throbber
Intranets: Internet Technologies Deployed Behind the Firewall for Corporate Productivity
`
`Intranets: Internet Technologies Deployed Behind the
`Firewall for Corporate Productivity
`
`Lee Levitt <levitt@process.com>
`Process Software Company
`Abstract
`
`This paper and accompanying presentation will discuss the opportunities for deploying intranets--Internet technologies
`used on the corporate network--for a variety of strategic and tactical communications purposes. This paper and
`accompanying presentation will explore the usage of intranets and provide a series of recommendations on the business,
`social, and organizational issues involved in rolling out an intranet site.
`Introduction
`
`While 1995 was clearly the "Year of the Internet," 1996 is well on its way to becoming the "Year of the Intranet."
`Thousands of organizations have already found that internal intranets can help empower their employees through more
`timely and less costly information flow. This empowerment bolsters the company's competitive advantage, improves
`employee moral and assists in getting more timely information to customers and suppliers.
`
`This paper will explore the business, organizational, and technical issues behind the setting up of an organizational
`intranet. In addition, it will provide some pointers in how to successfully deploy and manage an intranet.
`
`Before we explore the opportunities and issues in setting up an organizational intranet, let's explore why Internet
`technologies are so effective behind the corporate firewall.
`A little background
`
`The technologies that support the Internet provide the following benefits:
`
`connected computers can share or transfer information among one another;
`connected computers are heterogeneous--that is, they run a variety of operating systems and hardware from
`multiple vendors;
`common user applications--e-mail, Web browser, etc., are available across most commonly used platforms; and
`hypertext links simplify navigation and information retrieval.
`
`It is this last principle that has driven the tremendous increase in Internet usage over the past year. Users can simply
`point and click to navigate across the World Wide Web. Today Web traffic outdistances all other traffic on the Internet
`and the increasing use of graphics, audio, video, and other data types on Web servers will continue to drive growth in
`Web traffic.
`
`Similarly, this increasingly rich information environment is drawing new users to the Internet daily. Users can get
`realtime stock quotes, register for training courses (and take them) online, listen to "All Things Considered" from
`National Public Radio, read The Wall Street Journal, check the Manchester United/Leeds football match scores, or even
`watch the sun go down over the Santa Cruz pier.
`Browser as ubiquitous window onto information
`
`Similarly, the explosion in information resources has driven the development and deployment of browsers over a wide
`
`https://web.archive.org/web/20021221131244/https://www.isoc.org/inet96/proceedings/b2/b2_3.htm[7/20/2017 6:26:17 AM]
`
`1
`
`GOOGLE 1012
`
`

`

`Intranets: Internet Technologies Deployed Behind the Firewall for Corporate Productivity
`
`range of computing platforms, including Windows (all variants), Macintosh, OS/2, Unix (most, if not all variants), and
`many other lesser known platforms.
`
`Users are becoming increasingly used to retrieving information through their browser. As Microsoft Windows once was
`positioned as the universal interface to all applications residing on one's Wintel (Windows/Intel) computer, today, the
`ubiquitous browser is becoming the universal interface to all information types, whether these resources reside out on
`the Internet, on one's personal computer, or on the corporate local area network (LAN).
`
`And the Web server has become the ubiquitous host or coordinator for all of these information types. Using Hypertext
`Markup Language (HTML) and various add-on software and servers, whether they be Structured Query Language
`(SQL) database servers, RealAudio servers, CU-SeeMe videoconferencing, or multithreaded discussion or conferencing
`software, today several hundred thousand Web servers provide simple point and click access to an incredible range of
`information resources.
`Intranet explosion
`
`Information systems (IS) and functional department managers quickly identified the power of this new communications
`medium as a resource to be leveraged on the corporate network as well. Many are installing Web servers on their
`corporate networks (intranet applications) for internal usage only. Forrester Research interviewed 50 Fortune 500
`companies and found that fully two-thirds already have or are considering some involvement with intranet applications.
`These companies have identified the intranet as a powerful mechanism to make information more readily available. (See
`Figure 1.)
`
`Figure 1: Corporate plans for use of intranet
`
`With corporations under tremendous pressure to empower employees and to better leverage internal information
`resources, intranets provide a highly effective communications platform, one that is both timely and extensible. A basic
`intranet can be set up in hours or days and can ultimately serve as an "information hub" for the entire company, its
`remote offices, partners, suppliers, and customers.
`
`Intranets offer the following application feature set:
`
`rapid prototyping (can be measured in hours or days);
`scalable (start small, build as needs, requirements allow);
`easy navigation (internal home page provides links to information);
`accessible via most computing platforms;
`
`https://web.archive.org/web/20021221131244/https://www.isoc.org/inet96/proceedings/b2/b2_3.htm[7/20/2017 6:26:17 AM]
`
`2
`
`

`

`Intranets: Internet Technologies Deployed Behind the Firewall for Corporate Productivity
`
`can integrate distributed computing strategy (localized Web servers residing closer to the content author);
`can be tied in to "legacy" information sources (databases, existing word processing documents, other groupware
`applications); and
`extensible to a variety of media types (audio, video, interactive applications).
`
`The benefits to these features are many, including:
`
`inexpensive to start, requires little investment either in dollars or infrastructure;
`significantly more timely and less expensive than traditional information (paper) delivery;
`distributed computing strategy uses computing resources more effectively;
`users familiar with link metaphor from surfing experiences; and
`open platform architecture means large (and increasing) number of add-on applications available.
`New information paradigm
`
`Intranets leverage the concept that the Web browser is quickly becoming the universal information interface. An
`increasing number of workers gain Internet access from their work desk every day and are becoming accustomed to
`retrieving information through the now ubiquitous browser. While most of this information today comes from beyond
`the firewall, International Data Corporation (IDC) reports that, even in 1995, sales of Web servers for intranet use
`outdistanced those sold for Internet use. (See Figure 2.)
`
`Figure 2: Internet versus intranet usage
`
`Furthermore, IDC forecasts that by the year 2000, server licenses sold for intranet usage will outdistance those for
`Internet usage by a factor of 10 to one. Clearly, many organizations are quickly adopting this new information delivery
`paradigm.
`Calendar-driven versus event-driven publishing
`
`One of the key drivers in this adoption curve is that intranets allow organizations to evolve from a "calendar-" or
`"schedule-" based publishing strategy, to one of an "event-driven" or "needs-based" publishing strategy. In the past,
`companies published an employee handbook once a year, whether or not policies changed to coincide with that
`publication date. Traditionally, even though these handbooks may have been outdated as soon as they arrived on users'
`desks (and were promptly misplaced), they would not be updated until the following year.
`
`With an intranet publishing strategy, information can be updated instantly. If an organization adds a new mutual fund to
`
`https://web.archive.org/web/20021221131244/https://www.isoc.org/inet96/proceedings/b2/b2_3.htm[7/20/2017 6:26:17 AM]
`
`3
`
`

`

`Intranets: Internet Technologies Deployed Behind the Firewall for Corporate Productivity
`
`its 401K program, content on the benefits page can be immediately updated to reflect that change, and the company
`internal home page can have a brief announcement about the change. Then, as soon as employees look up the 401K
`program, they have the new information at their fingertips. Content can be changed or updated to reflect new
`information at any time.
`Intranets reduce cost, time to market
`
`Just as importantly, intranets dramatically reduce the costs (and time) of content development, duplication, distribution,
`and usage. The traditional publication model includes a multi-step process including:
`
`creation of content;
`migration of content to desktop publishing environment;
`production of draft;
`revision;
`final draft production;
`duplication; and
`distribution.
`
`The intranet publishing model includes a much shorter process, skipping many of the steps involved in the traditional
`publication model:
`
`creation of content and
`migration of content to intranet environment.
`
`In this latter model, revision becomes part of the updating process while the original content is available to the end
`users, thus dramatically reducing the time it takes for the information to become available to the user of that
`information. As the information is centrally stored and always presumed to be current, the company will not have to
`retrieve "old" information from employees to be replaced with new information, thus saving any expenses incurred in
`updating.
`
`This new publishing model can dramatically reduce both costs and the timeframe involved. Assuming that the corporate
`LAN environment can support intranet activities (and most can), the information technology (IT) infrastructure is
`already in place. In addition, most popular intranet Web servers can run on platforms widely found in most
`organizations (Wintel 80486 or Pentium computers, Apple Macintosh, Novell NetWare, etc.), so that little if any
`additional infrastructure is needed.
`
`Organizations estimate that the traditional model may entail physical duplication and distribution costs of as high as $15
`per employee, costs separate from the content development or testing phases. An organization with 100,000 employees
`may find potential cost savings of moving to an intranet strategy for a single application-the employee policies and
`benefits manual-of $1.5 million alone. And this cost savings does not reflect the additional value in an intranet solution
`which makes information more readily available to employees, thus raising both their productivity and job satisfaction.
`Intranets support distributed computing strategy
`
`An additional driver in the growth and speed of this adoption curve is the fact that intranet applications can fully support
`a distributed computing strategy-one that places the server and content closer to the owner of that content. Ultimately,
`basic Web servers may be included as utilities shipped with every operating system, in effect allowing everyone to be a
`publisher.
`
`Until that time, intranet servers may be located strategically at the group or department level to minimize administrative
`delays in posting content. (See Figure 3.) In addition, for strategic or technical reasons, intranet servers will continue to
`be located centrally in departments or organizations to provide coordinated access to legacy databases and other external
`resources, with individual users conducting "secondary" publishing roles.
`
`https://web.archive.org/web/20021221131244/https://www.isoc.org/inet96/proceedings/b2/b2_3.htm[7/20/2017 6:26:17 AM]
`
`4
`
`

`

`Intranets: Internet Technologies Deployed Behind the Firewall for Corporate Productivity
`
`This distributed computing strategy allows the content developer or functional department manager to both develop and
`maintain the content, and thereby avoiding having to deal with different departments that may have different agendas or
`timing requirements. In this instance, the functional department, having decided that a particular set of information
`would be valuable to employees, has the full control to empower the distribution of that information.
`
`Figure 3: Distributed computing environment
`So just what are companies doing on the intranet?
`
`The first organizations to use Internet technologies on the corporate network generally moved traditional paper-based
`information distribution online. These organizations have focused on a core group of supporting or mission critical
`information sets, including:
`
`competitive sales information;
`human resources/employee benefits statements;
`technical support/help desk applications;
`financial;
`company newsletters;
`project management; and
`ISO 9000 documentation.
`
`These companies typically provide a "corporate home page" as a launch pad for employees to find their way around the
`corporate intranet site. This page may have links to internal financial information, marketing, manufacturing, human
`resources, and even non-business announcements (company outings, personal events such as weddings, births, etc.).
`(See Figure 4.) Setting this page as the default home page in users' browsers will further ensure that this page will act as
`a key launch pad for employees.
`
`https://web.archive.org/web/20021221131244/https://www.isoc.org/inet96/proceedings/b2/b2_3.htm[7/20/2017 6:26:17 AM]
`
`5
`
`

`

`Intranets: Internet Technologies Deployed Behind the Firewall for Corporate Productivity
`
`Figure 4: Corporate home page
`Sales applications
`
`Sales organizations publish both the highlights of recent "wins" and the competitive matrices allowing their salespeople
`to have instant access to the information that allows them to win new sales. Companies report that timely access to of
`information of this type empowers their telesales representatives, and makes them more confident while speaking with
`potential customers. (See Figure 5.)
`
`Figure 5: Sales department home page
`Human resources applications
`
`Many human resources (HR) organizations have migrated existing employee policy or benefits manuals to the intranet
`and have added incremental functionality. First, employees gain point and click access to all of the company HR
`policies. Second, as many companies have begun to tie intranets into existing legacy databases, employees may conduct
`database lookups on their own, right from their Web browser. In the same way that banks have moved to ATMs or
`telephone transactions to allow customers to look up balances (and thereby taking expensive bank personnel out of the
`transaction), organizations are now allowing the user to do their own database lookup without HR intervention. (See
`Figure 6.)
`
`Using a browser, an employee can enter their name and company ID into a Web-based form. The intranet server then
`conducts a database lookup and reports back, via HTML, any number of individual data points, including:
`
`https://web.archive.org/web/20021221131244/https://www.isoc.org/inet96/proceedings/b2/b2_3.htm[7/20/2017 6:26:17 AM]
`
`6
`
`

`

`Intranets: Internet Technologies Deployed Behind the Firewall for Corporate Productivity
`
`number of vacation days outstanding;
`current job grade;
`balance in 401K program; and
`number of training days required by the end of the year.
`
`Virtually all of this information resides in legacy databases within the organization, and the intranet server simply takes
`the HR personnel out of the retrieval loop, reducing costs and the response time for the employee. At the same time, the
`use of user IDs and passwords ensures that only appropriate personnel have access to individual resources-the employee
`and his or her management.
`
`Figure 6: Human resources home page
`
`Intranet servers can also save incoming information to relevant databases. Using easily programmed forms, the server
`can collect registration information for upcoming training classes or seminars, and notify instructors of the number and
`demographics of the attendees. Again, the intranet server takes the human intervention out of the registration process,
`allowing the information to move more quickly from originator to end-user of that information. (See Figure 7.)
`
`Figure 7: Training registration form
`Technical support/help desk
`
`Many companies are employing intranets to provide faster technical assistance to internal users. These sites may include
`forms for people to use in requisitioning new hardware and software, to report problems with existing equipment, or to
`
`https://web.archive.org/web/20021221131244/https://www.isoc.org/inet96/proceedings/b2/b2_3.htm[7/20/2017 6:26:17 AM]
`
`7
`
`

`

`Intranets: Internet Technologies Deployed Behind the Firewall for Corporate Productivity
`
`easily download updated software applications, drivers, or bug fixes. Workflow software can then direct the form to the
`appropriate recipients for handling, and provide a tracking mechanism to ensure that requests are not "lost" along the
`way.
`
`In addition, frequently asked questions lists (FAQs) provide a summary of the most often asked questions and their
`answers, providing expertise and technical support to the user in a first-pass attempt to solve problems prior to
`(expensive) human intervention.
`Setting up an intranet
`
`Intranet applications are scalable-they can start small and grow. This feature allows many companies to "try out" an
`intranet pilot-to publish a limited amount of content on a single platform, and gauge the results. If the pilot proves
`promising, additional content can be migrated to the intranet server.
`
`Getting started
`
`The first step in building an intranet is to identify a likely area for deployment. A quick sampling of the paper flow
`within the organization may point to a likely candidate, whether it be the company newsletter, human resources or
`employee benefits handbook, competitive sales information, etc. The more ambitious may want to look at information
`needs and build an information flow strategy from scratch (not trying simply to deliver previously paper-based
`information electronically).
`
`The second step is to identify the content source or author-the person actually responsible for the intelligence behind the
`information and for getting it down on paper. Where does the information currently reside? Is it in a series of Microsoft
`Word or WordPerfect documents? Excel spreadsheets? Lotus Notes, Oracle or other database? Should this particular
`person be responsible for "HTMLizing" the information, for serving it on their personal computer?
`
`Further study will uncover other authors of similar information, most likely leading to a distributed content development
`and serving strategy. Individual content owners, most likely line managers and individual contributors, save their
`documents to HTML (or leave them in their original format) and forward them to a group administrative assistant. This
`assistant, who may already have desktop publishing responsibilities for the group, can apply the content to a Web server
`running on their local personal computer, validate, and establish links to other information resources.
`
`Alternatively, the content can be forwarded to an IS manager who can apply it on a system running other company
`applications, aggregating both the management and security activities for the content. Thus the content is available to
`anyone with appropriate access rights to the site.
`
`Likely content
`
`Organizations must determine whether information should be made available via a Web server, via e-mail, or through
`some other means. If the information is of general relevance, such as company travel guidelines or mileage
`reimbursement, it can be posted on a Web server so that when people require this information, they click on "travel
`guidelines" from the human resources page, and receive the most current information.
`
`Many companies find building Web interfaces to "legacy information" as a key application. With straightforward tools,
`end users can build simple point and click access to this legacy information, making it available to non-technical users
`through their Web browser. Key database applications include: customer records, product information, inventory,
`technical problem tracking, call reports, etc. In addition, individuals can quickly set up seminar or training registration
`forms for short term usage, loading the registrants' information into an easily manipulated database.
`
`Conversely, interoffice e-mail may be more appropriate for "interrupt-driven" time sensitive information, particularly
`for a focused group of recipients. "Our largest customer is coming in tomorrow, so please be sure to attend the briefing
`at 4:00 p.m." In this situation, the Web server can be used as an extended information resource: "Before attending the
`
`https://web.archive.org/web/20021221131244/https://www.isoc.org/inet96/proceedings/b2/b2_3.htm[7/20/2017 6:26:17 AM]
`
`8
`
`

`

`Intranets: Internet Technologies Deployed Behind the Firewall for Corporate Productivity
`
`meeting, please be sure to check the internal Web server link for 'Current Customers' for more information on the
`history behind this account."
`
`Selecting a likely pilot candidate
`
`Typically, organizations will begin a pilot with existing content that is delivered via paper, whether it is an employee
`benefits manual, competitive sales guide, or technical support information. It is important, for the sake of the pilot, to
`choose a candidate in which both the costs and results can be tracked and measured. Companies also find it useful to be
`able to measure the reduced costs of the switch in information distribution strategy.
`
`For instance, usually a company can directly measure the cost of duplicating and distributing copies of its employee
`benefits manual. When this traditional process is moved over to an intranet solution, the savings in direct costs can be
`taken directly to the bottom line, and the incremental costs of managing the content on the intranet server can be tallied
`and easily justified.
`
`On the other hand, the costs of informal information publishing, such as a memo or matrix that provides a competitive
`product analysis, may not be directly measurable. In many organizations, these competitive matrices are developed and
`distributed by staff people rather than production departments, and the direct costs are buried in other office expenses.
`Therefore, the move from traditional paper-based information flow to the intranet may not result in direct measurable
`costs savings.
`
`In these instances, it is important to focus on the value of enhanced access to information, and anecdotal accounts of the
`value may be helpful in measuring the results of the pilot. intranet uses and evaluators report statements such as "I was
`able to win three new accounts over the telephone because I had the information at my fingertips, and I knew it was
`current. With the old system, I was always putting the customer on hold and asking the other reps for information."
`
`Once the value of an intranet solution has been established through such a pilot, it can be expanded into other
`departments and functions. In addition, access to other legacy information can be provided, so that employees can
`search and update customer databases, check 401K balances, vacation days, or register for training classes.
`
`Organizational issues
`
`Typically, intranets are based around functional department support-sales/marketing, human resources, engineering,
`finance, etc. It is entirely appropriate, and usually beneficial, for those departments to take responsibility for both
`developing the content for the intranet server and for keeping it updated. In this manner, the content owner can publish
`the information more quickly and the users or consumers of the information can apply it to their competitive advantage
`more quickly.
`Challenges
`
`The technical capabilities of Web servers bring up certain organizational challenges, including:
`
`security;
`privacy; and
`currency
`
`Each of these issues, and many others, can be resolved through careful planning and implementation of an intranet
`strategy.
`
`Security
`
`Security is a multi-headed issue. First, security can be defined as providing access by the appropriate personnel to the
`correct information, while at the same time barring access to all others. Most popular Web servers today allow such
`
`https://web.archive.org/web/20021221131244/https://www.isoc.org/inet96/proceedings/b2/b2_3.htm[7/20/2017 6:26:17 AM]
`
`9
`
`

`

`Intranets: Internet Technologies Deployed Behind the Firewall for Corporate Productivity
`
`access configuration on a user/group/realm basis, while some in fact, allow the systems administrator to go far beyond
`this, allowing them to limit access rights by specific IP address for individual pages. This capability would potentially
`allow the systems administrator to set access to financial records or personnel files only for the personal computer in the
`CEO's office.
`
`Similarly, access can be barred to all other users or groups, keeping unauthorized personnel from gaining access to
`sensitive financial, company, or personnel records.
`
`Second, security may include encryption, also at several levels. Again, popular Web servers offer Secure Sockets Layer
`(SSL) encryption for communications between the server and browser, effectively scrambling the message and keeping
`it from interception. Encryption may also play a role if the intranet application spans multiple organizations or
`locations-effectively a virtual private network running over the public Internet. An increasing number of organizations
`use their public Web servers in this manner-setting certain pages for use only by partners or customers through access
`control. Intelligent firewall solutions can create "tunnelling" applications that establish and keep open trusted
`communications lines between sites for further security.
`
`Privacy
`
`Privacy is largely an organizational issue, clarified and intensified by the potential capabilities of technology to invade
`one's privacy. In this area, intranet applications can either assist in maintaining users' privacy, or potentially invade it if
`the developer or systems administrator is not careful.
`
`Privacy can be enhanced by the use of intranet applications through the delivery of sensitive information in a largely
`anonymous manner. While the interoffice mail staff may snicker (or worse, peek) when they deliver a memo marked
`confidential, the intranet server will serve all pages with no similar bias or prejudice. Employees can feel free to review
`the employee assistance program information at their desktops. Similarly, they may browse information on maternity
`leave or sabbatical programs without fear of raising eyebrows (or gossip) from their managers or from personnel
`representatives.
`
`On the other hand, some of the tools taken for granted in the Web server marketplace, such as the site log, do have the
`potential for invading privacy. Intranet administrators must balance the desire to track visitors (and therefore, value
`attained from the site) with the need for privacy with regard to certain content. It may simply be inappropriate for the
`company to track who has visited the employee assistance program page, particularly since those with access to the log
`files may be IS rather than human resources personnel.
`
`Some intranet servers allow logging control at the individual file level, allowing systems administrators to disable
`logging for particularly sensitive pages, and thereby avoiding the invasion of users' privacy specifically for those pages
`that may contain sensitive information.
`
`Currency
`
`While intranets allow information to be updated instantly, by no means do they guarantee currency. To this end,
`publishers must be committed to keeping the intranet site up to date, and certain steps may be taken to ensure that
`consumers of the information use it appropriately. Simply putting the "date of last change" on each page will help
`tremendously in this respect, allowing a browser to check that the information is indeed current.
`
`In addition, certain pages, such as competitive matrices, should have regular updates or "refreshes" scheduled, along
`with someone identified to provide instant updating as soon as new competitive information is received. In this way,
`browsers can trust that the information represents the competitive wisdom of the company.
`
`Other steps, such as providing an e-mail address or telephone number of the author, can further assist in the use of the
`information, as users will be able to contact the author to request further information or clarification on specific points.
`
`https://web.archive.org/web/20021221131244/https://www.isoc.org/inet96/proceedings/b2/b2_3.htm[7/20/2017 6:26:17 AM]
`
`10
`
`

`

`Intranets: Internet Technologies Deployed Behind the Firewall for Corporate Productivity
`
`Tools used
`
`A number of basic intranet publishing tools make this new paradigm possible. First, in addition to the Web browser,
`Web servers are available for a variety of platforms found in the typical organization, including all flavors of Windows,
`Macintosh, NetWare, Unix, OS/2, and many others. This general availability allows publishing from virtually any
`computing environment.
`
`Second, an increasing number of tools empower the user to create HTML for the intranet application. Many, if not most
`of the popular word processing packages, allow documents to be saved as HTML, and tools are beginning to enter the
`market that allow for large-scale migration of content from traditional word processing format to HTML (HTML
`Transit from InfoAccess is one such package.) These tools allow the non-sophisticated user to continue to create content
`in their familiar application and to move this content to the server without having to manipulate each file or document.
`Enhancements
`
`Intranets can also provide efficient access to other external information resources, including:
`
`Group access to mailing lists;
`threaded discussion groups; and
`stock quotes.
`
`In this way, the oft-accessed information can be aggregated at the company firewall and efficiently disperse the
`information within the company, thus reducing external bandwidth and connectivity requirements.
`
`Multithreaded discussion group software, or conferencing applications, can run on the same platform as the intranet
`application, providing further opportunities to discuss company issues and the content that resides on the server.
`Intranets versus groupware
`
`While a full discussion of the issues in choosing between an intranet application and groupware is beyond the scope of
`this paper, a few comments are in order. First, intranets and groupware are not mutually exclusive. Many organizations
`find groupware (workflow, collaborative computing, etc.) appropriate for certain focused applications, while intranets
`are appropriate for migrating existing content to online delivery. Others find that a powerful combination in groupware
`and a Web server (Lotus InterNotes engine for publishing Notes databases on the Web, for instance).
`
`Ultimately, each application strategy has its merits. Beyond this, intranet applications and Web servers make an
`excellent foundation for Web-based groupware, allowing organizations to employ a Web-centric IS strategy and
`leverage the nearly ubiquitous Web browser and the powerful navigational aids provided by HTML.
`Summary
`
`In summary, the application of Internet technologies in an intranet setting can dramatically increase the flow and value
`of information within an organization. Users can gain quick and timely access to a much wider variety of existing
`information residing in a variety of original forms and sources, ranging from word processing files to databases to Lotus
`Notes and other resources. In addition, traditional paper-based information distribution can be displaced by intranet
`applications, lowering costs and increasing the timeliness of information flow.
`
`Finally, intranet applications can start as small "pilots" and scale upwards over time, with little initial cost or risk, and
`gradually providing or facilitating access to an increasing breadth of information, thus improving both employee
`productivity and satisfaction, and ultimately bolstering the company's competitive advantage.
`
`https://web.archive.org/web/20021221131244/https://www.isoc.org/inet96/proceedings/b2/b2_3.htm[7/20/2017 6:26:17 AM]
`
`11
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket