Skip to content



In computing, encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded […]

Security overview and e-commerce threats

SECURITY ISSUES IN E- BUSINESS Security is an essential part of any transaction that takes place over the internet. Customers will lose his/her faith in e-business if its security is […]


An extranet is a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible […]

Value Chain in e-commerce,e-commerce in India

VALUE CHAIN IN E-COMMERCE Every activity within a physical value chain has an interent information component. The amount of information that is present in activities determines, company’s orientation towards e-commerce. […]

Line Balancing

Assembly line balancing operates under two constraints:- Precedence requirement Cycle time restriction Precedence requirement: – It is physical restriction on the order in which operations are performed. Cycle time: – […]

error: Content is protected !!