internet
The Internet can now be accessed virtually
anywhere by numerous means. Mobile phones,
handheld game consoles and cellular routers allow
users to connect to the Internet from anywhere
E-mail
Concept of sending electronic text messages
between parties in a way analogous to mailing
letters or memos.
Remote access
The Internet allows computer users to connect to
other computers and information stores easily,
wherever they may be across the world.
Collaboration
The low cost and nearly instantaneous sharing of
ideas, knowledge, and skills has made
collaborative work dramatically easier.
File sharing
A computer file can be e-mailed to customers,
colleagues and friends as an attachment. It can be
uploaded to a Web site or FTP server for easy
download by others
Voice telephony (VoIP)
VoIP stands for Voice over IP, where IP refers to
the Internet Protocol that underlies all Internet
communication.
IP address
An IP address (Internet Protocol address) is a
unique address that certain electronic devices use
in order to identify and communicate with each
other on a computer network utilizing the
Internet Protocol standard (IP)
Any participating network device—including
routers, computers, printers, Internet fax
machines, and some telephones—can have their
own unique address.
Intranet
An intranet is a private computer
network that uses Internet protocols
, network connectivity to securely
share part of an organization's
information or operations with its
employees.
intranet can be understood as
"a private version of the Internet,"
or as a version of the Internet confined to an
organization
The term first appeared in print on April 19, 1995, in Digital
News & Review in an article authored by Technical Editor
Stephen Lawton [1]
.
Industry examples:
Ford Motor Co has more than 175,000
employees in 950 locations worldwide,
each of whom had access to the
company’s intranet. The intranet gave
employees information about benefits,
demographics, salary, history etc
The Australian National University uses an
Intranet called Claromentis to maintain one of
its external sites.
“The success of Cisco Systems has been
largely attributed to its innovative corporate
intranet”
North Korea controls access to the internet
among its people by using a country-wide
intranet called "Kwangmyong"
Advantages:
Workforce productivity: Intranets can help
users to locate and view information faster and
use applications relevant to their roles and
responsibilities.
Time: organizations can make more
information available to employees on a "pull"
basis (i.e: employees can link to relevant
information at a time which suits them)
Communication: Intranets can serve as powerful
tools for communication within an organization,
vertically and horizontally.
Business operations and management: Intranets are
also being used as a platform for developing and
deploying applications to support business
operations and decisions across the internetworked
enterprise.
Cost-effective: Users can view information and
data via web-browser rather than maintaining
physical documents such as procedure manuals,
internal phone list and requistion forms.
Promote common corporate culture: Every user is
viewing the same information within the Intranet.
Enhance Collaboration: With information easily
accessible by all authorized users, teamwork is
enabled.
Disadvantages
Inappropriate or incorrect information can be
posted on an intranet which can reduce its
credibility and effectiveness.
In a devolved and highly interactive intranet
there is freedom to post abusive and possibly
illegal materials.
Training is required to educate people of what
intranet can do.
Need expertise in field to administer and develop
Intranet information within the organization.
Security of the intranet becomes an issue. Other
users may post sensitive information which may
appear to another user.
As information can be posted by any user,
information overload may occur during the cause if
it is not controlled well.
Extranet
"Extranet" is generally restricted to
employees of the organization:
can be accessed by customers, suppliers, or
other approved parties
An extranet is a private network that uses
Internet protocols, network connectivity, and
possibly the public telecommunication system to
securely share part of an organization's information
or operations with suppliers, vendors, partners,
customers or other businesses.
An extranet can be viewed as part of a company's
Intranet that is extended to users outside the
company
Security
An extranet requires security and privacy. These
can include firewalls, server management, the
issuance and use of digital certificates or similar
means of user authentication, encryption of
messages, and the use of virtual private networks
(VPNs) that tunnel through the public network.
1. Disadvantages
Extranets can be expensive to implement and
maintain within an organization (e.g.:
hardware, software, employee training costs)
— if hosted internally instead of via an ASP
*.
*Application Service Provider
Security of extranets can be a big concern when
dealing with valuable information.
System access needs to be carefully controlled to
avoid sensitive information falling into the wrong
hands.
Extranets can reduce personal contact (face-to-
face meetings) with customers and business
partners.

Mais conteúdo relacionado

Mais procurados

Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
Rohit Kumar
 
Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its uses
sumitsc
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
Riya Gupta
 
Connecting to the internet
Connecting to the internetConnecting to the internet
Connecting to the internet
Ujjwal 'Shanu'
 
LAN , MAN , WAN introduction
LAN , MAN , WAN introductionLAN , MAN , WAN introduction
LAN , MAN , WAN introduction
bhavna sahajwani
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
jpprakash
 

Mais procurados (20)

Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its uses
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service provider
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Connecting to the internet
Connecting to the internetConnecting to the internet
Connecting to the internet
 
Domain name system presentation
Domain name system presentationDomain name system presentation
Domain name system presentation
 
Mail server
Mail serverMail server
Mail server
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
Internet
InternetInternet
Internet
 
LAN , MAN , WAN introduction
LAN , MAN , WAN introductionLAN , MAN , WAN introduction
LAN , MAN , WAN introduction
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
INTERNET TECHNOLOGY
INTERNET  TECHNOLOGYINTERNET  TECHNOLOGY
INTERNET TECHNOLOGY
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 

Destaque

TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
Michael Noel
 
IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3
Rexon Calub
 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2
Rexon Calub
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_ic
Rexon Calub
 

Destaque (19)

Planning Extranet Environments with SharePoint 2010
Planning Extranet Environments with SharePoint 2010Planning Extranet Environments with SharePoint 2010
Planning Extranet Environments with SharePoint 2010
 
Extranet..
Extranet..Extranet..
Extranet..
 
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
 
How to create a secure efficient extranet user experience
How to create a secure efficient extranet user experienceHow to create a secure efficient extranet user experience
How to create a secure efficient extranet user experience
 
internet, intranet, extranet y VOIP
internet, intranet, extranet y VOIP internet, intranet, extranet y VOIP
internet, intranet, extranet y VOIP
 
Airlines 2.0: Using technology for innovative branding through the recession
Airlines 2.0: Using technology for innovative branding through the recessionAirlines 2.0: Using technology for innovative branding through the recession
Airlines 2.0: Using technology for innovative branding through the recession
 
Unit 2
Unit 2Unit 2
Unit 2
 
How To Govern An Intranet
How To Govern An IntranetHow To Govern An Intranet
How To Govern An Intranet
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
Internet, intranet, extranet
Internet, intranet, extranetInternet, intranet, extranet
Internet, intranet, extranet
 
Social Media and Promoting your Crowdfunding Campaign
Social Media and Promoting your Crowdfunding CampaignSocial Media and Promoting your Crowdfunding Campaign
Social Media and Promoting your Crowdfunding Campaign
 
The Social Intranet
The Social IntranetThe Social Intranet
The Social Intranet
 
Ch07 the internet intranets and extranets
Ch07 the internet  intranets and extranetsCh07 the internet  intranets and extranets
Ch07 the internet intranets and extranets
 
GTM's Evolution Demo
GTM's Evolution DemoGTM's Evolution Demo
GTM's Evolution Demo
 
IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3
 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_ic
 
Chapter 7 - Desining CSCW applications
Chapter 7 - Desining CSCW applicationsChapter 7 - Desining CSCW applications
Chapter 7 - Desining CSCW applications
 
It in hr
It in hrIt in hr
It in hr
 

Semelhante a Internet intranet extranet aaa

Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
AyushJadon5
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
Nadeem Khazi
 
Cibm workshop2 chapter nine
Cibm  workshop2 chapter nineCibm  workshop2 chapter nine
Cibm workshop2 chapter nine
Shaheen Khan
 
La3 Intranet
La3 IntranetLa3 Intranet
La3 Intranet
Cma Mohd
 

Semelhante a Internet intranet extranet aaa (20)

Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
 
Internet
InternetInternet
Internet
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
Internet
InternetInternet
Internet
 
Networking
NetworkingNetworking
Networking
 
Cibm workshop2 chapter nine
Cibm  workshop2 chapter nineCibm  workshop2 chapter nine
Cibm workshop2 chapter nine
 
Internet2007
Internet2007Internet2007
Internet2007
 
Internet
InternetInternet
Internet
 
Akshita
AkshitaAkshita
Akshita
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
 
What is a Computer Network.pdf
What is a Computer Network.pdfWhat is a Computer Network.pdf
What is a Computer Network.pdf
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
 
La3 Intranet
La3 IntranetLa3 Intranet
La3 Intranet
 
6 sop
6 sop6 sop
6 sop
 

Mais de Dhani Ahmad

Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
Dhani Ahmad
 
Information system
Information systemInformation system
Information system
Dhani Ahmad
 
Information resource management
Information resource managementInformation resource management
Information resource management
Dhani Ahmad
 

Mais de Dhani Ahmad (20)

Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Information system
Information systemInformation system
Information system
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
The need for security
The need for securityThe need for security
The need for security
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Security policy
Security policySecurity policy
Security policy
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Secure
SecureSecure
Secure
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Risk management i
Risk management iRisk management i
Risk management i
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Physical security
Physical securityPhysical security
Physical security
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Internet intranet extranet aaa

  • 1. Internet The Internet is a worldwide, publicly accessible network of interconnected computer networks that transmit data using the standard Internet Protocol (IP).
  • 2. It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked Web pages and other documents of the World Wide Web.
  • 3. Internet and the workplace The Internet is allowing greater flexibility in working hours and location, especially with the spread of unmetered high-speed connections and Web applications.
  • 4. The mobile Internet The Internet can now be accessed virtually anywhere by numerous means. Mobile phones, handheld game consoles and cellular routers allow users to connect to the Internet from anywhere
  • 5. E-mail Concept of sending electronic text messages between parties in a way analogous to mailing letters or memos.
  • 6. Remote access The Internet allows computer users to connect to other computers and information stores easily, wherever they may be across the world.
  • 7. Collaboration The low cost and nearly instantaneous sharing of ideas, knowledge, and skills has made collaborative work dramatically easier.
  • 8. File sharing A computer file can be e-mailed to customers, colleagues and friends as an attachment. It can be uploaded to a Web site or FTP server for easy download by others
  • 9. Voice telephony (VoIP) VoIP stands for Voice over IP, where IP refers to the Internet Protocol that underlies all Internet communication.
  • 10. IP address An IP address (Internet Protocol address) is a unique address that certain electronic devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)
  • 11. Any participating network device—including routers, computers, printers, Internet fax machines, and some telephones—can have their own unique address.
  • 12. Intranet An intranet is a private computer network that uses Internet protocols , network connectivity to securely share part of an organization's information or operations with its employees.
  • 13. intranet can be understood as "a private version of the Internet," or as a version of the Internet confined to an organization The term first appeared in print on April 19, 1995, in Digital News & Review in an article authored by Technical Editor Stephen Lawton [1] .
  • 14. Industry examples: Ford Motor Co has more than 175,000 employees in 950 locations worldwide, each of whom had access to the company’s intranet. The intranet gave employees information about benefits, demographics, salary, history etc
  • 15. The Australian National University uses an Intranet called Claromentis to maintain one of its external sites.
  • 16. “The success of Cisco Systems has been largely attributed to its innovative corporate intranet” North Korea controls access to the internet among its people by using a country-wide intranet called "Kwangmyong"
  • 17. Advantages: Workforce productivity: Intranets can help users to locate and view information faster and use applications relevant to their roles and responsibilities. Time: organizations can make more information available to employees on a "pull" basis (i.e: employees can link to relevant information at a time which suits them)
  • 18. Communication: Intranets can serve as powerful tools for communication within an organization, vertically and horizontally. Business operations and management: Intranets are also being used as a platform for developing and deploying applications to support business operations and decisions across the internetworked enterprise.
  • 19. Cost-effective: Users can view information and data via web-browser rather than maintaining physical documents such as procedure manuals, internal phone list and requistion forms. Promote common corporate culture: Every user is viewing the same information within the Intranet.
  • 20. Enhance Collaboration: With information easily accessible by all authorized users, teamwork is enabled.
  • 21. Disadvantages Inappropriate or incorrect information can be posted on an intranet which can reduce its credibility and effectiveness. In a devolved and highly interactive intranet there is freedom to post abusive and possibly illegal materials.
  • 22. Training is required to educate people of what intranet can do. Need expertise in field to administer and develop Intranet information within the organization. Security of the intranet becomes an issue. Other users may post sensitive information which may appear to another user.
  • 23. As information can be posted by any user, information overload may occur during the cause if it is not controlled well.
  • 24. Extranet "Extranet" is generally restricted to employees of the organization: can be accessed by customers, suppliers, or other approved parties
  • 25. An extranet is a private network that uses Internet protocols, network connectivity, and possibly the public telecommunication system to securely share part of an organization's information or operations with suppliers, vendors, partners, customers or other businesses.
  • 26. An extranet can be viewed as part of a company's Intranet that is extended to users outside the company
  • 27. Security An extranet requires security and privacy. These can include firewalls, server management, the issuance and use of digital certificates or similar means of user authentication, encryption of messages, and the use of virtual private networks (VPNs) that tunnel through the public network.
  • 28. 1. Disadvantages Extranets can be expensive to implement and maintain within an organization (e.g.: hardware, software, employee training costs) — if hosted internally instead of via an ASP *. *Application Service Provider
  • 29. Security of extranets can be a big concern when dealing with valuable information. System access needs to be carefully controlled to avoid sensitive information falling into the wrong hands.
  • 30. Extranets can reduce personal contact (face-to- face meetings) with customers and business partners.