Free Essay

Marketing on the Web

In: Business and Management

Submitted By kalunga
Words 3674
Pages 15
1- Briefly explain Electronic Cash

A system that allows a person to pay for goods or services by transmitting a number from one computer to another. Like the serial numbers on real dollar bills, the digital cash numbers are unique. Each one is issued by a bank and represents a specified sum of real money. One of the key features of digital cash is that, like real cash, it is anonymous and reusable. That is, when a digital cash amount is sent from a buyer to a vendor, there is no way to obtain information about the buyer. This is one of the key differences between digital cash and credit card systems. Another key difference is that a digital cash certificate can be reused.

2- Briefly explain ActiveX Control

ActiveX control is a control using Microsoft ActiveX technologies. An ActiveX control can be automatically downloaded and executed by a Web browser. ActiveX is not a programming language, but rather a set of rules for how applications should share information. Programmers can develop ActiveX controls in a variety of languages, including C, C++, Visual Basic, and Java. An ActiveX control is similar to a Java applet. Unlike Java applets, however, ActiveX controls have full access to the Windows operating system. This gives them much more power than Java applets, but with this power comes a certain risk that the applet may damage software or data on your machine. To control this risk, Microsoft developed a registration system so that browsers can identify and authenticate an ActiveX control before downloading it. Another difference between Java applets and ActiveX controls is that Java applets can be written to run on all platforms, whereas ActiveX controls are currently limited to Windows environments.

3- Briefly explain Firewalls
A firewall is a software or hardware device that protects your computer from internet dangers, such as (among many, many others) viruses, spyware, and hackers. Think of it like a thick stone castle wall - no one can get through it except at heavily guarded gates. Any data going from the internet to your computer must first pass through the firewall, where it is carefully scanned for threats. If the firewall detects any dangers, it blocks the data. Firewalls close off all of the unused ports, channeling all internet traffic through only a handful of open ports. Furthermore, the firewall filters all data moving through these ports, meaning that it examines all the data packets for the proper security authorization. Any data that fails to meet these security requirements is not allowed through the firewall onto your computer. Firewalls also make sure that any personal or sensitive information leaving your computer is protected. It does this by encrypting the information. The information can be decrypted when it arrives at its legitimate destination. Any hackers or spyware that intercept the information on the way, however, gets only scrambled data that it can't read or use.
4- Briefly explain Cookies A cookie is a small file that is stored on a client's computer. That means that whenever a user visits your web site, you can secretly stash a file with information on their hard drive. This file can contain almost any information you want - including user info, site statistics, or even your own name, for those with vanity problems. We can see how this could potentially be an easy target for hackers because of the possibilities it opens up. One security trick to prevent abuse is that cookies can only be accessed by the domain that created them. This means that, for example, ASP101.com can only access (read from and write to) cookies that ASP101.com created. Generally, this is not a problem at all, but what if you work on two different sites on different domains that share user info, that is stored in cookies? You could, of course, just duplicate user info, but what if you want the user to only have to register on one site, and be automatically registered on the other? Or if they share the same user database, and you want to auto-login users? Sharing cookies across domains is ideal for this situation.

5- Briefly explain Enterprise Application Integration and database
Enterprise Application Integration) Hooking up applications within an enterprise. EAI software acts as a hub that translates data and messages between different applications. The need for EAI arose as companies sought to exchange information between separate 'silos' of automation, such as ERP and CRM systems. EAI is regarded as more tightly coupled and inflexible than emerging alternatives based on web services. Enterprise Application Integration Refers to various techniques that are used to make information systems work together in the large enterprise. For example, when companies acquire other companies, disparate systems have to be integrated. Within a company, newly developed systems must work with legacy systems, and separate systems developed independently in the past must often be tied together to provide required information and services. When information systems are integrated, business intelligence can be gleaned across the entire enterprise.

6- Briefly explain Magnetic Strip Cards
A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called swipe card or magstripe, is read by physical contact and swiping past a magnetic reading head. A number of International Organization for Standardization standards, ISO/IEC 7810, ISO/IEC 7811, ISO/IEC 7812, ISO/IEC 7813, ISO 8583, and ISO/IEC 4909, define the physical properties of the card, including size, flexibility, location of the magstripe, magnetic characteristics, and data formats. They also provide the standards for financial cards, including the allocation of card number ranges to different card issuing institutions.

Briefly explain Smart Cards
A small electronic device about the size of a credit card that contains electronic memory, and possibly an embedded integrated circuit (IC). Smart cards containing an IC are sometimes called Integrated Circuit Cards (ICCs). Smart cards are used for a variety of purposes, including: Storing a patient's medical records Storing digital cash Generating network IDs (similar to a token) To use a smart card, either to pull information from it or add data to it, you need a smart card reader, a small device into which you insert the smart card.

7- Briefly explain Return on Investment (ROI)
A performance measure used to evaluate the efficiency of an investment or to compare the efficiency of a number of different investments. To calculate ROI, the benefit (return) of an investment is divided by the cost of the investment; the result is expressed as a percentage or a ratio. In finance, rate of return (ROR), also known as return on investment (ROI), rate of profit or sometimes just return, is the ratio of money gained or lost (whether realized or unrealized) on an investment relative to the amount of money invested. The amount of money gained or lost may be referred to as interest, profit/loss, gain/loss, or net income/loss. The money invested may be referred to as the asset, capital, principal, or the cost basis of the investment. ROI is usually expressed as a percentage.

8- Briefly explain pros and cons of PayPal
PayPal is without doubt the most widely-known and widely-used payment processor for Internet marketing. They offer a wide range of benefits, which makes them a very popular choice, but there are a few drawbacks to using PayPal, too. As payment systems go PayPal is pretty easy to set up compared to standard merchant accounts. This is one of the major reasons why so many people choose to use them. They don’t require you to fill out and sign a ton of paperwork, they don’t do a credit check, and the money you earn can be instantly available for withdrawal at an ATM if you have their debit card.

9- Briefly explain Asymmetric Encryption System
The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message. One answer is asymmetric encryption, in which there are two related keys--a key pair. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key.

This means that you do not have to worry about passing public keys over the Internet (the keys are supposed to be public). A problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the content of the message.
Briefly explain Symmetric Encryption System Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key.

10 - Briefly explain Telnet Telnet is a system for logging onto a remote computer through the Internet. There are lots of reasons to do this. Telnet allows you to access computers all over the world and use the resources you find on those computers. You could use telnet to access Brand X while on vacation to check your mail. You can use it to play games, to join chat lines, or you can use it to access and modify web pages if you have a web site. Telnet does this by simulating a UNIX terminal connected to the other computer via the Internet. So what you see in Telnet is the same thing as what you would see if you were at a terminal hooked directly to the other computer.
Briefly explain FTP
File Transfer Protocol (FTP) is a standard network protocol used to copy a file from one host to another over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server. FTP users may authenticate themselves using a clear-text sign-in protocol but can connect anonymously if the server is configured to allow it. The first FTP client applications were interactive command-line tools, implementing standard commands and syntax. Graphical user interface clients have since been developed for many of the popular desktop operating systems in use today

1- Briefly explain Electronic Cash

A system that allows a person to pay for goods or services by transmitting a number from one computer to another. Like the serial numbers on real dollar bills, the digital cash numbers are unique. Each one is issued by a bank and represents a specified sum of real money. One of the key features of digital cash is that, like real cash, it is anonymous and reusable. That is, when a digital cash amount is sent from a buyer to a vendor, there is no way to obtain information about the buyer. This is one of the key differences between digital cash and credit card systems. Another key difference is that a digital cash certificate can be reused.

2- Briefly explain ActiveX Control

ActiveX control is a control using Microsoft ActiveX technologies. An ActiveX control can be automatically downloaded and executed by a Web browser. ActiveX is not a programming language, but rather a set of rules for how applications should share information. Programmers can develop ActiveX controls in a variety of languages, including C, C++, Visual Basic, and Java. An ActiveX control is similar to a Java applet. Unlike Java applets, however, ActiveX controls have full access to the Windows operating system. This gives them much more power than Java applets, but with this power comes a certain risk that the applet may damage software or data on your machine. To control this risk, Microsoft developed a registration system so that browsers can identify and authenticate an ActiveX control before downloading it. Another difference between Java applets and ActiveX controls is that Java applets can be written to run on all platforms, whereas ActiveX controls are currently limited to Windows environments.

3- Briefly explain Firewalls
A firewall is a software or hardware device that protects your computer from internet dangers, such as (among many, many others) viruses, spyware, and hackers. Think of it like a thick stone castle wall - no one can get through it except at heavily guarded gates. Any data going from the internet to your computer must first pass through the firewall, where it is carefully scanned for threats. If the firewall detects any dangers, it blocks the data. Firewalls close off all of the unused ports, channeling all internet traffic through only a handful of open ports. Furthermore, the firewall filters all data moving through these ports, meaning that it examines all the data packets for the proper security authorization. Any data that fails to meet these security requirements is not allowed through the firewall onto your computer. Firewalls also make sure that any personal or sensitive information leaving your computer is protected. It does this by encrypting the information. The information can be decrypted when it arrives at its legitimate destination. Any hackers or spyware that intercept the information on the way, however, gets only scrambled data that it can't read or use.
4- Briefly explain Cookies A cookie is a small file that is stored on a client's computer. That means that whenever a user visits your web site, you can secretly stash a file with information on their hard drive. This file can contain almost any information you want - including user info, site statistics, or even your own name, for those with vanity problems. We can see how this could potentially be an easy target for hackers because of the possibilities it opens up. One security trick to prevent abuse is that cookies can only be accessed by the domain that created them. This means that, for example, ASP101.com can only access (read from and write to) cookies that ASP101.com created. Generally, this is not a problem at all, but what if you work on two different sites on different domains that share user info, that is stored in cookies? You could, of course, just duplicate user info, but what if you want the user to only have to register on one site, and be automatically registered on the other? Or if they share the same user database, and you want to auto-login users? Sharing cookies across domains is ideal for this situation.

5- Briefly explain Enterprise Application Integration and database
Enterprise Application Integration) Hooking up applications within an enterprise. EAI software acts as a hub that translates data and messages between different applications. The need for EAI arose as companies sought to exchange information between separate 'silos' of automation, such as ERP and CRM systems. EAI is regarded as more tightly coupled and inflexible than emerging alternatives based on web services. Enterprise Application Integration Refers to various techniques that are used to make information systems work together in the large enterprise. For example, when companies acquire other companies, disparate systems have to be integrated. Within a company, newly developed systems must work with legacy systems, and separate systems developed independently in the past must often be tied together to provide required information and services. When information systems are integrated, business intelligence can be gleaned across the entire enterprise.

6- Briefly explain Magnetic Strip Cards
A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called swipe card or magstripe, is read by physical contact and swiping past a magnetic reading head. A number of International Organization for Standardization standards, ISO/IEC 7810, ISO/IEC 7811, ISO/IEC 7812, ISO/IEC 7813, ISO 8583, and ISO/IEC 4909, define the physical properties of the card, including size, flexibility, location of the magstripe, magnetic characteristics, and data formats. They also provide the standards for financial cards, including the allocation of card number ranges to different card issuing institutions.

Briefly explain Smart Cards
A small electronic device about the size of a credit card that contains electronic memory, and possibly an embedded integrated circuit (IC). Smart cards containing an IC are sometimes called Integrated Circuit Cards (ICCs). Smart cards are used for a variety of purposes, including: Storing a patient's medical records Storing digital cash Generating network IDs (similar to a token) To use a smart card, either to pull information from it or add data to it, you need a smart card reader, a small device into which you insert the smart card.

7- Briefly explain Return on Investment (ROI)
A performance measure used to evaluate the efficiency of an investment or to compare the efficiency of a number of different investments. To calculate ROI, the benefit (return) of an investment is divided by the cost of the investment; the result is expressed as a percentage or a ratio. In finance, rate of return (ROR), also known as return on investment (ROI), rate of profit or sometimes just return, is the ratio of money gained or lost (whether realized or unrealized) on an investment relative to the amount of money invested. The amount of money gained or lost may be referred to as interest, profit/loss, gain/loss, or net income/loss. The money invested may be referred to as the asset, capital, principal, or the cost basis of the investment. ROI is usually expressed as a percentage.

8- Briefly explain pros and cons of PayPal
PayPal is without doubt the most widely-known and widely-used payment processor for Internet marketing. They offer a wide range of benefits, which makes them a very popular choice, but there are a few drawbacks to using PayPal, too. As payment systems go PayPal is pretty easy to set up compared to standard merchant accounts. This is one of the major reasons why so many people choose to use them. They don’t require you to fill out and sign a ton of paperwork, they don’t do a credit check, and the money you earn can be instantly available for withdrawal at an ATM if you have their debit card.

9- Briefly explain Asymmetric Encryption System
The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message. One answer is asymmetric encryption, in which there are two related keys--a key pair. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key.

This means that you do not have to worry about passing public keys over the Internet (the keys are supposed to be public). A problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the content of the message.
Briefly explain Symmetric Encryption System Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key.

10 - Briefly explain Telnet Telnet is a system for logging onto a remote computer through the Internet. There are lots of reasons to do this. Telnet allows you to access computers all over the world and use the resources you find on those computers. You could use telnet to access Brand X while on vacation to check your mail. You can use it to play games, to join chat lines, or you can use it to access and modify web pages if you have a web site. Telnet does this by simulating a UNIX terminal connected to the other computer via the Internet. So what you see in Telnet is the same thing as what you would see if you were at a terminal hooked directly to the other computer.
Briefly explain FTP
File Transfer Protocol (FTP) is a standard network protocol used to copy a file from one host to another over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server. FTP users may authenticate themselves using a clear-text sign-in protocol but can connect anonymously if the server is configured to allow it. The first FTP client applications were interactive command-line tools, implementing standard commands and syntax. Graphical user interface clients have since been developed for many of the popular desktop operating systems in use today…...

Similar Documents

Free Essay

Web Campaign

...WEB CAMPAIGN Objectives: * Drive targeted traffic to the Facebook page and increase “Likes” of Social Magazine by 300 in a 6 month period. * Increase followers on Twitter * Develop customer relations through social media platforms like Twitter and Facebook * Establish the company in local search * Increase the customer database by 20% each week. Through the Web Campaign we aim to use the company’s Facebook page as a dominant source of information since the company’s website is currently under construction. Through this campaign, our aim is to spread awareness of the magazine, attract new readers, and keep current readers from switching over to other magazines. This will be done in the following ways: 1. Content Teasers Without giving away the whole story, social media sites offer publishers a chance to give readers a glimpse of what’s in their current issues, with the hopes of either redirecting readers to a web version of their print publication, or to a magazine stand to purchase a hard copy. Either way, headline glimpses are a great way to hook readers who might otherwise have missed a story in which they have interest. 2. Content Enhancement Since Social magazine does not offer digital versions of their print publications, social media sites let magazine publishers take advantage of the benefits of digital publishing and the large audiences who have become faithful social media users. Photo galleries, video sidebars and the many other......

Words: 1357 - Pages: 6

Premium Essay

Marketing on the Web

...Running Head: MARKETING ON THE WEB In today’s business industry a company’s marketing strategy is vital in order for that company to reach its target market. When the World Wide Web was created it gave companies a way to new ways not only to meet its target markets but also potential markets all over the world. Marketing on the web can provide a company with many benefits that can expand knowledge of the company, its brand, and products and services it offers. A company decides how to market its web page by first figuring out how it will group itself based on do they provide a product or service to the customer or are they based on what the customer wants. Product-based marketing strategies arrange the products on the web page the same as the product design. Customer-based strategies lets the company think as if they were the customer and design the page according to what they think is the customers’ needs. Choosing a marketing strategy for the web page thus entails a company will reach its market segments targeted. To reach a target market a company must first find their market then segment them accordingly. Although there are many types of market segments companies can choose to group consumers in order to reach their target market effectively, on the Web there are three main segments that used are demographic, geographic, and psychographic segmentations. In demographic segmentation, consumers are categorized according to gender, age, income, occupation, education,......

Words: 1256 - Pages: 6

Premium Essay

The Nine Elements of Effective Web Marketing

...Elements of Effective Web Marketing Introduction When it comes to web marketing, it’s all about ‘conversion’ - how many of your site visitors you can convert into a lead or a sale. We suggest that companies lacking a well conceived and well implemented website conversion strategy, are failing to leverage the most important marketing medium of the twenty-first century. The Nine Elements: 1. Identification of site goals 2. Clearly defined target audience 3. Compelling message 4. Site structure and information flow 5. Calls to action 6. Lead capture mechanism 7. Supporting graphic design 8. Site promotion 9. Testing, measurement, and refinement 1. Site Goals Identifying goals is critical for two reasons. First, goals help you to determine what should or shouldn’t be included on your site. You use your goals document as a set of criteria for determining site content, simplifying the design process, and removing the ‘political element’ that plagues some companies. Secondly, having specific goals allows you to measure the effectiveness of your site after it’s completed and live. That’s key because if you can’t measure site performance, then improving it becomes much more problematic. So you’ll find that measurement and improvement are the keys to that ROI you’re looking for. The bottom line on goal setting is that if you never identify the target, then you can’t expect to hit it. 2. Target Audience A foundation of effective web marketing is the ‘who’.......

Words: 1266 - Pages: 6

Premium Essay

Web Marketing Mix

...BASE I have to say my dream job is to work from home and I could easily use Internet Marketing to advertise, research, sell, and make money. Two components for a Home base would be setting up a website and search engine marketing. Both components would be beneficial in getting your business out to the public. If I am ever looking for a business or information, the first thing I do is perform a Google search. Once the search is done, I go to a website. Setting up a website for a home business allows potential customers access to your business and what you offer. Once a website is set up, make sure you list your business in every search engine possible. It seems like most people take chances on what they find on the internet, and if Google or Yahoo shows your information, you have a chance for more views that means more customers that turns into more money. Without a website, you have nothing for the potential customer to go on. Your website needs to give a brief history of what your business is about and should give images that will attract your target audience. This means to research the likes and dislikes of potential customers. You want to know what will attract them and what may cause them to turn away. A good example is Diamond Candles at www.diamondcandles.com. This is a website that was created from a home base business that has now turned into something bigger. Open Source Web Design is a great way to start with many free templates. First, set up your domain......

Words: 763 - Pages: 4

Premium Essay

Web Marketing

...Web Design & Development Proposal For Cybertel USA From: Sk.Tariqual Islam Justaio Technologies info@justaio.com Web Design & Development Proposal May 7, 2014 JUSTAIO TECHNOLOGIES Introduction Justaio Technologies is pleased to submit a proposal for the web site development of Cybertel USA This proposal describes the technology, services, terms, and schedule for the web site development project. In the digital age, a web site frequently serves as your business or organization’s front entrance through which many customers will pass. Our mission is to give you a professional on-line presence that will generally enhance your organization’s image and branding, as well as move prospects through the sales process. About Us JUSTAIO Technologies is a top provider of professional web site design and development. We have over 3 years of experience in the web development field with a long list of satisfied customers. We will be happy to provide additional references upon request.We have a clear understanding of the web site development requirements, and we have the knowledge, skills and experience to successfully complete the web site project. Our Team & Leadership Sk.Tariqual Islam (Project Manager) Sk Tariqual Islam, well-known for his strategic imagination in aligning business goals with creative strategy and expression, has successfully led brand design and marketing engagements for a variety of......

Words: 968 - Pages: 4

Premium Essay

Web Advertising

...Web Advertising Web advertising, not to mention the Internet itself, finds itself in a stage of relative infancy and therefore provides marketers with novel challenges and situations which need to be dealt with caution . The realm of Web advertising is unchartered terri tory! In terms of South Africa, the country finds itsef somewhat behind technologically. However, this may not prove to be a disadvantage as the uncertain nature of Web advertising may make a policy of 'watching and learning' most viable. What implications will this new technology have for marketing? What is the nature of Web advertising? How can a business use the medium effectively ? Where is all this going ? These questions appear to be most pertinent in the process of understanding interact ive marketing on the Internet. The qualified opinion of John Matthee, a Web site designer employed by Adept Internet (an Internet service provider), was sought in accumulation of a large sum of the following data. This seems appropriate as the novelty of Web advertising at this stage h as led to generral lack of academic data in the practicalities of advertising via this medium. 2) THE INTERNET: AN INTRODUCTION 2.1) Original development of the Internet What was originally created by the US military to provide a secure means of communication in case of nuclear war, which has now become known as the Internet, has metamorphosed into the strategic global communications tool of our era. The end......

Words: 5878 - Pages: 24

Premium Essay

Web 3.0

...The Evolution Of Web 3.0 Marta Strickland Nov 1, 2007 © 2007, Organic, Inc. All Rights Reserved. 1 THE GREAT DEBATE 2 buzz What is Web 3.0? People can not agree upon… the name the definition the existence buzz bu zz buzz buzz buzz buzz “Once the ‘point ohs’ come out, there’s no stopping them. What the heck. I say we should start Web 4.0” Sonja Hyde-Moyer, SHM Project “Just as 'dot com' is the term for the first era of the Web, and 'web 2.0' the second, there will be a new term that bubbles up at the right time to describe the next era” Richard MacManus, ReadWriteWeb “The Semantic Web (or Web 3.0) promises to ‘organize the world’s information’ in a dramatically more logical way than Google can ever achieve with their current engine design.” Marc Fawzi, Evolving Trends “Web 2.0 is a marketing term, and I think you've just invented Web 3.0” Eric Schmidt, CEO of Google “If Web 2.0 was so hot, how about Web 3.0? This has been a recurrent theme of would-be meme-engineers who want to position their startup as the next big thing. ” Tim O’Reilly, O’Reilly Radar 3 HOW THE WEB EVOLVES 4 The Theory of Biological Evolution In the beginning… • • • the world was full of genetic code this code formed into vessels of information the basic unit of biological information was known as: the gene • • • • the gene could store, duplicate, and transmit data with duplication came interpretation and mutation with mutation came specialization......

Words: 1309 - Pages: 6

Premium Essay

Web and Email Marketing

...(w) WORK EXPERIENCE Web Applications Developer (Consultant) Thermo Fisher Scientific (Life Technologies) - Fremont, CA - February 2014 to Present Responsibilities Working in the Remedy Queue as an applications support engineer capacity to resolve IT trouble tickets for the Array Manufacturing Support group. Installed ColdFusion 11 on a Red-Hat Unix system to upgrade a mission critical CRM system (http://vss.appliedbiosystems.com ) Acting as steward of other in-house developed systems in Cold Fusion. Participating in regular agile sprint cycle meetings in my capacity as reports developer for the OligoInc group. Skills Used ColdFusion 8-11. Windows XP, Professional and RedHat UNIX. Oracle 11g Crystal Reports 10, Visual Studio 10, VB.NET, C#. ASP.NET IT Applications Developer Alliance Analytical - Fremont, CA - September 2013 – September 2014 Responsibilities Maintained and enhanced coldfusion backend of components that connected to SQL Server 2008 database of in-house CRM system. Customized Adobe Flex components in the front end as required. Integrated the contacts data of the database with an external SMTP provider by building a web service of the data that fed into the third party API to render email broadcasts data. Maintained web site at http://www.aaisolutions.com . Web Applications Developer (Consultant) Life Technologies - Pleasanton, CA - February 2013 to August 2013 Responsibilities Created a web interface to process......

Words: 982 - Pages: 4

Free Essay

Web 236

...Berry’s Bug Blaster Web Evaluation Insert student name here WEB/236 Web Design I University of Phoenix Insert name of professor Insert date due Berry’s Bug Blaster Web Evaluation The website which was developed for Berry’s Bug Blaster’s is intended to be an informative site for the company’s pest control services. The site contains the up-to-date contact information and features all of the current advertised specials and promotions. Also included is a detailed list of the pests the company handles as well as the current methods used in all services. The intended audience is directed at customers who are currently dealing with pests, or have dealt with pest control problems in the past. Berry’s attempts to attract customers who are in need of their specialty services by offering promotional pricing and a detailed step by step process in which they will make all potential customers place of residence pest free. [Is this regional?] Berry’s Bug Blasters’ website has several goals: 1. Bring in new customers by having a web presence when pest control companies are searched using search engines 2. Be easily found when previous customers need assistance with a new issue 3. Inform customers of available services 4. Provide customers with contact and address information as well as a way to contact the company directly through the website. [Goals End here .. the following items are evaluation points. This belongs in strengths and weaknesses] 5. The......

Words: 2686 - Pages: 11

Free Essay

Web Server

...A web server is a crucial element in most company’s infrastructure. Every corporate company has to have a web presence. Some companies use it for marketing, some use it for sales, and some use it just to share information. It doesn’t matter why they use it, because they need it either way. Most customers want to check out products online before they decide what they want. Computers provide an easy and flexible way to research for the best products that are available for the customer. Depending on what you are going to use your web server for, you have to select an appropriate solution for yourself that will satisfy your needs. There is no “clear cut” way to create and configure a web server. If you are looking for the answer: “Ok! This is the best web server!” You are out of luck. I wish there was an easy way to figure this stuff out, but there are many questions to answer and needs to satisfy before you can declare that you have a great web server. There is a lot of information out there that will “help” you chose a solution for your company or organization. Unfortunately, I think in this case there is a little too much information available and it could be overwhelming. There is a lot of biased information available on the net. Some people say Apache is better than IIS, but it really depends on what your needs are. If you have your own company, you have to sit down with your IT staff and marketing staff and preferably every member of your company to come up with a......

Words: 1165 - Pages: 5

Premium Essay

Web 2.0

...Gaurav Mangla Taniya Biswas Web 2.0 MIS Project Report Submitted by: PGP27271 Ankit Jain PGP27285 Tejas Choudhari PGP27286 D. Jhansi PGP27287 Amit Deshpande PGP27288 Gaurav Mangla PGP27327 Taniya Biswas Section E Group 5 25-03-2012 SUBMITTED TO: PROF ASHWANI KUMAR Web 2.0 Group 5 Table of Contents 1. Pre-Web 2.0 .................................................................................................................................. 3 2. Web 2.0 ......................................................................................................................................... 5 3. Applications of Web 2.0 ................................................................................................................. 5 3.1 Marketing ................................................................................................................................ 5 3.2 Pedagogy ................................................................................................................................. 7 3.2.1 Case Study on Classroom 2.0 ............................................................................................. 8 3. Web 2.0 Business Models .............................................................................................................. 9 3.1 Case Study - Facebook ........................................................................................................... 10 4. Web 2.0 in Businesses as......

Words: 5885 - Pages: 24

Premium Essay

Web Design

...Marketing Marketing on the web includes more than just displaying your services and locations and providing hours and contact information. Kudler’s current site is more of a place holder on the web than an advert for their services. The current marketing strategy consists of a few sections describing some of the focus that Kudler has towards specialty and premium products. The method of collecting feedback is to direct users to a survey. The survey is located on the main menu and is designed to make the user immediately leave their site. The nine question survey is a sliding scale of radio buttons to answer each question between Very Strongly Agree and Very Strongly Disagree. The page consists of a top and bottom header with a black background and as alternating stark white and dark gray stripes wide enough to house each question. The page is designed to expand the background to fill the whole page regardless of the size of the browser window. For users with higher resolutions the page is garish and not pleasing to the eyes. Outside of the survey there is a link to a News section at the bottom of the page with their About and Locations menu. The link is easy to overlook and consists of a small blurb about a new frequent shoppers program. Aside from underrating the draw and possibilities of a News section the presentation of the frequent shoppers program with no details or other resources, such as a link to page describing its benefits, leaves the News section a......

Words: 1352 - Pages: 6

Premium Essay

Web Design

...Integration…………………………………………………………10 4.17.7 Marketing and Affiliate Relationships…………………………………..10 4.17.8 Metrics……………………………………………………………………..10 4.17.9 Other Considerations…………………………………………………….10 4.0 WIREFRAME…………………………………………………………………………11 5.17 Site Map…………………………………………………………………………….11 5.18 Process Flow………………………………………………………………………12 5.19 Home Page Lay……………………………………………………………………13 5.20 Search Result(s) Page Layout…………………………………………………...13 5.21 Shopping Cart Page Layout……………………………………………………...13 5.22 Checkout Page Layout …………………………………………………………..13 5.0 TESTING SCENERIO…………………………………………….........................14 6.0 REFERENCES………………………………………………………......................14 7.0 SIGN-OFF.........................................................................................................15 REVISION RECORD REV | DESCRIPTION OF CHANGE | APPROVAL AND DATE | A | INITIAL RELEASE | 06-16-2012 | | | | | | | 1.0 OVERVIEW 2.1 Company Information Omaha Steaks is a family business that has been around since 1917. Omaha Steaks markets, manufactures, and distributes a wide variety of premium steaks, red meats, poultry and other gourmet foods. These products are custom cut and packaged to serve various markets. (Omaha Steaks 2012) 2.2 Site Goal DarkTower consultation, under contract with Omaha Steaks has integrated with their Web design team to determine the existing......

Words: 2592 - Pages: 11

Free Essay

Web 2.0

...Web 2.0 XBIS/219 Web 2.0  How would you describe Web 2.0 to someone who has not taken a course in information systems? What are the advantages and disadvantages of Web 2.0? How has Web 2.0 impacted business? The best way to explain Web 2.0 to someone lacking the knowledge thereof, should first understand that Web 2.0 is not a new type of web, it is more of an enhancement of the web experience by a vast collection of information technologies and applications that allows web users to interact socially, collaboratively, and more or less the ability to participate with ease, as these technologies and applications encourage users to do so. Web 2.0 allows Web users to be a part of the development and growth of different websites and the web, instead of just visiting a website and browsing through its information. Different applications and information technologies include Wikis, Mashups, Tagging, Blogs and blogging abilities, Podcasting and video uploading, etc (R. Kelly Rainer & Turban,  2009). A few disadvantages of Web 2.0 is the fact that communication and sharing of information has now become unrestricted. This means that copyrighted material caqn now be infringed upon and even altered. Web 2.0 has made it to where users are more dependent on its technologies for research and information, socializing, etc. There are also a lot of unsecure websites that use Web 2.0 technologies and that poses a lot of threats as well, including accounts being hacked, spam,......

Words: 411 - Pages: 2

Premium Essay

Web Marketing

...Banking  | | 2.4 | Draft Guideline of Green Banking in Bangladesh | | 2.5 | Green Banking In Bangladesh | | 2.6 | Roles of Green Banking | | 2.7 | Green Banking Practices | | 2.8 | Green Banking Products and Services | | 2.9 | Prospects of Green Banking  | | | Chapter 3: Bangladesh Bank Policy Guidelines for Green Banking | | 3.1 | Bangladesh Bank's Earlier Initiatives | | 3.2 | Adopting Green Banking Policy | | 3.3 | Phase-I | | 3.3.1 | Policy Formulation and Governance | | 3.3.2 | Incorporation of Environmental Risk in CRM | | 3.3.3 | Initiating In-house Environment Management | | 3.3.4 | Introducing Green finance | | 3.3.5 | Creation of Climate Risk Fund | | 3.3.6 | Introducing Green Marketing | | 3.3.7 | Online Banking | | 3.3.8 | Supporting Employee Training, Consumer Awareness and Green Event | | 3.3.9 | Disclosure and Reporting of Green Banking Activities | | 3.4 | Phase-II | | 3.4.1 | Sector Specific Environmental Policies | | 3.4.2 | Green Strategic Planning | | 3.4.3 | Setting up Green Branches | | 3.4.4 | Improved In-house Environment Management | | 3.4.5 | Formulation of Bank Specific Environmental Risk Management Plan and Guidelines | | 3.4.6 | Rigorous Programs to Educate Clients | | 3.4.7 | Disclosure and Reporting of Green Banking Activities | | 3.5 | Phase-III | | 3.5.1 | Designing and Introducing Innovative Products | | 3.5.2 | Reporting in Standard Format with......

Words: 1061 - Pages: 5