Professional Documents
Culture Documents
Cyberspace 100721133329 Phpapp02
Cyberspace 100721133329 Phpapp02
Cyberspace 100721133329 Phpapp02
Assignment no.02
Computer Application for Business.
Project Advisor
Rashid Mahmood
Submitted By
Waseem Saeed
Roll AD-512530
Semester 2nd
1
I dedicate it to my beloved parents and respected teachers.
2
All praise and thanks is due to Allah, the Lord of mankind
and all that exists, for His blessings, benevolence, and guidance at every
stage of our life.
I am deeply grateful to my supervisor, Prof.Rashid Mahmood,
for his guidance, support, and patience. He has been an invaluable
source of knowledge and has certainly helped inspire many of the ideas
expressed in this assignment.
My words will fail to express my deepest heartfelt thanks to my
family, especially my parents, for all what they did, and still doing, to
help me be at this position and for their continuous support and
encouragement. Any mistakes that remain are mine! I thank you all.
3
Our Nation’s critical infrastructures are composed of public and
private institutions in the sectors of agriculture, food, water, public
health, emergency services, government, defense industrial base,
information and telecommunications, energy, transportation, banking
and finance, chemicals and hazardous materials, and postal and
shipping. Cyberspace is their nervous system—the control system of our
country.
Cyberspace is composed of hundreds of thousands of
interconnected computers, servers, routers, switches, and fiber optic
cables that allow our critical infrastructures to work. Thus, the healthy
functioning of cyberspace is essential to our economy and our national
security.
4
Cyberspace. This word has stormed into our language and
invaded our collective consciousness like no other. As the technology
improves and ownership of home computers increases, we competently
navigate our way around cyberspace, downloading information, reading
and writing to newsgroups, and receiving and sending emails.
5
We also see that cyberspace exhibits several novel properties,
projecting it far beyond the scope of any existing theory and setting it
apart as an exciting new spatial medium.
6
The emergence, in 1991, of the World Wide Web, added a new
dimension of accessibility and functionality to Internet. For the first time,
both users and programmers of Internet could access all of the various
types of Internet services (FTP, Gopher, Telnet, etc.) through a consistent
and abstract mechanism. In addition, WWW added two new services,
HTTP, the Hypertext Transfer Protocol, which provides a rapid file-
transfer mechanism; and the Uniform Resource Locator, or URL, which
defines a universal locator mechanism for a data set resident anywhere
within Internet’s domain.
7
organization; that is to say that, previously, Internet appeared as a linear
source, a unidimensional stream, while now, an arbitrary linkage of
documents, in at least two dimensions (generally defined as “pages”), is
possible. As fitting the organization skills most common in Western
Civilization, this structure is often hierarchical, with occasional
exceptions. (Most rare are anti-hierarchical documents which are not
intrinsically confusing.)
8
Cyberspace: The experience of time, distance, people, travel, shopping and
information you encounter while in the world of the Internet. The only physical activity
needed in cyberspace is using a keyboard & mouse.
Internet
The Internet is a world wide net of computers, which can exchange data
over lines. It is decent rally organized and every computer –PCs, Macs,
and so on – can be linked to it.
History of Internet:
The Internet had its roots during the 1960's as a project of the
United States government's Department of Defense, to create a non-
centralized network designed to survive partial outages (i.e. nuclear war)
and still function when parts of the network were down or destroyed.
9
This project was called Arpanet (Advanced Research Projects Agency
Network), created by the Pentagon's Advanced Research Projects Agency
established in 1969 to provide a secure and survivable communications
network for organizations engaged in defense-related research.
Services:
"http://" stands for "hypertext transfer protocol", which is how the World
Wide Web works. There are other protocols for electronic mail, simple
computer file transfers and many more.
10
E-mail (electronic mail)
News (forum of discussion)
E-mail:
With e-mail you can send your letters and documents to other E-Mail-
Users. You can be an E-Mail-User if you have an e-mail-address.
News:
The news is like a board where you can put small letters and questions.
Every user can see this 'news' and can answer it. There are a lot of such
boards called newsgroups. They all have their own topic. So, there exists
a group for market, for programmers, for music, and so on. The language
of most of the newsgroups is English.
Telnet:
With telnet you can use programs which are on other computers. For
many libraries such as the one of the ETH Zurich, you use telnet.
This is the service used most. You surf with programs called Explorer or
Netscape.
11
You have to type the address of the page you want to go to.
Such an address looks like http://www.yahoo.com. The explorer will
look for this page and show it.
On a homepage the firm or the person write who they are and
what they do, what they offer. Such a page contains links (hypertext) to
other pages, which will show the linked page after clicking them. On
many pages you can buy things, from food to textiles to computers.
Mostly you pay them with credit cards. You can imagine that there are
an enormous number of pages. You find information also about science,
computers, education, business, etc. Unfortunately also criminals exist
in the Internet.
Server:
12
Sometimes server software is designed so that additional capabilities can
be added to the main program by adding small programs known as
servlets.
The server is the heart of client server network. It houses the network
operating system, it provides file and application services to the clients, it
manage network data storage, it provides in method for the sharing of
information through electronic mail, and provides for network security
Types of servers
1. File Server
2. Application Server
3. Remote Server
4. Slave Server
5. Caching Only Server
6. proxy server
7. terminal server
File Server
Each small intranet has its own file server in which they can
save their database, so it requires high memories, large hard drives the
RAM must be 128mb, the selection of hardware need to be made for the
mother board for at least 128mb of expansion capacity the PCI and EISA
Slots must be available which will be used for the backward compatibility
without suffering a great loss of speed in data transfer to the server.
13
Application Server
Remote Server
Slave Server
14
the Internet servers. A typical scenario would involve a number of
workstations and a departmental timesharing machine with Internet
access. The workstations might be administratively prohibited from
having Internet access. To give the workstations the appearance of
access to the Internet domain system, the workstations could be Slave
servers to the timesharing machine which would forward the queries and
interact with other name servers to resolve the query before returning the
answer. An added benefit of using the forwarding feature is that the
central machine develops a much more complete cache of information
that all the workstations can take advantage of. The use of Slave mode
and forwarding is discussed further under the description of the named
boot file commands.
All servers are caching servers. This means that the server
caches the information that it receives for use until the data expires. A
Caching Only Server is a server that is not authoritative for any zone.
This server services queries and asks other servers, who have the
authority, for the information needed. All servers keep data in their cache
until the data expires, based on a TTL (``Time To Live'') field which is
maintained for all resource records.
Proxy Server
15
The clients makes all of it's requests from the Proxy Server,
which then makes requests from the "real" server and passes the result
back to the Client. Sometimes the Proxy server will store the results and
give a stored result instead of making a new one (to reduce use of a
Network). Proxy servers are commonly established on Local Area
Networks
Terminal Server
16
Cyberspace is the global domain of electro-magnetic; the electronic
medium in which communication and control is executed through the
modulation of electromagnetic energy across specified networks. It is
readily identified with the interconnected information technology
required to achieve the wide range of system capabilities associated with
the transport of communication and control products and services.
Current technology integrates a number of capabilities (sensors,
signals, connections, transmissions, processors, and controllers)
sufficient to generate a virtual interactive experience accessible
regardless of a geographic location. In pragmatic terms, operations
within this global domain allow an interdependent network of
information technology infrastructures (ITI), telecommunications
networks, and computer processing systems, integrated sensors, system
control networks, embedded processors and controllers common to
global control and communications across the electro-magnetic
environment.
As a social experience, individuals can interact, exchange
ideas, share information, provide social support, conduct business,
direct actions, create artistic media, play games, engage in political
discussion, and so on.
The term is rooted in the science of cybernetics from the Greek
(steersman, governor, pilot, or rudder) and Norbert Wiener’s pioneering
work in electronic communication and control science, a forerunner to
current information theory and computer science. The term “cyberspace”
was first used by the cyberpunk science fiction author William Gibson.
Which he would later describe as an "evocative and essentially
meaningless" buzzword that could serve as a cipher for all of his
cybernetic musings (see origins of the term below).
17
Originally coined by science fiction writer William Gibson to
describe data matrices existing in a dark distant future, the term
cyberspace has entered into the common lexicon. It has come to mean
the information spaces created by the technology of digital networked
computer systems, most of which ultimately connect with the mother of
all networks, the Internet.
18
At its fundamental level, cyberspace is a map that is maintained
between a regular spatial topology and an irregular network
topology. The continuity of cyberspace implies nothing about the
internet work upon which it exists. Cyberspace is complete abstraction,
divorced at every point from concrete representation.
19
Internet defines an address “space” for its hosts, specifying
these addresses as 32-bit numbers, expressed in dotted octet notation,
where the general form is {s.t.u.v}. Into this unidimensional address
space, cyberspace places a map of N dimensions (N = 3 in the canonical,
“Gibsonian” cyberspace under discussion here), so that any “place” can
be uniquely identified by the tuple {x.y.z}.
Where p is the place value, and x, y and z are the metrics for
each dimension. The address element is currently implemented as a 32-
bit construct, so the range of p is +31 to -32, and x, y, and z, are signed
octets.
20
Cyberspace has now been given a universal, unique, dense
numbering system; it is now possible to quantify it. The first
quantification is that of existence (metrics); the second quantification is
that of content. Content is not provided by cyberspace itself, but rather
by the participants within it. The only service cyberspace needs to
provide is a binding between a spatial descriptor and a host address.
This can be described by the function:
f(s) => a
21
If cyberspace is reducible to a simple function, it can be
expressed through a transaction-based protocol, where every request
yields a reply, even if that reply is NULL. In the implementation under
examination, cyberspace protocol (CP) is implemented through a
straightforward client-server mechanism, in which there are very few
basic operations; registration, investigation, and deletion.
22
Registration contains within it the investigation process; before
a volume can be registered successfully, “permission” must be received
from cyberspace itself, and this must include an active collaboration and
authentication process with whatever other hosts help to define the
volume. This is an enforcement of the rule which forbids interpenetration
of objects within the physical world; it need not be enforced, but unless it
is observed in most situations, cyberspace will tend toward being
intrinsically disorienting.
23
Cyberspace is a unified whole; therefore, from a transaction-
oriented point of view, every server must behave exactly like any other
server (specifically with respect to investigation requests). The same
requests should evoke the same responses. This would appear to imply
that every server must comprehend the “totality” of cyberspace, a
requirement which is functionally beyond any computer yet conceived of,
or it places a severe restriction on the total content of cyberspace. Both
of these constraints are unacceptable, and a methodology to surmount
these constraints must be incorporated into the cyberspace server
implementation.
24
of the current work and will be explained in greater detail in a
subsequent publication.
25
Having defined, specified, and implemented an architecture
which provides a binding between spatio-location and data set location;
this architecture needs to be integrated with the existing WWW libraries
so that their functionality can be similarly extended. As “location” is
being augmented by the addition of CP to WWW, it is the Universal
Resource Locator which must be extended to incorporate these new
capabilities.
cs://{pa.x.y.z}{pb.x.y.z}.../filename
26
all visualized WWW clients will implement a threaded execution
mechanism (with re-entrant WWW libraries) so that these requests can
occur simultaneously and asynchronously.
27
It is now possible, from the previous discussion, to describe the
architecture and operation of a fully visualized WWW client. It is
composed of several pieces; WWW libraries with an integrated CP client
interface; an interpreter for an VRML-derived language which describes
object geometry, placement, and linkage; and a user interface which
presents a navigable “window on the web”.
28
Cyberspace Protocol is a specific implementation of a general
theory, which has implications well beyond WWW. CP is the solution, in
three dimensions, of an N-dimensional practice for data set location
abstraction. Data abstraction places a referent between the “name” of a
data set locator and the physical location, allowing physical data set
location to become mutable.
29
electrons versus atoms, like a newspaper that one now gets on-line.
Personally, I stopped taking physical newspapers about three years
ago, although I spend more time reading newspapers that I did for
many years because I can read more of them and get through them by
looking at screens than by looking at them in the atomic form.
30
Everything cyberizable will be in
Cyberspace! Goal? Quest? or Fate?
In Body
On Body
Continent Region/ Car
Intranet Home
Campus,
including SANs
World Fractal Cyberspace: a
network of … networks
of … platforms 5
31
the state of physical networks such as highways and traffic, and the flow
of traffic that you can absorb by looking at the network?
32
Let us look at the demand side. As I said, after almost 30 years
people have discovered the Internet, and the reason is that finally the
exponential based on annual doubling has gotten to be of a point of
interest. That is, we speak of tens of millions rather than a few hundred
thousand or less than a million people as the network started in the
beginning. Going forward, the projections are 50% increases every year
that would mean a doubling every couple of years.
12000
10000
0
‘95 ‘96 ‘97 ‘98 ‘99 ‘00 ‘01 ‘02 ‘03 ‘04
15
33
The above is a growth curve that I did in 1995. One can see
there that the amount of population, at some point, is smaller than the
number of Internet connections. This is what happens when you have
one only data point and one exponent you can draw a straight line
through anything.
For instance, that says that there are more people connected to
the Internet in 2003 than there are people in the world. That is explained
by the fact that every dog and cat and light bulb has started to be
connected. So, you need to have even more connections than that.
G
rowt
h i
n h
ypevsrea
li
t y
W
WWbo
oks
, I
n f
o way
n
ews
pap
ersregul
a t
ion
I
n f
o way
I
n f
o w ay
spe c
ulat
ion
add i
c t
ion
“ho wgreatit’l
l c
onf
e r
e n
ces
be”( pol
iti
c i
a ns
l
a w
sui
ts
1
6
D
at
a f
romG
ordo
n’sWA
G
The WWW happened here as a kind of a big bang, and then we found
that books and newspapers picked that up and started the hyping
followed by conferences, and then we had info-way addiction. A problem
that is just being discussed now. Then info-way regulation is a big deal.
And followed, quite behind that are lawsuits.
34
The following are my two favorite inventions for that year,
decade, or the millennium. That is the computer itself and the transistor
followed by the integrated circuit without which computers would not be
very interesting and would not be where they are today.
Growth of microprocessor
performance
10000
Performance in Mflop/s
Cray T90
Cray Y-MP Cray C90
Supers
1000 Cray 2
Alpha
Cray X-MP RS6000/590
Alpha Micros
100 RS6000/540
Cray 1S
i860
10 R2000
1
80387
0.1 6881
8087 80287
0.01
80 82 86 88 90 92 94 96 98
19 19 19 19 19 19 19 19 19 21
35
The above graph shows that the growth of performance has been
exponential. We also see that the lower curve has come over the last 20
years up to today’s or modern supercomputers.
Bell’s Law of
Computer Class Formation
36
Another way of looking at that is the history of a portable computer of 20
years ago – it was the portable computer that you carried in a suitcase,
than we got the laptop that we have today, and now we are already
seeing the finger top computers. Then we have this contact lens
computer, and in 20 years we will inhale our computers.
1 0 0 Tb p s
$1 0 0 M
1 0 T bp s
1 Tb ps $ 10 M
1 0 0 G bp s
V o ice T ra ffic $1 M
1 0 G b ps M a x. S w itch S pe e d $ 1 00 K O C -7 68
OC -19 2
1 Gbps
O C -48
10 0 M bps O C-1 2
O C -3
10 M b ps T3
1 M bps
T1 1 9 97 B re ak p oin t
1 0 0 K b ps $ 1 00 K 5 6 KB
M a x. P o rt S p e ed In te rn e t T ra ffic
1 0 K b ps
1 K bps
1 00 bp s
1 0 bps
33
1970 1975 1980 1985 1990 1995 2000 2005 2010
37
This graph is a projection by Larry Roberts. The top line is voice
traffic. Note there is a crossover of the Internet traffic versus the voice
traffic that is occurring. The red line is really the evolution of link speed
and then the lower line is the internet traffic which is now projected to
grow at a rate of a factor of a 1000 every 5 years. So, that is double the
speed I talked about earlier. This is a mere doubling every year that gives
a factor of 10 every five years. So, this is getting a factor of a 1000 in 10
years which is actually growing at about 3 times that rate. This is
something that is likely to occur with the higher speed connections that
are put in place.
Cre ate ne w Lo w e r
s e rv ic e re s p o ns e tim e
Vo ic e !
36
Processing 10-100x
4x resolution (2K x 2K)
Very large, room sized displays
Very small watch-sized displays
Low cost, storage of one terabyte for personal use adequate
networking
Ubiquitous access = today’s fast LANs
38
cyberization, and the challenge will be interfacing platforms and
people.
39
So, in fact, if you live in cyberspace, the important thing is really having
ubiquitous fast connection. Maybe wireless is the key to all of that.
T h e N e x t C o n v e rg e n c e
P O T S c o n n e c ts to th e W e b
a .k .a . P h o n e -W e b G a te w a y s
W e b S e rv er
PSTN The
W eb
V o ic e to W E B
D a ta B a se
se
B rid g e
51
39
Two dimensional map of cyberspace
Communication
Infobases/Portals
Supply Chain
Procurement
Professional
Government
$2B+ **
Operations
Marketing
Financial
ERP
Internet Services
$170B*
Personal/Employee Data
Access
Web Hosting
Applications & Middleware
Computers & Operating Layer Software
Infrastructure Network Hardware/Protocols 55
$171B*
Transport
* University of Texas Center for Research in Electronic Commerce ** This market is not yest sized, estimated at $2B+,growing to $100B in 2002
40
While cyberspace should not be confused with the internet, the
term is often used to refer to objects and identities that exist largely
within the communication network it, so that a website, for example,
might be metaphorically said to "exist in cyberspace." According to this
interpretation, events taking place on the internet are not happening in
the locations where participants or servers are physically located, but "in
cyberspace".
41
Computer crime or cyber crime refers to any crime that involves
a computer and a network, where the computers may or may not have
played an instrumental part in the commission of the crime. Issues
surrounding this type of crime have become high-profile, particularly
those surrounding hacking, copyright infringement, child pornography,
and child grooming. There are also problems of privacy when confidential
information is lost or intercepted, lawfully or otherwise.
42
Computer viruses
Cyber stalking
Fraud and identity theft
Phasing scams
Information warfare
Spam
Fraud
43
by entering unauthorized instructions or using unauthorized
processes;
Altering, destroying, suppressing, or stealing output, usually to
conceal unauthorized transactions: this is difficult to detect;
Altering or deleting stored data;
Altering or misusing existing system tools or software packages, or
altering or writing code for fraudulent purposes. This requires real
programming skills and is not common.
44
Harassment
Drug trafficking
45
Cyber terrorism
Computer security
46
processes and mechanisms by which sensitive and valuable information
and services are protected from publication, tampering or collapse by
unauthorized activities or untrustworthy individuals and unplanned
events respectively.
Security by design
1. Trust all the software to abide by a security policy but the software
is not trustworthy (this is computer insecurity).
2. Trust all the software to abide by a security policy and the software
is validated as trustworthy (by tedious branch and path analysis
for example).
3. Trust no software but enforce a security policy with mechanisms
that are not trustworthy (again this is computer insecurity).
4. Trust no software but enforce a security policy with trustworthy
mechanisms.
47
approach number four is often based on hardware mechanisms and
avoids abstractions and a multiplicity of degrees of freedom, it is more
practical. Combinations of approaches two and four are often used in a
layered architecture with thin layers of two and thick layers of four.
Security architecture
48
The strategy is based on a coupling of special microprocessor
hardware features, often involving the memory management unit, to a
special correctly implemented operating system kernel. This forms the
foundation for a secure operating system which, if certain critical parts
are designed and implemented correctly, can ensure the absolute
impossibility of penetration by hostile elements. This capability is
enabled because the configuration not only imposes a security policy,
but in theory completely protects itself from corruption.
Secure coding
49
Within computer systems, two security models capable of
enforcing privilege separation are access control lists (ACL’s) and
capabilities.
50
Cyberspace is a global community of people using computers in
networks. In order to function well, the virtual communities supported
by the Internet depend upon rules of conduct, the same as any society.
Librarians and information technologists must be knowledgeable about
ethical issues for the welfare of their organizations and to protect and
advise users.
What is ethics? Ethics is the art of determining what is right or
good. It can also be defined as a general pattern or way of life, a set of
rules of conduct or moral code. Ethical guidelines are based on values.
The Association of Computing Machinery (ACM) is one national
organization which has developed a statement of its values. Every
member of ACM is expected to uphold the Code of Ethics and
Professional Conduct which includes these general moral imperatives:
1) Contribute to society and human well-being
2) Avoid harm to others
3) Be honest and trustworthy
4) Be fair and take action not to discriminate
5) Honor property rights including copyrights and patents
6) Give proper credit for intellectual property
7) Respect the privacy of others
8) Honor confidentiality.
The very nature of electronic communication raises new moral
issues. Individuals and organizations should be proactive in examining
these concerns and developing policies which protect liabilities. Issues
which need to be addressed include: privacy of mail, personal identities,
51
access and control of the network, pornographic or unwanted messages,
copyright, and commercial uses of the network. An Acceptable Use Policy
(AUP) is recommended as the way an organization should inform users of
expectations and responsibilities. Sample AUPs are available on the
Internet at gopher sites and can be retrieved by using Veronica to search
keywords "acceptable use policies" or "ethics."
The Computer Ethics, "Ten Commandments of Computing":
6 Not copy or use proprietary software for which you have not
paid.
52
6. Identify the potential CONSEQUENCES.
53
New Media Advertising Models
Site as the ad
Ads within sites
Banners
Buttons
Text Links
Product Placement
Social networking
VR Placements
Sponsorships
Advertorials
Interstitials
Pop-ups / Pop-under
Search engine optimization
Site as the ad
online games and Micro sites
Online games
Interactive online games specially designed to deliver
54
brand messages to players
Micro sites
Interactive miniature websites created specifically to be
part of a marketers integrated message campaign
Static Banners
Easy to produce
Universally accepted
Stale and boring
Click-through rate is not terribly high
Animated Banners
Rudimentary flip-book style movement (2 to 20 frames -- GIF
technology)
Higher click-through than static
Deliver more information
Eye-catching
Universal acceptance
Rich Media Banners
2 types
• HTML
• Proprietary code
Make a choice or insert data
55
HTML - universally accepted
Proprietary code - often require plug-ins to be downloaded; not always
accepted
Highest click-through rates
Sponsorships
Sponsor popular editorial features on sites
Maintain integration, it MUST make sense to the subject
matter being sponsored
Advertorials
56
A sponsorship or placement that looks more like an
article than an advertisement
Often have a higher response rate
Again, MUST deliver relevant content
Big in the healthcare and OTC drug world
Interstitials
ISP start-up screens are static interstitials
Usually little competition for attention
Meta-tags
Special HTML insertions which provide information about
a Web page
Often a list of keywords
Example of meta-tags for www.Disney.com
Click-through versus Impressions
Banners and buttons are getting fewer click-through
57
So should advertisers lose them? NO
Do not underestimate the value of banners as Brand
Builders
Cumulative impressions
Billboards of the Information Superhighway
Buying an online ad
Determine your goal(s)
Select your site
Determine payment method
Negotiate price
Run the ad
Goals
Similar to those of the site itself
Traffic building (Channel Churner)
E-commerce (eBazaar)
Lead generation (Matchmaker)
Brand building (Digital Destination)
Payment schedules
CPM
58
CPC - Cost per click / click-through
PPS - Pay per sale
PPV - Pay per viewer
PPP - Pay per purchase
Flat fee
Hybrid
Affiliate agreements/networks
Affiliate arrangements
Commission
Pay per Click
Qualified lead
Flat rate per sale
% of Sale
Affiliate networks
Clicks Link - source of multiple affiliate networks
59
Abstract:
The Internet is probably the most effective marketing tool that
has ever existed. Internet marketing has made business capable to serve
potential customers as well as provide after sale services. Customer
relationship marketing has got new meaning through e - marketing.
60
There are three basic forms of email marketing.
A. Direct email
61
C. Advertise through other e-newsletter
62
2. Privacy issues
3. Attachments
Try to avoid large attachments while mailing. If you want to promote
information try to convert into Newsletter. E-newsletter is a
tool where you link important web pages under good heading. While
reading, if your customers find important to read, they will open those
pages.
63
7. Don’t mail any illegal or fake information.
8. Go for "Opt-in" email marketing. However it is not the free but it
works. Bullet mail, Hotmail and Targ – It are well known opt in email
marketer.
64
BUYING AND SELLING ADVERTISING ON WEB
With some advertising payment schemes, you will be charged only if the
customer performs an action predetermined by you and the Web site
managers. Pay-per-performance fees include pay-per-click, pay per load
and pay-per sale. When using the pay per click method, you pay the host
according to the number of click-troughs to your site. Pay per lead
means that you pay the host for every lead generated from the
advertisement, and pay per sale means that you pay the host for every
sale resulting from a click through.
Public relations (PR) keep your customers and your company’s employees
current on the latest information about products, services and internal
and external issues such as company promotion and consumer
reactions. It includes communicating with your consumers and
employees through press releases, speeches, special events,
presentations and e-mails.
65
Chat sessions are one method of learning what people think about your
company or products. A bulletin board on your Web site will enable
people to post comments, and you can also involve consumers by
organizing a special event or function on your Web site. Brand awareness
and increased exposure can result from attending and participating in
trade shows and exhibitions at which you can speak with prospective
customers.
66
A CRM system keeps records of customers behavior to provide
fast and effective service and, when necessary, to implement corrective
measures. Customers should feel confident that their transactions are
secure and that products are reliable and will be received on time.
Customers should also be able to conduct transactions and get answers
to their questions through a call center. Call centers house customer-
service representatives who can be reached by an 800 number or
through e-mail, online text chatting or real-time voice communications.
67
In fact, all of he online service firms now offer internet access as
a primary service. The internet is a vast and burgeoning global web of
computer networks.
Internet usage has surged with the recent development of the user-
friendly work wide web and web browser software such as Netscape
Navigator, Microsoft internet Explorer, and Mosaic. Now even novices can
surf the Net and experience fully integrated text, graphics, images, and
sound. Users can send e-mail, exchange views, stop for products and
access news, food recipes, art, and business information. The internet
itself is free, although individual users usually must pay a commercial
access provider to be holed up to it.
68
PROMOTIONS
E-BUSINESS ADVERTISING
69
This work attempts to outline the requirements for
architectures which can fully visualize WWW, and proposes solutions to
the issues raised by these requirements. While much further study needs
to be done, this work is meant to serve as a starting point for an
understanding of the subtleties of wide-area, distributed, visualized data
sets.
70
• William Gibson. Neuromancer: 20th
Anniversary Edition. New York: Ace Books,
2004.
• Ippolito, Jon (December 1998 – January
1999). "Cross Talk: Is Cyberspace Really a Space?” Art byte: 12 – 24.
• Irvine, Martin. "Postmodern Science
Fiction and Cyberpunk", retrieved 2006-07-19.
• Oliver Grau: Virtual Art. From Illusion to Immersion, MIT-Press,
Cambridge 2003. (4 Auflagen).
• Sterling, Bruce. The Hacker Crackdown: Law and Disorder On the
Electronic Frontier. Spectra Books, 1992.
• Zhai, Philip. Get Real: A Philosophical
Adventure in Virtual Reality. New York: Rowman & Littlefield Publishers,
1998.
• David Koepsell, the Ontology of
Cyberspace, Chicago: Open Court, 2000.
WEB LINKS
www.google.com
71