Intranet


Unlike the public Internet, Intranet is a private network inside the organization that uses the Internet Protocol (IP). Intranet is for internal use only. Firewalls keep unauthorized Internet traffic off an Intranet. Thus, organizations can have web servers available only to employees. An Intranet may not actually be an Internet it may simply be a network.

Usually not connected to the Internet, the Intranet’s general purpose is to share private (or confidential) information across an organization or department. It is rapidly gaining popularity due to its open standards, thus allowing information stored on unlike servers to be found. The users of the Intranet can exchange electronic mail (email), send files (ftp), browse web (WWW) pages, and connect to any other computer (telnet).

Web site hosted on a local network is not accessible by anyone outside the network. Intranets work just like public Web sites. Offices can include any text, graphics, and hyperlinks it chooses. Intranets can also provide access to external Web sites, even though external users cannot access the intranet. Secure intranets are now the fastest-growing segment of the Internet because they are much less expensive to build and manage than private networks based on proprietary protocols. Without Intranet computers are just useless boxes.

Intranet needs to be included in all your training programs and also used as a structure, which other departments can follow

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, Line of Sight

Plagiarism and Copyright Violation


Plagiarism and copyright violation are complicated issues, especially in modern technical writing.

Plagiarism is the practice of using someone else’s words or ideas without crediting the source. Many organizations treat authorship of internal documents, such as memos and most reports, casually; that is, if the organization asks you to update an internal procedures manual, it expects you to use any material from the existing manual, even if you cannot determine the original author.

Organizations tend to treat the authorship of published documents, such as external manuals or journal articles, more seriously. Although the authors of some kinds of published technical documents are not listed, many documents such as user’s guides do acknowledge their authors. However, what constitutes authorship can be a complicated question, because most large technical documents are produced collaboratively, with several persons contributing text, another doing the graphics, still another reviewing for technical accuracy, and finally someone reviewing for legal concerns. Problems are compounded when a document goes into revision, and parts of original text or graphics are combined with new material.

The best way to determine authorship is to discuss it openly with everyone who contributed to the document. Some persons might deserve to be listed as authors; others, only credited in an acknowledgment section. To prevent changes of plagiarism, the wisest course is to be very conservative: if there is any question about whether to cite a source, cite it.

A related problem involves copyright violation. Copyright law provides legal protection to the author of any document, whether it be published or unpublished, and whether the author be an individual or a corporation. Unfortunately, some companies will take whole sections of another company’s product information or manual, make cosmetic changes, and publish it themselves. This, of course is stealing.

But the difference between stealing and learning from your competitors can be subtle. Words are protected by copyright, but ideas aren’t. Rare is the manufacturer who doesn’t study the competitor’s users’ guides to see how a feature or task is described. Inevitably, a good idea spreads from one document to another, and then to another. If one manual contains a particularly useful kind of troubleshooting guide, pretty soon a lot of others will contain similar ones. Even though this process of imitation tends to produce a dull uniformity, it can improve the overall quality of the document. Under no circumstances, however, should you violate copyright by using another organization’s words.

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please contact www.asifjmir.com, Line of Sight