160 likes | 239 Vues
Learn about web design basics, HTML tags, transferring web pages to a server via FTP, leveraging multimedia, database marketing, computer viruses, bandwidth optimization, DSL, cable modems, content filtering, and transaction security. Enhance your skills in web technology!
E N D
Class Discussion Notes MKT 390 - 401 April 3, 2001
Leveraging Technology • Web site design basics • Web pages rely on HTML (Hypertext Markup Language) • HTML uses tags to identify how words should be formatted • The browser reads the tags • IMG SRC is a reference to an image source file • HREF is a Hypertext Reference which tells the browser where to go when the user clicks on a link • Some design tools automatically write the HTML for you • MS Office • Front Page, Page Mill • Once web page is designed, it must be transferred to a Web server • FTP (File Transfer Protocol) is the tool which publishes Web pages • Many tools can design simple Web pages, however, special applications are needed to design e-commerce sites
Leveraging Technology • Multimedia • Requires high bandwidth or broadband • Solutions • Speed up home connection • Compress content • Real audio • Real video • MP3 • Steaming • Distribute content around the Web • Database marketing • Relational databases that can be mined • Data can be gathered voluntarily from Web surveys • Data can be gathered without users knowledge from clickthrough behavior
Leveraging Technology • Computer viruses • Four common types of viruses • Macro • Attach to data files such as Excel or Word and infect system when user opens the file • Trojan horse • Usually activated by a date or event • Worm • Spread rapidly • Boot • Reside on floppy disks and activate when system is booted • Results • Data files erased • Hard drives destroyed • Replicated and sent to unwitting recipients via e-mail
Leveraging Technology • Computer viruses – cont’d • Remedy – antivirus protection • Norton • McAfee • Dr. Solomon • Installed on mail servers • Installed on desktop PCs • Denial of service attacks • Bogus requests by hackers which overwhelm a Web server • Results in shutdown • Remedy • Distribute multiple copies of Web site
Leveraging Technology • Shopping agents • Parallel pull • Multiple agents collecting data simultaneously and formatting it • Vendors may not participate • Forces competition on price • Puts downward pressure on prices • Represent buyer • Do not charge fee for listing • Earn revenue from advertising • Represent seller • Charge listing fee • User may not know that all relevant sites are not being listed
Leveraging Technology • Bandwidth • Carrying capacity of information channel • Higher bandwidth = faster speed • Measured in bits per second • Telephone modems • Work at max of 56,000 bits per second • Text transmits easily • Full motion video requires more bandwidth than phone lines can carry • Future Internet marketing opportunities • Personal selling • Phone calls • Music CDs • Movies • Virtual reality
Leveraging Technology • DSL (Digital Subscriber Line) • Transmit up to 8 Mbps over phone lines • 9 versions • ASDL (Asynchronous DSL) • Downstream faster than upstream • SDSL (Symmetric DSL) • Same speed upstream or downstream • RADSL (Rate Adaptive DSL) • Speed changes with weather and other conditions • Advantages • More secure than cable modem • Guaranteed bandwidth • Disadvantages • Infrastructure not in place everywhere • Must be within 3 miles of a phone switching station
Leveraging Technology • Cable modems • Transmit Internet traffic over cable TV lines • Speeds up to 2.5 Mbps • Advantages • Infrastructure already in place in most areas • Early to market • New value add offerings • Video on demand • CD quality audio • Internet games • Disadvantages • More subscribers in neighborhood slows down transmissions
Leveraging Technology • Cable modems – cont’d • Two consortiums • @ Home Network • Road Runner • Other broadband • Satellite (not TV) • Disadvantages • More subscribers in neighborhood slows down transmissions • Wireless • Advantages • PDAs and cell phones use this technology • On demand Internet access • Requires little infrastructure • Speeds up to 2.4 Mbps
Leveraging Technology • Content filtering • Concerns with children on the Internet • Education/legislation solutions • Teach children • Ban offensive material • Require warnings on sites • Require age verification • Require ratings • Technology solutions • Filtering by the ISP • AOL, Prodigy • Filtering by proxy server • Businesses • Filtering on individual computer • Content filtering software
Leveraging Technology • Transaction security • Typically more secure than offline • Three places credit card could be stolen • From the computer • Highly unlikely • In transit • Encryption algorithms • Industry standard RSA never broken outside a lab • Information encrypted in both directions • Information is decrypted using a key • From merchant site • Hackers penetrate Web servers • Software programs, consultants can detect flaws • Intrusion detection systems
Leveraging Technology • Site rating services • Is business legitimate? • How good is the business? • BizRate • TRUSTe • BBB online • Proxy servers and cache • Replicates Web sites and redistributes them • Results in undercounting of visitors to a Web site (impressions) • Lost of revenue for Internet advertisers
Leveraging Technology • How search engines work • Searching is done weeks in advance • Spiders crawl the web compiling and counting keywords • Data is stored in an indexed database • Queries returned in order of relevance • Spiders count appearance of keywords and their placement on the page • Google ranks sites based on their number of links from other sites • Direct Hit ranks sites based on the number of users who choose it • Tools available to assist in improving search engine rankings
Leveraging Technology • Privacy, log files and cookies • Log files • Data tables that record each visit to the site • Disadvantages • Does not track individual user behavior • Cookies • Files stored on the user’s computer every time they visit a Web site • Double Click • Uses cookies to generate targeted ads for other sites in its network • Closed loop marketing
Leveraging Technology • Cookies – cont’d • Options for users who don’t want to be tracked • Disable cookies in their browser • Delete cookies after every session • Purchase software to block all requests from ad servers • P3P • Predetermined amount of information is given about user when they visit a site