VPNs are used for completing the necessary order and booking capture, booking management, pricing updates and validations with each agent, and the coordination with the literally thousands of travel partners to company has.
Sabre opted for Web-based VPN architecture to deliver real-time updates of data to their MySabre travel agency booking portal that was recently introduced to the 70,000 travel agents that participate with the travel network. The use of an SSL-based VPN architecture for supporting the many quoting, ordering, and services processes was critical for Sabre, as their broader application development plan focused first on speed and security for their agent base. Sabre also wanted to have a single sign-on capability to ensure their agents, the majority of which are not technologically oriented, could quickly gain access to the MySabre portal and complete bookings. According to Sabre (1) the use of VPN technology also significantly dropped the cost of creating a partner management system online as the company was able to keep the application within its own it organization.
References
AMR Research (2004)- Time to Move Beyond Point Security Systems. AMR Research. Lance Travis, author. From the Research Alert of the same name. February 25, 2004
Columbus (2003) - Re-evaluate How Your Measure Your Channels' Performance. AMR Research. Boston, MA December 2, 2003. Accessed from the Internet February 21, 2007 from location:
http://www.lwcresearch.com/filesfordownloads/ReevaluateHowYouMeasureYourChannelDec2003.pdf
Findlaw (2006) - Modern Practice Magazine. Findlaw's Law Practice Magazine Glossary. Downloaded from the Internet on February 21, 2007 from location:
http://practice.findlaw.com/glossary.html
Teleworking: The Quiet Revolution (2005) - From the report of the same name. Gartner Group. Publication Date: September 14, 2005. ID number: G00122284. Stamford, CT.
Sabre (2006) - Sabre use of VPN Technologies. Nortel Networks website. Downloaded from the Internet on February 21, 2007 from location:
http://www2.nortel.com/go/news_detail.jsp?cat_id=-9252&oid=100190006&locale=en-U.S.
Virtual Private Network Consortium (2006) - From the white paper, VPN Technologies: Definitions and Requirements Downloaded from the Internet on February 21, 2007 from location::
http://www.vpnc.org/vpn-technologies.html
Defining VPN in Computer NetworkingThe purpose of this paper is to provide a definition and explanation of a virtual private network (VPN) which is a key concept in information technology (security and network technologies). The explanation that follows includes selected quotes to provide some definitional clarity of the term and the key concepts that are involved as well as the different types of VPNs and how they are related to
Centralized telesaving control Managing cost-effective use of dial links centrally may no longer be possible. Overhead VPN tunnels impose overhead for dial-in users: encryption algorithms may impact the performance of the user's system, there will be an increased protocol header overhead, authentication latency will increase, PPP and IP compression will perform poorly (compared to a direct link), and modem compression won't work at all. Support issues Replacing direct-dial links with VPN tunnels may produce some
Very High - IPSec works at the protocol level, independent of applications, therefore scalability is best-in-class Comparing the technological and operational benefits specifically in the areas of client access options, access control, client-side security, installation, and client configuration highlights just how differentiated the IPv4-based IPSec vs. IPv6 -based SSL protocols are from each other. In analyzing these differences, Table 3: Comparing Technological and Operational benefits of IPv6-based SSL and IPv4-based IPSec
When portals are designed to the specific requirements of Web 2.0 design objectives, companies with virtual teams are finding they can attain higher levels of shared task ownership as well. This is because there are significantly greater levels of trust overall throughout an organization based on the collective contributions of every member of a virtual and in-office team when they share their knowledge and information together (Mancini, 2010). Portals
Computing networks are certainly changing. There are a couple of different factors driving these changes, which generally include issues of security, privacy, regulatory concerns, and technological advancements. For the most part, these drivers are resulting in positive changes for computer networks. One of the fundamental ways in which computer networks are changing is that they are incorporating Virtual Private Networks (VPNs). VPNs provide an additional computing network inside of an external
Instead of training sessions requiring trainers and trainees to be together in the same office, trainers can conduct sessions from one location for employees in multiple remote locations without requiring coordinated travel necessary for traditional professional training sessions (Huang & Frahim, 2008 pp90-91). The Rising Importance of Remote Access Computer Networks in Business Naturally, one of the advantages of using remote computer access networks for presentations, conferences, and staff training is
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now