Skip to main content

Home/ ncushu/ Group items tagged intromis

Rss Feed Group items tagged

Wesley Shu

什麼是Web 2.0( I ) - 0 views

  • 什麼是Web 2.0( I )
Wesley Shu

[ METAMUSE ]: Google IPO 啟示錄 - 0 views

  • Google
  • Google主要的獲利模式有兩種,第一種就是廣告廠商依據使用者輸入的關鍵字詞在搜尋頁面顯示該廠 商的資訊,例如輸入搜尋METAMUSE的時候,搜尋結果的頁面最上方出現「請問你是不是搜尋METAMOUSE?」並且在右方有所謂的TEXT-AD (文字式廣告),另外一種就是提供Google搜尋引擎的技術給其他大型公司使用,例如華爾街日報或是最新AMAZON的A9搜尋功能等,都是利用 Google搜尋引擎的計數供瀏覽者搜尋站內或相關資訊。
  • YAHOO所提供的引擎是屬於較落後的被動式搜尋引擎,也就是說網站擁有者必須主動的去YAHOO 登錄自己的網站,並自行輸入關鍵詞才能讓搜尋者從YAHOO中搜尋到相關連結與資料
  • ...2 more annotations...
  • 使用者合約內附註一項聲名是進出的 郵件需要經過搜尋引擎掃瞄過後插入相關且與內容相符合的廣告。這是一種精準式的廣告行銷,因為有精準的搜尋引擎才能提供廠商這樣的服務
  • 第一個發展搜尋引擎又放棄的是YAHOO,第一個提供免費電子郵件又放棄的還是YAHOO,但是Google卻能看到YAHOO所沒看到的事情,將 被YAHOO放棄的市場拾回並準備重新創造新的市場
Wesley Shu

Taiwan.CNET.com : 新聞專區 : 企業軟體 : Google、Yahoo、eBay、微軟:誰併誰? - 0 views

  • Google、Yahoo、eBay、微軟:誰併誰?
  • 其中Yahoo-eBay聯盟被認為是最有可能的
Wesley Shu

Wireless Application Protocol - Wikipedia, the free encyclopedia - 0 views

  • WAP is an open international standard for applications that use wireless communication. Its principal application is to enable access to the Internet from a mobile phone or PDA
Wesley Shu

Wi-Fi - Wikipedia, the free encyclopedia - 0 views

  • describe the embedded technology of wireless local area networks (WLAN) based on the IEEE 802.11 specifications
  • Wi-Fi devices in home or consumer-type environments connect in the following ways: Via a broadband Internet connection into a single router which can serve both wired and wireless clients Ad-hoc mode for client to client connections Built into non-computer devices to enable wireless connectivity to other devices or the Internet
Wesley Shu

Electronic business - Wikipedia, the free encyclopedia - 0 views

  • Lou Gerstner, CEO of IBM
  • While e-business refers to more strategic focus with an emphasis on the functions that occur using electronic capabilities, e-commerce to be a subset of an overall e-business strategy. E-commerce seeks to add revenue streams using the Worldwide Web or the Internet to build and enhance relationships with clients and partners and to improve efficiency using the Empty Vessel strategy. Often, e-commerce involves the application of knowledge management systems.
  • E-business involves business processes spanning the entire value chain: electronic purchasing and supply chain management, processing orders electronically, handling customer service, and cooperating with business partners.
  • ...1 more annotation...
  • E-shops E-procurement E-malls E-auctions Virtual Communities Collaboration Platforms Third-party Marketplaces Value-chain Integrators Value-chain Service Providers Information Brokerage
Wesley Shu

PayPal 101: Understanding How PayPal Works - 0 views

  • Similar to an escrow service, PayPal acts as the middleman holder of money.
  • At no time will either party see the other's credit card or bank information.
  • PayPal 101: "What exactly is PayPal?"Part 2: "How does PayPal make money?"Part 3: "What can I use PayPal for?"Part 4: "How safe is PayPal?"Part 5: "How do I get started with PayPal?"Part 6: "What Paypal account type should I get?"Part 7: "How do I set up my new Paypal account?"Part 8: "How does Paypal withdraw my money?"Part 9: "How do I send money with Paypal?"Part 10: "I won an auction! What now?"
  • ...1 more annotation...
  • eBay 101: Understanding the World's Largest Marketplace
Wesley Shu

Firewall (networking) - Wikipedia, the free encyclopedia - 0 views

  • A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections set and configured by the organization's security policy.
  • 3 Types 3.1 Network layer 3.2 Application-layer 3.3 Proxies
Wesley Shu

Local area network - Wikipedia, the free encyclopedia - 0 views

  • A local area network is a computer network covering a small geographic area, like a home, office, or group of buildings.
Wesley Shu

Demilitarized zone (computing) - Wikipedia, the free encyclopedia - 0 views

  • The DMZ is typically used for connecting servers that need to be accessible from the outside world, such as e-mail, web and DNS servers.
  • A DMZ is often created through a configuration option on the firewall, where each network is connected to a different port on the firewall - this is called a three-legged firewall set-up.
Wesley Shu

HTML - Wikipedia, the free encyclopedia - 0 views

  • HyperText Markup Language
1 - 20 of 56 Next › Last »
Showing 20 items per page