Year In Review: Top Ten Internet Businesses 2004

The internet boom hit a high mark in 2004. With old
standbys and new emergences, the top ten internet
businesses 2004 show a variety of companies all with one
thing in common: they have adapted well to the World Wide
Web. Many companies have difficulties and struggle amidst
the huge ocean of the internet, especially since it is
quite difficult to maintain a personal face. The
companies in the top ten have not only succeeded in the
business sense, they have invaded out daily life and have
become a household name. From meagre beginnings, these
top ten entrepreneur companies have mastered this new
medium and are an inspirational to any budding
entrepreneur interested in starting an internet based
business.

The Internet search engine Google was the top internet
business of 2004. The world’s largest search engine
receives over 200 million hits a day. Businesses pay
Google to have an ad for their website appear to the
right side of the user’s search. The paid advertising
targets consumers seeking information. Google’s initial
public offering gave it a market capitalisation of over $23
billion dollars, placing it between Yahoo and Amazon.com.
In addition to becoming an economic success, the company’s
name has invaded our language. The verb “google” entered
the dictionary with a definition meaning “to look someone
or something up on the internet.” The essence of a truly
successful business is not only one that makes money but
also serves its clients to the utmost potential.

The online auction site eBay.com continued to expand its
services and customer base throughout 2004. As the industry
leader it boasts over tens and millions of members and has
websites in over 17 countries. eBay.com generated over $3
billion in revenues off of a record $34 billion dollars in
Gross Merchandise Volume.

Amazon.com continues to be the world’s number one internet
retailer with 2004 sales in excess of $6.9 billion dollars.
The retailer continues to expand its offerings and
partnerships with other retailers. Recently Amazon.com
rolled out a9.com, which provides consumers with expanded
search options to find merchandise on Amazon.com’s website.
As part of the Tsunami relief effort and in conjunction
with the American Red Cross, Amazon.com set-up an online
donation channel, which raised over $13 million dollars.

Yahoo Inc. provides comprehensive global internet services.
It remains the most visited website with over 3 billion
page views per day. Yahoo launched its own search engine
technology after dropping Google-powered results. Boasting
free and paid email accounts and website complete with
design tools, many pleased clients are using Yahoo.

Expedia, the Washington-based travel company has
revolutionized the entire travel industry. Allowing
individuals to serve as their own travel agents and search
a database of airfares, rental cars, and hotel rooms,
Expedia has allowed everyone to gain access to the
phenomenal travel deals that would previously be
reserved for insiders.

Technology giant Microsoft launched the Microsoft to serve
a variety of needs for a consumer. Boasting email, news,
chat software, and website hosting, MSN is one of the most
visited websites on the internet.

America Online has found a great deal of competition with
companies like MSN and Yahoo! but is still one of the most
popular internet service providers out there. Boasting an
entire network of satisfied customers, AOL goes beyond the
service of other providers. Many individuals new to the
internet choose to use AOL due to its ease of use and
availability all over the globe.

Netflix has become an increasingly popular option for many
movie-renting customers. Instead of having to travel to
your local movie store, the movies are shipped directly to
your home. You have an unlimited number of rentals and
pay a nominal monthly fee for the service. By lowering its
fees in the middle of the year to compete with lower
competitor prices, Netflix drastically increased its
clientele.

With the popularity of burning audio and video files to
create your own CDs, many copyright issues have taken
center court. Instead of illegally trading music for free
using person to person programs; Real.com has a wide array
of songs available for legal download for a nominal fee.
Additionally, Real.com offers a variety of free and pay
media players so individuals can play MP3s, CDs, DVDs, and
any other type of media file directly on their computer.

The last internet company in the top ten is online retailer
and technology giant Apple. Their website Apple.com boasts
an amazing number of customers each month, as it provides a
forum to purchase Apple products along with different
programs necessary for maintaining your Apple computer,
iPod, or any other electronic product sold by the company.

Order Fulfillment – The Process Involved

If you look for the meaning of Order fulfillment in a business dictionary you will find that it is a sequence of procedures involved in fulfilling the needs of the purchaser. In the broader context it is a process of events that are carried out to execute the customers’ purchases and the steps involved in carrying out these events are as follows:

Product Inquiry: This is the initial inquiry about the product that you have available to the clients. They can do this on your website and they will be informed about the products. They will find a Catalogue with all the products available to them and then they can search for their desired product.

Sales quote: A sales quote is a guideline of the price of the products they wish to purchase and will enable the buyer to work out the budget involved.

Order configuration: Once the sales budget is decided upon this is the next step involved. It is the process where the products are finalised and selected depending upon the customers’ requirements.

Order Booking: This is the official document that confirms the booking made by consumers and is issued to them

Order Acknowledgment/Confirmation: This is the confirmation or acknowledgment that confirms that you have received the order and that it is being processed.

Invoicing: This is the paperwork that will set out the actual cost of the goods to the client according to their requirements.

Order Sourcing/ Planning: This is the process that is to be carried out to find the products and prepare them to be delivered to the client.

Order changes: This is the process that is carried out to make any amendments, should the purchaser change his mind about his requirements.

Order Processing: Once the order has been confirmed it is then processed at the warehouse or place where it is stored where it is then packed and delivered to the purchaser.

Shipment: This refers to the transportation and shipment needed in delivering the products.

Delivery: This refers to the final delivery of the products to the customers.

Settlement and Returns: This involves the settlement of the invoice once the delivery has been received and should the goods be unacceptable or not required then they can be returned using the returns procedures.

SaaS – Ecommerce Sites – Twitter Case Provides Critical Lessons in Administrative Security

In June, 2010, the Federal Trade Commission (FTC) settled charges that Twitter’s micro-blogging site had engaged in lax security practices that amounted to “unfair and deceptive trade practices”.

While previous cases brought by the FTC for lax security procedures focused on lax electronic controls, the Twitter case focused on lax administrative controls. Webmasters of SaaS and ecommerce sites who fail to learn and apply the critical lessons of the Twitter case do so at their peril.

Twitter Case Facts – Two Hacks

The FTC’s complaint against Twitter alleged that lax administrative controls for data security permitted at least two hackers to acquire administrative control of Twitter resulting in access to private personal information of users, private tweets, and most surprising – the ability to send out phony tweets.

Here’s how the hackers got access to Twitter. According to the FTC, hacker no. 1 was able to hack in by using an automated password guessing tool that sent thousands of guesses to Twitter’s login form. The hacker found an administrative password that was a weak, lowercase, common dictionary word, and with it the hacker was able to reset several user passwords which the hacker posted on a website that others could access and use to send phony tweets.

Hacker no. 2 compromised the personal email account of a Twitter employee and learned of the employee’s passwords that were stored in plain text. With these passwords, the hacker was then able to guess the similar Twitter administrative passwords of the same employee. Once into Twitter, the hacker reset a user’s password and was able to access the user information and tweets for any Twitter user.

Twitter Settlement Lessons

The FTC noted that Twitter’s website privacy policy promised: “We employ administrative, physical, and electronic measures designed to protect your information from unauthorized access.”

Focusing on Twitter’s administrative controls (more accurately on the lack thereof), the FTC alleged that Twitter failed to take reasonable steps to:

* require employees to use hard-to-guess administrative passwords that they did not use for other programs, websites, or networks; * prohibit employees from storing administrative passwords in plain text within their personal e-mail accounts;

* suspend or disable administrative passwords after a reasonable number of unsuccessful login attempts;

* provide an administrative login webpage that is made known only to authorized persons and is separate from the login page for users;

* enforce periodic changes of administrative passwords, for example, by setting them to expire every 90 days;

* restrict access to administrative controls to employees whose jobs required it; and impose other reasonable restrictions on administrative access, such as by restricting access to specified IP addresses.

* The FTC settlement included (among other things) the requirement that Twitter set up and manage a comprehensive data security policy that will be reviewed by an independent auditor periodically for ten years.

Conclusion

The FTC represents consumer interests to prevent fraudulent, deceptive, and unfair business practices. Privacy and data security have been high-priority issues for the FTC, as evidenced by the 30 cases brought over the last few years for lax data security practices.

In its investigations of data security cases, the FTC looks at 2 standards:

* what the FTC considers as “standard, reasonable” security procedures, and

* what a website’s privacy policy promises to consumers regarding data security.

If the website’s actual data security practices do not measure up to either of these standards (a worst-case scenario would be the failure to measure up to both), the FTC concludes that the website has engaged in lax security practices that amount to “unfair and deceptive trade practices”. A complaint and costly lawsuit may follow.

The reason that the FTC publishes the results of its settlements is to provide lessons to others regarding what the FTC regards as an “unfair and deceptive trade practice”.

Do you know if your site measures up to the two standards?

Copyright: 2010 Chip Cooper