6. Table 3–2: Data Powers of Ten Note: These numbers are approximate and are simplified for illustrative purposes. A kilobyte is actually 1,024 bytes; a megabyte is 1,024 kilobytes; a gigabyte is 1024 megabytes. The remaining terms are scaled accordingly. Source: Williams, Roy. Center for Advanced Computing Research, California Institute of Technology. “Data Powers of Ten.” http://www.cacr.caltech.edu/~roy/dataquan/.
7. Exhibit 3–1: E-commerce Hosting: Development Server, Staging Server, Production Server High-bandwidth connection Co-Location Facility Developmental server Staging server Production server Production server Production server Production server Internet
8.
9. Exhibit 3–2: EBay User Interface EBay has a very simple user interface that features plain text.
10. Exhibit 3–3: Gartner User Interface Gartner employs a relatively advanced user interface that includes elements of interactivity and advanced graphics.
11. Exhibit 3–4: Yahoo User Interface My Yahoo uses templates to let users customize the look and feel of their pages. These templates allow Yahoo to display content in a variety of formats.
12.
13. Exhibit 3–5: Lands’ End Customer Support Lands’ End uses a chat tool to provide quick and inexpensive customer support.
16. Exhibit 3–7: Digital Certificate Transmission Trusted third-party certificate provider 1. Digital certificate / public key and private key sent to server (when server is initially set up) Customer’s PC 4. Certificate used to encrypt data 5. Encrypted data sent to server via internet 6. Private key used to decrypt data 7. Server stores and processes credit card data Web server with private key 2. Copy of public key is sent to customer’s PC. Customer accepts this certificate to create SSL “pipe” between user’s PC and server = non-SSL transmission = SSL transmission 3. Encryption “tunnel” created Note: Step 3 indicates the creation of an SSL encryption “tunnel” for data to pass through. Steps 4 through 7 show what happens behind the scenes in SSL. Internet Credit card information VISA ****************** Encrypted credit card Information ****************** Credit card information VISA ****************** Encrypted credit card Information ******************
17. Exhibit 3–8: Digital Signature Authentication Trusted third-party certificate provider 1. Digital certificate / public key sent to customer Customer’s PC 4. Public key / certificate used to decrypt digital signature Web server with private key Internet 5. User is presented with digital-signature information. If user accepts certificate, SSL tunnel is created. 2. Private key encrypts digital-signature document 3. Encrypted signature sent Encrypted digital signature ****** ************ Digital signature ABC Corp. ************ Digital signature ABC Corp. ************ Encrypted digital signature ****** ************