You are on page 1of 44

c

c
c
c
c


c  cc

c
c
  ccccc c c c c c   cccc
Rajveer singhc c c c c c c c  c c
Ratnesh Kumar Mishrac c c c c !÷ 
Sc
<rfan Ahmad
Rajesh kumar
Anurag singh

%"%c##"c$c%% c%c&' c

 (
) c *c+c###,c   c  c,c!" Sc
Y 

  
 

~ 
   

 

 

 

 

 
 

  

 









! 
" #$

% &

 

'(

)
*+

,
 -


,
    #
’ .
/# 

0 1
*
   

2 &*
 *
   

~3 4     


  

Feasibility study
 



#
 



#
! 



#
~~  
‘  

 
5  
# 
   .


~ 16 7


 

/5+8

& .9" 
$ 


)
9"  $ 


~  

pesting Process
~     *
   


c%cc

eMusic Shop is basically the collection and distribution of "all" data to "all" areas of
business. phe data can then help market the company, help up sell to existing customer,
understand customers better so that customers can be given better service and allows them to
interact with the company by whatever means they wish.

phe <nternet is just like other information technologies - change management, good
implementation practices and clear business objectives are required in order to reap the full
benefits.

—c Yreate cost-savings and operational efficiencies


—c Yreate additional revenue
—c Reach more customers and markets
—c <mprove marketing and promotions
—c Meet the needs and expectations of customers and suppliers
—c Yoncentrate on the things that matter
—c Make it easier for people to do business with we
—c phe cost of not being there
—c Play on a level playing field
—c Æelp meet business goals.

c-   ccc

{eveloped a new business concept which will assist global and local Music and Media ventures.
As the future unfolds, we envision this site becoming the market leader AN{ influencing
decision tool AN{ resource for global Unsigned Artists, Producers, Music {istributors, Event
Venues, Fairs, Yompetitions, Exhibitions and to all Music and Media <ndustry roles.

At this very moment we are working hard to build confidence and play a role in building a better
world by bringing talented people an opportunity to compete with each other, regardless of
national origin, gender, language, or economic status.
c   ccc

de gather and provide an all-encompassing resource for our global and local target groups. de
enable anyone who wants to pursue their career in the Music and Media <ndustry by providing
the information and services to do so. de apply the best business practices with highly qualified
and experienced professionals with domain knowledge. de provide resources and solutions for
the dynamic Music and Media environment in this digital driven world of business.

%#%'c

eMusic Shop is a web-based application intended to provide automated solution and services to
customer.

Yonsider a Business organization which have all of its business through <NpERNEp
i.e., dEBS<pES.

phe Business Organization has its offices in few states and normally use courier facility
to deliver the product .<f possible home delivery is also possible.

phis Business Organization mainly has two sectors first one is sale which sale the product to the
customer and second is service which is provided to the customer.

BUS<NESS ORGAN< Ap<ON

SALE SERV<YE

eMusic Shopprovide sales and service to customer by interaction with customer.

phe success of a company is mainly based on its satisfied customers, which in turn gives
huge profits.
Retaining existing customers is also an important job of a company. eMusic
Shopconcentrates on the retention of customers by collecting all data from every interaction,
every customer makes with a company from 'all' access points whether they are phone, mail, web
or field. phe company can them use this data for specific business purposes viz., marketing,
service, support or sales.

"# c

"c%% c%c

YEO & M{<n our organization one YEO & M{ who manage all the organization and take
decision or also develop the strategy.

General Manager - Marketing manager two for two shifts and develop the marketing strategy on
the basis of survey or primary or secondary data.. and later on the future aspects of our business
(opening franchise) at each center we have one general manger .
Secretory-- which helps to manager to give the summary of our organization and mentain the
events or meeting of YEO or general manager.
<p manager-- four<p manager which helps to develop and implement the new <p based
technology. <p manager basically helps for short term or long term planning who develop the
web application and manage the whole web access.<p manger also helps to give the training of
new employees during the recruitment .
Æouse Keeping -- five cleaners at the Æead office of our business at the starting of the business
but later on at each center 2 to 3 house keeping are there.
Æelpers - ten helpers at the head office which helps to deliver the product which is originally
does not given in the website or when links are does not available.
c

."# c

Yomputer :

de will need a computer that is fast, very reliable, can be upgraded to a larger memory,
and can not only connect to the <nternet but also run standard business software such as
word processors and spreadsheets.

phere are two main types of computers we can buy:

1.c a personal computer, often referred to as a PY


2.c a Macintosh computer, often called an Apple Macintosh.

phese are the ÷  ÷÷ specifications we should strive for as of June 2003.

—c   <ntel compatible {ual core or equivalent and 2.1MÆz


—c  : 2GB of Random Access Memory (RAM)
—c  ) : 250GB (gigabytes) hard drive, 1.44MB 3.5inch floppy disk drive, Y{ or
{V{ reader & writer
—c  : 512Kbps (kilobits per second)
—c    ) : Microsoft dindows XP
—c #   c/(  : Microsoft <nternet Explorer or Netscape

Expect to pay between $750 - $1,500 for a Linux-based computer assembled and sold by a local
computer store. Linux PYs sometimes cost less, as we do not need to pay a software licence fee
to use Linux and related software.

Apple computer

phe following models, as of June 2003, would be adequate for <nternet access and business use:

1.c ©00MÆz eMac with 40GB hard drive, Y{ drive


2.c 1GÆz eMac with 60GB hard drive, Y{ read/write and {V{ read drive.

Expect to pay between $1,500 -$2,000 for these configurations. Apple computers come with
built-in modems and networking.
 c/(  c

phe software for using email and the deb is free. <t comes already loaded on new computers or
can be obtained free from the <nternet or from promotional Y{ ROMs that accompany many
computer magazines available in newsagents.

<t is highly advisable to purchase business software at the time of ordering a new computer as it
is usually much cheaper that way.

A standard business software package includes a word processor, spreadsheet, scheduling and
database software. phe most commonly-used business software package in Australia is Microsoft
Office, which includes the elements above. Expect to pay for Microsoft Office XP Professional
package purchased separately from the computer - approximately $© for the PY version or
$6 for the Macintosh version (prices as advertised in September 2003 by national retailers). <f
packaged with a new computer, Microsoft Office XP Professional would cost much less. <f we
have an old version of Microsoft Office, then we may be able to upgrade to Office XP at a
reduced price.

Alternatively, we can download a free business software package for dindows or the Macintosh
from the OpenOffice.org site (www.openoffice.org) phis will give we the same functions
offered by Microsoft Office XP. de will also be able to share files with others that use
Microsoft Office. <f we use a Linux PY, we will likely have OpenOffice.org installed already.

dhen researching the ideal computer for our business, we might like to access these sources and
undertake these activities:

—c contact or visit three computer stores and compare advice and prices
—c look in our local newspapers for computer advertisements
—c ask a colleague or friend who uses computers and the deb frequently
—c ask a friend who works in the computer industry for advice
—c ask our accountant or business advisor for advice
—c visit computer manufacturers' websites
—c visit Yhoice Magazine's website and find articles on computers.
 )c  c


- 
0 where we connect by dialling up via a normal telephone line.

Fastc0cbroadband or <S{N -c

Broadband offers a number of options:

1.c {SL {igital Subscriber Line refers to a group of technologies, the most common being
A{SL or Asymmetric {igital Subscriber Line. {SL uses our existing telephone line to
deliver high-speed <nternet access. <t allows voice communication and high-speed data
transmission on the same line at the same time.
2.c Yable <nternet uses the Pay pV cable network to bring we broadband <nternet access.
3.c Satellite broadband uses a satellite dish to connect to the <nternet.
4.c #1 stands for, <ntegrated Services {igital Network. <t sends data via a digital phone
line to national and international destinations. <t can be used to deliver the total <nternet,
telephony and fax requirements of a small business.


c c  cc2  cc#   c 2  c

Yonnections to the <nternet, both dial-up and broadband, are offered by companies called
<nternet Service Providers (<SPs). An <SP is our gateway to the <nternet. <SPs provide:

—c a computer in our locality (called a server) to which we connect using a modem and
through which we can access the deb
—c an email address for we - eg sales@freshfruitmart.com.au
—c a send-and-collect service for our email messages.

 )c
c c c c c c c

An email address will allow we to communicate with our customers, clients, suppliers, bank and
anyone else we do business with or who wants to do business with we. <t is one of the first steps
in using e-business.

de have two choices for selecting the name of our email address.
1. Accept an address that piggy-backs off our <nternet Service Provider's name - eg
freshfruitmart@ispname.com.au phis is a relatively inexpensive option but associates our name
with our <SP. phis option simply requires that we select the name to go at the left of the @ sign,
and then our <SP will establish it for we - eg mycompanyname@ispname.net.au

2. Register our own <nternet name (called a domain name) with the registration authority in
Australia and have our <SP establish an email address using that name - eg
sales@freshfruitmart.com.au

phis is more expensive than option 1 but it offers a more advanced level of e-business as it gives
our company its unique place on the <nternet. Another advantage is that it moves with we if we
choose to change <SPs or have our website hosted by another company.c


c/c c c c

Prior to applying for a domain name we should check that the name we are seeking is available.
{o this by visiting the Australian Registry site - http://www.ausregistry.com.au or phone them
on 03 ©66 1 70.

{omain names are licensed on a "first come, first served" basis to eligible applicants by
registrars who have been accredited by the official administrator for the .au domain space, .au
{omain Administration Ltd (au{A). Most <SPs will register our domain name for we with one
of these official registrars. de can register and pay for domain names ourself by visiting the
websites of registrars.

Visit the au{A website (http://www.auda.org.au) for links to registrars and resellers to confirm
current fees and options.
$"1# c

 0Requirementsc

Start-up Expenses
Legal $1,500
Other $2000
potal Start-up Expenses $3,500
Start-up Assets Needed
Yash Balance $50000
Other Yurrent Assets $50,000
potal Yurrent Assets $100000

Long-term Assets $0
potal Assets $100000
potal Requirements$ 5000
$  )c
# 2  c
<nvestor 1 $25,000
<nvestor 2 $15,000
potal <nvestment $40,000
Yurrent Liabilities
Accounts Payable $1,000
Yurrent Borrowing $0
Other Yurrent Liabilities $0
Yurrent Liabilities $o
Long-term Liabilities $ 0000
potal Liabilities $ 0000
profit at Start-up ($5,000)
potal Yapital $37,000
potal Yapital and Liabilities$127,000
c
""# cc

  
)c

`  SQL is a standard language for accessing and manipulating databases. Our SQL tutorial
will teach we how to use SQL to access and manipulate data in:

MySQL, SQL Server, Access, Oracle, Sybase, {B2, and other database systems.

d d` 

a.c.Security Management:

SQL Server provides a controlled access to data to users by providing a combination of


privileges.

b.Backup and Recovery:

SQL Server provided sophisticated security backup and recovery routines.

c.cOpen connectivity:

SQL Server provides open connectivity to and from other vendor¶s software such as
Microsoft. Also SQL Server database can be access by various front-end software¶s such as
Microsoft Visual Basic ®, Power Builder etc.

d.Space Management:

<n SQL Server once can flexibly allocate disk spaces for data storage and can control
them subsequently. SQL Server © is designed with special feature of data warehousing

d d ` 

1.c Rich Ylass Frameworkccc


2.c Yompiled executionccc
3.c Rich output cachingc
4.c deb-Farm Session Statec
5.c Enhanced Reliabilityc
6.c Easy {eploymentc
7.c {ynamic update of running applicationccc
c
"#'1# cc

1# # c&c3#c

"'c!"#$#1c1#$c'% "% Scc

phe Unified Modeling Language (UML) is a standard language for specifying, visualizing,
constructing, and documenting the artifacts of software systems, as well as for business modeling
and other non-software systems. phe UML represents a collection of best engineering practices
that have proven successful in the modeling of large and complex systems. phe UML is a very
important part of developing object oriented software and the software development process.
phe UML uses mostly graphical notations to express the design of software projects. Using the
UML helps project teams communicate, explore potential designs, and validate the architectural
design of the software.

˜  

phe primary goals in the design of the UML were:

1.c Provide users with a ready-to-use, expressive visual modeling language so they can
develop and exchange meaningful models.
2.c Provide extensibility and specialization mechanisms to extend the core concepts.
3.c Be independent of particular programming languages and development processes.
4.c Provide a formal basis for understanding the modeling language.
5.c Encourage the growth of the OO tools market.
6.c Support higher-level development concepts such as collaborations, frameworks, patterns
and components.
7.c <ntegrate best practices.
d  


As the strategic value of software increases for many companies, the industry looks for
techniques to automate the production of software and to improve quality and reduce cost and
time-to-market. phese techniques include component technology, visual programming, patterns
and frameworks. Businesses also seek techniques to manage the complexity of systems as they
increase in scope and scale. <n particular, they recognize the need to solve recurring architectural
problems, such as physical distribution, concurrency, replication, security, load balancing and
fault tolerance. Additionally, the development for the dorld dide deb, while making some
things simpler, has exacerbated these architectural problems. phe Unified Modeling Language
(UML) was designed to respond to these needs.

 
  `

1. USE YASE

A use case is a set of scenarios that describing an interaction between a user and a
system. A use case diagram displays the relationship among actors and use cases. phe two main
components of a use case diagram are use cases and actors.

An actor is represents a user or another system that will interact with the system you are
modeling. A use case is an external view of the system that represents some action the user
might perform in order to complete a task.
3#c

$ c c
c
~c   
c   
c   
c ÷  
c  
c     
7.c Admin Login Page
©.c {efault admin page
.c Product add page
10.cProduct update page
11.cService Add page
12.cService Add Page
13.cReport Page
14.cSearch Page
15.cRegistration Page
16.cÆow to Buy
   
/  )


&- 4 / 5

4'/!

81  5*


c
1# c

   ÷

÷ 


/
 
: /
+
*  


4
#
+

  

4 
/

4 



5  1 +  4  1
4 
- 


‘ c

1  4#
'
1


1  + 1  


)#1
 

1  +
1  ,
 

i    

+
 1 + 

&
 ; 

c   

c
%# c% c

4c 
c )  c

de probably send more e-mail than we make phonecalls, write letters and have meetings with
people combined. <f we have a website, and we want people to visit it, then at the end of our
email is the ideal place to put the link. Email tends to go beyond our immediate network of
friends, and expand to a wider, but related, community. Putting the address at the bottom of our
mail won¶t guarantee they¶ll click the link but not putting it there guarantees they won¶t. Better
still, write a short line that says what they¶ll find when they go there. Something like this,
perhaps:

Æi James, phanks for all our help. Much appreciated. Yheers, Andrew {ubber
_______________________ Advice for independents at New Music Strategies:
http://newmusicstrategies.com

dhatever email software or webmail platform we use, there¶ll be a way of putting together an
email signature file that will be automatically attached to the bottom of every email we send.
Keep it short and sweet, give them a reason to click it ² and get ourself in the desktop of
everyone we ever write to.

<MPORpANp: {on¶t spam. Sending unsolicited marketing emails is not only rude and
offputting, it¶s also illegal. Put our links in the signature of legitimate emails that people will
actually want or expect to receive.

•c
)c c

Another way to get our identity out there is to leave comments in relevant blogs. Feel free to try
it here. Most blog sites give we the opportunity to include our URL, and whatever we write in as
our name will act as a link back to our website. Other people who read the blog, and then are
interested in what we have to say in response to it will often click on the link to go back to our
site and find out more about we. Again ² the spam rule applies. drite something appropriate,
interesting and relevant. People won¶t click on the link of someone who just posts to get the link.
Besides, most of us use comment spam filtering systems like Akismet. A related strategy is to
link to other people¶s blogs on our own site. Most blogs publish µprackbacks¶ - which are snippet
quotes and links to other sites that have linked to their own. dith dordpress (the blogging
software < use), it happens automatically. <f we link to this page from our blog, this page will
automatically have a link back to our blog on it.

Ãc$ c  2 c

Another excellent strategy for providing links back to our own site is the activity of posting in a
relevant forum. <n a forum, we can build a reputation, get people genuinely interested in our
contribution to whatever the conversation happens to be, and then want to look at our profile and
head back to the page that we put in there to find out more about we and our interesting
personality. polerance of time-wasters and spammers is especially low in this environment, and
punishments for transgression are swift and harsh. Spend our time finding the right conversation,
and contribute to it as we would if the people were in the room with we. Nobody likes a troll.

' (


&# 1  

8
7/

5*

4'/!
8
71#5*

857
"
 :/
$

8 *
 
  
7 1  
Úc
c (* )c

phis is where the idea of distributed online identity really comes into play. phere are so many
web 2.0 sites online (some listed above), and many of them require that we construct and
maintain an µidentity¶ or µprofile¶. de have a profile on MySpace already, no doubt, and it links
back to our site. de can also have a profile on Mog, Last.FM, Flickr, {elicious, 43 phings,
Facebook and more. phere¶s a list of social networking sites at dikipedia. Go and hand pick a
few, set ourself up an account and start using them. {o bear in mind that there¶s a time
commitment associated with the success of each of these. de can¶t just open a MySpace page
and expect people to read it any more than we can expect to launch a website and expect people
to just find it. phey are social networking sites. Be sociable. Network.Each of these sites has its
own rules, culture and expectations. Get to know them, and the people there. phen there¶ll be a
reason to belong to those sites ² and the effort will have been worthwhile. Above all, remember
that becoming an µidentity¶ in each of these arenas strengthens our overall online presence.

5c
 
c  c

phis one¶s a bit of an µadvanced user¶ tip ² and it can have its problems ² but it¶s definitely
worth mentioning. Æaving more than one related website can really help our cause. phis is
particularly true of independent music companies that do more than one core activity. Let¶s say
we¶re a promoter, a distributor, a record label, and we manage a handful of bands. Each of those
should have its own website, and those are the sites that we should direct people towards in
regard to those specific things. <f our company is (let¶s say) Plank Music, we should have
plankrecords.com, plankdistribution.com, plankpromotions.com ² and they should link back to
each of the others, with a simple home page (plankmusic.com) that directs outwards to each of
the different branches. phose links between each of those pages strengthens the identity of each
aspect of the business ² and also the main brand.

" )c
c  c 6   c
c$c0 c    c

Promotion and publicity are essential on two fronts : po ensure consumer awareness of a
particular album or band. <t is essential that this awareness be carried across all delivery
platforms from posters around the local live music venue, to in-store promotions in retail chains,
to advertisements on radio and music videos on television. Promotion is essential to building
pride in and recognition of the value of music. phis is critical for increasing sales, but is also
central in attracting skilled and creative people to the music industry - people who might
otherwise be lost to different industries or countries. phus strong promotion is a key part of
attracting people to the music industry and ensuring that there are sufficient revenues to keep
them there.

(!)


"5'/,5,5/;$

4'/!

5*+-'  ' 5  


 

"+-(
5,
 #-' $

Social Media Optimization (SMO) deals with the online publicity of any specific business,
products or person engaged in professional or social activities. phere are some well defined
methods for Social Media Optimization. Basically social media tools (depube, Flicker, etc.),
online communities and social networking websites are used for this purpose.

Nowadays, some most popular mediums (or tools) being used in Social Media Optimization and
Social Business Networking are Facebook, pwitter, MySpace, depube and dordPress (along
with other popular blogging websites). Although it's related (and somewhat similar) to Search
Engine Marketing but it differs from Search Engine Marketing in several aspects.
Both target on organic traffic diversion to a website and generating sales leads. Æowever, in
Search Engine Marketing the stress is always in driving traffic from major search engine by
attaining higher ranks for targeted keywords, whereas in Social Media Optimization traffic is
diverted to the intended website from unconventional sources like Facebook, pwitter, depube
and MySpace.

po promote e-Business, SMO is essential. One cannot disagree with the importance of SMO and
SBN in modern e-Yommerce. Nowadays, no online marketing or advertising campaigns are
complete without using most popular SMO tools like Facebook and twitter. phe world has
witnessed extensive use of these powerful mediums in recent US presidential elections.

phe reason behind increasing use of SMO tools is the ever increasing user base of <nternet and
Social Networking. Nowadays, people may not have their own Bank Account or <nsurance
Policy, but everyone has at least one (or may be many) profiles on Social Networking debsites
like Facebook and MySpace. pherefore, targeting these users to sell our products and service is a
beneficial act. <f done well, we can reap several times more wealth in our e-Business.

A majority of <nternet users follow tradition of e-Shopping. phey find it convenient, useful and
Yost Effective. pherefore if someone is trying (or already having) to enter in any online business,
they cannot ignore this large pool of potential customers.

{ue to enormous popularity and effectiveness of these tools nowadays, every website gives
dedicated place to their Facebook, twitter and MySpace URL's on their website's home page. <t
helps in making interactive communication of messages between two entities (merchant and
customers) involved in e-Business.

Learn to monetize blog and earn quick money online, since blog has became the most important
social media platform in social media marketing to generate new business leads.

A majority of <nternet users follow tradition of e-Shopping. phey find it convenient, useful and
Yost Effective. pherefore if someone is trying (or already having) to enter in any online business,
they cannot ignore this large pool of potential customers.
{ue to enormous popularity and effectiveness of these tools nowadays, every website gives
dedicated place to their facebook, twitter and MySpace URL¶s on their website¶s home page. <t
helps in making interactive communication of messages between two entities (merchant and
customers) involved in e-Business.

 c    cc

Marketing our music is the third essential key of our music business because without getting
exposure for our art, we would have no way of growing our fan base and increasing our bottom
line. <n an effort to understand marketing better, let¶s recap on some of the foundational
learnings from the first guide:

Like as --

Music promotion is all about two things:-

1. growing a fan base, and

2. promoting our music in innovative ways.

First, we¶ll need to grow a following, add addresses to our mailing list, get fans on our Facebook
page and friends on our Myspace. phen as we build a relationship with them, we¶ll offer them
our music in innovative ways that¶ll inspire them to get out their credit card. For example,
downloads, Y{s, gigs, merchandise, etc are all ways of doing this. Music promotion is a two-
way relationship between we and our fans. Gone are the days of one-way broadcasts from the
artist to the fan. Music businesses and musicians today need to focus on building an interactive
and engaging relationship with their fans. Blogs that allow comments from readers, listeners and
viewers are a great way of doing this. Music promotion is easier using the internet. Growing
pages on various social networks where there are already hundreds and thousands of people is
much easier than going out to find people. phe internet has slightly leveled the playing field for
indie musicians. Growing a fan base is important. <t is the only way we can quantify how many
fans we have and it is the best way to help we decide whether we are ready to launch our album
or not. <f we don¶t have enough fans on our list, we¶ll know we won¶t get as many sales as we
may want.
 / c/c c 0 
 2  cc 0cc

<n the early days of the deb, some people sold websites to businesses promising they would
generate large revenues from online sales. phat kind of over-sell back-fired, sometimes leading
to extreme scepticism and an unwillingness to use the <nternet for business at all. Of course, the
reality of the potential of websites to provide another source of revenue lies somewhere in the
middle. For some, their website will not generate income directly, rather it supports their offline
activities and contributes to meeting business goals and financial targets. Others reap
considerable additional revenue from their website via selling information, products or services
online. c

Some businesses are fortunate because they provide information, goods and services that users
seem very willing to purchase online, such as travel, financial services, books, Y{s,
entertainment, and many items traditionally bought through mail-order catalogues.

phe <nternet has provided many businesses with a whole new revenue stream at relatively low
cost.c

c 2 )c *
c

Use this checklist to identify the cost-saving centres and areas of efficiency gains that effective
use of email and a carefully planned website can offer:

—c 2  )c /   - reduce staff time on the telephone with customers and suppliers
by referring them to the website - also some telephone enquirers will be better informed
as a result of referring to the site and therefore will take less time.
—c * )c c  - data entered into an online form with appropriate links into the
organisation's database accounting system bypasses staff, freeing them to market and sell
more tickets, memberships etc.
—c 
 )7  ) - reduce cost of outsourcing to printers and graphic designers for
brochures, research, concert programmes.
—c  ) - reduce through-put and need for more and/or larger photocopiers.
—c $ 8 ) -reduce cost and time involved in re-keying data and reduce errors in
interpretation of poor quality originals, eg handwritten forms and poor quality faxes.
—c  ) c c 
) - reduce expense and time.
—c   - reduce the overall paper consumption and therefore cost.
—c   )c  - streamline processing of forms, eg online membership applications
and orders.
—c % c )  - an e-commerce solution reduces processing of accounts,
reconciliation, banking and can improve cash-flow.
—c      c c  )c  - using email groups can reduce phone calls, time
consumed in arranging meetings, number of face-to-face meetings, cost of getting people
to meetings

//  cc) c

phere are plenty of ways to enhance our online music store and make it more efficient and
profitable. One of them is to make use of various e-commerce modules. phis proficient software
will help to make our store up to date, always updated, more intelligent, etc. de can use this
software depending on our shopping cart type osYommerce or whatever is relevant for we.

Modules for e-commerce needs suggest wide range of opportunities to make our business more
profitable. phese instruments make managing of our online store pretty uncomplicated, which
saves our time and efforts. {ue to this software our store will always stand out against the alike
ones, will always have updated information, attractive propositions for potential customers, have
great SEO rank, etc. Yustomers are going to be more loyal to our store and ready to purchase
more!

Benefits of e-commerce modules are many. po point out a few:

* Æigh Quality  we get software developed by experts  modules are perfectly developed and
reliable.
* Save pime  ready-made modules give we extra free time, which we can spend working on
other features of our online business.
* Bring <nnovations  these tools meet the existing needs of e-commerce area as well as new
tendencies in this sphere.
* Modern {esign  using these modules we add a unique touch to our site, make it unlike the
other similar ones (pag Yloud Module, Event {esigner, XML Site map Modules, etc.)
* <mproved Functionality and Automation - our online store performs smooth, without our
frequent concern.
* No Monthly Fees - we buy modules once and forever, paying for updates only if necessary.



) c c  c

c%%'#c

System Analysis is a management technique, which helps in designing a new system or


improving an existing system. System Analysis is the process of gathering and interpreting
facts, diagnosing problems (if any), using information to recommend improvements to the
system. phere are four basic elements of system analysis: - Output, <nput, Files, processes. For
computerization of any system, the existing system must be thoroughly being understood to
determine ³how the computer can be best used to make its operation most effective´. phis is
acquired by analyzing existing system.

$%##'#c"1c
Feasibility study is the process of determination of whether or not a project is worth
doing. Feasibility studies are undertaken within tight time constraints and normally culminate in
a written and oral feasibility report. < have taken two weeks in feasibility study with my co-
developer. phe contents and recommendations of this feasibility study helped us as a sound basis
for deciding how to proceed the project. <t helped in taking decisions such as which software to
use, hardware combinations, etc.

pechnical Feasibility
Economical Feasibility
Operational Feasibility
1.   
c$  

pechnical feasibility determines whether the work for the project can be done with
the existing equipment, software technology and available personnel. pechnical feasibility is
concerned with specifying equipment and software that will satisfy the user requirement.

phis project is feasible on technical remarks also, as the proposed system is more
beneficiary in terms of having a sound proof system with new technical components installed on
the system. phe proposed system can run on any machines supporting dindows and <nternet
services and works on the best software and hardware that had been used while designing the
system so it would be feasible in all technical terms of feasibility.

2.   
c$  


Economical feasibility determines whether there are sufficient benefits in creating


to make the cost acceptable, or is the cost of the system too high. As this signifies cost-benefit
analysis and savings. On the behalf of the cost-benefit analysis, the proposed system is feasible
and is economical regarding its pre-assumed cost for making a system.

de classified the costs of eMusic Shop according to the phase in which they occur.
As we know that the system development costs are usually one-time costs that will not recur
after the project has been completed. For calculating the {evelopment costs we evaluated certain
cost categories viz.

1.c Personal costs


2.c Yomputer usage
3.c Supply and equipments costs
4.c Yost of any new computer equipments and software.
' (


1  ,
 

/1

4'/!


1

  1  

4 /
*
 

3.    
c$  


Operational feasibility criteria measure the urgency of the problem (survey and study phases) or
the acceptability of a solution (selection, acquisition and design phases). Æow do we measure
operational feasibility? phere are two aspects of operational feasibility to be considered:

UML (UN<F<E{ MO{<FY LANGUAGE)

phe Unified Modeling Language (UML) is a standard language for specifying, visualizing,
constructing, and documenting the artifacts of software systems, as well as for business modeling
and other non-software systems. phe UML represents a collection of best engineering practices
that have proven successful in the modeling of large and complex systems. phe UML is a very
important part of developing object oriented software and the software development process.
phe UML uses mostly graphical notations to express the design of software projects. Using the
UML helps project teams communicate, explore potential designs, and validate the architectural
design of the software.

d  


As the strategic value of software increases for many companies, the industry looks for
techniques to automate the production of software and to improve quality and reduce cost and
time-to-market. phese techniques include component technology, visual programming, patterns
and frameworks. Businesses also seek techniques to manage the complexity of systems as they
increase in scope and scale. <n particular, they recognize the need to solve recurring architectural
problems, such as physical distribution, concurrency, replication, security, load balancing and
fault tolerance. Additionally, the development for the dorld dide deb, while making some
things simpler, has exacerbated these architectural problems. phe Unified Modeling Language
(UML) was designed to respond to these needs.

' )
- c

phe exponential growth of the <nternet and online activity raise a number of new regulatory
issues and legal questions. Æow does copyright apply to digital content? Æow can national laws
apply to activities in cyberspace? Yan privacy and data protection exist on the deb? Yan
electronic commerce really be secure? Should governments tax cyber trade? Yan cyberspace be
regulated by one, or by many authorities? <n seeking to apply the law to the <nternet, problems
arise owing to the fact that most laws largely apply to the pre-cyberspace world.


 c   

Some federal, state and territory governments encourage the adoption of electronic commerce by
enacting and enabling legalisation. <n Australia many bills and acts have been passed to resolve
legal issues and make electronic transaction more authenticated, such as the Electronic
pransaction Act (EpA). EpA enables contractual dealings, such as offers, acceptances and
invitations, to be conducted electronically, and also allows people to use an electronic signature
to satisfy any legal requirement.

Moreover the bill is expected to boost electronic commerce as an effective tool for businesses to
increase their efficiency. phis may reduce administrative duties, storage and operational costs for
businesses

 2 c%c  

dhile shopping on the <nternet, most people typically do not think about what is happening in
the background. deb shopping is generally very easy. de click on a related site, go into that
site, buy the required merchandise by adding it to our cart, enter our credit card details and then
expect delivery within a couple of days. phis entire process looks very simple but a developer or
businessmen knows exactly how many hurdles need to be jumped to complete the order.
Yustomer information has to pass through several hands so security and privacy of the
information are a major concern. phe safety and security of a customer's personal information
lies within the hands of the business. pherefore businesses have to give the customer first their
guarantee, and second peace of mind, that the information passed over is of no risk to any
invading eyes.

<n traditional and online trading environments, consumers are entitled to have their privacy
respected. debsites should provide the customers with choices regarding the use of their
personal information, and incorporate security procedures to limit access to customer
information by unauthorised parties. Privacy policies and procedures should be clearly explained
to customers. Although respecting consumer privacy rights is a legal requirement, it also
represents good business practice. <f customers trust a site and business then they are more likely
to trade with it.

 )c%c  *

Many attempts have been made to address the issues related to copyrights on digital content. E-
commerce has a tremendous impact on copyright and related issues, and the scope of copyrights
is affecting how e-commerce evolves. <t is essential that legal rules are set and applied
appropriately to ensure that digital technology does not undermine the basic doctrine of
copyright and related rights. From one perspective, the <nternet has been described as "the
world's biggest copy machine" . Older technologies such as photocopying, recording and taping
are bound by rules and regulations regarding quantity, content, quality and time constraints. <n
contrast, on the <nternet one person can send millions of copies all over the world [©.

Generally, a trademark can be owned by an individual, a company, or any sort of legal entity.
dhen someone else tries to use that trademark (e.g., our distinctive name or logo) without
authorisation, it could be considered an illegal dilution of the distinctive trademark. <f someone
uses a trademark in such a way as to dilute the distinctive quality of the mark or trade on the
owner's reputation, the trademark owner may seek damages.

Some deb-based applications have enabled large-scale exploitation of music samples and audio
formats. Software that is available free of cost on the Net allows the transfer of songs and videos
without the authorization of rights holders (e.g. Napster, MP3 Providers). Moreover, Y{ burners
and portable MP3 players allow copyright violations to occur rather easily.


c  ,c    ,c 
 c c' (

At the moment, most online privacy policies are produced by private businesses for individual
companies. Governments are developing legislation to support and strengthen the privacy
protection measures of many businesses. phese initiatives are aimed at regulating the storage,
use and disclosure by businesses of personal information.

Privacy legislation is designed to protect a person's personal information. phe privacy laws of
their host country affect overseas companies. Every organisation should be very careful while
applying terms and conditions for the electronic transaction for <nternet users. Privacy and
security policies not only reflect the organizations practice but also the rules and regulations for
doing business with the company. Major issues regarding the legalization of electronic
transactions include the following.

² Ensure proper online contracts.


² Record retention obligations.

² Original documentation, in terms of pAX and VAp requirements.

² <mport/export regulations.

² Exchange control regulation.

² Foreign data protection law.

' ) 
  c1

Electronic transactions separate e-business from traditional types of businesses. dhen a


transaction takes place, dho has jurisdiction? dho has the authority to apply law over the
transaction?

A little legislation can go a long way toward helping parties to establish better boundaries to
work within. dhen a transaction that takes place between two different parties located in two
different countries goes wrong then a number of complex questions arise.

0 c c' )


c# 

phe technological basis of e-commerce is basically deb client/server middleware, or what is


called three-tier architectures. phe client tier is the deb browser involving some type of form
processing. phe middle tier is the deb server, often with transaction processing. phe deb server
in turn links to the third tier, a database processing the order information. Some of the issues are
strictly <nternet-related, such as domain names and trademarks, linking and framing, clickware
(and shrinkware), and metatag use. Others are traditional issues applied to the <nternet, such as
copyright, contracts, consumer protection, privacy, taxation, regulated industries and jurisdiction.

E-commerce site development, its advertising, electronic transaction, money transactions and
such involve many legal issues, which need to be taken into account step by step. Before
developing an e-commerce site a registered domain and a registered trademark should be
established. phere must be some copyright protection on the site. phe business must ensure that
it displays the terms and condition/policies within its site. Security involving the privacy of a
user's data is always one of the main concerns while doing business online.

)   
c ) c

An organization is a social system that consists of individuals with a


common or agreed objectives (Barzilai . phe study of the kinds of
systems involved in an organization , which help it meet its different
concerns , refers to organizational theory . Organizational theory
consists of ``individual processes , group processes and organizational
processes (Barzilai '
dhen an organization wants to entertain changes in its operations as a
result of poor performance , or a gap between the desired performance and
actual performance as in the given example , the stakeholders affected
should be a major consideration .
<n many organizations , shrinking the budget is a common remedy , in
order to better allocate scarce resources while at the same time
ensuring the productivity of the organization (pjosvold Poon , 1 © .
One way of cutting costs in an organization is by reducing personnel ,
which can be challenging to implement .
One of the major challenges that an organization desiring to implement
changes would have to face is the general attitude of resistance to
change , common to employees or members in the lower rungs of the
organization (Piderit , 2000 . phis is especially true in the given
scenario because it has been a long time since the organization
implemented changes in its structure .
dhile resistance to change is often viewed negatively as a form of
disobedience or unwillingness to support the management , management
should see such resistance to change as the employees ' means of showing
their concern and expressing their views to the management (Piderit ,
2000 . pherefore , as studies suggest , the whole organization must learn
how to adapt to change , mainly by gathering employee support to
organizational changes.

   c c

 cc

1.c Blockbuster Entertainment Yorp.`s latest purchase of a London video chain, in


partnership with Philips Electronics N.V., has video experts and stock market analysts
wondering what the two {utchmen are up to in Europe.

2.c phe two {utchmen are Æ. dayne Æuizenga, chairman of Blockbuster, the world`s largest
video chain, and Jan pimmer, chairman of Philips. Philips, one of the world`s largest
electronics companies based in the Netherlands, invented the videocassette recorder and
the audio cassette and compact disc.

3.c phe deal that has brought them together is Blockbuster`s $122 million purchase of
London-based Yityvision PLY. Philips chipped in half of the price, or $66 million.

4.c Buying Yityvision gives Blockbuster a major foothold in Europe, but what is really
interesting is that the buyers are competitors.

5.c Philips owns nearly 200 video stores in the United States, plus a 50-percent stake in the
purtles and Record Bar chains. Philips also owns more than 400 video stores in Europe
through its 51 percent stake in Super Ylub. phe European stores have been a drain for the
company: Super Ylub in Europe lost $40© million last year.

dhen the deal was announced, pimmer said Philips was joining with Blockbuster ``to benefit
from Blockbuster`s wide expertise and skills`` in video rental.Some say Philips is sincere about
turning around Super Ylub in Europe.

6.c Video <nsider, a trade magazine, has reported that the deal could lead to Blockbuster
``buying some, if not all`` of the Super Ylub stores. dhen the deal was announced,
Æuizenga said he would be interested in looking at Super Ylub but had no definite plans.
7.c Steve Apple, executive editor of Video <nsider, compared the possible buwet of Super
Ylub by Blockbuster to a well-fitted glove. ``phere certainly is a match there,`` Apple
said.

©.c Stock market analyst Jerry Falkner, at Southeast Research Partners in Boca Raton, said
the partnership could be long-term.

.c Falkner also said the move fits with Blockbuster`s track record. ``phat`s been the history
of Blockbuster, acquiring the competition.``

‘˜‘

Many business people simply do not include <nternet security as part of their day-to-day
business. <t is important, though, to develop a µculture of security¶. Businesses need to not only
have e-security measures and programs in place, but also make sure staff are aware of and follow
<nternet security policy. No matter how good our business procedures, people will make
mistakes.Managers and staff forget to log off, do not change their passwords, or neglect to
download and install the latest software patches because they are too busy.Raising awareness
about online security is an important part of protecting ouronline business. Never assume that
staff understand the security risks they might be taking.
3 c( c cc
Many simple and cost-effective security devices are available to ensure our computersand
information systems are safe from hackers and viruses. phere is a lot ofinformation out there
which can help you to develop an appropriate security program.
Yreate a security culture in our business by:
‡ having all of our current staff (and, as part of their induction, new staff) read

`  and follow up the resources mentioned here


‡ setting up a security awareness program for all system users that includes things
like briefings, training sessions, clauses in employee contracts and security
awareness days.
 c
/c/ c
harmful emails
Email is one of the easiest and fastest means of communicating via the <nternet. <t can also
distribute harmful electronic viruses, worms and trojans through malicious code in attachments
and commands embedded in apparently normal messages. Email borne viruses, worms and
projans are capable of harming our business computer system and with it our ability to conduct
our business.One of the ways to safeguard our computer systems is to be cautious about opening
email attachments or clicking on hyperlinks in emails from unknown orquestionable sources.

Phishing
µPhishing¶ is a technique used to gain personal information for the purpose of identity theft. µPhishing¶
emails give themselves away by telling you that there is a reason why you must provide personal details
such as our <nternet banking log-on, password, credit card number or personal identification number by
reply email or through a website. <t is common for µphishing¶ emails to contain links to a website that is a
convincing replica of the financial institution¶s home page.

#   c  c  


c *
c
c
 )c( c
c 2 c
‡ antivirus software
‡ appropriate firewalls
‡ spam-filtering software
‡ a disaster recovery plan in place
‡ strong passwords
 )c( c
cc
‡ regularly install security updates for our anti-virus software and firewall applications
‡ use caution when introducing external software/hardware
‡ apply common sense when dealing with any emails
‡ see what services our <nternet service provider can offer, i.e. software updates
and security alerts, spam filters and firewalls
‡ ensure that back-up procedures are in place and tested
‡ ensure security patches for our operating systems and application software are
up-to-date and updated regularly
‡ change our password regularly, at least every three months

 )c( c
c 2 c
‡ opening any email attachments from unknown or questionable sources
‡ clicking on links in any email if the content of the email is suspicious or unfamiliar
‡ using passwords that can be easily cracked, guessed or associated with you
‡ storing back-up files at our premisesc

c-%'"%#c

# c

i      

pesting against specification of system or component. Study it by examining its inputs and
related outputs. Key is to devise inputs that have a higher likelihood of causing outputs that
reveal the presence of defects. Use experience and knowledge of domain to identify such test
cases. Failing this a systematic approach may be necessary. Equivalence partitioning is where the
input to a program falls into a number of classes. E.g. positive numbers vs. negative numbers.
Programs normally behave the same way for each member of a class. Partitions exist for both
input and output. Partitions may be discrete or overlap. <nvalid data (i.e. outside the normal
partitions) is one or more partitions that should be tested. pest cases are chosen to exercise each
portion. Also test boundary cases (atypical, extreme, zero) since these frequently show up
defects. For completeness, test all combinations of partitions. Black box testing is rarely
exhaustive (because one doesn't test every value in an equivalence partition) and sometimes fails
to reveal corruption defects caused by "weird" combination of inputs. Black box testing should
not be used to try and reveal corruption defects caused, for example, by assigning a pointer to
point to an object of the wrong type. Static inspection (or using a better programming language!)
is preferable for this.
d      c c

pesting based on knowledge of structure of component (e.g. by looking at source code).


Advantage is that structure of code can be used to find out how many test case need to be
performed. Knowledge of the algorithm (examination of the code) can be used to identify the
equivalence partitions. Path testing is where the tester aims to exercise every independent
execution path through the component. All conditional statements tested for both true and false
cases. <f a unit has n control statements, there will be up to 2n possible paths through it. phis
demonstrates that it is much easier to test small program units than large ones. Flow graphs are a
pictorial representation of the paths of control through a program (ignoring assignments,
procedure calls and </O statements). Use flow graph to design test cases that execute each path.
Static tools may be used to make this easier in programs that have a complex branching
structure. pools support. {ynamic program analyzers instrument a program with additional code.
pypically this will count how many times each statement is executed. At end, print out report
showing which statements have and have not been executed. Problems with flow graph derived
testing:
1.c {ata complexity not taken into account.

2.c {oes not test all paths in combination.

3.c Really only possible at unit and module testing stages because beyond that complexity is
too high.

#  /  c  )cc

Usually done at integration stage when modules or sub-systems are combined. Objective
is to detect errors or invalid assumptions about interfaces between modules. Reason these are not
shown up in unit testing is that test case may perpetuate same incorrect assumption made by
module designer. Particularly important when OO development has been used. Four types of
interface:

1. Parameter: data (or occasionally function references) passed from one unit to another.

2. Shared memory: block of memory shared between units (e.g. global variable) .One places data
there and the other retrieves it.

3. Procedural: object-oriented or abstract data type form of interface, encapsulating several


procedures.

4. Message passing: one sub-system requests a service by passing a message. Ylient-server


interface also used by some OO architectures.
phree common kinds of interface error:

1.c <nterface misuse: caller gives wrong number/types/order of parameters or sends invalid
message.

2.c <nterface misunderstanding: caller misunderstanding specification of called component


and provides or receives data in legal but unexpected form.

3.c piming errors: producer/consumer of data operate at different speeds and data is accessed
before being ready. "Race conditions".

Yommon manifestations are when each unit assumes the other one is checking for invalid data
(failure to check return status) and the consequences of when such a fault is propagated to other
units.

# c cc

Best testing process is to test each subsystem separately, as we have done in my project. Best
done during implementation. Best done after small sub-steps of the implementation rather than
large chunks. Once each lowest level unit has been tested, units are combined with related units
and retested in combination. phis proceeds hierarchically bottom-up until the entire system is
tested as a whole. pypical levels of testing:

1.c Unit -procedure, function, method

2.c Module -package, abstract data type, class

3.c Sub-system - collection of related modules, cluster of classes, method-message paths

4.c Acceptance testing - whole system with real data (involve customer, user, etc)

Alpha testing is acceptance testing with a single client (common for bespoke systems).
Beta testing involves distributing system to potential customers to use and provide feedback. <n,
this project, Beta testing has been followed. phis exposes system to situations and errors that
might not be anticipated by us.

$ c% c/c  cc

E MUS<Y SÆOP is the world's first and only truly interactive music television channel on the
worldwide web where viewers from around the world influence the programme line-up. <t is the
only channel where viewers run the show, and is brought to you by the pioneers of interactive
music television who have launched the careers of hundreds of well known artists today.

E MUS<Y SÆOP is 100% music - 24/7 E-shop has up to 500 music videos available to choose
from. You choose the music line-up by going to the Video List - By Artist in E music shop Live
and choosing up to 5 music videos per day. phese music videos play out in the order that the
requests are received. Yurrently, millions of viewers are interacting with E MUS<Y SÆOP.

E MUS<Y SÆOP is the only interactive channel on the web that lets viewers decide the hits.
Music fans control the future of music. And music fans control E MUS<Y SÆOP. E MUS<Y
SÆOP is a pV channel for people who love to hear and watch music television. <t's interactive
entertainment that keeps up with the pace of the brain.

E MUS<Y SÆOP is the link to the audience of the future that's interactive and in control. <t's a
channel for viewers who embrace music, new ideas and new ways to be entertained. Anybody
can talk about interactivity and technology, but only E MUS<Y SÆOP continues to lead the way.

1.c phe eMusic Shop at present not provide service through telephony, but in eMusic Shop
we can provide it in future.
2.c Automatic mail sending facility is provided to the customer ,that purchases the product
3.c Live help will be provided in the future
4.c debsites will be mounted using secure http connection.
5.c <n the future we are targeted million of people according to our music or costumer.
6.c phrough franchise we are covered whole country then spread it abroad india people.

You might also like