CONTACT Zorphis inc co.
Locations
FOR ALL UPDATES 2014 at this time We only take Phone & email orders.... 843-246-7588 Please contact us email for any onformation or toll free call. 24/7. 365 .
Business Communications Technology
Video conferencing
Conducting a conference between two or more participants at different sites by using computer networks to transmit audio and video data. For example, a point-to-point (two-person) video conferencing system works much like a video telephone. Each participant has a video camera, microphone, and speakers mounted on his or her computer. As the two participants speak to one another, their voices are carried over the network and delivered to the other's speakers, and whatever images appear in front of the video camera appear in a window on the other participant's monitor.
Multipoint videoconferencing allows three or more participants to sit in a virtual conference room and communicate as if they were sitting right next to each other. Until the mid 90s, the hardware costs made videoconferencing prohibitively expensive for most organisations, but that situation is changing rapidly. Many analysts believe that videoconferencing will be one of the fastest-growing segments of the computer industry in the latter half of the decade.
Teleconferencing
To hold a conference via a telephone or network connection. Computers have given new meaning to the term because they allow groups to do much more than just talk. Once a teleconference is established, the group can share applications and mark up a common whiteboard. There are many teleconferencing applications that work over private networks. One of the first to operate over the Internet is Microsoft's NetMeeting.
Workgroup Computing
A workgroup is a collection of individuals working together on a task. Workgroup computing occurs when all the individuals have computers connected to a network that allows them to send e-mail to one another, share data files, and schedule meetings. Sophisticated workgroup systems allow users to define workflows so that data is automatically forwarded to appropriate people at each stage of a process.
Multicast
To transmit a single message to a select group of recipients. A simple example of multicasting is sending an e-mail message to a mailing list. Teleconferencing and videoconferencing also use multicasting, but require more robust protocols and networks.
Standards are being developed to support multicasting over a TCP/IP network such as the Internet. These standards, IP Multicast and Mbone, will allow users to easily join multicast groups.
Note that multicasting refers to sending a message to a select group whereas broadcasting refers to sending a message to everyone connected to a network.
The terms multicast and narrowcast are often used interchangeably, although narrowcast usually refers to the business model whereas multicast refers to the actual technology used to transmit the data.
Broadcast
To simultaneously send the same message to multiple recipients. Broadcasting is a useful feature in e-mail systems. It is also supported by some fax systems.
In networking, a distinction is made between broadcasting and multicasting. Broadcasting sends a message to everyone on the network whereas multicasting sends a message to a select list of recipients.
Narrowcast
To send data to a specific list of recipients. Cable television is an example of narrowcasting since the cable TV
signals are sent only to homes that have subscribed to the cable service. In contrast, network TV uses a broadcast model in which the signals are transmitted everywhere and anyone with an antenna can receive them.
The Internet uses both a broadcast and a narrowcast model. Most Web sites use a broadcast model since anyone with Internet access can view the sites. However, sites that require you to log-in before viewing content are based more on the narrowcast model. The various push technologies are another form for narrowcasting. Perhaps the best example of narrowcasting are e-mail lists where messages are sent only to individuals who subscribe to the list.
The terms multicast and narrowcast are often used interchangeably, although narrowcast usually refers to the business model whereas multicast refers to the actual technology used to transmit the data.
Webcasting
Using the Internet, and the World Wide Web in particular, to broadcast information. Unlike typical surfing, which relies on a pull method of transferring Web pages, webcasting uses push technologies.
Push casting
1) In client/server applications, to send data to a client without the client requesting it. The World Wide Web is based on a pull technology where the client browser must request a Web page before it is sent. Broadcast media, on the other hand, are push technologies because they send information out regardless of whether anyone is tuned in.
Increasingly, companies are using the Internet to deliver information push-style. Probably the oldest and most widely used push technology is e-mail. This is a push technology because you receive mail whether you ask for it or not -- that is, the sender pushes the message to the receiver.
Push casting
To request data from another program or computer. The opposite of pull is push, where data is sent without a request being made. The terms push and pull are used frequently to describe data sent over the Internet. The World Wide Web is based on pull technologies, where a page isn't delivered until a browser requests it. Increasingly, however, Information services are harnessing the Internet to broadcast information using push technologies. A prime example is the PointCast Network.
Mailing Lists
A list of e-mail addresses identified by a single name, such as When an e-mail message is sent to the mailing list name, it is automatically forwarded to all the addresses in the list.
Most e-mail clients support mailing lists, which enables you to broadcast e-mail messages to groups that you define. In addition, there are mailing list servers that manage centralised mailing lists for groups of users.
Short for electronic mail, the transmission of messages over communications networks. The messages can be notes entered from the keyboard or electronic files stored on disk. Most mainframes, minicomputers, and computer networks have an e-mail system. Some electronic-mail systems are confined to a single computer system or network, but others have gateways to other computer systems, enabling users to send electronic mail anywhere in the world. Companies that are fully computerised make extensive use of e-mail because it is fast, flexible, and reliable.
Most e-mail systems include a rudimentary text editor for composing messages, but many allow you to edit your messages using any editor you want. You then send the message to the recipient by specifying the recipient's address. You can also send the same message to several users at once. This is called broadcasting.
Sent messages are stored in electronic mailboxes until the recipient fetches them. To see if you have any mail, you may have to check your electronic mailbox periodically, although many systems alert you when mail is received. After reading your mail, you can store it in a text file, forward it to other users, or delete it. Copies of memos can be printed out on a printer if you want a paper copy.
Mailbox
An area in memory or on a storage device where e-mail is placed. In e-mail systems, each user has a private mailbox. When the user receives e-mail, the mail system automatically puts it in the mailbox.
The mail system allows you to scan mail that is in your mailbox, copy it to a file, delete it, print it, or forward it to another user. If you want to save mail, it is a good idea to copy it to a file, because files tend to be more stable than mailboxes.
An attachment
A file attached to an e-mail message. Many e-mail systems only support sending text files as e-mail. If the attachment is a binary file or formatted text file (such as an MS-Word document), it must be encoded before it is sent and decoded once it is received. There are a number of encoding schemes, the two most prevalent being Uuencode and MIME.
Digital Certificate
An attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply.
An individual wishing to send an encrypted message applies for a digital certificate from a Certificate Authority (CA). The CA issues an encrypted digital certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the Internet.
The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply.
The most widely used standard for digital certificates is X.509.
Encryption
The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.
There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.
Digital Envelope
A type of security that uses two layers of encryption to protect a message. First, the message itself is encoded using symmetric encryption, and then the key to decode the message is encrypted using public-key encryption. This technique overcomes one of the problems of public-key encryption, which is that it is slower than symmetric encryption. Because only the key is protected with public-key encryption, there is very little overhead.
Public-Key Encryption
A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it.
An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Moreover, it is virtually impossible to deduce the private key if you know the public key.
Public-key systems, such as Pretty Good Privacy (PGP), are becoming popular for transmitting information via the Internet. They are extremely secure and relatively simple to use. The only difficulty with public-key systems is that you need to know the recipient's public key to encrypt a message for him or her. What's needed, therefore, is a global registry of public keys, which is one of the promises of the new LDAP technology.
Public key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman. For this reason, it is sometime called Diffie-Hellman encryption. It is also called asymmetric encryption because it uses two keys instead of one key (symmetric encryption).
Certificate Authority
A trusted third-party organization or company that issues digital certificates used to create digital signatures and public-private key pairs. The role of the CA in this process is to guarantee that the individual granted the unique certificate is, in fact, who he or she claims to be. Usually, this means that the CA has an arrangement with a financial institution, such as a credit card company, which provides it with information to confirm an individual's claimed identity. CAs are a critical component in data security and electronic commerce because they guarantee that the two parties exchanging information are really who they claim to be.
Electronic Commerce
Conducting business on-line. This includes, for example, buying and selling products with digital cash and via Electronic Data Interchange (EDI).
Biometrics
Generally, the study of measurable biological characteristics. In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. Examples include computer analysis of fingerprints or speech.
Though the field is still in its infancy, many people believe that biometrics will play a critical role in future computers, and especially in electronic commerce. Personal computers of the future might include a fingerprint scanner where you could place your index finger. The computer would analyse your fingerprint to determine who you are and, based on your identity, authorise you different levels of access. Access levels could include the ability to use credit card information to make electronic purchases.
Security
to techniques for ensuring that data stored in a computer cannot be read or compromised. Most security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system.
Authentication
The process of identifying an individual, usually based on a username and password. In security systems, authentication is distinct from authorisation , which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual.
Digital signature
A digital code that can be attached to an electronically transmitted message that uniquely identifies the sender. Like a written signature, the purpose of a digital signature is to guarantee that the individual sending the message really is who he or she claims to be. Digital signatures are especially important for electronic commerce and are a key component of most authentication schemes. To be effective, digital signatures must be unforgettable. There are a number of different encryption techniques to guarantee this level of security.
Digital Wallet
(1) Encryption software that works like a physical wallet during electronic commerce transactions. A wallet can hold a user's payment information, a digital certificate to identify the user, and shipping information to speed transactions. The consumer benefits because his or her information is encrypted against piracy and because some wallets will automatically input shipping information at the merchant's site and will give the consumer the option of paying by digital cash or check. Merchants benefit by receiving protection against fraud.
Most wallets reside on the user's PC, but recent versions, called "thin" wallets, are placed on the credit card issuer's server. Netscape and Microsoft now support wallet technology on their browsers.
Local Area Networks
A computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide-area network (WAN).
Most LANs connect workstations and personal computers. Each node (individual computer ) in a LAN has its own CPU with which it executes programs, but it is also able to access data and devices anywhere on the LAN. This means that many users can share expensive devices, such as laser printers, as well as data. Users can also use the LAN to communicate with each other, by sending e-mail or engaging in chat sessions.
There are many different types of LANs Ethernets being the most common for PCs. Most Apple Macintosh networks are based on Apple's AppleTalk network system, which is built into Macintosh computers.
The following characteristics differentiate one LAN from another:
topology : The geometric arrangement of devices on the network. For example, devices can be arranged in a ring or in a straight line.
protocols : The rules and encoding specifications for sending data. The protocols also determine whether the network uses a peer-to-peer or client/server architecture.
media : Devices can be connected by twisted-pair wire, coaxial cables, or fiber optic cables. Some networks do without connecting media altogether, communicating instead via radio waves.
LANs are capable of transmitting data at very fast rates, much faster than data can be transmitted over a telephone line; but the distances are limited, and there is also a limit on the number of computers that can be attached to a single LAN.
Product Information
2007-04-14
Customer Support Information
(fax)