SlideShare une entreprise Scribd logo
1  sur  26
1 By: Rena Glasser
 
Intranet An intranet is a private computer network that uses Internet Protocol technologies to securely share any part of an organization's information or operational systems within that organization.  -Wikipedia
[object Object],[object Object],[object Object],[object Object],-Wikipedia
What qualifies as an intranet? ,[object Object],Corporate intranets Facebook groups E-mail list serves
What can organizations use intranets for? Employee newsletters    Sales figures by unit    Product/service information    Internal product demos    Tutorials    Employee benefits information   Project information   Access to the organization's data warehouse    Newswire clippings    Software libraries    Organization phone directory    Conference room reservations   Internal information libraries    Subscription services    Policies and procedures    Sales support    Technology support    Competitive analysis    Official travel guide    Stock quote Performance tracking    Surveillance    Maps    Conferencing    Whiteboarding    Job notices
Strengths of using Intranets   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Weaknesses of using Intranets   ,[object Object],[object Object],[object Object]
Case study:
 
 
 
 
 
 
 
 
 
 
 
`
 
 
Key Takeaways About Intranets ,[object Object],[object Object],[object Object]
Sources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 

Contenu connexe

Tendances

Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaaDhani Ahmad
 
Intranet Pdf
Intranet PdfIntranet Pdf
Intranet Pdfkhammett
 
Using an Intranet Within a Company
Using an Intranet Within a CompanyUsing an Intranet Within a Company
Using an Intranet Within a Companys1120037
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersFeisal Nanji
 
The Power of Federated Learning and Internet of Things
The Power of Federated Learning and Internet of ThingsThe Power of Federated Learning and Internet of Things
The Power of Federated Learning and Internet of ThingsPhoenix Global
 

Tendances (20)

Intranet and extranet
Intranet and extranet Intranet and extranet
Intranet and extranet
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaa
 
Akshita
AkshitaAkshita
Akshita
 
Intranet & Extranet
Intranet & ExtranetIntranet & Extranet
Intranet & Extranet
 
Module 4 CIS 595
Module 4 CIS 595Module 4 CIS 595
Module 4 CIS 595
 
Intranet Pdf
Intranet PdfIntranet Pdf
Intranet Pdf
 
Wenger Replacing IP Filtering: Challenges for Academic Libraries
Wenger Replacing IP Filtering: Challenges for Academic LibrariesWenger Replacing IP Filtering: Challenges for Academic Libraries
Wenger Replacing IP Filtering: Challenges for Academic Libraries
 
Using an Intranet Within a Company
Using an Intranet Within a CompanyUsing an Intranet Within a Company
Using an Intranet Within a Company
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
 
Flanagan - RA21 Improving Access to Scholarly Resources
Flanagan - RA21 Improving Access to Scholarly ResourcesFlanagan - RA21 Improving Access to Scholarly Resources
Flanagan - RA21 Improving Access to Scholarly Resources
 
Pawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
Pawlowski and Beadles: Authentication and Access of Licensed Content in OhioPawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
Pawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
 
Hanson In Defense of the Proxy Server
Hanson In Defense of the Proxy ServerHanson In Defense of the Proxy Server
Hanson In Defense of the Proxy Server
 
Leahy - What can SAML/Shibboleth do for your institution?
Leahy - What can SAML/Shibboleth do for your institution?Leahy - What can SAML/Shibboleth do for your institution?
Leahy - What can SAML/Shibboleth do for your institution?
 
LLoyd - Web proxy vs. Federated SSO: A Practical Guide
LLoyd - Web proxy vs. Federated SSO: A Practical GuideLLoyd - Web proxy vs. Federated SSO: A Practical Guide
LLoyd - Web proxy vs. Federated SSO: A Practical Guide
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
Schwing Challenges to Successful Authentication Change
Schwing Challenges to Successful Authentication ChangeSchwing Challenges to Successful Authentication Change
Schwing Challenges to Successful Authentication Change
 
H1N1 & IT Continuity
H1N1 & IT ContinuityH1N1 & IT Continuity
H1N1 & IT Continuity
 
The Power of Federated Learning and Internet of Things
The Power of Federated Learning and Internet of ThingsThe Power of Federated Learning and Internet of Things
The Power of Federated Learning and Internet of Things
 

En vedette

Photo practice
Photo practicePhoto practice
Photo practiceDevanGill
 
Further human physiology: digestion
Further human physiology: digestionFurther human physiology: digestion
Further human physiology: digestiondaniroxmasox
 
изучаем историю школы на уроках математики
изучаем историю школы на уроках математикиизучаем историю школы на уроках математики
изучаем историю школы на уроках математикиnv13
 
CRM and SELLING
CRM and SELLINGCRM and SELLING
CRM and SELLINGJoel Pais
 
Wealth Accumulation Model
Wealth Accumulation ModelWealth Accumulation Model
Wealth Accumulation ModelNicole Lee
 
1st Photo Story
1st Photo Story1st Photo Story
1st Photo Storydburks87
 
Deuses egipiçios
Deuses egipiçiosDeuses egipiçios
Deuses egipiçiosbili993
 
Learninig Analytics Special Track: A cluster-based analisys to diagnose stude...
Learninig Analytics Special Track: A cluster-based analisys to diagnose stude...Learninig Analytics Special Track: A cluster-based analisys to diagnose stude...
Learninig Analytics Special Track: A cluster-based analisys to diagnose stude...Miguel Rodriguez Artacho
 
How did you use new media technologies in
How did you use new media technologies inHow did you use new media technologies in
How did you use new media technologies inSoullessProductionsBen
 
My 1st photo story
My 1st photo storyMy 1st photo story
My 1st photo storyDevanGill
 
Presentation1
Presentation1Presentation1
Presentation1kblaurin
 
Communications Audit Seattle Army Recruiting Battalion
Communications Audit Seattle Army Recruiting BattalionCommunications Audit Seattle Army Recruiting Battalion
Communications Audit Seattle Army Recruiting BattalionMargaret (Maggie) Shartel
 
Castlebrook Presentation 2011
Castlebrook Presentation 2011Castlebrook Presentation 2011
Castlebrook Presentation 2011barryminogue
 
Mirando 4 años atrás y 4 años adelante en tecnología educativa
Mirando 4 años atrás y 4 años adelante en tecnología educativaMirando 4 años atrás y 4 años adelante en tecnología educativa
Mirando 4 años atrás y 4 años adelante en tecnología educativaMiguel Rodriguez Artacho
 
Clear Images Design
Clear Images DesignClear Images Design
Clear Images Designclearimages
 

En vedette (20)

Photo practice
Photo practicePhoto practice
Photo practice
 
Further human physiology: digestion
Further human physiology: digestionFurther human physiology: digestion
Further human physiology: digestion
 
Pitch
PitchPitch
Pitch
 
Workshop oeb 2008 authoring
Workshop oeb 2008 authoring Workshop oeb 2008 authoring
Workshop oeb 2008 authoring
 
изучаем историю школы на уроках математики
изучаем историю школы на уроках математикиизучаем историю школы на уроках математики
изучаем историю школы на уроках математики
 
CRM and SELLING
CRM and SELLINGCRM and SELLING
CRM and SELLING
 
Brain
BrainBrain
Brain
 
Wealth Accumulation Model
Wealth Accumulation ModelWealth Accumulation Model
Wealth Accumulation Model
 
1st Photo Story
1st Photo Story1st Photo Story
1st Photo Story
 
Deuses egipiçios
Deuses egipiçiosDeuses egipiçios
Deuses egipiçios
 
Learninig Analytics Special Track: A cluster-based analisys to diagnose stude...
Learninig Analytics Special Track: A cluster-based analisys to diagnose stude...Learninig Analytics Special Track: A cluster-based analisys to diagnose stude...
Learninig Analytics Special Track: A cluster-based analisys to diagnose stude...
 
How did you use new media technologies in
How did you use new media technologies inHow did you use new media technologies in
How did you use new media technologies in
 
My 1st photo story
My 1st photo storyMy 1st photo story
My 1st photo story
 
Coml512 m2group4project
Coml512 m2group4projectComl512 m2group4project
Coml512 m2group4project
 
Presentacion
PresentacionPresentacion
Presentacion
 
Presentation1
Presentation1Presentation1
Presentation1
 
Communications Audit Seattle Army Recruiting Battalion
Communications Audit Seattle Army Recruiting BattalionCommunications Audit Seattle Army Recruiting Battalion
Communications Audit Seattle Army Recruiting Battalion
 
Castlebrook Presentation 2011
Castlebrook Presentation 2011Castlebrook Presentation 2011
Castlebrook Presentation 2011
 
Mirando 4 años atrás y 4 años adelante en tecnología educativa
Mirando 4 años atrás y 4 años adelante en tecnología educativaMirando 4 años atrás y 4 años adelante en tecnología educativa
Mirando 4 años atrás y 4 años adelante en tecnología educativa
 
Clear Images Design
Clear Images DesignClear Images Design
Clear Images Design
 

Similaire à Intranet Presentation

Intranet for Small Business – A Complete Guide.docx
Intranet for Small Business – A Complete Guide.docxIntranet for Small Business – A Complete Guide.docx
Intranet for Small Business – A Complete Guide.docxIntranet Solutions
 
INTERNET TECHNOLOGY_29201220038(CA1).pptx
INTERNET TECHNOLOGY_29201220038(CA1).pptxINTERNET TECHNOLOGY_29201220038(CA1).pptx
INTERNET TECHNOLOGY_29201220038(CA1).pptxrishabdey8
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icRexon Calub
 
IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3Rexon Calub
 
Knowledge Management Information Technology Systems
Knowledge Management Information Technology SystemsKnowledge Management Information Technology Systems
Knowledge Management Information Technology SystemsFaruk Ortakaya
 
Chapter Three
Chapter ThreeChapter Three
Chapter ThreeVideoguy
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet AyushJadon5
 
Can the Intranet Take Business Processes to the Next Level?
Can the Intranet Take Business Processes to the Next Level?Can the Intranet Take Business Processes to the Next Level?
Can the Intranet Take Business Processes to the Next Level?M Dalton
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..Paulo Sambo
 
Understanding Intranets vs. extranets
Understanding Intranets vs. extranetsUnderstanding Intranets vs. extranets
Understanding Intranets vs. extranetsAciron Consulting
 
Intranet for Library Services
Intranet for Library ServicesIntranet for Library Services
Intranet for Library ServicesBhojaraju Gunjal
 
Intranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxIntranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxAnshikaGoel42
 

Similaire à Intranet Presentation (20)

Intranet for Small Business – A Complete Guide.docx
Intranet for Small Business – A Complete Guide.docxIntranet for Small Business – A Complete Guide.docx
Intranet for Small Business – A Complete Guide.docx
 
INTERNET TECHNOLOGY_29201220038(CA1).pptx
INTERNET TECHNOLOGY_29201220038(CA1).pptxINTERNET TECHNOLOGY_29201220038(CA1).pptx
INTERNET TECHNOLOGY_29201220038(CA1).pptx
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_ic
 
IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3IRM GROUP 2 CHAPTER 3
IRM GROUP 2 CHAPTER 3
 
Intranetppt.ppt
Intranetppt.pptIntranetppt.ppt
Intranetppt.ppt
 
Intranet Design: Step by Step Design Guide
Intranet Design: Step by Step Design GuideIntranet Design: Step by Step Design Guide
Intranet Design: Step by Step Design Guide
 
Interanet
InteranetInteranet
Interanet
 
Intranet vs. Extranet: The Essential Guide
Intranet vs. Extranet: The Essential GuideIntranet vs. Extranet: The Essential Guide
Intranet vs. Extranet: The Essential Guide
 
Knowledge Management Information Technology Systems
Knowledge Management Information Technology SystemsKnowledge Management Information Technology Systems
Knowledge Management Information Technology Systems
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
Can the Intranet Take Business Processes to the Next Level?
Can the Intranet Take Business Processes to the Next Level?Can the Intranet Take Business Processes to the Next Level?
Can the Intranet Take Business Processes to the Next Level?
 
Internet
InternetInternet
Internet
 
Mis 2
Mis 2Mis 2
Mis 2
 
IT Intranet
IT IntranetIT Intranet
IT Intranet
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
 
Understanding Intranets vs. extranets
Understanding Intranets vs. extranetsUnderstanding Intranets vs. extranets
Understanding Intranets vs. extranets
 
Intranet for Library Services
Intranet for Library ServicesIntranet for Library Services
Intranet for Library Services
 
Intranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxIntranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptx
 

Dernier

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Dernier (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Intranet Presentation

  • 1. 1 By: Rena Glasser
  • 2.  
  • 3. Intranet An intranet is a private computer network that uses Internet Protocol technologies to securely share any part of an organization's information or operational systems within that organization. -Wikipedia
  • 4.
  • 5.
  • 6. What can organizations use intranets for? Employee newsletters  Sales figures by unit  Product/service information  Internal product demos  Tutorials  Employee benefits information  Project information  Access to the organization's data warehouse  Newswire clippings  Software libraries  Organization phone directory  Conference room reservations  Internal information libraries  Subscription services  Policies and procedures  Sales support  Technology support  Competitive analysis  Official travel guide  Stock quote Performance tracking  Surveillance  Maps  Conferencing  Whiteboarding  Job notices
  • 7.
  • 8.
  • 10.  
  • 11.  
  • 12.  
  • 13.  
  • 14.  
  • 15.  
  • 16.  
  • 17.  
  • 18.  
  • 19.  
  • 20.  
  • 21. `
  • 22.  
  • 23.  
  • 24.
  • 25.
  • 26.  

Notes de l'éditeur

  1. from the status of products in development to the number of employees at any point in the company's history.