Friday, November 30, 2012

Pros and Cons of the Advancement in Technology

The new millennium has truly created a big mark and an impact to the lives of many people. This is the point wherein the world has become more advanced when it comes to the production of goods and services, the point where technology has brought convenience and ease of mind. Let us all face, without these newly developed technologies, life will sure be hard, tasks will not be completed with just a snap of the finger and things will have to be done manually.

Before, our ancestors have survived doing things on their own. But right now, it is doubtful that an individual can do his tasks with his own bare hands. It is simply amazing how our ancestors managed to live on their own but still, they have served as an inspiration to all of the people to never give up and to always strive hard to survive. Though there were no technologies before, they used natural resources to aid them with their activities of daily living. What they have discovered were just developed by the generations that have passed by. Their ideas were utilized well and have contributed towards the development of a better world.

The development especially the production of different high end technologies such as the cellular phones, televisions, computers, appliances, cars and a whole lot more is as fast as the effects of the most powerful stun gun. Developers or manufacturers are making more and more technologies every single day just to provide and meet the demands of all the people.

Pros and Cons of the Advancement in Technology

But has the world become better with the breakthrough of technologies? It is hard to take sides but we will learn the different advantages and disadvantages that technology offered. One common disadvantage that we all have noticed or probably have already developed inside of us is that we have become so dependent on the different technologies. Things that can still be done with bare hands have been forgotten. What could have been easy to do by the self have been covered by being too dependent. It makes people lazy and this can affect the social aspect of an individual.

There are some countries that still belong to the third world country which means that the advancement of technology has not yet being introduced and thus greatly affects the growth of their economy as compared to those well developed countries. The academic performance of an individual may be affected as well due to the different forms of video games or online games.

If there are disadvantages, of course there are also advantages. One of the advantages that technology gave to this world is that it made things to be done efficiently and without any delay. Access to information is easy and even doing transactions can now be made possible with just a few clicks of the mouse. Shopping can also be done through the use of the internet. You can purchase a special form of self defense device like the stun guns online. When you say convenience, the different technologies can offer that to you.

It is really up to the individual as to how he will balance things. It is just important to always bear in mind not to be so dependent and if you think you can do the job, do it yourself. You might forget what you have learned if you depend so much on high end technologies right now.

Pros and Cons of the Advancement in Technology
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Joseph Pressley is a certified TASER instructor and the co-founder of BestStunGun.com which provides non-lethal self defense products such as stun guns, TASERs and pepper sprays. Discover how stun guns and TASERs can save your life. Receive a free report on "Top 10 Self Defense Secrets Everyone Needs To Know". Limited amount available. Visit us and get your own copy now http://www.beststungun.com

cell phone watches Best Offer Lufkin Cn1295Sme590 13 Milimeter 1 2 Save 13 On Trademark Miller Girl In The

Monday, November 26, 2012

Free Internet Satellite TV - If Internet Satellite TV Is Free, What's The Deal With PC TV Software?

Want to watch free internet television online? An introduction on how to get satellite TV free of charge for your computer will be helpful. When someone talks about free television online, they are generally speaking about free to air TV broadcasts. These can be either live shows, a recorded program or streaming videos on many internet television channels. Below is a helpful guide for understanding the ins and out of free internet satellite TV.

Satellite TV stations can be located on the internet via a stations' website. It's also possible to locate free online television programs from around the world by visiting websites such as such as BeeLineTV or WorldTVPC. You could also type in such words as 'watch free internet satellite TV' into your favorite search engine to find numerous websites.

People may wonder, if free to air television is truly at no cost, then why in the world would I pay for PC TV Software? Satellite TV software for your computer is the easiest way to organize and keep all those free to air stations right at your fingertips. You can watch satellite TV instantly online and the only thing you pay for is the software itself. There are no monthly fees to watch television because you are accessing FTA, also known as free to air programming. Free To Air TV broadcasting means that anyone with the appropriate software receiver is legally allowed to receive and watch the available broadcasting stations.

Free Internet Satellite TV - If Internet Satellite TV Is Free, What's The Deal With PC TV Software?

With this software it's possible to watch satellite TV online. Tune in to more than 4000 channels across the globe. There are a wide variety of stations to choose from including recent movies, current music, live sporting events, the latest news, children's' channels plus more than 1000 radio stations. Everyone in the family should be able to find something that suits them. This awesome software application can be downloaded from several authorized merchants online. Downloading and installation instructions are easy to understand and follow. It shouldn't take more than an hour for even the most technically challenged person to download and install. Access to free internet satellite is instant once the installation process is complete.

Some of the satellite TV programs are streaming live feeds. For that reason, there are some basic requirements your computer must meet. Your computer will need to have at least a Pentium 3 CPU, and a 333 MHz or higher processing speed. It will also be necessary to have an up to date video graphics card, a sound card, a nice sized LCD monitor and a good set of external speakers.Online television software operates best with Windows 95, 98, NT, ME, 2000 or XP. Most every Windows Operating Systems (OS) is usable, however, newer versions will obviously give you better audio and video quality.

Free Internet Satellite TV - If Internet Satellite TV Is Free, What's The Deal With PC TV Software?
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Organize over 4000 channels into one user friendly interface. Get the software that brings you the most popular Free Internet Satellite TV channels from around the world!

watch cell phone Best Price 36 Sampson Grate For 121 44 Save 13 On Trademark Miller Girl In The

Thursday, November 22, 2012

iTunes Freezing - Why iTunes Keeps Freezing and How to Fix It

Do you have iTunes freezing problems? Do you complain that iTunes freezes up at random times? Before we get to fixing iTunes freezing problems, it is important to understand a little bit about iTunes itself.

Among the many free media players available, iTunes is widely popular because of its close integration with two of the most sought-after electronic gadgets of our time: the iPod and the iPhone. Both devices require Apple's media player for many reasons, not the least of which is the transfer of media files from computers to the portable device.

Old-time users know, however, that iTunes has its good and bad sides. It is intuitive and sleek alright, but sometimes using the apps can be really frustrating. For one, frequent start-up problems or program freezes would surely test the patience of even the most ardent fans. These issues usually occur whenever new updates are installed, when a portable device is connected, when downloading content from the Internet, or when shutting down the program. Most probable causes of the instability are missing program files or the settings running askew due to recent updates.

iTunes Freezing - Why iTunes Keeps Freezing and How to Fix It

While this may not look like a life and death situation, it is nevertheless imperative to enact corrective measures once the program freezes more frequently than it does before. For one, you would not want to risk losing your entire media library - including content purchased from the iTunes store - which is a real possibility if the program hangs and the portable device's hard disk is corrupted due to an incomplete data write process.

Some practical ways to prevent iTunes from freezing include limiting the number of running applications to give iTunes all the memory it needs to do its tasks. Also, adjusting the program for manual updating of downloaded content would help, as it prevents simultaneous tasks - such as reading the media library, checking for new iTunes store contents, looking up settings in the registry - from running all at once when the program starts.

Another practical way to ensure that iTunes run smoothly is to have the registry checked periodically, to ensure that file associations, locations and other important data are accurate. The registry is the database that holds program parameters, user settings and system information, and often, changes in the system - like installing new programs - causes some files to be overwritten or deleted, making apps that uses such files inoperable.

More so for regularly updated programs like iTunes, as the frequent updating invariably leaves behind obsolete entries that in time would clutter up the database. Using a reliable registry cleaning program ensures that the registry is clear of debris and incorrect data, ensuring that applications run without a glitch, including iTunes.

iTunes Freezing - Why iTunes Keeps Freezing and How to Fix It
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Tired of wondering why iTunes freezes? Want to fix iTunes freezing for good? Get an easy fix and scan your computer for free with the best registry clean up software on the internet today.

Jim Marshall is a computer technician expert with over 15 years in the industry. He has an intimate knowledge of the windows registry and various register repair software. After testing some of the top registry cleaners on the market, he has created a comprehensive review site that details his findings.

http://www.registry-clean-up.net

watches mobile phone Save 13 On Trademark Miller Girl In The Best Offer Lufkin Cn1295Sme590 13 Milimeter 1 2

Monday, November 19, 2012

ATI Driver Update - Update ATI Graphics Driver and Fix All the Driver Problems on Your Computer!

Are you frequently disturbed by the ATI graphic card driver problems? When your graphics driver is outdated or corrupted, you would probably has some problems like a new game or software doesn't work properly, screen freezes at a random time, computer suddenly becomes slow, system requires restart, and so on.

How come these annoying problems arise? To find the cause of the problems, we need to go to the root of them. A driver is a special program that enables Windows system to communicate with hardware device. The devices on your computer like video card, sound card, keyboard, mouse, hard drive and printer all need a driver to interact with your Windows system and other software applications.

When one of the drivers is corrupted or outdated, the devices will not be able to communicate properly with your operating system and other applications. And the device will not be able to work properly and a lot of system problems will arise. That is the reason why you have the problems mentioned above at the beginning of the article.

ATI Driver Update - Update ATI Graphics Driver and Fix All the Driver Problems on Your Computer!

And it is known that ATI Company has short slabs in the driver development and its drivers always have bugs and compatibility problems with operating systems. So it frequently releases updates of its products to fix the bugs. So, to fix all the problems, you need to install the latest ATI graphic card driver on your computer and update it constantly.

Here is a thing that you should note. Most of the ATI drivers are specifically designed for different operating systems. That is, a specific ATI video card has several versions of drivers due to different operating systems. They are basically not compatible. Installing a wrong one can cause more serious problem like freezes, blue screen and even system crash. You should ensure that you update a correct one for your Windows system.

ATI Driver Update - Update ATI Graphics Driver and Fix All the Driver Problems on Your Computer!
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Finding and updating a right driver is a time wasting and demanding job. You can visit my website and find an easy way to quickly update ATI Drivers for your computer. And you can click here to use a Driver update software to help you automatically update all your device drivers in minutes.

watch mobile phone Buy Extra Containment Receiver For Ef 3000 Best Price 36 Sampson Grate For 121 44

Thursday, November 15, 2012

What Is The Best Driver Updater? - How To Choose The Best Driver Update Program For Your Computer

What is the best driver updater? In fact, using a good driver update software is a good way to update all the device drivers automatically for your computer and fix corresponding driver problems. But I cannot give the exact answer that which one is the best.

Because there are dozens of similar update tools available out there. Most of them can get the job done successfully. But some are not that satisfactory and lack of necessary functionalities and features. So I will list the main functions that a good driver software should have. You can use the criteria below to find a good one for you computers.

1. Windows System Support
Most of the driver updater software can work on all of the Windows systems. But there are few neither support the new Windows 7 nor earlier Windows 98/2000. Installing a software that is not compatible with your system will result in unexpected problems and make your system unstable. So you need to make sure the program supports the systems that you are using.

What Is The Best Driver Updater? - How To Choose The Best Driver Update Program For Your Computer

2. Driver Database
The larger the driver database, the more drivers available. If the program is backed up with 1 million drivers, it is certain that the latest drivers for your hardware can be found in it. But only few driver programs have that large database.

3. Scanning Accuracy
The scanning engine is the core technology of the update software. A good scanning engine will be able to detect outdated, damaged and corrupted drivers on your computer and replace them with the latest drivers. But if you choose a terrible one, you may come up against unexpected problems that caused by installing wrong drivers.

4. Customer Support
It is another important thing that you should notice. Most of program developers offer quick and dedicated technical support for customers. Choosing a program with great customer support will help you out when you get trapped in software malfunctions.

What Is The Best Driver Updater? - How To Choose The Best Driver Update Program For Your Computer
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

The listed criteria above are the standards that you should pay attention to when you going to select a driver update software for your computers. If you think it is too hard for you to find out which is the best, you can click here to find out the Best Driver Updater in my test. And you can click here to visit my website to find better solution to Automatically Update Driver.

watches cell phone Best Offer Genuine Brake Band

Monday, November 12, 2012

Forces and Trends in Business

The corporate environment is characterized by a number of variables: competition, dynamism, turbulence, complexity and change. All organizations must develop ability to continuously and consciously transform themselves and their contexts. Such contexts include restructuring for optimum effectiveness, reengineering key processes and streamlining functions that are able to provide a source of competitive advantage. The aim is to adapt, regenerate and most important, survive. (McLean, 2006).

For a company to thrive today, strategists must find ways to increase the organization's ability to read and react to industry and market changes. They must know their goal to boost the company's strategic flexibility by recognizing disruptions earlier and responding faster.
Strategic flexibility or adaptability can be defined as the organization’s capacity to identify major changes in its external environments, quickly commit resources to new courses of action in response to such changes, and to recognize and act promptly when it is time to halt or reverse existing resource commitments. Being adaptable means leaders must not get stuck in a too-rigid way of looking at the world. The organization must view change as an inevitable and essential part of an organization's growth, in order to achieve this adaptability.

When there is uncertainty or unpredictability in the environment, managers tend to focus almost all their energy on successfully executing the current strategy. What they also should be doing is preparing for an unknown future. Flexibility stems from the ability to learn; managers tend to overlook the negative and emphasize the positive. They need to understand not only what led to the positive outcomes but also what led to the negative ones. This will optimize their learning experience. According to Ford (2004) four points to foster and maintain adaptability include challenging complacency, giving all employees a voice, encouraging participative work and driving fear out of your group.

Forces and Trends in Business

The companies chosen for this task vary by industry: a famous automobile manufacturer (Ford) a bank going through a merger (Compass) and a start-up software company (DawningStreams). Ford and Compass have been in business for a long time; it is likely they have changed their strategic plan based on changing forces and trends. DawningStreams is new (established in 2005 and incorporated in 2007). Even though they have not had their first sale and have no staff, the owners have devised several iterations of their strategy.

There is a diversity of stakeholders all that are interested in the activity of business organizations. Emphasis must be placed on their adaptability in strategic analysis and their adaptability in strategic management of business organizations. The organization must have a strategic management model.

Each company might scan the same areas, but for different reasons. Considering technological advances, Ford would prepare itself to lead the market by having various electronic equipment in their vehicles, as well as robotic equipment with which to build them and the supply chain technology to keep all in check. Compass Bank is going through a merge and expanding globally; therefore they will need to keep abreast of communication technology. DawningStreams is a software company; they will need to monitor those companies who would be their competition to ensure their product offers better functionality. All three companies would make sure potential customers would be able to get good information from internet websites and advertisement, which encompasses yet another area of technology the organizations may need/want to scan. In this instance, many members of the organization must be enrolled: upper management and finance, who will determine budgetary factors; the IT department, who will be responsible for the implementation and maintenance of some of the technology; the staff who must be trained to use the technology; a sales force who will sell the technology.

To the outside observer, it may seem unnecessary for any but Ford to scan the (actual) environment when it comes to issues such as emission control, fuel efficiency and hybrid cars. That is true however; Compass Bank and DawningStreams can plan a strategy to be friendlier to the environment (and their pocketbooks) by practicing paper reduction (through the aforementioned technology). Lastly, DawningStreams’ product may be useful as a file sharing service to environmental groups.

With regard to the legal environment, all three must be acutely aware of laws, which affect their respective industry among others. To Ford, legal applies, among other areas, to environmental protection laws and department of transportation safety laws. To Compass Bank, they would abide by the rules of the Federal Reserve (www.federalreserve.gov) and the Federal Insurance and Deposit Corporation (www.fdic.gov). DawningStreams must follow laws as they pertain to the transfer of files, which have intellectual property and also the export of products, which have algorithms. All three companies are global and will need to monitor those laws in other countries, which could effect the strategic planning.

At one company after another--from Sears to IBM to Hewlett-Packard to Searle, strategy is again a major focus in the quest for higher revenues and profits. With help from a new generation of business strategists, companies are pursuing novel ways to hatch new products, expand existing businesses, and create the markets of tomorrow. Some companies are even recreating full-fledged strategic-planning groups. United Parcel Service expects to spin out a new strategy group from its marketing department, where strategic plans are now hatched. Explains Chairman Kent C. Nelson: ``Because we're making bigger bets on investments in technology, we can't afford to spend a whole lot of money in one direction and then find out five years later it was the wrong direction.''

In such a world we need a planning model that allows us to anticipate the future and to use this anticipation in conjunction with an analysis of our organization--its culture, mission, strengths and weaknesses--to define strategic issues, to chart our direction by developing strategic vision and plans, to define how we will implement these plans and to specify how we will evaluate how well we are implementing these plans. The fact that the world is changing as we move forward in the future demands that the process be an iterative one.

Ford Motor Company – Socio-cultural

Ford Motor Company embraces the socio-cultural changes taking place to allow the company to move in the right direction with respect to attitudes in the society. Two areas that stand out in terms of socio-cultural attitudes would be that of fuel economy and smaller cars. The growing concern by the public for better fuel economy has influenced the company’s introduction of the Ford Escape Hybrid and Mercury Mariner Hybrid. The organization is committed to the hybrid to improve fuel economy as a global strategy to meet customer demands. The increased demand in society for such environmentalism has assisted in the decision for Ford Motor Company to look forward to adding the hybrid feature to the Ford Fusion and Mercury Milan and continue in such a strategic planning direction.

The customers that use these vehicles get a substantial break on their insurance in many states and a tax credit as well while enjoying the increased mileage of a vehicle that runs on gasoline and capabilities for 100 percent electric power. The environmental scanning by Ford Motor Company has allowed the company to be knowledgeable of the fact that the people in the United States are buying more small cars today than any other type of vehicle segment. The lifestyles changes have been monitored and there is good data that shows that such a trend will continue in this direction and the expected growth in this segment will continue. The company has redesigned the inside and outside of the Ford Focus to set the car apart from the competitors in the small car segment while increasing upgrades and features to experience positive outcomes. The direction that the company is taking is based on a competitive advantage and being a leader in the industry. The vehicle line has both a sedan and a coupe to attract targeted markets including younger buyers at an entry level to build upon brand loyalty and customer retention. Ford Motor Company will continue to use the socio-cultural factors to drive the business and enjoy future success.

Ford Motor Company – Legal –

Ford Motor Company with regard to the Environmental Protection Agency adheres to the legal aspect of environmental scanning. Ford Motor Company accepted an award in March 2007 from the Environmental Protection Agency called the Energy Star 2007 Partner of the Year Award in Energy Management. The company is the first automaker to have ever been awarded the award two years in a row. The award has come to be presented due to the commitment made by the company to increase energy efficiency and to reduce the greenhouse gas emissions from all of the facilities in the company.

The organization is committed to the responsible use of resources and energy efficiency. The leadership realizes that the environmental protection laws are of great importance and use the environmental scanning to move in the right direction to obtain future success in the company. In 2006 alone the company has improved the energy efficiency in the United States operations by five percent and saving approximately million with enough energy saved to equal 220,000 homes. The effective energy management protects the environment and reduces the greenhouse emissions. Some of the actions taken by the company include replacing lighting fixtures that use 40 percent less energy and using different low-energy, long-lasting compact fluorescent lamps in the properties to include the plants, corporate offices, distribution centers, and research and development campuses. Due to the environmental scanning that takes place at Ford Motor Company the company will use the information that is collected and continue in this direction. New projects for the company include Fumes-to-Fuel that is a system that converts paint fumes into electricity that is being performed with Detroit Edison along with attempting to consolidate the application of primer, base and clearcoat paint applications into a single application to eliminate the need for separate applications and ovens. In addition to the paint booth emissions Ford Motor Company will continue to rely on alternative energy sources such as landfill gas and wind and solar technologies to power their manufacturing facilities.

Ford Motor Company – Technology –

Another environmental scanning tool that Ford Motor Company monitors and uses would be the technological portion. The company has invested billion in the latest technology for flexible manufacturing. The technology that is involved is in many forms to include wireless technology that is installed on the delivery trucks with supplies to the plant as a monitoring status and improved efficiency to reduce inventory. The flexibility of products in the same plant allows the organization to use the same machinery and process for all areas from body assembly, paint facility, and final assembly. The improved efficiency at the manufacturing facility allows for several vehicle platforms to be built on the same line to produce multiple models and quickly change the vehicle mix, the volume, and options based on customer demand.

The technological changes that are being embraced by Ford Motor Company through environmental scanning enables the company to experience huge cost savings through new product launches and 50 percent reductions in cycle changeovers along with waste reduction. Robots are among the technological changes that are being experienced within the organization to include the 400 from the project that are used to weld and assemble the metal body of the vehicle for stamping and assembly. Artificial intelligence in the form of advanced visions systems and laser tracking systems are used to ensure quality through accuracy and dimension abilities. A multi-million dollar training facility is used to ensure that the workforce has the knowledge, skills, and ability to reap the benefits from the new technology that is being used by the company. The training that is administered includes the new servo-electric weld gun system that identifies the perfect center for welding that has replaced the older and loud air-powered system that used a less sophisticated spring system. The environmental scanning of technology that is performed by Ford Motor Company has allowed the company to have positive outcomes in efficiency while remaining a competitive company in the industry through cost savings and continuous improvement.

Compass Bank- Political -

On February 16, 2007, Compass Bancshares, Inc., the parent company of Compass Bank, announced the signing of a definitive agreement under which Banco Bilbao Vizcaya Argentaria, S.A. (NYSE: BBV Madrid: BBVA) ("BBVA") will acquire Compass for a combination of cash and stock. Compass will become a wholly owned U.S. subsidiary of BBVA and will continue to operate under the Compass name. The transaction is expected to close during the second half of 2007, pending customary closing conditions, including necessary bank regulatory approvals in the U.S. and Spain and the approval of the stockholders of both Compass and BBVA.

BBVA, which operates in 35 countries, is based in Spain and has substantial banking interests in the Americas. The transaction will facilitate BBVA’s continued growth in Texas and will create the largest regional bank across the Sunbelt. Upon completion of the transaction, Compass will rank among the top 25 banks in the United States with approximately billion in total assets, billion in total loans and billion in total deposits. In addition, the combined company will rank fourth in deposit market share in Texas with .6 billion in total deposits and 326 full-service banking offices.

Compass is a billion Southwestern financial holding company that operates 415 full-service banking centers in Alabama, Arizona, Colorado, Florida, New Mexico and Texas. Compass provides a broad array of products and services through three primary lines of business – Corporate Banking, Retail Banking and Wealth Management. Compass is among the top 30 U.S. bank holding companies by asset size and ranks among the top earners of its size based on return on equity.

Under the terms of the definitive agreement, which has been approved by the board of directors of Compass and the relevant bodies of BBVA, Compass will become a wholly owned subsidiary of BBVA. After closing, BBVA intends to merge its U.S. based banking affiliates – including the former operations of Texas Regional Bancshares, State National Bancshares and Laredo National Bancshares – with Compass.

The aggregate consideration is composed of a fixed number of approximately 196 million shares of BBVA common stock and approximately .6 billion in cash. The merger is subject to customary closing conditions, including necessary bank regulatory approvals in the U.S. and Spain and the approval of the stockholders of both Compass and BBVA. The transaction is expected to close in the second half of 2007.

The merger between both companies will be determined by the political factors ranging from implications of laws and regulations to the state of world politics including the consideration of wars which may be going on in different parts of the world. New laws, regulations, tax programs and public policy create forces and trends, which may provide challenges and barriers or opportunities for any company or organization.

Compass Bank – Technology –

Ford is in the process of implementing a laser marking system on its production line to ensure the highest standard on each transmission assembled. The system will be checking for quality on different points on the assembly line. Ford is teaming up with a company called MECCO to implement this process and a trial run of the new system will last for 3 months. MECCO is a leader in its industry when it comes to laser technology. The decision to implement this new laser marking system came because it is more cost- effective and safer than previous ways of marking checkpoints for quality.

Although this process at Ford has not officially been implemented yet, Compass Bank can learn a few different things. It may be a good idea for Compass Bank to do a short trial of online cell phone banking to see how popular it becomes and if it worth all the time and effort, being spent to get it launched. Compass Bank should also consider investing into a company who is the best at what they do, is in the same time zone, and can meet their demands in a timely manner, not simply because they may be cheaper. Finally, Compass Bank can learn that they need to consider what will be most cost-effective and in the best interest of the company over time. Organizing a time line and a list of costs and potential risks would also be beneficial to Compass Bank so they know what to expect and when with the implementation of online cell phone banking.

When completing the global scan one looks for emerging new technologies which may impact any business in any industry. At one time the emergence of the Internet was a technology that was becoming an emerging trend across all industries. Today very new technologies are used to develop information systems at a fraction of the cost and time of processes that were used five years ago. Wireless is a telecommunications technology that may have moved from a trend to a force in revolutionizing the way information is stored, accessed and used across all industries around the world. Some, if leveraged by a company within an industry before competitors use it, may even provide a competitive advantage.

Compass Bank – Competition –

Although mergers may be costly and rather difficult, the value it creates in the end is the desired outcome companies seek. The eagerness to merge is based on several beliefs, those beliefs are, that the performance gains are greater, expenses are reduced, market power is increased, and shareholder’s wealth is also greater than before. The value of a merger is enhanced when the overall benefit is more valuable than the aggregate of two separate pre-merger companies.
In the end, both John and Bernard should consider this before finalizing a decision. When Zion’s purchased Stockmans, there overall value increased by 43 branches. These branches will help performance and brings much more power to the financial market. In the Journal of Money article, Pilloff states “Companies are more willing to acquire others to avoid being acquired themselves.” Keeping this in mind, companies must figure out a cross border strategy.

As part of the broad environmental scan, it is important to identify the internal capabilities of the organization. There are various models for defining capabilities. Most focus on the broad set of intangible assets such as brand, human capital, organizational capital and even relationship capital. Others include the more concrete assets such as available capital, the organization structure, current technologies and information technology infrastructure. In addition to doing a broad environmental trend, Compass Bank needs to do a more detailed capability assessment using any of the models available.

DawningStreams - Competitors –

Business activities are becoming more and more complex to manage, because of distance, time zones, number of parties involved in projects, number of tasks to achieve, multiple prioritizations, lack of general synchronization, insufficient secure and confidential communication channels and growing complexity of IT infrastructures. The use of task list managers has become very common. It is becoming more difficult to keep teams synchronized, to follow and to implement new business processes and to exchange sensitive information confidentially. The DawningStreams software application is aiming at increasing the practicality of daily executive activities. The types of business, which will most probably be interested in our product, are construction (size of network), consulting (need for synchronization), pharmaceutical research (secure exchange of information) and the software industry (complexity of manufacturing).

Many companies have already developed software applications that enable secured communications and file sharing. However, most, if not all, are relying on Microsoft technologies, which prevent them from expanding to Mac or Unix users. DawningStreams is developed in Java, which can be used on any platform, including Mac and Unix. Microsoft has acquired the Groove Company and has released a new version of the product, which can perform many of the functionalities of DawningStreams, but not generic activities (http://office.microsoft.com/en-us/groove/default.aspx). This is our closest competitor by far. More recently, we found, merely by accident, a company called Shinkuro (www.shinkuro.com), which offers the file sharing aspects of DawningStreams but lacks other capacities.

Although DawningStreams will face competition from many existing players, the fact that it will combine a super-set of functionalities in one application, for a very reasonable price, will give it some leading edge over other competitors. If the US patent is granted, the position of DawningStreams will become a niche. Even if the patent were not granted, it would take a profound architectural redesign of Groove (or other competitors) to include generic activities and match the offer of DawningStreams. As a strategy we will monitor the activities of those companies’ websites and understand what they offer in terms of similar functionality and try to ensure we match or best those functionalities to the best of our ability and resources

DawningStreams – Political -

Maintaining the secrecy of information is the fundamental function of encryption items. Persons abroad may use such items to harm US law enforcement efforts, as well as US foreign policy and national security interests. The US Government has a critical interest in ensuring that persons opposed to the United States are not able to conceal hostile or criminal activities, and that the legitimate needs for protecting important and sensitive information of the public and private sectors are met. Since 2000, US encryption export policy has been directed by three fundamental practices: technical review of encryption products prior to sale, streamlined post-export reporting, and license reviews of proposed transactions involving strong encryption to certain foreign government end-users and countries of concern. US encryption policy also seeks to ensure that American companies are not disadvantaged by the European Union’s “license-free zone.” (Bureau of Industry and Security, 2007).

DawningStreams will contain cryptographic functions. Any reliable and efficient cryptographic system requires a central authority to avoid identity theft. Cryptography is a key functionality of DawningStreams. All specialists insist on designing systems using well-studied algorithms and fully tested protocols; novelty is considered a source of risk. The cryptographic layer of DawningStreams will rely on a dual public-private key system. The private key encryption system will implement Rijndael, the Advanced Encryption Standard (http://csrc.nist.gov/CryptoToolkit/aes/rijndael/), the public key system will implement RSA (www.rsa.com) and the hashing function will implement the 256 bits version of the Secure Hash Algorithm (http://secure-hash-algorithm-md5-sha-1.co.uk/ ).

Encryption products can be used to conceal the communications of terrorists, drug smugglers, and others intent on harming U.S. interests. Cryptographic products and software also have military and intelligence applications that, in the hands of hostile nations, could pose a threat to U.S. national security. The national security, foreign policy, and law enforcement interests of the United States are protected by encryption export controls. These controls are consistent with Executive Order (E.O.) 13026, which was issued on November 15, 1996, and the Presidential Memorandum of the same date. (Bureau of Industry and Security, 2007).

DawningStreams also plans to be an international company, as offices now exist in the Netherlands and the US. As part of the strategy, we will ensure we remain compliant by registering our product with any necessary agency and allowing those agencies access to the processes if they feel there is a threat. We will be responsible to monitor (as best as we can) our client base and to put the proper verbiage in our contracts that illegal activities will not be tolerated. We will continue to monitor the BIS site mentioned in previous paragraphs and also sites in the European Union such as the Crypto Law website of legal expert Bert-Jaap Koops (http://rechten.uvt.nl/koops/)

DawningStreams - Technology/Intellectual Property –

The management of organizational strategy requires a comprehensive assessment of the macro environment of the business. Intellectual Property (IP) refers to the original ideas and innovations evolved by an organization in order to haul up its systems and processes. Creation of ideas requires large investments. This necessitates the protection of IP. Benchmarking is the continuous process of measuring products, processes, and systems of an organization against those that are rated best in the industry. It helps in uncovering weaknesses and flaws in the organizational systems, processes, and products. (Watson, 2003)

The study of the global research conducted by McAfee Inc. and MessageLabs Ltd. on security threat in small businesses in the U.S. reveals that 80 percent of small-and-medium-sized businesses (SMB) believe that an information technology (IT) security failure would be damaging in attaining their business priorities. Yet, only few are courageously making steps to fight against infringements due to resource limitations from other business related priorities. The research implies that company size plays an essential part in the way senior management views security. Among the challenges that SMBs face include keeping up-to-date with security solutions and keeping costs low. Small-to-medium businesses’ behavior towards security is very tactical and meets only immediate requirements. (unknown, 2007)

DawningStreams’ relevance to these forces is two-fold. We are a software company—there is an opportunity for us to lose the intellectual property by those who would download and attempt to modify the code. We have competitors who offer functionality similar to ours, however we offer an additional functionality the others do not. It is this ‘specialty functionality’ for which we applied for a patent the United States Patent and Trademark Office. If the patent is granted, there is less likelihood of software piracy or the loss of our IP. Environmental scans should show us if there are other companies trying to do this.

The functionality, which most resembles our competitors’, is the ability to share files. That brings in a different concern with intellectual property- the possibility someone else’s IP could be sent from one of our users to another, as this could seriously damage our reputation, as what happened with Napster. (www.napster.com).

Conclusion

At one company after another--from Sears to IBM to Hewlett-Packard to Searle, strategy is again a major focus in the quest for higher revenues and profits. With help from a new generation of business strategists, companies are pursuing novel ways to hatch new products, expand existing businesses, and create the markets of tomorrow. Some companies are even recreating full-fledged strategic-planning groups. United Parcel Service expects to spin out a new strategy group from its marketing department, where strategic plans are now hatched. Explains Chairman Kent C. Nelson: ``Because we're making bigger bets on investments in technology, we can't afford to spend a whole lot of money in one direction and then find out five years later it was the wrong direction.''

In such a world we need a planning model that allows us to anticipate the future and to use this anticipation in conjunction with an analysis of our organization--its culture, mission, strengths and weaknesses--to define strategic issues, to chart our direction by developing strategic vision and plans, to define how we will implement these plans and to specify how we will evaluate how well we are implementing these plans. The fact that the world is changing as we move forward in the future demands that the process be an iterative one.

References

Bilek, E. (n.d.) Compass Bankshares to be Acquired by Banco Bilbao Vizcaya Argentaria, S.A.,

Investor Relations. Retrieved from the Internet on March 31, 2007 at

http://media.corporate-ir.net/media_files/irol/77/77589/bbvarelease.pdf

Cole, Jim. Zions makes small deal, cites growing Arizona market. American Banker, 171(175), 1-1. Retrieved March 31, 2007 from Proquest Database.
Ford Motor Company (2006). Ford Motor Company. Retrieved March 2007,

from the World Wide Web, Web Site: [https://ford.com]
Ford, S. (2004) Adapted from 13 Skills Managers Need to Succeed, Harvard Business School

Press. Retrieved March 31, 2007 from EBSCOHost Database.

Hockenberry, Todd. (2006). Ford implements advanced laser marking. Industrial Laser Solutions, 21(4), 6-7. Retrieved March 31, 2007, from EBSCOhost database
Jacobs, P. (2005) Five Steps to Thriving in times of Uncertainty. Negotiation (p.3) Retrieved

April 1, 2007 from EBSCOHost Database.

McLean, J. (2006) We’re going through changes! British Journal of Administrative Management

54. Retrieved March 30, 2007 from EBSCOHost Database.

Pearce, J. & Robinson, R, (2004). Strategic Management: Formulation, Implementation, and Control. [University of Phoenix Custom Edition e-text]. The McGraw-Hill Companies. Retrieved March 2007, from the University of Phoenix, Resource, MBA 580-Strategies for Competitive Advantage Course Web Site: https://ecampus.phoenix.edu/secure/resource/resource.asp
Author Unknown, Strategic Planning, After a decade of gritty downsizing, Big Thinkers are back in corporate vogue. (2006) Retrieved from the Internet at http://www.businessweek.com/1996/35/b34901.htm

Unknown (2007) 80% of Small-to-Medium Sized Firms Fear a Security Threat. Computer Security Update 8 (4). Retrieved March 30, 2007 from EBSCOHost Database.
Unknown (2006) Strategic Planning, After a decade of gritty downsizing, Big Thinkers are back
in corporate vogue. Retrieved from the Internet at
http://www.businessweek.com/1996/35/b34901.htm
US Department of Commerce (2007), Encryption (ch.10, section 742.15). Retrieved March 27, 2007 from the Bureau of Industry and Security Website at http://www.bis.doc.gov/news/2007/foreignpolicyreport/fprchap10_encryption.html
Watson, G. (2003) Business Environmental Scans for Intellectual Property Strategy (PowerPoint Presentation). Retrieved March 28, 2007 from the Oklahoma State University website at http://www.okstate.edu/ceat/msetm/courses/etm5111/CourseMaterials/ETM5111Session3Part2.ppt#260,1,Business Environmental Scans for Intellectual Property Strategy

Forces and Trends in Business
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Steven Brown, MBA is a loving husband and father of two boys. He enjoys his time with his family by providing a strong family foundation of Christian Faith. After completing his Bachelors degree, Steven wanted to further his ability to teach and share to others his mindset that they can do anything if they would believe in themselves.

watches cell phone Save 13 On Trademark Miller Girl In The Best Buy Roc N Soc Nitro Throne Black

Wednesday, November 7, 2012

Intranet

Introduction to Intranets

What exactly is an intranet? It's one of those terms that's more thrown around than understood, and has become more of a buzzword than a commonly understood idea. Simply put, an intranet is a private network with Internet technology used as the underlying architecture. An intranet is built using the Internet's TCP/IP protocols for communications. TCP/IP protocols can be run on many hardware platforms and cabling schemes. The underlying hardware is not what makes an intranet-it's the software protocols that matter.

Intranets can co-exist with other local area networking technology. In many companies, existing "legacy systems" including mainframes, Novell networks, minicomputers, and various databases, are being integrated into an intranet. A wide variety of tools allow this to happen. Common Gateway Interface (CGI) scripting is often used to access legacy databases from an intranet. The Java programming language can be used to access legacy databases as well.

Intranet

With the enormous growth of the Internet, an increasing number of people in corporations use the Internet for communicating with the outside world, for gathering information, and for doing business. It didn't take long for people to recognize that the components that worked so well on the Internet could be equally valuable internally and that is why intranets are becoming so popular. Some corporations do not have TCP/IP networks, the protocol required to access the resources of the Internet. Creating an intranet in which all the information and resources can be used seamlessly has many benefits. TCP/IP-based networks make it easy for people to access the network remotely, such as from home or while traveling. Dialing into an intranet in this way is much like connecting to the Internet, except that you're connecting to a private network instead of to a public Internet provider. Interoperability between networks is another substantial bonus.

Security systems separate an intranet from the Internet. A company's intranet is protected by firewalls-hardware and software combinations that allow only certain people to access the intranet for specific purposes.

Intranets can be used for anything that existing networks are used for-and more. The ease of publishing information on the World Wide Web has made them popular places for posting corporate information such as company news or company procedures. Corporate databases with easy-to-build front-ends use the Web and programming languages such as Java.

Intranets allow people to work together more easily and more effectively. Software known as groupware is another important part of intranets. It allows people to collaborate on projects; to share information; to do videoconferencing; and to establish secure procedures for production work. Free server and client software and the multitude of services, like newsgroups, stimulated the Internet's growth. The consequence of that growth stimulated and fueled the growth of intranets. The ease with which information can be shared, and with which people can communicate with one another will continue to drive the building of intranets.

A Global View of an Intranet

An intranet is a private corporate or educational network that uses the Internet's TCP/IP protocols for its underlying transport. The protocols can run on a variety of network hardware, and can also co-exist with other network protocols, such as IPX. People from inside an intranet can get at the larger Internet resources, but those on the Internet cannot get into the intranet, which allows only restricted access from the Internet.

Videoconferencing is an important application that requires sending massive quantities of data. Intranets can be built using components that allow the extremely high bandwidths required for transferring such information. Often an intranet is composed of a number of different networks inside a corporation that all communicate with one another via TCP/IP. These separate networks are often referred to as subnets. Software that allows people to communicate with each other via e-mail and public message boards and to collaborate on work using workgroup software is among the most powerful intranet programs. Applications that allow different corporate departments to post information, and for people to fill out corporate forms, such as time sheets, and for tapping into corporate financial information are very popular. Much of the software used on intranets is standard, off-the-shelf Internet software such as the Netscape Navigator and the Microsoft Explorer Web browsers. And customized programs are often built, using the Java programming language and CGI scripting. Intranets can also be used to allow companies to do business-to-business transactions, such as ordering parts, sending invoices, and making payments. For extra security, these intranet-to-intranet transactions need never go out over the public Internet, but can travel over private leased lines instead. Intranets are a powerful system for allowing a company to do business online, for example, to allow anyone on the Internet to order products. When someone orders a product on the Internet, information is sent in a secure manner from the public Internet to the company's intranet, where the order is processed and completed. In order to protect sensitive corporate information, and to ensure that hackers don't damage computer systems and data, security barriers called firewalls protect an intranet from the Internet. Firewall technology uses a combination of routers, servers and other hardware and software to allow people on an intranet to use Internet resources, but blocks outsiders from getting into the intranet. Many intranets have to connect to "legacy systems"-hardware and databases that were built before an intranet was constructed. Legacy systems often use older technology not based on the intranet's TPC/IP protocols. There are a variety of ways in which intranets can tie to legacy systems. A common way is to use CGI scripts to access the database information and pour that data into HTML formatted text, making it available to a Web browser. Information sent across an intranet is sent to the proper destination by routers, which examine each TCP/IP packet for the IP address and determine the packet's destination. It then sends the packet to the next router closest to the destination. If the packet is to be delivered to an address on the same subnetwork of the intranet it was sent from, the packet may be able to be delivered directly without having to go through any other routers. If it is to be sent to another subnetwork on the intranet, it will be sent to another internal router address. If the packet is to be sent to a destination outside the intranet-in other words, to an Internet destination-the packet is sent to a router that connects to the Internet

How TCP/IP and IPX Work on Intranets

What distinguishes an intranet from any other kind of private network is that it is based on TCP/IP-the same protocols that apply to the Internet. TCP/IP refers to two protocols that work together to deliver data: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). When you send information across an intranet, the data is broken into small packets. The packets are sent independently through a series of switches called routers. Once all the packets arrive at their destination, they are recombined into their original form. The Transmission Control Protocol breaks the data into packets and recombines them on the receiving end. The Internet Protocol handles the routing of the data and makes sure it gets sent to the proper destination.

In some companies, there may be a mix of TCP/IP-based intranets and networks based on other networking technology, such as NetWare. In that instance, the TCP/IP technology of an intranet can be used to send data between NetWare or other networks, using a technique called IP tunneling. In this instance, we'll look at data being sent from one NetWare network to another, via an intranet. NetWare networks use the IPX (Internet Packet Exchange) protocol as a way to deliver data-and TCP/IP networks can't recognize that protocol. To get around this, when an IPX packet is to be sent across an intranet, it is first encapsulated inside an IP packet by a NetWare server specifically for and dedicated to providing the IP transport mechanism for IPX packets. Data sent within an intranet must be broken up into packets of less than 1,500 characters each. TCP breaks the data into packets. As it creates each packet, it calculates and adds a checksum to the packet. The checksum is based on the byte values, that is, the precise amount of data in the packet. Each packet, along with the checksum, is put into separate IP wrappers or "envelopes." These wrappers contain information that details exactly where on the intranet-or the Internet-the data is to be sent. All of the wrappers for a given piece of data have the same addressing information so that they can all be sent to the same location for reassembly. The packets travel between networks by intranet routers. Routers examine all IP wrappers and look at their addresses. These routers determine the most efficient path for sending each packet to its final destination. Since the traffic load on an intranet often changes, the packets may be sent along different routes, and the packets may arrive out of order. If the router sees the address is one located inside the intranet, the packet may be sent directly to its destination, or it may instead be sent to another router. If the address is located out on the Internet, it will be sent to another router so it can be sent across the Internet. As the packets arrive at their destination, TCP calculates a checksum for each packet. It then compares this checksum with the checksum that has been sent in the packet. If the checksums don't match, TCP knows that the data in the packet has been corrupted during transmission. It then discards the packet and asks that the original packet be retransmitted. TCP includes the ability to check packets and to determine that all the packets have been received. When all the non-corrupt packets are received, TCP assembles them into their original, unified form. The header information of the packets relays the sequence of how to reassemble the packets. An intranet treats the IP packet as it would any other, and routes the packet to the receiving NetWare network. On the receiving NetWare network, a NetWare TCP/IP server decapsulates the IP packet-it discards the IP packet, and reads the original IPX packet. It can now use the IPX protocol to deliver the data to the proper destination.

How the OSI Model Works

A group called the International Standards Organization (ISO) has put together the Open Systems Interconnect (OSI) Reference Model, which is a model that describes seven layers of protocols for computer communications. These layers don't know or care what is on adjacent layers. Each layer, essentially, only sees the reciprocal layer on the other side. The sending application layer sees and talks to the application layer on the destination side. That conversation takes place irrespective of, for example, what structure exists at the physical layer, such as Ethernet or Token Ring. TCP combines the OSI model's application, presentation, and session layers into one which is also called the application layer.

The application layer refers to application interfaces, not programs like word processing. MHS (Message Handling Service) is such an interface and it operates at this level of the OSI model. Again, this segmentation and interface approach means that a variety of email programs can be used on an intranet so long as they conform to the MHS standard at this application interface level. The presentation layer typically simply provides a standard interface between the application layer and the network layers. This type of segmentation allows for the great flexibility of the OSI model since applications can vary endlessly, but, as long as the results conform to this standard interface, the applications need not be concerned with any of the other layers. The session layer allows for the communication between sender and destination. These conversations avoid confusion by speaking in turn. A token is passed to control and to indicate which side is allowed to speak. This layer executes transactions, like saving a file. If something prevents it from completing the save, the session layer, which has a record of the original state, returns to the original state rather than allowing a corrupt or incomplete transaction to occur. The transport layer segments the data into acceptable packet sizes and is responsible for data integrity of packet segments. There are several levels of service that can be implemented at this layer, including segmenting and reassembly, error recovery, flow control, and others. The IP wrapper is put around the packet at the network or Internet layer. The header includes the source and destination addresses, the sequence order, and other data necessary for correct routing and rebuilding at the destination. The data-link layer frames the packets-for example, for use with the PPP (Point to Point). It also includes the logical link portion of the MAC sublayer of the IEEE 802.2, 802.3 and other standards. Ethernet and Token Ring are the two most common physical layer protocols. They function at the MAC (Media Access Control) level and move the data over the cables based on the physical address on each NIC (Network Interface Card). The physical layer includes the physical components of the IEEE 802.3 and other specifications.

How TCP/IP Packets Are Processed

Protocols such as TCP/IP determine how computers communicate with each other over networks such as the Internet. These protocols work in concert with each other, and are layered on top of one another in what is commonly referred to as a protocol stack. Each layer of the protocol is designed to accomplish a specific purpose on both the sending and receiving computers. The TCP stack combines the application, presentation, and the session layers into a single layer also called the application layer. Other than that change, it follows the OSI model. The illustration below shows the wrapping process that occurs to transmit data.

The TCP application layer formats the data being sent so that the layer below it, the transport layer, can send the data. The TCP application layer performs the equivalent actions that the top three layers of OSI perform: the application, presentation, and session layers. The next layer down is the transport layer, which is responsible for transferring the data, and ensures that the data sent and the data received are in fact the same data-in other words, that there have been no errors introduced during the sending of the data. TCP divides the data it gets from the application layer into segments. It attaches a header to each segment. The header contains information that will be used on the receiving end to ensure that the data hasn't been altered en route, and that the segments can be properly recombined into their original form. The third layer prepares the data for delivery by putting them into IP datagrams, and determining the proper Internet address for those datagrams. The IP protocol works in the Internet layer, also called the network layer. It puts an IP wrapper with a header onto each segment. The IP header includes information such as the IP address of the sending and receiving computers, and the length of the datagram, and the sequence order of the datagram. The sequence order is added because the datagram could conceivably exceed the size allowed for network packets, and so would need to be broken into smaller packets. Including the sequence order will allow them to be recombined properly. The Internet layer checks the IP header and checks to see whether the packet is a fragment. If it is, it puts together fragments back into the original datagram. It strips off the IP header, and then sends the datagram to the transport layer. The transport layer looks at the remaining header to decide which application layer protocol-TCP or UDP-should get the data. Then the proper protocol strips off the header and sends the data to the receiving application. The application layer gets the data and performs, in this case, an HTTP request. The next layer down, the data link layer, uses protocols such as the Point-to-Point Protocol (PPP) to put the IP datagram into a frame. This is done by putting a header-the third header, after the TCP header and the IP header-and a footer around the IP datagram to fra-me it. Included in the frame header is a CRC check that checks for errors in the data as the data travels over the network. The data-link layer ensures that the CRC for the frame is right, and that the data hasn't been altered while it was sent. It strips off the frame header and the CRC, and sends the frame to the Internet layer. On the receiving computer, the packet travels through the stack, but in the opposite order from which the packet was created. In other words, it starts at the bottom layer, and moves its way up through the protocol stack. As it moves up, each layer strips off the header information that was added by the TCP/IP stack of the sending computer. The final layer is the physical network layer, which specifies the physical characteristics of the network being used to send data. It describes the actual hardware standards, such as the Ethernet specification. The layer receives the frames from the data link layer, and translates the IP addresses there into the hardware addresses required for the specific network being used. Finally, the layer sends the frame over the network. The physical network layer receives the packet. It translates the hardware address of the sender and receiver into IP addresses. Then it sends the frame up to the data link layer.

How Bridges Work

Bridges are hardware and software combinations that connect different parts of a single network, such as different sections of an intranet. They connect local area networks (LANs) to each other. They are generally not used, however, for connecting entire networks to each other, for example, for connecting an intranet to the Internet, or an intranet to an intranet, or to connect an entire subnetwork to an entire subnetwork. To do that, more sophisticated pieces of technology called routers are used.

When there is a great amount of traffic on an Ethernet local area network, packets can collide with one another, reducing the efficiency of the network, and slowing down network traffic. Packets can collide because so much of the traffic is routed among all the workstations on the network. In order to cut down on the collision rate, a single LAN can be subdivided into two or more LANs. For example, a single LAN can be subdivided into several departmental LANs. Most of the traffic in each departmental LAN stays within the department LAN, and so it needn't travel through all the workstations on all the LANs on the network. In this way, collisions are reduced. Bridges are used to link the LANs. The only traffic that needs to travel across bridges is traffic bound for another LAN. Any traffic within the LAN need not travel across a bridge. Each packet of data on an intranet has more information in it than just the IP information. It also includes addressing information required for other underlying network architecture, such as for an Ethernet network. Bridges look at this outer network addressing information and deliver the packet to the proper address on a LAN Bridges consult a learning table that has the addresses of all the network nodes in it. If a bridge finds that a packet belongs on its own LAN, it keeps the packet inside the LAN. If it finds that the workstation is on another LAN, it forwards the packet. The bridge constantly updates the learning table as it monitors and routes traffic. Bridges can connect LANs in a variety of different ways. They can connect LANs using serial connections over traditional phone lines and modems, over ISDN lines, and over direct cable connections. CSU/DSU units are used to connect bridges to telephone lines for remote connectivity. Bridges and routers are sometimes combined into a single product called a brouter. A brouter handles both bridging and routing tasks. If the data needs to be sent only to another LAN on the network or subnetwork, it will act only as a bridge delivering the data based on the Ethernet address. If the destination is another network entirely, it will act as a router, examining the IP packets and routing the data based on the IP address.

How Intranet Routers Work

Just as routers direct traffic on the Internet, sending information to its proper destination, and routers on an intranet perform the same function. Routers-equipment that is a combination of hardware and software-can send the data to a computer on the same sub network inside the intranet, to another network on the intranet, or outside to the Internet. They do this by examining header information in IP packets, and then sending the data on its way. Typically, a router will send the packet to the next router closest to the final destination, which in turn sends it to an even closer router, and so on, until the data reaches its intended recipient.

A router has input ports for receiving IP packets, and output ports for sending those packets toward their destination. When a packet comes to the input port, the router examines the packet header, and checks the destination in it against a routing table-a database that tells the router how to send packets to various destinations. Based on the information in the routing table, the packet is sent to a particular output port, which sends the packet to the next closest router to the packet's destination. If packets come to the input port more quickly than the router can process them, they are sent to a holding area called an input queue. The router then processes packets from the queue in the order they were received. If the number of packets received exceeds the capacity of the queue (called the length of the queue), packets may be lost. When this happens, the TCP protocol on the sending and receiving computers will have the packets re-sent. In a simple intranet that is a single, completely self-contained network, and in which there are no connections to any other network or the intranet, only minimal routing need be done, and so the routing table in the router is exceedingly simple with very few entries, and is constructed automatically by a program called ifconfig. In a slightly more complicated intranet which is composed of a number of TCP/IP-based networks, and connects to a limited number of TCP/IP-based networks, static routing will be required. In static routing, the routing table has specific ways of routing data to other networks. Only those pathways can be used. Intranet administrators can add routes to the routing table. Static routing is more flexible than minimal routing, but it can't change routes as network traffic changes, and so isn't suitable for many intranets. In more complex intranets, dynamic routing will be required. Dynamic routing is used to permit multiple routes for a packet to reach its final destination. Dynamic routing also allows routers to change the way they route information based on the amount of network traffic on some paths and routers. In dynamic routing, the routing table is called a dynamic routing table and changes as network conditions change. The tables are built dynamically by routing protocols, and so constantly change according to network traffic and conditions. There are two broad types of routing protocols: interior and exterior. Interior routing protocols are typically used on internal routers inside an intranet that routes traffic bound only for inside the intranet. A common interior routing protocol is the Routing Information Protocol (RIP). Exterior protocols are typically used for external routers on the Internet. AÊcommon exterior protocol is the Exterior Gateway Protocol (EGP).

Intranets come in different sizes. In a small company, an intranet can be composed of only a handful of computers. In a medium-sized business, it may include dozens or hundreds of computers. And in a large corporation, there may be thousands of computers spread across the globe, all connected to a single intranet. When intranets get large, they need to be subdivided into individual subnets or subnetworks.

To understand how subnetting works, you first need to understand IP addresses. Every IP address is a 32-bit numeric address that uniquely identifies a network and then a specific host on that network. The IP address is divided into two sections: the network section, called the netid, and the host section, called the hostid.

Each 32-bit IP address is handled differently, according to what class of network the address refers to. There are three main classes of network addresses: Class A, Class B, and Class C. In some classes, more of the 32-bit address space is devoted to the netid, while in others, more of the address space is devoted to the hostid. In a Class A network, the netid is composed of 8 bits, while the hostid is composed of 24 bits. In a Class B network, both the netid and the hostid are composed of 16 bits. In a Class C network, the netid is composed of 24 bits, while the hostid is composed of 8 bits. There's a simple way of knowing what class a network is in. If the first number of the IP address is less than 128, the network is a Class A address. If the first number is from 128 to 191, it's a Class B network. If the first number is from 192 to 223, it's a Class C network. Numbers above 223 are reserved for other purposes. The smaller the netid, the fewer number of networks that can be subnetted, but the larger number of hosts on the network. A Class A rating is best for large networks while a Class C is best for small ones.

To create a subnet, the demarcation line on the IP address is moved between the netid and the hostid, to give the netid more bits to work with and to take away bits from the hostid. To do this, a special number called a subnet mask is used.

Subnetting is used when intranets grow over a certain size and they begin to have problems. One problem is management of host IP addresses-making sure that every computer on the network has a proper, up-to-date host address, and that old host addresses are put out of use until needed in the future. In a corporation spread out over several locations-or across the world-it's difficult, if not impossible, to have one person responsible for managing the host addresses at every location and department in the company.

Another problem has to do with a variety of hardware limitations of networks. Dissimilar networks may all be part of an intranet. An intranet may have some sections that are Ethernet, other sections that are Token Ring networks, and conceivably other sections that use different networking technologies altogether. There is no easy way for an intranet router to link these dissimilar networks together and route the information to the proper places.

Another set of problems has to do with the physical limitations of network technology. In some kinds of networks, there are some strict limitations on how far cables can extend in the network. In other words, you can't go over a certain distance of cabling without using repeaters or routers. A "thick" Ethernet cable, for example, can only be extended to 500 meters, while a "thin" Ethernet cable can only go to 300 meters. Routers can be used to link these cables together, so that an intranet can be extended well beyond those distances. But when that is done, each length of wire is essentially considered its own subnetwork.

Yet one more set of problems has to do with the volume of traffic that travels across an intranet. Often in a corporation, in a given department, most of the traffic is intradepartmental traffic-in other words, mail and other data that people within a department send to each another. The volume of traffic outside to other departments is considerably less. What's called for is a way to confine intradepartmental traffic inside the departments, to cut down on the amount of data that needs to be routed and managed across the entire intranet.

Subnetting solves all these problems and more. When an intranet is divided into subnets, one central administrator doesn't have to manage every aspect of the entire intranet. Instead, each subnet can take care of its own administration. That means smaller organizations within the larger organization can take care of problems such as address management and a variety of troubleshooting chores. If an intranet is subnetted by divisions or departments, it means that each division or department can guide the development of its own network, while adhering to general intranet architecture. Doing this allows departments or divisions more freedom to use technology to pursue their business goals.

Subnets also get around problems that arise when an intranet has within it different kinds of network architecture, such as Ethernet and Token Ring technologies. Normally-if there is no subnetting-a router can't link these different networks together because they don't have their own addresses. However, if each of the different networks is its own subnet-and so has its own network address-routers can then link them together and properly route intranet traffic.

Subnetting can also cut down on the traffic traveling across the intranet and its routers. Since much network traffic may be confined within departments, having each department be its own subnet means that all that traffic need never cross an intranet router and cross the intranet-it will stay within its own subnet.

Subnetting can also increase the security on an intranet. If the payroll department, for example, were on its own subnet, then much of its traffic would not have to travel across an intranet. Having its data traveling across the intranet could mean that someone could conceivably hack into the data to read it. Confining the data to its own subnet makes that much less likely to happen.

Dividing an intranet into subnets can also make the entire intranet more stable. If an intranet is divided in this way, then if one subnet goes down or is often unstable, it won't affect the rest of the intranet.

This all may sound rather confusing. To see how it's done, let's take a look at a network, and see how to use the IP address to create subnets. Let's say we have a Class B network. That network is assigned the address of 130.97.0.0. When a network is given an address, it is assigned the netid numbers-in this case, the 130.97-and it can assign the host numbers (in this case, 0.0) in any way that it chooses.

The 130.97.0.0 network is a single intranet. It's getting too large to manage, though, and we've decided to divide it into two subnets. What we do is fairly straightforward. We take a number from the hostid field and use it to identify each of the subnets. So one subnet gets the address 130.97.1.0, and the other gets the address 130.97.2.0. Individual machines on the first subnet get addresses of 130.97.1.1, 130.97.1.2, and so on. Individual machines on the second subnet get addresses of 130.97.2.1, 130.97.2.2 and so on.

Sounds simple. But we have a problem. The Internet doesn't recognize 130.97.1.0 and 130.97.2.0 as separate networks. It treats them both as 130.97.0.0 since the "1" and "2" that we're using as a netid is only known to the Internet as a hostid. So our intranet router will not be able to route incoming traffic to the proper network.

To solve the problem, a subnet mask is used. A subnet mask is a 32-bit number in IP form used by intranet routers and hosts that will help routers understand how to route information to the proper subnet. To the outside Internet, there is still only one network, but the subnet mask allows routers inside the intranet to send traffic to the proper host.

A subnet mask is a number such as 255.255.255.0 (the built-in default for Class C addresses; the Class B default is 255.255.0.0 and the default for Class A is 255.0.0.0). A router takes the subnet mask and applies that number against the IP number of incoming mail to the network by using it to perform a calculation. Based on the resulting IP number, it will route mail to the proper subnet, and then to a particular computer on the subnet. For consistency, everyone in a particular intranet will use the same subnet mask.

Subnetting an Intranet

When intranets are over a certain size, or are spread over several geographical locations, it becomes difficult to manage them as a single network. To solve the problem, the single intranet can be subdivided into several subnets, subsections of an intranet that make them easier to manage. To the outside world, the intranet still looks as if it's a single network.

If you're building an intranet and want it to be connected to the Internet, you'll need a unique IP address for your intranet network, which the InterNIC Registration Services will handle. There are three classes of intranet you can have: Class A, Class B, or Class C. Generally, a Class A rating is best for the largest networks, while a Class C is best for the smallest. A Class A network can be composed of 127 networks, and a total of 16,777,214 nodes on the network. A Class B network can be composed of 16,383 networks, and a total of 65,534 nodes. A Class C network can be composed of 2,097,151 networks, and 254 nodes. When an intranet is assigned an address, it is assigned the first two IP numbers of the Internet numeric address (called the netid field) and the remaining two numbers (called the hostid field) are left blank, so that the intranet itself can assign them, such as 147.106.0.0. The hostid field consists of a number for a subnet and a host number. When an intranet is connected to the Internet, a router handles the job of sending packets into the intranet from the Internet. In our example, all incoming mail and data comes to a router for a network with the netid of 147.106.0.0. When intranets grow-for example, if there is a department located in another building, city, or country-there needs to be some way to manage network traffic. It may be impractical and physically impossible to route all the data necessary among many different computers spread across a building or the world. A second network-called a subnetwork or subnet-needs to be created. In order to have a router handle all incoming traffic for a subnetted intranet, the first byte of the hostid field is used. The bits that are used to distinguish among subnets are called subnet numbers. In our example, there are two subnets on the intranet. To the outside world, there appears to be only one network. Each computer on each subnet gets its own IP address, as in a normal intranet. The combination of the netid field, the subnet number, and then finally a host number, forms the IP address. The router must be informed that the hostid field in subnets must be treated differently than non-subnetted hostid fields, otherwise it won't be able to properly route data. In order to do this, a subnet mask is used. A subnet mask is a 32-bit number such as 255.255.0.0 that is used in concert with the numbers in the hostid field. When a calculation is performed using the subnet mask and the IP address, the router knows where to route the mail. The subnet mask is put in people's network configuration files.

Overview of an Intranet Security System

Any intranet is vulnerable to attack by people intent on destruction or on stealing corporate data. The open nature of the Internet and TCP/IP protocols expose a corporation to attack. Intranets require a variety of security measures, including hardware and software combinations that provide control of traffic; encryption and passwords to validate users; and software tools to prevent and cure viruses, block objectionable sites, and monitor traffic.

The generic term for a line of defense against intruders is a firewall. A firewall is a hardware/software combination that controls the type of services allowed to or from the intranet. Proxy servers are another common tool used in building a firewall. A proxy server allows system administrators to track all traffic coming in and out of an intranet. A bastion server firewall is configured to withstand and prevent unauthorized access or services. It is typically segmented from the rest of the intranet in its own subnet or perimeter network. In this way, if the server is broken into, the rest of the intranet won't be compromised. Server-based virus-checking software can check every file coming into the intranet to make sure that it's virus-free. Authentication systems are an important part of any intranet security scheme. Authentication systems are used to ensure that anyone trying to log into the intranet or any of its resources is the person they claim to be. Authentication systems typically use user names, passwords, and encryption systems. Server-based site-blocking software can bar people on an intranet from getting objectionable material. Monitoring software tracks where people have gone and what services they have used, such as HTTP for Web access. One way of ensuring that the wrong people or erroneous data can't get into the intranet is to use a filtering router. This is a special kind of router that examines the IP address and header information in every packet coming into the network, and allows in only those packets that have addresses or other data, like e-mail, that the system administrator has decided should be allowed into the intranet.

All intranets are vulnerable to attack. Their underlying TCP/IP architecture is identical to that of the Internet. Since the Internet was built for maximum openness and communication, there are countless techniques that can be used to attack intranets. Attacks can involve the theft of vital company information and even cash. Attacks can destroy or deny a company's computing resources and services. Attackers can break in or pose as a company employee to use the company's intranet resources.

Firewalls are hardware and software combinations that block intruders from access to an intranet while still allowing people on the intranet to access the resources of the Internet. Depending on how secure a site needs to be, and on how much time, money, and resources can be spent on a firewall, there are many kinds that can be built. Most of them, though, are built using only a few elements. Servers and routers are the primary components of firewalls.

Most firewalls use some kind of packet filtering. In packet filtering, a screening router or filtering router looks at every packet of data traveling between an intranet and the Internet.

Proxy servers on an intranet are used when someone from the intranet wants to access a server on the Internet. A request from the user's computer is sent to the proxy server instead of directly to the Internet. The proxy server contacts the server on the Internet, receives the information from the Internet, and then sends the information to the requester on the intranet. By acting as a go-between like this, proxy servers can filter traffic and maintain security as well as log all traffic between the Internet and the network.

Bastion hosts are heavily fortified servers that handle all incoming requests from the Internet, such as FTP requests. A single bastion host handling incoming requests makes it easier to maintain security and track attacks. In the event of a break in, only that single host has been compromised, instead of the entire network. In some firewalls, multiple bastion hosts can be used, one for each different kind of intranet service request.

How Firewalls Work

Firewalls protect intranets from any attacks launched against them from the Internet. They are designed to protect an intranet from unauthorized access to corporate information, and damaging or denying computer resources and services. They are also designed to stop people on the intranet from accessing Internet services that can be dangerous, such as FTP.

Intranet computers are allowed access to the Internet only after passing through a firewall. Requests have to pass through an internal screening router, also called an internal filtering routeror choke router. This router prevents packet traffic from being sniffed remotely. A choke router examines all pack-ets for information such as the source and destination of the packet. The router compares the information it finds to rules in a filtering table, and passes or drops the packets based on those rules. For example, some services, such as rlogin, may not be allowed to run. The router also might not allow any packets to be sent to specific suspicious Internet locations. A router can also block every packet traveling between the Internet and the internal network, except for e-mail. System administrators set the rules for determining which packets to allow in and which to block. When an intranet is protected by a firewall, the usual internal intranet services are available-such as e-mail, access to corporate databases and Web services, and the use of groupware. Screened subnet firewalls have one more way to protect the intranet-an exterior screening router, also called an exterior filtering router or an access router. This router screens packets between the Internet and the perimeter network using the same kind of technology that the interior screening router uses. It can screen packets based on the same rules that apply to the internal screening router and can protect the network even if the internal router fails. It also, however, may have additional rules for screening packets specifically designed to protect the bastion host. As a way to further protect an intranet from attack, the bastion host is placed in a perimeter network-a subnet-inside the firewall. If the bastion host was on the intranet instead of a perimeter network and was broken into, the intruder could gain access to the intranet. A bastion host is the main point of contact for connections coming in from the Internet for all services such as e-mail, FTP access, and any other data and requests. The bastion host services all those requests-people on the intranet contact only this one server, and they don't directly contact any other intranet servers. In this way, intranet servers are protected from attack.

Intranet
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Pawan Bangar, technical Director, Birbals, India.

www.birbals.com

www.seobirbals.com

www.hbirbals.com

www.ebirbals.com

pawan@ebirbals.com

watches cell phone Best Buy Chippendale Fish Fork With Hollow Handle