What are the benefits of intranet applications, Computer Networking

Assignment Help:

What are the benefits of Intranet applications

The benefits of successful Intranet applications can be enumerated as follows:

  • Cheaper: Use of client browsers with one standard Window interface, offers easy integration with a number of other applications, such as electronic mail, faxes, videoconferencing, calendaring, and linkages within messages. As a single interface to a variety of information sources, the browser is cost-effective, highly efficient, uses minimal resources, and is very easy to use.
  • Versatile: An Intranet server eliminates the need to replicate database by providing users with easy access to source data. A single WWW server platform can support both internal and external applications for both internal information-sharing and external marketing on the Internet. In contrast, the Lotus Notes application is costlier and purely an internal application.
  • Flexible: The Intranet provides the users with access to centralised information resources on a single point-and-click basis through the browser, which is available on a variety of client platforms (Windows, Mac, UNIX, etc.), at any location. With Notes, data distribution is in real-time, on an as-requested basis, over a public (or private) network.

 


Related Discussions:- What are the benefits of intranet applications

Explain the physical and logical paths in a computer communi, Explain the p...

Explain the physical and logical paths in a computer communication network also

What are the local network security issues, Q. What are the Local Network S...

Q. What are the Local Network Security Issues? Local Network Security Issues Password Protection - Encrypted username & password Group/Owner ID's - File Permissi

Explain how a cdma system works, (a) Explain how a CDMA system works? (b...

(a) Explain how a CDMA system works? (b) Explain howWelsh-Hadamard codes are generated. Explain why orthogonality between different spreading codes is important. (c) Consider

Determine downloading time when non persistent http is used, Assume that a ...

Assume that a user wants to download from a server a web page that references 3 objects. The base page and each of the objects are of the same size that requires 20 ms transmission

Combine subtitution and transposition, how to own cipher to encrypt and dec...

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

What is a link, What is a Link? A link refers to the connectivity among...

What is a Link? A link refers to the connectivity among two devices. It contains the type of cables and protocols used in order for single device to be able to communicate with

What are the features of star and ring topology, What are the features of s...

What are the features of star and ring topology The three networks have following features: star: best case is = 2, average case is = 2, worst case is = 2 ring: best case

What are the internal threats - security, What are the Internal Threats ...

What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can

Explain ibms sna architecture, Explain IBM's SNA Architecture SNA is a ...

Explain IBM's SNA Architecture SNA is a computer networking architecture that was formed by IBM to give a network structure for IBM mainframe, midrange, and personal computer s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd