One of the central points in this module is how eBusiness uses technology as an enabler.
We also discussed the devices and software the client may use, and some of the technical and non-technical
considerations that an eBusiness architect needs to be addressed:
Having completed this module, you should now be able to:
Identify the required network and security technologies required for eBusiness
Describe the use of a database in an eBusiness context
Identify the considerations for selecting or building a server
List the considerations for the client-end of eBusiness
Explain the use of search agents in eBusiness applications
Define the differences between push and pull technologies
Describe the characteristics of Intranets, Extranets, and VPNs
Outline important Web site design considerations
The following terms may be new to you:
Network Operating Systems: An Operating System that includes components for networking built into it. Examples include Novell Netware, Windows NT etc.
Network Management Systems: Software and sometimes hardware which will monitor and control networks. Some Network Operating Systems have their own built-in Network Management Systems.
Open Database Connectivity: ODBC or Open Database Connectivity is a standard database access method developed by Microsoft to make it possible for any ODBC compliant application to access any data stored in an ODBC compliant database. ODBC achieves this by inserting a layer called a database driver between the application and the database to interpret any requests from the application into commands that are understood by the DBMS.
Database Management Systems: DBMS or Database Management Systems are a collection of programs that enable the storing, modification and extraction of data to and from a database.
Operating System: An Operating System is a program that runs between the applications software and the hardware on a computer.
The Operating System is responsible for controlling and coordinating access to the hardware devices from the applications and manages security, scheduling and data storage operations for the applications. Examples include UNIX, Windows NT, Windows 98.
Client: An application that runs on a computer that connects to a server. The client relies on the server to perform certain operations.
The term Client can also encompass the hardware on which the client software runs. A Web browser such as Netscape Communicator or Microsoft Internet Explorer is a client that relies on a Web server to provide content.
Client configuration: The hardware and software configuration of a client including user defined settings, available hardware and software setup.
CORBA: (Common Object Request Broker Architecture) Enables pieces of programs, called objects, to communicate with one another regardless of what operating system they are running on or what programming language they were written in. Developed by OMG (Open Management Group).
Fiber optic: A technology used for transmitting data by light. A fiber optic cable consists of thin strands of glass or plastic along which the light can travel.
Server cluster: Connecting two or more computers together in such a way that they behave like a single computer. Clustering is used for parallel processing, for load balancing, and for fault tolerance.
SMP(Symmetric Multiprocessing): A computer architecture that provides fast performance by making multiple CPUs available to complete individual processes simultaneously (multiprocessing). Unlike asymmetrical processing, any idle processor can be assigned any task, and additional CPUs can be added to improve performance and handle increased loads.
Protocol: The language of a network. A set format for data to be passed between to devices or objects. The protocol defines how the data is structured and the error checking and transmission control information that is communicated between the objects or devices. TCP/IP is an example of a suite of protocols that enable devices and objects to communicate.
NIC: NIC or Network Interface Card is a board or card that can be plugged into a computer that has the necessary connectivity electronics and plugs to enable the computer to be connected on a network.
ICE: (Internet Content Exchange Protocol) This defines the method and format for content exchange and provides support for management and control of syndication relationships. ICE is an application of XML.
XML: (eXtensible Markup Language) An open standard for describing data from the W3C (World Wide Web Consortium). It is used for defining data elements on a Web page and business-to-business documents. It uses a similar tag structure as HTML; however, whereas HTML defines how elements are displayed, XML defines what those elements contain. HTML uses predefined tags, but XML allows tags to be defined. Thus, virtually any data items, such as product, sales rep and amount due, can be identified, allowing Web pages to function like database records. By providing a common method for identifying data, XML supports B2B transactions and is expected to become the dominant format for electronic data interchange.
VPN: A software-defined network offering the appearance, functionality, and usefulness of a dedicated private network; a VPN uses a public network to connect nodes.
Local Area Networks: LAN or Local Area Network is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings.