An intranet or internal World Wide Web is a network architecture designed to serve the internal information needs of organization using web concepts and tools.
It is to provide an Internet like environment within the enterprise for internal information sharing, communications, collaboration, and the support business processes.
In practice an intranet uses the element of technology that have enabled the internet to become so popular, in such a short space of time, for applications and processes that are totally within the control of the organization.
An intranet is protected by security measures such as passwords, encryption, and fire walls, and thus can be accessed by authorized users through internet.
When one uses intranet the user electronic form to put information. When entering information it provide linkages to a various other contents, reducing data entry and assuring quality data input.
A company’s intranet can also be accessed through the intranets of customers, suppliers and other business partners via extranet links.
Intranets have the power to change decision making processes, organizational structure and procedures.
Organizations of all kinds are implementing a broad range of intranets uses.
One way that companies organize intranet applications is to group them conceptually into a few user services categories that reflect the basic services that intranets offer to their users.
Intranet have a low cost of ownership because they use the standard technologies of the internet.
Applications of Intranet in Business Organizations
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
The trash can has been a familiar presence on computer desktops starting with the early Macintosh systems. Unwanted files can be moved t...
-
CyberCash Inc. was founded in 1994 and is performing secure credit card presentations since April 1995. CyberCash provides a range of commer...
-
Doxxing is the word coined to describe the process of releasing of personally identifying information to the public without their consent. ...
-
The utility programs is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing computer...
-
Spreadsheet is a simple worksheet consisting of rows and columns in which any data can be entered. It does calculations and other operation ...
-
-
An international team of researchers from Switzerland, the United Kingdom, and Canada has identified the gene responsible for a rare but life-threatening...
-
Adenosine diphosphate (ADP) is a key molecule in cellular energy regulation, consisting of adenosine and two phosphate groups. It is central to the cell's ...